4.6 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.9 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
50.0%
The remote SUSE Linux SLED12 / SLED_SAP12 / SLES12 / SLES_SAP12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:1870-1 advisory.
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2019-25160: Fixed out-of-bounds memory accesses in netlabel (bsc#1220394).
- CVE-2020-36312: Fixed an issue in virt/kvm/kvm_main.c that had a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure (bsc#1184509).
- CVE-2021-23134: Fixed a use-after-free issue in nfc sockets (bsc#1186060).
- CVE-2021-46904: Fixed NULL pointer dereference during tty device unregistration (bsc#1220416).
- CVE-2021-46905: Fixed NULL pointer dereference on disconnect regression (bsc#1220418).
- CVE-2021-46909: Fixed PCI interrupt mapping in ARM footbridge (bsc#1220442).
- CVE-2021-46938: Fixed double free of blk_mq_tag_set in dev remove after table load fails (bsc#1220554).
- CVE-2021-46939: Fixed possible hung in trace_clock_global() (bsc#1220580).
- CVE-2021-46941: Fixed core softreset when switch mode in usb dwc3 (bsc#1220628).
- CVE-2021-46950: Fixed possible data corruption in md/raid1 when ending a failed write request (bsc#1220662).
- CVE-2021-46958: Fixed race between transaction aborts and fsyncs that could lead to use-after-free in btrfs (bsc#1220521).
- CVE-2021-46960: Fixed wrong error code from smb2_get_enc_key() (bsc#1220528).
- CVE-2021-46963: Fixed crash in qla2xxx_mqueuecommand() (bsc#1220536).
- CVE-2021-46964: Fixed unreserved extra IRQ vectors in qla2xxx (bsc#1220538).
- CVE-2021-46966: Fixed potential use-after-free issue in cm_write() (bsc#1220572).
- CVE-2021-46981: Fixed NULL pointer in flush_workqueue (bsc#1220611).
- CVE-2021-46988: Fixed possible crash in userfaultfd due to unreleased page (bsc#1220706).
- CVE-2021-46990: Fixed crashes when toggling entry flush barrier in powerpc/64s (bsc#1220743).
- CVE-2021-46998: Fixed a use after free bug in enic_hard_start_xmit() (bsc#1220625).
- CVE-2021-47006: Fixed wrong check in overflow_handler hook in ARM 9064/1 hw_breakpoint (bsc#1220751).
- CVE-2021-47015: Fixed RX consumer index logic in the error path in bnxt_en (bsc#1220794).
- CVE-2021-47024: Fixed possible memory leak in vsock/virtio when closing socket (bsc#1220637).
- CVE-2021-47034: Fixed resolved pte update for kernel memory on radix in powerpc/64s (bsc#1220687).
- CVE-2021-47045: Fixed null pointer dereference in lpfc_prep_els_iocb() (bsc#1220640).
- CVE-2021-47049: Fixed Use after free in __vmbus_open() (bsc#1220692).
- CVE-2021-47055: Fixed missing permissions for locking and badblock ioctls in mtd (bsc#1220768).
- CVE-2021-47056: Fixed uninitialized lock in adf_vf2pf_shutdown() (bsc#1220769).
- CVE-2021-47060: Fixed a bug in KVM by stop looking for coalesced MMIO zones if the bus is destroyed (bsc#1220742).
- CVE-2021-47061: Fixed a bug in KVM by destroy I/O bus devices on unregister failure _after_ sync'ing SRCU (bsc#1220745).
- CVE-2021-47063: Fixed possible use-after-free in panel_bridge_detach() (bsc#1220777).
- CVE-2021-47068: Fixed a use-after-free issue in llcp_sock_bind/connect (bsc#1220739).
- CVE-2021-47070: Fixed memory leak in error handling paths in uio_hv_generic (bsc#1220829).
- CVE-2021-47071: Fixed memory leak in error handling paths in uio_hv_generic (bsc#1220846).
- CVE-2021-47073: Fixed oops on rmmod dell_smbios init_dell_smbios_wmi() (bsc#1220850).
- CVE-2021-47100: Fixed UAF when uninstall in ipmi (bsc#1220985).
- CVE-2021-47101: Fixed uninit-value in asix_mdio_read() (bsc#1220987).
- CVE-2021-47104: Fixed memory leak in qib_user_sdma_queue_pkts() (bsc#1220960).
- CVE-2021-47110: Fixed possible memory corruption when restoring from hibernation in x86/kvm (bsc#1221532).
- CVE-2021-47112: Fixed possible memory corruption when restoring from hibernation in x86/kvm (bsc#1221541).
- CVE-2021-47114: Fixed data corruption by fallocate in ocfs2 (bsc#1221548).
- CVE-2021-47117: Fixed bug on in ext4_es_cache_extent() as ext4_split_extent_at() failed (bsc#1221575).
- CVE-2021-47118: Fixed possible use-after-free when initializing `cad_pid` (bsc#1221605).
- CVE-2021-47119: Fixed memory leak in ext4_fill_super() (bsc#1221608).
- CVE-2021-47138: Fixed possible out-of-bound memory access in cxgb4 when clearing filters (bsc#1221934).
- CVE-2021-47141: Fixed possible NULL pointer dereference when freeing irqs (bsc#1221949).
- CVE-2021-47142: Fixed a use-after-free in drm/amdgpu (bsc#1221952).
- CVE-2021-47143: Fixed possible corruption in net/smc after failed device_add() (bsc#1221988).
- CVE-2021-47150: Fixed the potential memory leak in fec_enet_init() (bsc#1221973).
- CVE-2021-47153: Fixed wrongly generated interrupt on bus reset in i2c/i801 (bsc#1221969).
- CVE-2021-47165: Fixed shutdown crash when component not probed in drm/meson (bsc#1221965).
- CVE-2021-47166: Fixed possible corruptionb in nfs_do_recoalesce() (bsc#1221998).
- CVE-2021-47167: Fixed an Oopsable condition in __nfs_pageio_add_request() (bsc#1221991).
- CVE-2021-47168: Fixed an incorrect limit in filelayout_decode_layout() (bsc#1222002).
- CVE-2021-47169: Fixed possible NULL pointer dereference in serial/rp2 (bsc#1222000).
- CVE-2021-47171: Fixed memory leak in smsc75xx_bind() (bsc#1221994).
- CVE-2021-47173: Fixed memory leak in uss720_probe() (bsc#1221993).
- CVE-2021-47177: Fixed sysfs leak in alloc_iommu() (bsc#1221997).
- CVE-2021-47179: Fixed a NULL pointer dereference in pnfs_mark_matching_lsegs_return() (bsc#1222001).
- CVE-2021-47180: Fixed memory leak in nci_allocate_device() (bsc#1221999).
- CVE-2021-47181: Fixed a null pointer dereference caused by calling platform_get_resource() (bsc#1222660).
- CVE-2021-47183: Fixed a null pointer dereference during link down processing in scsi lpfc (bsc#1192145, bsc#1222664).
- CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669).
- CVE-2021-47189: Fixed denial of service due to memory ordering issues between normal and ordered work functions in btrfs (bsc#1222706).
- CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions (bsc#1222878)
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-48619: Fixed a denial-of-service issue in drivers/input/input.c (bsc#1218220).
- CVE-2022-48626: Fixed a potential use-after-free on remove path moxart (bsc#1220366).
- CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system (bsc#1209657).
- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
- CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1212514).
- CVE-2023-52454: Fixed a kernel panic when host sends an invalid H2C PDU length (bsc#1220320).
- CVE-2023-52469: Fixed use-after-free in kv_parse_power_table() (bsc#1220411).
- CVE-2023-52470: Fixed null-ptr-deref in radeon_crtc_init() (bsc#122041).
- CVE-2023-52474: Fixed bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests in hfi1 (bsc#1220445).
- CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI during vsyscall (bsc#1220703).
- CVE-2023-52477: Fixed USB Hub accesses to uninitialized BOS descriptors (bsc#1220790).
- CVE-2023-52486: Fixed possible use-after-free in drm (bsc#1221277).
- CVE-2023-52509: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1220836).
- CVE-2023-52515: Fixed possible use-after-free in RDMA/srp (bsc#1221048).
- CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927).
- CVE-2023-52528: Fixed uninit-value access in __smsc75xx_read_reg() (bsc#1220843).
- CVE-2023-52575: Fixed SBPB enablement for spec_rstack_overflow=off (bsc#1220871).
- CVE-2023-52583: Fixed deadlock or deadcode of misusing dget() inside ceph (bsc#1221058).
- CVE-2023-52587: Fixed mcast list locking in IB/ipoib (bsc#1221082).
- CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory renaming (bsc#1221088).
- CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).
- CVE-2023-52598: Fixed wrong setting of fpc register in s390/ptrace (bsc#1221060).
- CVE-2023-52607: Fixed NULL pointer dereference in pgtable_cache_add kasprintf() (bsc#1221061).
- CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222117).
- CVE-2023-52639: Fixed race during shadow creation in KVM/s390/vsie (bsc#1222300).
- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).
- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).
- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).
- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).
- CVE-2023-7042: Fixed a NULL pointer dereference vulnerability in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).
- CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c (bsc#1218479).
- CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
- CVE-2024-22099: Fixed NULL Pointer Dereference vulnerability in /net/bluetooth/rfcomm/core.c (bsc#1219170).
- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).
- CVE-2024-24855: Fixed a null pointer dereference due to race condition in scsi device driver in lpfc_unregister_fcf_rescan() function (bsc#1219618).
- CVE-2024-24861: Fixed an overflow due to race condition in media/xc4000 device driver in xc4000 xc4000_get_frequency() function (bsc#1219623).
- CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks (bsc#1221293).
- CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter nf_tables (bsc#1221830).
- CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422).
- CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
- CVE-2024-26743: Fixed memory leak in qedr_create_user_qp error flow in rdma/qedr (bsc#1222677)
- CVE-2024-26744: Fixed null pointer dereference in srpt_service_guid parameter in rdma/srpt (bsc#1222449)
- CVE-2024-26754: Fixed an use-after-free and null-ptr-deref in gtp_genl_dump_pdp() in gtp (bsc#1222632).
- CVE-2024-26763: Fixed user corruption via by writing data with O_DIRECT on device in dm-crypt (bsc#1222720).
- CVE-2024-26771: Fixed a null pointer dereference on edma_probe in dmaengine ti edma (bsc#1222610)
- CVE-2024-26793: Fixed an use-after-free and null-ptr-deref in gtp_newlink() in gtp (bsc#1222428).
- CVE-2024-26805: Fixed a kernel-infoleak-after-free in __skb_datagram_iter in netlink (bsc#1222630).
- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).
- CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache() (bsc#1222976).
- CVE-2021-47161: Fixed a resource leak in an error handling path in the error handling path of the probe function in spi spi-fsl-dspi (bsc#1221966).
- CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223513).
- CVE-2024-26816: Ignore relocations in .notes section when building with CONFIG_XEN_PV=y (bsc#1222624).
- CVE-2023-52595: Fixed possible deadlock in wifi/rt2x00 (bsc#1221046).
- CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).
- CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618).
- CVE-2021-47182: Fixed scsi_mode_sense() buffer length handling (bsc#1222662).
- CVE-2022-48701: Fixed an out-of-bounds bug in __snd_usb_parse_audio_interface() (bsc#1223921).
- CVE-2024-26993: Fixed a reference leak in sysfs_break_active_protection() (bsc#1223693)
- CVE-2023-52650: Added missing check for of_find_device_by_node() (bsc#1223770)
- CVE-2024-26948: Added a dc_state NULL check in dc_state_release (bsc#1223664)
- CVE-2024-27013: Limited printing rate when illegal packet received by tun dev (bsc#1223745).
- CVE-2024-27014: Prevented deadlock while disabling aRFS (bsc#1223735).
- CVE-2024-27046: Handled acti_netdevs allocation failure (bsc#1223827).
- CVE-2021-47162: Fixed a possible memory leak in tipc_buf_append (bsc#1221977).
- CVE-2024-27072: Removed useless locks in usbtv_video_free() (bsc#1223837).
- CVE-2024-27075: Avoided stack overflow warnings with clang (bsc#1223842).
- CVE-2024-27073: Fixed a memory leak in budget_av_attach() (bsc#1223843).
- CVE-2024-27074: Fixed a memory leak in go7007_load_encoder() (bsc#1223844).
- CVE-2024-27078: Fixed a memory leak in tpg_alloc() (bsc#1223781).
- CVE-2023-52652: Fixed a possible name leak in ntb_register_device() (bsc#1223686).
- CVE-2024-23848: Fixed a use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c (bsc#1219104).
- CVE-2024-26859: Prevent access to a freed page in page_pool in bnx2x (bsc#1223049).
- CVE-2024-26817: Used calloc instead of kzalloc to avoid integer overflow (bsc#1222812)
- CVE-2021-47149: Fixed a potential null pointer deref in fmvj18x_get_hwinfo() (bsc#1221972).
- CVE-2023-52620: Disallowed timeout for anonymous sets in nf_tables (bsc#1221825).
- CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223057).
- CVE-2024-26878: Fixed potential NULL pointer dereference, related to dquots (bsc#1223060).
- CVE-2024-26901: Used kzalloc() to fix information leak in do_sys_name_to_handle() (bsc#1223198).
- CVE-2024-26671: Fixed an IO hang from sbitmap wakeup race in blk_mq_mark_tag_wait() (bsc#1222357).
- CVE-2024-26772: Avoided allocating blocks from corrupted group in ext4_mb_find_by_goal() (bsc#1222613).
- CVE-2023-52614: Fixed a buffer overflow in trans_stat_show() (bsc#1221617).
- CVE-2024-26855: Fixed a potential NULL pointer dereference in ice_bridge_setlink() (bsc#1223051).
- CVE-2024-26857: Made sure to pull inner header in geneve_rx() (bsc#1223058).
- CVE-2024-26675: Limited MRU to 64K in ppp_async_ioctl() (bsc#1222379).
- CVE-2024-26907: Fixed a fortify source warning while accessing Eth segment in mlx5 (bsc#1223203).
- CVE-2023-52488: Converted from _raw_ to _noinc_ regmap functions for FIFO in sc16is7xx (bsc#1221162).
- CVE-2024-26922: Validated the parameters of bo mapping operations more clearly (bsc#1223315).
- CVE-2021-47184: Fixed NULL pointer dereference on VSI filter sync (bsc#1222666).
- CVE-2023-52635: Synchronized devfreq_monitor_[start/stop] for devfreq (bsc#1222294).
- CVE-2024-26883: Checked for integer overflow when using roundup_pow_of_two() (bsc#1223035).
- CVE-2024-26884: Fixed a bpf hashtab overflow check on 32-bit architectures (bsc#1223189).
- CVE-2024-26839: Fixed a memleak in init_credit_return() (bsc#1222975)
- CVE-2023-52644: Stop/wake correct queue in DMA Tx path when QoS is disabled in b43 (bsc#1222961).
- CVE-2021-47205: Unregistered clocks/resets when unbinding in sunxi-ng (bsc#1222888).
- CVE-2021-47211: Fixed a null pointer dereference on pointer cs_desc in usb-audio (bsc#1222869).
- CVE-2021-47207: Fixed a null pointer dereference on pointer block in gus (bsc#1222790).
- CVE-2024-26779: Fixed a race condition on enabling fast-xmit in mac80211 (bsc#1222772).
- CVE-2024-26777: Error out if pixclock equals zero in fbdev/sis (bsc#1222765)
- CVE-2024-26778: Error out if pixclock equals zero in fbdev/savage (bsc#1222770)
- CVE-2024-26747: Fixed a NULL pointer issue with USB parent module's reference (bsc#1222609).
The following non-security bugs were fixed:
- Input: adxl34x - do not hardcode interrupt trigger type (git-fixes).
- Input: drv260x - sleep between polling GO bit (git-fixes).
- Input: ipaq-micro-keys - add error handling for devm_kmemdup.
- Input: xpad - add PXN V900 support.
- USB: core: Fix deadlock in usb_deauthorize_interface().
- USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command (git-fixes).
- atl1c: fix error return code in atl1c_probe() (git-fixes).
- atl1e: fix error return code in atl1e_probe() (git-fixes).
- bluetooth: btqca: Fixed a coding style error (git-fixes).
- bluetooth: btqca: Introduce HCI_EV_VENDOR and use it (git-fixes).
- bluetooth: btqcomsmd: Fix command timeout after setting BD address (git-fixes).
- bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).
- bnx2x: Fix enabling network interfaces without VFs (git-fixes).
- bnx2x: Fix missing error code in bnx2x_iov_init_one() (git-fixes).
- bpf, sockmap: Fix preempt_rt splat when using raw_spin_lock_t (git-fixes).
- drivers: usb: host: Fix deadlock in oxu_bus_suspend() (git-fixes).
- ethernet: myri10ge: Fix missing error code in myri10ge_probe() (git-fixes).
- ethernet: ucc_geth: fix definition and size of ucc_geth_tx_global_pram (git-fixes).
- fuse: do not unhash root (bsc#1223954).
- iommu/amd: Increase interrupt remapping table limit to 512 entries (git-fixes).
- iommu/amd: Mark interrupt as managed (git-fixes).
- iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (git-fixes).
- iommu/amd: Silence warnings under memory pressure (git-fixes).
- iommu: Check if group is NULL before remove device (git-fixes).
- kabi fix for pNFS: Fix the pnfs block driver's calculation of layoutget size (git-fixes).
- kabi: pci: Add locking to RMW PCI Express Capability Register accessors (kabi).
- lan78xx: Add missing return code checks (git-fixes).
- lan78xx: Add support to dump lan78xx registers (git-fixes).
- lan78xx: Do not access skb_queue_head list pointers directly (git-fixes).
- lan78xx: Fix exception on link speed change (git-fixes).
- lan78xx: Fix partial packet errors on suspend/resume (git-fixes).
- lan78xx: Fix race conditions in suspend/resume handling (git-fixes).
- lan78xx: Fix white space and style issues (git-fixes).
- lan78xx: Modify error messages (git-fixes).
- lan78xx: enable auto speed configuration for LAN7850 if no EEPROM is detected (git-fixes).
- net/mlx5: Properly convey driver version to firmware (git-fixes).
- net/qla3xxx: fix schedule while atomic in ql_sem_spinlock (git-fixes).
- net: Fix features skip in for_each_netdev_feature() (git-fixes).
- net: allwinner: Fix some resources leak in the error handling path of the probe and in the remove function (git-fixes).
- net: atheros: switch from 'pci_' to 'dma_' API (git-fixes).
- net: lan78xx: Allow for VLAN headers in timeout calcs (git-fixes).
- net: lan78xx: Make declaration style consistent (git-fixes).
- net: lan78xx: Merge memcpy + lexx_to_cpus to get_unaligned_lexx (git-fixes).
- net: lan78xx: fix runtime PM count underflow on link stop (git-fixes).
- net: lan78xx: remove set but not used variable 'event' (git-fixes).
- net: macb: ensure the device is available before accessing GEMGXL control registers (git-fixes).
- net: stmmac: free tx skb buffer in stmmac_resume() (git-fixes).
- net: sunrpc: Fix an off by one in rpc_sockaddr2uaddr() (git-fixes).
- net: usb: lan78xx: Remove lots of set but unused 'ret' variables (git-fixes).
- net:usb: Use ARRAY_SIZE instead of calculating the array size (git-fixes).
- nfs: Fix O_DIRECT commit verifier handling (git-fixes).
- nfs: Fix O_DIRECT locking issues (git-fixes).
- nfs: Fix error handling for O_DIRECT write scheduling (bsc#1224785).
- nfs: Fix a request reference leak in nfs_direct_write_clear_reqs() (git-fixes).
- nfs: Fix an off by one in root_nfs_cat() (git-fixes).
- nfs: Fix direct WRITE throughput regression (git-fixes).
- nfs: Fix error handling for O_DIRECT write scheduling (git-fixes).
- nfs: More O_DIRECT accounting fixes for error paths (git-fixes).
- nfs: add atomic_open for NFSv3 to handle O_TRUNC correctly (bsc#1219847).
- nfs: avoid spurious warning of lost lock that is being unlocked (bsc#1221791).
- nfs: commit errors should be fatal (git-fixes).
- nfs: only issue commit in DIO codepath if we have uncommitted data (git-fixes).
- nfsd: Fix error cleanup path in nfsd_rename() (git-fixes).
- nfsd: Reset cb_seq_status after NFS4ERR_DELAY (git-fixes).
- nfsd: Retransmit callbacks after client reconnects (git-fixes).
- nfsd: lock_rename() needs both directories to live on the same fs (git-fixes).
- nfsv4.1/pnfs: Ensure we handle the error NFS4ERR_RETURNCONFLICT (git-fixes).
- pci/aer: Clear MULTI_ERR_COR/UNCOR_RCV bits (git-fixes).
- pci/aspm: Avoid link retraining race (git-fixes).
- pci/aspm: Disable ASPM on MFD function removal to avoid use-after-free (git-fixes).
- pci/aspm: Do not warn if already in common clock mode (git-fixes).
- pci/aspm: Factor out pcie_wait_for_retrain() (git-fixes).
- pci/aspm: Reduce severity of common clock config message (git-fixes).
- pci/aspm: Return 0 or -ETIMEDOUT from pcie_retrain_link() (git-fixes).
- pci/aspm: Use RMW accessors for changing LNKCTL (git-fixes).
- pci/dpc: Print all TLP Prefixes, not just the first (git-fixes).
- pci/iov: Enlarge virtfn sysfs name buffer (git-fixes).
- pci/msi: Prevent MSI hardware interrupt number truncation (git-fixes).
- pci/pm: Power up all devices during runtime resume (git-fixes).
- pci/sysfs: Protect driver's D3cold preference from user space (git-fixes).
- pci: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).
- pci: Add function 1 DMA alias quirk for Marvell 88SE9235 (git-fixes).
- pci: Add locking to RMW PCI Express Capability Register accessors (git-fixes).
- pci: Avoid FLR for AMD FCH AHCI adapters (git-fixes).
- pci: Avoid pci_dev_lock() AB/BA deadlock with sriov_numvfs_store() (git-fixes).
- pci: Make link retraining use RMW accessors for changing LNKCTL (git-fixes).
- pci: Mark 3ware-9650SE Root Port Extended Tags as broken (git-fixes).
- pci: Rework pcie_retrain_link() wait loop (git-fixes).
- pci: aardvark: Fix setting MSI address (git-fixes).
- pci: aardvark: Fix support for MSI interrupts (git-fixes).
- pci: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-fixes).
- pci: endpoint: Do not stop controller when unbinding endpoint function (git-fixes).
- pci: hotplug: Allow marking devices as disconnected during bind/unbind (git-fixes).
- pci: pciehp: Add pciehp_set_indicators() to set both indicators (git-fixes).
- pci: pciehp: Cancel bringup sequence if card is not present (git-fixes).
- pci: pciehp: Fix AB-BA deadlock between reset_lock and device_lock (git-fixes).
- pci: pciehp: Use RMW accessors for changing LNKCTL (git-fixes).
- pci: qcom: Disable write access to read only registers for IP v2.3.3 (git-fixes).
- pci: qcom: Fix unbalanced PHY init on probe errors (git-fixes).
- pci: qcom: Use DWC helpers for modifying the read-only DBI registers (git-fixes).
- pci: switchtec: Return -EFAULT for copy_to_user() errors (git-fixes).
- pnfs/flexfiles: Check the layout validity in ff_layout_mirror_prepare_stats (git-fixes).
- pnfs: Fix the pnfs block driver's calculation of layoutget size (git-fixes).
- rdma/ipoib: Fix error code return in ipoib_mcast_join (bsc#1221082)
- s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223883).
- s390/mm: Fix storage key clearing for guest huge pages (git-fixes bsc#1223885).
- s390/vtime: fix average steal time calculation (git-fixes bsc#1221953).
- scsi: qla2xxx: Change debug message during driver unload (bsc1221816).
- scsi: qla2xxx: Delay I/O Abort on PCI error (bsc1221816).
- scsi: qla2xxx: Fix N2N stuck connection (bsc1221816).
- scsi: qla2xxx: Fix command flush on cable pull (bsc1221816).
- scsi: qla2xxx: Fix double free of fcport (bsc1221816).
- scsi: qla2xxx: Fix double free of the ha->vp_map pointer (bsc1221816).
- scsi: qla2xxx: NVME|FCP prefer flag not being honored (bsc1221816).
- scsi: qla2xxx: Prevent command send on chip reset (bsc1221816).
- scsi: qla2xxx: Split FCE|EFT trace control (bsc1221816).
- scsi: qla2xxx: Update manufacturer detail (bsc1221816).
- scsi: qla2xxx: Update version to 10.02.09.200-k (bsc1221816).
- sr9800: Add check for usbnet_get_endpoints (git-fixes).
- sunrpc: Fix RPC client cleaned up the freed pipefs dentries (git-fixes).
- sunrpc: fix a memleak in gss_import_v2_context (git-fixes).
- sunrpc: fix some memleaks in gssx_dec_option_array (git-fixes).
- tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619).
- tun: honor IOCB_NOWAIT flag (git-fixes).
- usb: dwc2: Fix memory leak in dwc2_hcd_init.
- usb: dwc2: check return value after calling platform_get_resource() (git-fixes).
- usb: dwc3: gadget: Ignore EP queue requests during bus reset (git-fixes).
- usb: gadget: Fix issue with config_ep_by_speed function (git-fixes).
- usb: mon: Fix atomicity violation in mon_bin_vma_fault (git-fixes).
- usb: musb: Modify the 'HWVers' register address (git-fixes).
- usb: roles: do not get/set_role() when usb_role_switch is unregistered.
- usb: serial: option: add Fibocom L7xx modules (git-fixes).
- usb: serial: option: do not claim interface 4 for ZTE MF290 (git-fixes).
- usb: storage: set 1.50 as the lower bcdDevice for older 'Super Top' compatibility (git-fixes).
- usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes).
- usb: usbfs: Do not WARN about excessively large memory allocations.
- x86/CPU/AMD: Update the Zenbleed microcode revisions (git-fixes).
- x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes).
Tenable has extracted the preceding description block directly from the SUSE security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The package checks in this plugin were extracted from
# SUSE update advisory SUSE-SU-2024:1870-1. The text itself
# is copyright (C) SUSE.
##
include('compat.inc');
if (description)
{
script_id(198237);
script_version("1.1");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/05/31");
script_cve_id(
"CVE-2019-25160",
"CVE-2020-36312",
"CVE-2021-23134",
"CVE-2021-46904",
"CVE-2021-46905",
"CVE-2021-46907",
"CVE-2021-46909",
"CVE-2021-46938",
"CVE-2021-46939",
"CVE-2021-46941",
"CVE-2021-46950",
"CVE-2021-46958",
"CVE-2021-46960",
"CVE-2021-46963",
"CVE-2021-46964",
"CVE-2021-46966",
"CVE-2021-46975",
"CVE-2021-46981",
"CVE-2021-46988",
"CVE-2021-46990",
"CVE-2021-46998",
"CVE-2021-47006",
"CVE-2021-47015",
"CVE-2021-47024",
"CVE-2021-47034",
"CVE-2021-47045",
"CVE-2021-47049",
"CVE-2021-47055",
"CVE-2021-47056",
"CVE-2021-47060",
"CVE-2021-47061",
"CVE-2021-47063",
"CVE-2021-47068",
"CVE-2021-47070",
"CVE-2021-47071",
"CVE-2021-47073",
"CVE-2021-47100",
"CVE-2021-47101",
"CVE-2021-47104",
"CVE-2021-47110",
"CVE-2021-47112",
"CVE-2021-47114",
"CVE-2021-47117",
"CVE-2021-47118",
"CVE-2021-47119",
"CVE-2021-47138",
"CVE-2021-47141",
"CVE-2021-47142",
"CVE-2021-47143",
"CVE-2021-47146",
"CVE-2021-47149",
"CVE-2021-47150",
"CVE-2021-47153",
"CVE-2021-47159",
"CVE-2021-47161",
"CVE-2021-47162",
"CVE-2021-47165",
"CVE-2021-47166",
"CVE-2021-47167",
"CVE-2021-47168",
"CVE-2021-47169",
"CVE-2021-47171",
"CVE-2021-47173",
"CVE-2021-47177",
"CVE-2021-47179",
"CVE-2021-47180",
"CVE-2021-47181",
"CVE-2021-47182",
"CVE-2021-47183",
"CVE-2021-47184",
"CVE-2021-47185",
"CVE-2021-47188",
"CVE-2021-47189",
"CVE-2021-47198",
"CVE-2021-47202",
"CVE-2021-47203",
"CVE-2021-47204",
"CVE-2021-47205",
"CVE-2021-47207",
"CVE-2021-47211",
"CVE-2021-47216",
"CVE-2021-47217",
"CVE-2022-0487",
"CVE-2022-48619",
"CVE-2022-48626",
"CVE-2022-48636",
"CVE-2022-48650",
"CVE-2022-48651",
"CVE-2022-48667",
"CVE-2022-48668",
"CVE-2022-48687",
"CVE-2022-48688",
"CVE-2022-48695",
"CVE-2022-48701",
"CVE-2023-0160",
"CVE-2023-6270",
"CVE-2023-6356",
"CVE-2023-6535",
"CVE-2023-6536",
"CVE-2023-7042",
"CVE-2023-7192",
"CVE-2023-28746",
"CVE-2023-35827",
"CVE-2023-52454",
"CVE-2023-52469",
"CVE-2023-52470",
"CVE-2023-52474",
"CVE-2023-52476",
"CVE-2023-52477",
"CVE-2023-52486",
"CVE-2023-52488",
"CVE-2023-52509",
"CVE-2023-52515",
"CVE-2023-52524",
"CVE-2023-52528",
"CVE-2023-52575",
"CVE-2023-52583",
"CVE-2023-52587",
"CVE-2023-52590",
"CVE-2023-52591",
"CVE-2023-52595",
"CVE-2023-52598",
"CVE-2023-52607",
"CVE-2023-52614",
"CVE-2023-52620",
"CVE-2023-52628",
"CVE-2023-52635",
"CVE-2023-52639",
"CVE-2023-52644",
"CVE-2023-52646",
"CVE-2023-52650",
"CVE-2023-52652",
"CVE-2023-52653",
"CVE-2024-2201",
"CVE-2024-22099",
"CVE-2024-23307",
"CVE-2024-23848",
"CVE-2024-24855",
"CVE-2024-24861",
"CVE-2024-26614",
"CVE-2024-26642",
"CVE-2024-26651",
"CVE-2024-26671",
"CVE-2024-26675",
"CVE-2024-26689",
"CVE-2024-26704",
"CVE-2024-26733",
"CVE-2024-26739",
"CVE-2024-26743",
"CVE-2024-26744",
"CVE-2024-26747",
"CVE-2024-26754",
"CVE-2024-26763",
"CVE-2024-26771",
"CVE-2024-26772",
"CVE-2024-26773",
"CVE-2024-26777",
"CVE-2024-26778",
"CVE-2024-26779",
"CVE-2024-26793",
"CVE-2024-26805",
"CVE-2024-26816",
"CVE-2024-26817",
"CVE-2024-26839",
"CVE-2024-26840",
"CVE-2024-26852",
"CVE-2024-26855",
"CVE-2024-26857",
"CVE-2024-26859",
"CVE-2024-26878",
"CVE-2024-26883",
"CVE-2024-26884",
"CVE-2024-26898",
"CVE-2024-26901",
"CVE-2024-26903",
"CVE-2024-26907",
"CVE-2024-26922",
"CVE-2024-26929",
"CVE-2024-26930",
"CVE-2024-26931",
"CVE-2024-26948",
"CVE-2024-26993",
"CVE-2024-27013",
"CVE-2024-27014",
"CVE-2024-27043",
"CVE-2024-27046",
"CVE-2024-27054",
"CVE-2024-27072",
"CVE-2024-27073",
"CVE-2024-27074",
"CVE-2024-27075",
"CVE-2024-27078",
"CVE-2024-27388"
);
script_xref(name:"SuSE", value:"SUSE-SU-2024:1870-1");
script_name(english:"SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2024:1870-1)");
script_set_attribute(attribute:"synopsis", value:
"The remote SUSE host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The remote SUSE Linux SLED12 / SLED_SAP12 / SLES12 / SLES_SAP12 host has packages installed that are affected by
multiple vulnerabilities as referenced in the SUSE-SU-2024:1870-1 advisory.
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2019-25160: Fixed out-of-bounds memory accesses in netlabel (bsc#1220394).
- CVE-2020-36312: Fixed an issue in virt/kvm/kvm_main.c that had a kvm_io_bus_unregister_dev memory leak
upon a kmalloc failure (bsc#1184509).
- CVE-2021-23134: Fixed a use-after-free issue in nfc sockets (bsc#1186060).
- CVE-2021-46904: Fixed NULL pointer dereference during tty device unregistration (bsc#1220416).
- CVE-2021-46905: Fixed NULL pointer dereference on disconnect regression (bsc#1220418).
- CVE-2021-46909: Fixed PCI interrupt mapping in ARM footbridge (bsc#1220442).
- CVE-2021-46938: Fixed double free of blk_mq_tag_set in dev remove after table load fails (bsc#1220554).
- CVE-2021-46939: Fixed possible hung in trace_clock_global() (bsc#1220580).
- CVE-2021-46941: Fixed core softreset when switch mode in usb dwc3 (bsc#1220628).
- CVE-2021-46950: Fixed possible data corruption in md/raid1 when ending a failed write request
(bsc#1220662).
- CVE-2021-46958: Fixed race between transaction aborts and fsyncs that could lead to use-after-free in
btrfs (bsc#1220521).
- CVE-2021-46960: Fixed wrong error code from smb2_get_enc_key() (bsc#1220528).
- CVE-2021-46963: Fixed crash in qla2xxx_mqueuecommand() (bsc#1220536).
- CVE-2021-46964: Fixed unreserved extra IRQ vectors in qla2xxx (bsc#1220538).
- CVE-2021-46966: Fixed potential use-after-free issue in cm_write() (bsc#1220572).
- CVE-2021-46981: Fixed NULL pointer in flush_workqueue (bsc#1220611).
- CVE-2021-46988: Fixed possible crash in userfaultfd due to unreleased page (bsc#1220706).
- CVE-2021-46990: Fixed crashes when toggling entry flush barrier in powerpc/64s (bsc#1220743).
- CVE-2021-46998: Fixed a use after free bug in enic_hard_start_xmit() (bsc#1220625).
- CVE-2021-47006: Fixed wrong check in overflow_handler hook in ARM 9064/1 hw_breakpoint (bsc#1220751).
- CVE-2021-47015: Fixed RX consumer index logic in the error path in bnxt_en (bsc#1220794).
- CVE-2021-47024: Fixed possible memory leak in vsock/virtio when closing socket (bsc#1220637).
- CVE-2021-47034: Fixed resolved pte update for kernel memory on radix in powerpc/64s (bsc#1220687).
- CVE-2021-47045: Fixed null pointer dereference in lpfc_prep_els_iocb() (bsc#1220640).
- CVE-2021-47049: Fixed Use after free in __vmbus_open() (bsc#1220692).
- CVE-2021-47055: Fixed missing permissions for locking and badblock ioctls in mtd (bsc#1220768).
- CVE-2021-47056: Fixed uninitialized lock in adf_vf2pf_shutdown() (bsc#1220769).
- CVE-2021-47060: Fixed a bug in KVM by stop looking for coalesced MMIO zones if the bus is destroyed
(bsc#1220742).
- CVE-2021-47061: Fixed a bug in KVM by destroy I/O bus devices on unregister failure _after_ sync'ing
SRCU (bsc#1220745).
- CVE-2021-47063: Fixed possible use-after-free in panel_bridge_detach() (bsc#1220777).
- CVE-2021-47068: Fixed a use-after-free issue in llcp_sock_bind/connect (bsc#1220739).
- CVE-2021-47070: Fixed memory leak in error handling paths in uio_hv_generic (bsc#1220829).
- CVE-2021-47071: Fixed memory leak in error handling paths in uio_hv_generic (bsc#1220846).
- CVE-2021-47073: Fixed oops on rmmod dell_smbios init_dell_smbios_wmi() (bsc#1220850).
- CVE-2021-47100: Fixed UAF when uninstall in ipmi (bsc#1220985).
- CVE-2021-47101: Fixed uninit-value in asix_mdio_read() (bsc#1220987).
- CVE-2021-47104: Fixed memory leak in qib_user_sdma_queue_pkts() (bsc#1220960).
- CVE-2021-47110: Fixed possible memory corruption when restoring from hibernation in x86/kvm
(bsc#1221532).
- CVE-2021-47112: Fixed possible memory corruption when restoring from hibernation in x86/kvm
(bsc#1221541).
- CVE-2021-47114: Fixed data corruption by fallocate in ocfs2 (bsc#1221548).
- CVE-2021-47117: Fixed bug on in ext4_es_cache_extent() as ext4_split_extent_at() failed (bsc#1221575).
- CVE-2021-47118: Fixed possible use-after-free when initializing `cad_pid` (bsc#1221605).
- CVE-2021-47119: Fixed memory leak in ext4_fill_super() (bsc#1221608).
- CVE-2021-47138: Fixed possible out-of-bound memory access in cxgb4 when clearing filters (bsc#1221934).
- CVE-2021-47141: Fixed possible NULL pointer dereference when freeing irqs (bsc#1221949).
- CVE-2021-47142: Fixed a use-after-free in drm/amdgpu (bsc#1221952).
- CVE-2021-47143: Fixed possible corruption in net/smc after failed device_add() (bsc#1221988).
- CVE-2021-47150: Fixed the potential memory leak in fec_enet_init() (bsc#1221973).
- CVE-2021-47153: Fixed wrongly generated interrupt on bus reset in i2c/i801 (bsc#1221969).
- CVE-2021-47165: Fixed shutdown crash when component not probed in drm/meson (bsc#1221965).
- CVE-2021-47166: Fixed possible corruptionb in nfs_do_recoalesce() (bsc#1221998).
- CVE-2021-47167: Fixed an Oopsable condition in __nfs_pageio_add_request() (bsc#1221991).
- CVE-2021-47168: Fixed an incorrect limit in filelayout_decode_layout() (bsc#1222002).
- CVE-2021-47169: Fixed possible NULL pointer dereference in serial/rp2 (bsc#1222000).
- CVE-2021-47171: Fixed memory leak in smsc75xx_bind() (bsc#1221994).
- CVE-2021-47173: Fixed memory leak in uss720_probe() (bsc#1221993).
- CVE-2021-47177: Fixed sysfs leak in alloc_iommu() (bsc#1221997).
- CVE-2021-47179: Fixed a NULL pointer dereference in pnfs_mark_matching_lsegs_return() (bsc#1222001).
- CVE-2021-47180: Fixed memory leak in nci_allocate_device() (bsc#1221999).
- CVE-2021-47181: Fixed a null pointer dereference caused by calling platform_get_resource()
(bsc#1222660).
- CVE-2021-47183: Fixed a null pointer dereference during link down processing in scsi lpfc (bsc#1192145,
bsc#1222664).
- CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669).
- CVE-2021-47189: Fixed denial of service due to memory ordering issues between normal and ordered work
functions in btrfs (bsc#1222706).
- CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions (bsc#1222878)
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in
drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-48619: Fixed a denial-of-service issue in drivers/input/input.c (bsc#1218220).
- CVE-2022-48626: Fixed a potential use-after-free on remove path moxart (bsc#1220366).
- CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system
(bsc#1209657).
- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
- CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1212514).
- CVE-2023-52454: Fixed a kernel panic when host sends an invalid H2C PDU length (bsc#1220320).
- CVE-2023-52469: Fixed use-after-free in kv_parse_power_table() (bsc#1220411).
- CVE-2023-52470: Fixed null-ptr-deref in radeon_crtc_init() (bsc#122041).
- CVE-2023-52474: Fixed bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests in hfi1 (bsc#1220445).
- CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI during vsyscall (bsc#1220703).
- CVE-2023-52477: Fixed USB Hub accesses to uninitialized BOS descriptors (bsc#1220790).
- CVE-2023-52486: Fixed possible use-after-free in drm (bsc#1221277).
- CVE-2023-52509: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1220836).
- CVE-2023-52515: Fixed possible use-after-free in RDMA/srp (bsc#1221048).
- CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927).
- CVE-2023-52528: Fixed uninit-value access in __smsc75xx_read_reg() (bsc#1220843).
- CVE-2023-52575: Fixed SBPB enablement for spec_rstack_overflow=off (bsc#1220871).
- CVE-2023-52583: Fixed deadlock or deadcode of misusing dget() inside ceph (bsc#1221058).
- CVE-2023-52587: Fixed mcast list locking in IB/ipoib (bsc#1221082).
- CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory renaming (bsc#1221088).
- CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).
- CVE-2023-52598: Fixed wrong setting of fpc register in s390/ptrace (bsc#1221060).
- CVE-2023-52607: Fixed NULL pointer dereference in pgtable_cache_add kasprintf() (bsc#1221061).
- CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222117).
- CVE-2023-52639: Fixed race during shadow creation in KVM/s390/vsie (bsc#1222300).
- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).
- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).
- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).
- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).
- CVE-2023-7042: Fixed a NULL pointer dereference vulnerability in
ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).
- CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in
net/netfilter/nf_conntrack_netlink.c (bsc#1218479).
- CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
- CVE-2024-22099: Fixed NULL Pointer Dereference vulnerability in /net/bluetooth/rfcomm/core.c
(bsc#1219170).
- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5
modules (bsc#1219169).
- CVE-2024-24855: Fixed a null pointer dereference due to race condition in scsi device driver in
lpfc_unregister_fcf_rescan() function (bsc#1219618).
- CVE-2024-24861: Fixed an overflow due to race condition in media/xc4000 device driver in xc4000
xc4000_get_frequency() function (bsc#1219623).
- CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks (bsc#1221293).
- CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter nf_tables (bsc#1221830).
- CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422).
- CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
- CVE-2024-26743: Fixed memory leak in qedr_create_user_qp error flow in rdma/qedr (bsc#1222677)
- CVE-2024-26744: Fixed null pointer dereference in srpt_service_guid parameter in rdma/srpt (bsc#1222449)
- CVE-2024-26754: Fixed an use-after-free and null-ptr-deref in gtp_genl_dump_pdp() in gtp (bsc#1222632).
- CVE-2024-26763: Fixed user corruption via by writing data with O_DIRECT on device in dm-crypt
(bsc#1222720).
- CVE-2024-26771: Fixed a null pointer dereference on edma_probe in dmaengine ti edma (bsc#1222610)
- CVE-2024-26793: Fixed an use-after-free and null-ptr-deref in gtp_newlink() in gtp (bsc#1222428).
- CVE-2024-26805: Fixed a kernel-infoleak-after-free in __skb_datagram_iter in netlink (bsc#1222630).
- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).
- CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache() (bsc#1222976).
- CVE-2021-47161: Fixed a resource leak in an error handling path in the error handling path of the probe
function in spi spi-fsl-dspi (bsc#1221966).
- CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223513).
- CVE-2024-26816: Ignore relocations in .notes section when building with CONFIG_XEN_PV=y (bsc#1222624).
- CVE-2023-52595: Fixed possible deadlock in wifi/rt2x00 (bsc#1221046).
- CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).
- CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found()
(bsc#1222618).
- CVE-2021-47182: Fixed scsi_mode_sense() buffer length handling (bsc#1222662).
- CVE-2022-48701: Fixed an out-of-bounds bug in __snd_usb_parse_audio_interface() (bsc#1223921).
- CVE-2024-26993: Fixed a reference leak in sysfs_break_active_protection() (bsc#1223693)
- CVE-2023-52650: Added missing check for of_find_device_by_node() (bsc#1223770)
- CVE-2024-26948: Added a dc_state NULL check in dc_state_release (bsc#1223664)
- CVE-2024-27013: Limited printing rate when illegal packet received by tun dev (bsc#1223745).
- CVE-2024-27014: Prevented deadlock while disabling aRFS (bsc#1223735).
- CVE-2024-27046: Handled acti_netdevs allocation failure (bsc#1223827).
- CVE-2021-47162: Fixed a possible memory leak in tipc_buf_append (bsc#1221977).
- CVE-2024-27072: Removed useless locks in usbtv_video_free() (bsc#1223837).
- CVE-2024-27075: Avoided stack overflow warnings with clang (bsc#1223842).
- CVE-2024-27073: Fixed a memory leak in budget_av_attach() (bsc#1223843).
- CVE-2024-27074: Fixed a memory leak in go7007_load_encoder() (bsc#1223844).
- CVE-2024-27078: Fixed a memory leak in tpg_alloc() (bsc#1223781).
- CVE-2023-52652: Fixed a possible name leak in ntb_register_device() (bsc#1223686).
- CVE-2024-23848: Fixed a use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c
and drivers/media/cec/core/cec-api.c (bsc#1219104).
- CVE-2024-26859: Prevent access to a freed page in page_pool in bnx2x (bsc#1223049).
- CVE-2024-26817: Used calloc instead of kzalloc to avoid integer overflow (bsc#1222812)
- CVE-2021-47149: Fixed a potential null pointer deref in fmvj18x_get_hwinfo() (bsc#1221972).
- CVE-2023-52620: Disallowed timeout for anonymous sets in nf_tables (bsc#1221825).
- CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223057).
- CVE-2024-26878: Fixed potential NULL pointer dereference, related to dquots (bsc#1223060).
- CVE-2024-26901: Used kzalloc() to fix information leak in do_sys_name_to_handle() (bsc#1223198).
- CVE-2024-26671: Fixed an IO hang from sbitmap wakeup race in blk_mq_mark_tag_wait() (bsc#1222357).
- CVE-2024-26772: Avoided allocating blocks from corrupted group in ext4_mb_find_by_goal() (bsc#1222613).
- CVE-2023-52614: Fixed a buffer overflow in trans_stat_show() (bsc#1221617).
- CVE-2024-26855: Fixed a potential NULL pointer dereference in ice_bridge_setlink() (bsc#1223051).
- CVE-2024-26857: Made sure to pull inner header in geneve_rx() (bsc#1223058).
- CVE-2024-26675: Limited MRU to 64K in ppp_async_ioctl() (bsc#1222379).
- CVE-2024-26907: Fixed a fortify source warning while accessing Eth segment in mlx5 (bsc#1223203).
- CVE-2023-52488: Converted from _raw_ to _noinc_ regmap functions for FIFO in sc16is7xx (bsc#1221162).
- CVE-2024-26922: Validated the parameters of bo mapping operations more clearly (bsc#1223315).
- CVE-2021-47184: Fixed NULL pointer dereference on VSI filter sync (bsc#1222666).
- CVE-2023-52635: Synchronized devfreq_monitor_[start/stop] for devfreq (bsc#1222294).
- CVE-2024-26883: Checked for integer overflow when using roundup_pow_of_two() (bsc#1223035).
- CVE-2024-26884: Fixed a bpf hashtab overflow check on 32-bit architectures (bsc#1223189).
- CVE-2024-26839: Fixed a memleak in init_credit_return() (bsc#1222975)
- CVE-2023-52644: Stop/wake correct queue in DMA Tx path when QoS is disabled in b43 (bsc#1222961).
- CVE-2021-47205: Unregistered clocks/resets when unbinding in sunxi-ng (bsc#1222888).
- CVE-2021-47211: Fixed a null pointer dereference on pointer cs_desc in usb-audio (bsc#1222869).
- CVE-2021-47207: Fixed a null pointer dereference on pointer block in gus (bsc#1222790).
- CVE-2024-26779: Fixed a race condition on enabling fast-xmit in mac80211 (bsc#1222772).
- CVE-2024-26777: Error out if pixclock equals zero in fbdev/sis (bsc#1222765)
- CVE-2024-26778: Error out if pixclock equals zero in fbdev/savage (bsc#1222770)
- CVE-2024-26747: Fixed a NULL pointer issue with USB parent module's reference (bsc#1222609).
The following non-security bugs were fixed:
- Input: adxl34x - do not hardcode interrupt trigger type (git-fixes).
- Input: drv260x - sleep between polling GO bit (git-fixes).
- Input: ipaq-micro-keys - add error handling for devm_kmemdup.
- Input: xpad - add PXN V900 support.
- USB: core: Fix deadlock in usb_deauthorize_interface().
- USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command (git-fixes).
- atl1c: fix error return code in atl1c_probe() (git-fixes).
- atl1e: fix error return code in atl1e_probe() (git-fixes).
- bluetooth: btqca: Fixed a coding style error (git-fixes).
- bluetooth: btqca: Introduce HCI_EV_VENDOR and use it (git-fixes).
- bluetooth: btqcomsmd: Fix command timeout after setting BD address (git-fixes).
- bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).
- bnx2x: Fix enabling network interfaces without VFs (git-fixes).
- bnx2x: Fix missing error code in bnx2x_iov_init_one() (git-fixes).
- bpf, sockmap: Fix preempt_rt splat when using raw_spin_lock_t (git-fixes).
- drivers: usb: host: Fix deadlock in oxu_bus_suspend() (git-fixes).
- ethernet: myri10ge: Fix missing error code in myri10ge_probe() (git-fixes).
- ethernet: ucc_geth: fix definition and size of ucc_geth_tx_global_pram (git-fixes).
- fuse: do not unhash root (bsc#1223954).
- iommu/amd: Increase interrupt remapping table limit to 512 entries (git-fixes).
- iommu/amd: Mark interrupt as managed (git-fixes).
- iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (git-fixes).
- iommu/amd: Silence warnings under memory pressure (git-fixes).
- iommu: Check if group is NULL before remove device (git-fixes).
- kabi fix for pNFS: Fix the pnfs block driver's calculation of layoutget size (git-fixes).
- kabi: pci: Add locking to RMW PCI Express Capability Register accessors (kabi).
- lan78xx: Add missing return code checks (git-fixes).
- lan78xx: Add support to dump lan78xx registers (git-fixes).
- lan78xx: Do not access skb_queue_head list pointers directly (git-fixes).
- lan78xx: Fix exception on link speed change (git-fixes).
- lan78xx: Fix partial packet errors on suspend/resume (git-fixes).
- lan78xx: Fix race conditions in suspend/resume handling (git-fixes).
- lan78xx: Fix white space and style issues (git-fixes).
- lan78xx: Modify error messages (git-fixes).
- lan78xx: enable auto speed configuration for LAN7850 if no EEPROM is detected (git-fixes).
- net/mlx5: Properly convey driver version to firmware (git-fixes).
- net/qla3xxx: fix schedule while atomic in ql_sem_spinlock (git-fixes).
- net: Fix features skip in for_each_netdev_feature() (git-fixes).
- net: allwinner: Fix some resources leak in the error handling path of the probe and in the remove
function (git-fixes).
- net: atheros: switch from 'pci_' to 'dma_' API (git-fixes).
- net: lan78xx: Allow for VLAN headers in timeout calcs (git-fixes).
- net: lan78xx: Make declaration style consistent (git-fixes).
- net: lan78xx: Merge memcpy + lexx_to_cpus to get_unaligned_lexx (git-fixes).
- net: lan78xx: fix runtime PM count underflow on link stop (git-fixes).
- net: lan78xx: remove set but not used variable 'event' (git-fixes).
- net: macb: ensure the device is available before accessing GEMGXL control registers (git-fixes).
- net: stmmac: free tx skb buffer in stmmac_resume() (git-fixes).
- net: sunrpc: Fix an off by one in rpc_sockaddr2uaddr() (git-fixes).
- net: usb: lan78xx: Remove lots of set but unused 'ret' variables (git-fixes).
- net:usb: Use ARRAY_SIZE instead of calculating the array size (git-fixes).
- nfs: Fix O_DIRECT commit verifier handling (git-fixes).
- nfs: Fix O_DIRECT locking issues (git-fixes).
- nfs: Fix error handling for O_DIRECT write scheduling (bsc#1224785).
- nfs: Fix a request reference leak in nfs_direct_write_clear_reqs() (git-fixes).
- nfs: Fix an off by one in root_nfs_cat() (git-fixes).
- nfs: Fix direct WRITE throughput regression (git-fixes).
- nfs: Fix error handling for O_DIRECT write scheduling (git-fixes).
- nfs: More O_DIRECT accounting fixes for error paths (git-fixes).
- nfs: add atomic_open for NFSv3 to handle O_TRUNC correctly (bsc#1219847).
- nfs: avoid spurious warning of lost lock that is being unlocked (bsc#1221791).
- nfs: commit errors should be fatal (git-fixes).
- nfs: only issue commit in DIO codepath if we have uncommitted data (git-fixes).
- nfsd: Fix error cleanup path in nfsd_rename() (git-fixes).
- nfsd: Reset cb_seq_status after NFS4ERR_DELAY (git-fixes).
- nfsd: Retransmit callbacks after client reconnects (git-fixes).
- nfsd: lock_rename() needs both directories to live on the same fs (git-fixes).
- nfsv4.1/pnfs: Ensure we handle the error NFS4ERR_RETURNCONFLICT (git-fixes).
- pci/aer: Clear MULTI_ERR_COR/UNCOR_RCV bits (git-fixes).
- pci/aspm: Avoid link retraining race (git-fixes).
- pci/aspm: Disable ASPM on MFD function removal to avoid use-after-free (git-fixes).
- pci/aspm: Do not warn if already in common clock mode (git-fixes).
- pci/aspm: Factor out pcie_wait_for_retrain() (git-fixes).
- pci/aspm: Reduce severity of common clock config message (git-fixes).
- pci/aspm: Return 0 or -ETIMEDOUT from pcie_retrain_link() (git-fixes).
- pci/aspm: Use RMW accessors for changing LNKCTL (git-fixes).
- pci/dpc: Print all TLP Prefixes, not just the first (git-fixes).
- pci/iov: Enlarge virtfn sysfs name buffer (git-fixes).
- pci/msi: Prevent MSI hardware interrupt number truncation (git-fixes).
- pci/pm: Power up all devices during runtime resume (git-fixes).
- pci/sysfs: Protect driver's D3cold preference from user space (git-fixes).
- pci: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).
- pci: Add function 1 DMA alias quirk for Marvell 88SE9235 (git-fixes).
- pci: Add locking to RMW PCI Express Capability Register accessors (git-fixes).
- pci: Avoid FLR for AMD FCH AHCI adapters (git-fixes).
- pci: Avoid pci_dev_lock() AB/BA deadlock with sriov_numvfs_store() (git-fixes).
- pci: Make link retraining use RMW accessors for changing LNKCTL (git-fixes).
- pci: Mark 3ware-9650SE Root Port Extended Tags as broken (git-fixes).
- pci: Rework pcie_retrain_link() wait loop (git-fixes).
- pci: aardvark: Fix setting MSI address (git-fixes).
- pci: aardvark: Fix support for MSI interrupts (git-fixes).
- pci: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-fixes).
- pci: endpoint: Do not stop controller when unbinding endpoint function (git-fixes).
- pci: hotplug: Allow marking devices as disconnected during bind/unbind (git-fixes).
- pci: pciehp: Add pciehp_set_indicators() to set both indicators (git-fixes).
- pci: pciehp: Cancel bringup sequence if card is not present (git-fixes).
- pci: pciehp: Fix AB-BA deadlock between reset_lock and device_lock (git-fixes).
- pci: pciehp: Use RMW accessors for changing LNKCTL (git-fixes).
- pci: qcom: Disable write access to read only registers for IP v2.3.3 (git-fixes).
- pci: qcom: Fix unbalanced PHY init on probe errors (git-fixes).
- pci: qcom: Use DWC helpers for modifying the read-only DBI registers (git-fixes).
- pci: switchtec: Return -EFAULT for copy_to_user() errors (git-fixes).
- pnfs/flexfiles: Check the layout validity in ff_layout_mirror_prepare_stats (git-fixes).
- pnfs: Fix the pnfs block driver's calculation of layoutget size (git-fixes).
- rdma/ipoib: Fix error code return in ipoib_mcast_join (bsc#1221082)
- s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223883).
- s390/mm: Fix storage key clearing for guest huge pages (git-fixes bsc#1223885).
- s390/vtime: fix average steal time calculation (git-fixes bsc#1221953).
- scsi: qla2xxx: Change debug message during driver unload (bsc1221816).
- scsi: qla2xxx: Delay I/O Abort on PCI error (bsc1221816).
- scsi: qla2xxx: Fix N2N stuck connection (bsc1221816).
- scsi: qla2xxx: Fix command flush on cable pull (bsc1221816).
- scsi: qla2xxx: Fix double free of fcport (bsc1221816).
- scsi: qla2xxx: Fix double free of the ha->vp_map pointer (bsc1221816).
- scsi: qla2xxx: NVME|FCP prefer flag not being honored (bsc1221816).
- scsi: qla2xxx: Prevent command send on chip reset (bsc1221816).
- scsi: qla2xxx: Split FCE|EFT trace control (bsc1221816).
- scsi: qla2xxx: Update manufacturer detail (bsc1221816).
- scsi: qla2xxx: Update version to 10.02.09.200-k (bsc1221816).
- sr9800: Add check for usbnet_get_endpoints (git-fixes).
- sunrpc: Fix RPC client cleaned up the freed pipefs dentries (git-fixes).
- sunrpc: fix a memleak in gss_import_v2_context (git-fixes).
- sunrpc: fix some memleaks in gssx_dec_option_array (git-fixes).
- tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619).
- tun: honor IOCB_NOWAIT flag (git-fixes).
- usb: dwc2: Fix memory leak in dwc2_hcd_init.
- usb: dwc2: check return value after calling platform_get_resource() (git-fixes).
- usb: dwc3: gadget: Ignore EP queue requests during bus reset (git-fixes).
- usb: gadget: Fix issue with config_ep_by_speed function (git-fixes).
- usb: mon: Fix atomicity violation in mon_bin_vma_fault (git-fixes).
- usb: musb: Modify the 'HWVers' register address (git-fixes).
- usb: roles: do not get/set_role() when usb_role_switch is unregistered.
- usb: serial: option: add Fibocom L7xx modules (git-fixes).
- usb: serial: option: do not claim interface 4 for ZTE MF290 (git-fixes).
- usb: storage: set 1.50 as the lower bcdDevice for older 'Super Top' compatibility (git-fixes).
- usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes).
- usb: usbfs: Do not WARN about excessively large memory allocations.
- x86/CPU/AMD: Update the Zenbleed microcode revisions (git-fixes).
- x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes).
Tenable has extracted the preceding description block directly from the SUSE security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1084332");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1141539");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1184509");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1186060");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1190317");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1190576");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1192145");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1194516");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203935");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1209657");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1211592");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1212514");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1213456");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1217339");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1217987");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1217988");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1217989");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1218220");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1218336");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1218479");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1218562");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1219104");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1219169");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1219170");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1219618");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1219623");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1219847");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220320");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220366");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220394");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220411");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220416");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220418");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220422");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220442");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220445");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220505");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220521");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220528");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220536");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220538");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220554");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220572");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220580");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220611");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220625");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220628");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220637");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220640");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220662");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220687");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220692");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220703");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220706");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220739");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220742");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220743");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220745");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220751");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220768");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220769");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220777");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220790");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220794");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220829");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220836");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220843");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220846");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220850");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220871");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220927");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220960");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220985");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220987");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221044");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221046");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221048");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221058");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221060");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221061");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221077");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221082");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221088");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221162");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221277");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221293");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221337");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221532");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221541");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221548");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221575");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221605");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221608");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221617");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221791");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221816");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221825");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221830");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221862");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221934");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221949");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221952");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221953");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221965");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221966");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221967");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221969");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221972");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221973");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221977");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221979");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221988");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221991");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221993");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221994");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221997");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221998");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221999");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222000");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222001");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222002");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222117");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222294");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222300");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222357");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222379");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222422");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222428");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222449");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222503");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222559");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222585");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222609");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222610");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222613");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222618");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222619");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222624");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222630");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222632");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222660");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222662");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222664");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222666");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222669");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222671");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222677");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222706");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222720");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222765");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222770");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222772");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222787");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222790");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222812");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222836");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222869");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222876");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222878");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222881");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222883");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222888");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222952");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222961");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222975");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222976");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223016");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223035");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223049");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223051");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223057");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223058");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223060");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223187");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223189");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223198");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223203");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223315");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223432");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223509");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223512");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223513");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223516");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223518");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223626");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223627");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223664");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223686");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223693");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223712");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223715");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223735");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223744");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223745");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223770");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223781");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223819");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223824");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223827");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223837");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223842");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223843");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223844");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223883");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223885");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223921");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223941");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223952");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223953");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223954");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224785");
script_set_attribute(attribute:"see_also", value:"https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-25160");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-36312");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-23134");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-46904");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-46905");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-46907");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-46909");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-46938");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-46939");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-46941");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-46950");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-46958");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-46960");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-46963");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-46964");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-46966");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-46975");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-46981");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-46988");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-46990");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-46998");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47006");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47015");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47024");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47034");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47045");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47049");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47055");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47056");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47060");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47061");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47063");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47068");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47070");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47071");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47073");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47100");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47101");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47104");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47110");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47112");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47114");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47117");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47118");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47119");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47138");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47141");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47142");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47143");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47146");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47149");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47150");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47153");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47159");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47161");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47162");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47165");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47166");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47167");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47168");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47169");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47171");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47173");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47177");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47179");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47180");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47181");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47182");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47183");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47184");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47185");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47188");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47189");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47198");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47202");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47203");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47204");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47205");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47207");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47211");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47216");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47217");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-0487");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48619");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48626");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48636");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48650");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48651");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48667");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48668");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48687");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48688");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48695");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48701");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-0160");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-28746");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-35827");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52454");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52469");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52470");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52474");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52476");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52477");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52486");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52488");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52509");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52515");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52524");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52528");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52575");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52583");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52587");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52590");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52591");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52595");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52598");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52607");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52614");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52620");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52628");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52635");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52639");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52644");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52646");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52650");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52652");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52653");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-6270");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-6356");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-6535");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-6536");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-7042");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-7192");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-2201");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-22099");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-23307");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-23848");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-24855");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-24861");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26614");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26642");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26651");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26671");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26675");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26689");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26704");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26733");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26739");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26743");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26744");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26747");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26754");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26763");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26771");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26772");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26773");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26777");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26778");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26779");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26793");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26805");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26816");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26817");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26839");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26840");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26852");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26855");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26857");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26859");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26878");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26883");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26884");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26898");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26901");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26903");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26907");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26922");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26929");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26930");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26931");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26948");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26993");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27013");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27014");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27043");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27046");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27054");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27072");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27073");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27074");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27075");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27078");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27388");
script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2021-23134");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2024-26930");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2021/04/07");
script_set_attribute(attribute:"patch_publication_date", value:"2024/05/30");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/05/31");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:cluster-md-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:dlm-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gfs2-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-extra");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-kgraft");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-kgraft-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-man");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-macros");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-obs-build");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-source");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-syms");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kgraft-patch-4_12_14-122_216-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ocfs2-kmp-default");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:12");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"SuSE Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include('rpm.inc');
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item("Host/SuSE/release");
if (isnull(os_release) || os_release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
var os_ver = pregmatch(pattern: "^(SLE(S|D)(?:_SAP)?\d+)", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'SUSE');
os_ver = os_ver[1];
if (! preg(pattern:"^(SLED12|SLED_SAP12|SLES12|SLES_SAP12)$", string:os_ver)) audit(AUDIT_OS_NOT, 'SUSE SLED12 / SLED_SAP12 / SLES12 / SLES_SAP12', 'SUSE (' + os_ver + ')');
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'SUSE (' + os_ver + ')', cpu);
var service_pack = get_kb_item("Host/SuSE/patchlevel");
if (isnull(service_pack)) service_pack = "0";
if (os_ver == "SLED12" && (! preg(pattern:"^(5)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLED12 SP5", os_ver + " SP" + service_pack);
if (os_ver == "SLED_SAP12" && (! preg(pattern:"^(5)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLED_SAP12 SP5", os_ver + " SP" + service_pack);
if (os_ver == "SLES12" && (! preg(pattern:"^(5)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLES12 SP5", os_ver + " SP" + service_pack);
if (os_ver == "SLES_SAP12" && (! preg(pattern:"^(5)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLES_SAP12 SP5", os_ver + " SP" + service_pack);
var pkgs = [
{'reference':'kernel-default-4.12.14-122.216.1', 'sp':'5', 'release':'SLES_SAP12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-12.5']},
{'reference':'kernel-default-base-4.12.14-122.216.1', 'sp':'5', 'release':'SLES_SAP12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-12.5']},
{'reference':'kernel-default-devel-4.12.14-122.216.1', 'sp':'5', 'release':'SLES_SAP12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-12.5']},
{'reference':'kernel-default-extra-4.12.14-122.216.1', 'sp':'5', 'cpu':'x86_64', 'release':'SLED_SAP12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-12.5']},
{'reference':'kernel-default-extra-4.12.14-122.216.1', 'sp':'5', 'cpu':'x86_64', 'release':'SLES_SAP12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-12.5']},
{'reference':'kernel-default-man-4.12.14-122.216.1', 'sp':'5', 'cpu':'s390x', 'release':'SLES_SAP12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-12.5']},
{'reference':'kernel-devel-4.12.14-122.216.1', 'sp':'5', 'release':'SLES_SAP12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-12.5']},
{'reference':'kernel-macros-4.12.14-122.216.1', 'sp':'5', 'release':'SLES_SAP12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-12.5']},
{'reference':'kernel-obs-build-4.12.14-122.216.1', 'sp':'5', 'release':'SLES_SAP12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-12.5']},
{'reference':'kernel-source-4.12.14-122.216.1', 'sp':'5', 'release':'SLES_SAP12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-12.5']},
{'reference':'kernel-syms-4.12.14-122.216.1', 'sp':'5', 'release':'SLES_SAP12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-12.5']},
{'reference':'cluster-md-kmp-default-4.12.14-122.216.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-12.5']},
{'reference':'dlm-kmp-default-4.12.14-122.216.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-12.5']},
{'reference':'gfs2-kmp-default-4.12.14-122.216.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-12.5']},
{'reference':'ocfs2-kmp-default-4.12.14-122.216.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-12.5']},
{'reference':'kernel-default-kgraft-4.12.14-122.216.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-live-patching-release-12.5']},
{'reference':'kernel-default-kgraft-devel-4.12.14-122.216.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-live-patching-release-12.5']},
{'reference':'kgraft-patch-4_12_14-122_216-default-1-8.3.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-live-patching-release-12.5']},
{'reference':'kernel-obs-build-4.12.14-122.216.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-sdk-release-12.5', 'sles-release-12.5']},
{'reference':'kernel-default-extra-4.12.14-122.216.1', 'sp':'5', 'cpu':'x86_64', 'release':'SLED12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-we-release-12.5', 'sles-release-12.5']},
{'reference':'kernel-default-extra-4.12.14-122.216.1', 'sp':'5', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-we-release-12.5', 'sles-release-12.5']},
{'reference':'kernel-default-4.12.14-122.216.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-release-12.5']},
{'reference':'kernel-default-base-4.12.14-122.216.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-release-12.5']},
{'reference':'kernel-default-devel-4.12.14-122.216.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-release-12.5']},
{'reference':'kernel-default-man-4.12.14-122.216.1', 'sp':'5', 'cpu':'s390x', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-release-12.5']},
{'reference':'kernel-devel-4.12.14-122.216.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-release-12.5']},
{'reference':'kernel-macros-4.12.14-122.216.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-release-12.5']},
{'reference':'kernel-source-4.12.14-122.216.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-release-12.5']},
{'reference':'kernel-syms-4.12.14-122.216.1', 'sp':'5', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-release-12.5']}
];
var ltss_caveat_required = FALSE;
var flag = 0;
foreach var package_array ( pkgs ) {
var reference = NULL;
var _release = NULL;
var sp = NULL;
var _cpu = NULL;
var exists_check = NULL;
var rpm_spec_vers_cmp = NULL;
if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
if (!empty_or_null(package_array['release'])) _release = package_array['release'];
if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];
if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];
if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];
if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
if (reference && _release) {
if (exists_check) {
var check_flag = 0;
foreach var check (exists_check) {
if (!rpm_exists(release:_release, rpm:check)) continue;
check_flag++;
}
if (!check_flag) continue;
}
if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;
}
}
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'cluster-md-kmp-default / dlm-kmp-default / gfs2-kmp-default / etc');
}
Vendor | Product | Version | CPE |
---|---|---|---|
novell | suse_linux | 12 | cpe:/o:novell:suse_linux:12 |
novell | suse_linux | kgraft-patch-4_12_14-122_216-default | p-cpe:/a:novell:suse_linux:kgraft-patch-4_12_14-122_216-default |
novell | suse_linux | kernel-default-base | p-cpe:/a:novell:suse_linux:kernel-default-base |
novell | suse_linux | kernel-default-kgraft-devel | p-cpe:/a:novell:suse_linux:kernel-default-kgraft-devel |
novell | suse_linux | kernel-macros | p-cpe:/a:novell:suse_linux:kernel-macros |
novell | suse_linux | kernel-default-devel | p-cpe:/a:novell:suse_linux:kernel-default-devel |
novell | suse_linux | cluster-md-kmp-default | p-cpe:/a:novell:suse_linux:cluster-md-kmp-default |
novell | suse_linux | gfs2-kmp-default | p-cpe:/a:novell:suse_linux:gfs2-kmp-default |
novell | suse_linux | kernel-default | p-cpe:/a:novell:suse_linux:kernel-default |
novell | suse_linux | kernel-devel | p-cpe:/a:novell:suse_linux:kernel-devel |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25160
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36312
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23134
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46904
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46905
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46907
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46909
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46938
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46939
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46941
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46950
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46958
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46960
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46963
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46964
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46966
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46975
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46981
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46988
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46990
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46998
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47006
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47015
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47024
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47034
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47045
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47049
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47055
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47056
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47060
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47061
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47063
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47068
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47070
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47071
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47073
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47100
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47101
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47104
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47110
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47112
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47114
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47117
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47118
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47119
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47138
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47141
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47142
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47143
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47146
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47149
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47150
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47153
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47159
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47161
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47162
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47165
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47166
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47167
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47168
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47169
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47171
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47173
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47177
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47179
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47180
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47181
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47182
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47183
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47184
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47185
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47188
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47189
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47198
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47202
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47203
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47204
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47205
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47207
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47211
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47216
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47217
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48619
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48626
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48636
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48650
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48651
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48667
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48668
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48687
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48688
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48695
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48701
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0160
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52454
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52469
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52470
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52474
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52476
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52477
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52509
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52515
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52524
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52528
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52575
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52590
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52591
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52628
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52639
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52646
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52652
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52653
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6356
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6535
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6536
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7192
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2201
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23307
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23848
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24855
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26739
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26929
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26930
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26948
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27014
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27054
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27072
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
bugzilla.suse.com/1084332
bugzilla.suse.com/1141539
bugzilla.suse.com/1184509
bugzilla.suse.com/1186060
bugzilla.suse.com/1190317
bugzilla.suse.com/1190576
bugzilla.suse.com/1192145
bugzilla.suse.com/1194516
bugzilla.suse.com/1203935
bugzilla.suse.com/1209657
bugzilla.suse.com/1211592
bugzilla.suse.com/1212514
bugzilla.suse.com/1213456
bugzilla.suse.com/1217339
bugzilla.suse.com/1217987
bugzilla.suse.com/1217988
bugzilla.suse.com/1217989
bugzilla.suse.com/1218220
bugzilla.suse.com/1218336
bugzilla.suse.com/1218479
bugzilla.suse.com/1218562
bugzilla.suse.com/1219104
bugzilla.suse.com/1219169
bugzilla.suse.com/1219170
bugzilla.suse.com/1219618
bugzilla.suse.com/1219623
bugzilla.suse.com/1219847
bugzilla.suse.com/1220320
bugzilla.suse.com/1220366
bugzilla.suse.com/1220394
bugzilla.suse.com/1220411
bugzilla.suse.com/1220416
bugzilla.suse.com/1220418
bugzilla.suse.com/1220422
bugzilla.suse.com/1220442
bugzilla.suse.com/1220445
bugzilla.suse.com/1220505
bugzilla.suse.com/1220521
bugzilla.suse.com/1220528
bugzilla.suse.com/1220536
bugzilla.suse.com/1220538
bugzilla.suse.com/1220554
bugzilla.suse.com/1220572
bugzilla.suse.com/1220580
bugzilla.suse.com/1220611
bugzilla.suse.com/1220625
bugzilla.suse.com/1220628
bugzilla.suse.com/1220637
bugzilla.suse.com/1220640
bugzilla.suse.com/1220662
bugzilla.suse.com/1220687
bugzilla.suse.com/1220692
bugzilla.suse.com/1220703
bugzilla.suse.com/1220706
bugzilla.suse.com/1220739
bugzilla.suse.com/1220742
bugzilla.suse.com/1220743
bugzilla.suse.com/1220745
bugzilla.suse.com/1220751
bugzilla.suse.com/1220768
bugzilla.suse.com/1220769
bugzilla.suse.com/1220777
bugzilla.suse.com/1220790
bugzilla.suse.com/1220794
bugzilla.suse.com/1220829
bugzilla.suse.com/1220836
bugzilla.suse.com/1220843
bugzilla.suse.com/1220846
bugzilla.suse.com/1220850
bugzilla.suse.com/1220871
bugzilla.suse.com/1220927
bugzilla.suse.com/1220960
bugzilla.suse.com/1220985
bugzilla.suse.com/1220987
bugzilla.suse.com/1221044
bugzilla.suse.com/1221046
bugzilla.suse.com/1221048
bugzilla.suse.com/1221058
bugzilla.suse.com/1221060
bugzilla.suse.com/1221061
bugzilla.suse.com/1221077
bugzilla.suse.com/1221082
bugzilla.suse.com/1221088
bugzilla.suse.com/1221162
bugzilla.suse.com/1221277
bugzilla.suse.com/1221293
bugzilla.suse.com/1221337
bugzilla.suse.com/1221532
bugzilla.suse.com/1221541
bugzilla.suse.com/1221548
bugzilla.suse.com/1221575
bugzilla.suse.com/1221605
bugzilla.suse.com/1221608
bugzilla.suse.com/1221617
bugzilla.suse.com/1221791
bugzilla.suse.com/1221816
bugzilla.suse.com/1221825
bugzilla.suse.com/1221830
bugzilla.suse.com/1221862
bugzilla.suse.com/1221934
bugzilla.suse.com/1221949
bugzilla.suse.com/1221952
bugzilla.suse.com/1221953
bugzilla.suse.com/1221965
bugzilla.suse.com/1221966
bugzilla.suse.com/1221967
bugzilla.suse.com/1221969
bugzilla.suse.com/1221972
bugzilla.suse.com/1221973
bugzilla.suse.com/1221977
bugzilla.suse.com/1221979
bugzilla.suse.com/1221988
bugzilla.suse.com/1221991
bugzilla.suse.com/1221993
bugzilla.suse.com/1221994
bugzilla.suse.com/1221997
bugzilla.suse.com/1221998
bugzilla.suse.com/1221999
bugzilla.suse.com/1222000
bugzilla.suse.com/1222001
bugzilla.suse.com/1222002
bugzilla.suse.com/1222117
bugzilla.suse.com/1222294
bugzilla.suse.com/1222300
bugzilla.suse.com/1222357
bugzilla.suse.com/1222379
bugzilla.suse.com/1222422
bugzilla.suse.com/1222428
bugzilla.suse.com/1222449
bugzilla.suse.com/1222503
bugzilla.suse.com/1222559
bugzilla.suse.com/1222585
bugzilla.suse.com/1222609
bugzilla.suse.com/1222610
bugzilla.suse.com/1222613
bugzilla.suse.com/1222618
bugzilla.suse.com/1222619
bugzilla.suse.com/1222624
bugzilla.suse.com/1222630
bugzilla.suse.com/1222632
bugzilla.suse.com/1222660
bugzilla.suse.com/1222662
bugzilla.suse.com/1222664
bugzilla.suse.com/1222666
bugzilla.suse.com/1222669
bugzilla.suse.com/1222671
bugzilla.suse.com/1222677
bugzilla.suse.com/1222706
bugzilla.suse.com/1222720
bugzilla.suse.com/1222765
bugzilla.suse.com/1222770
bugzilla.suse.com/1222772
bugzilla.suse.com/1222787
bugzilla.suse.com/1222790
bugzilla.suse.com/1222812
bugzilla.suse.com/1222836
bugzilla.suse.com/1222869
bugzilla.suse.com/1222876
bugzilla.suse.com/1222878
bugzilla.suse.com/1222881
bugzilla.suse.com/1222883
bugzilla.suse.com/1222888
bugzilla.suse.com/1222952
bugzilla.suse.com/1222961
bugzilla.suse.com/1222975
bugzilla.suse.com/1222976
bugzilla.suse.com/1223016
bugzilla.suse.com/1223035
bugzilla.suse.com/1223049
bugzilla.suse.com/1223051
bugzilla.suse.com/1223057
bugzilla.suse.com/1223058
bugzilla.suse.com/1223060
bugzilla.suse.com/1223187
bugzilla.suse.com/1223189
bugzilla.suse.com/1223198
bugzilla.suse.com/1223203
bugzilla.suse.com/1223315
bugzilla.suse.com/1223432
bugzilla.suse.com/1223509
bugzilla.suse.com/1223512
bugzilla.suse.com/1223513
bugzilla.suse.com/1223516
bugzilla.suse.com/1223518
bugzilla.suse.com/1223626
bugzilla.suse.com/1223627
bugzilla.suse.com/1223664
bugzilla.suse.com/1223686
bugzilla.suse.com/1223693
bugzilla.suse.com/1223712
bugzilla.suse.com/1223715
bugzilla.suse.com/1223735
bugzilla.suse.com/1223744
bugzilla.suse.com/1223745
bugzilla.suse.com/1223770
bugzilla.suse.com/1223781
bugzilla.suse.com/1223819
bugzilla.suse.com/1223824
bugzilla.suse.com/1223827
bugzilla.suse.com/1223837
bugzilla.suse.com/1223842
bugzilla.suse.com/1223843
bugzilla.suse.com/1223844
bugzilla.suse.com/1223883
bugzilla.suse.com/1223885
bugzilla.suse.com/1223921
bugzilla.suse.com/1223941
bugzilla.suse.com/1223952
bugzilla.suse.com/1223953
bugzilla.suse.com/1223954
bugzilla.suse.com/1224785
lists.suse.com/pipermail/sle-updates/2024-May/035427.html
www.suse.com/security/cve/CVE-2019-25160
www.suse.com/security/cve/CVE-2020-36312
www.suse.com/security/cve/CVE-2021-23134
www.suse.com/security/cve/CVE-2021-46904
www.suse.com/security/cve/CVE-2021-46905
www.suse.com/security/cve/CVE-2021-46907
www.suse.com/security/cve/CVE-2021-46909
www.suse.com/security/cve/CVE-2021-46938
www.suse.com/security/cve/CVE-2021-46939
www.suse.com/security/cve/CVE-2021-46941
www.suse.com/security/cve/CVE-2021-46950
www.suse.com/security/cve/CVE-2021-46958
www.suse.com/security/cve/CVE-2021-46960
www.suse.com/security/cve/CVE-2021-46963
www.suse.com/security/cve/CVE-2021-46964
www.suse.com/security/cve/CVE-2021-46966
www.suse.com/security/cve/CVE-2021-46975
www.suse.com/security/cve/CVE-2021-46981
www.suse.com/security/cve/CVE-2021-46988
www.suse.com/security/cve/CVE-2021-46990
www.suse.com/security/cve/CVE-2021-46998
www.suse.com/security/cve/CVE-2021-47006
www.suse.com/security/cve/CVE-2021-47015
www.suse.com/security/cve/CVE-2021-47024
www.suse.com/security/cve/CVE-2021-47034
www.suse.com/security/cve/CVE-2021-47045
www.suse.com/security/cve/CVE-2021-47049
www.suse.com/security/cve/CVE-2021-47055
www.suse.com/security/cve/CVE-2021-47056
www.suse.com/security/cve/CVE-2021-47060
www.suse.com/security/cve/CVE-2021-47061
www.suse.com/security/cve/CVE-2021-47063
www.suse.com/security/cve/CVE-2021-47068
www.suse.com/security/cve/CVE-2021-47070
www.suse.com/security/cve/CVE-2021-47071
www.suse.com/security/cve/CVE-2021-47073
www.suse.com/security/cve/CVE-2021-47100
www.suse.com/security/cve/CVE-2021-47101
www.suse.com/security/cve/CVE-2021-47104
www.suse.com/security/cve/CVE-2021-47110
www.suse.com/security/cve/CVE-2021-47112
www.suse.com/security/cve/CVE-2021-47114
www.suse.com/security/cve/CVE-2021-47117
www.suse.com/security/cve/CVE-2021-47118
www.suse.com/security/cve/CVE-2021-47119
www.suse.com/security/cve/CVE-2021-47138
www.suse.com/security/cve/CVE-2021-47141
www.suse.com/security/cve/CVE-2021-47142
www.suse.com/security/cve/CVE-2021-47143
www.suse.com/security/cve/CVE-2021-47146
www.suse.com/security/cve/CVE-2021-47149
www.suse.com/security/cve/CVE-2021-47150
www.suse.com/security/cve/CVE-2021-47153
www.suse.com/security/cve/CVE-2021-47159
www.suse.com/security/cve/CVE-2021-47161
www.suse.com/security/cve/CVE-2021-47162
www.suse.com/security/cve/CVE-2021-47165
www.suse.com/security/cve/CVE-2021-47166
www.suse.com/security/cve/CVE-2021-47167
www.suse.com/security/cve/CVE-2021-47168
www.suse.com/security/cve/CVE-2021-47169
www.suse.com/security/cve/CVE-2021-47171
www.suse.com/security/cve/CVE-2021-47173
www.suse.com/security/cve/CVE-2021-47177
www.suse.com/security/cve/CVE-2021-47179
www.suse.com/security/cve/CVE-2021-47180
www.suse.com/security/cve/CVE-2021-47181
www.suse.com/security/cve/CVE-2021-47182
www.suse.com/security/cve/CVE-2021-47183
www.suse.com/security/cve/CVE-2021-47184
www.suse.com/security/cve/CVE-2021-47185
www.suse.com/security/cve/CVE-2021-47188
www.suse.com/security/cve/CVE-2021-47189
www.suse.com/security/cve/CVE-2021-47198
www.suse.com/security/cve/CVE-2021-47202
www.suse.com/security/cve/CVE-2021-47203
www.suse.com/security/cve/CVE-2021-47204
www.suse.com/security/cve/CVE-2021-47205
www.suse.com/security/cve/CVE-2021-47207
www.suse.com/security/cve/CVE-2021-47211
www.suse.com/security/cve/CVE-2021-47216
www.suse.com/security/cve/CVE-2021-47217
www.suse.com/security/cve/CVE-2022-0487
www.suse.com/security/cve/CVE-2022-48619
www.suse.com/security/cve/CVE-2022-48626
www.suse.com/security/cve/CVE-2022-48636
www.suse.com/security/cve/CVE-2022-48650
www.suse.com/security/cve/CVE-2022-48651
www.suse.com/security/cve/CVE-2022-48667
www.suse.com/security/cve/CVE-2022-48668
www.suse.com/security/cve/CVE-2022-48687
www.suse.com/security/cve/CVE-2022-48688
www.suse.com/security/cve/CVE-2022-48695
www.suse.com/security/cve/CVE-2022-48701
www.suse.com/security/cve/CVE-2023-0160
www.suse.com/security/cve/CVE-2023-28746
www.suse.com/security/cve/CVE-2023-35827
www.suse.com/security/cve/CVE-2023-52454
www.suse.com/security/cve/CVE-2023-52469
www.suse.com/security/cve/CVE-2023-52470
www.suse.com/security/cve/CVE-2023-52474
www.suse.com/security/cve/CVE-2023-52476
www.suse.com/security/cve/CVE-2023-52477
www.suse.com/security/cve/CVE-2023-52486
www.suse.com/security/cve/CVE-2023-52488
www.suse.com/security/cve/CVE-2023-52509
www.suse.com/security/cve/CVE-2023-52515
www.suse.com/security/cve/CVE-2023-52524
www.suse.com/security/cve/CVE-2023-52528
www.suse.com/security/cve/CVE-2023-52575
www.suse.com/security/cve/CVE-2023-52583
www.suse.com/security/cve/CVE-2023-52587
www.suse.com/security/cve/CVE-2023-52590
www.suse.com/security/cve/CVE-2023-52591
www.suse.com/security/cve/CVE-2023-52595
www.suse.com/security/cve/CVE-2023-52598
www.suse.com/security/cve/CVE-2023-52607
www.suse.com/security/cve/CVE-2023-52614
www.suse.com/security/cve/CVE-2023-52620
www.suse.com/security/cve/CVE-2023-52628
www.suse.com/security/cve/CVE-2023-52635
www.suse.com/security/cve/CVE-2023-52639
www.suse.com/security/cve/CVE-2023-52644
www.suse.com/security/cve/CVE-2023-52646
www.suse.com/security/cve/CVE-2023-52650
www.suse.com/security/cve/CVE-2023-52652
www.suse.com/security/cve/CVE-2023-52653
www.suse.com/security/cve/CVE-2023-6270
www.suse.com/security/cve/CVE-2023-6356
www.suse.com/security/cve/CVE-2023-6535
www.suse.com/security/cve/CVE-2023-6536
www.suse.com/security/cve/CVE-2023-7042
www.suse.com/security/cve/CVE-2023-7192
www.suse.com/security/cve/CVE-2024-2201
www.suse.com/security/cve/CVE-2024-22099
www.suse.com/security/cve/CVE-2024-23307
www.suse.com/security/cve/CVE-2024-23848
www.suse.com/security/cve/CVE-2024-24855
www.suse.com/security/cve/CVE-2024-24861
www.suse.com/security/cve/CVE-2024-26614
www.suse.com/security/cve/CVE-2024-26642
www.suse.com/security/cve/CVE-2024-26651
www.suse.com/security/cve/CVE-2024-26671
www.suse.com/security/cve/CVE-2024-26675
www.suse.com/security/cve/CVE-2024-26689
www.suse.com/security/cve/CVE-2024-26704
www.suse.com/security/cve/CVE-2024-26733
www.suse.com/security/cve/CVE-2024-26739
www.suse.com/security/cve/CVE-2024-26743
www.suse.com/security/cve/CVE-2024-26744
www.suse.com/security/cve/CVE-2024-26747
www.suse.com/security/cve/CVE-2024-26754
www.suse.com/security/cve/CVE-2024-26763
www.suse.com/security/cve/CVE-2024-26771
www.suse.com/security/cve/CVE-2024-26772
www.suse.com/security/cve/CVE-2024-26773
www.suse.com/security/cve/CVE-2024-26777
www.suse.com/security/cve/CVE-2024-26778
www.suse.com/security/cve/CVE-2024-26779
www.suse.com/security/cve/CVE-2024-26793
www.suse.com/security/cve/CVE-2024-26805
www.suse.com/security/cve/CVE-2024-26816
www.suse.com/security/cve/CVE-2024-26817
www.suse.com/security/cve/CVE-2024-26839
www.suse.com/security/cve/CVE-2024-26840
www.suse.com/security/cve/CVE-2024-26852
www.suse.com/security/cve/CVE-2024-26855
www.suse.com/security/cve/CVE-2024-26857
www.suse.com/security/cve/CVE-2024-26859
www.suse.com/security/cve/CVE-2024-26878
www.suse.com/security/cve/CVE-2024-26883
www.suse.com/security/cve/CVE-2024-26884
www.suse.com/security/cve/CVE-2024-26898
www.suse.com/security/cve/CVE-2024-26901
www.suse.com/security/cve/CVE-2024-26903
www.suse.com/security/cve/CVE-2024-26907
www.suse.com/security/cve/CVE-2024-26922
www.suse.com/security/cve/CVE-2024-26929
www.suse.com/security/cve/CVE-2024-26930
www.suse.com/security/cve/CVE-2024-26931
www.suse.com/security/cve/CVE-2024-26948
www.suse.com/security/cve/CVE-2024-26993
www.suse.com/security/cve/CVE-2024-27013
www.suse.com/security/cve/CVE-2024-27014
www.suse.com/security/cve/CVE-2024-27043
www.suse.com/security/cve/CVE-2024-27046
www.suse.com/security/cve/CVE-2024-27054
www.suse.com/security/cve/CVE-2024-27072
www.suse.com/security/cve/CVE-2024-27073
www.suse.com/security/cve/CVE-2024-27074
www.suse.com/security/cve/CVE-2024-27075
www.suse.com/security/cve/CVE-2024-27078
www.suse.com/security/cve/CVE-2024-27388
4.6 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.9 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
50.0%