|
Bugzilla – Full Text Bug Listing |
|
Description
Roger Whittaker
2024-02-28 14:16:11 UTC
Just for the record, the reporter mentioned in another channel that this does not only happen during installation itself. IIUC, the problem persist in the installed TW system if he manages to complete the installation. So it's likely a general problem of TW and not an installation issue. I've changed the subject to reflect this and changed the component to "Other". I don't see how this could possibly be a problem of YaST. Mouse cursor movement is as low-level as it can possibly get; on the level of the X server / X protocol. For a graphical installation, YaST uses the Qt libs in version 5.x, which in turn use their own abstraction layer, and xcb calls in the case of X11. Qt 5.x makes heavy use of pixel buffers, no longer low-level Xlib calls, for any graphics; but mouse handling is independent of that. I could understand if you say that graphics is choppy in your setup (which it in fact is for remote X) because Qt renders locally into pixel buffers and then transfers the whole pixel buffer from the client application to the X server, but mouse handling? Let's ask our X11 experts. Certainly it's not a problem with YaST, because it persists in the installed system. I came across this when testing agama, but it happens with the standard YaST install and in both cases the mouse pointer won't move after installation either. This was with the latest Tumbleweed (20240226). So I'm assuming you're running a VNC session/installation to access your VM. And noVNC is just a VNC client. Is this correct? Then please check with another VNC client, e.g. vncviewer (package tigervnc) it the issue is VNC client related. Thanks. I can't do this because I don't know how this BVCP thing works. It's a web application that spawns a browser window called a "VNC console" which is using noVNC. If I look at the system where BVCP is running I don't see an open VNC port, so I can't connect with another VNC viewer. # nmap 192.168.1.7 Starting Nmap 7.94 ( https://nmap.org ) at 2024-02-28 16:03 GMT Nmap scan report for tigerlily.disruptive.org.uk (192.168.1.7) Host is up (0.00019s latency). Not shown: 995 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 2049/tcp open nfs 8086/tcp open d-s-n MAC Address: 7C:D3:0A:36:33:C9 (Inventec) Nmap done: 1 IP address (1 host up) scanned in 6.28 seconds 8086 is the port where the management web page side of it is accessed. noVNC is a javascript VNC client that runs in a browser. Ok. Then I have no idea how to help here. Seems like a blackbox then. Maybe Joan has a better clue. Adding him... I've tried to reproduce this in an updated Tumbleweed and couldn't. What is the version of xorg-x11-Xvnc on your Tumbleweed image and what is the novnc version on that FreeBSD? (In reply to Roger Whittaker from comment #0) > When installing the latest Tumbleweed the mouse pointer in the noVNC window > does not move, nor does it move in a completed install. > > This problem does not exist with for example Leap 15.5. I think if with the same FreeBSD setup and connecting with Leap 15.5 (which has an older Xvnc) doesn't have the problem, the issue might be at our latest Xvnc... This is the 20240226 version of Tumbleweed which has xorg-x11-Xvnc-1.13.1-5.1.x86_64.rpm. noVNC is a javascript library running in the browser. The browser window has a pop-out settings panel that shows the version as 1.2.0. I started an installation of Leap 15.5 but did not complete it - during that installation the mouse pointer moved correctly. I also have a fully installed but not updated SLES 15 SP4 VM which has xorg-x11-Xvnc-1.10.1-150400.5.6.x86_64, and the mouse pointer moves correctly. I'd be happy to experiment with different Xvnc versions (for example a forced downgrade on Tumbleweed) if you can suggest what to try and where to get them. Some things we could check: 1. At the novnc menu settings, the "View Only" checkbox option is not set? 2. How is launched Xvnc? It has some parameters to disallow the mouse. i.e. sudo ps aux | grep Xvnc. 3. What logs novnc? At the browser window it spawns, can you access its console log? 4. What logs Xvnc? In the case of Yast installer it should be at /var/log/YaST2/vncserver.log One more test: the mouse pointer when installing the current 15.6 (Build604.1) does not move. In answer to comment#10 (looking at the installed Tumbleweed): 1. No, "View Only" is not set. 2. There is no Xvnc running in the Tumbleweed guest. localhost:~ # ps wuaxf | grep [X]vnc localhost:~ # localhost:~ # ps wuaxf | grep [X]org root 1204 2.4 0.8 908728 147092 tty2 Ssl+ 09:57 0:10 \_ /usr/bin/Xorg.bin -nolisten tcp -background none -seat seat0 vt2 -auth /run/sddm/xauth_YbMLnG -noreset -displayfd 16 3. In the "Settings -> Advanced" menu on noVNC, there is a choice of logging levels, but I've no idea how to access any logs. 4. For this I'll try starting and install again and see what happens. (In reply to Roger Whittaker from comment #12) > 2. There is no Xvnc running in the Tumbleweed guest. Hmm, I wonder how BVCP starts a vnc server on the guest. Maybe it could be x0vncserver, could you grep ps with "vnc". There is no process running with the string "vnc" in its name. Nor is there in the 15.6 installer. Listing of /var/log/ during the 15.6 installation: total 312 -rw-r--r-- 1 root root 43596 Feb 29 05:21 boot.msg lrwxrwxrwx 1 root root 30 Feb 29 05:21 chrony -> /mounts/mp_0001/var/log/chrony drwxr-xr-x 2 root root 4096 Feb 7 19:20 cups drwxr-xr-x 2 root root 4096 Dec 14 08:17 krb5 -rw-r--r-- 1 root root 25968 Feb 29 05:21 linuxrc.log -rw-r--r-- 1 root root 72850 Feb 29 05:23 messages -rw------- 1 root root 64462 Feb 29 05:22 plymouth-debug.log -rw------- 1 root root 32000 Feb 7 19:20 tallylog -rw-r--r-- 1 root root 146 Feb 29 05:18 udev.log -rw-r--r-- 1 root root 1367 Feb 29 05:23 warn -rw-r--r-- 1 root root 17826 Feb 29 05:21 wickedd.log -rw-r----- 1 root root 40 Feb 29 05:18 wpa_supplicant.log -rw-r--r-- 1 root root 14363 Feb 29 05:24 Xorg.0.log drwxr-xr-x 3 root root 4096 Feb 29 05:23 YaST2 drwxr-xr-x 2 root root 4096 Feb 29 05:23 zypp Created attachment 873115 [details]
Xorg.0.log
/var/log/Xorg.0.log from 15.6 installation after the graphical installer has started
Thanks for those logs. I can see there that your SP6 uses Xorg 21.1.4 version while Tumbleweed uses 21.1.11. So if both have this mouse issue, it looks like it is not related with Xorg. Hmm, interesting, this Xorg logs: > [ 349.952] (II) event3 - Power Button: device removed > [ 349.977] (II) event0 - AT Translated Set 2 keyboard: device removed > [ 350.001] (II) event1 - PS/2 Generic Mouse: device removed Maybe it's a regression with libinput. SP6 and Tumbleweed have 1.25 version and SP5 has 1.21 version. Could you test with the 1.21 version? Here I made a package with that version: https://build.opensuse.org/package/show/home:jtorres:branches:X11:XOrg:tigervnc-test/libinput These are currently showing as not being published: "Build finished but repository publishing is disabled". On 15.6 I force downgraded these packages to the 15.5 versions: libinput-udev-1.21.0-150500.1.2 libinput10-1.21.0-150500.1.2 xf86-input-libinput-1.2.1-150500.1.2 But the problem remains. And still remains after downgrading to xorg-x11-server-21.1.4-150500.5.1.x86_64.rpm I also downgraded to xf86-input-vmmouse-13.1.0-bp155.3.11.x86_64.rpm 15.6 has the same version of xf86-input-evdev as 15.5: xf86-input-evdev-2.10.6-150500.15.2.x86_64.rpm I see this in /var/log/Xorg.0.log [ 33.965] (II) config/udev: Adding input device PS/2 Generic Mouse (/dev/input/event1) [ 33.965] (**) PS/2 Generic Mouse: Applying InputClass "evdev pointer catchall" [ 33.965] (**) PS/2 Generic Mouse: Applying InputClass "libinput pointer catchall" [ 33.966] (II) Using input driver 'libinput' for 'PS/2 Generic Mouse' [ 33.966] (**) PS/2 Generic Mouse: always reports core events [ 33.966] (**) Option "Device" "/dev/input/event1" [ 33.973] (II) event1 - PS/2 Generic Mouse: is tagged by udev as: Mouse [ 33.974] (II) event1 - PS/2 Generic Mouse: device is a pointer [ 33.975] (II) event1 - PS/2 Generic Mouse: device removed [ 33.984] (**) Option "config_info" "udev:/sys/devices/platform/i8042/serio1/input/input2/event1" [ 33.984] (II) XINPUT: Adding extended input device "PS/2 Generic Mouse" (type: MOUSE, id 8) [ 33.985] (**) Option "AccelerationScheme" "none" [ 33.985] (**) PS/2 Generic Mouse: (accel) selected scheme none/0 [ 33.985] (**) PS/2 Generic Mouse: (accel) acceleration factor: 2.000 [ 33.985] (**) PS/2 Generic Mouse: (accel) acceleration threshold: 4 [ 33.991] (II) event1 - PS/2 Generic Mouse: is tagged by udev as: Mouse [ 33.992] (II) event1 - PS/2 Generic Mouse: device is a pointer [ 33.998] (II) config/udev: Adding input device PS/2 Generic Mouse (/dev/input/mouse0) [ 33.998] (II) No input driver specified, ignoring this device. [ 33.998] (II) This device may have been added with another device file. [ 34.000] (II) config/udev: Adding input device PC Speaker (/dev/input/event3) [ 34.000] (II) No input driver specified, ignoring this device. [ 34.000] (II) This device may have been added with another device file. I have now replaced packages with those from https://download.opensuse.org/repositories/home:/jtorres:/branches:/X11:/XOrg:/tigervnc-test/openSUSE_Leap_15.6/x86_64/ but I still see the same behaviour. Now I have installed the kernel 5.14.21-150500.53-default from 15.5, booted into that, and now the mouse pointer moves.... So it's a kernel thing. It looks like something is happening with the PS/2 mouse and keyboard. They are being removed somehow? If it's a kernel regression, please give the dmesg outputs from both working and non-working caess. Also the outputs of hwinfo, too. You can try other older kernels found in my OBS repos, e.g. home:tiwai:kernel:5.15, home:tiwai:kernel:5.16, ... home:tiwai:kernel:6.6, and figure out which kernel version started failing. It'll be helpful to narrow down the regression range. Created attachment 873131 [details]
hwinfo
Created attachment 873132 [details]
dmesg.5.14.21-150500.53-default
Created attachment 873133 [details]
dmesg.6.4.0-150600.5-default
Could you give the hwinfo from the non-working case, too? Created attachment 873134 [details]
hwinfo.6.4.0-150600.5-default
In answer to comment#25 I find that I can't install the the 5.19 or 6.2 kernels from https://download.opensuse.org/repositories/home:/tiwai:/kernel:/ I see errors like Problem: the to be installed kernel-default-5.19.12-1.1.g95fa5b8.x86_64 conflicts with 'filesystem < 16' provided by the installed filesystem-15.0-11.8.1.x86_64 If I download the kernel and install with rpm --oldpackage --force --nodeps it fails with warning: %post(kernel-default-6.2.12-1.1.geb3255d.x86_64) scriptlet failed, exit status 1 and I find that there's no kernel or initrd in /boot, only broken symlinks. If you're installing on SLE/Leap, take the packages from "backport" instead of "standard" in my OBS home:tiwai:kernel:*. Let's assign to kernel component. 5.19.12-lp153.1.g95fa5b8-default: mouse pointer moves 6.2.12-lp154.1.geb3255d-default: mouse pointer moves 6.3.9-lp154.1.g0df701d-default: mouse pointer moves 6.4.12-lp154.1.gf5aa89b-default: mouse pointer moves BUT:... 6.4.0-150600.5-default: mouse pointer does not move And as mentioned before: 6.7.6-1-default: mouse pointer does not move I hope this helps. Installing the last (Tumbleweed) kernel has probably messed up the system because it forced the usr-merge thing. But I can rebuild it and test > 6.4 from your repositories if it helps. (In reply to Roger Whittaker from comment #40) > Installing the last (Tumbleweed) kernel has probably messed up the system > because it forced the usr-merge thing. Ah, that's bad. You should have installed the kernel from OBS Kernel:stable:Backport repo instead, which was built for SLE/Leap. > But I can rebuild it and test > 6.4 > from your repositories if it helps. Yes, please check which upstream kernel started breaking. It's already good to know that SLE15-SP6/Leap kernel breaks, but it has way too many (over 19000!) changes since the upstream 6.4 code. This is a wild guess based on no knowledge of how the code works, but I was wondering if the change has anything to do with the references to psmouse_from_serio which I see in drivers/input/mouse/psmouse.* in 6.7.6-1 but not in 5.14.21-150500.55.49. Also, I was wondering if there's a convenient place to find all the historic Tumbleweed kernels so that I could bisect by downgrading the kernel on a Tumbleweed VM? (In reply to Roger Whittaker from comment #42) > This is a wild guess based on no knowledge of how the code works, but I was > wondering if the change has anything to do with the references to > psmouse_from_serio which I see in drivers/input/mouse/psmouse.* in 6.7.6-1 > but not in 5.14.21-150500.55.49. Which commit (or changelog entry) are you referring to? > Also, I was wondering if there's a convenient place to find all the historic > Tumbleweed kernels so that I could bisect by downgrading the kernel on a > Tumbleweed VM? TW history repo contains the old packages for a few weeks http://download.opensuse.org/history/ But it's for TW, i.e. with user-merge. 6.5.9-lp155.1.g1823166-default: mouse pointer does *not* move. So the change is between 6.4.12-lp154.1.gf5aa89b-default and 6.5.9-lp155.1.g1823166-default in the kernels in https://download.opensuse.org/repositories/home:/tiwai:/kernel:/ OK, thanks.
Given that the breakage was seen on SLE15-SP6 branch, too, a suspected commit is
e2cb5cc822b6c9ee72c56ce1d81671b22c05406a
Input: psmouse - fix fast_reconnect function for PS/2 mode
I'm build test kernels with the revert of the patch.
For SLE15-SP6/Leap 15.6, it's being built in OBS home:tiwai:bsc1220569-sle15-sp6 repo.
For 6.7.x Tumbleweed, it's being built in OBS home:tiwai:bsc1220569-stable repo.
This will contain both for TW ("standard") and SLE/Leap installation ("backport").
Please give it a try later.
SP6 with 6.4.0-150600.1.g2fbacfa-default from https://download.opensuse.org/repositories/home:/tiwai:/bsc1220569-sle15-sp6/pool/ Mouse pointer does *not* move... Hmm, that's tough. As this doesn't appear to be any logged error, it's hardly recognizable from the kernel messages, too. OK, then let's concentrate on SLE15-SP6 development and try to narrow down the range there. We have old SP6 kernels in kerncvs KOTD archive. https://kerncvs.suse.de/kernel-overview/?b=SLE15-SP6;a=kotd;p=sle15-sp6 For example, try this one on Aug 24, 2023: https://kerncvs.suse.de/kerneltest/suse/28f1b80/ The version is 6.4.12, and this should still work. OTOH, the one almost corresponding to the version you tested 6.4.0-150600.5 is on Jan 25, 2024: https://kerncvs.suse.de/kerneltest/suse/55022e2/ This should be broken. If the former works and the latter broken, you can try to bisect the package builds between them, as found in the KOTD archive list above. I've installed both kernel-default-6.4.12-150600.3.1.g28f1b80.x86_64 and kernel-default-6.4.11-150600.4.1.g79fa783.x86_64 from the location you mentioned, but both of them fail to boot, hanging at "Loading initial ramdisk ..." - I'm not sure why this would be as the initrd seems to have been created correctly for each and is a sensible size. 6.4.0-150600.26.gf468b74-default from https://kerncvs.suse.de/kerneltest/suse/f468b74/ (28 Sep 2023) boots but mouse pointer does not move. 6.4.12-150600.17.g045364c-default (29 Aug 2023): mouse pointer moves. 6.4.14-150600.7.g79dfe00-default (5 Sep 2023): mouse pointer moves. 6.4.0-150600.33.geb0b8b0-default (7 Oct 2023): mouse pointer does not move. 6.4.0-150600.4.g3c5d96c-default (15 Sep 2023): mouse pointer does not move. 6.4.15-150600.10.g02c4a14-default (11 Sep 2023): mouse pointer does not move. 6.4.15-150600.9.g83dedd5-default (9 Sep 2023): mouse pointer does not move. 6.4.15-150600.6.ge3cf1f9-default (7 Sep 2023): mouse pointer does not move. 6.4.14-150600.15.gf11caa7-default (6 Sep 2023): mouse pointer does not move. So between 6.4.14-150600.7.g79dfe00-default (5 Sep 2023) and 6.4.14-150600.15.gf11caa7-default (6 Sep 2023) 6.4.14-150600.12.g7e8d545-default (6 Sep 2023 15:30) mouse pointer moves. 6.4.14-150600.13.g1247cee-default (6 Sep 2023 18:30) mouse pointer does not move. So the change would seem to be between these two: 7e8d545 Wed Sep 6 15:30:32 2023 kernel-default-6.4.14-150600.12.1.g7e8d545.x86_64.rpm 1247cee Wed Sep 6 18:30:04 2023 kernel-default-6.4.14-150600.13.1.g1247cee.x86_64.rpm (Sorry for using bugzilla as my notebook...But I hope this has narrowed it down successfully.) (In reply to Roger Whittaker from comment #60) > So the change would seem to be between these two: > > 7e8d545 Wed Sep 6 15:30:32 2023 > kernel-default-6.4.14-150600.12.1.g7e8d545.x86_64.rpm > > 1247cee Wed Sep 6 18:30:04 2023 > kernel-default-6.4.14-150600.13.1.g1247cee.x86_64.rpm Thanks! This is really helpful, and the result is interesting. % git log --pretty=oneline 7e8d545..1247cee 1247ceec5c8e6d9fad9399c9c28b682767860ff6 Merge branch 'users/msuchanek/SLE15-SP6/for-next' into SLE15-SP6 d6762837a96bddd1fab0d5a592f7fa70cf26e051 Merge branch 'users/oneukum/SLE15-SP6/for-next' into SLE15-SP6 30a3314eef40dc4c00ae7e7445c27f7360b3190e update patch metadata 7c7578cc66b26e803969049de50119982e379316 thunderbolt: dma_test: Update MODULE_DESCRIPTION (jsc#PED-6061). 036b91f3046d0112cd69b0f3e8163d292449cc4b thunderbolt: Add MODULE_DESCRIPTION (jsc#PED-6061). 4cd9a389739cce900f92996e5f803e58880424b6 thunderbolt: Allow specifying custom credits for DMA tunnels (jsc#PED-6061). 905721871f7052e6dd5566d7726419dafd7ff1f1 thunderbolt: Check for ring 0 in tb_tunnel_alloc_dma() (jsc#PED-6061). 898ed7a0cf2d3fc44df8c57939b737e11a963c88 USB: core: Fix oversight in SuperSpeed initialization (bsc#1213123 CVE-2023-37453). a10e1a729ef1f964d97b27521233e89098fbe8fb USB: core: Fix race by not overwriting udev->descriptor in hub_port_init() (bsc#1213123 CVE-2023-37453). 0cbb8bf1b95a4afa4cfca31c885c9a82b6288c51 USB: core: Change usb_get_device_descriptor() API (bsc#1213123 CVE-2023-37453). 2d3dfbdbbfce8981b7e21a87c3f6b8a1a566179a USB: core: Unite old scheme and new scheme descriptor reads (bsc#1213123 CVE-2023-37453). So mainly only USB and Thunderbolt changes between those commits. And, I believe that the misleading thing was that it looks as if a mouse. But I believe it must be rather the device "BHYVE HID Tablet" that appears for the working case and disappears for the broken case. Check the both 6.4.* kernels you tested above; the working case should have BHYVE HID tablet while the broken one shouldn't. If my guess is right, it explains why the commits above may break. It's a (virtual) USB input device, after all. Also, Roger, could you give lsusb -v output? Yes: $ grep "BHYVE HID" dmesg.6.4.14-150600.12.g7e8d545-default [ 8.749490] input: BHYVE HID Tablet as /devices/pci0000:00/0000:00:1e.0/usb2/2-1/2-1:1.0/0003:FB5D:0001.0001/input/input3 [ 8.749841] hid-generic 0003:FB5D:0001.0001: input,hidraw0: USB HID v10.01 Mouse [BHYVE HID Tablet] on usb-0000:00:1e.0-1/input0 $ grep "BHYVE HID" dmesg.6.4.14-150600.13.g1247cee-default [no output] Created attachment 873178 [details]
dmesg.6.4.14-150600.12.g7e8d545-default
Created attachment 873179 [details]
dmesg.6.4.14-150600.13.g1247cee-default
Created attachment 873180 [details]
lsusb-v.6.4.14-150600.12.g7e8d545-default
Created attachment 873181 [details]
lsusb-v.6.4.14-150600.13.g1247cee-default
Thanks. Through a quick glance, the problem seems to be the device setting 8 to bMaxPacketSize0 while it's in super speed. For super speed, it should be a logarithmic value and that doesn't match with the endpoint. The patch patches.suse/USB-core-Fix-oversight-in-SuperSpeed-initialization.patch (the upstream commit 59cf445754566984fd55af19ba7146c76e6627bc) introduced a more strict check for the ep0 maxpacket size. Tossing to Oliver, as this is a USB core issue. I'm building a test kernel with a potential workaround patch. It's being built in OBS home:tiwai:bsc1220569-2 repo. Could you give it a try later, and attach the dmesg output? Created attachment 873185 [details]
Test patch
6.4.0-150600.1.g3905d67-default from https://download.opensuse.org/repositories/home:/tiwai:/bsc1220569-2/pool/ Mouse pointer does not move. Created attachment 873186 [details]
dmesg.6.4.0-150600.1.g3905d67-default
Ah I misunderstood the behavior. It's still the initial value 512 that didn't match with the descriptor value 8 (i.e. 256). I'm binding another test kernel in OBS home:tiwai:bsc1220569-3 repo. Could you retry later? Created attachment 873187 [details]
Revised test patch
Created attachment 873188 [details]
Revised test patch
6.4.0-150600.2.g8e5d5a9-default from https://download.opensuse.org/repositories/home:/tiwai:/bsc1220569-3/pool/ Mouse pointer moves. Created attachment 873189 [details]
dmesg.6.4.0-150600.2.g8e5d5a9-default
Created attachment 873190 [details]
lsusb-v.6.4.0-150600.2.g8e5d5a9-default
It looks like this is solved - thanks very much - is the fix final and will it go into future kernels? (In reply to Roger Whittaker from comment #80) > It looks like this is solved - thanks very much - is the fix final and will > it go into future kernels? Err, no, it's not fixed yet at all. The kernel I provided only for a test patch, and maybe it's not correct. Oliver, could you move this issue to the USB upstream? It's a recent upstream regression, after all. (see comment 62 and comment 69, the USB core change caused it.) Oliver? This is an upstream USB core regression. Just for the record, I tested SLES 15 SP6 RC1 to see whether the remote administration over web using noVNC would work: "Allow Remote Administration With Session Management" "Enable access using a web browser" In the remote web session on port 5801 the mouse pointed *does* move correctly. 6.4.0-150600.10-default We're still waiting for the proper upstream fix: https://lore.kernel.org/r/9efbd569-7059-4575-983f-0ea30df41871@suse.com I'm building a newer test kernel with Alan's latest patch in OBS home:tiwai:bsc1220569-4 repo. Could you try it later and confirm whether it still works or not? Successful test. I installed SLES 15 SP6 RC1. During and after the install the mouse pointer did not move. After installing and rebooting into your kernel-default-6.4.0-150600.1.1.gb538367.x86_64.rpm the mouse pointer does move. (In reply to Roger Whittaker from comment #85) > Successful test. > > I installed SLES 15 SP6 RC1. During and after the install the mouse pointer > did not move. > > After installing and rebooting into your > > kernel-default-6.4.0-150600.1.1.gb538367.x86_64.rpm > > the mouse pointer does move. Good to hear! Now we are slowly moving forward for the upstream resolution. Are you OK with the following entries to be included in the upstream patch? Reported-and-tested-by: Roger Whittaker <roger.whittaker@suse.com> Link: https://bugzilla.suse.com/show_bug.cgi?id=1220569 Thank you. That would be fine. The upstream fix patch was submitted: https://lore.kernel.org/r/4058ac05-237c-4db4-9ecc-5af42bdb4501@rowland.harvard.edu Now I backported the fix to SLE15-SP6 and stable branches. SUSE-SU-2024:1644-1: An update that solves 190 vulnerabilities, contains one feature and has 41 security fixes can now be installed. Category: security (important) Bug References: 1141539, 1190576, 1192145, 1192837, 1193629, 1196869, 1200313, 1201308, 1201489, 1203906, 1203935, 1204614, 1207361, 1211592, 1213573, 1217339, 1217408, 1218562, 1218917, 1219104, 1219126, 1219141, 1219169, 1219170, 1219264, 1220342, 1220569, 1220761, 1221042, 1221044, 1221080, 1221084, 1221088, 1221299, 1221612, 1221617, 1221645, 1221825, 1222294, 1222307, 1222357, 1222368, 1222379, 1222385, 1222424, 1222430, 1222435, 1222482, 1222559, 1222585, 1222613, 1222615, 1222618, 1222624, 1222666, 1222669, 1222671, 1222703, 1222704, 1222709, 1222710, 1222721, 1222726, 1222773, 1222776, 1222785, 1222787, 1222790, 1222791, 1222792, 1222793, 1222796, 1222812, 1222824, 1222829, 1222832, 1222836, 1222838, 1222866, 1222867, 1222869, 1222870, 1222876, 1222878, 1222879, 1222881, 1222883, 1222888, 1222894, 1222901, 1222968, 1222976, 1223012, 1223014, 1223016, 1223024, 1223033, 1223034, 1223035, 1223036, 1223037, 1223041, 1223042, 1223051, 1223052, 1223056, 1223057, 1223058, 1223060, 1223061, 1223065, 1223066, 1223076, 1223078, 1223111, 1223115, 1223118, 1223119, 1223140, 1223187, 1223189, 1223190, 1223191, 1223196, 1223197, 1223198, 1223207, 1223275, 1223323, 1223360, 1223369, 1223380, 1223432, 1223473, 1223474, 1223475, 1223477, 1223478, 1223479, 1223481, 1223482, 1223484, 1223487, 1223490, 1223496, 1223498, 1223499, 1223501, 1223502, 1223503, 1223505, 1223509, 1223511, 1223512, 1223513, 1223516, 1223517, 1223518, 1223519, 1223520, 1223522, 1223523, 1223525, 1223536, 1223539, 1223574, 1223595, 1223598, 1223628, 1223634, 1223640, 1223643, 1223644, 1223645, 1223646, 1223648, 1223655, 1223657, 1223660, 1223661, 1223663, 1223664, 1223668, 1223670, 1223679, 1223686, 1223693, 1223705, 1223714, 1223735, 1223738, 1223745, 1223784, 1223785, 1223790, 1223816, 1223821, 1223822, 1223823, 1223824, 1223827, 1223834, 1223858, 1223875, 1223876, 1223877, 1223878, 1223879, 1223894, 1223921, 1223922, 1223923, 1223924, 1223929, 1223931, 1223932, 1223934, 1223941, 1223948, 1223949, 1223950, 1223951, 1223952, 1223953, 1223956, 1223957, 1223960, 1223962, 1223963, 1223964, 1223996 CVE References: CVE-2021-47047, CVE-2021-47184, CVE-2021-47185, CVE-2021-47187, CVE-2021-47188, CVE-2021-47191, CVE-2021-47192, CVE-2021-47193, CVE-2021-47194, CVE-2021-47195, CVE-2021-47196, CVE-2021-47197, CVE-2021-47198, CVE-2021-47199, CVE-2021-47200, CVE-2021-47201, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47206, CVE-2021-47207, CVE-2021-47209, CVE-2021-47210, CVE-2021-47211, CVE-2021-47212, CVE-2021-47214, CVE-2021-47215, CVE-2021-47216, CVE-2021-47217, CVE-2021-47218, CVE-2021-47219, CVE-2022-48631, CVE-2022-48632, CVE-2022-48634, CVE-2022-48636, CVE-2022-48637, CVE-2022-48638, CVE-2022-48639, CVE-2022-48640, CVE-2022-48642, CVE-2022-48644, CVE-2022-48646, CVE-2022-48647, CVE-2022-48648, CVE-2022-48650, CVE-2022-48651, CVE-2022-48652, CVE-2022-48653, CVE-2022-48654, CVE-2022-48655, CVE-2022-48656, CVE-2022-48657, CVE-2022-48658, CVE-2022-48659, CVE-2022-48660, CVE-2022-48662, CVE-2022-48663, CVE-2022-48667, CVE-2022-48668, CVE-2022-48671, CVE-2022-48672, CVE-2022-48673, CVE-2022-48675, CVE-2022-48686, CVE-2022-48687, CVE-2022-48688, CVE-2022-48690, CVE-2022-48692, CVE-2022-48693, CVE-2022-48694, CVE-2022-48695, CVE-2022-48697, CVE-2022-48698, CVE-2022-48699, CVE-2022-48700, CVE-2022-48701, CVE-2022-48702, CVE-2022-48703, CVE-2022-48704, CVE-2023-2860, CVE-2023-52585, CVE-2023-52589, CVE-2023-52590, CVE-2023-52591, CVE-2023-52593, CVE-2023-52614, CVE-2023-52616, CVE-2023-52620, CVE-2023-52635, CVE-2023-52645, CVE-2023-52646, CVE-2023-52652, CVE-2023-6270, CVE-2024-0639, CVE-2024-0841, CVE-2024-2201, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-23850, CVE-2024-26601, CVE-2024-26610, CVE-2024-26656, CVE-2024-26671, CVE-2024-26673, CVE-2024-26675, CVE-2024-26679, CVE-2024-26687, CVE-2024-26688, CVE-2024-26700, CVE-2024-26702, CVE-2024-26733, CVE-2024-26739, CVE-2024-26764, CVE-2024-26766, CVE-2024-26772, CVE-2024-26773, CVE-2024-26783, CVE-2024-26791, CVE-2024-26792, CVE-2024-26816, CVE-2024-26817, CVE-2024-26820, CVE-2024-26825, CVE-2024-26830, CVE-2024-26833, CVE-2024-26836, CVE-2024-26840, CVE-2024-26843, CVE-2024-26852, CVE-2024-26853, CVE-2024-26855, CVE-2024-26856, CVE-2024-26857, CVE-2024-26861, CVE-2024-26862, CVE-2024-26866, CVE-2024-26872, CVE-2024-26875, CVE-2024-26876, CVE-2024-26877, CVE-2024-26878, CVE-2024-26879, CVE-2024-26881, CVE-2024-26882, CVE-2024-26883, CVE-2024-26884, CVE-2024-26885, CVE-2024-26891, CVE-2024-26893, CVE-2024-26895, CVE-2024-26896, CVE-2024-26897, CVE-2024-26898, CVE-2024-26901, CVE-2024-26903, CVE-2024-26915, CVE-2024-26917, CVE-2024-26927, CVE-2024-26933, CVE-2024-26939, CVE-2024-26948, CVE-2024-26950, CVE-2024-26951, CVE-2024-26955, CVE-2024-26956, CVE-2024-26960, CVE-2024-26965, CVE-2024-26966, CVE-2024-26969, CVE-2024-26970, CVE-2024-26972, CVE-2024-26979, CVE-2024-26981, CVE-2024-26982, CVE-2024-26993, CVE-2024-27013, CVE-2024-27014, CVE-2024-27030, CVE-2024-27038, CVE-2024-27039, CVE-2024-27041, CVE-2024-27042, CVE-2024-27043, CVE-2024-27046, CVE-2024-27056, CVE-2024-27059, CVE-2024-27062, CVE-2024-27389 Jira References: PED-7167 Maintenance Incident: [SUSE:Maintenance:33802](https://smelt.suse.de/incident/33802/) Sources used: openSUSE Leap 15.5 (src): kernel-source-azure-5.14.21-150500.33.51.1, kernel-syms-azure-5.14.21-150500.33.51.1 Public Cloud Module 15-SP5 (src): kernel-source-azure-5.14.21-150500.33.51.1, kernel-syms-azure-5.14.21-150500.33.51.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2024:1659-1: An update that solves 218 vulnerabilities, contains two features and has 29 security fixes can now be installed. Category: security (important) Bug References: 1177529, 1192145, 1211592, 1217408, 1218562, 1218917, 1219104, 1219126, 1219169, 1219170, 1219264, 1220342, 1220569, 1220761, 1220901, 1220915, 1220935, 1221042, 1221044, 1221080, 1221084, 1221088, 1221162, 1221299, 1221612, 1221617, 1221645, 1221791, 1221825, 1222011, 1222051, 1222247, 1222266, 1222294, 1222307, 1222357, 1222368, 1222379, 1222416, 1222422, 1222424, 1222427, 1222428, 1222430, 1222431, 1222435, 1222437, 1222445, 1222449, 1222482, 1222503, 1222520, 1222536, 1222549, 1222550, 1222557, 1222559, 1222585, 1222586, 1222596, 1222609, 1222610, 1222613, 1222615, 1222618, 1222624, 1222630, 1222632, 1222660, 1222662, 1222664, 1222666, 1222669, 1222671, 1222677, 1222678, 1222680, 1222703, 1222704, 1222706, 1222709, 1222710, 1222720, 1222721, 1222724, 1222726, 1222727, 1222764, 1222772, 1222773, 1222776, 1222781, 1222784, 1222785, 1222787, 1222790, 1222791, 1222792, 1222796, 1222798, 1222801, 1222812, 1222824, 1222829, 1222832, 1222836, 1222838, 1222866, 1222867, 1222869, 1222876, 1222878, 1222879, 1222881, 1222883, 1222888, 1222894, 1222901, 1222968, 1223012, 1223014, 1223016, 1223024, 1223030, 1223033, 1223034, 1223035, 1223036, 1223037, 1223041, 1223042, 1223051, 1223052, 1223056, 1223057, 1223058, 1223060, 1223061, 1223065, 1223066, 1223067, 1223068, 1223076, 1223078, 1223111, 1223115, 1223118, 1223187, 1223189, 1223190, 1223191, 1223196, 1223197, 1223198, 1223275, 1223323, 1223369, 1223380, 1223473, 1223474, 1223475, 1223477, 1223478, 1223479, 1223481, 1223482, 1223484, 1223487, 1223490, 1223496, 1223498, 1223499, 1223501, 1223502, 1223503, 1223505, 1223509, 1223511, 1223512, 1223513, 1223516, 1223517, 1223518, 1223519, 1223520, 1223522, 1223523, 1223525, 1223539, 1223574, 1223595, 1223598, 1223634, 1223643, 1223644, 1223645, 1223646, 1223648, 1223655, 1223657, 1223660, 1223661, 1223663, 1223664, 1223668, 1223686, 1223693, 1223705, 1223714, 1223735, 1223745, 1223784, 1223785, 1223790, 1223816, 1223821, 1223822, 1223824, 1223827, 1223834, 1223875, 1223876, 1223877, 1223878, 1223879, 1223894, 1223921, 1223922, 1223923, 1223924, 1223929, 1223931, 1223932, 1223934, 1223941, 1223948, 1223949, 1223950, 1223951, 1223952, 1223953, 1223956, 1223957, 1223960, 1223962, 1223963, 1223964 CVE References: CVE-2021-47047, CVE-2021-47181, CVE-2021-47182, CVE-2021-47183, CVE-2021-47184, CVE-2021-47185, CVE-2021-47187, CVE-2021-47188, CVE-2021-47189, CVE-2021-47191, CVE-2021-47192, CVE-2021-47193, CVE-2021-47194, CVE-2021-47195, CVE-2021-47196, CVE-2021-47197, CVE-2021-47198, CVE-2021-47199, CVE-2021-47200, CVE-2021-47201, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47206, CVE-2021-47207, CVE-2021-47209, CVE-2021-47210, CVE-2021-47211, CVE-2021-47212, CVE-2021-47214, CVE-2021-47215, CVE-2021-47216, CVE-2021-47217, CVE-2021-47218, CVE-2021-47219, CVE-2022-48631, CVE-2022-48632, CVE-2022-48634, CVE-2022-48636, CVE-2022-48637, CVE-2022-48638, CVE-2022-48639, CVE-2022-48640, CVE-2022-48642, CVE-2022-48644, CVE-2022-48646, CVE-2022-48647, CVE-2022-48648, CVE-2022-48650, CVE-2022-48651, CVE-2022-48652, CVE-2022-48653, CVE-2022-48654, CVE-2022-48655, CVE-2022-48656, CVE-2022-48657, CVE-2022-48658, CVE-2022-48659, CVE-2022-48660, CVE-2022-48662, CVE-2022-48663, CVE-2022-48667, CVE-2022-48668, CVE-2022-48671, CVE-2022-48672, CVE-2022-48673, CVE-2022-48675, CVE-2022-48686, CVE-2022-48687, CVE-2022-48688, CVE-2022-48690, CVE-2022-48692, CVE-2022-48693, CVE-2022-48694, CVE-2022-48695, CVE-2022-48697, CVE-2022-48698, CVE-2022-48700, CVE-2022-48701, CVE-2022-48702, CVE-2022-48703, CVE-2022-48704, CVE-2023-2860, CVE-2023-52488, CVE-2023-52503, CVE-2023-52561, CVE-2023-52585, CVE-2023-52589, CVE-2023-52590, CVE-2023-52591, CVE-2023-52593, CVE-2023-52614, CVE-2023-52616, CVE-2023-52620, CVE-2023-52627, CVE-2023-52635, CVE-2023-52636, CVE-2023-52645, CVE-2023-52652, CVE-2023-6270, CVE-2024-0639, CVE-2024-0841, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-23850, CVE-2024-26601, CVE-2024-26610, CVE-2024-26656, CVE-2024-26660, CVE-2024-26671, CVE-2024-26673, CVE-2024-26675, CVE-2024-26680, CVE-2024-26681, CVE-2024-26684, CVE-2024-26685, CVE-2024-26687, CVE-2024-26688, CVE-2024-26689, CVE-2024-26696, CVE-2024-26697, CVE-2024-26702, CVE-2024-26704, CVE-2024-26718, CVE-2024-26722, CVE-2024-26727, CVE-2024-26733, CVE-2024-26736, CVE-2024-26737, CVE-2024-26739, CVE-2024-26743, CVE-2024-26744, CVE-2024-26745, CVE-2024-26747, CVE-2024-26749, CVE-2024-26751, CVE-2024-26754, CVE-2024-26760, CVE-2024-26763, CVE-2024-26764, CVE-2024-26766, CVE-2024-26769, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26776, CVE-2024-26779, CVE-2024-26783, CVE-2024-26787, CVE-2024-26790, CVE-2024-26792, CVE-2024-26793, CVE-2024-26798, CVE-2024-26805, CVE-2024-26807, CVE-2024-26816, CVE-2024-26817, CVE-2024-26820, CVE-2024-26825, CVE-2024-26830, CVE-2024-26833, CVE-2024-26836, CVE-2024-26843, CVE-2024-26848, CVE-2024-26852, CVE-2024-26853, CVE-2024-26855, CVE-2024-26856, CVE-2024-26857, CVE-2024-26861, CVE-2024-26862, CVE-2024-26866, CVE-2024-26872, CVE-2024-26875, CVE-2024-26878, CVE-2024-26879, CVE-2024-26881, CVE-2024-26882, CVE-2024-26883, CVE-2024-26884, CVE-2024-26885, CVE-2024-26891, CVE-2024-26893, CVE-2024-26895, CVE-2024-26896, CVE-2024-26897, CVE-2024-26898, CVE-2024-26901, CVE-2024-26903, CVE-2024-26917, CVE-2024-26927, CVE-2024-26948, CVE-2024-26950, CVE-2024-26951, CVE-2024-26955, CVE-2024-26956, CVE-2024-26960, CVE-2024-26965, CVE-2024-26966, CVE-2024-26969, CVE-2024-26970, CVE-2024-26972, CVE-2024-26981, CVE-2024-26982, CVE-2024-26993, CVE-2024-27013, CVE-2024-27014, CVE-2024-27030, CVE-2024-27038, CVE-2024-27039, CVE-2024-27041, CVE-2024-27043, CVE-2024-27046, CVE-2024-27056, CVE-2024-27062, CVE-2024-27389 Jira References: PED-7167, PED-7619 Maintenance Incident: [SUSE:Maintenance:33750](https://smelt.suse.de/incident/33750/) Sources used: openSUSE Leap 15.5 (src): kernel-obs-build-5.14.21-150500.55.62.2, kernel-livepatch-SLE15-SP5_Update_13-1-150500.11.3.2, kernel-source-5.14.21-150500.55.62.2, kernel-obs-qa-5.14.21-150500.55.62.1, kernel-syms-5.14.21-150500.55.62.1, kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 SUSE Linux Enterprise Micro 5.5 (src): kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 Basesystem Module 15-SP5 (src): kernel-source-5.14.21-150500.55.62.2, kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 Development Tools Module 15-SP5 (src): kernel-obs-build-5.14.21-150500.55.62.2, kernel-syms-5.14.21-150500.55.62.1, kernel-source-5.14.21-150500.55.62.2 SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5_Update_13-1-150500.11.3.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2024:1663-1: An update that solves 219 vulnerabilities, contains 20 features and has 45 security fixes can now be installed. Category: security (important) Bug References: 1141539, 1177529, 1190576, 1192145, 1192837, 1193629, 1196869, 1200313, 1201308, 1201489, 1203906, 1203935, 1204614, 1207361, 1211592, 1213573, 1217408, 1218562, 1218917, 1219104, 1219126, 1219141, 1219169, 1219170, 1219264, 1220342, 1220492, 1220569, 1220761, 1220901, 1220915, 1220935, 1221042, 1221044, 1221080, 1221084, 1221088, 1221162, 1221299, 1221612, 1221617, 1221645, 1221791, 1221825, 1222011, 1222051, 1222247, 1222266, 1222294, 1222307, 1222357, 1222368, 1222379, 1222416, 1222422, 1222424, 1222427, 1222428, 1222430, 1222431, 1222435, 1222437, 1222445, 1222449, 1222482, 1222503, 1222520, 1222536, 1222549, 1222550, 1222557, 1222559, 1222585, 1222586, 1222596, 1222609, 1222610, 1222613, 1222615, 1222618, 1222624, 1222630, 1222632, 1222660, 1222662, 1222664, 1222666, 1222669, 1222671, 1222677, 1222678, 1222680, 1222703, 1222704, 1222706, 1222709, 1222710, 1222720, 1222721, 1222724, 1222726, 1222727, 1222764, 1222772, 1222773, 1222776, 1222781, 1222784, 1222785, 1222787, 1222790, 1222791, 1222792, 1222796, 1222798, 1222801, 1222812, 1222824, 1222829, 1222832, 1222836, 1222838, 1222866, 1222867, 1222869, 1222876, 1222878, 1222879, 1222881, 1222883, 1222888, 1222894, 1222901, 1222968, 1223012, 1223014, 1223016, 1223024, 1223030, 1223033, 1223034, 1223035, 1223036, 1223037, 1223041, 1223042, 1223051, 1223052, 1223056, 1223057, 1223058, 1223060, 1223061, 1223065, 1223066, 1223067, 1223068, 1223076, 1223078, 1223111, 1223115, 1223118, 1223187, 1223189, 1223190, 1223191, 1223196, 1223197, 1223198, 1223275, 1223323, 1223369, 1223380, 1223473, 1223474, 1223475, 1223477, 1223478, 1223479, 1223481, 1223482, 1223484, 1223487, 1223490, 1223496, 1223498, 1223499, 1223501, 1223502, 1223503, 1223505, 1223509, 1223511, 1223512, 1223513, 1223516, 1223517, 1223518, 1223519, 1223520, 1223522, 1223523, 1223525, 1223536, 1223539, 1223574, 1223595, 1223598, 1223634, 1223640, 1223643, 1223644, 1223645, 1223646, 1223648, 1223655, 1223657, 1223660, 1223661, 1223663, 1223664, 1223668, 1223686, 1223693, 1223705, 1223714, 1223735, 1223745, 1223784, 1223785, 1223790, 1223816, 1223821, 1223822, 1223824, 1223827, 1223834, 1223875, 1223876, 1223877, 1223878, 1223879, 1223894, 1223921, 1223922, 1223923, 1223924, 1223929, 1223931, 1223932, 1223934, 1223941, 1223948, 1223949, 1223950, 1223951, 1223952, 1223953, 1223956, 1223957, 1223960, 1223962, 1223963, 1223964 CVE References: CVE-2021-47047, CVE-2021-47181, CVE-2021-47182, CVE-2021-47183, CVE-2021-47184, CVE-2021-47185, CVE-2021-47187, CVE-2021-47188, CVE-2021-47189, CVE-2021-47191, CVE-2021-47192, CVE-2021-47193, CVE-2021-47194, CVE-2021-47195, CVE-2021-47196, CVE-2021-47197, CVE-2021-47198, CVE-2021-47199, CVE-2021-47200, CVE-2021-47201, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47206, CVE-2021-47207, CVE-2021-47209, CVE-2021-47210, CVE-2021-47211, CVE-2021-47212, CVE-2021-47214, CVE-2021-47215, CVE-2021-47216, CVE-2021-47217, CVE-2021-47218, CVE-2021-47219, CVE-2022-48631, CVE-2022-48632, CVE-2022-48634, CVE-2022-48636, CVE-2022-48637, CVE-2022-48638, CVE-2022-48639, CVE-2022-48640, CVE-2022-48642, CVE-2022-48644, CVE-2022-48646, CVE-2022-48647, CVE-2022-48648, CVE-2022-48650, CVE-2022-48651, CVE-2022-48652, CVE-2022-48653, CVE-2022-48654, CVE-2022-48655, CVE-2022-48656, CVE-2022-48657, CVE-2022-48658, CVE-2022-48659, CVE-2022-48660, CVE-2022-48662, CVE-2022-48663, CVE-2022-48667, CVE-2022-48668, CVE-2022-48671, CVE-2022-48672, CVE-2022-48673, CVE-2022-48675, CVE-2022-48686, CVE-2022-48687, CVE-2022-48688, CVE-2022-48690, CVE-2022-48692, CVE-2022-48693, CVE-2022-48694, CVE-2022-48695, CVE-2022-48697, CVE-2022-48698, CVE-2022-48700, CVE-2022-48701, CVE-2022-48702, CVE-2022-48703, CVE-2022-48704, CVE-2023-2860, CVE-2023-52488, CVE-2023-52503, CVE-2023-52561, CVE-2023-52585, CVE-2023-52589, CVE-2023-52590, CVE-2023-52591, CVE-2023-52593, CVE-2023-52614, CVE-2023-52616, CVE-2023-52620, CVE-2023-52627, CVE-2023-52635, CVE-2023-52636, CVE-2023-52645, CVE-2023-52652, CVE-2023-6270, CVE-2024-0639, CVE-2024-0841, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-23850, CVE-2024-26601, CVE-2024-26610, CVE-2024-26656, CVE-2024-26660, CVE-2024-26671, CVE-2024-26673, CVE-2024-26675, CVE-2024-26680, CVE-2024-26681, CVE-2024-26684, CVE-2024-26685, CVE-2024-26687, CVE-2024-26688, CVE-2024-26689, CVE-2024-26696, CVE-2024-26697, CVE-2024-26702, CVE-2024-26704, CVE-2024-26718, CVE-2024-26722, CVE-2024-26727, CVE-2024-26733, CVE-2024-26736, CVE-2024-26737, CVE-2024-26739, CVE-2024-26743, CVE-2024-26744, CVE-2024-26745, CVE-2024-26747, CVE-2024-26749, CVE-2024-26751, CVE-2024-26754, CVE-2024-26760, CVE-2024-267600, CVE-2024-26763, CVE-2024-26764, CVE-2024-26766, CVE-2024-26769, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26776, CVE-2024-26779, CVE-2024-26783, CVE-2024-26787, CVE-2024-26790, CVE-2024-26792, CVE-2024-26793, CVE-2024-26798, CVE-2024-26805, CVE-2024-26807, CVE-2024-26816, CVE-2024-26817, CVE-2024-26820, CVE-2024-26825, CVE-2024-26830, CVE-2024-26833, CVE-2024-26836, CVE-2024-26843, CVE-2024-26848, CVE-2024-26852, CVE-2024-26853, CVE-2024-26855, CVE-2024-26856, CVE-2024-26857, CVE-2024-26861, CVE-2024-26862, CVE-2024-26866, CVE-2024-26872, CVE-2024-26875, CVE-2024-26878, CVE-2024-26879, CVE-2024-26881, CVE-2024-26882, CVE-2024-26883, CVE-2024-26884, CVE-2024-26885, CVE-2024-26891, CVE-2024-26893, CVE-2024-26895, CVE-2024-26896, CVE-2024-26897, CVE-2024-26898, CVE-2024-26901, CVE-2024-26903, CVE-2024-26917, CVE-2024-26927, CVE-2024-26948, CVE-2024-26950, CVE-2024-26951, CVE-2024-26955, CVE-2024-26956, CVE-2024-26960, CVE-2024-26965, CVE-2024-26966, CVE-2024-26969, CVE-2024-26970, CVE-2024-26972, CVE-2024-26981, CVE-2024-26982, CVE-2024-26993, CVE-2024-27013, CVE-2024-27014, CVE-2024-27030, CVE-2024-27038, CVE-2024-27039, CVE-2024-27041, CVE-2024-27043, CVE-2024-27046, CVE-2024-27056, CVE-2024-27062, CVE-2024-27389 Jira References: PED-1166, PED-1168, PED-1170, PED-1218, PED-1220, PED-1222, PED-1223, PED-1225, PED-1565, PED-2849, PED-376, PED-542, PED-7167, PED-7619, SLE-18378, SLE-18383, SLE-18385, SLE-18978, SLE-19249, SLE-19253 Maintenance Incident: [SUSE:Maintenance:33809](https://smelt.suse.de/incident/33809/) Sources used: openSUSE Leap 15.5 (src): kernel-syms-rt-5.14.21-150500.13.52.1, kernel-livepatch-SLE15-SP5-RT_Update_14-1-150500.11.5.1, kernel-source-rt-5.14.21-150500.13.52.1 SUSE Linux Enterprise Micro 5.5 (src): kernel-source-rt-5.14.21-150500.13.52.1 SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5-RT_Update_14-1-150500.11.5.1 SUSE Real Time Module 15-SP5 (src): kernel-syms-rt-5.14.21-150500.13.52.1, kernel-source-rt-5.14.21-150500.13.52.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2024:2135-1: An update that solves 428 vulnerabilities, contains 15 features and has 78 security fixes can now be installed. Category: security (important) Bug References: 1012628, 1065729, 1181674, 1187716, 1193599, 1194869, 1207948, 1208593, 1209657, 1213573, 1214852, 1215199, 1216196, 1216358, 1216702, 1217169, 1217384, 1217408, 1217489, 1217750, 1217959, 1218205, 1218336, 1218447, 1218562, 1218779, 1218917, 1219104, 1219170, 1219596, 1219623, 1219834, 1220021, 1220045, 1220120, 1220148, 1220328, 1220342, 1220428, 1220430, 1220569, 1220587, 1220738, 1220783, 1220915, 1221044, 1221276, 1221293, 1221303, 1221375, 1221504, 1221612, 1221615, 1221635, 1221645, 1221649, 1221765, 1221777, 1221783, 1221816, 1221829, 1221830, 1221858, 1222115, 1222173, 1222264, 1222273, 1222294, 1222301, 1222303, 1222304, 1222307, 1222357, 1222366, 1222368, 1222371, 1222378, 1222379, 1222385, 1222422, 1222426, 1222428, 1222437, 1222445, 1222459, 1222464, 1222489, 1222522, 1222525, 1222527, 1222531, 1222532, 1222549, 1222550, 1222557, 1222559, 1222563, 1222585, 1222586, 1222596, 1222606, 1222608, 1222613, 1222615, 1222618, 1222622, 1222624, 1222627, 1222630, 1222635, 1222721, 1222727, 1222769, 1222771, 1222772, 1222775, 1222777, 1222780, 1222782, 1222793, 1222799, 1222801, 1222968, 1223007, 1223011, 1223015, 1223016, 1223020, 1223023, 1223024, 1223030, 1223033, 1223034, 1223035, 1223038, 1223039, 1223041, 1223045, 1223046, 1223051, 1223052, 1223058, 1223060, 1223061, 1223076, 1223077, 1223084, 1223111, 1223113, 1223138, 1223143, 1223187, 1223189, 1223190, 1223191, 1223198, 1223202, 1223285, 1223315, 1223338, 1223369, 1223380, 1223384, 1223390, 1223439, 1223462, 1223532, 1223539, 1223575, 1223590, 1223591, 1223592, 1223593, 1223625, 1223628, 1223629, 1223633, 1223634, 1223637, 1223641, 1223643, 1223649, 1223650, 1223651, 1223652, 1223653, 1223654, 1223655, 1223660, 1223661, 1223663, 1223664, 1223665, 1223666, 1223668, 1223669, 1223670, 1223671, 1223675, 1223677, 1223678, 1223686, 1223692, 1223693, 1223695, 1223696, 1223698, 1223705, 1223712, 1223718, 1223728, 1223732, 1223735, 1223739, 1223741, 1223744, 1223745, 1223747, 1223748, 1223749, 1223750, 1223752, 1223754, 1223757, 1223759, 1223761, 1223762, 1223774, 1223782, 1223787, 1223788, 1223789, 1223790, 1223802, 1223805, 1223810, 1223822, 1223827, 1223831, 1223834, 1223838, 1223869, 1223870, 1223871, 1223872, 1223874, 1223944, 1223945, 1223946, 1223991, 1224076, 1224096, 1224098, 1224099, 1224137, 1224166, 1224174, 1224177, 1224180, 1224181, 1224331, 1224348, 1224423, 1224429, 1224430, 1224432, 1224433, 1224437, 1224438, 1224442, 1224443, 1224445, 1224449, 1224477, 1224479, 1224480, 1224481, 1224482, 1224486, 1224487, 1224488, 1224491, 1224492, 1224493, 1224494, 1224495, 1224500, 1224501, 1224502, 1224504, 1224505, 1224506, 1224507, 1224508, 1224509, 1224511, 1224513, 1224517, 1224519, 1224521, 1224524, 1224525, 1224526, 1224530, 1224531, 1224534, 1224537, 1224541, 1224542, 1224543, 1224546, 1224550, 1224552, 1224553, 1224555, 1224557, 1224558, 1224559, 1224562, 1224565, 1224566, 1224567, 1224568, 1224569, 1224571, 1224573, 1224576, 1224577, 1224578, 1224579, 1224580, 1224581, 1224582, 1224585, 1224586, 1224587, 1224588, 1224592, 1224596, 1224598, 1224600, 1224601, 1224602, 1224603, 1224605, 1224607, 1224608, 1224609, 1224611, 1224613, 1224615, 1224617, 1224618, 1224620, 1224621, 1224622, 1224623, 1224624, 1224626, 1224627, 1224628, 1224629, 1224630, 1224632, 1224633, 1224634, 1224636, 1224637, 1224638, 1224639, 1224640, 1224643, 1224644, 1224645, 1224646, 1224647, 1224648, 1224649, 1224650, 1224651, 1224652, 1224653, 1224654, 1224657, 1224660, 1224663, 1224664, 1224665, 1224666, 1224667, 1224668, 1224671, 1224672, 1224674, 1224675, 1224676, 1224677, 1224678, 1224679, 1224680, 1224681, 1224682, 1224683, 1224685, 1224686, 1224687, 1224688, 1224692, 1224696, 1224697, 1224699, 1224701, 1224703, 1224704, 1224705, 1224706, 1224707, 1224709, 1224710, 1224712, 1224714, 1224716, 1224717, 1224718, 1224719, 1224720, 1224721, 1224722, 1224723, 1224725, 1224727, 1224728, 1224729, 1224730, 1224731, 1224732, 1224733, 1224736, 1224738, 1224739, 1224740, 1224741, 1224742, 1224747, 1224749, 1224763, 1224764, 1224765, 1224766, 1224790, 1224792, 1224793, 1224803, 1224804, 1224866, 1224936, 1224989, 1225007, 1225053, 1225133, 1225134, 1225136, 1225172, 1225502, 1225578, 1225579, 1225580, 1225593, 1225605, 1225607, 1225610, 1225616, 1225618, 1225640, 1225642, 1225692, 1225694, 1225695, 1225696, 1225698, 1225699, 1225704, 1225705, 1225708, 1225710, 1225712, 1225714, 1225715, 1225720, 1225722, 1225728, 1225734, 1225735, 1225736, 1225747, 1225748, 1225749, 1225750, 1225756, 1225765, 1225766, 1225769, 1225773, 1225775, 1225842, 1225945 CVE References: CVE-2023-0160, CVE-2023-47233, CVE-2023-52434, CVE-2023-52458, CVE-2023-52463, CVE-2023-52472, CVE-2023-52483, CVE-2023-52492, CVE-2023-52503, CVE-2023-52591, CVE-2023-52608, CVE-2023-52616, CVE-2023-52618, CVE-2023-52631, CVE-2023-52635, CVE-2023-52640, CVE-2023-52641, CVE-2023-52645, CVE-2023-52652, CVE-2023-52653, CVE-2023-52654, CVE-2023-52655, CVE-2023-52657, CVE-2023-52658, CVE-2023-52659, CVE-2023-52660, CVE-2023-52661, CVE-2023-52662, CVE-2023-52663, CVE-2023-52664, CVE-2023-52667, CVE-2023-52669, CVE-2023-52670, CVE-2023-52671, CVE-2023-52673, CVE-2023-52674, CVE-2023-52675, CVE-2023-52676, CVE-2023-52678, CVE-2023-52679, CVE-2023-52680, CVE-2023-52681, CVE-2023-52683, CVE-2023-52685, CVE-2023-52686, CVE-2023-52687, CVE-2023-52690, CVE-2023-52691, CVE-2023-52692, CVE-2023-52693, CVE-2023-52694, CVE-2023-52695, CVE-2023-52696, CVE-2023-52697, CVE-2023-52698, CVE-2023-52771, CVE-2023-52772, CVE-2023-52860, CVE-2023-52882, CVE-2023-6238, CVE-2023-6270, CVE-2023-6531, CVE-2023-7042, CVE-2024-0639, CVE-2024-21823, CVE-2024-22099, CVE-2024-23848, CVE-2024-24861, CVE-2024-25739, CVE-2024-26601, CVE-2024-26611, CVE-2024-26614, CVE-2024-26632, CVE-2024-26638, CVE-2024-26642, CVE-2024-26643, CVE-2024-26652, CVE-2024-26654, CVE-2024-26656, CVE-2024-26657, CVE-2024-26671, CVE-2024-26673, CVE-2024-26674, CVE-2024-26675, CVE-2024-26679, CVE-2024-26684, CVE-2024-26685, CVE-2024-26692, CVE-2024-26696, CVE-2024-26697, CVE-2024-26704, CVE-2024-26714, CVE-2024-26726, CVE-2024-26731, CVE-2024-26733, CVE-2024-26736, CVE-2024-26737, CVE-2024-26739, CVE-2024-26740, CVE-2024-26742, CVE-2024-26756, CVE-2024-26757, CVE-2024-26760, CVE-2024-267600, CVE-2024-26761, CVE-2024-26764, CVE-2024-26769, CVE-2024-26772, CVE-2024-26773, CVE-2024-26774, CVE-2024-26775, CVE-2024-26779, CVE-2024-26783, CVE-2024-26786, CVE-2024-26791, CVE-2024-26793, CVE-2024-26794, CVE-2024-26802, CVE-2024-26805, CVE-2024-26807, CVE-2024-26815, CVE-2024-26816, CVE-2024-26822, CVE-2024-26828, CVE-2024-26832, CVE-2024-26836, CVE-2024-26844, CVE-2024-26846, CVE-2024-26848, CVE-2024-26853, CVE-2024-26854, CVE-2024-26855, CVE-2024-26856, CVE-2024-26857, CVE-2024-26858, CVE-2024-26860, CVE-2024-26861, CVE-2024-26862, CVE-2024-26866, CVE-2024-26868, CVE-2024-26870, CVE-2024-26878, CVE-2024-26881, CVE-2024-26882, CVE-2024-26883, CVE-2024-26884, CVE-2024-26885, CVE-2024-26898, CVE-2024-26899, CVE-2024-26900, CVE-2024-26901, CVE-2024-26903, CVE-2024-26906, CVE-2024-26909, CVE-2024-26921, CVE-2024-26922, CVE-2024-26923, CVE-2024-26925, CVE-2024-26928, CVE-2024-26932, CVE-2024-26933, CVE-2024-26934, CVE-2024-26935, CVE-2024-26937, CVE-2024-26938, CVE-2024-26940, CVE-2024-26943, CVE-2024-26945, CVE-2024-26946, CVE-2024-26948, CVE-2024-26949, CVE-2024-26950, CVE-2024-26951, CVE-2024-26956, CVE-2024-26957, CVE-2024-26958, CVE-2024-26960, CVE-2024-26961, CVE-2024-26962, CVE-2024-26963, CVE-2024-26964, CVE-2024-26972, CVE-2024-26973, CVE-2024-26978, CVE-2024-26979, CVE-2024-26981, CVE-2024-26982, CVE-2024-26983, CVE-2024-26984, CVE-2024-26986, CVE-2024-26988, CVE-2024-26989, CVE-2024-26990, CVE-2024-26991, CVE-2024-26992, CVE-2024-26993, CVE-2024-26994, CVE-2024-26995, CVE-2024-26996, CVE-2024-26997, CVE-2024-26999, CVE-2024-27000, CVE-2024-27001, CVE-2024-27002, CVE-2024-27003, CVE-2024-27004, CVE-2024-27008, CVE-2024-27013, CVE-2024-27014, CVE-2024-27022, CVE-2024-27027, CVE-2024-27028, CVE-2024-27029, CVE-2024-27030, CVE-2024-27031, CVE-2024-27036, CVE-2024-27046, CVE-2024-27056, CVE-2024-27057, CVE-2024-27062, CVE-2024-27067, CVE-2024-27080, CVE-2024-27388, CVE-2024-27389, CVE-2024-27393, CVE-2024-27395, CVE-2024-27396, CVE-2024-27398, CVE-2024-27399, CVE-2024-27400, CVE-2024-27401, CVE-2024-27405, CVE-2024-27408, CVE-2024-27410, CVE-2024-27411, CVE-2024-27412, CVE-2024-27413, CVE-2024-27416, CVE-2024-27417, CVE-2024-27418, CVE-2024-27431, CVE-2024-27432, CVE-2024-27434, CVE-2024-27435, CVE-2024-27436, CVE-2024-35784, CVE-2024-35786, CVE-2024-35788, CVE-2024-35789, CVE-2024-35790, CVE-2024-35791, CVE-2024-35794, CVE-2024-35795, CVE-2024-35796, CVE-2024-35799, CVE-2024-35800, CVE-2024-35801, CVE-2024-35803, CVE-2024-35804, CVE-2024-35806, CVE-2024-35808, CVE-2024-35809, CVE-2024-35810, CVE-2024-35811, CVE-2024-35812, CVE-2024-35813, CVE-2024-35814, CVE-2024-35815, CVE-2024-35817, CVE-2024-35819, CVE-2024-35821, CVE-2024-35822, CVE-2024-35823, CVE-2024-35824, CVE-2024-35825, CVE-2024-35828, CVE-2024-35829, CVE-2024-35830, CVE-2024-35833, CVE-2024-35834, CVE-2024-35835, CVE-2024-35836, CVE-2024-35837, CVE-2024-35838, CVE-2024-35841, CVE-2024-35842, CVE-2024-35845, CVE-2024-35847, CVE-2024-35849, CVE-2024-35850, CVE-2024-35851, CVE-2024-35852, CVE-2024-35854, CVE-2024-35860, CVE-2024-35861, CVE-2024-35862, CVE-2024-35863, CVE-2024-35864, CVE-2024-35865, CVE-2024-35866, CVE-2024-35867, CVE-2024-35868, CVE-2024-35869, CVE-2024-35870, CVE-2024-35872, CVE-2024-35875, CVE-2024-35877, CVE-2024-35878, CVE-2024-35879, CVE-2024-35883, CVE-2024-35885, CVE-2024-35887, CVE-2024-35889, CVE-2024-35891, CVE-2024-35895, CVE-2024-35901, CVE-2024-35903, CVE-2024-35904, CVE-2024-35905, CVE-2024-35907, CVE-2024-35909, CVE-2024-35911, CVE-2024-35912, CVE-2024-35914, CVE-2024-35915, CVE-2024-35916, CVE-2024-35917, CVE-2024-35921, CVE-2024-35922, CVE-2024-35924, CVE-2024-35927, CVE-2024-35928, CVE-2024-35930, CVE-2024-35931, CVE-2024-35932, CVE-2024-35933, CVE-2024-35935, CVE-2024-35936, CVE-2024-35937, CVE-2024-35938, CVE-2024-35940, CVE-2024-35943, CVE-2024-35944, CVE-2024-35945, CVE-2024-35946, CVE-2024-35947, CVE-2024-35950, CVE-2024-35951, CVE-2024-35952, CVE-2024-35953, CVE-2024-35954, CVE-2024-35955, CVE-2024-35956, CVE-2024-35958, CVE-2024-35959, CVE-2024-35960, CVE-2024-35961, CVE-2024-35963, CVE-2024-35964, CVE-2024-35965, CVE-2024-35966, CVE-2024-35967, CVE-2024-35969, CVE-2024-35971, CVE-2024-35972, CVE-2024-35973, CVE-2024-35974, CVE-2024-35975, CVE-2024-35977, CVE-2024-35978, CVE-2024-35981, CVE-2024-35982, CVE-2024-35984, CVE-2024-35986, CVE-2024-35989, CVE-2024-35990, CVE-2024-35991, CVE-2024-35992, CVE-2024-35995, CVE-2024-35997, CVE-2024-35999, CVE-2024-36002, CVE-2024-36006, CVE-2024-36007, CVE-2024-36009, CVE-2024-36011, CVE-2024-36012, CVE-2024-36013, CVE-2024-36014, CVE-2024-36015, CVE-2024-36016, CVE-2024-36018, CVE-2024-36019, CVE-2024-36020, CVE-2024-36021, CVE-2024-36025, CVE-2024-36026, CVE-2024-36029, CVE-2024-36030, CVE-2024-36032, CVE-2024-36880, CVE-2024-36885, CVE-2024-36890, CVE-2024-36891, CVE-2024-36893, CVE-2024-36894, CVE-2024-36895, CVE-2024-36896, CVE-2024-36897, CVE-2024-36898, CVE-2024-36906, CVE-2024-36918, CVE-2024-36921, CVE-2024-36922, CVE-2024-36928, CVE-2024-36930, CVE-2024-36931, CVE-2024-36936, CVE-2024-36940, CVE-2024-36941, CVE-2024-36942, CVE-2024-36944, CVE-2024-36947, CVE-2024-36949, CVE-2024-36950, CVE-2024-36951, CVE-2024-36955, CVE-2024-36959 Jira References: PED-3184, PED-3311, PED-3535, PED-4486, PED-4593, PED-5062, PED-542, PED-5728, PED-5853, PED-6079, PED-6252, PED-7542, PED-7619, PED-8111, PED-8240 Maintenance Incident: [SUSE:Maintenance:34127](https://smelt.suse.de/incident/34127/) Sources used: openSUSE Leap 15.6 (src): kernel-syms-azure-6.4.0-150600.8.5.1, kernel-source-azure-6.4.0-150600.8.5.4 Public Cloud Module 15-SP6 (src): kernel-syms-azure-6.4.0-150600.8.5.1, kernel-source-azure-6.4.0-150600.8.5.4 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. |