Security update for the Linux Kernel
Announcement ID: | SUSE-SU-2024:2892-1 |
---|---|
Rating: | important |
References: |
|
Cross-References: |
|
CVSS scores: |
|
Affected Products: |
|
An update that solves 139 vulnerabilities and has 11 security fixes can now be installed.
Description:
The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).
- CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633).
- CVE-2024-39506: liquidio: adjust a NULL pointer handling path in lio_vf_rep_copy_packet (bsc#1227729).
- CVE-2021-47619: i40e: Fix queues reservation for XDP (bsc#1226645).
- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743).
- CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible (bsc#1228705).
- CVE-2024-42223: media: dvb-frontends: tda10048: Fix integer overflow (bsc#1228726)
- CVE-2024-42119: drm/amd/display: Skip finding free audio for unknown engine_id (bsc#1228584)
- CVE-2024-42120: drm/amd/display: Check pipe offset before setting vblank (bsc#1228588)
- CVE-2024-41095: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes (bsc#1228662)
- CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list (bsc#1228723).
- CVE-2024-41072: wifi: cfg80211: wext: add extra SIOCSIWSCAN data check (bsc#1228626).
- CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565).
- CVE-2024-40995: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (bsc#1227830).
- CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets (bsc#1228530).
- CVE-2024-41066: ibmvnic: add tx check to prevent skb leak (bsc#1228640).
- CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680).
- CVE-2024-41089: drm/nouveau/dispnv04: fix null pointer dereference in (bsc#1228658)
- CVE-2024-41060: drm/radeon: check bo_va->bo is non-NULL before using it (bsc#1228567)
- CVE-2022-48829: NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes (bsc#1228055).
- CVE-2022-48828: NFSD: Fix ia_size underflow (bsc#1228054).
- CVE-2022-48827: NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1228037).
- CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable failure (bsc#1228655).
- CVE-2024-41071: wifi: mac80211: Avoid address calculations via out of bounds array indexing (bsc#1228625).
- CVE-2024-41064: powerpc/eeh: avoid possible crash when edev->pdev changes (bsc#1228599).
- CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700).
- CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617).
- CVE-2024-40978: scsi: qedi: Fix crash while reading debugfs attribute (bsc#1227929).
- CVE-2022-48792: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task (bsc#1228013).
- CVE-2022-48823: scsi: qedf: Fix refcount issue when LOGO is received during TMF (bsc#1228045).
- CVE-2024-41076: NFSv4: Fix memory leak in nfs4_set_security_label (bsc#1228649).
- CVE-2024-40998: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() (bsc#1227866).
- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
- CVE-2024-40987: drm/amdgpu: fix UBSAN warning in kv_dpm.c (bsc#1228235)
- CVE-2022-48826: drm/vc4: Fix deadlock on DSI device attach error (bsc#1227975)
- CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ (bsc#1222625).
- CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry() (bsc#1228409).
- CVE-2024-41016: ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410).
- CVE-2024-41063: bluetooth: hci_core: cancel all works upon hci_unregister_dev() (bsc#1228580).
- CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (bsc#1228470).
- CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() (bsc#1228581).
- CVE-2021-47405: HID: usbhid: free raw_report buffers in usbhid_stop (bsc#1225238).
- CVE-2024-40988: drm/radeon: fix UBSAN warning in kv_dpm.c (bsc#1227957)
- CVE-2024-40932: drm/exynos/vidi: fix memory leak in .get_modes() (bsc#1227828)
- CVE-2021-47403: ipack: ipoctal: fix module reference leak (bsc#1225241).
- CVE-2021-47388: mac80211: fix use-after-free in CCMP/GCMP RX (bsc#1225214).
- CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data (bsc#1228408).
- CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327).
- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
- CVE-2024-40999: net: ena: Add validation for completion descriptors consistency (bsc#1227913).
- CVE-2024-35837: net: mvpp2: clear BM pool before initialization (bsc#1224500).
- CVE-2021-47588: sit: do not call ipip6_dev_free() from sit_init_net() (bsc#1226568).
- CVE-2022-48804: vt_ioctl: fix array_index_nospec in vt_setactivate (bsc#1227968).
- CVE-2024-40967: serial: imx: Introduce timeout when waiting on transmitter empty (bsc#1227891).
- CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc (bsc#1227886).
- CVE-2022-48850: net-sysfs: add check for netdevice being present to speed_show (bsc#1228071).
- CVE-2021-47582: usb: core: Do not hold the device lock while sleeping in do_proc_control() (bsc#1226559).
- CVE-2024-40982: ssb: fix potential NULL pointer dereference in ssb_device_uevent() (bsc#1227865).
- CVE-2021-47468: isdn: mISDN: Fix sleeping function called from invalid context (bsc#1225346).
- CVE-2021-47395: mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap (bsc#1225326).
- CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path (bsc#1227936).
- CVE-2023-52594: Fixed potential array-index-out-of-bounds read in ath9k_htc_txstatus() (bsc#1221045).
- CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets (bsc#1228003).
- CVE-2021-47580: scsi: scsi_debug: Fix type in min_t to avoid stack OOB (bsc#1226550).
- CVE-2024-26735: ipv6: sr: fix possible use-after-free and null-ptr-deref (bsc#1222372).
- CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).
- CVE-2022-48811: ibmvnic: do not release napi in __ibmvnic_open() (bsc#1227928).
- CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836).
- CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario (bsc#1227730).
- CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure (bsc#1227786).
- CVE-2024-40941: wifi: iwlwifi: mvm: do not read past the mfuart notifcation (bsc#1227771).
- CVE-2022-48860: ethernet: Fix error handling in xemaclite_of_probe (bsc#1228008)
- CVE-2022-48863: mISDN: Fix memory leak in dsp_pipeline_build() (bsc#1228063).
- CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() (bsc#1227806).
- CVE-2024-39499: vmci: prevent speculation leaks by sanitizing event in event_deliver() (bsc#1227725)
- CVE-2024-39509: HID: core: remove unnecessary WARN_ON() in implement() (bsc#1227733)
- CVE-2024-39487: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (bsc#1227573)
- CVE-2024-35934: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() (bsc#1224641)
- CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (bsc#1227884).
- CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512)
- CVE-2021-47441: mlxsw: thermal: Fix out-of-bounds memory accesses (bsc#1225224)
- CVE-2021-47194: cfg80211: call cfg80211_stop_ap when switch from P2P_GO type (bsc#1222829)
- CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (bsc#1223815)
- CVE-2022-48775: Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj (bsc#1227924).
- CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (bsc#1223813)
- CVE-2024-40929: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids (bsc#1227774).
- CVE-2024-40912: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() (bsc#1227790).
- CVE-2024-40942: wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects (bsc#1227770).
- CVE-2022-48857: NFC: port100: fix use-after-free in port100_send_complete (bsc#1228005).
- CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (bsc#1225719).
- CVE-2021-47606: net: netlink: af_netlink: Prevent empty skb by adding a check on len. (bsc#1226555).
- CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory (bsc#1227762).
- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).
- CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove administratively set MAC (bsc#1223012).
- CVE-2021-47516: nfp: Fix memory leak in nfp_cpp_area_cache_add() (bsc#1225427).
- CVE-2021-47501: i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc (bsc#1225361).
- CVE-2024-39501: drivers: core: synchronize really_probe() and dev_uevent() (bsc#1227754).
- CVE-2023-52743: ice: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1225003)
- CVE-2021-47542: net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() (bsc#1225455)
- CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711)
- CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1224545)
- CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778)
- CVE-2021-47599: btrfs: use latest_dev in btrfs_show_devname (bsc#1226571).
- CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138).
- CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (bsc#1222326).
- CVE-2021-47597: inet_diag: fix kernel-infoleak for UDP sockets (bsc#1226553).
- CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core (bsc#1227626).
- CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for ICMPv6 (bsc#1226783).
- CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942).
- CVE-2023-52619: Fixed possible crash when setting number of cpus to an odd number in pstore/ram (bsc#1221618).
- CVE-2024-26659: Fixed wrong handling of isoc Babble and Buffer Overrun events in xhci (bsc#1222317).
- CVE-2024-35978: Bluetooth: Fix memory leak in hci_req_sync_complete() (bsc#1224571).
- CVE-2023-52669: crypto: s390/aes - Fix buffer overread in CTR mode (bsc#1224637).
- CVE-2023-52615: Fixed page fault dead lock on mmap-ed hwrng (bsc#1221614).
- CVE-2023-52612: Fixed req->dst buffer overflow in crypto/scomp (bsc#1221616).
- CVE-2024-35995: ACPI: CPPC: Use access_width over bit_width for system memory accesses (bsc#1224557).
- CVE-2023-52623: Fixed suspicious RCU usage in SUNRPC (bsc#1222060).
- CVE-2021-47295: net: sched: fix memory leak in tcindex_partial_destroy_work (bsc#1224975)
- CVE-2024-38630: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (bsc#1226908).
- CVE-2021-47559: net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk() (bsc#1225396).
The following non-security bugs were fixed:
- Fix spurious WARNING caused by a qxl driver patch (bsc#1227213,bsc#1227191)
- Btrfs: incremental send, fix emission of invalid clone operations (bsc#1228030).
- Btrfs: send, improve clone range (bsc#1228030).
- KVM: PPC: Book3S HV: Do not take kvm->lock around kvm_for_each_vcpu (bsc#1065729).
- KVM: PPC: Book3S HV: remove extraneous asterisk from rm_host_ipi_action() comment (bsc#1065729).
- KVM: PPC: Book3S PR: Exiting split hack mode needs to fixup both PC and LR (bsc#1065729).
- KVM: PPC: Book3S: Fix some RCU-list locks (git-fixes).
- KVM: PPC: Book3S: Only report KVM_CAP_SPAPR_TCE_VFIO on powernv machines (bsc#1065729).
- KVM: PPC: Book3S: Use new mutex to synchronize access to rtas token list (bsc#1065729).
- KVM: PPC: Inform the userspace about TCE update failures (bsc#1065729).
- KVM: PPC: Move and undef TRACE_INCLUDE_PATH/FILE (bsc#1065729).
- PCI: Fix resource double counting on remove & rescan (git-fixes).
- PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git-fixes).
- Tools: hv: kvp: eliminate 'may be used uninitialized' warning (git-fixes).
- USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (git-fixes).
- btrfs: fix 64bit compat send ioctl arguments not initializing version member (bsc#1228030).
- btrfs: fix send ioctl on 32bit with 64bit kernel (bsc#1228030).
- btrfs: remove unused members dir_path from recorded_ref (bsc#1228030).
- btrfs: send: add new command FILEATTR for file attributes (bsc#1228030).
- btrfs: send: add stream v2 definitions (bsc#1228030).
- btrfs: send: always use the rbtree based inode ref management infrastructure (bsc#1228030).
- btrfs: send: avoid copying file data (bsc#1228030).
- btrfs: send: explicitly number commands and attributes (bsc#1228030).
- btrfs: send: fix failures when processing inodes with no links (bsc#1228030).
- btrfs: send: fix send failure of a subcase of orphan inodes (bsc#1228030).
- btrfs: send: fix sending link commands for existing file paths (bsc#1228030).
- btrfs: send: get rid of i_size logic in send_write() (bsc#1228030).
- btrfs: send: introduce recorded_ref_alloc and recorded_ref_free (bsc#1228030).
- btrfs: send: prepare for v2 protocol (bsc#1228030).
- btrfs: send: refactor arguments of get_inode_info() (bsc#1228030).
- btrfs: send: remove stale code when checking for shared extents (bsc#1228030).
- btrfs: send: remove unused found_type parameter to lookup_dir_item_inode() (bsc#1228030).
- btrfs: send: remove unused send_ctx::{total,cmd}_send_size (bsc#1228030).
- btrfs: send: use boolean types for current inode status (bsc#1228030).
- btrfs: silence maybe-uninitialized warning in clone_range (bsc#1228030).
- drm/vc4: dsi: Only register our component once a DSI device is (bsc#1227975)
- hv_netvsc: rndis_filter needs to select NLS (git-fixes).
- ipv6: sr: fix incorrect unregister order (git-fixes).
- net: mana: Fix the extra HZ in mana_hwc_send_request (git-fixes).
- net: mana: select PAGE_POOL (git-fixes).
- net_sched: add a temporary refcnt for struct tcindex_data (bsc#1224975).
- net_sched: fix a memory leak in cls_tcindex (bsc#1224975).
- net_sched: fix a missing refcnt in tcindex_init() (bsc#1224975).
- net_sched: hold rtnl lock in tcindex_partial_destroy_work() (bsc#1224975)
- nvme: fixup comment for nvme RDMA Provider Type (git-fixes).
- ocfs2: fix DIO failure due to insufficient transaction credits (bsc#1216834).
- ocfs2: remove redundant assignment to variable free_space (bsc#1228409).
- ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410).
- scsi: qla2xxx: Avoid possible run-time warning with long model_num (bsc#1228850).
- scsi: qla2xxx: Complete command early within lock (bsc#1228850).
- scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).
- scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).
- scsi: qla2xxx: During vport delete send async logout explicitly (bsc#1228850).
- scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850).
- scsi: qla2xxx: Fix flash read failure (bsc#1228850).
- scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850).
- scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850).
- scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850).
- scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850).
- scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds (bsc#1228850).
- scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850).
- scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850).
- scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850).
- scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850).
- signal: Introduce clear_siginfo (git-fixes).
- string.h: Introduce memtostr() and memtostr_pad() (bsc#1228850).
- tools lib: Fix builds when glibc contains strlcpy() (git-fixes).
- tools: hv: fix KVP and VSS daemons exit code (git-fixes).
- usb: add a hcd_uses_dma helper (git-fixes).
- usb: atm: cxacru: fix endpoint checking in cxacru_bind() (git-fixes).
- usb: musb: da8xx: fix a resource leak in probe() (git-fixes).
- x86/bhi: Avoid warning in #DB handler due to BHI mitigation (git-fixes).
- x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-fixes).
- x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI (git-fixes).
- xfs: check that dir block entries do not off the end of the buffer (git-fixes).
- xfs: refactor xfs_verifier_error and xfs_buf_ioerror (git-fixes).
- xfs: remove XFS_WANT_CORRUPTED_RETURN from dir3 data verifiers (git-fixes).
- xhci: Poll for U0 after disabling USB2 LPM (git-fixes).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Real Time 12 SP5
zypper in -t patch SUSE-SLE-RT-12-SP5-2024-2892=1
Package List:
-
SUSE Linux Enterprise Real Time 12 SP5 (x86_64)
- kernel-rt-devel-debuginfo-4.12.14-10.197.1
- gfs2-kmp-rt-debuginfo-4.12.14-10.197.1
- kernel-rt-devel-4.12.14-10.197.1
- kernel-rt_debug-devel-debuginfo-4.12.14-10.197.1
- kernel-rt-debugsource-4.12.14-10.197.1
- ocfs2-kmp-rt-debuginfo-4.12.14-10.197.1
- kernel-rt_debug-devel-4.12.14-10.197.1
- dlm-kmp-rt-debuginfo-4.12.14-10.197.1
- dlm-kmp-rt-4.12.14-10.197.1
- kernel-rt_debug-debugsource-4.12.14-10.197.1
- cluster-md-kmp-rt-4.12.14-10.197.1
- kernel-rt-base-4.12.14-10.197.1
- kernel-rt-base-debuginfo-4.12.14-10.197.1
- cluster-md-kmp-rt-debuginfo-4.12.14-10.197.1
- kernel-rt-debuginfo-4.12.14-10.197.1
- kernel-rt_debug-debuginfo-4.12.14-10.197.1
- gfs2-kmp-rt-4.12.14-10.197.1
- kernel-syms-rt-4.12.14-10.197.1
- ocfs2-kmp-rt-4.12.14-10.197.1
-
SUSE Linux Enterprise Real Time 12 SP5 (noarch)
- kernel-source-rt-4.12.14-10.197.1
- kernel-devel-rt-4.12.14-10.197.1
-
SUSE Linux Enterprise Real Time 12 SP5 (nosrc x86_64)
- kernel-rt-4.12.14-10.197.1
- kernel-rt_debug-4.12.14-10.197.1
References:
- https://www.suse.com/security/cve/CVE-2021-47194.html
- https://www.suse.com/security/cve/CVE-2021-47197.html
- https://www.suse.com/security/cve/CVE-2021-47219.html
- https://www.suse.com/security/cve/CVE-2021-47295.html
- https://www.suse.com/security/cve/CVE-2021-47388.html
- https://www.suse.com/security/cve/CVE-2021-47395.html
- https://www.suse.com/security/cve/CVE-2021-47399.html
- https://www.suse.com/security/cve/CVE-2021-47403.html
- https://www.suse.com/security/cve/CVE-2021-47405.html
- https://www.suse.com/security/cve/CVE-2021-47441.html
- https://www.suse.com/security/cve/CVE-2021-47468.html
- https://www.suse.com/security/cve/CVE-2021-47501.html
- https://www.suse.com/security/cve/CVE-2021-47516.html
- https://www.suse.com/security/cve/CVE-2021-47542.html
- https://www.suse.com/security/cve/CVE-2021-47559.html
- https://www.suse.com/security/cve/CVE-2021-47580.html
- https://www.suse.com/security/cve/CVE-2021-47582.html
- https://www.suse.com/security/cve/CVE-2021-47588.html
- https://www.suse.com/security/cve/CVE-2021-47597.html
- https://www.suse.com/security/cve/CVE-2021-47599.html
- https://www.suse.com/security/cve/CVE-2021-47606.html
- https://www.suse.com/security/cve/CVE-2021-47619.html
- https://www.suse.com/security/cve/CVE-2022-48775.html
- https://www.suse.com/security/cve/CVE-2022-48792.html
- https://www.suse.com/security/cve/CVE-2022-48794.html
- https://www.suse.com/security/cve/CVE-2022-48804.html
- https://www.suse.com/security/cve/CVE-2022-48805.html
- https://www.suse.com/security/cve/CVE-2022-48810.html
- https://www.suse.com/security/cve/CVE-2022-48811.html
- https://www.suse.com/security/cve/CVE-2022-48823.html
- https://www.suse.com/security/cve/CVE-2022-48826.html
- https://www.suse.com/security/cve/CVE-2022-48827.html
- https://www.suse.com/security/cve/CVE-2022-48828.html
- https://www.suse.com/security/cve/CVE-2022-48829.html
- https://www.suse.com/security/cve/CVE-2022-48836.html
- https://www.suse.com/security/cve/CVE-2022-48839.html
- https://www.suse.com/security/cve/CVE-2022-48850.html
- https://www.suse.com/security/cve/CVE-2022-48855.html
- https://www.suse.com/security/cve/CVE-2022-48857.html
- https://www.suse.com/security/cve/CVE-2022-48860.html
- https://www.suse.com/security/cve/CVE-2022-48863.html
- https://www.suse.com/security/cve/CVE-2023-52435.html
- https://www.suse.com/security/cve/CVE-2023-52594.html
- https://www.suse.com/security/cve/CVE-2023-52612.html
- https://www.suse.com/security/cve/CVE-2023-52615.html
- https://www.suse.com/security/cve/CVE-2023-52619.html
- https://www.suse.com/security/cve/CVE-2023-52623.html
- https://www.suse.com/security/cve/CVE-2023-52669.html
- https://www.suse.com/security/cve/CVE-2023-52743.html
- https://www.suse.com/security/cve/CVE-2023-52885.html
- https://www.suse.com/security/cve/CVE-2024-26615.html
- https://www.suse.com/security/cve/CVE-2024-26659.html
- https://www.suse.com/security/cve/CVE-2024-26663.html
- https://www.suse.com/security/cve/CVE-2024-26735.html
- https://www.suse.com/security/cve/CVE-2024-26830.html
- https://www.suse.com/security/cve/CVE-2024-26920.html
- https://www.suse.com/security/cve/CVE-2024-26924.html
- https://www.suse.com/security/cve/CVE-2024-27019.html
- https://www.suse.com/security/cve/CVE-2024-27020.html
- https://www.suse.com/security/cve/CVE-2024-27025.html
- https://www.suse.com/security/cve/CVE-2024-27437.html
- https://www.suse.com/security/cve/CVE-2024-35806.html
- https://www.suse.com/security/cve/CVE-2024-35837.html
- https://www.suse.com/security/cve/CVE-2024-35893.html
- https://www.suse.com/security/cve/CVE-2024-35934.html
- https://www.suse.com/security/cve/CVE-2024-35949.html
- https://www.suse.com/security/cve/CVE-2024-35966.html
- https://www.suse.com/security/cve/CVE-2024-35967.html
- https://www.suse.com/security/cve/CVE-2024-35978.html
- https://www.suse.com/security/cve/CVE-2024-35995.html
- https://www.suse.com/security/cve/CVE-2024-36004.html
- https://www.suse.com/security/cve/CVE-2024-36288.html
- https://www.suse.com/security/cve/CVE-2024-36901.html
- https://www.suse.com/security/cve/CVE-2024-36902.html
- https://www.suse.com/security/cve/CVE-2024-36924.html
- https://www.suse.com/security/cve/CVE-2024-36939.html
- https://www.suse.com/security/cve/CVE-2024-38558.html
- https://www.suse.com/security/cve/CVE-2024-38560.html
- https://www.suse.com/security/cve/CVE-2024-38630.html
- https://www.suse.com/security/cve/CVE-2024-39487.html
- https://www.suse.com/security/cve/CVE-2024-39488.html
- https://www.suse.com/security/cve/CVE-2024-39490.html
- https://www.suse.com/security/cve/CVE-2024-39494.html
- https://www.suse.com/security/cve/CVE-2024-39499.html
- https://www.suse.com/security/cve/CVE-2024-39501.html
- https://www.suse.com/security/cve/CVE-2024-39506.html
- https://www.suse.com/security/cve/CVE-2024-39507.html
- https://www.suse.com/security/cve/CVE-2024-39509.html
- https://www.suse.com/security/cve/CVE-2024-40901.html
- https://www.suse.com/security/cve/CVE-2024-40904.html
- https://www.suse.com/security/cve/CVE-2024-40912.html
- https://www.suse.com/security/cve/CVE-2024-40923.html
- https://www.suse.com/security/cve/CVE-2024-40929.html
- https://www.suse.com/security/cve/CVE-2024-40932.html
- https://www.suse.com/security/cve/CVE-2024-40937.html
- https://www.suse.com/security/cve/CVE-2024-40941.html
- https://www.suse.com/security/cve/CVE-2024-40942.html
- https://www.suse.com/security/cve/CVE-2024-40943.html
- https://www.suse.com/security/cve/CVE-2024-40953.html
- https://www.suse.com/security/cve/CVE-2024-40959.html
- https://www.suse.com/security/cve/CVE-2024-40966.html
- https://www.suse.com/security/cve/CVE-2024-40967.html
- https://www.suse.com/security/cve/CVE-2024-40978.html
- https://www.suse.com/security/cve/CVE-2024-40982.html
- https://www.suse.com/security/cve/CVE-2024-40987.html
- https://www.suse.com/security/cve/CVE-2024-40988.html
- https://www.suse.com/security/cve/CVE-2024-40990.html
- https://www.suse.com/security/cve/CVE-2024-40995.html
- https://www.suse.com/security/cve/CVE-2024-40998.html
- https://www.suse.com/security/cve/CVE-2024-40999.html
- https://www.suse.com/security/cve/CVE-2024-41014.html
- https://www.suse.com/security/cve/CVE-2024-41015.html
- https://www.suse.com/security/cve/CVE-2024-41016.html
- https://www.suse.com/security/cve/CVE-2024-41044.html
- https://www.suse.com/security/cve/CVE-2024-41048.html
- https://www.suse.com/security/cve/CVE-2024-41059.html
- https://www.suse.com/security/cve/CVE-2024-41060.html
- https://www.suse.com/security/cve/CVE-2024-41063.html
- https://www.suse.com/security/cve/CVE-2024-41064.html
- https://www.suse.com/security/cve/CVE-2024-41066.html
- https://www.suse.com/security/cve/CVE-2024-41070.html
- https://www.suse.com/security/cve/CVE-2024-41071.html
- https://www.suse.com/security/cve/CVE-2024-41072.html
- https://www.suse.com/security/cve/CVE-2024-41076.html
- https://www.suse.com/security/cve/CVE-2024-41078.html
- https://www.suse.com/security/cve/CVE-2024-41081.html
- https://www.suse.com/security/cve/CVE-2024-41089.html
- https://www.suse.com/security/cve/CVE-2024-41090.html
- https://www.suse.com/security/cve/CVE-2024-41091.html
- https://www.suse.com/security/cve/CVE-2024-41095.html
- https://www.suse.com/security/cve/CVE-2024-42070.html
- https://www.suse.com/security/cve/CVE-2024-42093.html
- https://www.suse.com/security/cve/CVE-2024-42096.html
- https://www.suse.com/security/cve/CVE-2024-42119.html
- https://www.suse.com/security/cve/CVE-2024-42120.html
- https://www.suse.com/security/cve/CVE-2024-42124.html
- https://www.suse.com/security/cve/CVE-2024-42145.html
- https://www.suse.com/security/cve/CVE-2024-42223.html
- https://www.suse.com/security/cve/CVE-2024-42224.html
- https://bugzilla.suse.com/show_bug.cgi?id=1065729
- https://bugzilla.suse.com/show_bug.cgi?id=1088701
- https://bugzilla.suse.com/show_bug.cgi?id=1149446
- https://bugzilla.suse.com/show_bug.cgi?id=1196018
- https://bugzilla.suse.com/show_bug.cgi?id=1202346
- https://bugzilla.suse.com/show_bug.cgi?id=1216834
- https://bugzilla.suse.com/show_bug.cgi?id=1220138
- https://bugzilla.suse.com/show_bug.cgi?id=1220942
- https://bugzilla.suse.com/show_bug.cgi?id=1221045
- https://bugzilla.suse.com/show_bug.cgi?id=1221614
- https://bugzilla.suse.com/show_bug.cgi?id=1221616
- https://bugzilla.suse.com/show_bug.cgi?id=1221618
- https://bugzilla.suse.com/show_bug.cgi?id=1222060
- https://bugzilla.suse.com/show_bug.cgi?id=1222317
- https://bugzilla.suse.com/show_bug.cgi?id=1222326
- https://bugzilla.suse.com/show_bug.cgi?id=1222372
- https://bugzilla.suse.com/show_bug.cgi?id=1222625
- https://bugzilla.suse.com/show_bug.cgi?id=1222776
- https://bugzilla.suse.com/show_bug.cgi?id=1222824
- https://bugzilla.suse.com/show_bug.cgi?id=1222829
- https://bugzilla.suse.com/show_bug.cgi?id=1223012
- https://bugzilla.suse.com/show_bug.cgi?id=1223778
- https://bugzilla.suse.com/show_bug.cgi?id=1223813
- https://bugzilla.suse.com/show_bug.cgi?id=1223815
- https://bugzilla.suse.com/show_bug.cgi?id=1224500
- https://bugzilla.suse.com/show_bug.cgi?id=1224512
- https://bugzilla.suse.com/show_bug.cgi?id=1224545
- https://bugzilla.suse.com/show_bug.cgi?id=1224557
- https://bugzilla.suse.com/show_bug.cgi?id=1224571
- https://bugzilla.suse.com/show_bug.cgi?id=1224576
- https://bugzilla.suse.com/show_bug.cgi?id=1224587
- https://bugzilla.suse.com/show_bug.cgi?id=1224637
- https://bugzilla.suse.com/show_bug.cgi?id=1224641
- https://bugzilla.suse.com/show_bug.cgi?id=1224683
- https://bugzilla.suse.com/show_bug.cgi?id=1224699
- https://bugzilla.suse.com/show_bug.cgi?id=1224700
- https://bugzilla.suse.com/show_bug.cgi?id=1224975
- https://bugzilla.suse.com/show_bug.cgi?id=1225003
- https://bugzilla.suse.com/show_bug.cgi?id=1225214
- https://bugzilla.suse.com/show_bug.cgi?id=1225224
- https://bugzilla.suse.com/show_bug.cgi?id=1225229
- https://bugzilla.suse.com/show_bug.cgi?id=1225238
- https://bugzilla.suse.com/show_bug.cgi?id=1225241
- https://bugzilla.suse.com/show_bug.cgi?id=1225326
- https://bugzilla.suse.com/show_bug.cgi?id=1225328
- https://bugzilla.suse.com/show_bug.cgi?id=1225346
- https://bugzilla.suse.com/show_bug.cgi?id=1225361
- https://bugzilla.suse.com/show_bug.cgi?id=1225396
- https://bugzilla.suse.com/show_bug.cgi?id=1225427
- https://bugzilla.suse.com/show_bug.cgi?id=1225455
- https://bugzilla.suse.com/show_bug.cgi?id=1225711
- https://bugzilla.suse.com/show_bug.cgi?id=1225719
- https://bugzilla.suse.com/show_bug.cgi?id=1225820
- https://bugzilla.suse.com/show_bug.cgi?id=1225838
- https://bugzilla.suse.com/show_bug.cgi?id=1226550
- https://bugzilla.suse.com/show_bug.cgi?id=1226553
- https://bugzilla.suse.com/show_bug.cgi?id=1226555
- https://bugzilla.suse.com/show_bug.cgi?id=1226559
- https://bugzilla.suse.com/show_bug.cgi?id=1226568
- https://bugzilla.suse.com/show_bug.cgi?id=1226571
- https://bugzilla.suse.com/show_bug.cgi?id=1226645
- https://bugzilla.suse.com/show_bug.cgi?id=1226783
- https://bugzilla.suse.com/show_bug.cgi?id=1226786
- https://bugzilla.suse.com/show_bug.cgi?id=1226834
- https://bugzilla.suse.com/show_bug.cgi?id=1226908
- https://bugzilla.suse.com/show_bug.cgi?id=1227191
- https://bugzilla.suse.com/show_bug.cgi?id=1227213
- https://bugzilla.suse.com/show_bug.cgi?id=1227573
- https://bugzilla.suse.com/show_bug.cgi?id=1227618
- https://bugzilla.suse.com/show_bug.cgi?id=1227626
- https://bugzilla.suse.com/show_bug.cgi?id=1227716
- https://bugzilla.suse.com/show_bug.cgi?id=1227725
- https://bugzilla.suse.com/show_bug.cgi?id=1227729
- https://bugzilla.suse.com/show_bug.cgi?id=1227730
- https://bugzilla.suse.com/show_bug.cgi?id=1227733
- https://bugzilla.suse.com/show_bug.cgi?id=1227750
- https://bugzilla.suse.com/show_bug.cgi?id=1227754
- https://bugzilla.suse.com/show_bug.cgi?id=1227762
- https://bugzilla.suse.com/show_bug.cgi?id=1227770
- https://bugzilla.suse.com/show_bug.cgi?id=1227771
- https://bugzilla.suse.com/show_bug.cgi?id=1227772
- https://bugzilla.suse.com/show_bug.cgi?id=1227774
- https://bugzilla.suse.com/show_bug.cgi?id=1227786
- https://bugzilla.suse.com/show_bug.cgi?id=1227790
- https://bugzilla.suse.com/show_bug.cgi?id=1227806
- https://bugzilla.suse.com/show_bug.cgi?id=1227824
- https://bugzilla.suse.com/show_bug.cgi?id=1227828
- https://bugzilla.suse.com/show_bug.cgi?id=1227830
- https://bugzilla.suse.com/show_bug.cgi?id=1227836
- https://bugzilla.suse.com/show_bug.cgi?id=1227849
- https://bugzilla.suse.com/show_bug.cgi?id=1227865
- https://bugzilla.suse.com/show_bug.cgi?id=1227866
- https://bugzilla.suse.com/show_bug.cgi?id=1227884
- https://bugzilla.suse.com/show_bug.cgi?id=1227886
- https://bugzilla.suse.com/show_bug.cgi?id=1227891
- https://bugzilla.suse.com/show_bug.cgi?id=1227913
- https://bugzilla.suse.com/show_bug.cgi?id=1227924
- https://bugzilla.suse.com/show_bug.cgi?id=1227928
- https://bugzilla.suse.com/show_bug.cgi?id=1227929
- https://bugzilla.suse.com/show_bug.cgi?id=1227936
- https://bugzilla.suse.com/show_bug.cgi?id=1227957
- https://bugzilla.suse.com/show_bug.cgi?id=1227968
- https://bugzilla.suse.com/show_bug.cgi?id=1227969
- https://bugzilla.suse.com/show_bug.cgi?id=1227975
- https://bugzilla.suse.com/show_bug.cgi?id=1227985
- https://bugzilla.suse.com/show_bug.cgi?id=1227989
- https://bugzilla.suse.com/show_bug.cgi?id=1228003
- https://bugzilla.suse.com/show_bug.cgi?id=1228005
- https://bugzilla.suse.com/show_bug.cgi?id=1228008
- https://bugzilla.suse.com/show_bug.cgi?id=1228013
- https://bugzilla.suse.com/show_bug.cgi?id=1228025
- https://bugzilla.suse.com/show_bug.cgi?id=1228030
- https://bugzilla.suse.com/show_bug.cgi?id=1228037
- https://bugzilla.suse.com/show_bug.cgi?id=1228045
- https://bugzilla.suse.com/show_bug.cgi?id=1228054
- https://bugzilla.suse.com/show_bug.cgi?id=1228055
- https://bugzilla.suse.com/show_bug.cgi?id=1228063
- https://bugzilla.suse.com/show_bug.cgi?id=1228071
- https://bugzilla.suse.com/show_bug.cgi?id=1228235
- https://bugzilla.suse.com/show_bug.cgi?id=1228237
- https://bugzilla.suse.com/show_bug.cgi?id=1228327
- https://bugzilla.suse.com/show_bug.cgi?id=1228328
- https://bugzilla.suse.com/show_bug.cgi?id=1228408
- https://bugzilla.suse.com/show_bug.cgi?id=1228409
- https://bugzilla.suse.com/show_bug.cgi?id=1228410
- https://bugzilla.suse.com/show_bug.cgi?id=1228470
- https://bugzilla.suse.com/show_bug.cgi?id=1228530
- https://bugzilla.suse.com/show_bug.cgi?id=1228561
- https://bugzilla.suse.com/show_bug.cgi?id=1228565
- https://bugzilla.suse.com/show_bug.cgi?id=1228567
- https://bugzilla.suse.com/show_bug.cgi?id=1228580
- https://bugzilla.suse.com/show_bug.cgi?id=1228581
- https://bugzilla.suse.com/show_bug.cgi?id=1228584
- https://bugzilla.suse.com/show_bug.cgi?id=1228588
- https://bugzilla.suse.com/show_bug.cgi?id=1228599
- https://bugzilla.suse.com/show_bug.cgi?id=1228617
- https://bugzilla.suse.com/show_bug.cgi?id=1228625
- https://bugzilla.suse.com/show_bug.cgi?id=1228626
- https://bugzilla.suse.com/show_bug.cgi?id=1228633
- https://bugzilla.suse.com/show_bug.cgi?id=1228640
- https://bugzilla.suse.com/show_bug.cgi?id=1228649
- https://bugzilla.suse.com/show_bug.cgi?id=1228655
- https://bugzilla.suse.com/show_bug.cgi?id=1228658
- https://bugzilla.suse.com/show_bug.cgi?id=1228662
- https://bugzilla.suse.com/show_bug.cgi?id=1228680
- https://bugzilla.suse.com/show_bug.cgi?id=1228705
- https://bugzilla.suse.com/show_bug.cgi?id=1228723
- https://bugzilla.suse.com/show_bug.cgi?id=1228726
- https://bugzilla.suse.com/show_bug.cgi?id=1228743
- https://bugzilla.suse.com/show_bug.cgi?id=1228850