[SUSE-SU-2024:2901-1] Security update for the Linux Kernel

Severity Important
CVEs 178

Security update for the Linux Kernel

The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

  • CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).
  • CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633).
  • CVE-2024-39506: liquidio: adjust a NULL pointer handling path in lio_vf_rep_copy_packet (bsc#1227729).
  • CVE-2021-47619: i40e: Fix queues reservation for XDP (bsc#1226645).
  • CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743).
  • CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible (bsc#1228705).
  • CVE-2024-42223: media: dvb-frontends: tda10048: Fix integer overflow (bsc#1228726).
  • CVE-2024-42119: drm/amd/display: Skip finding free audio for unknown engine_id (bsc#1228584).
  • CVE-2024-42120: drm/amd/display: Check pipe offset before setting vblank (bsc#1228588).
  • CVE-2024-41095: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes (bsc#1228662).
  • CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list (bsc#1228723).
  • CVE-2024-41072: wifi: cfg80211: wext: add extra SIOCSIWSCAN data check (bsc#1228626).
  • CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565).
  • CVE-2024-40995: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (bsc#1227830).
  • CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets (bsc#1228530).
  • CVE-2024-41066: ibmvnic: add tx check to prevent skb leak (bsc#1228640).
  • CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680).
  • CVE-2024-41089: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes (bsc#1228658).
  • CVE-2024-41060: drm/radeon: check bo_va->bo is non-NULL before using it (bsc#1228567).
  • CVE-2022-48829: NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes (bsc#1228055).
  • CVE-2022-48828: NFSD: Fix ia_size underflow (bsc#1228054).
  • CVE-2022-48827: NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1228037).
  • CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable failure (bsc#1228655).
  • CVE-2024-41071: wifi: mac80211: Avoid address calculations via out of bounds array indexing (bsc#1228625).
  • CVE-2024-41064: powerpc/eeh: avoid possible crash when edev->pdev changes (bsc#1228599).
  • CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700).
  • CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617).
  • CVE-2024-40978: scsi: qedi: Fix crash while reading debugfs attribute (bsc#1227929).
  • CVE-2022-48792: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task (bsc#1228013).
  • CVE-2022-48823: scsi: qedf: Fix refcount issue when LOGO is received during TMF (bsc#1228045).
  • CVE-2024-41076: NFSv4: Fix memory leak in nfs4_set_security_label (bsc#1228649).
  • CVE-2024-40998: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() (bsc#1227866).
  • CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
  • CVE-2024-40987: drm/amdgpu: fix UBSAN warning in kv_dpm.c (bsc#1228235).
  • CVE-2022-48826: drm/vc4: Fix deadlock on DSI device attach error (bsc#1227975)
  • CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ (bsc#1222625).
  • CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry() (bsc#1228409).
  • CVE-2024-41016: ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410).
  • CVE-2024-41063: bluetooth: hci_core: cancel all works upon hci_unregister_dev() (bsc#1228580).
  • CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (bsc#1228470).
  • CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() (bsc#1228581).
  • CVE-2021-47405: HID: usbhid: free raw_report buffers in usbhid_stop (bsc#1225238).
  • CVE-2024-40988: drm/radeon: fix UBSAN warning in kv_dpm.c (bsc#1227957).
  • CVE-2024-40932: drm/exynos/vidi: fix memory leak in .get_modes() (bsc#1227828).
  • CVE-2021-47403: ipack: ipoctal: fix module reference leak (bsc#1225241).
  • CVE-2021-47388: mac80211: fix use-after-free in CCMP/GCMP RX (bsc#1225214).
  • CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data (bsc#1228408).
  • CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327).
  • CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
  • CVE-2024-40999: net: ena: Add validation for completion descriptors consistency (bsc#1227913).
  • CVE-2024-35837: net: mvpp2: clear BM pool before initialization (bsc#1224500).
  • CVE-2021-47588: sit: do not call ipip6_dev_free() from sit_init_net() (bsc#1226568).
  • CVE-2022-48804: vt_ioctl: fix array_index_nospec in vt_setactivate (bsc#1227968).
  • CVE-2024-40967: serial: imx: Introduce timeout when waiting on transmitter empty (bsc#1227891).
  • CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc (bsc#1227886).
  • CVE-2022-48850: net-sysfs: add check for netdevice being present to speed_show (bsc#1228071).
  • CVE-2021-47582: usb: core: Do not hold the device lock while sleeping in do_proc_control() (bsc#1226559).
  • CVE-2024-40982: ssb: fix potential NULL pointer dereference in ssb_device_uevent() (bsc#1227865).
  • CVE-2021-47468: isdn: mISDN: Fix sleeping function called from invalid context (bsc#1225346).
  • CVE-2021-47395: mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap (bsc#1225326).
  • CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path (bsc#1227936).
  • CVE-2023-52594: Fixed potential array-index-out-of-bounds read in ath9k_htc_txstatus() (bsc#1221045).
  • CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets (bsc#1228003).
  • CVE-2021-47580: scsi: scsi_debug: Fix type in min_t to avoid stack OOB (bsc#1226550).
  • CVE-2024-26735: ipv6: sr: fix possible use-after-free and null-ptr-deref (bsc#1222372).
  • CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).
  • CVE-2022-48811: ibmvnic: do not release napi in __ibmvnic_open() (bsc#1227928).
  • CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bsc#1186463).
  • CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (bsc#1179610).
  • CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836).
  • CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario (bsc#1227730).
  • CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure (bsc#1227786).
  • CVE-2024-40941: wifi: iwlwifi: mvm: do not read past the mfuart notifcation (bsc#1227771).
  • CVE-2022-48860: ethernet: Fix error handling in xemaclite_of_probe (bsc#1228008).
  • CVE-2022-48863: mISDN: Fix memory leak in dsp_pipeline_build() (bsc#1228063).
  • CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() (bsc#1227806).
  • CVE-2024-39499: vmci: prevent speculation leaks by sanitizing event in event_deliver() (bsc#1227725).
  • CVE-2024-39487: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (bsc#1227573)
  • CVE-2024-35934: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() (bsc#1224641)
  • CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (bsc#1227884).
  • CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512)
  • CVE-2021-47441: mlxsw: thermal: Fix out-of-bounds memory accesses (bsc#1225224)
  • CVE-2021-47194: cfg80211: call cfg80211_stop_ap when switch from P2P_GO type (bsc#1222829).
  • CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (bsc#1223815)
  • CVE-2022-48775: Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj (bsc#1227924).
  • CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (bsc#1223813)
  • CVE-2024-40929: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids (bsc#1227774).
  • CVE-2024-40912: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() (bsc#1227790).
  • CVE-2024-40942: wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects (bsc#1227770).
  • CVE-2022-48857: NFC: port100: fix use-after-free in port100_send_complete (bsc#1228005).
  • CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (bsc#1225719).
  • CVE-2021-47606: net: netlink: af_netlink: Prevent empty skb by adding a check on len. (bsc#1226555).
  • CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory (bsc#1227762).
  • CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).
  • CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove administratively set MAC (bsc#1223012).
  • CVE-2021-47516: nfp: Fix memory leak in nfp_cpp_area_cache_add() (bsc#1225427).
  • CVE-2021-47501: i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc (bsc#1225361).
  • CVE-2024-39501: drivers: core: synchronize really_probe() and dev_uevent() (bsc#1227754).
  • CVE-2023-52743: ice: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1225003)
  • CVE-2021-47542: net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() (bsc#1225455).
  • CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711)
  • CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1224545)
  • CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778)
  • CVE-2021-47599: btrfs: use latest_dev in btrfs_show_devname (bsc#1226571).
  • CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138).
  • CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (bsc#1222326).
  • CVE-2021-47597: inet_diag: fix kernel-infoleak for UDP sockets (bsc#1226553).
  • CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core (bsc#1227626).
  • CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for ICMPv6 (bsc#1226783).
  • CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942).
  • CVE-2023-52619: Fixed possible crash when setting number of cpus to an odd number in pstore/ram (bsc#1221618).
  • CVE-2024-26659: Fixed wrong handling of isoc Babble and Buffer Overrun events in xhci (bsc#1222317).
  • CVE-2024-35978: Bluetooth: Fix memory leak in hci_req_sync_complete() (bsc#1224571).
  • CVE-2023-52669: crypto: s390/aes - Fix buffer overread in CTR mode (bsc#1224637).
  • CVE-2023-52615: Fixed page fault dead lock on mmap-ed hwrng (bsc#1221614).
  • CVE-2023-52612: Fixed req->dst buffer overflow in crypto/scomp (bsc#1221616).
  • CVE-2024-35995: ACPI: CPPC: Use access_width over bit_width for system memory accesses (bsc#1224557).
  • CVE-2023-52623: Fixed suspicious RCU usage in SUNRPC (bsc#1222060).
  • CVE-2021-47295: net: sched: fix memory leak in tcindex_partial_destroy_work (bsc#1224975)
  • CVE-2023-52693: ACPI: video: check for error while searching for backlight device parent (bsc#1224686).
  • CVE-2023-52683: ACPI: LPIT: Avoid u32 multiplication overflow (bsc#1224627).
  • CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
  • CVE-2024-39475: fbdev: savage: Handle err return when savagefb_check_var failed (bsc#1227435)
  • CVE-2021-47520: can: pch_can: pch_can_rx_normal: fix use after free (bsc#1225431).
  • CVE-2024-36941: wifi: nl80211: do not free NULL coalescing rule (bsc#1225835).
  • CVE-2021-47145: btrfs: do not BUG_ON in link_to_fixup_dir (bsc#1222005).
  • CVE-2021-47547: net: tulip: de4x5: fix the problem that the array 'lp->phy' may be out of bound (bsc#1225505).
  • CVE-2023-52817: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (bsc#1225569).
  • CVE-2023-52819: drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (bsc#1225532).
  • CVE-2023-52818: drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 (bsc#1225530).
  • CVE-2023-52753: drm/amd/display: Avoid NULL dereference of timing generator (bsc#1225478).
  • CVE-2024-36014: drm/arm/malidp: fix a possible null pointer dereference (bsc#1225593).
  • CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes (bsc#1221659).
  • CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656).
  • CVE-2024-35828: wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer() (bsc#1224622).
  • CVE-2023-52507: Fixed possible shift-out-of-bounds in nfc/nci (bsc#1220833).
  • CVE-2024-38598: md: fix resync softlockup when bitmap size is less than array size (bsc#1226757).
  • CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit (bsc#1224743).
  • CVE-2024-26880: dm: call the resume method on internal suspend (bsc#1223188).
  • CVE-2021-47498: dm rq: do not queue request to blk-mq during DM suspend (bsc#1225357).
  • CVE-2021-47275: bcache: avoid oversized read request in cache missing code path (bsc#1224965).
  • CVE-2024-38619: usb-storage: alauda: Check whether the media is initialized (bsc#1226861).
  • CVE-2021-47201: iavf: free q_vectors before queues in iavf_disable_vf (bsc#1222792).
  • CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node() (bsc#1223021).
  • CVE-2024-38630: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (bsc#1226908).
  • CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994).
  • CVE-2021-47559: net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk() (bsc#1225396).

The following non-security bugs were fixed:

  • Fix spurious WARNING caused by a qxl driver patch (bsc#1227213,bsc#1227191)
  • KVM: PPC: Book3S HV: Do not take kvm->lock around kvm_for_each_vcpu (bsc#1065729).
  • KVM: PPC: Book3S HV: remove extraneous asterisk from rm_host_ipi_action() comment (bsc#1065729).
  • KVM: PPC: Book3S PR: Exiting split hack mode needs to fixup both PC and LR (bsc#1065729).
  • KVM: PPC: Book3S: Fix some RCU-list locks (git-fixes).
  • KVM: PPC: Book3S: Only report KVM_CAP_SPAPR_TCE_VFIO on powernv machines (bsc#1065729).
  • KVM: PPC: Book3S: Use new mutex to synchronize access to rtas token list (bsc#1065729).
  • KVM: PPC: Inform the userspace about TCE update failures (bsc#1065729).
  • KVM: PPC: Move and undef TRACE_INCLUDE_PATH/FILE (bsc#1065729).
  • PCI: Fix resource double counting on remove & rescan (git-fixes).
  • PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git-fixes).
  • PM: hibernate: x86: Use crc32 instead of md5 for hibernation e820 integrity check (git-fixes).
  • SUNRPC: Fix gss_free_in_token_pages() (git-fixes).
  • SUNRPC: Fix loop termination condition in gss_free_in_token_pages() (git-fixes).
  • Tools: hv: kvp: eliminate 'may be used uninitialized' warning (git-fixes).
  • USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (git-fixes).
  • btrfs: fix 64bit compat send ioctl arguments not initializing version member (bsc#1228030).
  • btrfs: fix send ioctl on 32bit with 64bit kernel (bsc#1228030).
  • btrfs: incremental send, fix emission of invalid clone operations (bsc#1228030).
  • btrfs: remove unused members dir_path from recorded_ref (bsc#1228030).
  • btrfs: send, improve clone range (bsc#1228030).
  • btrfs: send: add new command FILEATTR for file attributes (bsc#1228030).
  • btrfs: send: add stream v2 definitions (bsc#1228030).
  • btrfs: send: always use the rbtree based inode ref management infrastructure (bsc#1228030).
  • btrfs: send: avoid copying file data (bsc#1228030).
  • btrfs: send: explicitly number commands and attributes (bsc#1228030).
  • btrfs: send: fix failures when processing inodes with no links (bsc#1228030).
  • btrfs: send: fix send failure of a subcase of orphan inodes (bsc#1228030).
  • btrfs: send: fix sending link commands for existing file paths (bsc#1228030).
  • btrfs: send: get rid of i_size logic in send_write() (bsc#1228030).
  • btrfs: send: introduce recorded_ref_alloc and recorded_ref_free (bsc#1228030).
  • btrfs: send: prepare for v2 protocol (bsc#1228030).
  • btrfs: send: refactor arguments of get_inode_info() (bsc#1228030).
  • btrfs: send: remove stale code when checking for shared extents (bsc#1228030).
  • btrfs: send: remove unused found_type parameter to lookup_dir_item_inode() (bsc#1228030).
  • btrfs: send: remove unused send_ctx::{total,cmd}_send_size (bsc#1228030).
  • btrfs: send: use boolean types for current inode status (bsc#1228030).
  • btrfs: silence maybe-uninitialized warning in clone_range (bsc#1228030).
  • drm/amdgpu/debugfs: fix error code when smc register accessors are NULL (git-fixes).
  • drm/vc4: dsi: Only register our component once a DSI device is (bsc#1227975)
  • hv_netvsc: rndis_filter needs to select NLS (git-fixes).
  • ipv6: sr: fix incorrect unregister order (git-fixes).
  • kgdb: Add kgdb_has_hit_break function (git-fixes).
  • kgdb: Move the extern declaration kgdb_has_hit_break() to generic kgdb.h (git-fixes).
  • net: hsr: fix placement of logical operator in a multi-line statement (bsc#1223021).
  • net: mana: Fix the extra HZ in mana_hwc_send_request (git-fixes).
  • net: mana: select PAGE_POOL (git-fixes).
  • net_sched: add a temporary refcnt for struct tcindex_data (bsc#1224975).
  • net_sched: fix a memory leak in cls_tcindex (bsc#1224975).
  • net_sched: fix a missing refcnt in tcindex_init() (bsc#1224975).
  • net_sched: hold rtnl lock in tcindex_partial_destroy_work() (bsc#1224975)
  • nfs: Handle error of rpc_proc_register() in nfs_net_init() (git-fixes).
  • nvme: fixup comment for nvme RDMA Provider Type (git-fixes).
  • ocfs2: fix DIO failure due to insufficient transaction credits (bsc#1216834).
  • ocfs2: remove redundant assignment to variable free_space (bsc#1228409).
  • ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410).
  • powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487).
  • sched/deadline: Fix BUG_ON condition for deboosted tasks (bsc#1227407).
  • scsi: qla2xxx: Avoid possible run-time warning with long model_num (bsc#1228850).
  • scsi: qla2xxx: Complete command early within lock (bsc#1228850).
  • scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).
  • scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).
  • scsi: qla2xxx: During vport delete send async logout explicitly (bsc#1228850).
  • scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850).
  • scsi: qla2xxx: Fix flash read failure (bsc#1228850).
  • scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850).
  • scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850).
  • scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850).
  • scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850).
  • scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds (bsc#1228850).
  • scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850).
  • scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850).
  • scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850).
  • scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850).
  • signal: Introduce clear_siginfo (git-fixes).
  • string.h: Introduce memtostr() and memtostr_pad() (bsc#1228850).
  • sunrpc: fix NFSACL RPC retry on soft mount (git-fixes).
  • tools lib: Fix builds when glibc contains strlcpy() (git-fixes).
  • tools: hv: fix KVP and VSS daemons exit code (git-fixes).
  • usb: add a hcd_uses_dma helper (git-fixes).
  • usb: atm: cxacru: fix endpoint checking in cxacru_bind() (git-fixes).
  • usb: musb: da8xx: fix a resource leak in probe() (git-fixes).
  • x86/apic: Fix kernel panic when booting with intremap=off and x2apic_phys (git-fixes).
  • x86/bhi: Avoid warning in #DB handler due to BHI mitigation (git-fixes).
  • x86/boot/e820: Fix typo in e820.c comment (git-fixes).
  • x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-fixes).
  • x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI (git-fixes).
  • x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs (git-fixes).
  • x86/fpu: Return proper error codes from user access functions (git-fixes).
  • x86/ioremap: Fix page aligned size calculation in __ioremap_caller() (git-fixes).
  • x86/kprobes: Fix kprobes instruction boudary check with CONFIG_RETHUNK (git-fixes).
  • x86/kprobes: Fix optprobe optimization check with CONFIG_RETHUNK (git-fixes).
  • x86/msr: Fix wr/rdmsr_safe_regs_on_cpu() prototypes (git-fixes).
  • x86/numa: Use cpumask_available instead of hardcoded NULL check (git-fixes).
  • x86: __memcpy_flushcache: fix wrong alignment if size > 232 (git-fixes).
  • xfs: check that dir block entries do not off the end of the buffer (git-fixes).
  • xfs: refactor xfs_verifier_error and xfs_buf_ioerror (git-fixes).
  • xfs: remove XFS_WANT_CORRUPTED_RETURN from dir3 data verifiers (git-fixes).
  • xhci: Poll for U0 after disabling USB2 LPM (git-fixes).
ID
SUSE-SU-2024:2901-1
Severity
important
URL
https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/
Published
2024-08-14T07:24:46
(4 weeks ago)
Modified
2024-08-14T07:24:46
(4 weeks ago)
Rights
Copyright 2024 SUSE LLC. All rights reserved.
Other Advisories
Source # ID Name URL
Suse SUSE ratings https://www.suse.com/support/security/rating/
Suse URL of this CSAF notice https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2901-1.json
Suse URL for SUSE-SU-2024:2901-1 https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/
Suse E-Mail link for SUSE-SU-2024:2901-1 https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html
Bugzilla SUSE Bug 1065729 https://bugzilla.suse.com/1065729
Bugzilla SUSE Bug 1088701 https://bugzilla.suse.com/1088701
Bugzilla SUSE Bug 1149446 https://bugzilla.suse.com/1149446
Bugzilla SUSE Bug 1179610 https://bugzilla.suse.com/1179610
Bugzilla SUSE Bug 1186463 https://bugzilla.suse.com/1186463
Bugzilla SUSE Bug 1196018 https://bugzilla.suse.com/1196018
Bugzilla SUSE Bug 1202346 https://bugzilla.suse.com/1202346
Bugzilla SUSE Bug 1215420 https://bugzilla.suse.com/1215420
Bugzilla SUSE Bug 1216834 https://bugzilla.suse.com/1216834
Bugzilla SUSE Bug 1220138 https://bugzilla.suse.com/1220138
Bugzilla SUSE Bug 1220833 https://bugzilla.suse.com/1220833
Bugzilla SUSE Bug 1220942 https://bugzilla.suse.com/1220942
Bugzilla SUSE Bug 1221045 https://bugzilla.suse.com/1221045
Bugzilla SUSE Bug 1221614 https://bugzilla.suse.com/1221614
Bugzilla SUSE Bug 1221616 https://bugzilla.suse.com/1221616
Bugzilla SUSE Bug 1221618 https://bugzilla.suse.com/1221618
Bugzilla SUSE Bug 1221656 https://bugzilla.suse.com/1221656
Bugzilla SUSE Bug 1221659 https://bugzilla.suse.com/1221659
Bugzilla SUSE Bug 1222005 https://bugzilla.suse.com/1222005
Bugzilla SUSE Bug 1222060 https://bugzilla.suse.com/1222060
Bugzilla SUSE Bug 1222317 https://bugzilla.suse.com/1222317
Bugzilla SUSE Bug 1222326 https://bugzilla.suse.com/1222326
Bugzilla SUSE Bug 1222372 https://bugzilla.suse.com/1222372
Bugzilla SUSE Bug 1222625 https://bugzilla.suse.com/1222625
Bugzilla SUSE Bug 1222776 https://bugzilla.suse.com/1222776
Bugzilla SUSE Bug 1222792 https://bugzilla.suse.com/1222792
Bugzilla SUSE Bug 1222824 https://bugzilla.suse.com/1222824
Bugzilla SUSE Bug 1222829 https://bugzilla.suse.com/1222829
Bugzilla SUSE Bug 1222866 https://bugzilla.suse.com/1222866
Bugzilla SUSE Bug 1223012 https://bugzilla.suse.com/1223012
Bugzilla SUSE Bug 1223021 https://bugzilla.suse.com/1223021
Bugzilla SUSE Bug 1223188 https://bugzilla.suse.com/1223188
Bugzilla SUSE Bug 1223778 https://bugzilla.suse.com/1223778
Bugzilla SUSE Bug 1223813 https://bugzilla.suse.com/1223813
Bugzilla SUSE Bug 1223815 https://bugzilla.suse.com/1223815
Bugzilla SUSE Bug 1224500 https://bugzilla.suse.com/1224500
Bugzilla SUSE Bug 1224512 https://bugzilla.suse.com/1224512
Bugzilla SUSE Bug 1224545 https://bugzilla.suse.com/1224545
Bugzilla SUSE Bug 1224557 https://bugzilla.suse.com/1224557
Bugzilla SUSE Bug 1224571 https://bugzilla.suse.com/1224571
Bugzilla SUSE Bug 1224576 https://bugzilla.suse.com/1224576
Bugzilla SUSE Bug 1224587 https://bugzilla.suse.com/1224587
Bugzilla SUSE Bug 1224622 https://bugzilla.suse.com/1224622
Bugzilla SUSE Bug 1224627 https://bugzilla.suse.com/1224627
Bugzilla SUSE Bug 1224637 https://bugzilla.suse.com/1224637
Bugzilla SUSE Bug 1224641 https://bugzilla.suse.com/1224641
Bugzilla SUSE Bug 1224647 https://bugzilla.suse.com/1224647
Bugzilla SUSE Bug 1224663 https://bugzilla.suse.com/1224663
Bugzilla SUSE Bug 1224683 https://bugzilla.suse.com/1224683
Bugzilla SUSE Bug 1224686 https://bugzilla.suse.com/1224686
Bugzilla SUSE Bug 1224699 https://bugzilla.suse.com/1224699
Bugzilla SUSE Bug 1224700 https://bugzilla.suse.com/1224700
Bugzilla SUSE Bug 1224743 https://bugzilla.suse.com/1224743
Bugzilla SUSE Bug 1224965 https://bugzilla.suse.com/1224965
Bugzilla SUSE Bug 1224975 https://bugzilla.suse.com/1224975
Bugzilla SUSE Bug 1225003 https://bugzilla.suse.com/1225003
Bugzilla SUSE Bug 1225214 https://bugzilla.suse.com/1225214
Bugzilla SUSE Bug 1225224 https://bugzilla.suse.com/1225224
Bugzilla SUSE Bug 1225229 https://bugzilla.suse.com/1225229
Bugzilla SUSE Bug 1225238 https://bugzilla.suse.com/1225238
Bugzilla SUSE Bug 1225241 https://bugzilla.suse.com/1225241
Bugzilla SUSE Bug 1225326 https://bugzilla.suse.com/1225326
Bugzilla SUSE Bug 1225328 https://bugzilla.suse.com/1225328
Bugzilla SUSE Bug 1225346 https://bugzilla.suse.com/1225346
Bugzilla SUSE Bug 1225357 https://bugzilla.suse.com/1225357
Bugzilla SUSE Bug 1225361 https://bugzilla.suse.com/1225361
Bugzilla SUSE Bug 1225396 https://bugzilla.suse.com/1225396
Bugzilla SUSE Bug 1225427 https://bugzilla.suse.com/1225427
Bugzilla SUSE Bug 1225431 https://bugzilla.suse.com/1225431
Bugzilla SUSE Bug 1225455 https://bugzilla.suse.com/1225455
Bugzilla SUSE Bug 1225478 https://bugzilla.suse.com/1225478
Bugzilla SUSE Bug 1225505 https://bugzilla.suse.com/1225505
Bugzilla SUSE Bug 1225530 https://bugzilla.suse.com/1225530
Bugzilla SUSE Bug 1225532 https://bugzilla.suse.com/1225532
Bugzilla SUSE Bug 1225569 https://bugzilla.suse.com/1225569
Bugzilla SUSE Bug 1225593 https://bugzilla.suse.com/1225593
Bugzilla SUSE Bug 1225711 https://bugzilla.suse.com/1225711
Bugzilla SUSE Bug 1225719 https://bugzilla.suse.com/1225719
Bugzilla SUSE Bug 1225767 https://bugzilla.suse.com/1225767
Bugzilla SUSE Bug 1225820 https://bugzilla.suse.com/1225820
Bugzilla SUSE Bug 1225835 https://bugzilla.suse.com/1225835
Bugzilla SUSE Bug 1225838 https://bugzilla.suse.com/1225838
Bugzilla SUSE Bug 1225898 https://bugzilla.suse.com/1225898
Bugzilla SUSE Bug 1226550 https://bugzilla.suse.com/1226550
Bugzilla SUSE Bug 1226553 https://bugzilla.suse.com/1226553
Bugzilla SUSE Bug 1226555 https://bugzilla.suse.com/1226555
Bugzilla SUSE Bug 1226559 https://bugzilla.suse.com/1226559
Bugzilla SUSE Bug 1226568 https://bugzilla.suse.com/1226568
Bugzilla SUSE Bug 1226571 https://bugzilla.suse.com/1226571
Bugzilla SUSE Bug 1226645 https://bugzilla.suse.com/1226645
Bugzilla SUSE Bug 1226757 https://bugzilla.suse.com/1226757
Bugzilla SUSE Bug 1226783 https://bugzilla.suse.com/1226783
Bugzilla SUSE Bug 1226786 https://bugzilla.suse.com/1226786
Bugzilla SUSE Bug 1226834 https://bugzilla.suse.com/1226834
Bugzilla SUSE Bug 1226861 https://bugzilla.suse.com/1226861
Bugzilla SUSE Bug 1226908 https://bugzilla.suse.com/1226908
Bugzilla SUSE Bug 1226994 https://bugzilla.suse.com/1226994
Bugzilla SUSE Bug 1227191 https://bugzilla.suse.com/1227191
Bugzilla SUSE Bug 1227213 https://bugzilla.suse.com/1227213
Bugzilla SUSE Bug 1227407 https://bugzilla.suse.com/1227407
Bugzilla SUSE Bug 1227435 https://bugzilla.suse.com/1227435
Bugzilla SUSE Bug 1227487 https://bugzilla.suse.com/1227487
Bugzilla SUSE Bug 1227573 https://bugzilla.suse.com/1227573
Bugzilla SUSE Bug 1227618 https://bugzilla.suse.com/1227618
Bugzilla SUSE Bug 1227626 https://bugzilla.suse.com/1227626
Bugzilla SUSE Bug 1227716 https://bugzilla.suse.com/1227716
Bugzilla SUSE Bug 1227725 https://bugzilla.suse.com/1227725
Bugzilla SUSE Bug 1227729 https://bugzilla.suse.com/1227729
Bugzilla SUSE Bug 1227730 https://bugzilla.suse.com/1227730
Bugzilla SUSE Bug 1227733 https://bugzilla.suse.com/1227733
Bugzilla SUSE Bug 1227750 https://bugzilla.suse.com/1227750
Bugzilla SUSE Bug 1227754 https://bugzilla.suse.com/1227754
Bugzilla SUSE Bug 1227762 https://bugzilla.suse.com/1227762
Bugzilla SUSE Bug 1227770 https://bugzilla.suse.com/1227770
Bugzilla SUSE Bug 1227771 https://bugzilla.suse.com/1227771
Bugzilla SUSE Bug 1227772 https://bugzilla.suse.com/1227772
Bugzilla SUSE Bug 1227774 https://bugzilla.suse.com/1227774
Bugzilla SUSE Bug 1227786 https://bugzilla.suse.com/1227786
Bugzilla SUSE Bug 1227790 https://bugzilla.suse.com/1227790
Bugzilla SUSE Bug 1227806 https://bugzilla.suse.com/1227806
Bugzilla SUSE Bug 1227824 https://bugzilla.suse.com/1227824
Bugzilla SUSE Bug 1227828 https://bugzilla.suse.com/1227828
Bugzilla SUSE Bug 1227830 https://bugzilla.suse.com/1227830
Bugzilla SUSE Bug 1227836 https://bugzilla.suse.com/1227836
Bugzilla SUSE Bug 1227849 https://bugzilla.suse.com/1227849
Bugzilla SUSE Bug 1227865 https://bugzilla.suse.com/1227865
Bugzilla SUSE Bug 1227866 https://bugzilla.suse.com/1227866
Bugzilla SUSE Bug 1227884 https://bugzilla.suse.com/1227884
Bugzilla SUSE Bug 1227886 https://bugzilla.suse.com/1227886
Bugzilla SUSE Bug 1227891 https://bugzilla.suse.com/1227891
Bugzilla SUSE Bug 1227913 https://bugzilla.suse.com/1227913
Bugzilla SUSE Bug 1227924 https://bugzilla.suse.com/1227924
Bugzilla SUSE Bug 1227928 https://bugzilla.suse.com/1227928
Bugzilla SUSE Bug 1227929 https://bugzilla.suse.com/1227929
Bugzilla SUSE Bug 1227936 https://bugzilla.suse.com/1227936
Bugzilla SUSE Bug 1227957 https://bugzilla.suse.com/1227957
Bugzilla SUSE Bug 1227968 https://bugzilla.suse.com/1227968
Bugzilla SUSE Bug 1227969 https://bugzilla.suse.com/1227969
Bugzilla SUSE Bug 1227975 https://bugzilla.suse.com/1227975
Bugzilla SUSE Bug 1227985 https://bugzilla.suse.com/1227985
Bugzilla SUSE Bug 1227989 https://bugzilla.suse.com/1227989
Bugzilla SUSE Bug 1228003 https://bugzilla.suse.com/1228003
Bugzilla SUSE Bug 1228005 https://bugzilla.suse.com/1228005
Bugzilla SUSE Bug 1228008 https://bugzilla.suse.com/1228008
Bugzilla SUSE Bug 1228013 https://bugzilla.suse.com/1228013
Bugzilla SUSE Bug 1228025 https://bugzilla.suse.com/1228025
Bugzilla SUSE Bug 1228030 https://bugzilla.suse.com/1228030
Bugzilla SUSE Bug 1228037 https://bugzilla.suse.com/1228037
Bugzilla SUSE Bug 1228045 https://bugzilla.suse.com/1228045
Bugzilla SUSE Bug 1228054 https://bugzilla.suse.com/1228054
Bugzilla SUSE Bug 1228055 https://bugzilla.suse.com/1228055
Bugzilla SUSE Bug 1228063 https://bugzilla.suse.com/1228063
Bugzilla SUSE Bug 1228071 https://bugzilla.suse.com/1228071
Bugzilla SUSE Bug 1228235 https://bugzilla.suse.com/1228235
Bugzilla SUSE Bug 1228237 https://bugzilla.suse.com/1228237
Bugzilla SUSE Bug 1228327 https://bugzilla.suse.com/1228327
Bugzilla SUSE Bug 1228328 https://bugzilla.suse.com/1228328
Bugzilla SUSE Bug 1228408 https://bugzilla.suse.com/1228408
Bugzilla SUSE Bug 1228409 https://bugzilla.suse.com/1228409
Bugzilla SUSE Bug 1228410 https://bugzilla.suse.com/1228410
Bugzilla SUSE Bug 1228470 https://bugzilla.suse.com/1228470
Bugzilla SUSE Bug 1228530 https://bugzilla.suse.com/1228530
Bugzilla SUSE Bug 1228561 https://bugzilla.suse.com/1228561
Bugzilla SUSE Bug 1228565 https://bugzilla.suse.com/1228565
Bugzilla SUSE Bug 1228567 https://bugzilla.suse.com/1228567
Bugzilla SUSE Bug 1228580 https://bugzilla.suse.com/1228580
Bugzilla SUSE Bug 1228581 https://bugzilla.suse.com/1228581
Bugzilla SUSE Bug 1228584 https://bugzilla.suse.com/1228584
Bugzilla SUSE Bug 1228588 https://bugzilla.suse.com/1228588
Bugzilla SUSE Bug 1228599 https://bugzilla.suse.com/1228599
Bugzilla SUSE Bug 1228617 https://bugzilla.suse.com/1228617
Bugzilla SUSE Bug 1228625 https://bugzilla.suse.com/1228625
Bugzilla SUSE Bug 1228626 https://bugzilla.suse.com/1228626
Bugzilla SUSE Bug 1228633 https://bugzilla.suse.com/1228633
Bugzilla SUSE Bug 1228640 https://bugzilla.suse.com/1228640
Bugzilla SUSE Bug 1228649 https://bugzilla.suse.com/1228649
Bugzilla SUSE Bug 1228655 https://bugzilla.suse.com/1228655
Bugzilla SUSE Bug 1228658 https://bugzilla.suse.com/1228658
Bugzilla SUSE Bug 1228662 https://bugzilla.suse.com/1228662
Bugzilla SUSE Bug 1228680 https://bugzilla.suse.com/1228680
Bugzilla SUSE Bug 1228705 https://bugzilla.suse.com/1228705
Bugzilla SUSE Bug 1228723 https://bugzilla.suse.com/1228723
Bugzilla SUSE Bug 1228726 https://bugzilla.suse.com/1228726
Bugzilla SUSE Bug 1228743 https://bugzilla.suse.com/1228743
Bugzilla SUSE Bug 1228850 https://bugzilla.suse.com/1228850
CVE SUSE CVE CVE-2020-26558 page https://www.suse.com/security/cve/CVE-2020-26558/
CVE SUSE CVE CVE-2021-0129 page https://www.suse.com/security/cve/CVE-2021-0129/
CVE SUSE CVE CVE-2021-47145 page https://www.suse.com/security/cve/CVE-2021-47145/
CVE SUSE CVE CVE-2021-47191 page https://www.suse.com/security/cve/CVE-2021-47191/
CVE SUSE CVE CVE-2021-47194 page https://www.suse.com/security/cve/CVE-2021-47194/
CVE SUSE CVE CVE-2021-47197 page https://www.suse.com/security/cve/CVE-2021-47197/
CVE SUSE CVE CVE-2021-47201 page https://www.suse.com/security/cve/CVE-2021-47201/
CVE SUSE CVE CVE-2021-47219 page https://www.suse.com/security/cve/CVE-2021-47219/
CVE SUSE CVE CVE-2021-47275 page https://www.suse.com/security/cve/CVE-2021-47275/
CVE SUSE CVE CVE-2021-47295 page https://www.suse.com/security/cve/CVE-2021-47295/
CVE SUSE CVE CVE-2021-47388 page https://www.suse.com/security/cve/CVE-2021-47388/
CVE SUSE CVE CVE-2021-47395 page https://www.suse.com/security/cve/CVE-2021-47395/
CVE SUSE CVE CVE-2021-47399 page https://www.suse.com/security/cve/CVE-2021-47399/
CVE SUSE CVE CVE-2021-47403 page https://www.suse.com/security/cve/CVE-2021-47403/
CVE SUSE CVE CVE-2021-47405 page https://www.suse.com/security/cve/CVE-2021-47405/
CVE SUSE CVE CVE-2021-47438 page https://www.suse.com/security/cve/CVE-2021-47438/
CVE SUSE CVE CVE-2021-47441 page https://www.suse.com/security/cve/CVE-2021-47441/
CVE SUSE CVE CVE-2021-47468 page https://www.suse.com/security/cve/CVE-2021-47468/
CVE SUSE CVE CVE-2021-47498 page https://www.suse.com/security/cve/CVE-2021-47498/
CVE SUSE CVE CVE-2021-47501 page https://www.suse.com/security/cve/CVE-2021-47501/
CVE SUSE CVE CVE-2021-47516 page https://www.suse.com/security/cve/CVE-2021-47516/
CVE SUSE CVE CVE-2021-47520 page https://www.suse.com/security/cve/CVE-2021-47520/
CVE SUSE CVE CVE-2021-47542 page https://www.suse.com/security/cve/CVE-2021-47542/
CVE SUSE CVE CVE-2021-47547 page https://www.suse.com/security/cve/CVE-2021-47547/
CVE SUSE CVE CVE-2021-47559 page https://www.suse.com/security/cve/CVE-2021-47559/
CVE SUSE CVE CVE-2021-47580 page https://www.suse.com/security/cve/CVE-2021-47580/
CVE SUSE CVE CVE-2021-47582 page https://www.suse.com/security/cve/CVE-2021-47582/
CVE SUSE CVE CVE-2021-47588 page https://www.suse.com/security/cve/CVE-2021-47588/
CVE SUSE CVE CVE-2021-47597 page https://www.suse.com/security/cve/CVE-2021-47597/
CVE SUSE CVE CVE-2021-47599 page https://www.suse.com/security/cve/CVE-2021-47599/
CVE SUSE CVE CVE-2021-47606 page https://www.suse.com/security/cve/CVE-2021-47606/
CVE SUSE CVE CVE-2021-47619 page https://www.suse.com/security/cve/CVE-2021-47619/
CVE SUSE CVE CVE-2022-20368 page https://www.suse.com/security/cve/CVE-2022-20368/
CVE SUSE CVE CVE-2022-28748 page https://www.suse.com/security/cve/CVE-2022-28748/
CVE SUSE CVE CVE-2022-2964 page https://www.suse.com/security/cve/CVE-2022-2964/
CVE SUSE CVE CVE-2022-48775 page https://www.suse.com/security/cve/CVE-2022-48775/
CVE SUSE CVE CVE-2022-48792 page https://www.suse.com/security/cve/CVE-2022-48792/
CVE SUSE CVE CVE-2022-48794 page https://www.suse.com/security/cve/CVE-2022-48794/
CVE SUSE CVE CVE-2022-48804 page https://www.suse.com/security/cve/CVE-2022-48804/
CVE SUSE CVE CVE-2022-48805 page https://www.suse.com/security/cve/CVE-2022-48805/
CVE SUSE CVE CVE-2022-48810 page https://www.suse.com/security/cve/CVE-2022-48810/
CVE SUSE CVE CVE-2022-48811 page https://www.suse.com/security/cve/CVE-2022-48811/
CVE SUSE CVE CVE-2022-48823 page https://www.suse.com/security/cve/CVE-2022-48823/
CVE SUSE CVE CVE-2022-48826 page https://www.suse.com/security/cve/CVE-2022-48826/
CVE SUSE CVE CVE-2022-48827 page https://www.suse.com/security/cve/CVE-2022-48827/
CVE SUSE CVE CVE-2022-48828 page https://www.suse.com/security/cve/CVE-2022-48828/
CVE SUSE CVE CVE-2022-48829 page https://www.suse.com/security/cve/CVE-2022-48829/
CVE SUSE CVE CVE-2022-48836 page https://www.suse.com/security/cve/CVE-2022-48836/
CVE SUSE CVE CVE-2022-48839 page https://www.suse.com/security/cve/CVE-2022-48839/
CVE SUSE CVE CVE-2022-48850 page https://www.suse.com/security/cve/CVE-2022-48850/
CVE SUSE CVE CVE-2022-48855 page https://www.suse.com/security/cve/CVE-2022-48855/
CVE SUSE CVE CVE-2022-48857 page https://www.suse.com/security/cve/CVE-2022-48857/
CVE SUSE CVE CVE-2022-48860 page https://www.suse.com/security/cve/CVE-2022-48860/
CVE SUSE CVE CVE-2022-48863 page https://www.suse.com/security/cve/CVE-2022-48863/
CVE SUSE CVE CVE-2023-4244 page https://www.suse.com/security/cve/CVE-2023-4244/
CVE SUSE CVE CVE-2023-52435 page https://www.suse.com/security/cve/CVE-2023-52435/
CVE SUSE CVE CVE-2023-52507 page https://www.suse.com/security/cve/CVE-2023-52507/
CVE SUSE CVE CVE-2023-52594 page https://www.suse.com/security/cve/CVE-2023-52594/
CVE SUSE CVE CVE-2023-52612 page https://www.suse.com/security/cve/CVE-2023-52612/
CVE SUSE CVE CVE-2023-52615 page https://www.suse.com/security/cve/CVE-2023-52615/
CVE SUSE CVE CVE-2023-52619 page https://www.suse.com/security/cve/CVE-2023-52619/
CVE SUSE CVE CVE-2023-52623 page https://www.suse.com/security/cve/CVE-2023-52623/
CVE SUSE CVE CVE-2023-52669 page https://www.suse.com/security/cve/CVE-2023-52669/
CVE SUSE CVE CVE-2023-52683 page https://www.suse.com/security/cve/CVE-2023-52683/
CVE SUSE CVE CVE-2023-52693 page https://www.suse.com/security/cve/CVE-2023-52693/
CVE SUSE CVE CVE-2023-52743 page https://www.suse.com/security/cve/CVE-2023-52743/
CVE SUSE CVE CVE-2023-52753 page https://www.suse.com/security/cve/CVE-2023-52753/
CVE SUSE CVE CVE-2023-52817 page https://www.suse.com/security/cve/CVE-2023-52817/
CVE SUSE CVE CVE-2023-52818 page https://www.suse.com/security/cve/CVE-2023-52818/
CVE SUSE CVE CVE-2023-52819 page https://www.suse.com/security/cve/CVE-2023-52819/
CVE SUSE CVE CVE-2023-52885 page https://www.suse.com/security/cve/CVE-2023-52885/
CVE SUSE CVE CVE-2024-26615 page https://www.suse.com/security/cve/CVE-2024-26615/
CVE SUSE CVE CVE-2024-26635 page https://www.suse.com/security/cve/CVE-2024-26635/
CVE SUSE CVE CVE-2024-26636 page https://www.suse.com/security/cve/CVE-2024-26636/
CVE SUSE CVE CVE-2024-26659 page https://www.suse.com/security/cve/CVE-2024-26659/
CVE SUSE CVE CVE-2024-26663 page https://www.suse.com/security/cve/CVE-2024-26663/
CVE SUSE CVE CVE-2024-26735 page https://www.suse.com/security/cve/CVE-2024-26735/
CVE SUSE CVE CVE-2024-26830 page https://www.suse.com/security/cve/CVE-2024-26830/
CVE SUSE CVE CVE-2024-26863 page https://www.suse.com/security/cve/CVE-2024-26863/
CVE SUSE CVE CVE-2024-26880 page https://www.suse.com/security/cve/CVE-2024-26880/
CVE SUSE CVE CVE-2024-26920 page https://www.suse.com/security/cve/CVE-2024-26920/
CVE SUSE CVE CVE-2024-26924 page https://www.suse.com/security/cve/CVE-2024-26924/
CVE SUSE CVE CVE-2024-27019 page https://www.suse.com/security/cve/CVE-2024-27019/
CVE SUSE CVE CVE-2024-27020 page https://www.suse.com/security/cve/CVE-2024-27020/
CVE SUSE CVE CVE-2024-27025 page https://www.suse.com/security/cve/CVE-2024-27025/
CVE SUSE CVE CVE-2024-27437 page https://www.suse.com/security/cve/CVE-2024-27437/
CVE SUSE CVE CVE-2024-35805 page https://www.suse.com/security/cve/CVE-2024-35805/
CVE SUSE CVE CVE-2024-35806 page https://www.suse.com/security/cve/CVE-2024-35806/
CVE SUSE CVE CVE-2024-35819 page https://www.suse.com/security/cve/CVE-2024-35819/
CVE SUSE CVE CVE-2024-35828 page https://www.suse.com/security/cve/CVE-2024-35828/
CVE SUSE CVE CVE-2024-35837 page https://www.suse.com/security/cve/CVE-2024-35837/
CVE SUSE CVE CVE-2024-35887 page https://www.suse.com/security/cve/CVE-2024-35887/
CVE SUSE CVE CVE-2024-35893 page https://www.suse.com/security/cve/CVE-2024-35893/
CVE SUSE CVE CVE-2024-35934 page https://www.suse.com/security/cve/CVE-2024-35934/
CVE SUSE CVE CVE-2024-35947 page https://www.suse.com/security/cve/CVE-2024-35947/
CVE SUSE CVE CVE-2024-35949 page https://www.suse.com/security/cve/CVE-2024-35949/
CVE SUSE CVE CVE-2024-35966 page https://www.suse.com/security/cve/CVE-2024-35966/
CVE SUSE CVE CVE-2024-35967 page https://www.suse.com/security/cve/CVE-2024-35967/
CVE SUSE CVE CVE-2024-35978 page https://www.suse.com/security/cve/CVE-2024-35978/
CVE SUSE CVE CVE-2024-35995 page https://www.suse.com/security/cve/CVE-2024-35995/
CVE SUSE CVE CVE-2024-36004 page https://www.suse.com/security/cve/CVE-2024-36004/
CVE SUSE CVE CVE-2024-36014 page https://www.suse.com/security/cve/CVE-2024-36014/
CVE SUSE CVE CVE-2024-36288 page https://www.suse.com/security/cve/CVE-2024-36288/
CVE SUSE CVE CVE-2024-36592 page https://www.suse.com/security/cve/CVE-2024-36592/
CVE SUSE CVE CVE-2024-36901 page https://www.suse.com/security/cve/CVE-2024-36901/
CVE SUSE CVE CVE-2024-36902 page https://www.suse.com/security/cve/CVE-2024-36902/
CVE SUSE CVE CVE-2024-36919 page https://www.suse.com/security/cve/CVE-2024-36919/
CVE SUSE CVE CVE-2024-36924 page https://www.suse.com/security/cve/CVE-2024-36924/
CVE SUSE CVE CVE-2024-36939 page https://www.suse.com/security/cve/CVE-2024-36939/
CVE SUSE CVE CVE-2024-36941 page https://www.suse.com/security/cve/CVE-2024-36941/
CVE SUSE CVE CVE-2024-36952 page https://www.suse.com/security/cve/CVE-2024-36952/
CVE SUSE CVE CVE-2024-38558 page https://www.suse.com/security/cve/CVE-2024-38558/
CVE SUSE CVE CVE-2024-38560 page https://www.suse.com/security/cve/CVE-2024-38560/
CVE SUSE CVE CVE-2024-38598 page https://www.suse.com/security/cve/CVE-2024-38598/
CVE SUSE CVE CVE-2024-38619 page https://www.suse.com/security/cve/CVE-2024-38619/
CVE SUSE CVE CVE-2024-38630 page https://www.suse.com/security/cve/CVE-2024-38630/
CVE SUSE CVE CVE-2024-39301 page https://www.suse.com/security/cve/CVE-2024-39301/
CVE SUSE CVE CVE-2024-39475 page https://www.suse.com/security/cve/CVE-2024-39475/
CVE SUSE CVE CVE-2024-39487 page https://www.suse.com/security/cve/CVE-2024-39487/
CVE SUSE CVE CVE-2024-39488 page https://www.suse.com/security/cve/CVE-2024-39488/
CVE SUSE CVE CVE-2024-39490 page https://www.suse.com/security/cve/CVE-2024-39490/
CVE SUSE CVE CVE-2024-39494 page https://www.suse.com/security/cve/CVE-2024-39494/
CVE SUSE CVE CVE-2024-39499 page https://www.suse.com/security/cve/CVE-2024-39499/
CVE SUSE CVE CVE-2024-39501 page https://www.suse.com/security/cve/CVE-2024-39501/
CVE SUSE CVE CVE-2024-39506 page https://www.suse.com/security/cve/CVE-2024-39506/
CVE SUSE CVE CVE-2024-39507 page https://www.suse.com/security/cve/CVE-2024-39507/
CVE SUSE CVE CVE-2024-39509 page https://www.suse.com/security/cve/CVE-2024-39509/
CVE SUSE CVE CVE-2024-40901 page https://www.suse.com/security/cve/CVE-2024-40901/
CVE SUSE CVE CVE-2024-40904 page https://www.suse.com/security/cve/CVE-2024-40904/
CVE SUSE CVE CVE-2024-40912 page https://www.suse.com/security/cve/CVE-2024-40912/
CVE SUSE CVE CVE-2024-40923 page https://www.suse.com/security/cve/CVE-2024-40923/
CVE SUSE CVE CVE-2024-40929 page https://www.suse.com/security/cve/CVE-2024-40929/
CVE SUSE CVE CVE-2024-40932 page https://www.suse.com/security/cve/CVE-2024-40932/
CVE SUSE CVE CVE-2024-40937 page https://www.suse.com/security/cve/CVE-2024-40937/
CVE SUSE CVE CVE-2024-40941 page https://www.suse.com/security/cve/CVE-2024-40941/
CVE SUSE CVE CVE-2024-40942 page https://www.suse.com/security/cve/CVE-2024-40942/
CVE SUSE CVE CVE-2024-40943 page https://www.suse.com/security/cve/CVE-2024-40943/
CVE SUSE CVE CVE-2024-40953 page https://www.suse.com/security/cve/CVE-2024-40953/
CVE SUSE CVE CVE-2024-40959 page https://www.suse.com/security/cve/CVE-2024-40959/
CVE SUSE CVE CVE-2024-40966 page https://www.suse.com/security/cve/CVE-2024-40966/
CVE SUSE CVE CVE-2024-40967 page https://www.suse.com/security/cve/CVE-2024-40967/
CVE SUSE CVE CVE-2024-40978 page https://www.suse.com/security/cve/CVE-2024-40978/
CVE SUSE CVE CVE-2024-40982 page https://www.suse.com/security/cve/CVE-2024-40982/
CVE SUSE CVE CVE-2024-40987 page https://www.suse.com/security/cve/CVE-2024-40987/
CVE SUSE CVE CVE-2024-40988 page https://www.suse.com/security/cve/CVE-2024-40988/
CVE SUSE CVE CVE-2024-40990 page https://www.suse.com/security/cve/CVE-2024-40990/
CVE SUSE CVE CVE-2024-40995 page https://www.suse.com/security/cve/CVE-2024-40995/
CVE SUSE CVE CVE-2024-40998 page https://www.suse.com/security/cve/CVE-2024-40998/
CVE SUSE CVE CVE-2024-40999 page https://www.suse.com/security/cve/CVE-2024-40999/
CVE SUSE CVE CVE-2024-41014 page https://www.suse.com/security/cve/CVE-2024-41014/
CVE SUSE CVE CVE-2024-41015 page https://www.suse.com/security/cve/CVE-2024-41015/
CVE SUSE CVE CVE-2024-41016 page https://www.suse.com/security/cve/CVE-2024-41016/
CVE SUSE CVE CVE-2024-41044 page https://www.suse.com/security/cve/CVE-2024-41044/
CVE SUSE CVE CVE-2024-41048 page https://www.suse.com/security/cve/CVE-2024-41048/
CVE SUSE CVE CVE-2024-41059 page https://www.suse.com/security/cve/CVE-2024-41059/
CVE SUSE CVE CVE-2024-41060 page https://www.suse.com/security/cve/CVE-2024-41060/
CVE SUSE CVE CVE-2024-41063 page https://www.suse.com/security/cve/CVE-2024-41063/
CVE SUSE CVE CVE-2024-41064 page https://www.suse.com/security/cve/CVE-2024-41064/
CVE SUSE CVE CVE-2024-41066 page https://www.suse.com/security/cve/CVE-2024-41066/
CVE SUSE CVE CVE-2024-41070 page https://www.suse.com/security/cve/CVE-2024-41070/
CVE SUSE CVE CVE-2024-41071 page https://www.suse.com/security/cve/CVE-2024-41071/
CVE SUSE CVE CVE-2024-41072 page https://www.suse.com/security/cve/CVE-2024-41072/
CVE SUSE CVE CVE-2024-41076 page https://www.suse.com/security/cve/CVE-2024-41076/
CVE SUSE CVE CVE-2024-41078 page https://www.suse.com/security/cve/CVE-2024-41078/
CVE SUSE CVE CVE-2024-41081 page https://www.suse.com/security/cve/CVE-2024-41081/
CVE SUSE CVE CVE-2024-41089 page https://www.suse.com/security/cve/CVE-2024-41089/
CVE SUSE CVE CVE-2024-41090 page https://www.suse.com/security/cve/CVE-2024-41090/
CVE SUSE CVE CVE-2024-41091 page https://www.suse.com/security/cve/CVE-2024-41091/
CVE SUSE CVE CVE-2024-41095 page https://www.suse.com/security/cve/CVE-2024-41095/
CVE SUSE CVE CVE-2024-42070 page https://www.suse.com/security/cve/CVE-2024-42070/
CVE SUSE CVE CVE-2024-42093 page https://www.suse.com/security/cve/CVE-2024-42093/
CVE SUSE CVE CVE-2024-42096 page https://www.suse.com/security/cve/CVE-2024-42096/
CVE SUSE CVE CVE-2024-42119 page https://www.suse.com/security/cve/CVE-2024-42119/
CVE SUSE CVE CVE-2024-42120 page https://www.suse.com/security/cve/CVE-2024-42120/
CVE SUSE CVE CVE-2024-42124 page https://www.suse.com/security/cve/CVE-2024-42124/
CVE SUSE CVE CVE-2024-42145 page https://www.suse.com/security/cve/CVE-2024-42145/
CVE SUSE CVE CVE-2024-42223 page https://www.suse.com/security/cve/CVE-2024-42223/
CVE SUSE CVE CVE-2024-42224 page https://www.suse.com/security/cve/CVE-2024-42224/
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...