Bugzilla – Bug 1210335
VUL-0: CVE-2023-1829: kernel: Linux kernel: Vulnerabilities in the tcindex classifier
Last modified: 2024-07-04 09:10:44 UTC
CVE-2023-1829 Posted by valis on Apr 11Hi, I have recently discovered two security issues in the tcindex classifier (part of the network QoS subsystem of the Linux kernel): CVE-2023-1829 Use-after-free when deleting a perfect hash filter The following issue has its own bug report: CVE-2023-1281 Race condition leading to an use-after-free when updating imperfect hash filters (bsc#1209634) # Impact / mitigation: Both of these vulnerabilities can be used for local privilege escalation. The attacker needs CAP_NET_ADMIN to create/change... References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1829 https://seclists.org/oss-sec/2023/q2/14
Reassigning to a concrete person to ensure progress [1] (feel free to pass to the next one), see also the process at [2]. Hi Michal, The fix patch [3] mentioned in the CVE page [4] removes the entire tcindex classifier since v6.3-rc1, could you please take a look? Currently, only stable and ALP branches have it. [1] https://confluence.suse.com/display/KSS/Kernel+Security+Sentinel [2] https://wiki.suse.net/index.php/SUSE-Labs/Kernel/Security [3] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28 [4] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1829
I'm afraid completely dropping the feature is something we cannot do in a maintenance update, perhaps only if there is an easy and straightforward replacement that we could recommend. But first I'll have to look into the issue description and try to find a fix.
(In reply to Michal Kubeček from comment #2) > I'm afraid completely dropping the feature is something we cannot do in > a maintenance update, perhaps only if there is an easy and straightforward > replacement that we could recommend. But first I'll have to look into the > issue description and try to find a fix. Hi Michal, any idea about how to "fix" tcindex without removing it? Thanks!
Created attachment 867971 [details] untestested patch disabling perfect hashing The quickest solution you may get seems to be "wontfix" here. (Michal Kubeček has likely FTO in this week. Cc: Thomas, Hannes.) I'm attaching a patch that should demote hashing to imperfect even when mask>>shift size would allow perfect hashing. That's to avoid the allegedly incorrect delete path for perfects, it should not affect correctness but performance.
(In reply to Michal Koutný from comment #9) > Created attachment 867971 [details] > untestested patch disabling perfect hashing > > The quickest solution you may get seems to be "wontfix" here. > (Michal Kubeček has likely FTO in this week. Cc: Thomas, Hannes.) > > I'm attaching a patch that should demote hashing to imperfect even when > mask>>shift size would allow perfect hashing. That's to avoid the allegedly > incorrect delete path for perfects, it should not affect correctness but > performance. the patch looks sane to me
SUSE-SU-2023:2803-1: An update that solves seven vulnerabilities, contains one feature and has 10 fixes can now be installed. Category: security (important) Bug References: 1187829, 1194869, 1210335, 1212051, 1212265, 1212603, 1212605, 1212606, 1212619, 1212701, 1212741, 1212835, 1212838, 1212842, 1212861, 1212869, 1212892 CVE References: CVE-2023-1829, CVE-2023-3090, CVE-2023-3111, CVE-2023-3212, CVE-2023-3357, CVE-2023-3358, CVE-2023-3389 Jira References: SLE-19253 Sources used: SUSE Linux Enterprise Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4-RT_Update_9-1-150400.1.3.1 SUSE Real Time Module 15-SP4 (src): kernel-source-rt-5.14.21-150400.15.40.1, kernel-syms-rt-5.14.21-150400.15.40.1 openSUSE Leap 15.4 (src): kernel-source-rt-5.14.21-150400.15.40.1, kernel-syms-rt-5.14.21-150400.15.40.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2820-1: An update that solves 16 vulnerabilities, contains two features and has 34 fixes can now be installed. Category: security (important) Bug References: 1065729, 1152472, 1152489, 1160435, 1187829, 1189998, 1194869, 1205758, 1208410, 1208600, 1209039, 1209367, 1210335, 1211299, 1211346, 1211387, 1211410, 1211449, 1211796, 1211852, 1212051, 1212129, 1212154, 1212155, 1212158, 1212265, 1212350, 1212448, 1212494, 1212495, 1212504, 1212513, 1212540, 1212561, 1212563, 1212564, 1212584, 1212592, 1212603, 1212605, 1212606, 1212619, 1212701, 1212741, 1212835, 1212838, 1212842, 1212861, 1212869, 1212892 CVE References: CVE-2023-1077, CVE-2023-1249, CVE-2023-1829, CVE-2023-21102, CVE-2023-3090, CVE-2023-3111, CVE-2023-3141, CVE-2023-3161, CVE-2023-3212, CVE-2023-3357, CVE-2023-3358, CVE-2023-3389, CVE-2023-35788, CVE-2023-35823, CVE-2023-35828, CVE-2023-35829 Jira References: PED-3931, SLE-19253 Sources used: Basesystem Module 15-SP4 (src): kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1, kernel-source-5.14.21-150400.24.69.1 Development Tools Module 15-SP4 (src): kernel-syms-5.14.21-150400.24.69.1, kernel-obs-build-5.14.21-150400.24.69.1, kernel-source-5.14.21-150400.24.69.1 SUSE Linux Enterprise Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4_Update_14-1-150400.9.3.1 openSUSE Leap Micro 5.3 (src): kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1 openSUSE Leap 15.4 (src): kernel-obs-build-5.14.21-150400.24.69.1, kernel-source-5.14.21-150400.24.69.1, kernel-syms-5.14.21-150400.24.69.1, kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1, kernel-obs-qa-5.14.21-150400.24.69.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1 SUSE Linux Enterprise Micro 5.3 (src): kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1 SUSE Linux Enterprise Micro 5.4 (src): kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2831-1: An update that solves 16 vulnerabilities, contains one feature and has 33 fixes can now be installed. Category: security (important) Bug References: 1065729, 1152472, 1152489, 1160435, 1187829, 1189998, 1194869, 1205758, 1208410, 1208600, 1209039, 1209367, 1210335, 1211299, 1211346, 1211387, 1211410, 1211796, 1211852, 1212051, 1212129, 1212154, 1212155, 1212158, 1212265, 1212350, 1212448, 1212494, 1212495, 1212504, 1212513, 1212540, 1212561, 1212563, 1212564, 1212584, 1212592, 1212603, 1212605, 1212606, 1212619, 1212701, 1212741, 1212835, 1212838, 1212842, 1212861, 1212869, 1212892 CVE References: CVE-2023-1077, CVE-2023-1249, CVE-2023-1829, CVE-2023-21102, CVE-2023-3090, CVE-2023-3111, CVE-2023-3141, CVE-2023-3161, CVE-2023-3212, CVE-2023-3357, CVE-2023-3358, CVE-2023-3389, CVE-2023-35788, CVE-2023-35823, CVE-2023-35828, CVE-2023-35829 Jira References: PED-3931 Sources used: openSUSE Leap 15.4 (src): kernel-source-azure-5.14.21-150400.14.55.1, kernel-syms-azure-5.14.21-150400.14.55.1 Public Cloud Module 15-SP4 (src): kernel-source-azure-5.14.21-150400.14.55.1, kernel-syms-azure-5.14.21-150400.14.55.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2871-1: An update that solves 82 vulnerabilities, contains 25 features and has 390 fixes can now be installed. Category: security (important) Bug References: 1065729, 1109158, 1142685, 1152472, 1152489, 1155798, 1160435, 1166486, 1172073, 1174777, 1177529, 1186449, 1187829, 1189998, 1189999, 1191731, 1193629, 1194869, 1195175, 1195655, 1195921, 1196058, 1197534, 1197617, 1198101, 1198400, 1198438, 1198835, 1199304, 1199701, 1200054, 1202353, 1202633, 1203039, 1203200, 1203325, 1203331, 1203332, 1203693, 1203906, 1204356, 1204363, 1204662, 1204993, 1205153, 1205191, 1205205, 1205544, 1205650, 1205756, 1205758, 1205760, 1205762, 1205803, 1205846, 1206024, 1206036, 1206056, 1206057, 1206103, 1206224, 1206232, 1206340, 1206459, 1206492, 1206493, 1206552, 1206578, 1206640, 1206649, 1206677, 1206824, 1206843, 1206876, 1206877, 1206878, 1206880, 1206881, 1206882, 1206883, 1206884, 1206885, 1206886, 1206887, 1206888, 1206889, 1206890, 1206891, 1206893, 1206894, 1206935, 1206992, 1207034, 1207036, 1207050, 1207051, 1207088, 1207125, 1207149, 1207158, 1207168, 1207185, 1207270, 1207315, 1207328, 1207497, 1207500, 1207501, 1207506, 1207507, 1207521, 1207553, 1207560, 1207574, 1207588, 1207589, 1207590, 1207591, 1207592, 1207593, 1207594, 1207602, 1207603, 1207605, 1207606, 1207607, 1207608, 1207609, 1207610, 1207611, 1207612, 1207613, 1207614, 1207615, 1207616, 1207617, 1207618, 1207619, 1207620, 1207621, 1207622, 1207623, 1207624, 1207625, 1207626, 1207627, 1207628, 1207629, 1207630, 1207631, 1207632, 1207633, 1207634, 1207635, 1207636, 1207637, 1207638, 1207639, 1207640, 1207641, 1207642, 1207643, 1207644, 1207645, 1207646, 1207647, 1207648, 1207649, 1207650, 1207651, 1207652, 1207653, 1207734, 1207768, 1207769, 1207770, 1207771, 1207773, 1207795, 1207827, 1207842, 1207845, 1207875, 1207878, 1207933, 1207935, 1207948, 1208050, 1208076, 1208081, 1208105, 1208107, 1208128, 1208130, 1208149, 1208153, 1208183, 1208212, 1208219, 1208290, 1208368, 1208410, 1208420, 1208428, 1208429, 1208449, 1208534, 1208541, 1208542, 1208570, 1208588, 1208598, 1208599, 1208600, 1208601, 1208602, 1208604, 1208605, 1208607, 1208619, 1208628, 1208700, 1208741, 1208758, 1208759, 1208776, 1208777, 1208784, 1208787, 1208815, 1208816, 1208829, 1208837, 1208843, 1208845, 1208848, 1208864, 1208902, 1208948, 1208976, 1209008, 1209039, 1209052, 1209092, 1209159, 1209256, 1209258, 1209262, 1209287, 1209288, 1209290, 1209291, 1209292, 1209366, 1209367, 1209436, 1209457, 1209504, 1209532, 1209556, 1209600, 1209615, 1209635, 1209636, 1209637, 1209684, 1209687, 1209693, 1209739, 1209779, 1209780, 1209788, 1209798, 1209799, 1209804, 1209805, 1209856, 1209871, 1209927, 1209980, 1209982, 1209999, 1210034, 1210050, 1210158, 1210165, 1210202, 1210203, 1210206, 1210216, 1210230, 1210294, 1210301, 1210329, 1210335, 1210336, 1210337, 1210409, 1210439, 1210449, 1210450, 1210453, 1210454, 1210498, 1210506, 1210533, 1210551, 1210565, 1210584, 1210629, 1210644, 1210647, 1210725, 1210741, 1210762, 1210763, 1210764, 1210765, 1210766, 1210767, 1210768, 1210769, 1210770, 1210771, 1210775, 1210783, 1210791, 1210793, 1210806, 1210816, 1210817, 1210827, 1210853, 1210940, 1210943, 1210947, 1210953, 1210986, 1211014, 1211025, 1211037, 1211043, 1211044, 1211089, 1211105, 1211113, 1211131, 1211205, 1211263, 1211280, 1211281, 1211299, 1211346, 1211387, 1211400, 1211410, 1211414, 1211449, 1211465, 1211519, 1211564, 1211590, 1211592, 1211593, 1211595, 1211654, 1211686, 1211687, 1211688, 1211689, 1211690, 1211691, 1211692, 1211693, 1211714, 1211794, 1211796, 1211804, 1211807, 1211808, 1211820, 1211836, 1211847, 1211852, 1211855, 1211960, 1212051, 1212129, 1212154, 1212155, 1212158, 1212265, 1212350, 1212445, 1212448, 1212456, 1212494, 1212495, 1212504, 1212513, 1212540, 1212556, 1212561, 1212563, 1212564, 1212584, 1212592, 1212603, 1212605, 1212606, 1212619, 1212685, 1212701, 1212741, 1212835, 1212838, 1212842, 1212848, 1212861, 1212869, 1212892, 1212961, 1213010, 1213011, 1213012, 1213013, 1213014, 1213015, 1213016, 1213017, 1213018, 1213019, 1213020, 1213021, 1213024, 1213025, 1213032, 1213034, 1213035, 1213036, 1213037, 1213038, 1213039, 1213040, 1213041, 1213087, 1213088, 1213089, 1213090, 1213092, 1213093, 1213094, 1213095, 1213096, 1213098, 1213099, 1213100, 1213102, 1213103, 1213104, 1213105, 1213106, 1213107, 1213108, 1213109, 1213110, 1213111, 1213112, 1213113, 1213114, 1213116, 1213134 CVE References: CVE-2022-36280, CVE-2022-38096, CVE-2022-4269, CVE-2022-45884, CVE-2022-45885, CVE-2022-45886, CVE-2022-45887, CVE-2022-45919, CVE-2022-4744, CVE-2023-0045, CVE-2023-0122, CVE-2023-0179, CVE-2023-0394, CVE-2023-0461, CVE-2023-0469, CVE-2023-0590, CVE-2023-0597, CVE-2023-1075, CVE-2023-1076, CVE-2023-1077, CVE-2023-1079, CVE-2023-1095, CVE-2023-1118, CVE-2023-1249, CVE-2023-1382, CVE-2023-1513, CVE-2023-1582, CVE-2023-1583, CVE-2023-1611, CVE-2023-1637, CVE-2023-1652, CVE-2023-1670, CVE-2023-1829, CVE-2023-1838, CVE-2023-1855, CVE-2023-1989, CVE-2023-1998, CVE-2023-2002, CVE-2023-21102, CVE-2023-21106, CVE-2023-2124, CVE-2023-2156, CVE-2023-2162, CVE-2023-2176, CVE-2023-2235, CVE-2023-2269, CVE-2023-22998, CVE-2023-23000, CVE-2023-23001, CVE-2023-23004, CVE-2023-23006, CVE-2023-2430, CVE-2023-2483, CVE-2023-25012, CVE-2023-2513, CVE-2023-26545, CVE-2023-28327, CVE-2023-28410, CVE-2023-28464, CVE-2023-28866, CVE-2023-3006, CVE-2023-30456, CVE-2023-30772, CVE-2023-3090, CVE-2023-31084, CVE-2023-3111, CVE-2023-3141, CVE-2023-31436, CVE-2023-3161, CVE-2023-3212, CVE-2023-3220, CVE-2023-32233, CVE-2023-33288, CVE-2023-3357, CVE-2023-3358, CVE-2023-3389, CVE-2023-33951, CVE-2023-33952, CVE-2023-35788, CVE-2023-35823, CVE-2023-35828, CVE-2023-35829 Jira References: PED-1549, PED-3210, PED-3259, PED-3692, PED-370, PED-3750, PED-3759, PED-376, PED-3931, PED-4022, PED-835, SES-1880, SLE-18375, SLE-18377, SLE-18378, SLE-18379, SLE-18383, SLE-18384, SLE-18385, SLE-18978, SLE-18992, SLE-19001, SLE-19253, SLE-19255, SLE-19556 Sources used: openSUSE Leap 15.5 (src): kernel-livepatch-SLE15-SP5_Update_1-1-150500.11.7.1, kernel-syms-5.14.21-150500.55.7.1, kernel-obs-qa-5.14.21-150500.55.7.1, kernel-obs-build-5.14.21-150500.55.7.1, kernel-source-5.14.21-150500.55.7.1, kernel-default-base-5.14.21-150500.55.7.1.150500.6.2.5 Basesystem Module 15-SP5 (src): kernel-source-5.14.21-150500.55.7.1, kernel-default-base-5.14.21-150500.55.7.1.150500.6.2.5 Development Tools Module 15-SP5 (src): kernel-source-5.14.21-150500.55.7.1, kernel-syms-5.14.21-150500.55.7.1, kernel-obs-build-5.14.21-150500.55.7.1 SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5_Update_1-1-150500.11.7.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2892-1: An update that solves 15 vulnerabilities, contains one feature and has 85 fixes can now be installed. Category: security (important) Bug References: 1187829, 1189998, 1194869, 1205758, 1208410, 1209039, 1209780, 1210335, 1210565, 1210584, 1210853, 1211014, 1211346, 1211400, 1211410, 1211794, 1211852, 1212051, 1212265, 1212350, 1212405, 1212445, 1212448, 1212456, 1212494, 1212495, 1212504, 1212513, 1212540, 1212556, 1212561, 1212563, 1212564, 1212584, 1212592, 1212603, 1212605, 1212606, 1212619, 1212685, 1212701, 1212741, 1212835, 1212838, 1212842, 1212848, 1212861, 1212869, 1212892, 1212961, 1213010, 1213011, 1213012, 1213013, 1213014, 1213015, 1213016, 1213017, 1213018, 1213019, 1213020, 1213021, 1213024, 1213025, 1213032, 1213034, 1213035, 1213036, 1213037, 1213038, 1213039, 1213040, 1213041, 1213087, 1213088, 1213089, 1213090, 1213092, 1213093, 1213094, 1213095, 1213096, 1213098, 1213099, 1213100, 1213102, 1213103, 1213104, 1213105, 1213106, 1213107, 1213108, 1213109, 1213110, 1213111, 1213112, 1213113, 1213114, 1213116, 1213134 CVE References: CVE-2023-1249, CVE-2023-1829, CVE-2023-2430, CVE-2023-28866, CVE-2023-3090, CVE-2023-3111, CVE-2023-3212, CVE-2023-3220, CVE-2023-3357, CVE-2023-3358, CVE-2023-3389, CVE-2023-35788, CVE-2023-35823, CVE-2023-35828, CVE-2023-35829 Jira References: PED-3931 Sources used: openSUSE Leap 15.5 (src): kernel-syms-azure-5.14.21-150500.33.6.1, kernel-source-azure-5.14.21-150500.33.6.1 Public Cloud Module 15-SP5 (src): kernel-syms-azure-5.14.21-150500.33.6.1, kernel-source-azure-5.14.21-150500.33.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
We've ported the reproducer to LTP and the first test results are in. SLE-15SP2 and SLE-15SP3 are still affected: SLE-15SP2: https://openqa.suse.de/tests/11792547#step/cve-2023-1829/8 SLE-15SP3: https://openqa.suse.de/tests/11791722#step/cve-2023-1829/6 The bug cannot be reproduced on SLE-12SP5 and SLE-15SP1: SLE-12SP5: https://openqa.suse.de/tests/11776589#step/cve-2023-1829/8 SLE-15SP1: https://openqa.suse.de/tests/11792551#step/cve-2023-1829/8
SUSE-SU-2023:3302-1: An update that solves 28 vulnerabilities, contains two features and has 115 fixes can now be installed. Category: security (important) Bug References: 1150305, 1187829, 1193629, 1194869, 1206418, 1207129, 1207894, 1207948, 1208788, 1210335, 1210565, 1210584, 1210627, 1210780, 1210825, 1210853, 1211014, 1211131, 1211243, 1211738, 1211811, 1211867, 1212051, 1212256, 1212265, 1212301, 1212445, 1212456, 1212502, 1212525, 1212603, 1212604, 1212685, 1212766, 1212835, 1212838, 1212842, 1212846, 1212848, 1212861, 1212869, 1212892, 1212901, 1212905, 1212961, 1213010, 1213011, 1213012, 1213013, 1213014, 1213015, 1213016, 1213017, 1213018, 1213019, 1213020, 1213021, 1213024, 1213025, 1213032, 1213034, 1213035, 1213036, 1213037, 1213038, 1213039, 1213040, 1213041, 1213059, 1213061, 1213087, 1213088, 1213089, 1213090, 1213092, 1213093, 1213094, 1213095, 1213096, 1213098, 1213099, 1213100, 1213102, 1213103, 1213104, 1213105, 1213106, 1213107, 1213108, 1213109, 1213110, 1213111, 1213112, 1213113, 1213114, 1213116, 1213134, 1213167, 1213205, 1213206, 1213226, 1213233, 1213245, 1213247, 1213252, 1213258, 1213259, 1213263, 1213264, 1213272, 1213286, 1213287, 1213304, 1213417, 1213493, 1213523, 1213524, 1213533, 1213543, 1213578, 1213585, 1213586, 1213588, 1213601, 1213620, 1213632, 1213653, 1213705, 1213713, 1213715, 1213747, 1213756, 1213759, 1213777, 1213810, 1213812, 1213856, 1213857, 1213863, 1213867, 1213870, 1213871, 1213872 CVE References: CVE-2022-40982, CVE-2023-0459, CVE-2023-1829, CVE-2023-20569, CVE-2023-20593, CVE-2023-21400, CVE-2023-2156, CVE-2023-2166, CVE-2023-2430, CVE-2023-2985, CVE-2023-3090, CVE-2023-31083, CVE-2023-3111, CVE-2023-3117, CVE-2023-31248, CVE-2023-3212, CVE-2023-3268, CVE-2023-3389, CVE-2023-3390, CVE-2023-35001, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2023-3776, CVE-2023-3812, CVE-2023-38409, CVE-2023-3863, CVE-2023-4004 Jira References: PED-4718, PED-4758 Sources used: openSUSE Leap 15.5 (src): kernel-livepatch-SLE15-SP5-RT_Update_3-1-150500.11.5.1, kernel-syms-rt-5.14.21-150500.13.11.1, kernel-source-rt-5.14.21-150500.13.11.1 SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5-RT_Update_3-1-150500.11.5.1 SUSE Real Time Module 15-SP5 (src): kernel-syms-rt-5.14.21-150500.13.11.1, kernel-source-rt-5.14.21-150500.13.11.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
It looks like SLE-12SP5 (and likely also SLE-15SP1) is affected after all. The bug is just harder to reproduce there and the test needs improvements: https://openqa.suse.de/tests/11807456#step/cve-2023-1829/13 dmesg log: https://openqa.suse.de/tests/11807456/logfile?filename=serial0.txt OpenQA::run_ltp.pm: Starting cve-2023-1829 [ 4269.145573] Internal error: Oops: 96000005 [#1] SMP [ 4269.153915] Modules linked in: cls_tcindex sch_htb dummy xt_state can_bcm can vcan veth n_gsm pps_ldisc ppp_synctty ppp_async ppp_generic serport slcan slip slhc loop snd_hrtimer snd_seq snd_seq_device sctp authenc pcrypt crypto_user sha3_generic algif_hash af_alg xfrm_user xfrm_algo n_hdlc fuse nfsd auth_rpcgss nfs_acl lockd grace sunrpc nf_log_ipv6 xt_comment nf_log_ipv4 nf_log_common xt_LOG xt_limit af_packet ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_pkttype xt_tcpudp iptable_filter ip6table_mangle nf_conntrack_ipv4 nf_defrag_ipv4 ip_tables xt_conntrack nf_conntrack ip6table_filter ip6_tables x_tables xfs libcrc32c aes_ce_blk crypto_simd cryptd aes_ce_cipher crc32_ce crct10dif_ce ghash_ce nls_iso8859_1 nls_cp437 snd_hda_codec_generic aes_arm64 vfat fat sha2_ce snd_hda_intel sha256_arm64 [ 4269.253353] snd_hda_codec sha1_ce snd_hda_core joydev snd_hwdep snd_pcm virtio_net net_failover failover snd_timer button snd soundcore btrfs xor zstd_decompress zstd_compress xxhash hid_generic usbhid raid6_pq virtio_gpu ttm drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm virtio_scsi virtio_rng xhci_pci xhci_hcd drm_panel_orientation_quirks virtio_blk usbcore virtio_pci virtio_mmio sg dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua efivarfs [ 4269.313104] Supported: No, Unreleased kernel [ 4269.321859] Process tcindex01 (pid: 5641, stack limit = 0xffffe165005c8000) [ 4269.333459] CPU: 0 PID: 5641 Comm: tcindex01 Tainted: G W 4.12.14-1005.g83613ad-default #1 SLE12-SP5 (unreleased) [ 4269.354655] Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 [ 4269.366649] task: ffffe165017ee000 task.stack: ffffe165005c8000 [ 4269.377636] pstate: 20000005 (nzCv daif -PAN -UAO) [ 4269.387294] pc : tcindex_set_parms+0x260/0x704 [cls_tcindex] [ 4269.397786] lr : tcindex_set_parms+0x670/0x704 [cls_tcindex] [ 4269.408334] sp : ffffe165005cb750 [ 4269.416352] x29: ffffe165005cb750 x28: ffffe165563a9000 [ 4269.426482] x27: 0000004000000040 x26: ffffe165005cb808 [ 4269.436557] x25: ffffe16556291000 x24: 000000000000000a [ 4269.446590] x23: 0000000000000000 x22: 0000000000000000 [ 4269.456740] x21: ffffe165005cb7d8 x20: ffffe16556291c80 [ 4269.466884] x19: ffffe165005cb8f0 x18: 000000000000270f [ 4269.477072] x17: 0000ffffacc4a740 x16: ffff04f1cfacc988 [ 4269.487132] x15: 0000ffffacced448 x14: 000300080000ffff [ 4269.497322] x13: 000200060002001c x12: 0000000000000001 [ 4269.507327] x11: 0000000000000038 x10: 0000000000000009 [ 4269.517167] x9 : 0000000000000000 x8 : ffffe165015df500 [ 4269.527148] x7 : 0000000000000000 x6 : 000000000000007f [ 4269.537115] x5 : 0000000000000080 x4 : 0000000000000001 [ 4269.547081] x3 : 0000000000000005 x2 : 0000000000010001 [ 4269.556623] x1 : ffffe16577c9a900 x0 : ffffe165563a9000 [ 4269.566181] Call trace: [ 4269.572645] tcindex_set_parms+0x260/0x704 [cls_tcindex] [ 4269.582222] tcindex_change+0xc4/0x18c [cls_tcindex] [ 4269.591443] tc_new_tfilter+0x350/0x538 [ 4269.599439] rtnetlink_rcv_msg+0xac/0x228 [ 4269.607568] netlink_rcv_skb+0xd8/0x114 [ 4269.615679] rtnetlink_rcv+0x34/0x44 [ 4269.623494] netlink_unicast+0x178/0x280 [ 4269.631558] netlink_sendmsg+0x2a4/0x370 [ 4269.639543] sock_sendmsg+0x54/0x60 [ 4269.647031] ___sys_sendmsg+0x288/0x2b0 [ 4269.654818] __sys_sendmsg+0x54/0x98 [ 4269.662244] SyS_sendmsg+0x34/0x48 [ 4269.669426] el0_svc_naked+0x44/0x48 [ 4269.676742] Code: f9400c20 b90093a2 f940101b b40004bb (f9400f61) [ 4269.686855] ---[ end trace 48210475f48d220d ]--- [ 4269.734774] Kernel panic - not syncing: CRED: put_cred_rcu() sees ffffe165563d7600 with usage -20 [ 4269.734774] [ 4269.752076] SMP: stopping secondary CPUs [ 4269.759419] Kernel Offset: 0x4f1c72c0000 from 0xffff000008000000 [ 4269.768909] CPU features: 0x01,04101128 [ 4269.775858] Memory Limit: none [ 4269.781812] ---[ end Kernel panic - not syncing: CRED: put_cred_rcu() sees ffffe165563d7600 with usage -20
Reminder that this bug still affects SLE-15SP3 and earlier versions. We will add the LTP reproducer to regular maintenance update schedule at the end of the month and it'll block the October kernel updates!
This is an autogenerated message for OBS integration: This bug (1210335) was mentioned in https://build.opensuse.org/request/show/1114421 Factory / suse-module-tools
SUSE-SU-2023:4097-1: An update that solves one vulnerability, contains one feature and has one security fix can now be installed. Category: security (important) Bug References: 1205767, 1210335 CVE References: CVE-2023-1829 Jira References: PED-5731 Sources used: SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): suse-module-tools-15.2.18-150200.4.15.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): suse-module-tools-15.2.18-150200.4.15.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): suse-module-tools-15.2.18-150200.4.15.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4136-1: An update that solves two vulnerabilities and contains one feature can now be installed. Category: security (important) Bug References: 1205767, 1210335 CVE References: CVE-2023-1829, CVE-2023-23559 Jira References: PED-5731 Sources used: SUSE Linux Enterprise Micro 5.5 (src): suse-module-tools-15.5.3-150500.3.6.1 Basesystem Module 15-SP5 (src): suse-module-tools-15.5.3-150500.3.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4135-1: An update that solves two vulnerabilities and contains one feature can now be installed. Category: security (important) Bug References: 1205767, 1210335 CVE References: CVE-2023-1829, CVE-2023-23559 Jira References: PED-5731 Sources used: SUSE Linux Enterprise Micro for Rancher 5.3 (src): suse-module-tools-15.4.18-150400.3.14.1 SUSE Linux Enterprise Micro 5.3 (src): suse-module-tools-15.4.18-150400.3.14.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): suse-module-tools-15.4.18-150400.3.14.1 SUSE Linux Enterprise Micro 5.4 (src): suse-module-tools-15.4.18-150400.3.14.1 Basesystem Module 15-SP4 (src): suse-module-tools-15.4.18-150400.3.14.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4160-1: An update that solves two vulnerabilities and contains one feature can now be installed. Category: security (important) Bug References: 1205767, 1210335 CVE References: CVE-2023-1829, CVE-2023-23559 Jira References: PED-5731 Sources used: SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): suse-module-tools-15.1.25-150100.3.25.1 SUSE CaaS Platform 4.0 (src): suse-module-tools-15.1.25-150100.3.25.1 SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): suse-module-tools-15.1.25-150100.3.25.1 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): suse-module-tools-15.1.25-150100.3.25.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4159-1: An update that solves two vulnerabilities, contains one feature and has one security fix can now be installed. Category: security (important) Bug References: 1187196, 1205767, 1210335 CVE References: CVE-2023-1829, CVE-2023-23559 Jira References: PED-5731 Sources used: SUSE Linux Enterprise High Performance Computing 12 SP5 (src): suse-module-tools-12.13-3.11.1 SUSE Linux Enterprise Server 12 SP5 (src): suse-module-tools-12.13-3.11.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): suse-module-tools-12.13-3.11.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4158-1: An update that solves two vulnerabilities, contains one feature and has one security fix can now be installed. Category: security (important) Bug References: 1205767, 1207853, 1210335 CVE References: CVE-2023-1829, CVE-2023-23559 Jira References: PED-5731 Sources used: SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): suse-module-tools-15.3.17-150300.3.22.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): suse-module-tools-15.3.17-150300.3.22.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): suse-module-tools-15.3.17-150300.3.22.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): suse-module-tools-15.3.17-150300.3.22.1 SUSE Manager Proxy 4.2 (src): suse-module-tools-15.3.17-150300.3.22.1 SUSE Manager Retail Branch Server 4.2 (src): suse-module-tools-15.3.17-150300.3.22.1 SUSE Manager Server 4.2 (src): suse-module-tools-15.3.17-150300.3.22.1 SUSE Enterprise Storage 7.1 (src): suse-module-tools-15.3.17-150300.3.22.1 SUSE Linux Enterprise Micro 5.1 (src): suse-module-tools-15.3.17-150300.3.22.1 SUSE Linux Enterprise Micro 5.2 (src): suse-module-tools-15.3.17-150300.3.22.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): suse-module-tools-15.3.17-150300.3.22.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Is there any chance to get the into cve/linux-5.3 and cve/linux-4.12 branches for the upcoming maintenance update? The issue has a high score...
I have create MRs for suse-module-tools for SLE15 (315865) and SLE12-SP2(315864). s-m-t is maintained in the SLE-12-SP2 project for SLE-12-SP3 and SLE-12-SP4.
SUSE-SU-2024:0155-1: An update that solves two vulnerabilities, contains one feature and has one security fix can now be installed. Category: security (important) Bug References: 1205767, 1210335, 1217775 CVE References: CVE-2023-1829, CVE-2023-23559 Jira References: PED-5731 Sources used: SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): suse-module-tools-15.2.19-150200.4.18.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): suse-module-tools-15.2.19-150200.4.18.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): suse-module-tools-15.2.19-150200.4.18.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
In order to match the blacklist entries in suse-module-tools, the status is: SLE15-SP6 done cve/linux-5.14-LTSS pushed (+separate SLE15-SP5) cve/linux-5.3-LTSS pushed (+separate SLE15-SP3-LTSS) SLE15-SP2-EB ignored SLE12-SP5 pushed cve/linux-4.4 TODO SLE11-SP4-LTSS ignored (no blacklist entries) (I'm adding the blacklisting capability even to older branches with the prospect it may come handy in future with other modules.)
So this approaches completion: SLE15-SP6 done cve/linux-5.14-LTSS in git cve/linux-5.3-LTSS in git SLE15-SP2-EB ignored (too low score) SLE12-SP5 in git cve/linux-4.4-LTSS in git SLE11-SP4-LTSS skipped (not affected [1]) Since the tcindex (and any other net/sched blacklisted module) will now fail to autoload, it may deteriorate UX ("RTNETLINK answers: No such file or directory"), I'd suggest patching iproute2 in a similar fashion like libmount [2] to guide users. (FYI, Michal Kubeček as a maintainer :) but it out of the scope of this bug.) Let me reassigned back to security as per process. --- [1] I ran the reproducer attachment 868339 [details] patched for SLE11-SP4-LTSS tc filter add dev lo parent 1: protocol ip prio 1 \ - handle 10 tcindex mask 0xFFFF shift 10 classid 1:1 action drop + handle 10 tcindex mask 0xFFFF shift 10 classid 1:1 police drop on 3.0.101-108.150-default and it passed ~30000 iterations of the loop. The delete path has no RCU in 3.0 kernel (see also comment 16). With that info, I'd conclude that SLE11-SP4-LTSS is not affected by this CVE. [2] https://build.opensuse.org/projects/openSUSE:Factory/packages/util-linux/files/libmount-print-a-blacklist-hint-for-unknown-filesyst.patch?expand=1
SUSE-SU-2024:1979-1: An update that solves 180 vulnerabilities and has 18 security fixes can now be installed. Category: security (important) Bug References: 1065729, 1101816, 1181674, 1185902, 1187716, 1188616, 1190317, 1190795, 1191452, 1194591, 1197760, 1206213, 1206646, 1207186, 1209657, 1210335, 1215702, 1216702, 1217169, 1217519, 1220487, 1220854, 1220928, 1221044, 1221081, 1221086, 1221977, 1221994, 1222619, 1222627, 1222667, 1222671, 1222893, 1222894, 1223023, 1223046, 1223048, 1223084, 1223138, 1223207, 1223360, 1223384, 1223633, 1223653, 1223666, 1223671, 1223738, 1223752, 1223834, 1223922, 1223932, 1223948, 1224096, 1224174, 1224181, 1224347, 1224482, 1224511, 1224525, 1224566, 1224580, 1224592, 1224601, 1224607, 1224621, 1224644, 1224645, 1224648, 1224650, 1224663, 1224671, 1224676, 1224680, 1224682, 1224725, 1224728, 1224733, 1224738, 1224747, 1224749, 1224759, 1224803, 1224827, 1224830, 1224831, 1224834, 1224838, 1224841, 1224844, 1224846, 1224847, 1224849, 1224854, 1224859, 1224867, 1224880, 1224882, 1224888, 1224889, 1224892, 1224893, 1224899, 1224904, 1224907, 1224916, 1224917, 1224922, 1224926, 1224930, 1224931, 1224942, 1224954, 1224957, 1224959, 1224960, 1224961, 1224963, 1224966, 1224968, 1224981, 1224982, 1224983, 1224987, 1224990, 1224996, 1225008, 1225009, 1225010, 1225022, 1225026, 1225030, 1225054, 1225058, 1225059, 1225060, 1225062, 1225082, 1225084, 1225086, 1225092, 1225096, 1225112, 1225124, 1225128, 1225132, 1225141, 1225143, 1225144, 1225151, 1225153, 1225155, 1225157, 1225164, 1225177, 1225189, 1225192, 1225193, 1225198, 1225201, 1225207, 1225208, 1225222, 1225230, 1225242, 1225244, 1225247, 1225251, 1225252, 1225256, 1225303, 1225318, 1225322, 1225329, 1225330, 1225336, 1225347, 1225351, 1225354, 1225355, 1225360, 1225366, 1225367, 1225384, 1225390, 1225404, 1225409, 1225411, 1225438, 1225453, 1225479, 1225482, 1225506, 1225549, 1225560, 1225572, 1225640, 1225708, 1225764 CVE References: CVE-2021-46933, CVE-2021-47074, CVE-2021-47162, CVE-2021-47171, CVE-2021-47188, CVE-2021-47206, CVE-2021-47220, CVE-2021-47229, CVE-2021-47231, CVE-2021-47235, CVE-2021-47236, CVE-2021-47237, CVE-2021-47238, CVE-2021-47239, CVE-2021-47245, CVE-2021-47246, CVE-2021-47248, CVE-2021-47249, CVE-2021-47250, CVE-2021-47252, CVE-2021-47254, CVE-2021-47258, CVE-2021-47260, CVE-2021-47261, CVE-2021-47265, CVE-2021-47269, CVE-2021-47274, CVE-2021-47276, CVE-2021-47277, CVE-2021-47280, CVE-2021-47281, CVE-2021-47284, CVE-2021-47285, CVE-2021-47288, CVE-2021-47301, CVE-2021-47302, CVE-2021-47305, CVE-2021-47307, CVE-2021-47308, CVE-2021-47310, CVE-2021-47311, CVE-2021-47314, CVE-2021-47315, CVE-2021-47319, CVE-2021-47320, CVE-2021-47321, CVE-2021-47323, CVE-2021-47324, CVE-2021-47330, CVE-2021-47334, CVE-2021-47337, CVE-2021-47343, CVE-2021-47344, CVE-2021-47345, CVE-2021-47347, CVE-2021-47352, CVE-2021-47353, CVE-2021-47355, CVE-2021-47356, CVE-2021-47357, CVE-2021-47361, CVE-2021-47362, CVE-2021-47369, CVE-2021-47375, CVE-2021-47378, CVE-2021-47382, CVE-2021-47383, CVE-2021-47391, CVE-2021-47397, CVE-2021-47400, CVE-2021-47401, CVE-2021-47404, CVE-2021-47409, CVE-2021-47416, CVE-2021-47423, CVE-2021-47424, CVE-2021-47431, CVE-2021-47435, CVE-2021-47436, CVE-2021-47456, CVE-2021-47458, CVE-2021-47460, CVE-2021-47469, CVE-2021-47472, CVE-2021-47473, CVE-2021-47478, CVE-2021-47480, CVE-2021-47483, CVE-2021-47485, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47500, CVE-2021-47506, CVE-2021-47509, CVE-2021-47511, CVE-2021-47523, CVE-2021-47541, CVE-2021-47548, CVE-2021-47565, CVE-2022-48686, CVE-2022-48697, CVE-2022-48704, CVE-2022-48708, CVE-2022-48710, CVE-2023-0160, CVE-2023-1829, CVE-2023-42755, CVE-2023-47233, CVE-2023-52527, CVE-2023-52586, CVE-2023-52591, CVE-2023-52655, CVE-2023-52664, CVE-2023-52685, CVE-2023-52686, CVE-2023-52691, CVE-2023-52696, CVE-2023-52698, CVE-2023-52703, CVE-2023-52730, CVE-2023-52732, CVE-2023-52741, CVE-2023-52742, CVE-2023-52747, CVE-2023-52759, CVE-2023-52774, CVE-2023-52781, CVE-2023-52796, CVE-2023-52803, CVE-2023-52821, CVE-2023-52864, CVE-2023-52865, CVE-2023-52867, CVE-2023-52875, CVE-2023-52880, CVE-2024-26625, CVE-2024-26752, CVE-2024-26775, CVE-2024-26828, CVE-2024-26846, CVE-2024-26874, CVE-2024-26900, CVE-2024-26915, CVE-2024-26920, CVE-2024-26921, CVE-2024-26934, CVE-2024-26957, CVE-2024-26958, CVE-2024-26984, CVE-2024-26996, CVE-2024-27059, CVE-2024-27062, CVE-2024-27396, CVE-2024-27398, CVE-2024-27401, CVE-2024-27419, CVE-2024-27436, CVE-2024-35789, CVE-2024-35791, CVE-2024-35809, CVE-2024-35811, CVE-2024-35830, CVE-2024-35849, CVE-2024-35877, CVE-2024-35878, CVE-2024-35887, CVE-2024-35895, CVE-2024-35914, CVE-2024-35932, CVE-2024-35935, CVE-2024-35936, CVE-2024-35944, CVE-2024-35955, CVE-2024-35969, CVE-2024-35982, CVE-2024-35984, CVE-2024-36015, CVE-2024-36029, CVE-2024-36954 Maintenance Incident: [SUSE:Maintenance:34205](https://smelt.suse.de/incident/34205/) Sources used: SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): kernel-syms-azure-4.12.14-16.188.1, kernel-source-azure-4.12.14-16.188.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): kernel-syms-azure-4.12.14-16.188.1, kernel-source-azure-4.12.14-16.188.1 SUSE Linux Enterprise Server 12 SP5 (src): kernel-syms-azure-4.12.14-16.188.1, kernel-source-azure-4.12.14-16.188.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:1983-1: An update that solves 199 vulnerabilities and has 26 security fixes can now be installed. Category: security (important) Bug References: 1065729, 1101816, 1141539, 1181674, 1185902, 1187716, 1188616, 1190317, 1190795, 1191452, 1194591, 1197760, 1197894, 1203935, 1206213, 1206646, 1207186, 1209657, 1210335, 1215702, 1216702, 1217169, 1217519, 1218917, 1220487, 1220513, 1220854, 1220928, 1221044, 1221081, 1221086, 1221543, 1221545, 1221816, 1221977, 1221994, 1222559, 1222619, 1222627, 1222667, 1222671, 1222793, 1222893, 1222894, 1223023, 1223046, 1223048, 1223084, 1223119, 1223138, 1223207, 1223360, 1223384, 1223432, 1223509, 1223512, 1223539, 1223540, 1223626, 1223627, 1223633, 1223653, 1223666, 1223671, 1223712, 1223715, 1223738, 1223744, 1223752, 1223802, 1223819, 1223834, 1223922, 1223923, 1223931, 1223932, 1223948, 1223969, 1224096, 1224174, 1224181, 1224347, 1224482, 1224511, 1224525, 1224566, 1224580, 1224592, 1224601, 1224607, 1224621, 1224644, 1224645, 1224648, 1224650, 1224663, 1224671, 1224676, 1224680, 1224682, 1224725, 1224728, 1224733, 1224738, 1224747, 1224749, 1224759, 1224803, 1224827, 1224830, 1224831, 1224834, 1224838, 1224841, 1224844, 1224846, 1224847, 1224849, 1224854, 1224859, 1224867, 1224880, 1224882, 1224888, 1224889, 1224892, 1224893, 1224899, 1224904, 1224907, 1224916, 1224917, 1224922, 1224926, 1224930, 1224931, 1224942, 1224954, 1224956, 1224957, 1224959, 1224960, 1224961, 1224963, 1224966, 1224968, 1224981, 1224982, 1224983, 1224987, 1224990, 1224996, 1225008, 1225009, 1225010, 1225022, 1225026, 1225030, 1225054, 1225058, 1225059, 1225060, 1225062, 1225082, 1225084, 1225086, 1225092, 1225096, 1225112, 1225124, 1225128, 1225132, 1225141, 1225143, 1225144, 1225151, 1225153, 1225155, 1225157, 1225164, 1225177, 1225189, 1225192, 1225193, 1225198, 1225201, 1225207, 1225208, 1225222, 1225230, 1225242, 1225244, 1225247, 1225251, 1225252, 1225256, 1225303, 1225318, 1225322, 1225329, 1225330, 1225336, 1225347, 1225351, 1225354, 1225355, 1225360, 1225366, 1225367, 1225384, 1225390, 1225404, 1225409, 1225411, 1225438, 1225453, 1225479, 1225482, 1225506, 1225549, 1225560, 1225572, 1225640, 1225708, 1225764 CVE References: CVE-2021-46933, CVE-2021-46955, CVE-2021-47074, CVE-2021-47113, CVE-2021-47131, CVE-2021-47162, CVE-2021-47171, CVE-2021-47188, CVE-2021-47206, CVE-2021-47220, CVE-2021-47229, CVE-2021-47231, CVE-2021-47235, CVE-2021-47236, CVE-2021-47237, CVE-2021-47238, CVE-2021-47239, CVE-2021-47245, CVE-2021-47246, CVE-2021-47248, CVE-2021-47249, CVE-2021-47250, CVE-2021-47252, CVE-2021-47254, CVE-2021-47258, CVE-2021-47260, CVE-2021-47261, CVE-2021-47265, CVE-2021-47269, CVE-2021-47274, CVE-2021-47276, CVE-2021-47277, CVE-2021-47280, CVE-2021-47281, CVE-2021-47284, CVE-2021-47285, CVE-2021-47288, CVE-2021-47301, CVE-2021-47302, CVE-2021-47305, CVE-2021-47307, CVE-2021-47308, CVE-2021-47310, CVE-2021-47311, CVE-2021-47314, CVE-2021-47315, CVE-2021-47319, CVE-2021-47320, CVE-2021-47321, CVE-2021-47323, CVE-2021-47324, CVE-2021-47330, CVE-2021-47334, CVE-2021-47337, CVE-2021-47343, CVE-2021-47344, CVE-2021-47345, CVE-2021-47347, CVE-2021-47352, CVE-2021-47353, CVE-2021-47355, CVE-2021-47356, CVE-2021-47357, CVE-2021-47361, CVE-2021-47362, CVE-2021-47369, CVE-2021-47375, CVE-2021-47378, CVE-2021-47382, CVE-2021-47383, CVE-2021-47391, CVE-2021-47397, CVE-2021-47400, CVE-2021-47401, CVE-2021-47404, CVE-2021-47409, CVE-2021-47416, CVE-2021-47423, CVE-2021-47424, CVE-2021-47431, CVE-2021-47435, CVE-2021-47436, CVE-2021-47456, CVE-2021-47458, CVE-2021-47460, CVE-2021-47469, CVE-2021-47472, CVE-2021-47473, CVE-2021-47478, CVE-2021-47480, CVE-2021-47483, CVE-2021-47485, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47500, CVE-2021-47506, CVE-2021-47509, CVE-2021-47511, CVE-2021-47523, CVE-2021-47541, CVE-2021-47548, CVE-2021-47565, CVE-2022-48636, CVE-2022-48650, CVE-2022-48672, CVE-2022-48686, CVE-2022-48697, CVE-2022-48702, CVE-2022-48704, CVE-2022-48708, CVE-2022-48710, CVE-2023-0160, CVE-2023-1829, CVE-2023-42755, CVE-2023-47233, CVE-2023-52527, CVE-2023-52586, CVE-2023-52591, CVE-2023-52646, CVE-2023-52653, CVE-2023-52655, CVE-2023-52664, CVE-2023-52685, CVE-2023-52686, CVE-2023-52691, CVE-2023-52696, CVE-2023-52698, CVE-2023-52703, CVE-2023-52730, CVE-2023-52732, CVE-2023-52741, CVE-2023-52742, CVE-2023-52747, CVE-2023-52759, CVE-2023-52774, CVE-2023-52781, CVE-2023-52796, CVE-2023-52803, CVE-2023-52821, CVE-2023-52864, CVE-2023-52865, CVE-2023-52867, CVE-2023-52875, CVE-2023-52880, CVE-2024-0639, CVE-2024-26625, CVE-2024-26739, CVE-2024-26752, CVE-2024-26775, CVE-2024-26791, CVE-2024-26828, CVE-2024-26846, CVE-2024-26874, CVE-2024-26876, CVE-2024-26900, CVE-2024-26915, CVE-2024-26920, CVE-2024-26921, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26934, CVE-2024-26957, CVE-2024-26958, CVE-2024-26984, CVE-2024-26996, CVE-2024-27008, CVE-2024-27054, CVE-2024-27059, CVE-2024-27062, CVE-2024-27388, CVE-2024-27396, CVE-2024-27398, CVE-2024-27401, CVE-2024-27419, CVE-2024-27436, CVE-2024-35789, CVE-2024-35791, CVE-2024-35809, CVE-2024-35811, CVE-2024-35830, CVE-2024-35849, CVE-2024-35877, CVE-2024-35878, CVE-2024-35887, CVE-2024-35895, CVE-2024-35914, CVE-2024-35932, CVE-2024-35935, CVE-2024-35936, CVE-2024-35944, CVE-2024-35955, CVE-2024-35969, CVE-2024-35982, CVE-2024-35984, CVE-2024-36015, CVE-2024-36029, CVE-2024-36954 Maintenance Incident: [SUSE:Maintenance:34218](https://smelt.suse.de/incident/34218/) Sources used: SUSE Linux Enterprise Real Time 12 SP5 (src): kernel-syms-rt-4.12.14-10.188.1, kernel-source-rt-4.12.14-10.188.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:2008-1: An update that solves 561 vulnerabilities, contains two features and has 39 security fixes can now be installed. Category: security (important) Bug References: 1065729, 1141539, 1174585, 1181674, 1187716, 1190569, 1191949, 1192107, 1193983, 1194288, 1194869, 1196956, 1197915, 1200465, 1205205, 1207284, 1207361, 1207948, 1208149, 1209657, 1209799, 1209834, 1209980, 1210335, 1213863, 1214852, 1215322, 1215702, 1216358, 1216702, 1217169, 1217339, 1217515, 1218447, 1220021, 1220267, 1220363, 1220783, 1221044, 1221081, 1221615, 1221777, 1221816, 1221829, 1222011, 1222374, 1222385, 1222413, 1222464, 1222513, 1222559, 1222561, 1222608, 1222619, 1222627, 1222721, 1222765, 1222770, 1222783, 1222793, 1222838, 1222870, 1222893, 1222960, 1222961, 1222974, 1222975, 1222976, 1223011, 1223023, 1223027, 1223031, 1223043, 1223046, 1223048, 1223049, 1223084, 1223113, 1223119, 1223137, 1223138, 1223140, 1223188, 1223203, 1223207, 1223315, 1223360, 1223384, 1223390, 1223432, 1223489, 1223505, 1223532, 1223575, 1223595, 1223626, 1223627, 1223628, 1223631, 1223633, 1223638, 1223650, 1223653, 1223666, 1223670, 1223671, 1223675, 1223677, 1223678, 1223679, 1223698, 1223712, 1223715, 1223717, 1223718, 1223737, 1223738, 1223741, 1223744, 1223747, 1223748, 1223750, 1223752, 1223754, 1223756, 1223757, 1223762, 1223769, 1223770, 1223779, 1223780, 1223781, 1223788, 1223802, 1223819, 1223823, 1223826, 1223828, 1223829, 1223837, 1223842, 1223843, 1223844, 1223847, 1223858, 1223875, 1223879, 1223895, 1223959, 1223961, 1223991, 1223996, 1224020, 1224076, 1224096, 1224098, 1224099, 1224137, 1224166, 1224174, 1224177, 1224180, 1224181, 1224187, 1224331, 1224346, 1224423, 1224432, 1224437, 1224438, 1224442, 1224443, 1224445, 1224449, 1224479, 1224482, 1224487, 1224488, 1224492, 1224494, 1224495, 1224502, 1224508, 1224509, 1224511, 1224519, 1224524, 1224525, 1224530, 1224531, 1224534, 1224535, 1224537, 1224541, 1224543, 1224549, 1224550, 1224558, 1224559, 1224566, 1224567, 1224571, 1224575, 1224576, 1224579, 1224580, 1224581, 1224582, 1224586, 1224587, 1224592, 1224598, 1224601, 1224607, 1224608, 1224611, 1224615, 1224617, 1224618, 1224621, 1224622, 1224624, 1224627, 1224628, 1224629, 1224632, 1224636, 1224637, 1224638, 1224640, 1224643, 1224644, 1224645, 1224647, 1224648, 1224649, 1224650, 1224651, 1224657, 1224659, 1224660, 1224663, 1224664, 1224665, 1224666, 1224667, 1224668, 1224671, 1224672, 1224676, 1224678, 1224679, 1224680, 1224681, 1224682, 1224685, 1224686, 1224692, 1224697, 1224699, 1224701, 1224703, 1224705, 1224707, 1224717, 1224718, 1224721, 1224722, 1224723, 1224725, 1224727, 1224728, 1224729, 1224730, 1224731, 1224732, 1224733, 1224736, 1224738, 1224739, 1224740, 1224747, 1224749, 1224759, 1224763, 1224764, 1224765, 1224766, 1224794, 1224795, 1224796, 1224803, 1224816, 1224895, 1224898, 1224900, 1224901, 1224902, 1224903, 1224904, 1224905, 1224907, 1224909, 1224910, 1224911, 1224912, 1224913, 1224914, 1224915, 1224920, 1224928, 1224929, 1224930, 1224931, 1224932, 1224936, 1224937, 1224941, 1224942, 1224944, 1224945, 1224947, 1224956, 1224988, 1224992, 1225000, 1225003, 1225005, 1225008, 1225009, 1225022, 1225031, 1225032, 1225036, 1225041, 1225044, 1225053, 1225076, 1225077, 1225082, 1225085, 1225086, 1225092, 1225095, 1225096, 1225097, 1225106, 1225108, 1225109, 1225114, 1225118, 1225121, 1225122, 1225123, 1225125, 1225126, 1225127, 1225129, 1225131, 1225132, 1225138, 1225139, 1225145, 1225151, 1225153, 1225156, 1225158, 1225160, 1225161, 1225164, 1225167, 1225180, 1225183, 1225184, 1225186, 1225187, 1225189, 1225190, 1225191, 1225192, 1225193, 1225195, 1225198, 1225201, 1225203, 1225205, 1225206, 1225207, 1225208, 1225209, 1225210, 1225214, 1225222, 1225223, 1225224, 1225225, 1225227, 1225228, 1225229, 1225230, 1225232, 1225233, 1225235, 1225236, 1225237, 1225238, 1225239, 1225240, 1225241, 1225242, 1225243, 1225244, 1225245, 1225246, 1225247, 1225248, 1225249, 1225250, 1225251, 1225252, 1225253, 1225254, 1225255, 1225256, 1225257, 1225258, 1225259, 1225260, 1225261, 1225262, 1225263, 1225268, 1225301, 1225303, 1225304, 1225306, 1225316, 1225318, 1225320, 1225321, 1225322, 1225323, 1225326, 1225327, 1225328, 1225329, 1225330, 1225331, 1225332, 1225333, 1225334, 1225335, 1225336, 1225337, 1225338, 1225339, 1225341, 1225342, 1225344, 1225346, 1225347, 1225351, 1225353, 1225354, 1225355, 1225357, 1225358, 1225360, 1225361, 1225366, 1225367, 1225368, 1225369, 1225370, 1225372, 1225373, 1225374, 1225375, 1225376, 1225377, 1225379, 1225380, 1225382, 1225383, 1225384, 1225386, 1225387, 1225388, 1225390, 1225392, 1225393, 1225396, 1225400, 1225404, 1225405, 1225408, 1225409, 1225410, 1225411, 1225424, 1225425, 1225427, 1225431, 1225435, 1225436, 1225437, 1225438, 1225439, 1225441, 1225442, 1225443, 1225444, 1225445, 1225446, 1225447, 1225450, 1225453, 1225455, 1225461, 1225463, 1225464, 1225466, 1225467, 1225468, 1225471, 1225472, 1225478, 1225479, 1225480, 1225482, 1225483, 1225486, 1225488, 1225490, 1225492, 1225495, 1225499, 1225500, 1225501, 1225502, 1225506, 1225508, 1225510, 1225513, 1225515, 1225529, 1225530, 1225532, 1225534, 1225535, 1225548, 1225549, 1225550, 1225553, 1225554, 1225555, 1225556, 1225557, 1225559, 1225560, 1225565, 1225566, 1225568, 1225569, 1225570, 1225571, 1225572, 1225577, 1225583, 1225584, 1225587, 1225588, 1225589, 1225590, 1225591, 1225592, 1225593, 1225595, 1225599, 1225616, 1225640, 1225642, 1225705, 1225708, 1225715, 1225720, 1225722, 1225734, 1225735, 1225747, 1225748, 1225756, 1225761, 1225766, 1225775, 1225810, 1225820, 1225829, 1225835, 1225842 CVE References: CVE-2020-36788, CVE-2021-39698, CVE-2021-4148, CVE-2021-42327, CVE-2021-43056, CVE-2021-47200, CVE-2021-47358, CVE-2021-47359, CVE-2021-47360, CVE-2021-47361, CVE-2021-47362, CVE-2021-47363, CVE-2021-47364, CVE-2021-47365, CVE-2021-47366, CVE-2021-47367, CVE-2021-47368, CVE-2021-47369, CVE-2021-47370, CVE-2021-47371, CVE-2021-47372, CVE-2021-47373, CVE-2021-47374, CVE-2021-47375, CVE-2021-47376, CVE-2021-47378, CVE-2021-47379, CVE-2021-47380, CVE-2021-47381, CVE-2021-47382, CVE-2021-47383, CVE-2021-47384, CVE-2021-47385, CVE-2021-47386, CVE-2021-47387, CVE-2021-47388, CVE-2021-47389, CVE-2021-47390, CVE-2021-47391, CVE-2021-47392, CVE-2021-47393, CVE-2021-47394, CVE-2021-47395, CVE-2021-47396, CVE-2021-47397, CVE-2021-47398, CVE-2021-47399, CVE-2021-47400, CVE-2021-47401, CVE-2021-47402, CVE-2021-47403, CVE-2021-47404, CVE-2021-47405, CVE-2021-47406, CVE-2021-47407, CVE-2021-47408, CVE-2021-47409, CVE-2021-47410, CVE-2021-47412, CVE-2021-47413, CVE-2021-47414, CVE-2021-47415, CVE-2021-47416, CVE-2021-47417, CVE-2021-47418, CVE-2021-47419, CVE-2021-47420, CVE-2021-47421, CVE-2021-47422, CVE-2021-47423, CVE-2021-47424, CVE-2021-47425, CVE-2021-47426, CVE-2021-47427, CVE-2021-47428, CVE-2021-47429, CVE-2021-47430, CVE-2021-47431, CVE-2021-47433, CVE-2021-47434, CVE-2021-47435, CVE-2021-47436, CVE-2021-47437, CVE-2021-47438, CVE-2021-47439, CVE-2021-47440, CVE-2021-47441, CVE-2021-47442, CVE-2021-47443, CVE-2021-47444, CVE-2021-47445, CVE-2021-47446, CVE-2021-47447, CVE-2021-47448, CVE-2021-47449, CVE-2021-47450, CVE-2021-47451, CVE-2021-47452, CVE-2021-47453, CVE-2021-47454, CVE-2021-47455, CVE-2021-47456, CVE-2021-47457, CVE-2021-47458, CVE-2021-47459, CVE-2021-47460, CVE-2021-47461, CVE-2021-47462, CVE-2021-47463, CVE-2021-47464, CVE-2021-47465, CVE-2021-47466, CVE-2021-47467, CVE-2021-47468, CVE-2021-47469, CVE-2021-47470, CVE-2021-47471, CVE-2021-47472, CVE-2021-47473, CVE-2021-47474, CVE-2021-47475, CVE-2021-47476, CVE-2021-47477, CVE-2021-47478, CVE-2021-47479, CVE-2021-47480, CVE-2021-47481, CVE-2021-47482, CVE-2021-47483, CVE-2021-47484, CVE-2021-47485, CVE-2021-47486, CVE-2021-47488, CVE-2021-47489, CVE-2021-47490, CVE-2021-47491, CVE-2021-47492, CVE-2021-47493, CVE-2021-47494, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47498, CVE-2021-47499, CVE-2021-47500, CVE-2021-47501, CVE-2021-47502, CVE-2021-47503, CVE-2021-47504, CVE-2021-47505, CVE-2021-47506, CVE-2021-47507, CVE-2021-47508, CVE-2021-47509, CVE-2021-47510, CVE-2021-47511, CVE-2021-47512, CVE-2021-47513, CVE-2021-47514, CVE-2021-47516, CVE-2021-47518, CVE-2021-47520, CVE-2021-47521, CVE-2021-47522, CVE-2021-47523, CVE-2021-47524, CVE-2021-47525, CVE-2021-47526, CVE-2021-47527, CVE-2021-47528, CVE-2021-47529, CVE-2021-47530, CVE-2021-47531, CVE-2021-47532, CVE-2021-47533, CVE-2021-47534, CVE-2021-47535, CVE-2021-47536, CVE-2021-47537, CVE-2021-47540, CVE-2021-47541, CVE-2021-47542, CVE-2021-47544, CVE-2021-47548, CVE-2021-47549, CVE-2021-47550, CVE-2021-47551, CVE-2021-47552, CVE-2021-47553, CVE-2021-47554, CVE-2021-47555, CVE-2021-47556, CVE-2021-47557, CVE-2021-47558, CVE-2021-47559, CVE-2021-47560, CVE-2021-47562, CVE-2021-47563, CVE-2021-47564, CVE-2021-47565, CVE-2021-47569, CVE-2022-48633, CVE-2022-48662, CVE-2022-48669, CVE-2022-48689, CVE-2022-48691, CVE-2022-48699, CVE-2022-48705, CVE-2022-48708, CVE-2022-48709, CVE-2022-48710, CVE-2023-0160, CVE-2023-1829, CVE-2023-42755, CVE-2023-47233, CVE-2023-52586, CVE-2023-52591, CVE-2023-52618, CVE-2023-52642, CVE-2023-52643, CVE-2023-52644, CVE-2023-52646, CVE-2023-52650, CVE-2023-52653, CVE-2023-52654, CVE-2023-52655, CVE-2023-52656, CVE-2023-52657, CVE-2023-52659, CVE-2023-52660, CVE-2023-52661, CVE-2023-52662, CVE-2023-52664, CVE-2023-52669, CVE-2023-52671, CVE-2023-52674, CVE-2023-52676, CVE-2023-52678, CVE-2023-52679, CVE-2023-52680, CVE-2023-52683, CVE-2023-52685, CVE-2023-52686, CVE-2023-52690, CVE-2023-52691, CVE-2023-52692, CVE-2023-52693, CVE-2023-52694, CVE-2023-52696, CVE-2023-52698, CVE-2023-52699, CVE-2023-52702, CVE-2023-52703, CVE-2023-52705, CVE-2023-52707, CVE-2023-52708, CVE-2023-52730, CVE-2023-52731, CVE-2023-52732, CVE-2023-52733, CVE-2023-52736, CVE-2023-52738, CVE-2023-52739, CVE-2023-52740, CVE-2023-52741, CVE-2023-52742, CVE-2023-52743, CVE-2023-52744, CVE-2023-52745, CVE-2023-52746, CVE-2023-52747, CVE-2023-52753, CVE-2023-52754, CVE-2023-52756, CVE-2023-52757, CVE-2023-52759, CVE-2023-52763, CVE-2023-52764, CVE-2023-52766, CVE-2023-52773, CVE-2023-52774, CVE-2023-52777, CVE-2023-52781, CVE-2023-52788, CVE-2023-52789, CVE-2023-52791, CVE-2023-52795, CVE-2023-52796, CVE-2023-52798, CVE-2023-52799, CVE-2023-52800, CVE-2023-52803, CVE-2023-52804, CVE-2023-52805, CVE-2023-52806, CVE-2023-52807, CVE-2023-52808, CVE-2023-52809, CVE-2023-52810, CVE-2023-52811, CVE-2023-52814, CVE-2023-52815, CVE-2023-52816, CVE-2023-52817, CVE-2023-52818, CVE-2023-52819, CVE-2023-52821, CVE-2023-52825, CVE-2023-52826, CVE-2023-52832, CVE-2023-52833, CVE-2023-52834, CVE-2023-52838, CVE-2023-52840, CVE-2023-52841, CVE-2023-52844, CVE-2023-52847, CVE-2023-52851, CVE-2023-52853, CVE-2023-52854, CVE-2023-52855, CVE-2023-52856, CVE-2023-52858, CVE-2023-52860, CVE-2023-52861, CVE-2023-52864, CVE-2023-52865, CVE-2023-52867, CVE-2023-52868, CVE-2023-52870, CVE-2023-52871, CVE-2023-52872, CVE-2023-52873, CVE-2023-52875, CVE-2023-52876, CVE-2023-52877, CVE-2023-52878, CVE-2023-52880, CVE-2023-6531, CVE-2024-2201, CVE-2024-26597, CVE-2024-26643, CVE-2024-26679, CVE-2024-26692, CVE-2024-26698, CVE-2024-26700, CVE-2024-26715, CVE-2024-26739, CVE-2024-26742, CVE-2024-26748, CVE-2024-26758, CVE-2024-26764, CVE-2024-26775, CVE-2024-26777, CVE-2024-26778, CVE-2024-26788, CVE-2024-26791, CVE-2024-26801, CVE-2024-26822, CVE-2024-26828, CVE-2024-26829, CVE-2024-26838, CVE-2024-26839, CVE-2024-26840, CVE-2024-26846, CVE-2024-26859, CVE-2024-26870, CVE-2024-26874, CVE-2024-26876, CVE-2024-26877, CVE-2024-26880, CVE-2024-26889, CVE-2024-26894, CVE-2024-26900, CVE-2024-26907, CVE-2024-26915, CVE-2024-26916, CVE-2024-26919, CVE-2024-26920, CVE-2024-26921, CVE-2024-26922, CVE-2024-26925, CVE-2024-26928, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26933, CVE-2024-26934, CVE-2024-269355, CVE-2024-26937, CVE-2024-26938, CVE-2024-26939, CVE-2024-26940, CVE-2024-26943, CVE-2024-26957, CVE-2024-26958, CVE-2024-26964, CVE-2024-26974, CVE-2024-26977, CVE-2024-26979, CVE-2024-26984, CVE-2024-26988, CVE-2024-26989, CVE-2024-26994, CVE-2024-26996, CVE-2024-26997, CVE-2024-26999, CVE-2024-27000, CVE-2024-27001, CVE-2024-27004, CVE-2024-27008, CVE-2024-27028, CVE-2024-27037, CVE-2024-27042, CVE-2024-27045, CVE-2024-27047, CVE-2024-27051, CVE-2024-27052, CVE-2024-27053, CVE-2024-27054, CVE-2024-27059, CVE-2024-27072, CVE-2024-27073, CVE-2024-27074, CVE-2024-27075, CVE-2024-27076, CVE-2024-27077, CVE-2024-27078, CVE-2024-27388, CVE-2024-27393, CVE-2024-27395, CVE-2024-27396, CVE-2024-27398, CVE-2024-27399, CVE-2024-27400, CVE-2024-27401, CVE-2024-27405, CVE-2024-27410, CVE-2024-27412, CVE-2024-27413, CVE-2024-27416, CVE-2024-27417, CVE-2024-27419, CVE-2024-27431, CVE-2024-27435, CVE-2024-27436, CVE-2024-35789, CVE-2024-35791, CVE-2024-35796, CVE-2024-35799, CVE-2024-35801, CVE-2024-35804, CVE-2024-35806, CVE-2024-35809, CVE-2024-35811, CVE-2024-35812, CVE-2024-35813, CVE-2024-35815, CVE-2024-35817, CVE-2024-35821, CVE-2024-35822, CVE-2024-35823, CVE-2024-35825, CVE-2024-35828, CVE-2024-35829, CVE-2024-35830, CVE-2024-35833, CVE-2024-35845, CVE-2024-35847, CVE-2024-35849, CVE-2024-35851, CVE-2024-35852, CVE-2024-35854, CVE-2024-35860, CVE-2024-35861, CVE-2024-35862, CVE-2024-35863, CVE-2024-35864, CVE-2024-35865, CVE-2024-35866, CVE-2024-35867, CVE-2024-35868, CVE-2024-35869, CVE-2024-35870, CVE-2024-35872, CVE-2024-35875, CVE-2024-35877, CVE-2024-35878, CVE-2024-35879, CVE-2024-35885, CVE-2024-35887, CVE-2024-35895, CVE-2024-35901, CVE-2024-35904, CVE-2024-35905, CVE-2024-35907, CVE-2024-35912, CVE-2024-35914, CVE-2024-35915, CVE-2024-35922, CVE-2024-35924, CVE-2024-35930, CVE-2024-35932, CVE-2024-35933, CVE-2024-35935, CVE-2024-35936, CVE-2024-35938, CVE-2024-35939, CVE-2024-35940, CVE-2024-35943, CVE-2024-35944, CVE-2024-35947, CVE-2024-35950, CVE-2024-35951, CVE-2024-35952, CVE-2024-35955, CVE-2024-35959, CVE-2024-35963, CVE-2024-35964, CVE-2024-35965, CVE-2024-35966, CVE-2024-35967, CVE-2024-35969, CVE-2024-35973, CVE-2024-35976, CVE-2024-35978, CVE-2024-35982, CVE-2024-35984, CVE-2024-35989, CVE-2024-35990, CVE-2024-35998, CVE-2024-35999, CVE-2024-36006, CVE-2024-36007, CVE-2024-36012, CVE-2024-36014, CVE-2024-36015, CVE-2024-36016, CVE-2024-36026, CVE-2024-36029, CVE-2024-36032, CVE-2024-36880, CVE-2024-36893, CVE-2024-36896, CVE-2024-36897, CVE-2024-36906, CVE-2024-36918, CVE-2024-36924, CVE-2024-36926, CVE-2024-36928, CVE-2024-36931, CVE-2024-36938, CVE-2024-36940, CVE-2024-36941, CVE-2024-36942, CVE-2024-36944, CVE-2024-36947, CVE-2024-36950, CVE-2024-36952, CVE-2024-36955, CVE-2024-36959 Jira References: PED-3259, PED-7167 Maintenance Incident: [SUSE:Maintenance:34217](https://smelt.suse.de/incident/34217/) Sources used: openSUSE Leap 15.5 (src): kernel-livepatch-SLE15-SP5-RT_Update_16-1-150500.11.3.1, kernel-syms-rt-5.14.21-150500.13.58.1, kernel-source-rt-5.14.21-150500.13.58.1 SUSE Linux Enterprise Micro 5.5 (src): kernel-source-rt-5.14.21-150500.13.58.1 SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5-RT_Update_16-1-150500.11.3.1 SUSE Real Time Module 15-SP5 (src): kernel-syms-rt-5.14.21-150500.13.58.1, kernel-source-rt-5.14.21-150500.13.58.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:2010-1: An update that solves 186 vulnerabilities and has 27 security fixes can now be installed. Category: security (important) Bug References: 1065729, 1151927, 1152472, 1154353, 1156395, 1174585, 1176447, 1176774, 1176869, 1178134, 1181147, 1184631, 1185589, 1185902, 1186885, 1188616, 1188772, 1189883, 1190795, 1191452, 1192107, 1194288, 1194591, 1196956, 1197760, 1198029, 1199304, 1200619, 1203389, 1206646, 1209657, 1210335, 1210629, 1213476, 1215420, 1216702, 1217169, 1220137, 1220144, 1220754, 1220877, 1220960, 1221044, 1221113, 1221829, 1222251, 1222619, 1222838, 1222867, 1223084, 1223138, 1223384, 1223390, 1223512, 1223626, 1223715, 1223932, 1223934, 1224099, 1224174, 1224438, 1224482, 1224511, 1224592, 1224816, 1224826, 1224830, 1224831, 1224832, 1224834, 1224841, 1224842, 1224843, 1224844, 1224846, 1224849, 1224852, 1224853, 1224854, 1224859, 1224882, 1224886, 1224888, 1224889, 1224891, 1224892, 1224893, 1224899, 1224904, 1224907, 1224909, 1224916, 1224917, 1224922, 1224923, 1224924, 1224926, 1224928, 1224953, 1224954, 1224955, 1224957, 1224961, 1224963, 1224965, 1224966, 1224968, 1224981, 1224982, 1224983, 1224984, 1224987, 1224990, 1224993, 1224996, 1224997, 1225026, 1225030, 1225058, 1225060, 1225083, 1225084, 1225091, 1225112, 1225113, 1225128, 1225140, 1225143, 1225148, 1225155, 1225164, 1225177, 1225178, 1225181, 1225192, 1225193, 1225198, 1225201, 1225206, 1225207, 1225208, 1225214, 1225223, 1225224, 1225230, 1225232, 1225233, 1225237, 1225238, 1225243, 1225244, 1225247, 1225251, 1225252, 1225256, 1225261, 1225262, 1225263, 1225301, 1225303, 1225316, 1225318, 1225320, 1225321, 1225322, 1225326, 1225327, 1225328, 1225330, 1225333, 1225336, 1225341, 1225346, 1225351, 1225354, 1225355, 1225357, 1225358, 1225360, 1225361, 1225366, 1225367, 1225369, 1225370, 1225372, 1225374, 1225384, 1225386, 1225387, 1225390, 1225393, 1225400, 1225404, 1225405, 1225409, 1225411, 1225424, 1225427, 1225435, 1225437, 1225438, 1225439, 1225446, 1225447, 1225448, 1225450, 1225453, 1225455, 1225468, 1225499, 1225500, 1225508, 1225534 CVE References: CVE-2020-36788, CVE-2021-3743, CVE-2021-39698, CVE-2021-43056, CVE-2021-47104, CVE-2021-47192, CVE-2021-47200, CVE-2021-47220, CVE-2021-47227, CVE-2021-47228, CVE-2021-47229, CVE-2021-47230, CVE-2021-47231, CVE-2021-47235, CVE-2021-47236, CVE-2021-47237, CVE-2021-47239, CVE-2021-47240, CVE-2021-47241, CVE-2021-47246, CVE-2021-47252, CVE-2021-47253, CVE-2021-47254, CVE-2021-47255, CVE-2021-47258, CVE-2021-47259, CVE-2021-47260, CVE-2021-47261, CVE-2021-47263, CVE-2021-47265, CVE-2021-47267, CVE-2021-47269, CVE-2021-47270, CVE-2021-47274, CVE-2021-47275, CVE-2021-47276, CVE-2021-47280, CVE-2021-47281, CVE-2021-47284, CVE-2021-47285, CVE-2021-47288, CVE-2021-47289, CVE-2021-47296, CVE-2021-47301, CVE-2021-47302, CVE-2021-47305, CVE-2021-47307, CVE-2021-47308, CVE-2021-47314, CVE-2021-47315, CVE-2021-47320, CVE-2021-47321, CVE-2021-47323, CVE-2021-47324, CVE-2021-47329, CVE-2021-47330, CVE-2021-47332, CVE-2021-47333, CVE-2021-47334, CVE-2021-47337, CVE-2021-47338, CVE-2021-47340, CVE-2021-47341, CVE-2021-47343, CVE-2021-47344, CVE-2021-47347, CVE-2021-47348, CVE-2021-47350, CVE-2021-47353, CVE-2021-47354, CVE-2021-47356, CVE-2021-47369, CVE-2021-47375, CVE-2021-47378, CVE-2021-47381, CVE-2021-47382, CVE-2021-47383, CVE-2021-47387, CVE-2021-47388, CVE-2021-47391, CVE-2021-47392, CVE-2021-47393, CVE-2021-47395, CVE-2021-47396, CVE-2021-47399, CVE-2021-47402, CVE-2021-47404, CVE-2021-47405, CVE-2021-47409, CVE-2021-47413, CVE-2021-47416, CVE-2021-47422, CVE-2021-47423, CVE-2021-47424, CVE-2021-47425, CVE-2021-47426, CVE-2021-47428, CVE-2021-47431, CVE-2021-47434, CVE-2021-47435, CVE-2021-47436, CVE-2021-47441, CVE-2021-47442, CVE-2021-47443, CVE-2021-47444, CVE-2021-47445, CVE-2021-47451, CVE-2021-47456, CVE-2021-47458, CVE-2021-47460, CVE-2021-47464, CVE-2021-47465, CVE-2021-47468, CVE-2021-47473, CVE-2021-47478, CVE-2021-47480, CVE-2021-47482, CVE-2021-47483, CVE-2021-47485, CVE-2021-47493, CVE-2021-47494, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47498, CVE-2021-47499, CVE-2021-47500, CVE-2021-47501, CVE-2021-47502, CVE-2021-47503, CVE-2021-47505, CVE-2021-47506, CVE-2021-47507, CVE-2021-47509, CVE-2021-47511, CVE-2021-47512, CVE-2021-47516, CVE-2021-47518, CVE-2021-47521, CVE-2021-47522, CVE-2021-47523, CVE-2021-47527, CVE-2021-47535, CVE-2021-47536, CVE-2021-47538, CVE-2021-47540, CVE-2021-47541, CVE-2021-47542, CVE-2021-47549, CVE-2021-47557, CVE-2021-47562, CVE-2021-47563, CVE-2021-47565, CVE-2022-1195, CVE-2022-20132, CVE-2022-48636, CVE-2022-48673, CVE-2022-48704, CVE-2022-48710, CVE-2023-0160, CVE-2023-1829, CVE-2023-2176, CVE-2023-4244, CVE-2023-47233, CVE-2023-52433, CVE-2023-52581, CVE-2023-52591, CVE-2023-52654, CVE-2023-52655, CVE-2023-52686, CVE-2023-52840, CVE-2023-52871, CVE-2023-52880, CVE-2023-6531, CVE-2024-26581, CVE-2024-26643, CVE-2024-26828, CVE-2024-26921, CVE-2024-26925, CVE-2024-26929, CVE-2024-26930, CVE-2024-27398, CVE-2024-27413, CVE-2024-35811, CVE-2024-35895, CVE-2024-35914 Maintenance Incident: [SUSE:Maintenance:34219](https://smelt.suse.de/incident/34219/) Sources used: SUSE Linux Enterprise Micro 5.1 (src): kernel-source-rt-5.3.18-150300.172.1 SUSE Linux Enterprise Micro 5.2 (src): kernel-source-rt-5.3.18-150300.172.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): kernel-source-rt-5.3.18-150300.172.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:2019-1: An update that solves 541 vulnerabilities, contains two features and has 39 security fixes can now be installed. Category: security (important) Bug References: 1065729, 1141539, 1174585, 1181674, 1187716, 1190569, 1191949, 1192107, 1193983, 1194288, 1194869, 1196956, 1197915, 1200465, 1205205, 1207284, 1207361, 1207948, 1208149, 1209657, 1209799, 1209834, 1209980, 1210335, 1213863, 1214852, 1215322, 1215702, 1216358, 1216702, 1217169, 1217515, 1218447, 1220021, 1220363, 1220783, 1221044, 1221081, 1221615, 1221777, 1221816, 1221829, 1222011, 1222374, 1222413, 1222464, 1222513, 1222561, 1222608, 1222619, 1222627, 1222721, 1222765, 1222770, 1222783, 1222893, 1222960, 1222961, 1222974, 1222975, 1223011, 1223023, 1223027, 1223031, 1223043, 1223046, 1223048, 1223049, 1223084, 1223113, 1223137, 1223138, 1223188, 1223203, 1223315, 1223384, 1223390, 1223489, 1223532, 1223575, 1223595, 1223626, 1223627, 1223631, 1223633, 1223638, 1223650, 1223653, 1223666, 1223671, 1223675, 1223677, 1223678, 1223698, 1223712, 1223715, 1223717, 1223718, 1223737, 1223741, 1223744, 1223747, 1223748, 1223750, 1223752, 1223754, 1223756, 1223757, 1223762, 1223769, 1223770, 1223779, 1223780, 1223781, 1223788, 1223802, 1223819, 1223826, 1223828, 1223829, 1223837, 1223842, 1223843, 1223844, 1223847, 1223858, 1223875, 1223879, 1223895, 1223959, 1223961, 1223991, 1224020, 1224076, 1224096, 1224098, 1224099, 1224137, 1224166, 1224174, 1224177, 1224180, 1224181, 1224187, 1224331, 1224346, 1224423, 1224432, 1224437, 1224438, 1224442, 1224443, 1224445, 1224449, 1224479, 1224482, 1224487, 1224488, 1224492, 1224494, 1224495, 1224502, 1224508, 1224509, 1224511, 1224519, 1224524, 1224525, 1224530, 1224531, 1224534, 1224535, 1224537, 1224541, 1224543, 1224549, 1224550, 1224558, 1224559, 1224566, 1224567, 1224571, 1224575, 1224576, 1224579, 1224580, 1224581, 1224582, 1224586, 1224587, 1224592, 1224598, 1224601, 1224607, 1224608, 1224611, 1224615, 1224617, 1224618, 1224621, 1224622, 1224624, 1224627, 1224628, 1224629, 1224632, 1224636, 1224637, 1224638, 1224640, 1224643, 1224644, 1224645, 1224647, 1224648, 1224649, 1224650, 1224651, 1224657, 1224659, 1224660, 1224663, 1224664, 1224665, 1224666, 1224667, 1224668, 1224671, 1224672, 1224676, 1224678, 1224679, 1224680, 1224681, 1224682, 1224685, 1224686, 1224692, 1224697, 1224699, 1224701, 1224703, 1224705, 1224707, 1224717, 1224718, 1224721, 1224722, 1224723, 1224725, 1224727, 1224728, 1224729, 1224730, 1224731, 1224732, 1224733, 1224736, 1224738, 1224739, 1224740, 1224747, 1224749, 1224759, 1224763, 1224764, 1224765, 1224766, 1224794, 1224795, 1224796, 1224803, 1224816, 1224895, 1224898, 1224900, 1224901, 1224902, 1224903, 1224904, 1224905, 1224907, 1224909, 1224910, 1224911, 1224912, 1224913, 1224914, 1224915, 1224920, 1224928, 1224929, 1224930, 1224931, 1224932, 1224936, 1224937, 1224941, 1224942, 1224944, 1224945, 1224947, 1224956, 1224988, 1224992, 1225000, 1225003, 1225005, 1225008, 1225009, 1225022, 1225031, 1225032, 1225036, 1225041, 1225044, 1225053, 1225076, 1225077, 1225082, 1225085, 1225086, 1225092, 1225095, 1225096, 1225097, 1225106, 1225108, 1225109, 1225114, 1225118, 1225121, 1225122, 1225123, 1225125, 1225126, 1225127, 1225129, 1225131, 1225132, 1225138, 1225139, 1225145, 1225151, 1225153, 1225156, 1225158, 1225160, 1225161, 1225164, 1225167, 1225180, 1225183, 1225184, 1225186, 1225187, 1225189, 1225190, 1225191, 1225192, 1225193, 1225195, 1225198, 1225201, 1225203, 1225205, 1225206, 1225207, 1225208, 1225209, 1225210, 1225214, 1225222, 1225223, 1225224, 1225225, 1225227, 1225228, 1225229, 1225230, 1225232, 1225233, 1225235, 1225236, 1225237, 1225238, 1225239, 1225240, 1225241, 1225242, 1225243, 1225244, 1225245, 1225246, 1225247, 1225248, 1225249, 1225250, 1225251, 1225252, 1225253, 1225254, 1225255, 1225256, 1225257, 1225258, 1225259, 1225260, 1225261, 1225262, 1225263, 1225268, 1225301, 1225303, 1225304, 1225306, 1225316, 1225318, 1225320, 1225321, 1225322, 1225323, 1225326, 1225327, 1225328, 1225329, 1225330, 1225331, 1225332, 1225333, 1225334, 1225335, 1225336, 1225337, 1225338, 1225339, 1225341, 1225342, 1225344, 1225346, 1225347, 1225351, 1225353, 1225354, 1225355, 1225357, 1225358, 1225360, 1225361, 1225366, 1225367, 1225368, 1225369, 1225370, 1225372, 1225373, 1225374, 1225375, 1225376, 1225377, 1225379, 1225380, 1225382, 1225383, 1225384, 1225386, 1225387, 1225388, 1225390, 1225392, 1225393, 1225396, 1225400, 1225404, 1225405, 1225408, 1225409, 1225410, 1225411, 1225424, 1225425, 1225427, 1225431, 1225435, 1225436, 1225437, 1225438, 1225439, 1225441, 1225442, 1225443, 1225444, 1225445, 1225446, 1225447, 1225450, 1225453, 1225455, 1225461, 1225463, 1225464, 1225466, 1225467, 1225468, 1225471, 1225472, 1225478, 1225479, 1225480, 1225482, 1225483, 1225486, 1225488, 1225490, 1225492, 1225495, 1225499, 1225500, 1225501, 1225502, 1225506, 1225508, 1225510, 1225513, 1225515, 1225529, 1225530, 1225532, 1225534, 1225535, 1225548, 1225549, 1225550, 1225553, 1225554, 1225555, 1225556, 1225557, 1225559, 1225560, 1225565, 1225566, 1225568, 1225569, 1225570, 1225571, 1225572, 1225577, 1225583, 1225584, 1225587, 1225588, 1225589, 1225590, 1225591, 1225592, 1225593, 1225595, 1225599, 1225616, 1225640, 1225642, 1225705, 1225708, 1225715, 1225720, 1225722, 1225734, 1225735, 1225747, 1225748, 1225756, 1225761, 1225766, 1225775, 1225810, 1225820, 1225829, 1225835, 1225842 CVE References: CVE-2020-36788, CVE-2021-39698, CVE-2021-4148, CVE-2021-47358, CVE-2021-47359, CVE-2021-47360, CVE-2021-47361, CVE-2021-47362, CVE-2021-47363, CVE-2021-47364, CVE-2021-47365, CVE-2021-47366, CVE-2021-47367, CVE-2021-47368, CVE-2021-47369, CVE-2021-47370, CVE-2021-47371, CVE-2021-47372, CVE-2021-47373, CVE-2021-47374, CVE-2021-47375, CVE-2021-47376, CVE-2021-47378, CVE-2021-47379, CVE-2021-47380, CVE-2021-47381, CVE-2021-47382, CVE-2021-47383, CVE-2021-47384, CVE-2021-47385, CVE-2021-47386, CVE-2021-47387, CVE-2021-47388, CVE-2021-47389, CVE-2021-47390, CVE-2021-47391, CVE-2021-47392, CVE-2021-47393, CVE-2021-47394, CVE-2021-47395, CVE-2021-47396, CVE-2021-47397, CVE-2021-47398, CVE-2021-47399, CVE-2021-47400, CVE-2021-47401, CVE-2021-47402, CVE-2021-47403, CVE-2021-47404, CVE-2021-47405, CVE-2021-47406, CVE-2021-47407, CVE-2021-47408, CVE-2021-47409, CVE-2021-47410, CVE-2021-47412, CVE-2021-47413, CVE-2021-47414, CVE-2021-47415, CVE-2021-47416, CVE-2021-47417, CVE-2021-47418, CVE-2021-47419, CVE-2021-47420, CVE-2021-47421, CVE-2021-47422, CVE-2021-47423, CVE-2021-47424, CVE-2021-47425, CVE-2021-47426, CVE-2021-47427, CVE-2021-47428, CVE-2021-47429, CVE-2021-47430, CVE-2021-47431, CVE-2021-47433, CVE-2021-47434, CVE-2021-47435, CVE-2021-47436, CVE-2021-47437, CVE-2021-47438, CVE-2021-47439, CVE-2021-47440, CVE-2021-47441, CVE-2021-47442, CVE-2021-47443, CVE-2021-47444, CVE-2021-47445, CVE-2021-47446, CVE-2021-47447, CVE-2021-47448, CVE-2021-47449, CVE-2021-47450, CVE-2021-47451, CVE-2021-47452, CVE-2021-47453, CVE-2021-47454, CVE-2021-47455, CVE-2021-47456, CVE-2021-47457, CVE-2021-47458, CVE-2021-47459, CVE-2021-47460, CVE-2021-47461, CVE-2021-47462, CVE-2021-47463, CVE-2021-47464, CVE-2021-47465, CVE-2021-47466, CVE-2021-47467, CVE-2021-47468, CVE-2021-47469, CVE-2021-47470, CVE-2021-47471, CVE-2021-47472, CVE-2021-47473, CVE-2021-47474, CVE-2021-47475, CVE-2021-47476, CVE-2021-47477, CVE-2021-47478, CVE-2021-47479, CVE-2021-47480, CVE-2021-47481, CVE-2021-47482, CVE-2021-47483, CVE-2021-47484, CVE-2021-47485, CVE-2021-47486, CVE-2021-47488, CVE-2021-47489, CVE-2021-47490, CVE-2021-47491, CVE-2021-47492, CVE-2021-47493, CVE-2021-47494, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47498, CVE-2021-47499, CVE-2021-47500, CVE-2021-47501, CVE-2021-47502, CVE-2021-47503, CVE-2021-47504, CVE-2021-47505, CVE-2021-47506, CVE-2021-47507, CVE-2021-47508, CVE-2021-47509, CVE-2021-47510, CVE-2021-47511, CVE-2021-47512, CVE-2021-47513, CVE-2021-47514, CVE-2021-47516, CVE-2021-47518, CVE-2021-47520, CVE-2021-47521, CVE-2021-47522, CVE-2021-47523, CVE-2021-47524, CVE-2021-47525, CVE-2021-47526, CVE-2021-47527, CVE-2021-47528, CVE-2021-47529, CVE-2021-47530, CVE-2021-47531, CVE-2021-47532, CVE-2021-47533, CVE-2021-47534, CVE-2021-47535, CVE-2021-47536, CVE-2021-47537, CVE-2021-47540, CVE-2021-47541, CVE-2021-47542, CVE-2021-47544, CVE-2021-47548, CVE-2021-47549, CVE-2021-47550, CVE-2021-47551, CVE-2021-47552, CVE-2021-47553, CVE-2021-47554, CVE-2021-47555, CVE-2021-47556, CVE-2021-47557, CVE-2021-47558, CVE-2021-47559, CVE-2021-47560, CVE-2021-47562, CVE-2021-47563, CVE-2021-47564, CVE-2021-47565, CVE-2021-47569, CVE-2022-48633, CVE-2022-48669, CVE-2022-48689, CVE-2022-48691, CVE-2022-48705, CVE-2022-48708, CVE-2022-48709, CVE-2022-48710, CVE-2023-0160, CVE-2023-1829, CVE-2023-42755, CVE-2023-47233, CVE-2023-52586, CVE-2023-52591, CVE-2023-52618, CVE-2023-52642, CVE-2023-52643, CVE-2023-52644, CVE-2023-52650, CVE-2023-52653, CVE-2023-52654, CVE-2023-52655, CVE-2023-52656, CVE-2023-52657, CVE-2023-52659, CVE-2023-52660, CVE-2023-52661, CVE-2023-52662, CVE-2023-52664, CVE-2023-52669, CVE-2023-52671, CVE-2023-52674, CVE-2023-52676, CVE-2023-52678, CVE-2023-52679, CVE-2023-52680, CVE-2023-52683, CVE-2023-52685, CVE-2023-52686, CVE-2023-52690, CVE-2023-52691, CVE-2023-52692, CVE-2023-52693, CVE-2023-52694, CVE-2023-52696, CVE-2023-52698, CVE-2023-52699, CVE-2023-52702, CVE-2023-52703, CVE-2023-52705, CVE-2023-52707, CVE-2023-52708, CVE-2023-52730, CVE-2023-52731, CVE-2023-52732, CVE-2023-52733, CVE-2023-52736, CVE-2023-52738, CVE-2023-52739, CVE-2023-52740, CVE-2023-52741, CVE-2023-52742, CVE-2023-52743, CVE-2023-52744, CVE-2023-52745, CVE-2023-52746, CVE-2023-52747, CVE-2023-52753, CVE-2023-52754, CVE-2023-52756, CVE-2023-52757, CVE-2023-52759, CVE-2023-52763, CVE-2023-52764, CVE-2023-52766, CVE-2023-52773, CVE-2023-52774, CVE-2023-52777, CVE-2023-52781, CVE-2023-52788, CVE-2023-52789, CVE-2023-52791, CVE-2023-52795, CVE-2023-52796, CVE-2023-52798, CVE-2023-52799, CVE-2023-52800, CVE-2023-52803, CVE-2023-52804, CVE-2023-52805, CVE-2023-52806, CVE-2023-52807, CVE-2023-52808, CVE-2023-52809, CVE-2023-52810, CVE-2023-52811, CVE-2023-52814, CVE-2023-52815, CVE-2023-52816, CVE-2023-52817, CVE-2023-52818, CVE-2023-52819, CVE-2023-52821, CVE-2023-52825, CVE-2023-52826, CVE-2023-52832, CVE-2023-52833, CVE-2023-52834, CVE-2023-52838, CVE-2023-52840, CVE-2023-52841, CVE-2023-52844, CVE-2023-52847, CVE-2023-52851, CVE-2023-52853, CVE-2023-52854, CVE-2023-52855, CVE-2023-52856, CVE-2023-52858, CVE-2023-52860, CVE-2023-52861, CVE-2023-52864, CVE-2023-52865, CVE-2023-52867, CVE-2023-52868, CVE-2023-52870, CVE-2023-52871, CVE-2023-52872, CVE-2023-52873, CVE-2023-52875, CVE-2023-52876, CVE-2023-52877, CVE-2023-52878, CVE-2023-52880, CVE-2023-6531, CVE-2024-26597, CVE-2024-26643, CVE-2024-26692, CVE-2024-26698, CVE-2024-26715, CVE-2024-26742, CVE-2024-26748, CVE-2024-26758, CVE-2024-26764, CVE-2024-26775, CVE-2024-26777, CVE-2024-26778, CVE-2024-26788, CVE-2024-26801, CVE-2024-26822, CVE-2024-26828, CVE-2024-26829, CVE-2024-26838, CVE-2024-26839, CVE-2024-26846, CVE-2024-26859, CVE-2024-26870, CVE-2024-26874, CVE-2024-26880, CVE-2024-26889, CVE-2024-26894, CVE-2024-26900, CVE-2024-26907, CVE-2024-26916, CVE-2024-26919, CVE-2024-26920, CVE-2024-26921, CVE-2024-26922, CVE-2024-26925, CVE-2024-26928, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26934, CVE-2024-269355, CVE-2024-26937, CVE-2024-26938, CVE-2024-26940, CVE-2024-26943, CVE-2024-26957, CVE-2024-26958, CVE-2024-26964, CVE-2024-26974, CVE-2024-26977, CVE-2024-26984, CVE-2024-26988, CVE-2024-26989, CVE-2024-26994, CVE-2024-26996, CVE-2024-26997, CVE-2024-26999, CVE-2024-27000, CVE-2024-27001, CVE-2024-27004, CVE-2024-27008, CVE-2024-27028, CVE-2024-27037, CVE-2024-27045, CVE-2024-27047, CVE-2024-27051, CVE-2024-27052, CVE-2024-27053, CVE-2024-27054, CVE-2024-27072, CVE-2024-27073, CVE-2024-27074, CVE-2024-27075, CVE-2024-27076, CVE-2024-27077, CVE-2024-27078, CVE-2024-27388, CVE-2024-27393, CVE-2024-27395, CVE-2024-27396, CVE-2024-27398, CVE-2024-27399, CVE-2024-27400, CVE-2024-27401, CVE-2024-27405, CVE-2024-27410, CVE-2024-27412, CVE-2024-27413, CVE-2024-27416, CVE-2024-27417, CVE-2024-27419, CVE-2024-27431, CVE-2024-27435, CVE-2024-27436, CVE-2024-35789, CVE-2024-35791, CVE-2024-35796, CVE-2024-35799, CVE-2024-35801, CVE-2024-35804, CVE-2024-35806, CVE-2024-35809, CVE-2024-35811, CVE-2024-35812, CVE-2024-35813, CVE-2024-35815, CVE-2024-35817, CVE-2024-35821, CVE-2024-35822, CVE-2024-35823, CVE-2024-35825, CVE-2024-35828, CVE-2024-35829, CVE-2024-35830, CVE-2024-35833, CVE-2024-35845, CVE-2024-35847, CVE-2024-35849, CVE-2024-35851, CVE-2024-35852, CVE-2024-35854, CVE-2024-35860, CVE-2024-35861, CVE-2024-35862, CVE-2024-35863, CVE-2024-35864, CVE-2024-35865, CVE-2024-35866, CVE-2024-35867, CVE-2024-35868, CVE-2024-35869, CVE-2024-35870, CVE-2024-35872, CVE-2024-35875, CVE-2024-35877, CVE-2024-35878, CVE-2024-35879, CVE-2024-35885, CVE-2024-35887, CVE-2024-35895, CVE-2024-35901, CVE-2024-35904, CVE-2024-35905, CVE-2024-35907, CVE-2024-35912, CVE-2024-35914, CVE-2024-35915, CVE-2024-35922, CVE-2024-35924, CVE-2024-35930, CVE-2024-35932, CVE-2024-35933, CVE-2024-35935, CVE-2024-35936, CVE-2024-35938, CVE-2024-35939, CVE-2024-35940, CVE-2024-35943, CVE-2024-35944, CVE-2024-35947, CVE-2024-35950, CVE-2024-35951, CVE-2024-35952, CVE-2024-35955, CVE-2024-35959, CVE-2024-35963, CVE-2024-35964, CVE-2024-35965, CVE-2024-35966, CVE-2024-35967, CVE-2024-35969, CVE-2024-35973, CVE-2024-35976, CVE-2024-35978, CVE-2024-35982, CVE-2024-35984, CVE-2024-35989, CVE-2024-35990, CVE-2024-35998, CVE-2024-35999, CVE-2024-36006, CVE-2024-36007, CVE-2024-36012, CVE-2024-36014, CVE-2024-36015, CVE-2024-36016, CVE-2024-36026, CVE-2024-36029, CVE-2024-36032, CVE-2024-36880, CVE-2024-36893, CVE-2024-36896, CVE-2024-36897, CVE-2024-36906, CVE-2024-36918, CVE-2024-36924, CVE-2024-36926, CVE-2024-36928, CVE-2024-36931, CVE-2024-36938, CVE-2024-36940, CVE-2024-36941, CVE-2024-36942, CVE-2024-36944, CVE-2024-36947, CVE-2024-36950, CVE-2024-36952, CVE-2024-36955, CVE-2024-36959 Jira References: PED-3259, PED-7167 Maintenance Incident: [SUSE:Maintenance:34203](https://smelt.suse.de/incident/34203/) Sources used: openSUSE Leap 15.5 (src): kernel-source-azure-5.14.21-150500.33.57.1, kernel-syms-azure-5.14.21-150500.33.57.1 Public Cloud Module 15-SP5 (src): kernel-source-azure-5.14.21-150500.33.57.1, kernel-syms-azure-5.14.21-150500.33.57.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:2184-1: An update that solves 198 vulnerabilities and has 28 security fixes can now be installed. Category: security (important) Bug References: 1065729, 1101816, 1141539, 1181674, 1185902, 1187716, 1188616, 1190317, 1190795, 1191452, 1194591, 1197760, 1197894, 1203935, 1206213, 1206646, 1207186, 1209657, 1210335, 1215702, 1216702, 1217169, 1217519, 1218917, 1220487, 1220513, 1220854, 1220928, 1221044, 1221081, 1221086, 1221543, 1221545, 1221816, 1221977, 1221994, 1222559, 1222619, 1222627, 1222667, 1222671, 1222793, 1222893, 1222894, 1223023, 1223046, 1223048, 1223062, 1223084, 1223119, 1223138, 1223207, 1223360, 1223384, 1223432, 1223509, 1223512, 1223539, 1223540, 1223626, 1223627, 1223633, 1223653, 1223666, 1223671, 1223712, 1223715, 1223738, 1223744, 1223752, 1223802, 1223819, 1223834, 1223922, 1223923, 1223931, 1223932, 1223948, 1223969, 1224096, 1224174, 1224181, 1224347, 1224482, 1224511, 1224525, 1224566, 1224580, 1224592, 1224601, 1224607, 1224621, 1224644, 1224645, 1224648, 1224650, 1224663, 1224671, 1224676, 1224680, 1224682, 1224725, 1224728, 1224733, 1224738, 1224747, 1224749, 1224759, 1224803, 1224827, 1224830, 1224831, 1224834, 1224838, 1224841, 1224844, 1224846, 1224847, 1224849, 1224854, 1224859, 1224867, 1224880, 1224882, 1224888, 1224889, 1224892, 1224893, 1224899, 1224904, 1224907, 1224916, 1224917, 1224922, 1224926, 1224930, 1224931, 1224942, 1224954, 1224956, 1224957, 1224959, 1224960, 1224961, 1224963, 1224966, 1224968, 1224981, 1224982, 1224983, 1224987, 1224990, 1224996, 1225008, 1225009, 1225010, 1225022, 1225026, 1225030, 1225054, 1225058, 1225059, 1225060, 1225062, 1225082, 1225084, 1225086, 1225092, 1225096, 1225112, 1225124, 1225128, 1225132, 1225141, 1225143, 1225144, 1225151, 1225153, 1225155, 1225157, 1225164, 1225177, 1225189, 1225192, 1225193, 1225198, 1225201, 1225207, 1225208, 1225222, 1225230, 1225242, 1225244, 1225247, 1225251, 1225252, 1225256, 1225303, 1225318, 1225322, 1225329, 1225330, 1225336, 1225347, 1225351, 1225354, 1225355, 1225360, 1225366, 1225367, 1225384, 1225390, 1225404, 1225409, 1225411, 1225438, 1225453, 1225479, 1225482, 1225506, 1225549, 1225560, 1225572, 1225640, 1225708, 1225764 CVE References: CVE-2021-46933, CVE-2021-46955, CVE-2021-47074, CVE-2021-47113, CVE-2021-47131, CVE-2021-47162, CVE-2021-47171, CVE-2021-47188, CVE-2021-47206, CVE-2021-47220, CVE-2021-47229, CVE-2021-47231, CVE-2021-47235, CVE-2021-47236, CVE-2021-47237, CVE-2021-47238, CVE-2021-47239, CVE-2021-47245, CVE-2021-47246, CVE-2021-47248, CVE-2021-47249, CVE-2021-47250, CVE-2021-47252, CVE-2021-47254, CVE-2021-47258, CVE-2021-47260, CVE-2021-47261, CVE-2021-47265, CVE-2021-47269, CVE-2021-47274, CVE-2021-47276, CVE-2021-47277, CVE-2021-47280, CVE-2021-47281, CVE-2021-47284, CVE-2021-47285, CVE-2021-47288, CVE-2021-47301, CVE-2021-47302, CVE-2021-47305, CVE-2021-47307, CVE-2021-47308, CVE-2021-47310, CVE-2021-47311, CVE-2021-47314, CVE-2021-47315, CVE-2021-47319, CVE-2021-47320, CVE-2021-47321, CVE-2021-47323, CVE-2021-47324, CVE-2021-47330, CVE-2021-47334, CVE-2021-47337, CVE-2021-47343, CVE-2021-47344, CVE-2021-47345, CVE-2021-47347, CVE-2021-47352, CVE-2021-47353, CVE-2021-47355, CVE-2021-47356, CVE-2021-47357, CVE-2021-47361, CVE-2021-47362, CVE-2021-47369, CVE-2021-47375, CVE-2021-47378, CVE-2021-47382, CVE-2021-47383, CVE-2021-47391, CVE-2021-47397, CVE-2021-47400, CVE-2021-47401, CVE-2021-47404, CVE-2021-47409, CVE-2021-47416, CVE-2021-47423, CVE-2021-47424, CVE-2021-47431, CVE-2021-47435, CVE-2021-47436, CVE-2021-47456, CVE-2021-47458, CVE-2021-47460, CVE-2021-47469, CVE-2021-47472, CVE-2021-47473, CVE-2021-47478, CVE-2021-47480, CVE-2021-47483, CVE-2021-47485, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47500, CVE-2021-47506, CVE-2021-47509, CVE-2021-47511, CVE-2021-47523, CVE-2021-47541, CVE-2021-47548, CVE-2021-47565, CVE-2022-48636, CVE-2022-48650, CVE-2022-48672, CVE-2022-48686, CVE-2022-48697, CVE-2022-48702, CVE-2022-48704, CVE-2022-48708, CVE-2022-48710, CVE-2023-0160, CVE-2023-1829, CVE-2023-42755, CVE-2023-47233, CVE-2023-52527, CVE-2023-52586, CVE-2023-52591, CVE-2023-52646, CVE-2023-52653, CVE-2023-52655, CVE-2023-52664, CVE-2023-52685, CVE-2023-52686, CVE-2023-52691, CVE-2023-52696, CVE-2023-52698, CVE-2023-52703, CVE-2023-52730, CVE-2023-52732, CVE-2023-52741, CVE-2023-52742, CVE-2023-52747, CVE-2023-52759, CVE-2023-52774, CVE-2023-52781, CVE-2023-52796, CVE-2023-52803, CVE-2023-52821, CVE-2023-52864, CVE-2023-52865, CVE-2023-52867, CVE-2023-52875, CVE-2023-52880, CVE-2024-0639, CVE-2024-26625, CVE-2024-26739, CVE-2024-26752, CVE-2024-26775, CVE-2024-26791, CVE-2024-26828, CVE-2024-26846, CVE-2024-26874, CVE-2024-26876, CVE-2024-26900, CVE-2024-26915, CVE-2024-26920, CVE-2024-26921, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26934, CVE-2024-26957, CVE-2024-26958, CVE-2024-26984, CVE-2024-26996, CVE-2024-27008, CVE-2024-27054, CVE-2024-27059, CVE-2024-27062, CVE-2024-27388, CVE-2024-27396, CVE-2024-27398, CVE-2024-27401, CVE-2024-27419, CVE-2024-27436, CVE-2024-35789, CVE-2024-35791, CVE-2024-35809, CVE-2024-35811, CVE-2024-35830, CVE-2024-35849, CVE-2024-35877, CVE-2024-35878, CVE-2024-35887, CVE-2024-35895, CVE-2024-35914, CVE-2024-35932, CVE-2024-35935, CVE-2024-35936, CVE-2024-35944, CVE-2024-35955, CVE-2024-35969, CVE-2024-35982, CVE-2024-36015, CVE-2024-36029, CVE-2024-36954 Maintenance Incident: [SUSE:Maintenance:34269](https://smelt.suse.de/incident/34269/) Sources used: SUSE Linux Enterprise Live Patching 12-SP5 (src): kgraft-patch-SLE12-SP5_Update_57-1-8.3.1 SUSE Linux Enterprise Software Development Kit 12 SP5 (src): kernel-obs-build-4.12.14-122.219.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): kernel-source-4.12.14-122.219.1, kernel-syms-4.12.14-122.219.1 SUSE Linux Enterprise Server 12 SP5 (src): kernel-source-4.12.14-122.219.1, kernel-syms-4.12.14-122.219.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): kernel-source-4.12.14-122.219.1, kernel-syms-4.12.14-122.219.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:2183-1: An update that solves 131 vulnerabilities and has 13 security fixes can now be installed. Category: security (important) Bug References: 1065729, 1151927, 1154353, 1156395, 1174585, 1176869, 1184631, 1185589, 1185902, 1188616, 1188772, 1189883, 1190795, 1191452, 1192107, 1194288, 1196956, 1200619, 1208813, 1209657, 1210335, 1210629, 1215356, 1215420, 1216702, 1217169, 1220137, 1220144, 1220754, 1220877, 1220960, 1221044, 1221829, 1222251, 1222619, 1223084, 1223384, 1223390, 1223934, 1224099, 1224174, 1224438, 1224482, 1224511, 1224592, 1224831, 1224832, 1224834, 1224841, 1224843, 1224846, 1224849, 1224854, 1224859, 1224882, 1224888, 1224889, 1224891, 1224892, 1224893, 1224904, 1224907, 1224909, 1224916, 1224917, 1224922, 1224923, 1224924, 1224928, 1224953, 1224954, 1224961, 1224963, 1224965, 1224966, 1224968, 1224981, 1224982, 1224984, 1224987, 1224990, 1224993, 1224996, 1224997, 1225026, 1225030, 1225058, 1225060, 1225084, 1225091, 1225112, 1225113, 1225140, 1225143, 1225164, 1225177, 1225181, 1225192, 1225193, 1225201, 1225206, 1225207, 1225208, 1225214, 1225223, 1225224, 1225232, 1225238, 1225244, 1225251, 1225256, 1225261, 1225262, 1225263, 1225301, 1225303, 1225318, 1225321, 1225326, 1225327, 1225328, 1225336, 1225341, 1225346, 1225351, 1225354, 1225355, 1225360, 1225366, 1225367, 1225384, 1225390, 1225393, 1225400, 1225404, 1225411, 1225427, 1225437, 1225448, 1225453, 1225455, 1225499, 1225500, 1225534 CVE References: CVE-2021-3743, CVE-2021-39698, CVE-2021-43056, CVE-2021-47104, CVE-2021-47220, CVE-2021-47229, CVE-2021-47231, CVE-2021-47236, CVE-2021-47239, CVE-2021-47240, CVE-2021-47246, CVE-2021-47252, CVE-2021-47254, CVE-2021-47255, CVE-2021-47259, CVE-2021-47260, CVE-2021-47261, CVE-2021-47267, CVE-2021-47269, CVE-2021-47270, CVE-2021-47274, CVE-2021-47275, CVE-2021-47276, CVE-2021-47280, CVE-2021-47284, CVE-2021-47285, CVE-2021-47288, CVE-2021-47289, CVE-2021-47296, CVE-2021-47301, CVE-2021-47302, CVE-2021-47305, CVE-2021-47307, CVE-2021-47308, CVE-2021-47314, CVE-2021-47315, CVE-2021-47320, CVE-2021-47321, CVE-2021-47323, CVE-2021-47324, CVE-2021-47330, CVE-2021-47332, CVE-2021-47333, CVE-2021-47334, CVE-2021-47338, CVE-2021-47341, CVE-2021-47344, CVE-2021-47347, CVE-2021-47350, CVE-2021-47354, CVE-2021-47356, CVE-2021-47369, CVE-2021-47375, CVE-2021-47378, CVE-2021-47381, CVE-2021-47382, CVE-2021-47383, CVE-2021-47388, CVE-2021-47391, CVE-2021-47393, CVE-2021-47395, CVE-2021-47396, CVE-2021-47399, CVE-2021-47402, CVE-2021-47404, CVE-2021-47405, CVE-2021-47416, CVE-2021-47423, CVE-2021-47424, CVE-2021-47425, CVE-2021-47431, CVE-2021-47434, CVE-2021-47436, CVE-2021-47441, CVE-2021-47442, CVE-2021-47443, CVE-2021-47445, CVE-2021-47456, CVE-2021-47460, CVE-2021-47464, CVE-2021-47465, CVE-2021-47468, CVE-2021-47473, CVE-2021-47482, CVE-2021-47483, CVE-2021-47485, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47500, CVE-2021-47505, CVE-2021-47506, CVE-2021-47511, CVE-2021-47516, CVE-2021-47522, CVE-2021-47527, CVE-2021-47538, CVE-2021-47541, CVE-2021-47542, CVE-2021-47562, CVE-2021-47563, CVE-2021-47565, CVE-2022-20132, CVE-2022-48673, CVE-2023-0160, CVE-2023-1829, CVE-2023-2176, CVE-2023-424, CVE-2023-4244, CVE-2023-47233, CVE-2023-52433, CVE-2023-52581, CVE-2023-52591, CVE-2023-52654, CVE-2023-52655, CVE-2023-52686, CVE-2023-52840, CVE-2023-52871, CVE-2023-52880, CVE-2023-6531, CVE-2024-26581, CVE-2024-26643, CVE-2024-26828, CVE-2024-26925, CVE-2024-26929, CVE-2024-26930, CVE-2024-27398, CVE-2024-27413, CVE-2024-35811, CVE-2024-35895, CVE-2024-35914 Maintenance Incident: [SUSE:Maintenance:34159](https://smelt.suse.de/incident/34159/) Sources used: SUSE Linux Enterprise Live Patching 15-SP2 (src): kernel-livepatch-SLE15-SP2_Update_49-1-150200.5.3.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): kernel-obs-build-5.3.18-150200.24.194.1, kernel-default-base-5.3.18-150200.24.194.1.150200.9.99.1, kernel-source-5.3.18-150200.24.194.1, kernel-syms-5.3.18-150200.24.194.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): kernel-obs-build-5.3.18-150200.24.194.1, kernel-default-base-5.3.18-150200.24.194.1.150200.9.99.1, kernel-source-5.3.18-150200.24.194.1, kernel-syms-5.3.18-150200.24.194.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): kernel-obs-build-5.3.18-150200.24.194.1, kernel-default-base-5.3.18-150200.24.194.1.150200.9.99.1, kernel-source-5.3.18-150200.24.194.1, kernel-syms-5.3.18-150200.24.194.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:2185-1: An update that solves 187 vulnerabilities and has 26 security fixes can now be installed. Category: security (important) Bug References: 1065729, 1151927, 1152472, 1154353, 1156395, 1174585, 1176447, 1176774, 1176869, 1178134, 1181147, 1184631, 1185570, 1185589, 1185902, 1186885, 1187357, 1188616, 1188772, 1189883, 1190795, 1191452, 1192107, 1194288, 1194591, 1196956, 1197760, 1198029, 1199304, 1200619, 1203389, 1206646, 1209657, 1210335, 1210629, 1213476, 1215420, 1216702, 1217169, 1220137, 1220144, 1220754, 1220877, 1220960, 1221044, 1221113, 1221829, 1222251, 1222619, 1222838, 1222867, 1223084, 1223138, 1223384, 1223390, 1223512, 1223932, 1223934, 1224099, 1224174, 1224438, 1224482, 1224511, 1224592, 1224816, 1224826, 1224830, 1224831, 1224832, 1224834, 1224841, 1224842, 1224843, 1224844, 1224846, 1224849, 1224852, 1224853, 1224854, 1224859, 1224882, 1224886, 1224888, 1224889, 1224891, 1224892, 1224893, 1224899, 1224904, 1224907, 1224909, 1224916, 1224917, 1224922, 1224923, 1224924, 1224926, 1224928, 1224953, 1224954, 1224955, 1224957, 1224961, 1224963, 1224965, 1224966, 1224968, 1224981, 1224982, 1224983, 1224984, 1224987, 1224990, 1224993, 1224996, 1224997, 1225026, 1225030, 1225058, 1225060, 1225083, 1225084, 1225091, 1225112, 1225113, 1225128, 1225140, 1225143, 1225148, 1225155, 1225164, 1225177, 1225178, 1225181, 1225192, 1225193, 1225198, 1225201, 1225206, 1225207, 1225208, 1225214, 1225223, 1225224, 1225230, 1225232, 1225233, 1225237, 1225238, 1225243, 1225244, 1225247, 1225251, 1225252, 1225256, 1225261, 1225262, 1225263, 1225301, 1225303, 1225316, 1225318, 1225320, 1225321, 1225322, 1225326, 1225327, 1225328, 1225330, 1225333, 1225336, 1225341, 1225346, 1225351, 1225354, 1225355, 1225357, 1225358, 1225360, 1225361, 1225366, 1225367, 1225369, 1225370, 1225372, 1225374, 1225384, 1225386, 1225387, 1225390, 1225393, 1225400, 1225404, 1225405, 1225409, 1225411, 1225424, 1225427, 1225435, 1225437, 1225438, 1225439, 1225446, 1225447, 1225448, 1225450, 1225453, 1225455, 1225468, 1225499, 1225500, 1225508, 1225534 CVE References: CVE-2020-36788, CVE-2021-3743, CVE-2021-39698, CVE-2021-43056, CVE-2021-47104, CVE-2021-47192, CVE-2021-47200, CVE-2021-47220, CVE-2021-47227, CVE-2021-47228, CVE-2021-47229, CVE-2021-47230, CVE-2021-47231, CVE-2021-47235, CVE-2021-47236, CVE-2021-47237, CVE-2021-47239, CVE-2021-47240, CVE-2021-47241, CVE-2021-47246, CVE-2021-47252, CVE-2021-47253, CVE-2021-47254, CVE-2021-47255, CVE-2021-47258, CVE-2021-47259, CVE-2021-47260, CVE-2021-47261, CVE-2021-47263, CVE-2021-47265, CVE-2021-47267, CVE-2021-47269, CVE-2021-47270, CVE-2021-47274, CVE-2021-47275, CVE-2021-47276, CVE-2021-47280, CVE-2021-47281, CVE-2021-47284, CVE-2021-47285, CVE-2021-47288, CVE-2021-47289, CVE-2021-47296, CVE-2021-47301, CVE-2021-47302, CVE-2021-47305, CVE-2021-47307, CVE-2021-47308, CVE-2021-47314, CVE-2021-47315, CVE-2021-47320, CVE-2021-47321, CVE-2021-47323, CVE-2021-47324, CVE-2021-47329, CVE-2021-47330, CVE-2021-47332, CVE-2021-47333, CVE-2021-47334, CVE-2021-47337, CVE-2021-47338, CVE-2021-47340, CVE-2021-47341, CVE-2021-47343, CVE-2021-47344, CVE-2021-47347, CVE-2021-47348, CVE-2021-47350, CVE-2021-47353, CVE-2021-47354, CVE-2021-47356, CVE-2021-47369, CVE-2021-47375, CVE-2021-47378, CVE-2021-47381, CVE-2021-47382, CVE-2021-47383, CVE-2021-47387, CVE-2021-47388, CVE-2021-47391, CVE-2021-47392, CVE-2021-47393, CVE-2021-47395, CVE-2021-47396, CVE-2021-47399, CVE-2021-47402, CVE-2021-47404, CVE-2021-47405, CVE-2021-47409, CVE-2021-47413, CVE-2021-47416, CVE-2021-47422, CVE-2021-47423, CVE-2021-47424, CVE-2021-47425, CVE-2021-47426, CVE-2021-47428, CVE-2021-47431, CVE-2021-47434, CVE-2021-47435, CVE-2021-47436, CVE-2021-47441, CVE-2021-47442, CVE-2021-47443, CVE-2021-47444, CVE-2021-47445, CVE-2021-47451, CVE-2021-47456, CVE-2021-47458, CVE-2021-47460, CVE-2021-47464, CVE-2021-47465, CVE-2021-47468, CVE-2021-47473, CVE-2021-47478, CVE-2021-47480, CVE-2021-47482, CVE-2021-47483, CVE-2021-47485, CVE-2021-47493, CVE-2021-47494, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47498, CVE-2021-47499, CVE-2021-47500, CVE-2021-47501, CVE-2021-47502, CVE-2021-47503, CVE-2021-47505, CVE-2021-47506, CVE-2021-47507, CVE-2021-47509, CVE-2021-47511, CVE-2021-47512, CVE-2021-47516, CVE-2021-47518, CVE-2021-47521, CVE-2021-47522, CVE-2021-47523, CVE-2021-47527, CVE-2021-47535, CVE-2021-47536, CVE-2021-47538, CVE-2021-47540, CVE-2021-47541, CVE-2021-47542, CVE-2021-47549, CVE-2021-47557, CVE-2021-47562, CVE-2021-47563, CVE-2021-47565, CVE-2022-1195, CVE-2022-20132, CVE-2022-48636, CVE-2022-48673, CVE-2022-48704, CVE-2022-48710, CVE-2023-0160, CVE-2023-1829, CVE-2023-2176, CVE-2023-424, CVE-2023-4244, CVE-2023-47233, CVE-2023-52433, CVE-2023-52581, CVE-2023-52591, CVE-2023-52654, CVE-2023-52655, CVE-2023-52686, CVE-2023-52840, CVE-2023-52871, CVE-2023-52880, CVE-2023-6531, CVE-2024-26581, CVE-2024-26643, CVE-2024-26828, CVE-2024-26921, CVE-2024-26925, CVE-2024-26929, CVE-2024-26930, CVE-2024-27398, CVE-2024-27413, CVE-2024-35811, CVE-2024-35895, CVE-2024-35914 Maintenance Incident: [SUSE:Maintenance:34168](https://smelt.suse.de/incident/34168/) Sources used: openSUSE Leap 15.3 (src): kernel-obs-build-5.3.18-150300.59.164.1, kernel-syms-5.3.18-150300.59.164.1, kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1, kernel-livepatch-SLE15-SP3_Update_45-1-150300.7.3.1, kernel-source-5.3.18-150300.59.164.1, kernel-obs-qa-5.3.18-150300.59.164.1 SUSE Linux Enterprise Live Patching 15-SP3 (src): kernel-livepatch-SLE15-SP3_Update_45-1-150300.7.3.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): kernel-obs-build-5.3.18-150300.59.164.1, kernel-source-5.3.18-150300.59.164.1, kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1, kernel-syms-5.3.18-150300.59.164.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): kernel-obs-build-5.3.18-150300.59.164.1, kernel-source-5.3.18-150300.59.164.1, kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1, kernel-syms-5.3.18-150300.59.164.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): kernel-obs-build-5.3.18-150300.59.164.1, kernel-source-5.3.18-150300.59.164.1, kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1, kernel-syms-5.3.18-150300.59.164.1 SUSE Enterprise Storage 7.1 (src): kernel-obs-build-5.3.18-150300.59.164.1, kernel-source-5.3.18-150300.59.164.1, kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1, kernel-syms-5.3.18-150300.59.164.1 SUSE Linux Enterprise Micro 5.1 (src): kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1 SUSE Linux Enterprise Micro 5.2 (src): kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:2189-1: An update that solves 320 vulnerabilities, contains one feature and has 20 security fixes can now be installed. Category: security (important) Bug References: 1065729, 1174585, 1190569, 1191949, 1192107, 1193983, 1194288, 1194869, 1196869, 1196956, 1197915, 1200313, 1201308, 1201489, 1208149, 1209657, 1209799, 1209834, 1210335, 1211592, 1213863, 1216702, 1217169, 1217515, 1218447, 1218917, 1220492, 1220783, 1221044, 1221645, 1221958, 1222011, 1222559, 1222619, 1222721, 1222976, 1223057, 1223084, 1223111, 1223138, 1223191, 1223384, 1223390, 1223481, 1223501, 1223505, 1223512, 1223520, 1223532, 1223626, 1223715, 1223894, 1223921, 1223922, 1223923, 1223924, 1223929, 1223931, 1223932, 1223934, 1223941, 1223948, 1223952, 1223953, 1223957, 1223962, 1223963, 1223964, 1223996, 1224085, 1224099, 1224137, 1224174, 1224438, 1224482, 1224488, 1224494, 1224511, 1224592, 1224611, 1224664, 1224678, 1224682, 1224685, 1224730, 1224736, 1224763, 1224816, 1224895, 1224898, 1224900, 1224901, 1224902, 1224903, 1224904, 1224905, 1224907, 1224909, 1224910, 1224911, 1224912, 1224913, 1224914, 1224915, 1224920, 1224928, 1224931, 1224932, 1224937, 1224942, 1224944, 1224945, 1224947, 1224956, 1224988, 1225000, 1225003, 1225005, 1225009, 1225022, 1225031, 1225032, 1225036, 1225044, 1225076, 1225077, 1225082, 1225086, 1225092, 1225095, 1225096, 1225106, 1225108, 1225109, 1225118, 1225121, 1225122, 1225123, 1225125, 1225126, 1225127, 1225129, 1225131, 1225132, 1225145, 1225151, 1225153, 1225156, 1225158, 1225160, 1225161, 1225164, 1225167, 1225180, 1225183, 1225184, 1225186, 1225187, 1225189, 1225190, 1225191, 1225192, 1225193, 1225195, 1225198, 1225201, 1225203, 1225205, 1225206, 1225207, 1225208, 1225209, 1225210, 1225214, 1225223, 1225224, 1225225, 1225227, 1225228, 1225229, 1225230, 1225232, 1225233, 1225235, 1225236, 1225237, 1225238, 1225239, 1225240, 1225241, 1225242, 1225243, 1225244, 1225245, 1225246, 1225247, 1225248, 1225249, 1225250, 1225251, 1225252, 1225253, 1225254, 1225255, 1225256, 1225257, 1225258, 1225259, 1225260, 1225261, 1225262, 1225263, 1225268, 1225301, 1225303, 1225304, 1225306, 1225316, 1225318, 1225320, 1225321, 1225322, 1225323, 1225326, 1225327, 1225328, 1225329, 1225330, 1225331, 1225332, 1225333, 1225334, 1225335, 1225336, 1225337, 1225338, 1225339, 1225341, 1225342, 1225344, 1225346, 1225347, 1225351, 1225353, 1225354, 1225355, 1225357, 1225358, 1225360, 1225361, 1225366, 1225367, 1225368, 1225369, 1225370, 1225372, 1225373, 1225374, 1225375, 1225376, 1225377, 1225379, 1225380, 1225383, 1225384, 1225386, 1225387, 1225388, 1225390, 1225392, 1225393, 1225396, 1225400, 1225404, 1225405, 1225409, 1225410, 1225411, 1225425, 1225427, 1225431, 1225435, 1225436, 1225437, 1225438, 1225439, 1225441, 1225445, 1225446, 1225447, 1225450, 1225453, 1225455, 1225461, 1225463, 1225464, 1225466, 1225471, 1225472, 1225478, 1225479, 1225482, 1225483, 1225486, 1225488, 1225490, 1225492, 1225495, 1225499, 1225500, 1225501, 1225508, 1225510, 1225529, 1225530, 1225532, 1225534, 1225549, 1225550, 1225553, 1225554, 1225557, 1225559, 1225560, 1225565, 1225566, 1225569, 1225570, 1225571, 1225572, 1225577, 1225583, 1225584, 1225588, 1225589, 1225590, 1225591, 1225592, 1225595, 1225599 CVE References: CVE-2020-36788, CVE-2021-39698, CVE-2021-4148, CVE-2021-43056, CVE-2021-47358, CVE-2021-47359, CVE-2021-47360, CVE-2021-47361, CVE-2021-47362, CVE-2021-47363, CVE-2021-47364, CVE-2021-47365, CVE-2021-47366, CVE-2021-47367, CVE-2021-47368, CVE-2021-47369, CVE-2021-47370, CVE-2021-47371, CVE-2021-47372, CVE-2021-47373, CVE-2021-47374, CVE-2021-47375, CVE-2021-47376, CVE-2021-47378, CVE-2021-47379, CVE-2021-47380, CVE-2021-47381, CVE-2021-47382, CVE-2021-47383, CVE-2021-47384, CVE-2021-47385, CVE-2021-47386, CVE-2021-47387, CVE-2021-47388, CVE-2021-47389, CVE-2021-47390, CVE-2021-47391, CVE-2021-47392, CVE-2021-47393, CVE-2021-47394, CVE-2021-47395, CVE-2021-47396, CVE-2021-47397, CVE-2021-47398, CVE-2021-47399, CVE-2021-47400, CVE-2021-47401, CVE-2021-47402, CVE-2021-47403, CVE-2021-47404, CVE-2021-47405, CVE-2021-47406, CVE-2021-47407, CVE-2021-47408, CVE-2021-47409, CVE-2021-47410, CVE-2021-47412, CVE-2021-47413, CVE-2021-47414, CVE-2021-47415, CVE-2021-47416, CVE-2021-47417, CVE-2021-47418, CVE-2021-47419, CVE-2021-47420, CVE-2021-47421, CVE-2021-47422, CVE-2021-47423, CVE-2021-47424, CVE-2021-47425, CVE-2021-47426, CVE-2021-47427, CVE-2021-47428, CVE-2021-47429, CVE-2021-47430, CVE-2021-47431, CVE-2021-47433, CVE-2021-47434, CVE-2021-47435, CVE-2021-47436, CVE-2021-47437, CVE-2021-47438, CVE-2021-47439, CVE-2021-47440, CVE-2021-47441, CVE-2021-47442, CVE-2021-47443, CVE-2021-47444, CVE-2021-47445, CVE-2021-47446, CVE-2021-47447, CVE-2021-47448, CVE-2021-47449, CVE-2021-47450, CVE-2021-47451, CVE-2021-47452, CVE-2021-47453, CVE-2021-47454, CVE-2021-47455, CVE-2021-47456, CVE-2021-47457, CVE-2021-47458, CVE-2021-47459, CVE-2021-47460, CVE-2021-47461, CVE-2021-47462, CVE-2021-47463, CVE-2021-47464, CVE-2021-47465, CVE-2021-47466, CVE-2021-47467, CVE-2021-47468, CVE-2021-47469, CVE-2021-47470, CVE-2021-47471, CVE-2021-47472, CVE-2021-47473, CVE-2021-47474, CVE-2021-47475, CVE-2021-47476, CVE-2021-47477, CVE-2021-47478, CVE-2021-47479, CVE-2021-47480, CVE-2021-47481, CVE-2021-47482, CVE-2021-47483, CVE-2021-47484, CVE-2021-47485, CVE-2021-47486, CVE-2021-47488, CVE-2021-47489, CVE-2021-47490, CVE-2021-47491, CVE-2021-47492, CVE-2021-47493, CVE-2021-47494, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47498, CVE-2021-47499, CVE-2021-47500, CVE-2021-47501, CVE-2021-47502, CVE-2021-47503, CVE-2021-47505, CVE-2021-47506, CVE-2021-47507, CVE-2021-47509, CVE-2021-47510, CVE-2021-47511, CVE-2021-47513, CVE-2021-47514, CVE-2021-47516, CVE-2021-47518, CVE-2021-47520, CVE-2021-47521, CVE-2021-47522, CVE-2021-47523, CVE-2021-47524, CVE-2021-47525, CVE-2021-47526, CVE-2021-47527, CVE-2021-47528, CVE-2021-47529, CVE-2021-47533, CVE-2021-47534, CVE-2021-47535, CVE-2021-47536, CVE-2021-47537, CVE-2021-47540, CVE-2021-47541, CVE-2021-47542, CVE-2021-47544, CVE-2021-47549, CVE-2021-47550, CVE-2021-47551, CVE-2021-47553, CVE-2021-47554, CVE-2021-47556, CVE-2021-47558, CVE-2021-47559, CVE-2021-47560, CVE-2021-47562, CVE-2021-47563, CVE-2021-47564, CVE-2021-47565, CVE-2022-48632, CVE-2022-48634, CVE-2022-48636, CVE-2022-48652, CVE-2022-48662, CVE-2022-48671, CVE-2022-48672, CVE-2022-48673, CVE-2022-48675, CVE-2022-48686, CVE-2022-48687, CVE-2022-48688, CVE-2022-48692, CVE-2022-48693, CVE-2022-48694, CVE-2022-48695, CVE-2022-48697, CVE-2022-48699, CVE-2022-48700, CVE-2022-48701, CVE-2022-48702, CVE-2022-48703, CVE-2022-48704, CVE-2022-48708, CVE-2022-48709, CVE-2022-48710, CVE-2023-0160, CVE-2023-1829, CVE-2023-2860, CVE-2023-47233, CVE-2023-52591, CVE-2023-52654, CVE-2023-52655, CVE-2023-52676, CVE-2023-52686, CVE-2023-52690, CVE-2023-52702, CVE-2023-52703, CVE-2023-52707, CVE-2023-52708, CVE-2023-52730, CVE-2023-52733, CVE-2023-52736, CVE-2023-52738, CVE-2023-52739, CVE-2023-52740, CVE-2023-52741, CVE-2023-52742, CVE-2023-52743, CVE-2023-52744, CVE-2023-52745, CVE-2023-52747, CVE-2023-52753, CVE-2023-52754, CVE-2023-52756, CVE-2023-52759, CVE-2023-52763, CVE-2023-52764, CVE-2023-52766, CVE-2023-52774, CVE-2023-52781, CVE-2023-52788, CVE-2023-52789, CVE-2023-52791, CVE-2023-52798, CVE-2023-52799, CVE-2023-52800, CVE-2023-52804, CVE-2023-52805, CVE-2023-52806, CVE-2023-52810, CVE-2023-52811, CVE-2023-52814, CVE-2023-52816, CVE-2023-52817, CVE-2023-52818, CVE-2023-52819, CVE-2023-52821, CVE-2023-52825, CVE-2023-52826, CVE-2023-52832, CVE-2023-52833, CVE-2023-52834, CVE-2023-52838, CVE-2023-52840, CVE-2023-52841, CVE-2023-52844, CVE-2023-52847, CVE-2023-52853, CVE-2023-52854, CVE-2023-52855, CVE-2023-52856, CVE-2023-52858, CVE-2023-52864, CVE-2023-52865, CVE-2023-52867, CVE-2023-52868, CVE-2023-52870, CVE-2023-52871, CVE-2023-52872, CVE-2023-52873, CVE-2023-52875, CVE-2023-52876, CVE-2023-52877, CVE-2023-52878, CVE-2023-52880, CVE-2023-6531, CVE-2024-0639, CVE-2024-26739, CVE-2024-26764, CVE-2024-26828, CVE-2024-26840, CVE-2024-26852, CVE-2024-26862, CVE-2024-26921, CVE-2024-26925, CVE-2024-26928, CVE-2024-26929, CVE-2024-26930, CVE-2024-27398, CVE-2024-27413, CVE-2024-35811, CVE-2024-35815, CVE-2024-35817, CVE-2024-35863, CVE-2024-35867, CVE-2024-35868, CVE-2024-35895, CVE-2024-35904, CVE-2024-35905, CVE-2024-35914, CVE-2024-36926 Jira References: PED-8111 Maintenance Incident: [SUSE:Maintenance:34192](https://smelt.suse.de/incident/34192/) Sources used: openSUSE Leap 15.4 (src): kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2, kernel-syms-5.14.21-150400.24.122.1, kernel-obs-build-5.14.21-150400.24.122.2, kernel-obs-qa-5.14.21-150400.24.122.1, kernel-source-5.14.21-150400.24.122.1, kernel-livepatch-SLE15-SP4_Update_27-1-150400.9.3.2 openSUSE Leap Micro 5.3 (src): kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 openSUSE Leap Micro 5.4 (src): kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 SUSE Linux Enterprise Micro for Rancher 5.3 (src): kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 SUSE Linux Enterprise Micro 5.3 (src): kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 SUSE Linux Enterprise Micro for Rancher 5.4 (src): kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 SUSE Linux Enterprise Micro 5.4 (src): kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 SUSE Linux Enterprise Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4_Update_27-1-150400.9.3.2 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src): kernel-source-5.14.21-150400.24.122.1, kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2, kernel-syms-5.14.21-150400.24.122.1, kernel-obs-build-5.14.21-150400.24.122.2 SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src): kernel-source-5.14.21-150400.24.122.1, kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2, kernel-syms-5.14.21-150400.24.122.1, kernel-obs-build-5.14.21-150400.24.122.2 SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src): kernel-source-5.14.21-150400.24.122.1, kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2, kernel-syms-5.14.21-150400.24.122.1, kernel-obs-build-5.14.21-150400.24.122.2 SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src): kernel-source-5.14.21-150400.24.122.1, kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2, kernel-syms-5.14.21-150400.24.122.1, kernel-obs-build-5.14.21-150400.24.122.2 SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src): kernel-source-5.14.21-150400.24.122.1, kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2, kernel-syms-5.14.21-150400.24.122.1, kernel-obs-build-5.14.21-150400.24.122.2 SUSE Manager Proxy 4.3 (src): kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2, kernel-syms-5.14.21-150400.24.122.1, kernel-source-5.14.21-150400.24.122.1 SUSE Manager Retail Branch Server 4.3 (src): kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2, kernel-source-5.14.21-150400.24.122.1 SUSE Manager Server 4.3 (src): kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2, kernel-syms-5.14.21-150400.24.122.1, kernel-source-5.14.21-150400.24.122.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:2190-1: An update that solves 557 vulnerabilities, contains two features and has 42 security fixes can now be installed. Category: security (important) Bug References: 1065729, 1141539, 1174585, 1181674, 1187716, 1190569, 1191949, 1192107, 1193983, 1194288, 1194869, 1196956, 1197915, 1200465, 1205205, 1207284, 1207361, 1207948, 1208149, 1209657, 1209799, 1209834, 1209980, 1210335, 1213863, 1214852, 1215322, 1215702, 1216358, 1216702, 1217169, 1217339, 1217515, 1218447, 1220021, 1220267, 1220363, 1220783, 1221044, 1221081, 1221615, 1221777, 1221816, 1221829, 1222011, 1222374, 1222385, 1222413, 1222464, 1222513, 1222559, 1222561, 1222608, 1222619, 1222627, 1222721, 1222765, 1222770, 1222783, 1222793, 1222870, 1222893, 1222960, 1222961, 1222974, 1222975, 1222976, 1223011, 1223023, 1223027, 1223031, 1223043, 1223046, 1223048, 1223049, 1223084, 1223113, 1223119, 1223137, 1223138, 1223140, 1223188, 1223203, 1223207, 1223315, 1223360, 1223384, 1223390, 1223432, 1223489, 1223505, 1223532, 1223575, 1223595, 1223626, 1223627, 1223628, 1223631, 1223633, 1223638, 1223650, 1223653, 1223666, 1223670, 1223671, 1223675, 1223677, 1223678, 1223679, 1223698, 1223712, 1223715, 1223717, 1223718, 1223737, 1223738, 1223741, 1223744, 1223747, 1223748, 1223750, 1223752, 1223754, 1223756, 1223757, 1223762, 1223769, 1223770, 1223779, 1223780, 1223781, 1223788, 1223802, 1223819, 1223823, 1223826, 1223828, 1223829, 1223837, 1223842, 1223843, 1223844, 1223847, 1223858, 1223875, 1223879, 1223895, 1223959, 1223961, 1223991, 1223996, 1224020, 1224076, 1224096, 1224098, 1224099, 1224137, 1224166, 1224174, 1224177, 1224180, 1224181, 1224187, 1224331, 1224346, 1224423, 1224432, 1224437, 1224438, 1224442, 1224443, 1224445, 1224449, 1224479, 1224482, 1224487, 1224488, 1224492, 1224494, 1224495, 1224502, 1224508, 1224509, 1224511, 1224519, 1224524, 1224525, 1224530, 1224531, 1224534, 1224535, 1224537, 1224541, 1224543, 1224549, 1224550, 1224558, 1224559, 1224566, 1224567, 1224571, 1224575, 1224576, 1224579, 1224580, 1224581, 1224582, 1224586, 1224587, 1224592, 1224598, 1224601, 1224607, 1224608, 1224611, 1224615, 1224617, 1224618, 1224621, 1224622, 1224624, 1224627, 1224628, 1224629, 1224632, 1224636, 1224637, 1224638, 1224640, 1224643, 1224644, 1224645, 1224647, 1224648, 1224649, 1224650, 1224651, 1224657, 1224659, 1224660, 1224663, 1224664, 1224665, 1224666, 1224667, 1224668, 1224671, 1224672, 1224676, 1224678, 1224679, 1224680, 1224681, 1224682, 1224685, 1224686, 1224692, 1224697, 1224699, 1224701, 1224703, 1224705, 1224707, 1224717, 1224718, 1224721, 1224722, 1224723, 1224725, 1224727, 1224728, 1224729, 1224730, 1224731, 1224732, 1224733, 1224736, 1224738, 1224739, 1224740, 1224747, 1224749, 1224759, 1224763, 1224764, 1224765, 1224766, 1224794, 1224795, 1224796, 1224803, 1224816, 1224895, 1224898, 1224900, 1224901, 1224902, 1224903, 1224904, 1224905, 1224907, 1224909, 1224910, 1224911, 1224912, 1224913, 1224914, 1224915, 1224920, 1224928, 1224929, 1224930, 1224931, 1224932, 1224936, 1224937, 1224941, 1224942, 1224944, 1224945, 1224947, 1224956, 1224988, 1224992, 1225000, 1225003, 1225005, 1225008, 1225009, 1225022, 1225031, 1225032, 1225036, 1225041, 1225044, 1225053, 1225076, 1225077, 1225082, 1225085, 1225086, 1225092, 1225095, 1225096, 1225097, 1225106, 1225108, 1225109, 1225114, 1225118, 1225121, 1225122, 1225123, 1225125, 1225126, 1225127, 1225129, 1225131, 1225132, 1225138, 1225139, 1225145, 1225151, 1225153, 1225156, 1225158, 1225160, 1225161, 1225164, 1225167, 1225180, 1225183, 1225184, 1225186, 1225187, 1225189, 1225190, 1225191, 1225192, 1225193, 1225195, 1225198, 1225201, 1225203, 1225205, 1225206, 1225207, 1225208, 1225209, 1225210, 1225214, 1225222, 1225223, 1225224, 1225225, 1225227, 1225228, 1225229, 1225230, 1225232, 1225233, 1225235, 1225236, 1225237, 1225238, 1225239, 1225240, 1225241, 1225242, 1225243, 1225244, 1225245, 1225246, 1225247, 1225248, 1225249, 1225250, 1225251, 1225252, 1225253, 1225254, 1225255, 1225256, 1225257, 1225258, 1225259, 1225260, 1225261, 1225262, 1225263, 1225268, 1225301, 1225303, 1225304, 1225306, 1225316, 1225318, 1225320, 1225321, 1225322, 1225323, 1225326, 1225327, 1225328, 1225329, 1225330, 1225331, 1225332, 1225333, 1225334, 1225335, 1225336, 1225337, 1225338, 1225339, 1225341, 1225342, 1225344, 1225346, 1225347, 1225351, 1225353, 1225354, 1225355, 1225357, 1225358, 1225360, 1225361, 1225366, 1225367, 1225368, 1225369, 1225370, 1225372, 1225373, 1225374, 1225375, 1225376, 1225377, 1225379, 1225380, 1225382, 1225383, 1225384, 1225386, 1225387, 1225388, 1225390, 1225392, 1225393, 1225396, 1225400, 1225404, 1225405, 1225408, 1225409, 1225410, 1225411, 1225424, 1225425, 1225427, 1225431, 1225435, 1225436, 1225437, 1225438, 1225439, 1225441, 1225442, 1225443, 1225444, 1225445, 1225446, 1225447, 1225450, 1225453, 1225455, 1225461, 1225463, 1225464, 1225466, 1225467, 1225468, 1225471, 1225472, 1225478, 1225479, 1225480, 1225482, 1225483, 1225486, 1225488, 1225490, 1225492, 1225495, 1225499, 1225500, 1225501, 1225502, 1225506, 1225508, 1225510, 1225513, 1225515, 1225529, 1225530, 1225532, 1225534, 1225535, 1225548, 1225549, 1225550, 1225553, 1225554, 1225555, 1225556, 1225557, 1225559, 1225560, 1225565, 1225566, 1225568, 1225569, 1225570, 1225571, 1225572, 1225577, 1225583, 1225584, 1225587, 1225588, 1225589, 1225590, 1225591, 1225592, 1225593, 1225595, 1225599, 1225616, 1225640, 1225642, 1225705, 1225708, 1225715, 1225720, 1225722, 1225734, 1225735, 1225747, 1225748, 1225756, 1225761, 1225766, 1225775, 1225810, 1225820, 1225829, 1225835, 1225842 CVE References: CVE-2020-36788, CVE-2021-4148, CVE-2021-47358, CVE-2021-47359, CVE-2021-47360, CVE-2021-47361, CVE-2021-47362, CVE-2021-47363, CVE-2021-47364, CVE-2021-47365, CVE-2021-47366, CVE-2021-47367, CVE-2021-47368, CVE-2021-47369, CVE-2021-47370, CVE-2021-47371, CVE-2021-47372, CVE-2021-47373, CVE-2021-47374, CVE-2021-47375, CVE-2021-47376, CVE-2021-47378, CVE-2021-47379, CVE-2021-47380, CVE-2021-47381, CVE-2021-47382, CVE-2021-47383, CVE-2021-47384, CVE-2021-47385, CVE-2021-47386, CVE-2021-47387, CVE-2021-47388, CVE-2021-47389, CVE-2021-47390, CVE-2021-47391, CVE-2021-47392, CVE-2021-47393, CVE-2021-47394, CVE-2021-47395, CVE-2021-47396, CVE-2021-47397, CVE-2021-47398, CVE-2021-47399, CVE-2021-47400, CVE-2021-47401, CVE-2021-47402, CVE-2021-47403, CVE-2021-47404, CVE-2021-47405, CVE-2021-47406, CVE-2021-47407, CVE-2021-47408, CVE-2021-47409, CVE-2021-47410, CVE-2021-47412, CVE-2021-47413, CVE-2021-47414, CVE-2021-47415, CVE-2021-47416, CVE-2021-47417, CVE-2021-47418, CVE-2021-47419, CVE-2021-47420, CVE-2021-47421, CVE-2021-47422, CVE-2021-47423, CVE-2021-47424, CVE-2021-47425, CVE-2021-47426, CVE-2021-47427, CVE-2021-47428, CVE-2021-47429, CVE-2021-47430, CVE-2021-47431, CVE-2021-47433, CVE-2021-47434, CVE-2021-47435, CVE-2021-47436, CVE-2021-47437, CVE-2021-47438, CVE-2021-47439, CVE-2021-47440, CVE-2021-47441, CVE-2021-47442, CVE-2021-47443, CVE-2021-47444, CVE-2021-47445, CVE-2021-47446, CVE-2021-47447, CVE-2021-47448, CVE-2021-47449, CVE-2021-47450, CVE-2021-47451, CVE-2021-47452, CVE-2021-47453, CVE-2021-47454, CVE-2021-47455, CVE-2021-47456, CVE-2021-47457, CVE-2021-47458, CVE-2021-47459, CVE-2021-47460, CVE-2021-47461, CVE-2021-47462, CVE-2021-47463, CVE-2021-47464, CVE-2021-47465, CVE-2021-47466, CVE-2021-47467, CVE-2021-47468, CVE-2021-47469, CVE-2021-47470, CVE-2021-47471, CVE-2021-47472, CVE-2021-47473, CVE-2021-47474, CVE-2021-47475, CVE-2021-47476, CVE-2021-47477, CVE-2021-47478, CVE-2021-47479, CVE-2021-47480, CVE-2021-47481, CVE-2021-47482, CVE-2021-47483, CVE-2021-47484, CVE-2021-47485, CVE-2021-47486, CVE-2021-47488, CVE-2021-47489, CVE-2021-47490, CVE-2021-47491, CVE-2021-47492, CVE-2021-47493, CVE-2021-47494, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47498, CVE-2021-47499, CVE-2021-47500, CVE-2021-47501, CVE-2021-47502, CVE-2021-47503, CVE-2021-47504, CVE-2021-47505, CVE-2021-47506, CVE-2021-47507, CVE-2021-47508, CVE-2021-47509, CVE-2021-47510, CVE-2021-47511, CVE-2021-47512, CVE-2021-47513, CVE-2021-47514, CVE-2021-47516, CVE-2021-47518, CVE-2021-47520, CVE-2021-47521, CVE-2021-47522, CVE-2021-47523, CVE-2021-47524, CVE-2021-47525, CVE-2021-47526, CVE-2021-47527, CVE-2021-47528, CVE-2021-47529, CVE-2021-47530, CVE-2021-47531, CVE-2021-47532, CVE-2021-47533, CVE-2021-47534, CVE-2021-47535, CVE-2021-47536, CVE-2021-47537, CVE-2021-47540, CVE-2021-47541, CVE-2021-47542, CVE-2021-47544, CVE-2021-47548, CVE-2021-47549, CVE-2021-47550, CVE-2021-47551, CVE-2021-47552, CVE-2021-47553, CVE-2021-47554, CVE-2021-47555, CVE-2021-47556, CVE-2021-47557, CVE-2021-47558, CVE-2021-47559, CVE-2021-47560, CVE-2021-47562, CVE-2021-47563, CVE-2021-47564, CVE-2021-47565, CVE-2021-47569, CVE-2022-48633, CVE-2022-48662, CVE-2022-48669, CVE-2022-48689, CVE-2022-48691, CVE-2022-48699, CVE-2022-48705, CVE-2022-48708, CVE-2022-48709, CVE-2022-48710, CVE-2023-0160, CVE-2023-1829, CVE-2023-42755, CVE-2023-47233, CVE-2023-52586, CVE-2023-52591, CVE-2023-52618, CVE-2023-52642, CVE-2023-52643, CVE-2023-52644, CVE-2023-52646, CVE-2023-52650, CVE-2023-52653, CVE-2023-52654, CVE-2023-52655, CVE-2023-52656, CVE-2023-52657, CVE-2023-52659, CVE-2023-52660, CVE-2023-52661, CVE-2023-52662, CVE-2023-52664, CVE-2023-52669, CVE-2023-52671, CVE-2023-52674, CVE-2023-52676, CVE-2023-52678, CVE-2023-52679, CVE-2023-52680, CVE-2023-52683, CVE-2023-52685, CVE-2023-52686, CVE-2023-52690, CVE-2023-52691, CVE-2023-52692, CVE-2023-52693, CVE-2023-52694, CVE-2023-52696, CVE-2023-52698, CVE-2023-52699, CVE-2023-52702, CVE-2023-52703, CVE-2023-52705, CVE-2023-52707, CVE-2023-52708, CVE-2023-52730, CVE-2023-52731, CVE-2023-52732, CVE-2023-52733, CVE-2023-52736, CVE-2023-52738, CVE-2023-52739, CVE-2023-52740, CVE-2023-52741, CVE-2023-52742, CVE-2023-52743, CVE-2023-52744, CVE-2023-52745, CVE-2023-52746, CVE-2023-52747, CVE-2023-52753, CVE-2023-52754, CVE-2023-52756, CVE-2023-52757, CVE-2023-52759, CVE-2023-52763, CVE-2023-52764, CVE-2023-52766, CVE-2023-52773, CVE-2023-52774, CVE-2023-52777, CVE-2023-52781, CVE-2023-52788, CVE-2023-52789, CVE-2023-52791, CVE-2023-52795, CVE-2023-52796, CVE-2023-52798, CVE-2023-52799, CVE-2023-52800, CVE-2023-52803, CVE-2023-52804, CVE-2023-52805, CVE-2023-52806, CVE-2023-52807, CVE-2023-52808, CVE-2023-52809, CVE-2023-52810, CVE-2023-52811, CVE-2023-52814, CVE-2023-52815, CVE-2023-52816, CVE-2023-52817, CVE-2023-52818, CVE-2023-52819, CVE-2023-52821, CVE-2023-52825, CVE-2023-52826, CVE-2023-52832, CVE-2023-52833, CVE-2023-52834, CVE-2023-52838, CVE-2023-52840, CVE-2023-52841, CVE-2023-52844, CVE-2023-52847, CVE-2023-52851, CVE-2023-52853, CVE-2023-52854, CVE-2023-52855, CVE-2023-52856, CVE-2023-52858, CVE-2023-52860, CVE-2023-52861, CVE-2023-52864, CVE-2023-52865, CVE-2023-52867, CVE-2023-52868, CVE-2023-52870, CVE-2023-52871, CVE-2023-52872, CVE-2023-52873, CVE-2023-52875, CVE-2023-52876, CVE-2023-52877, CVE-2023-52878, CVE-2023-52880, CVE-2023-6531, CVE-2024-2201, CVE-2024-26597, CVE-2024-26643, CVE-2024-26679, CVE-2024-26692, CVE-2024-26698, CVE-2024-26700, CVE-2024-26715, CVE-2024-26739, CVE-2024-26742, CVE-2024-26748, CVE-2024-26758, CVE-2024-26764, CVE-2024-26775, CVE-2024-26777, CVE-2024-26778, CVE-2024-26788, CVE-2024-26791, CVE-2024-26801, CVE-2024-26822, CVE-2024-26828, CVE-2024-26829, CVE-2024-26838, CVE-2024-26839, CVE-2024-26840, CVE-2024-26846, CVE-2024-26859, CVE-2024-26870, CVE-2024-26874, CVE-2024-26876, CVE-2024-26877, CVE-2024-26880, CVE-2024-26889, CVE-2024-26894, CVE-2024-26900, CVE-2024-26907, CVE-2024-26915, CVE-2024-26916, CVE-2024-26919, CVE-2024-26920, CVE-2024-26921, CVE-2024-26922, CVE-2024-26925, CVE-2024-26928, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26933, CVE-2024-26934, CVE-2024-26935, CVE-2024-26937, CVE-2024-26938, CVE-2024-26939, CVE-2024-26940, CVE-2024-26943, CVE-2024-26957, CVE-2024-26958, CVE-2024-26964, CVE-2024-26974, CVE-2024-26977, CVE-2024-26979, CVE-2024-26984, CVE-2024-26988, CVE-2024-26989, CVE-2024-26994, CVE-2024-26996, CVE-2024-26997, CVE-2024-26999, CVE-2024-27000, CVE-2024-27001, CVE-2024-27004, CVE-2024-27008, CVE-2024-27028, CVE-2024-27037, CVE-2024-27042, CVE-2024-27045, CVE-2024-27047, CVE-2024-27051, CVE-2024-27052, CVE-2024-27053, CVE-2024-27054, CVE-2024-27059, CVE-2024-27072, CVE-2024-27073, CVE-2024-27074, CVE-2024-27075, CVE-2024-27076, CVE-2024-27077, CVE-2024-27078, CVE-2024-27388, CVE-2024-27393, CVE-2024-27395, CVE-2024-27396, CVE-2024-27398, CVE-2024-27399, CVE-2024-27400, CVE-2024-27401, CVE-2024-27405, CVE-2024-27410, CVE-2024-27412, CVE-2024-27413, CVE-2024-27416, CVE-2024-27417, CVE-2024-27419, CVE-2024-27431, CVE-2024-27435, CVE-2024-27436, CVE-2024-35789, CVE-2024-35791, CVE-2024-35796, CVE-2024-35799, CVE-2024-35801, CVE-2024-35804, CVE-2024-35806, CVE-2024-35809, CVE-2024-35811, CVE-2024-35812, CVE-2024-35813, CVE-2024-35815, CVE-2024-35817, CVE-2024-35821, CVE-2024-35822, CVE-2024-35823, CVE-2024-35825, CVE-2024-35828, CVE-2024-35829, CVE-2024-35830, CVE-2024-35833, CVE-2024-35845, CVE-2024-35847, CVE-2024-35849, CVE-2024-35851, CVE-2024-35852, CVE-2024-35854, CVE-2024-35860, CVE-2024-35861, CVE-2024-35862, CVE-2024-35863, CVE-2024-35864, CVE-2024-35865, CVE-2024-35866, CVE-2024-35867, CVE-2024-35868, CVE-2024-35869, CVE-2024-35870, CVE-2024-35872, CVE-2024-35875, CVE-2024-35877, CVE-2024-35878, CVE-2024-35879, CVE-2024-35885, CVE-2024-35887, CVE-2024-35895, CVE-2024-35901, CVE-2024-35904, CVE-2024-35905, CVE-2024-35907, CVE-2024-35912, CVE-2024-35914, CVE-2024-35915, CVE-2024-35922, CVE-2024-35924, CVE-2024-35930, CVE-2024-35932, CVE-2024-35933, CVE-2024-35935, CVE-2024-35936, CVE-2024-35938, CVE-2024-35939, CVE-2024-35940, CVE-2024-35943, CVE-2024-35944, CVE-2024-35947, CVE-2024-35950, CVE-2024-35951, CVE-2024-35952, CVE-2024-35955, CVE-2024-35959, CVE-2024-35963, CVE-2024-35964, CVE-2024-35965, CVE-2024-35966, CVE-2024-35967, CVE-2024-35969, CVE-2024-35973, CVE-2024-35976, CVE-2024-35978, CVE-2024-35982, CVE-2024-35984, CVE-2024-35989, CVE-2024-35990, CVE-2024-35998, CVE-2024-35999, CVE-2024-36006, CVE-2024-36007, CVE-2024-36012, CVE-2024-36014, CVE-2024-36015, CVE-2024-36016, CVE-2024-36026, CVE-2024-36029, CVE-2024-36032, CVE-2024-36880, CVE-2024-36893, CVE-2024-36896, CVE-2024-36897, CVE-2024-36906, CVE-2024-36918, CVE-2024-36924, CVE-2024-36926, CVE-2024-36928, CVE-2024-36931, CVE-2024-36938, CVE-2024-36940, CVE-2024-36941, CVE-2024-36942, CVE-2024-36944, CVE-2024-36947, CVE-2024-36950, CVE-2024-36952, CVE-2024-36955, CVE-2024-36959 Jira References: PED-3259, PED-7167 Maintenance Incident: [SUSE:Maintenance:34200](https://smelt.suse.de/incident/34200/) Sources used: Development Tools Module 15-SP5 (src): kernel-syms-5.14.21-150500.55.68.1, kernel-obs-build-5.14.21-150500.55.68.1, kernel-source-5.14.21-150500.55.68.1 SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5_Update_15-1-150500.11.3.1 openSUSE Leap 15.5 (src): kernel-obs-qa-5.14.21-150500.55.68.1, kernel-obs-build-5.14.21-150500.55.68.1, kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1, kernel-livepatch-SLE15-SP5_Update_15-1-150500.11.3.1, kernel-syms-5.14.21-150500.55.68.1, kernel-source-5.14.21-150500.55.68.1 SUSE Linux Enterprise Micro 5.5 (src): kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 Basesystem Module 15-SP5 (src): kernel-source-5.14.21-150500.55.68.1, kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
done