# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:2571-1  
Rating: important  
References:

  * bsc#1186716
  * bsc#1195775
  * bsc#1204562
  * bsc#1209834
  * bsc#1217481
  * bsc#1217912
  * bsc#1218442
  * bsc#1219224
  * bsc#1219478
  * bsc#1219596
  * bsc#1219633
  * bsc#1219847
  * bsc#1219953
  * bsc#1221086
  * bsc#1221777
  * bsc#1221958
  * bsc#1222011
  * bsc#1222015
  * bsc#1222080
  * bsc#1222241
  * bsc#1222380
  * bsc#1222588
  * bsc#1222617
  * bsc#1222619
  * bsc#1222809
  * bsc#1222810
  * bsc#1223018
  * bsc#1223265
  * bsc#1224049
  * bsc#1224187
  * bsc#1224439
  * bsc#1224497
  * bsc#1224498
  * bsc#1224515
  * bsc#1224520
  * bsc#1224523
  * bsc#1224539
  * bsc#1224540
  * bsc#1224549
  * bsc#1224572
  * bsc#1224575
  * bsc#1224583
  * bsc#1224584
  * bsc#1224606
  * bsc#1224612
  * bsc#1224614
  * bsc#1224619
  * bsc#1224655
  * bsc#1224659
  * bsc#1224661
  * bsc#1224662
  * bsc#1224670
  * bsc#1224673
  * bsc#1224698
  * bsc#1224735
  * bsc#1224751
  * bsc#1224759
  * bsc#1224928
  * bsc#1224930
  * bsc#1224932
  * bsc#1224933
  * bsc#1224935
  * bsc#1224937
  * bsc#1224939
  * bsc#1224941
  * bsc#1224944
  * bsc#1224946
  * bsc#1224947
  * bsc#1224949
  * bsc#1224951
  * bsc#1224988
  * bsc#1224992
  * bsc#1224998
  * bsc#1225000
  * bsc#1225001
  * bsc#1225004
  * bsc#1225006
  * bsc#1225008
  * bsc#1225009
  * bsc#1225014
  * bsc#1225015
  * bsc#1225022
  * bsc#1225025
  * bsc#1225028
  * bsc#1225029
  * bsc#1225031
  * bsc#1225036
  * bsc#1225041
  * bsc#1225044
  * bsc#1225049
  * bsc#1225050
  * bsc#1225076
  * bsc#1225077
  * bsc#1225078
  * bsc#1225081
  * bsc#1225085
  * bsc#1225086
  * bsc#1225090
  * bsc#1225092
  * bsc#1225096
  * bsc#1225097
  * bsc#1225098
  * bsc#1225101
  * bsc#1225103
  * bsc#1225104
  * bsc#1225105
  * bsc#1225106
  * bsc#1225108
  * bsc#1225120
  * bsc#1225132
  * bsc#1225180
  * bsc#1225300
  * bsc#1225391
  * bsc#1225472
  * bsc#1225475
  * bsc#1225476
  * bsc#1225477
  * bsc#1225478
  * bsc#1225485
  * bsc#1225490
  * bsc#1225527
  * bsc#1225529
  * bsc#1225530
  * bsc#1225532
  * bsc#1225534
  * bsc#1225548
  * bsc#1225550
  * bsc#1225553
  * bsc#1225554
  * bsc#1225555
  * bsc#1225556
  * bsc#1225557
  * bsc#1225559
  * bsc#1225560
  * bsc#1225564
  * bsc#1225565
  * bsc#1225566
  * bsc#1225568
  * bsc#1225569
  * bsc#1225570
  * bsc#1225571
  * bsc#1225572
  * bsc#1225573
  * bsc#1225577
  * bsc#1225581
  * bsc#1225583
  * bsc#1225584
  * bsc#1225585
  * bsc#1225586
  * bsc#1225587
  * bsc#1225588
  * bsc#1225589
  * bsc#1225590
  * bsc#1225591
  * bsc#1225592
  * bsc#1225594
  * bsc#1225595
  * bsc#1225599
  * bsc#1225602
  * bsc#1225605
  * bsc#1225609
  * bsc#1225611
  * bsc#1225681
  * bsc#1225702
  * bsc#1225723
  * bsc#1225726
  * bsc#1225731
  * bsc#1225732
  * bsc#1225737
  * bsc#1225741
  * bsc#1225758
  * bsc#1225759
  * bsc#1225760
  * bsc#1225761
  * bsc#1225762
  * bsc#1225763
  * bsc#1225767
  * bsc#1225770
  * bsc#1225815
  * bsc#1225820
  * bsc#1225823
  * bsc#1225827
  * bsc#1225834
  * bsc#1225866
  * bsc#1225872
  * bsc#1225898
  * bsc#1225903
  * bsc#1226022
  * bsc#1226131
  * bsc#1226145
  * bsc#1226149
  * bsc#1226155
  * bsc#1226158
  * bsc#1226163
  * bsc#1226211
  * bsc#1226212
  * bsc#1226226
  * bsc#1226457
  * bsc#1226503
  * bsc#1226513
  * bsc#1226514
  * bsc#1226520
  * bsc#1226582
  * bsc#1226587
  * bsc#1226588
  * bsc#1226592
  * bsc#1226593
  * bsc#1226594
  * bsc#1226595
  * bsc#1226597
  * bsc#1226607
  * bsc#1226608
  * bsc#1226610
  * bsc#1226612
  * bsc#1226613
  * bsc#1226630
  * bsc#1226632
  * bsc#1226633
  * bsc#1226634
  * bsc#1226637
  * bsc#1226657
  * bsc#1226658
  * bsc#1226734
  * bsc#1226735
  * bsc#1226737
  * bsc#1226738
  * bsc#1226739
  * bsc#1226740
  * bsc#1226741
  * bsc#1226742
  * bsc#1226744
  * bsc#1226746
  * bsc#1226747
  * bsc#1226749
  * bsc#1226754
  * bsc#1226758
  * bsc#1226760
  * bsc#1226761
  * bsc#1226764
  * bsc#1226767
  * bsc#1226768
  * bsc#1226769
  * bsc#1226771
  * bsc#1226772
  * bsc#1226774
  * bsc#1226775
  * bsc#1226776
  * bsc#1226777
  * bsc#1226780
  * bsc#1226781
  * bsc#1226786
  * bsc#1226788
  * bsc#1226789
  * bsc#1226790
  * bsc#1226791
  * bsc#1226796
  * bsc#1226799
  * bsc#1226837
  * bsc#1226839
  * bsc#1226840
  * bsc#1226841
  * bsc#1226842
  * bsc#1226844
  * bsc#1226848
  * bsc#1226852
  * bsc#1226856
  * bsc#1226857
  * bsc#1226859
  * bsc#1226861
  * bsc#1226863
  * bsc#1226864
  * bsc#1226867
  * bsc#1226868
  * bsc#1226875
  * bsc#1226876
  * bsc#1226878
  * bsc#1226879
  * bsc#1226886
  * bsc#1226890
  * bsc#1226891
  * bsc#1226894
  * bsc#1226895
  * bsc#1226905
  * bsc#1226908
  * bsc#1226909
  * bsc#1226911
  * bsc#1226928
  * bsc#1226934
  * bsc#1226938
  * bsc#1226939
  * bsc#1226941
  * bsc#1226948
  * bsc#1226949
  * bsc#1226950
  * bsc#1226962
  * bsc#1226976
  * bsc#1226989
  * bsc#1226990
  * bsc#1226992
  * bsc#1226994
  * bsc#1226995
  * bsc#1226996
  * bsc#1227066
  * bsc#1227072
  * bsc#1227085
  * bsc#1227089
  * bsc#1227090
  * bsc#1227096
  * bsc#1227101
  * bsc#1227190
  * jsc#PED-8491
  * jsc#PED-8570
  * jsc#PED-8688

  
Cross-References:

  * CVE-2021-47432
  * CVE-2022-48772
  * CVE-2023-52622
  * CVE-2023-52656
  * CVE-2023-52672
  * CVE-2023-52699
  * CVE-2023-52735
  * CVE-2023-52749
  * CVE-2023-52750
  * CVE-2023-52753
  * CVE-2023-52754
  * CVE-2023-52757
  * CVE-2023-52759
  * CVE-2023-52762
  * CVE-2023-52763
  * CVE-2023-52764
  * CVE-2023-52765
  * CVE-2023-52766
  * CVE-2023-52767
  * CVE-2023-52768
  * CVE-2023-52769
  * CVE-2023-52773
  * CVE-2023-52774
  * CVE-2023-52776
  * CVE-2023-52777
  * CVE-2023-52780
  * CVE-2023-52781
  * CVE-2023-52782
  * CVE-2023-52783
  * CVE-2023-52784
  * CVE-2023-52786
  * CVE-2023-52787
  * CVE-2023-52788
  * CVE-2023-52789
  * CVE-2023-52791
  * CVE-2023-52792
  * CVE-2023-52794
  * CVE-2023-52795
  * CVE-2023-52796
  * CVE-2023-52798
  * CVE-2023-52799
  * CVE-2023-52800
  * CVE-2023-52801
  * CVE-2023-52803
  * CVE-2023-52804
  * CVE-2023-52805
  * CVE-2023-52806
  * CVE-2023-52807
  * CVE-2023-52808
  * CVE-2023-52809
  * CVE-2023-52810
  * CVE-2023-52811
  * CVE-2023-52812
  * CVE-2023-52813
  * CVE-2023-52814
  * CVE-2023-52815
  * CVE-2023-52816
  * CVE-2023-52817
  * CVE-2023-52818
  * CVE-2023-52819
  * CVE-2023-52821
  * CVE-2023-52825
  * CVE-2023-52826
  * CVE-2023-52827
  * CVE-2023-52829
  * CVE-2023-52832
  * CVE-2023-52833
  * CVE-2023-52834
  * CVE-2023-52835
  * CVE-2023-52836
  * CVE-2023-52837
  * CVE-2023-52838
  * CVE-2023-52840
  * CVE-2023-52841
  * CVE-2023-52842
  * CVE-2023-52843
  * CVE-2023-52844
  * CVE-2023-52845
  * CVE-2023-52846
  * CVE-2023-52847
  * CVE-2023-52849
  * CVE-2023-52850
  * CVE-2023-52851
  * CVE-2023-52853
  * CVE-2023-52854
  * CVE-2023-52855
  * CVE-2023-52856
  * CVE-2023-52857
  * CVE-2023-52858
  * CVE-2023-52861
  * CVE-2023-52862
  * CVE-2023-52863
  * CVE-2023-52864
  * CVE-2023-52865
  * CVE-2023-52866
  * CVE-2023-52867
  * CVE-2023-52868
  * CVE-2023-52869
  * CVE-2023-52870
  * CVE-2023-52871
  * CVE-2023-52872
  * CVE-2023-52873
  * CVE-2023-52874
  * CVE-2023-52875
  * CVE-2023-52876
  * CVE-2023-52877
  * CVE-2023-52878
  * CVE-2023-52879
  * CVE-2023-52880
  * CVE-2023-52881
  * CVE-2023-52883
  * CVE-2023-52884
  * CVE-2024-26482
  * CVE-2024-26625
  * CVE-2024-26676
  * CVE-2024-26750
  * CVE-2024-26758
  * CVE-2024-26767
  * CVE-2024-26780
  * CVE-2024-26813
  * CVE-2024-26814
  * CVE-2024-26845
  * CVE-2024-26889
  * CVE-2024-26920
  * CVE-2024-27414
  * CVE-2024-27419
  * CVE-2024-33619
  * CVE-2024-34777
  * CVE-2024-35247
  * CVE-2024-35807
  * CVE-2024-35827
  * CVE-2024-35831
  * CVE-2024-35843
  * CVE-2024-35848
  * CVE-2024-35857
  * CVE-2024-35880
  * CVE-2024-35884
  * CVE-2024-35886
  * CVE-2024-35892
  * CVE-2024-35896
  * CVE-2024-35898
  * CVE-2024-35900
  * CVE-2024-35925
  * CVE-2024-35926
  * CVE-2024-35957
  * CVE-2024-35962
  * CVE-2024-35970
  * CVE-2024-35976
  * CVE-2024-35979
  * CVE-2024-35998
  * CVE-2024-36005
  * CVE-2024-36008
  * CVE-2024-36010
  * CVE-2024-36017
  * CVE-2024-36024
  * CVE-2024-36281
  * CVE-2024-36477
  * CVE-2024-36478
  * CVE-2024-36479
  * CVE-2024-36882
  * CVE-2024-36887
  * CVE-2024-36899
  * CVE-2024-36900
  * CVE-2024-36903
  * CVE-2024-36904
  * CVE-2024-36915
  * CVE-2024-36916
  * CVE-2024-36917
  * CVE-2024-36919
  * CVE-2024-36923
  * CVE-2024-36924
  * CVE-2024-36926
  * CVE-2024-36934
  * CVE-2024-36935
  * CVE-2024-36937
  * CVE-2024-36938
  * CVE-2024-36945
  * CVE-2024-36952
  * CVE-2024-36957
  * CVE-2024-36960
  * CVE-2024-36962
  * CVE-2024-36964
  * CVE-2024-36965
  * CVE-2024-36967
  * CVE-2024-36969
  * CVE-2024-36971
  * CVE-2024-36972
  * CVE-2024-36973
  * CVE-2024-36975
  * CVE-2024-36977
  * CVE-2024-36978
  * CVE-2024-37021
  * CVE-2024-37078
  * CVE-2024-37353
  * CVE-2024-37354
  * CVE-2024-38381
  * CVE-2024-38384
  * CVE-2024-38385
  * CVE-2024-38388
  * CVE-2024-38390
  * CVE-2024-38391
  * CVE-2024-38539
  * CVE-2024-38540
  * CVE-2024-38541
  * CVE-2024-38543
  * CVE-2024-38544
  * CVE-2024-38545
  * CVE-2024-38546
  * CVE-2024-38547
  * CVE-2024-38548
  * CVE-2024-38549
  * CVE-2024-38550
  * CVE-2024-38551
  * CVE-2024-38552
  * CVE-2024-38553
  * CVE-2024-38554
  * CVE-2024-38555
  * CVE-2024-38556
  * CVE-2024-38557
  * CVE-2024-38559
  * CVE-2024-38560
  * CVE-2024-38562
  * CVE-2024-38564
  * CVE-2024-38565
  * CVE-2024-38566
  * CVE-2024-38567
  * CVE-2024-38568
  * CVE-2024-38569
  * CVE-2024-38570
  * CVE-2024-38571
  * CVE-2024-38572
  * CVE-2024-38573
  * CVE-2024-38575
  * CVE-2024-38578
  * CVE-2024-38579
  * CVE-2024-38580
  * CVE-2024-38581
  * CVE-2024-38582
  * CVE-2024-38583
  * CVE-2024-38587
  * CVE-2024-38588
  * CVE-2024-38590
  * CVE-2024-38591
  * CVE-2024-38592
  * CVE-2024-38594
  * CVE-2024-38595
  * CVE-2024-38597
  * CVE-2024-38599
  * CVE-2024-38600
  * CVE-2024-38601
  * CVE-2024-38602
  * CVE-2024-38603
  * CVE-2024-38605
  * CVE-2024-38608
  * CVE-2024-38610
  * CVE-2024-38611
  * CVE-2024-38615
  * CVE-2024-38616
  * CVE-2024-38617
  * CVE-2024-38618
  * CVE-2024-38619
  * CVE-2024-38621
  * CVE-2024-38622
  * CVE-2024-38627
  * CVE-2024-38628
  * CVE-2024-38629
  * CVE-2024-38630
  * CVE-2024-38633
  * CVE-2024-38634
  * CVE-2024-38635
  * CVE-2024-38636
  * CVE-2024-38661
  * CVE-2024-38663
  * CVE-2024-38664
  * CVE-2024-38780
  * CVE-2024-39277
  * CVE-2024-39291
  * CVE-2024-39296
  * CVE-2024-39301
  * CVE-2024-39362
  * CVE-2024-39371
  * CVE-2024-39463
  * CVE-2024-39466
  * CVE-2024-39469
  * CVE-2024-39471

  
CVSS scores:

  * CVE-2021-47432 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48772 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52622 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52656 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-52672 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52699 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52735 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52749 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52750 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52753 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52753 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52754 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52757 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52759 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52762 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52763 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52764 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52765 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52766 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-52767 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52768 ( SUSE ):  5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-52769 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52769 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52773 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52773 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52774 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52776 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
  * CVE-2023-52777 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52780 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52781 ( SUSE ):  4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-52782 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52783 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52783 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52784 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52786 ( SUSE ):  3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2023-52787 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52788 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52789 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52791 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52792 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52794 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2023-52795 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52796 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52798 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52799 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52800 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52801 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52803 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52804 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2023-52805 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2023-52806 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52806 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52807 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
  * CVE-2023-52808 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52809 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52809 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52810 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52811 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52812 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2023-52813 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52814 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52814 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52815 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52815 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52816 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52817 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52817 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52818 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-52819 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-52821 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52821 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52825 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52826 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52827 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-52827 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2023-52829 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
  * CVE-2023-52832 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52833 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52834 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-52835 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-52836 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N
  * CVE-2023-52837 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52838 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-52840 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52841 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52842 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52843 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52844 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52845 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52846 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52847 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-52849 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52850 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52851 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52853 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52854 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52855 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52856 ( SUSE ):  4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52857 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52858 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52861 ( SUSE ):  4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52862 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52863 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52864 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52865 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52866 ( SUSE ):  6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52867 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
  * CVE-2023-52868 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52869 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52870 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52871 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2023-52872 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52873 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52874 ( SUSE ):  3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
  * CVE-2023-52875 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52876 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52877 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52878 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52879 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52880 ( SUSE ):  8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52881 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:L
  * CVE-2023-52883 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52884 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26625 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26676 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26750 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26780 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26813 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26814 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26845 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26889 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27414 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-27419 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
  * CVE-2024-33619 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-34777 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-35247 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35807 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35827 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35831 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35843 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-35848 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35857 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35880 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35884 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35886 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35892 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35896 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35898 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35900 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35925 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35926 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2024-35970 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35976 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35979 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35998 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36005 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36008 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36008 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36010 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36017 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-36024 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36281 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36477 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-36477 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36478 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36479 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36882 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36887 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36899 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36900 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36903 ( SUSE ):  5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-36904 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36915 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-36916 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-36917 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36919 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36923 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-36924 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36926 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36926 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36934 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L
  * CVE-2024-36935 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L
  * CVE-2024-36937 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36938 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36938 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36945 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36952 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36957 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-36960 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-36962 ( SUSE ):  6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36964 ( SUSE ):  7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36965 ( SUSE ):  5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-36965 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36967 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36967 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36969 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36969 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36971 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36971 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36972 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36973 ( SUSE ):  6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36975 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36977 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36978 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
  * CVE-2024-37021 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-37078 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-37353 ( SUSE ):  3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-37354 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-38381 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-38384 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38385 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38388 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-38390 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38391 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-38539 ( SUSE ):  2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-38540 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38541 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38543 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38544 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38545 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38546 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38547 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38548 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38549 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38550 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38551 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38552 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-38553 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38554 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38555 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38556 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38557 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38559 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38560 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38562 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38564 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-38565 ( SUSE ):  5.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2024-38566 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38567 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38568 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
  * CVE-2024-38569 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
  * CVE-2024-38570 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38571 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38572 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-38573 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38575 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38578 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-38579 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-38580 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38581 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-38582 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38583 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38587 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
  * CVE-2024-38588 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38590 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38591 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38592 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38594 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-38595 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-38597 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38599 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-38600 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38601 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38602 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38603 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38605 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38608 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2024-38610 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38611 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2024-38615 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38616 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38617 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38618 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38619 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38621 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38622 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38627 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38628 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38629 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38630 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38633 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38634 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38635 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38636 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-38661 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38663 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38664 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38664 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38780 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38780 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39277 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-39277 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-39291 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39291 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-39296 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39301 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39362 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39371 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39463 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-39466 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39469 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39471 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

  
Affected Products:

  * Basesystem Module 15-SP6
  * Development Tools Module 15-SP6
  * Legacy Module 15-SP6
  * openSUSE Leap 15.6
  * SUSE Linux Enterprise Desktop 15 SP6
  * SUSE Linux Enterprise High Availability Extension 15 SP6
  * SUSE Linux Enterprise Live Patching 15-SP6
  * SUSE Linux Enterprise Real Time 15 SP6
  * SUSE Linux Enterprise Server 15 SP6
  * SUSE Linux Enterprise Server for SAP Applications 15 SP6
  * SUSE Linux Enterprise Workstation Extension 15 SP6

  
  
An update that solves 285 vulnerabilities, contains three features and has 25
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

  * CVE-2024-39371: io_uring: check for non-NULL file pointer in
    io_file_can_poll() (bsc#1226990).
  * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame()
    (bsc#1225098).
  * CVE-2024-38610: drivers/virt/acrn: fix PFNMAP PTE checks in
    acrn_vm_ram_map() (bsc#1226758).
  * CVE-2024-37354: btrfs: fix crash on racing fsync and size-extending write
    into prealloc (bsc#1227101).
  * CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources
    after upload (bsc#1225767).
  * CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated
    (bsc#1226785).
  * CVE-2024-38570: gfs2: Fix potential glock use-after-free on unmount
    (bsc#1226775).
  * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
    (bsc#1225732).
  * CVE-2023-52840: Fix use after free in rmi_unregister_function()
    (bsc#1224928).
  * CVE-2024-38545: RDMA/hns: Fix UAF for cq async event (bsc#1226595).
  * CVE-2023-52834: atl1c: Work around the DMA RX overflow issue (bsc#1225599).
  * CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096).
  * CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086).
  * CVE-2023-52821: Fixed a possible null pointer dereference (bsc#1225022).
  * CVE-2023-52867: Fixed possible buffer overflow (bsc#1225009).
  * CVE-2024-38578: ecryptfs: Fix buffer size for tag 66 packet (bsc#1226634,).
  * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
    (bsc#1225866).
  * CVE-2023-52759: Ignore negated quota changes (bsc#1225560).
  * CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
  * CVE-2023-52807: Fixed out-of-bounds access may occur when coalesce info is
    read via debugfs (bsc#1225097).
  * CVE-2023-52864: Fixed opening of char device (bsc#1225132).
  * CVE-2024-36926: Fixed LPAR panics during boot up with a frozen PE
    (bsc#1222011).
  * CVE-2023-52871: Handle a second device without data corruption (bsc#1225534)
  * CVE-2023-52795: Fixed use after free in vhost_vdpa_probe() (bsc#1225085).
  * CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).
  * CVE-2024-37353: virtio: fixed a double free in vp_del_vqs() (bsc#1226875).
  * CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994).
  * CVE-2024-35843: iommu/vt-d: Use device rbtree in iopf reporting path
    (bsc#1224751).
  * CVE-2024-37078: nilfs2: fix potential kernel bug due to lack of writeback
    flag waiting (bsc#1227066).
  * CVE-2024-35247: fpga: region: add owner module and take its refcount
    (bsc#1226948).
  * CVE-2024-36479: fpga: bridge: add owner module and take its refcount
    (bsc#1226949).
  * CVE-2024-37021: fpga: manager: add owner module and take its refcount
    (bsc#1226950).
  * CVE-2024-36281: net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly
    delete status rules (bsc#1226799).
  * CVE-2024-38580: epoll: be better about file lifetimes (bsc#1226610).
  * CVE-2024-36478: null_blk: fix null-ptr-dereference while configuring 'power'
    and 'submit_queues' (bsc#1226841).
  * CVE-2024-38636: f2fs: multidev: fix to recognize valid zero block address
    (bsc#1226879).
  * CVE-2024-38661: s390/ap: Fix crash in AP internal function modify_bitmap()
    (bsc#1226996).
  * CVE-2024-38564: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in
    BPF_LINK_CREATE (bsc#1226789).
  * CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated
    (bsc#1226786).
  * CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in
    multiq_tune() (bsc#1226514).
  * CVE-2024-36917: block: fix overflow in blk_ioctl_discard() (bsc#1225770).
  * CVE-2024-38627: stm class: Fix a double free in stm_register_device()
    (bsc#1226857).
  * CVE-2024-38603: drivers/perf: hisi: hns3: Actually use
    devm_add_action_or_reset() (bsc#1226842).
  * CVE-2024-38553: net: fec: remove .ndo_poll_controller to avoid deadlock
    (bsc#1226744).
  * CVE-2024-38555: net/mlx5: Discard command completions in internal error
    (bsc#1226607).
  * CVE-2024-38556: net/mlx5: Add a timeout to acquire the command queue
    semaphore (bsc#1226774).
  * CVE-2024-38557: net/mlx5: Reload only IB representors upon lag
    disable/enable (bsc#1226781).
  * CVE-2024-38608: net/mlx5e: Fix netif state handling (bsc#1226746).
  * CVE-2024-38597: eth: sungem: remove .ndo_poll_controller to avoid deadlocks
    (bsc#1226749).
  * CVE-2024-38594: net: stmmac: move the EST lock to struct stmmac_priv
    (bsc#1226734).
  * CVE-2024-38569: drivers/perf: hisi_pcie: Fix out-of-bound access when valid
    event group (bsc#1226772).
  * CVE-2024-38568: drivers/perf: hisi: hns3: Fix out-of-bound access when valid
    event group (bsc#1226771).
  * CVE-2024-26814: vfio/fsl-mc: Block calling interrupt handler without trigger
    (bsc#1222810).
  * CVE-2024-26813: vfio/platform: Create persistent IRQ handlers (bsc#1222809).
  * CVE-2024-36945: net/smc: fix neighbour and rtable leak in
    smc_ib_find_route() (bsc#1225823).
  * CVE-2024-36923: fs/9p: fix uninitialized values during inode evict
    (bsc#1225815).
  * CVE-2024-36971: net: fix __dst_negative_advice() race (bsc#1226145).
  * CVE-2024-27414: rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back
    (bsc#1224439).
  * CVE-2024-35886: ipv6: Fix infinite recursion in fib6_dump_done()
    (bsc#1224670).
  * CVE-2024-36024: drm/amd/display: Disable idle reallow as part of
    command/gpint execution (bsc#1225702).
  * CVE-2024-36903: ipv6: Fix potential uninit-value access in __ip6_make_skb()
    (bsc#1225741).
  * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
    (bsc#1225737).
  * CVE-2024-35979: raid1: fix use-after-free for original bio in
    raid1_write_request() (bsc#1224572).
  * CVE-2024-35807: ext4: fix corruption during on-line resize (bsc#1224735).
  * CVE-2023-52622: ext4: avoid online resizing failures due to oversized flex
    bg (bsc#1222080).
  * CVE-2023-52843: llc: verify mac len before reading mac header (bsc#1224951).
  * CVE-2024-35898: netfilter: nf_tables: Fix potential data-race in
    __nft_flowtable_type_get() (bsc#1224498).
  * CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies
    (bsc#1225758).
  * CVE-2024-36882: mm: use memalloc_nofs_save() in page_cache_ra_order()
    (bsc#1225723).
  * CVE-2024-36916: blk-iocost: avoid out of bounds shift (bsc#1225759).
  * CVE-2024-36900: net: hns3: fix kernel crash when devlink reload during
    initialization (bsc#1225726).
  * CVE-2023-52787: blk-mq: make sure active queue usage is held for
    bio_integrity_prep() (bsc#1225105).
  * CVE-2024-35925: block: prevent division by zero in blk_rq_stat_sum()
    (bsc#1224661).
  * CVE-2023-52837: nbd: fix uaf in nbd_open (bsc#1224935).
  * CVE-2023-52786: ext4: fix racy may inline data check in dio write
    (bsc#1224939).
  * CVE-2024-36934: bna: ensure the copied buf is NUL terminated (bsc#1225760).
  * CVE-2024-36935: ice: ensure the copied buf is NUL terminated (bsc#1225763).
  * CVE-2024-36937: xdp: use flags field to disambiguate broadcast redirect
    (bsc#1225834).
  * CVE-2023-52672: pipe: wakeup wr_wait after setting max_usage (bsc#1224614).
  * CVE-2023-52845: tipc: Change nla_policy for bearer-related names to
    NLA_NUL_STRING (bsc#1225585).
  * CVE-2024-36005: netfilter: nf_tables: honor table dormant flag from netdev
    release event path (bsc#1224539).
  * CVE-2024-26845: scsi: target: core: Add TMF to tmr_list handling
    (bsc#1223018).
  * CVE-2024-35892: net/sched: fix lockdep splat in qdisc_tree_reduce_backlog()
    (bsc#1224515).
  * CVE-2024-35848: eeprom: at24: fix memory corruption race condition
    (bsc#1224612).
  * CVE-2024-35884: udp: do not accept non-tunnel GSO skbs landing in a tunnel
    (bsc#1224520).
  * CVE-2024-35857: icmp: prevent possible NULL dereferences from
    icmp_build_probe() (bsc#1224619).
  * CVE-2023-52735: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call
    itself (bsc#1225475).
  * CVE-2024-35926: crypto: iaa - Fix async_disable descriptor leak
    (bsc#1224655).
  * CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING
    (bsc#1224575).
  * CVE-2024-36938: Fixed NULL pointer dereference in
    sk_psock_skb_ingress_enqueue (bsc#1225761).
  * CVE-2024-36008: ipv4: check for NULL idev in ip_route_use_hint()
    (bsc#1224540).
  * CVE-2024-35998: Fixed lock ordering potential deadlock in
    cifs_sync_mid_result (bsc#1224549).
  * CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548).
  * CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759)
  * CVE-2024-36957: octeontx2-af: avoid off-by-one read from userspace
    (bsc#1225762).
  * CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
  * CVE-2024-35880: io_uring/kbuf: hold io_buffer_list reference over mmap
    (bsc#1224523).
  * CVE-2024-35831: io_uring: Fix release of pinned pages when __io_uaddr_map
    fails (bsc#1224698).
  * CVE-2024-35827: io_uring/net: fix overflow check in io_recvmsg_mshot_prep()
    (bsc#1224606).
  * CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187).
  * CVE-2023-52699: sysv: don't call sb_bread() with pointers_lock held
    (bsc#1224659).

The following non-security bugs were fixed:

  * KVM: arm64: Use local TLBI on permission relaxation (bsc#1219478).
  * KVM: x86/pmu: Prioritize VMX interception over #GP on RDPMC due to bad index
    (bsc#1226158).
  * NFS: abort nfs_atomic_open_v23 if name is too long (bsc#1219847).
  * NFS: add atomic_open for NFSv3 to handle O_TRUNC correctly (bsc#1219847).
  * NFS: avoid infinite loop in pnfs_update_layout (bsc#1219633 bsc#1226226).
  * PCI: Clear Secondary Status errors after enumeration (bsc#1226928)
  * RAS/AMD/ATL: Fix MI300 bank hash (bsc#1225300).
  * RAS/AMD/ATL: Use system settings for MI300 DRAM to normalized address
    translation (bsc#1225300).
  * Revert "build initrd without systemd" (bsc#1195775)"
  * arm64: mm: Batch dsb and isb when populating pgtables (jsc#PED-8688).
  * arm64: mm: Do not remap pgtables for allocate vs populate (jsc#PED-8688).
  * arm64: mm: Do not remap pgtables per-cont(pte|pmd) block (jsc#PED-8688).
  * bpf: check bpf_func_state->callback_depth when pruning states (bsc#1225903).
  * bpf: correct loop detection for iterators convergence (bsc#1225903).
  * bpf: exact states comparison for iterator convergence checks (bsc#1225903).
  * bpf: extract __check_reg_arg() utility function (bsc#1225903).
  * bpf: extract same_callsites() as utility function (bsc#1225903).
  * bpf: extract setup_func_entry() utility function (bsc#1225903).
  * bpf: keep track of max number of bpf_loop callback iterations (bsc#1225903).
  * bpf: move explored_state() closer to the beginning of verifier.c
    (bsc#1225903).
  * bpf: print full verifier states on infinite loop detection (bsc#1225903).
  * bpf: verify callbacks as if they are called unknown number of times
    (bsc#1225903).
  * bpf: widening for callback iterators (bsc#1225903).
  * cachefiles: remove requests from xarray during flushing requests
    (bsc#1226588).
  * ceph: add ceph_cap_unlink_work to fire check_caps() immediately
    (bsc#1226022).
  * ceph: always check dir caps asynchronously (bsc#1226022).
  * ceph: always queue a writeback when revoking the Fb caps (bsc#1226022).
  * ceph: break the check delayed cap loop every 5s (bsc#1226022).
  * ceph: switch to use cap_delay_lock for the unlink delay list (bsc#1226022).
  * crypto: deflate - Add aliases to deflate (bsc#1227190).
  * crypto: iaa - Account for cpu-less numa nodes (bsc#1227190).
  * ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958)
  * kABI: bpf: verifier kABI workaround (bsc#1225903).
  * net: ena: Fix redundant device NUMA node override (jsc#PED-8688).
  * net: mana: Enable MANA driver on ARM64 with 4K page size (jsc#PED-8491).
  * nfs: Avoid flushing many pages with NFS_FILE_SYNC (bsc#1218442).
  * nfs: Bump default write congestion size (bsc#1218442).
  * nfsd: optimise recalculate_deny_mode() for a common case (bsc#1217912).
  * nvme-fabrics: short-circuit reconnect retries (bsc#1186716).
  * nvme-tcp: Export the nvme_tcp_wq to sysfs (bsc#1224049).
  * nvme/tcp: Add wq_unbound modparam for nvme_tcp_wq (bsc#1224049).
  * nvme: do not retry authentication failures (bsc#1186716).
  * nvme: return kernel error codes for admin queue connect (bsc#1186716).
  * nvmet: lock config semaphore when accessing DH-HMAC-CHAP key (bsc#1186716).
  * nvmet: return DHCHAP status codes from nvmet_setup_auth() (bsc#1186716).
  * ocfs2: adjust enabling place for la window (bsc#1219224).
  * ocfs2: fix sparse warnings (bsc#1219224).
  * ocfs2: improve write IO performance when fragmentation is high
    (bsc#1219224).
  * ocfs2: speed up chain-list searching (bsc#1219224).
  * rpm/kernel-obs-build.spec.in: Add iso9660 (bsc#1226212).
  * rpm/kernel-obs-build.spec.in: Add networking modules for docker
    (bsc#1226211).
  * s390/cpacf: Make use of invalid opcode produce a link error (bsc#1227072).
  * sched/core: Fix incorrect initialization of the 'burst' parameter in
    cpu_max_write() (bsc#1226791).
  * selftests/bpf: test case for callback_depth states pruning logic
    (bsc#1225903).
  * selftests/bpf: test if state loops are detected in a tricky case
    (bsc#1225903).
  * selftests/bpf: test widening for iterating callbacks (bsc#1225903).
  * selftests/bpf: tests for iterating callbacks (bsc#1225903).
  * selftests/bpf: tests with delayed read/precision makrs in loop body
    (bsc#1225903).
  * selftests/bpf: track string payload offset as scalar in strobemeta
    (bsc#1225903).
  * selftests/bpf: track tcp payload offset as scalar in xdp_synproxy
    (bsc#1225903).
  * supported.conf: Add APM X-Gene SoC hardware monitoring driver (bsc#1223265
    jsc#PED-8570)
  * tcp: Dump bound-only sockets in inet_diag (bsc#1204562).
  * x86/mce: Dynamically size space for machine check records (bsc#1222241).
  * x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015
    bsc#1226962).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * openSUSE Leap 15.6  
    zypper in -t patch openSUSE-SLE-15.6-2024-2571=1 SUSE-2024-2571=1

  * Basesystem Module 15-SP6  
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2571=1

  * Development Tools Module 15-SP6  
    zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-2571=1

  * Legacy Module 15-SP6  
    zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-2571=1

  * SUSE Linux Enterprise Live Patching 15-SP6  
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-2571=1  
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.

  * SUSE Linux Enterprise High Availability Extension 15 SP6  
    zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-2571=1

  * SUSE Linux Enterprise Workstation Extension 15 SP6  
    zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-2571=1

## Package List:

  * openSUSE Leap 15.6 (noarch nosrc)
    * kernel-docs-6.4.0-150600.23.14.2
  * openSUSE Leap 15.6 (noarch)
    * kernel-source-vanilla-6.4.0-150600.23.14.2
    * kernel-devel-6.4.0-150600.23.14.2
    * kernel-source-6.4.0-150600.23.14.2
    * kernel-docs-html-6.4.0-150600.23.14.2
    * kernel-macros-6.4.0-150600.23.14.2
  * openSUSE Leap 15.6 (nosrc ppc64le x86_64)
    * kernel-debug-6.4.0-150600.23.14.2
  * openSUSE Leap 15.6 (ppc64le x86_64)
    * kernel-debug-debugsource-6.4.0-150600.23.14.2
    * kernel-debug-devel-6.4.0-150600.23.14.2
    * kernel-debug-livepatch-devel-6.4.0-150600.23.14.2
    * kernel-debug-devel-debuginfo-6.4.0-150600.23.14.2
    * kernel-debug-debuginfo-6.4.0-150600.23.14.2
  * openSUSE Leap 15.6 (x86_64)
    * kernel-debug-vdso-debuginfo-6.4.0-150600.23.14.2
    * kernel-debug-vdso-6.4.0-150600.23.14.2
    * kernel-kvmsmall-vdso-6.4.0-150600.23.14.2
    * kernel-default-vdso-debuginfo-6.4.0-150600.23.14.2
    * kernel-default-vdso-6.4.0-150600.23.14.2
    * kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.14.2
  * openSUSE Leap 15.6 (aarch64 ppc64le x86_64)
    * kernel-kvmsmall-debugsource-6.4.0-150600.23.14.2
    * kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.14.2
    * kernel-kvmsmall-debuginfo-6.4.0-150600.23.14.2
    * kernel-default-base-rebuild-6.4.0-150600.23.14.2.150600.12.4.3
    * kernel-default-base-6.4.0-150600.23.14.2.150600.12.4.3
    * kernel-kvmsmall-livepatch-devel-6.4.0-150600.23.14.2
    * kernel-kvmsmall-devel-6.4.0-150600.23.14.2
  * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
    * kernel-obs-build-debugsource-6.4.0-150600.23.14.2
    * ocfs2-kmp-default-debuginfo-6.4.0-150600.23.14.2
    * kernel-default-livepatch-6.4.0-150600.23.14.2
    * kernel-obs-build-6.4.0-150600.23.14.2
    * reiserfs-kmp-default-debuginfo-6.4.0-150600.23.14.2
    * kernel-syms-6.4.0-150600.23.14.2
    * kernel-default-extra-debuginfo-6.4.0-150600.23.14.2
    * ocfs2-kmp-default-6.4.0-150600.23.14.2
    * kernel-default-extra-6.4.0-150600.23.14.2
    * kernel-default-optional-debuginfo-6.4.0-150600.23.14.2
    * kernel-default-optional-6.4.0-150600.23.14.2
    * gfs2-kmp-default-6.4.0-150600.23.14.2
    * kselftests-kmp-default-debuginfo-6.4.0-150600.23.14.2
    * dlm-kmp-default-debuginfo-6.4.0-150600.23.14.2
    * kselftests-kmp-default-6.4.0-150600.23.14.2
    * reiserfs-kmp-default-6.4.0-150600.23.14.2
    * kernel-default-devel-6.4.0-150600.23.14.2
    * kernel-default-debuginfo-6.4.0-150600.23.14.2
    * kernel-default-devel-debuginfo-6.4.0-150600.23.14.2
    * kernel-default-livepatch-devel-6.4.0-150600.23.14.2
    * dlm-kmp-default-6.4.0-150600.23.14.2
    * kernel-default-debugsource-6.4.0-150600.23.14.2
    * gfs2-kmp-default-debuginfo-6.4.0-150600.23.14.2
    * cluster-md-kmp-default-debuginfo-6.4.0-150600.23.14.2
    * cluster-md-kmp-default-6.4.0-150600.23.14.2
    * kernel-obs-qa-6.4.0-150600.23.14.2
  * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc)
    * kernel-default-6.4.0-150600.23.14.2
  * openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64)
    * kernel-kvmsmall-6.4.0-150600.23.14.2
  * openSUSE Leap 15.6 (ppc64le s390x x86_64)
    * kernel-livepatch-6_4_0-150600_23_14-default-1-150600.13.3.2
    * kernel-livepatch-6_4_0-150600_23_14-default-debuginfo-1-150600.13.3.2
    * kernel-livepatch-SLE15-SP6_Update_2-debugsource-1-150600.13.3.2
  * openSUSE Leap 15.6 (nosrc s390x)
    * kernel-zfcpdump-6.4.0-150600.23.14.2
  * openSUSE Leap 15.6 (s390x)
    * kernel-zfcpdump-debuginfo-6.4.0-150600.23.14.2
    * kernel-zfcpdump-debugsource-6.4.0-150600.23.14.2
  * openSUSE Leap 15.6 (nosrc)
    * dtb-aarch64-6.4.0-150600.23.14.1
  * openSUSE Leap 15.6 (aarch64)
    * dlm-kmp-64kb-6.4.0-150600.23.14.1
    * kernel-64kb-devel-debuginfo-6.4.0-150600.23.14.1
    * dtb-cavium-6.4.0-150600.23.14.1
    * dtb-socionext-6.4.0-150600.23.14.1
    * dtb-hisilicon-6.4.0-150600.23.14.1
    * kernel-64kb-livepatch-devel-6.4.0-150600.23.14.1
    * kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.14.1
    * dtb-apple-6.4.0-150600.23.14.1
    * dlm-kmp-64kb-debuginfo-6.4.0-150600.23.14.1
    * kernel-64kb-debuginfo-6.4.0-150600.23.14.1
    * dtb-sprd-6.4.0-150600.23.14.1
    * dtb-broadcom-6.4.0-150600.23.14.1
    * kernel-64kb-devel-6.4.0-150600.23.14.1
    * kernel-64kb-extra-6.4.0-150600.23.14.1
    * reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.14.1
    * dtb-marvell-6.4.0-150600.23.14.1
    * gfs2-kmp-64kb-6.4.0-150600.23.14.1
    * ocfs2-kmp-64kb-6.4.0-150600.23.14.1
    * dtb-amlogic-6.4.0-150600.23.14.1
    * dtb-mediatek-6.4.0-150600.23.14.1
    * dtb-apm-6.4.0-150600.23.14.1
    * dtb-arm-6.4.0-150600.23.14.1
    * gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.14.1
    * dtb-freescale-6.4.0-150600.23.14.1
    * reiserfs-kmp-64kb-6.4.0-150600.23.14.1
    * kselftests-kmp-64kb-6.4.0-150600.23.14.1
    * kernel-64kb-debugsource-6.4.0-150600.23.14.1
    * dtb-qcom-6.4.0-150600.23.14.1
    * dtb-exynos-6.4.0-150600.23.14.1
    * dtb-xilinx-6.4.0-150600.23.14.1
    * kernel-64kb-optional-6.4.0-150600.23.14.1
    * dtb-renesas-6.4.0-150600.23.14.1
    * dtb-amazon-6.4.0-150600.23.14.1
    * cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.14.1
    * dtb-nvidia-6.4.0-150600.23.14.1
    * dtb-lg-6.4.0-150600.23.14.1
    * kernel-64kb-optional-debuginfo-6.4.0-150600.23.14.1
    * dtb-allwinner-6.4.0-150600.23.14.1
    * cluster-md-kmp-64kb-6.4.0-150600.23.14.1
    * kernel-64kb-extra-debuginfo-6.4.0-150600.23.14.1
    * dtb-altera-6.4.0-150600.23.14.1
    * ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.14.1
    * dtb-rockchip-6.4.0-150600.23.14.1
    * dtb-amd-6.4.0-150600.23.14.1
  * openSUSE Leap 15.6 (aarch64 nosrc)
    * kernel-64kb-6.4.0-150600.23.14.1
  * Basesystem Module 15-SP6 (aarch64 nosrc)
    * kernel-64kb-6.4.0-150600.23.14.1
  * Basesystem Module 15-SP6 (aarch64)
    * kernel-64kb-devel-debuginfo-6.4.0-150600.23.14.1
    * kernel-64kb-debuginfo-6.4.0-150600.23.14.1
    * kernel-64kb-devel-6.4.0-150600.23.14.1
    * kernel-64kb-debugsource-6.4.0-150600.23.14.1
  * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64 nosrc)
    * kernel-default-6.4.0-150600.23.14.2
  * Basesystem Module 15-SP6 (aarch64 ppc64le x86_64)
    * kernel-default-base-6.4.0-150600.23.14.2.150600.12.4.3
  * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
    * kernel-default-debugsource-6.4.0-150600.23.14.2
    * kernel-default-devel-6.4.0-150600.23.14.2
    * kernel-default-devel-debuginfo-6.4.0-150600.23.14.2
    * kernel-default-debuginfo-6.4.0-150600.23.14.2
  * Basesystem Module 15-SP6 (noarch)
    * kernel-devel-6.4.0-150600.23.14.2
    * kernel-macros-6.4.0-150600.23.14.2
  * Basesystem Module 15-SP6 (nosrc s390x)
    * kernel-zfcpdump-6.4.0-150600.23.14.2
  * Basesystem Module 15-SP6 (s390x)
    * kernel-zfcpdump-debuginfo-6.4.0-150600.23.14.2
    * kernel-zfcpdump-debugsource-6.4.0-150600.23.14.2
  * Development Tools Module 15-SP6 (noarch nosrc)
    * kernel-docs-6.4.0-150600.23.14.2
  * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
    * kernel-obs-build-debugsource-6.4.0-150600.23.14.2
    * kernel-syms-6.4.0-150600.23.14.2
    * kernel-obs-build-6.4.0-150600.23.14.2
  * Development Tools Module 15-SP6 (noarch)
    * kernel-source-6.4.0-150600.23.14.2
  * Legacy Module 15-SP6 (nosrc)
    * kernel-default-6.4.0-150600.23.14.2
  * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64)
    * kernel-default-debugsource-6.4.0-150600.23.14.2
    * reiserfs-kmp-default-debuginfo-6.4.0-150600.23.14.2
    * reiserfs-kmp-default-6.4.0-150600.23.14.2
    * kernel-default-debuginfo-6.4.0-150600.23.14.2
  * SUSE Linux Enterprise Live Patching 15-SP6 (nosrc)
    * kernel-default-6.4.0-150600.23.14.2
  * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
    * kernel-livepatch-6_4_0-150600_23_14-default-debuginfo-1-150600.13.3.2
    * kernel-livepatch-SLE15-SP6_Update_2-debugsource-1-150600.13.3.2
    * kernel-livepatch-6_4_0-150600_23_14-default-1-150600.13.3.2
    * kernel-default-debugsource-6.4.0-150600.23.14.2
    * kernel-default-livepatch-6.4.0-150600.23.14.2
    * kernel-default-debuginfo-6.4.0-150600.23.14.2
    * kernel-default-livepatch-devel-6.4.0-150600.23.14.2
  * SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le
    s390x x86_64)
    * gfs2-kmp-default-6.4.0-150600.23.14.2
    * dlm-kmp-default-6.4.0-150600.23.14.2
    * ocfs2-kmp-default-debuginfo-6.4.0-150600.23.14.2
    * dlm-kmp-default-debuginfo-6.4.0-150600.23.14.2
    * ocfs2-kmp-default-6.4.0-150600.23.14.2
    * kernel-default-debugsource-6.4.0-150600.23.14.2
    * gfs2-kmp-default-debuginfo-6.4.0-150600.23.14.2
    * cluster-md-kmp-default-debuginfo-6.4.0-150600.23.14.2
    * kernel-default-debuginfo-6.4.0-150600.23.14.2
    * cluster-md-kmp-default-6.4.0-150600.23.14.2
  * SUSE Linux Enterprise High Availability Extension 15 SP6 (nosrc)
    * kernel-default-6.4.0-150600.23.14.2
  * SUSE Linux Enterprise Workstation Extension 15 SP6 (nosrc)
    * kernel-default-6.4.0-150600.23.14.2
  * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
    * kernel-default-extra-6.4.0-150600.23.14.2
    * kernel-default-extra-debuginfo-6.4.0-150600.23.14.2
    * kernel-default-debugsource-6.4.0-150600.23.14.2
    * kernel-default-debuginfo-6.4.0-150600.23.14.2

## References:

  * https://www.suse.com/security/cve/CVE-2021-47432.html
  * https://www.suse.com/security/cve/CVE-2022-48772.html
  * https://www.suse.com/security/cve/CVE-2023-52622.html
  * https://www.suse.com/security/cve/CVE-2023-52656.html
  * https://www.suse.com/security/cve/CVE-2023-52672.html
  * https://www.suse.com/security/cve/CVE-2023-52699.html
  * https://www.suse.com/security/cve/CVE-2023-52735.html
  * https://www.suse.com/security/cve/CVE-2023-52749.html
  * https://www.suse.com/security/cve/CVE-2023-52750.html
  * https://www.suse.com/security/cve/CVE-2023-52753.html
  * https://www.suse.com/security/cve/CVE-2023-52754.html
  * https://www.suse.com/security/cve/CVE-2023-52757.html
  * https://www.suse.com/security/cve/CVE-2023-52759.html
  * https://www.suse.com/security/cve/CVE-2023-52762.html
  * https://www.suse.com/security/cve/CVE-2023-52763.html
  * https://www.suse.com/security/cve/CVE-2023-52764.html
  * https://www.suse.com/security/cve/CVE-2023-52765.html
  * https://www.suse.com/security/cve/CVE-2023-52766.html
  * https://www.suse.com/security/cve/CVE-2023-52767.html
  * https://www.suse.com/security/cve/CVE-2023-52768.html
  * https://www.suse.com/security/cve/CVE-2023-52769.html
  * https://www.suse.com/security/cve/CVE-2023-52773.html
  * https://www.suse.com/security/cve/CVE-2023-52774.html
  * https://www.suse.com/security/cve/CVE-2023-52776.html
  * https://www.suse.com/security/cve/CVE-2023-52777.html
  * https://www.suse.com/security/cve/CVE-2023-52780.html
  * https://www.suse.com/security/cve/CVE-2023-52781.html
  * https://www.suse.com/security/cve/CVE-2023-52782.html
  * https://www.suse.com/security/cve/CVE-2023-52783.html
  * https://www.suse.com/security/cve/CVE-2023-52784.html
  * https://www.suse.com/security/cve/CVE-2023-52786.html
  * https://www.suse.com/security/cve/CVE-2023-52787.html
  * https://www.suse.com/security/cve/CVE-2023-52788.html
  * https://www.suse.com/security/cve/CVE-2023-52789.html
  * https://www.suse.com/security/cve/CVE-2023-52791.html
  * https://www.suse.com/security/cve/CVE-2023-52792.html
  * https://www.suse.com/security/cve/CVE-2023-52794.html
  * https://www.suse.com/security/cve/CVE-2023-52795.html
  * https://www.suse.com/security/cve/CVE-2023-52796.html
  * https://www.suse.com/security/cve/CVE-2023-52798.html
  * https://www.suse.com/security/cve/CVE-2023-52799.html
  * https://www.suse.com/security/cve/CVE-2023-52800.html
  * https://www.suse.com/security/cve/CVE-2023-52801.html
  * https://www.suse.com/security/cve/CVE-2023-52803.html
  * https://www.suse.com/security/cve/CVE-2023-52804.html
  * https://www.suse.com/security/cve/CVE-2023-52805.html
  * https://www.suse.com/security/cve/CVE-2023-52806.html
  * https://www.suse.com/security/cve/CVE-2023-52807.html
  * https://www.suse.com/security/cve/CVE-2023-52808.html
  * https://www.suse.com/security/cve/CVE-2023-52809.html
  * https://www.suse.com/security/cve/CVE-2023-52810.html
  * https://www.suse.com/security/cve/CVE-2023-52811.html
  * https://www.suse.com/security/cve/CVE-2023-52812.html
  * https://www.suse.com/security/cve/CVE-2023-52813.html
  * https://www.suse.com/security/cve/CVE-2023-52814.html
  * https://www.suse.com/security/cve/CVE-2023-52815.html
  * https://www.suse.com/security/cve/CVE-2023-52816.html
  * https://www.suse.com/security/cve/CVE-2023-52817.html
  * https://www.suse.com/security/cve/CVE-2023-52818.html
  * https://www.suse.com/security/cve/CVE-2023-52819.html
  * https://www.suse.com/security/cve/CVE-2023-52821.html
  * https://www.suse.com/security/cve/CVE-2023-52825.html
  * https://www.suse.com/security/cve/CVE-2023-52826.html
  * https://www.suse.com/security/cve/CVE-2023-52827.html
  * https://www.suse.com/security/cve/CVE-2023-52829.html
  * https://www.suse.com/security/cve/CVE-2023-52832.html
  * https://www.suse.com/security/cve/CVE-2023-52833.html
  * https://www.suse.com/security/cve/CVE-2023-52834.html
  * https://www.suse.com/security/cve/CVE-2023-52835.html
  * https://www.suse.com/security/cve/CVE-2023-52836.html
  * https://www.suse.com/security/cve/CVE-2023-52837.html
  * https://www.suse.com/security/cve/CVE-2023-52838.html
  * https://www.suse.com/security/cve/CVE-2023-52840.html
  * https://www.suse.com/security/cve/CVE-2023-52841.html
  * https://www.suse.com/security/cve/CVE-2023-52842.html
  * https://www.suse.com/security/cve/CVE-2023-52843.html
  * https://www.suse.com/security/cve/CVE-2023-52844.html
  * https://www.suse.com/security/cve/CVE-2023-52845.html
  * https://www.suse.com/security/cve/CVE-2023-52846.html
  * https://www.suse.com/security/cve/CVE-2023-52847.html
  * https://www.suse.com/security/cve/CVE-2023-52849.html
  * https://www.suse.com/security/cve/CVE-2023-52850.html
  * https://www.suse.com/security/cve/CVE-2023-52851.html
  * https://www.suse.com/security/cve/CVE-2023-52853.html
  * https://www.suse.com/security/cve/CVE-2023-52854.html
  * https://www.suse.com/security/cve/CVE-2023-52855.html
  * https://www.suse.com/security/cve/CVE-2023-52856.html
  * https://www.suse.com/security/cve/CVE-2023-52857.html
  * https://www.suse.com/security/cve/CVE-2023-52858.html
  * https://www.suse.com/security/cve/CVE-2023-52861.html
  * https://www.suse.com/security/cve/CVE-2023-52862.html
  * https://www.suse.com/security/cve/CVE-2023-52863.html
  * https://www.suse.com/security/cve/CVE-2023-52864.html
  * https://www.suse.com/security/cve/CVE-2023-52865.html
  * https://www.suse.com/security/cve/CVE-2023-52866.html
  * https://www.suse.com/security/cve/CVE-2023-52867.html
  * https://www.suse.com/security/cve/CVE-2023-52868.html
  * https://www.suse.com/security/cve/CVE-2023-52869.html
  * https://www.suse.com/security/cve/CVE-2023-52870.html
  * https://www.suse.com/security/cve/CVE-2023-52871.html
  * https://www.suse.com/security/cve/CVE-2023-52872.html
  * https://www.suse.com/security/cve/CVE-2023-52873.html
  * https://www.suse.com/security/cve/CVE-2023-52874.html
  * https://www.suse.com/security/cve/CVE-2023-52875.html
  * https://www.suse.com/security/cve/CVE-2023-52876.html
  * https://www.suse.com/security/cve/CVE-2023-52877.html
  * https://www.suse.com/security/cve/CVE-2023-52878.html
  * https://www.suse.com/security/cve/CVE-2023-52879.html
  * https://www.suse.com/security/cve/CVE-2023-52880.html
  * https://www.suse.com/security/cve/CVE-2023-52881.html
  * https://www.suse.com/security/cve/CVE-2023-52883.html
  * https://www.suse.com/security/cve/CVE-2023-52884.html
  * https://www.suse.com/security/cve/CVE-2024-26482.html
  * https://www.suse.com/security/cve/CVE-2024-26625.html
  * https://www.suse.com/security/cve/CVE-2024-26676.html
  * https://www.suse.com/security/cve/CVE-2024-26750.html
  * https://www.suse.com/security/cve/CVE-2024-26758.html
  * https://www.suse.com/security/cve/CVE-2024-26767.html
  * https://www.suse.com/security/cve/CVE-2024-26780.html
  * https://www.suse.com/security/cve/CVE-2024-26813.html
  * https://www.suse.com/security/cve/CVE-2024-26814.html
  * https://www.suse.com/security/cve/CVE-2024-26845.html
  * https://www.suse.com/security/cve/CVE-2024-26889.html
  * https://www.suse.com/security/cve/CVE-2024-26920.html
  * https://www.suse.com/security/cve/CVE-2024-27414.html
  * https://www.suse.com/security/cve/CVE-2024-27419.html
  * https://www.suse.com/security/cve/CVE-2024-33619.html
  * https://www.suse.com/security/cve/CVE-2024-34777.html
  * https://www.suse.com/security/cve/CVE-2024-35247.html
  * https://www.suse.com/security/cve/CVE-2024-35807.html
  * https://www.suse.com/security/cve/CVE-2024-35827.html
  * https://www.suse.com/security/cve/CVE-2024-35831.html
  * https://www.suse.com/security/cve/CVE-2024-35843.html
  * https://www.suse.com/security/cve/CVE-2024-35848.html
  * https://www.suse.com/security/cve/CVE-2024-35857.html
  * https://www.suse.com/security/cve/CVE-2024-35880.html
  * https://www.suse.com/security/cve/CVE-2024-35884.html
  * https://www.suse.com/security/cve/CVE-2024-35886.html
  * https://www.suse.com/security/cve/CVE-2024-35892.html
  * https://www.suse.com/security/cve/CVE-2024-35896.html
  * https://www.suse.com/security/cve/CVE-2024-35898.html
  * https://www.suse.com/security/cve/CVE-2024-35900.html
  * https://www.suse.com/security/cve/CVE-2024-35925.html
  * https://www.suse.com/security/cve/CVE-2024-35926.html
  * https://www.suse.com/security/cve/CVE-2024-35957.html
  * https://www.suse.com/security/cve/CVE-2024-35962.html
  * https://www.suse.com/security/cve/CVE-2024-35970.html
  * https://www.suse.com/security/cve/CVE-2024-35976.html
  * https://www.suse.com/security/cve/CVE-2024-35979.html
  * https://www.suse.com/security/cve/CVE-2024-35998.html
  * https://www.suse.com/security/cve/CVE-2024-36005.html
  * https://www.suse.com/security/cve/CVE-2024-36008.html
  * https://www.suse.com/security/cve/CVE-2024-36010.html
  * https://www.suse.com/security/cve/CVE-2024-36017.html
  * https://www.suse.com/security/cve/CVE-2024-36024.html
  * https://www.suse.com/security/cve/CVE-2024-36281.html
  * https://www.suse.com/security/cve/CVE-2024-36477.html
  * https://www.suse.com/security/cve/CVE-2024-36478.html
  * https://www.suse.com/security/cve/CVE-2024-36479.html
  * https://www.suse.com/security/cve/CVE-2024-36882.html
  * https://www.suse.com/security/cve/CVE-2024-36887.html
  * https://www.suse.com/security/cve/CVE-2024-36899.html
  * https://www.suse.com/security/cve/CVE-2024-36900.html
  * https://www.suse.com/security/cve/CVE-2024-36903.html
  * https://www.suse.com/security/cve/CVE-2024-36904.html
  * https://www.suse.com/security/cve/CVE-2024-36915.html
  * https://www.suse.com/security/cve/CVE-2024-36916.html
  * https://www.suse.com/security/cve/CVE-2024-36917.html
  * https://www.suse.com/security/cve/CVE-2024-36919.html
  * https://www.suse.com/security/cve/CVE-2024-36923.html
  * https://www.suse.com/security/cve/CVE-2024-36924.html
  * https://www.suse.com/security/cve/CVE-2024-36926.html
  * https://www.suse.com/security/cve/CVE-2024-36934.html
  * https://www.suse.com/security/cve/CVE-2024-36935.html
  * https://www.suse.com/security/cve/CVE-2024-36937.html
  * https://www.suse.com/security/cve/CVE-2024-36938.html
  * https://www.suse.com/security/cve/CVE-2024-36945.html
  * https://www.suse.com/security/cve/CVE-2024-36952.html
  * https://www.suse.com/security/cve/CVE-2024-36957.html
  * https://www.suse.com/security/cve/CVE-2024-36960.html
  * https://www.suse.com/security/cve/CVE-2024-36962.html
  * https://www.suse.com/security/cve/CVE-2024-36964.html
  * https://www.suse.com/security/cve/CVE-2024-36965.html
  * https://www.suse.com/security/cve/CVE-2024-36967.html
  * https://www.suse.com/security/cve/CVE-2024-36969.html
  * https://www.suse.com/security/cve/CVE-2024-36971.html
  * https://www.suse.com/security/cve/CVE-2024-36972.html
  * https://www.suse.com/security/cve/CVE-2024-36973.html
  * https://www.suse.com/security/cve/CVE-2024-36975.html
  * https://www.suse.com/security/cve/CVE-2024-36977.html
  * https://www.suse.com/security/cve/CVE-2024-36978.html
  * https://www.suse.com/security/cve/CVE-2024-37021.html
  * https://www.suse.com/security/cve/CVE-2024-37078.html
  * https://www.suse.com/security/cve/CVE-2024-37353.html
  * https://www.suse.com/security/cve/CVE-2024-37354.html
  * https://www.suse.com/security/cve/CVE-2024-38381.html
  * https://www.suse.com/security/cve/CVE-2024-38384.html
  * https://www.suse.com/security/cve/CVE-2024-38385.html
  * https://www.suse.com/security/cve/CVE-2024-38388.html
  * https://www.suse.com/security/cve/CVE-2024-38390.html
  * https://www.suse.com/security/cve/CVE-2024-38391.html
  * https://www.suse.com/security/cve/CVE-2024-38539.html
  * https://www.suse.com/security/cve/CVE-2024-38540.html
  * https://www.suse.com/security/cve/CVE-2024-38541.html
  * https://www.suse.com/security/cve/CVE-2024-38543.html
  * https://www.suse.com/security/cve/CVE-2024-38544.html
  * https://www.suse.com/security/cve/CVE-2024-38545.html
  * https://www.suse.com/security/cve/CVE-2024-38546.html
  * https://www.suse.com/security/cve/CVE-2024-38547.html
  * https://www.suse.com/security/cve/CVE-2024-38548.html
  * https://www.suse.com/security/cve/CVE-2024-38549.html
  * https://www.suse.com/security/cve/CVE-2024-38550.html
  * https://www.suse.com/security/cve/CVE-2024-38551.html
  * https://www.suse.com/security/cve/CVE-2024-38552.html
  * https://www.suse.com/security/cve/CVE-2024-38553.html
  * https://www.suse.com/security/cve/CVE-2024-38554.html
  * https://www.suse.com/security/cve/CVE-2024-38555.html
  * https://www.suse.com/security/cve/CVE-2024-38556.html
  * https://www.suse.com/security/cve/CVE-2024-38557.html
  * https://www.suse.com/security/cve/CVE-2024-38559.html
  * https://www.suse.com/security/cve/CVE-2024-38560.html
  * https://www.suse.com/security/cve/CVE-2024-38562.html
  * https://www.suse.com/security/cve/CVE-2024-38564.html
  * https://www.suse.com/security/cve/CVE-2024-38565.html
  * https://www.suse.com/security/cve/CVE-2024-38566.html
  * https://www.suse.com/security/cve/CVE-2024-38567.html
  * https://www.suse.com/security/cve/CVE-2024-38568.html
  * https://www.suse.com/security/cve/CVE-2024-38569.html
  * https://www.suse.com/security/cve/CVE-2024-38570.html
  * https://www.suse.com/security/cve/CVE-2024-38571.html
  * https://www.suse.com/security/cve/CVE-2024-38572.html
  * https://www.suse.com/security/cve/CVE-2024-38573.html
  * https://www.suse.com/security/cve/CVE-2024-38575.html
  * https://www.suse.com/security/cve/CVE-2024-38578.html
  * https://www.suse.com/security/cve/CVE-2024-38579.html
  * https://www.suse.com/security/cve/CVE-2024-38580.html
  * https://www.suse.com/security/cve/CVE-2024-38581.html
  * https://www.suse.com/security/cve/CVE-2024-38582.html
  * https://www.suse.com/security/cve/CVE-2024-38583.html
  * https://www.suse.com/security/cve/CVE-2024-38587.html
  * https://www.suse.com/security/cve/CVE-2024-38588.html
  * https://www.suse.com/security/cve/CVE-2024-38590.html
  * https://www.suse.com/security/cve/CVE-2024-38591.html
  * https://www.suse.com/security/cve/CVE-2024-38592.html
  * https://www.suse.com/security/cve/CVE-2024-38594.html
  * https://www.suse.com/security/cve/CVE-2024-38595.html
  * https://www.suse.com/security/cve/CVE-2024-38597.html
  * https://www.suse.com/security/cve/CVE-2024-38599.html
  * https://www.suse.com/security/cve/CVE-2024-38600.html
  * https://www.suse.com/security/cve/CVE-2024-38601.html
  * https://www.suse.com/security/cve/CVE-2024-38602.html
  * https://www.suse.com/security/cve/CVE-2024-38603.html
  * https://www.suse.com/security/cve/CVE-2024-38605.html
  * https://www.suse.com/security/cve/CVE-2024-38608.html
  * https://www.suse.com/security/cve/CVE-2024-38610.html
  * https://www.suse.com/security/cve/CVE-2024-38611.html
  * https://www.suse.com/security/cve/CVE-2024-38615.html
  * https://www.suse.com/security/cve/CVE-2024-38616.html
  * https://www.suse.com/security/cve/CVE-2024-38617.html
  * https://www.suse.com/security/cve/CVE-2024-38618.html
  * https://www.suse.com/security/cve/CVE-2024-38619.html
  * https://www.suse.com/security/cve/CVE-2024-38621.html
  * https://www.suse.com/security/cve/CVE-2024-38622.html
  * https://www.suse.com/security/cve/CVE-2024-38627.html
  * https://www.suse.com/security/cve/CVE-2024-38628.html
  * https://www.suse.com/security/cve/CVE-2024-38629.html
  * https://www.suse.com/security/cve/CVE-2024-38630.html
  * https://www.suse.com/security/cve/CVE-2024-38633.html
  * https://www.suse.com/security/cve/CVE-2024-38634.html
  * https://www.suse.com/security/cve/CVE-2024-38635.html
  * https://www.suse.com/security/cve/CVE-2024-38636.html
  * https://www.suse.com/security/cve/CVE-2024-38661.html
  * https://www.suse.com/security/cve/CVE-2024-38663.html
  * https://www.suse.com/security/cve/CVE-2024-38664.html
  * https://www.suse.com/security/cve/CVE-2024-38780.html
  * https://www.suse.com/security/cve/CVE-2024-39277.html
  * https://www.suse.com/security/cve/CVE-2024-39291.html
  * https://www.suse.com/security/cve/CVE-2024-39296.html
  * https://www.suse.com/security/cve/CVE-2024-39301.html
  * https://www.suse.com/security/cve/CVE-2024-39362.html
  * https://www.suse.com/security/cve/CVE-2024-39371.html
  * https://www.suse.com/security/cve/CVE-2024-39463.html
  * https://www.suse.com/security/cve/CVE-2024-39466.html
  * https://www.suse.com/security/cve/CVE-2024-39469.html
  * https://www.suse.com/security/cve/CVE-2024-39471.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1186716
  * https://bugzilla.suse.com/show_bug.cgi?id=1195775
  * https://bugzilla.suse.com/show_bug.cgi?id=1204562
  * https://bugzilla.suse.com/show_bug.cgi?id=1209834
  * https://bugzilla.suse.com/show_bug.cgi?id=1217481
  * https://bugzilla.suse.com/show_bug.cgi?id=1217912
  * https://bugzilla.suse.com/show_bug.cgi?id=1218442
  * https://bugzilla.suse.com/show_bug.cgi?id=1219224
  * https://bugzilla.suse.com/show_bug.cgi?id=1219478
  * https://bugzilla.suse.com/show_bug.cgi?id=1219596
  * https://bugzilla.suse.com/show_bug.cgi?id=1219633
  * https://bugzilla.suse.com/show_bug.cgi?id=1219847
  * https://bugzilla.suse.com/show_bug.cgi?id=1219953
  * https://bugzilla.suse.com/show_bug.cgi?id=1221086
  * https://bugzilla.suse.com/show_bug.cgi?id=1221777
  * https://bugzilla.suse.com/show_bug.cgi?id=1221958
  * https://bugzilla.suse.com/show_bug.cgi?id=1222011
  * https://bugzilla.suse.com/show_bug.cgi?id=1222015
  * https://bugzilla.suse.com/show_bug.cgi?id=1222080
  * https://bugzilla.suse.com/show_bug.cgi?id=1222241
  * https://bugzilla.suse.com/show_bug.cgi?id=1222380
  * https://bugzilla.suse.com/show_bug.cgi?id=1222588
  * https://bugzilla.suse.com/show_bug.cgi?id=1222617
  * https://bugzilla.suse.com/show_bug.cgi?id=1222619
  * https://bugzilla.suse.com/show_bug.cgi?id=1222809
  * https://bugzilla.suse.com/show_bug.cgi?id=1222810
  * https://bugzilla.suse.com/show_bug.cgi?id=1223018
  * https://bugzilla.suse.com/show_bug.cgi?id=1223265
  * https://bugzilla.suse.com/show_bug.cgi?id=1224049
  * https://bugzilla.suse.com/show_bug.cgi?id=1224187
  * https://bugzilla.suse.com/show_bug.cgi?id=1224439
  * https://bugzilla.suse.com/show_bug.cgi?id=1224497
  * https://bugzilla.suse.com/show_bug.cgi?id=1224498
  * https://bugzilla.suse.com/show_bug.cgi?id=1224515
  * https://bugzilla.suse.com/show_bug.cgi?id=1224520
  * https://bugzilla.suse.com/show_bug.cgi?id=1224523
  * https://bugzilla.suse.com/show_bug.cgi?id=1224539
  * https://bugzilla.suse.com/show_bug.cgi?id=1224540
  * https://bugzilla.suse.com/show_bug.cgi?id=1224549
  * https://bugzilla.suse.com/show_bug.cgi?id=1224572
  * https://bugzilla.suse.com/show_bug.cgi?id=1224575
  * https://bugzilla.suse.com/show_bug.cgi?id=1224583
  * https://bugzilla.suse.com/show_bug.cgi?id=1224584
  * https://bugzilla.suse.com/show_bug.cgi?id=1224606
  * https://bugzilla.suse.com/show_bug.cgi?id=1224612
  * https://bugzilla.suse.com/show_bug.cgi?id=1224614
  * https://bugzilla.suse.com/show_bug.cgi?id=1224619
  * https://bugzilla.suse.com/show_bug.cgi?id=1224655
  * https://bugzilla.suse.com/show_bug.cgi?id=1224659
  * https://bugzilla.suse.com/show_bug.cgi?id=1224661
  * https://bugzilla.suse.com/show_bug.cgi?id=1224662
  * https://bugzilla.suse.com/show_bug.cgi?id=1224670
  * https://bugzilla.suse.com/show_bug.cgi?id=1224673
  * https://bugzilla.suse.com/show_bug.cgi?id=1224698
  * https://bugzilla.suse.com/show_bug.cgi?id=1224735
  * https://bugzilla.suse.com/show_bug.cgi?id=1224751
  * https://bugzilla.suse.com/show_bug.cgi?id=1224759
  * https://bugzilla.suse.com/show_bug.cgi?id=1224928
  * https://bugzilla.suse.com/show_bug.cgi?id=1224930
  * https://bugzilla.suse.com/show_bug.cgi?id=1224932
  * https://bugzilla.suse.com/show_bug.cgi?id=1224933
  * https://bugzilla.suse.com/show_bug.cgi?id=1224935
  * https://bugzilla.suse.com/show_bug.cgi?id=1224937
  * https://bugzilla.suse.com/show_bug.cgi?id=1224939
  * https://bugzilla.suse.com/show_bug.cgi?id=1224941
  * https://bugzilla.suse.com/show_bug.cgi?id=1224944
  * https://bugzilla.suse.com/show_bug.cgi?id=1224946
  * https://bugzilla.suse.com/show_bug.cgi?id=1224947
  * https://bugzilla.suse.com/show_bug.cgi?id=1224949
  * https://bugzilla.suse.com/show_bug.cgi?id=1224951
  * https://bugzilla.suse.com/show_bug.cgi?id=1224988
  * https://bugzilla.suse.com/show_bug.cgi?id=1224992
  * https://bugzilla.suse.com/show_bug.cgi?id=1224998
  * https://bugzilla.suse.com/show_bug.cgi?id=1225000
  * https://bugzilla.suse.com/show_bug.cgi?id=1225001
  * https://bugzilla.suse.com/show_bug.cgi?id=1225004
  * https://bugzilla.suse.com/show_bug.cgi?id=1225006
  * https://bugzilla.suse.com/show_bug.cgi?id=1225008
  * https://bugzilla.suse.com/show_bug.cgi?id=1225009
  * https://bugzilla.suse.com/show_bug.cgi?id=1225014
  * https://bugzilla.suse.com/show_bug.cgi?id=1225015
  * https://bugzilla.suse.com/show_bug.cgi?id=1225022
  * https://bugzilla.suse.com/show_bug.cgi?id=1225025
  * https://bugzilla.suse.com/show_bug.cgi?id=1225028
  * https://bugzilla.suse.com/show_bug.cgi?id=1225029
  * https://bugzilla.suse.com/show_bug.cgi?id=1225031
  * https://bugzilla.suse.com/show_bug.cgi?id=1225036
  * https://bugzilla.suse.com/show_bug.cgi?id=1225041
  * https://bugzilla.suse.com/show_bug.cgi?id=1225044
  * https://bugzilla.suse.com/show_bug.cgi?id=1225049
  * https://bugzilla.suse.com/show_bug.cgi?id=1225050
  * https://bugzilla.suse.com/show_bug.cgi?id=1225076
  * https://bugzilla.suse.com/show_bug.cgi?id=1225077
  * https://bugzilla.suse.com/show_bug.cgi?id=1225078
  * https://bugzilla.suse.com/show_bug.cgi?id=1225081
  * https://bugzilla.suse.com/show_bug.cgi?id=1225085
  * https://bugzilla.suse.com/show_bug.cgi?id=1225086
  * https://bugzilla.suse.com/show_bug.cgi?id=1225090
  * https://bugzilla.suse.com/show_bug.cgi?id=1225092
  * https://bugzilla.suse.com/show_bug.cgi?id=1225096
  * https://bugzilla.suse.com/show_bug.cgi?id=1225097
  * https://bugzilla.suse.com/show_bug.cgi?id=1225098
  * https://bugzilla.suse.com/show_bug.cgi?id=1225101
  * https://bugzilla.suse.com/show_bug.cgi?id=1225103
  * https://bugzilla.suse.com/show_bug.cgi?id=1225104
  * https://bugzilla.suse.com/show_bug.cgi?id=1225105
  * https://bugzilla.suse.com/show_bug.cgi?id=1225106
  * https://bugzilla.suse.com/show_bug.cgi?id=1225108
  * https://bugzilla.suse.com/show_bug.cgi?id=1225120
  * https://bugzilla.suse.com/show_bug.cgi?id=1225132
  * https://bugzilla.suse.com/show_bug.cgi?id=1225180
  * https://bugzilla.suse.com/show_bug.cgi?id=1225300
  * https://bugzilla.suse.com/show_bug.cgi?id=1225391
  * https://bugzilla.suse.com/show_bug.cgi?id=1225472
  * https://bugzilla.suse.com/show_bug.cgi?id=1225475
  * https://bugzilla.suse.com/show_bug.cgi?id=1225476
  * https://bugzilla.suse.com/show_bug.cgi?id=1225477
  * https://bugzilla.suse.com/show_bug.cgi?id=1225478
  * https://bugzilla.suse.com/show_bug.cgi?id=1225485
  * https://bugzilla.suse.com/show_bug.cgi?id=1225490
  * https://bugzilla.suse.com/show_bug.cgi?id=1225527
  * https://bugzilla.suse.com/show_bug.cgi?id=1225529
  * https://bugzilla.suse.com/show_bug.cgi?id=1225530
  * https://bugzilla.suse.com/show_bug.cgi?id=1225532
  * https://bugzilla.suse.com/show_bug.cgi?id=1225534
  * https://bugzilla.suse.com/show_bug.cgi?id=1225548
  * https://bugzilla.suse.com/show_bug.cgi?id=1225550
  * https://bugzilla.suse.com/show_bug.cgi?id=1225553
  * https://bugzilla.suse.com/show_bug.cgi?id=1225554
  * https://bugzilla.suse.com/show_bug.cgi?id=1225555
  * https://bugzilla.suse.com/show_bug.cgi?id=1225556
  * https://bugzilla.suse.com/show_bug.cgi?id=1225557
  * https://bugzilla.suse.com/show_bug.cgi?id=1225559
  * https://bugzilla.suse.com/show_bug.cgi?id=1225560
  * https://bugzilla.suse.com/show_bug.cgi?id=1225564
  * https://bugzilla.suse.com/show_bug.cgi?id=1225565
  * https://bugzilla.suse.com/show_bug.cgi?id=1225566
  * https://bugzilla.suse.com/show_bug.cgi?id=1225568
  * https://bugzilla.suse.com/show_bug.cgi?id=1225569
  * https://bugzilla.suse.com/show_bug.cgi?id=1225570
  * https://bugzilla.suse.com/show_bug.cgi?id=1225571
  * https://bugzilla.suse.com/show_bug.cgi?id=1225572
  * https://bugzilla.suse.com/show_bug.cgi?id=1225573
  * https://bugzilla.suse.com/show_bug.cgi?id=1225577
  * https://bugzilla.suse.com/show_bug.cgi?id=1225581
  * https://bugzilla.suse.com/show_bug.cgi?id=1225583
  * https://bugzilla.suse.com/show_bug.cgi?id=1225584
  * https://bugzilla.suse.com/show_bug.cgi?id=1225585
  * https://bugzilla.suse.com/show_bug.cgi?id=1225586
  * https://bugzilla.suse.com/show_bug.cgi?id=1225587
  * https://bugzilla.suse.com/show_bug.cgi?id=1225588
  * https://bugzilla.suse.com/show_bug.cgi?id=1225589
  * https://bugzilla.suse.com/show_bug.cgi?id=1225590
  * https://bugzilla.suse.com/show_bug.cgi?id=1225591
  * https://bugzilla.suse.com/show_bug.cgi?id=1225592
  * https://bugzilla.suse.com/show_bug.cgi?id=1225594
  * https://bugzilla.suse.com/show_bug.cgi?id=1225595
  * https://bugzilla.suse.com/show_bug.cgi?id=1225599
  * https://bugzilla.suse.com/show_bug.cgi?id=1225602
  * https://bugzilla.suse.com/show_bug.cgi?id=1225605
  * https://bugzilla.suse.com/show_bug.cgi?id=1225609
  * https://bugzilla.suse.com/show_bug.cgi?id=1225611
  * https://bugzilla.suse.com/show_bug.cgi?id=1225681
  * https://bugzilla.suse.com/show_bug.cgi?id=1225702
  * https://bugzilla.suse.com/show_bug.cgi?id=1225723
  * https://bugzilla.suse.com/show_bug.cgi?id=1225726
  * https://bugzilla.suse.com/show_bug.cgi?id=1225731
  * https://bugzilla.suse.com/show_bug.cgi?id=1225732
  * https://bugzilla.suse.com/show_bug.cgi?id=1225737
  * https://bugzilla.suse.com/show_bug.cgi?id=1225741
  * https://bugzilla.suse.com/show_bug.cgi?id=1225758
  * https://bugzilla.suse.com/show_bug.cgi?id=1225759
  * https://bugzilla.suse.com/show_bug.cgi?id=1225760
  * https://bugzilla.suse.com/show_bug.cgi?id=1225761
  * https://bugzilla.suse.com/show_bug.cgi?id=1225762
  * https://bugzilla.suse.com/show_bug.cgi?id=1225763
  * https://bugzilla.suse.com/show_bug.cgi?id=1225767
  * https://bugzilla.suse.com/show_bug.cgi?id=1225770
  * https://bugzilla.suse.com/show_bug.cgi?id=1225815
  * https://bugzilla.suse.com/show_bug.cgi?id=1225820
  * https://bugzilla.suse.com/show_bug.cgi?id=1225823
  * https://bugzilla.suse.com/show_bug.cgi?id=1225827
  * https://bugzilla.suse.com/show_bug.cgi?id=1225834
  * https://bugzilla.suse.com/show_bug.cgi?id=1225866
  * https://bugzilla.suse.com/show_bug.cgi?id=1225872
  * https://bugzilla.suse.com/show_bug.cgi?id=1225898
  * https://bugzilla.suse.com/show_bug.cgi?id=1225903
  * https://bugzilla.suse.com/show_bug.cgi?id=1226022
  * https://bugzilla.suse.com/show_bug.cgi?id=1226131
  * https://bugzilla.suse.com/show_bug.cgi?id=1226145
  * https://bugzilla.suse.com/show_bug.cgi?id=1226149
  * https://bugzilla.suse.com/show_bug.cgi?id=1226155
  * https://bugzilla.suse.com/show_bug.cgi?id=1226158
  * https://bugzilla.suse.com/show_bug.cgi?id=1226163
  * https://bugzilla.suse.com/show_bug.cgi?id=1226211
  * https://bugzilla.suse.com/show_bug.cgi?id=1226212
  * https://bugzilla.suse.com/show_bug.cgi?id=1226226
  * https://bugzilla.suse.com/show_bug.cgi?id=1226457
  * https://bugzilla.suse.com/show_bug.cgi?id=1226503
  * https://bugzilla.suse.com/show_bug.cgi?id=1226513
  * https://bugzilla.suse.com/show_bug.cgi?id=1226514
  * https://bugzilla.suse.com/show_bug.cgi?id=1226520
  * https://bugzilla.suse.com/show_bug.cgi?id=1226582
  * https://bugzilla.suse.com/show_bug.cgi?id=1226587
  * https://bugzilla.suse.com/show_bug.cgi?id=1226588
  * https://bugzilla.suse.com/show_bug.cgi?id=1226592
  * https://bugzilla.suse.com/show_bug.cgi?id=1226593
  * https://bugzilla.suse.com/show_bug.cgi?id=1226594
  * https://bugzilla.suse.com/show_bug.cgi?id=1226595
  * https://bugzilla.suse.com/show_bug.cgi?id=1226597
  * https://bugzilla.suse.com/show_bug.cgi?id=1226607
  * https://bugzilla.suse.com/show_bug.cgi?id=1226608
  * https://bugzilla.suse.com/show_bug.cgi?id=1226610
  * https://bugzilla.suse.com/show_bug.cgi?id=1226612
  * https://bugzilla.suse.com/show_bug.cgi?id=1226613
  * https://bugzilla.suse.com/show_bug.cgi?id=1226630
  * https://bugzilla.suse.com/show_bug.cgi?id=1226632
  * https://bugzilla.suse.com/show_bug.cgi?id=1226633
  * https://bugzilla.suse.com/show_bug.cgi?id=1226634
  * https://bugzilla.suse.com/show_bug.cgi?id=1226637
  * https://bugzilla.suse.com/show_bug.cgi?id=1226657
  * https://bugzilla.suse.com/show_bug.cgi?id=1226658
  * https://bugzilla.suse.com/show_bug.cgi?id=1226734
  * https://bugzilla.suse.com/show_bug.cgi?id=1226735
  * https://bugzilla.suse.com/show_bug.cgi?id=1226737
  * https://bugzilla.suse.com/show_bug.cgi?id=1226738
  * https://bugzilla.suse.com/show_bug.cgi?id=1226739
  * https://bugzilla.suse.com/show_bug.cgi?id=1226740
  * https://bugzilla.suse.com/show_bug.cgi?id=1226741
  * https://bugzilla.suse.com/show_bug.cgi?id=1226742
  * https://bugzilla.suse.com/show_bug.cgi?id=1226744
  * https://bugzilla.suse.com/show_bug.cgi?id=1226746
  * https://bugzilla.suse.com/show_bug.cgi?id=1226747
  * https://bugzilla.suse.com/show_bug.cgi?id=1226749
  * https://bugzilla.suse.com/show_bug.cgi?id=1226754
  * https://bugzilla.suse.com/show_bug.cgi?id=1226758
  * https://bugzilla.suse.com/show_bug.cgi?id=1226760
  * https://bugzilla.suse.com/show_bug.cgi?id=1226761
  * https://bugzilla.suse.com/show_bug.cgi?id=1226764
  * https://bugzilla.suse.com/show_bug.cgi?id=1226767
  * https://bugzilla.suse.com/show_bug.cgi?id=1226768
  * https://bugzilla.suse.com/show_bug.cgi?id=1226769
  * https://bugzilla.suse.com/show_bug.cgi?id=1226771
  * https://bugzilla.suse.com/show_bug.cgi?id=1226772
  * https://bugzilla.suse.com/show_bug.cgi?id=1226774
  * https://bugzilla.suse.com/show_bug.cgi?id=1226775
  * https://bugzilla.suse.com/show_bug.cgi?id=1226776
  * https://bugzilla.suse.com/show_bug.cgi?id=1226777
  * https://bugzilla.suse.com/show_bug.cgi?id=1226780
  * https://bugzilla.suse.com/show_bug.cgi?id=1226781
  * https://bugzilla.suse.com/show_bug.cgi?id=1226786
  * https://bugzilla.suse.com/show_bug.cgi?id=1226788
  * https://bugzilla.suse.com/show_bug.cgi?id=1226789
  * https://bugzilla.suse.com/show_bug.cgi?id=1226790
  * https://bugzilla.suse.com/show_bug.cgi?id=1226791
  * https://bugzilla.suse.com/show_bug.cgi?id=1226796
  * https://bugzilla.suse.com/show_bug.cgi?id=1226799
  * https://bugzilla.suse.com/show_bug.cgi?id=1226837
  * https://bugzilla.suse.com/show_bug.cgi?id=1226839
  * https://bugzilla.suse.com/show_bug.cgi?id=1226840
  * https://bugzilla.suse.com/show_bug.cgi?id=1226841
  * https://bugzilla.suse.com/show_bug.cgi?id=1226842
  * https://bugzilla.suse.com/show_bug.cgi?id=1226844
  * https://bugzilla.suse.com/show_bug.cgi?id=1226848
  * https://bugzilla.suse.com/show_bug.cgi?id=1226852
  * https://bugzilla.suse.com/show_bug.cgi?id=1226856
  * https://bugzilla.suse.com/show_bug.cgi?id=1226857
  * https://bugzilla.suse.com/show_bug.cgi?id=1226859
  * https://bugzilla.suse.com/show_bug.cgi?id=1226861
  * https://bugzilla.suse.com/show_bug.cgi?id=1226863
  * https://bugzilla.suse.com/show_bug.cgi?id=1226864
  * https://bugzilla.suse.com/show_bug.cgi?id=1226867
  * https://bugzilla.suse.com/show_bug.cgi?id=1226868
  * https://bugzilla.suse.com/show_bug.cgi?id=1226875
  * https://bugzilla.suse.com/show_bug.cgi?id=1226876
  * https://bugzilla.suse.com/show_bug.cgi?id=1226878
  * https://bugzilla.suse.com/show_bug.cgi?id=1226879
  * https://bugzilla.suse.com/show_bug.cgi?id=1226886
  * https://bugzilla.suse.com/show_bug.cgi?id=1226890
  * https://bugzilla.suse.com/show_bug.cgi?id=1226891
  * https://bugzilla.suse.com/show_bug.cgi?id=1226894
  * https://bugzilla.suse.com/show_bug.cgi?id=1226895
  * https://bugzilla.suse.com/show_bug.cgi?id=1226905
  * https://bugzilla.suse.com/show_bug.cgi?id=1226908
  * https://bugzilla.suse.com/show_bug.cgi?id=1226909
  * https://bugzilla.suse.com/show_bug.cgi?id=1226911
  * https://bugzilla.suse.com/show_bug.cgi?id=1226928
  * https://bugzilla.suse.com/show_bug.cgi?id=1226934
  * https://bugzilla.suse.com/show_bug.cgi?id=1226938
  * https://bugzilla.suse.com/show_bug.cgi?id=1226939
  * https://bugzilla.suse.com/show_bug.cgi?id=1226941
  * https://bugzilla.suse.com/show_bug.cgi?id=1226948
  * https://bugzilla.suse.com/show_bug.cgi?id=1226949
  * https://bugzilla.suse.com/show_bug.cgi?id=1226950
  * https://bugzilla.suse.com/show_bug.cgi?id=1226962
  * https://bugzilla.suse.com/show_bug.cgi?id=1226976
  * https://bugzilla.suse.com/show_bug.cgi?id=1226989
  * https://bugzilla.suse.com/show_bug.cgi?id=1226990
  * https://bugzilla.suse.com/show_bug.cgi?id=1226992
  * https://bugzilla.suse.com/show_bug.cgi?id=1226994
  * https://bugzilla.suse.com/show_bug.cgi?id=1226995
  * https://bugzilla.suse.com/show_bug.cgi?id=1226996
  * https://bugzilla.suse.com/show_bug.cgi?id=1227066
  * https://bugzilla.suse.com/show_bug.cgi?id=1227072
  * https://bugzilla.suse.com/show_bug.cgi?id=1227085
  * https://bugzilla.suse.com/show_bug.cgi?id=1227089
  * https://bugzilla.suse.com/show_bug.cgi?id=1227090
  * https://bugzilla.suse.com/show_bug.cgi?id=1227096
  * https://bugzilla.suse.com/show_bug.cgi?id=1227101
  * https://bugzilla.suse.com/show_bug.cgi?id=1227190
  * https://jira.suse.com/browse/PED-8491
  * https://jira.suse.com/browse/PED-8570
  * https://jira.suse.com/browse/PED-8688

SUSE: 2024:2571-1 important: the Linux Kernel Security Advisory Updates

July 22, 2024
* bsc#1186716 * bsc#1195775 * bsc#1204562 * bsc#1209834 * bsc#1217481

Summary

## The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-39371: io_uring: check for non-NULL file pointer in io_file_can_poll() (bsc#1226990). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225098). * CVE-2024-38610: drivers/virt/acrn: fix PFNMAP PTE checks in acrn_vm_ram_map() (bsc#1226758). * CVE-2024-37354: btrfs: fix crash on racing fsync and size-extending write into prealloc (bsc#1227101). * CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload (bsc#1225767). * CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785). * CVE-2024-38570: gfs2: Fix potential glock use-after-free on unmount (bsc#1226775). * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225732). * CVE-2023-52840: Fix use after free in rmi_unregister_function() (bsc#1224928). * CVE-2024-38545: RDMA/hns: Fix UAF for cq async event (bsc#1226595). * CVE-2023-52834: atl1c: Work around the DMA RX overflow issue (bsc#1225599). * CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096). * CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086). * CVE-2023-52821: Fixed a possible null pointer dereference (bsc#1225022). * CVE-2023-52867: Fixed possible buffer overflow (bsc#1225009). * CVE-2024-38578: ecryptfs: Fix buffer size for tag 66 packet (bsc#1226634,). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866). * CVE-2023-52759: Ignore negated quota changes (bsc#1225560). * CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930). * CVE-2023-52807: Fixed out-of-bounds access may occur when coalesce info is read via debugfs (bsc#1225097). * CVE-2023-52864: Fixed opening of char device (bsc#1225132). * CVE-2024-36926: Fixed LPAR panics during boot up with a frozen PE (bsc#1222011). * CVE-2023-52871: Handle a second device without data corruption (bsc#1225534) * CVE-2023-52795: Fixed use after free in vhost_vdpa_probe() (bsc#1225085). * CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611). * CVE-2024-37353: virtio: fixed a double free in vp_del_vqs() (bsc#1226875). * CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994). * CVE-2024-35843: iommu/vt-d: Use device rbtree in iopf reporting path (bsc#1224751). * CVE-2024-37078: nilfs2: fix potential kernel bug due to lack of writeback flag waiting (bsc#1227066). * CVE-2024-35247: fpga: region: add owner module and take its refcount (bsc#1226948). * CVE-2024-36479: fpga: bridge: add owner module and take its refcount (bsc#1226949). * CVE-2024-37021: fpga: manager: add owner module and take its refcount (bsc#1226950). * CVE-2024-36281: net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules (bsc#1226799). * CVE-2024-38580: epoll: be better about file lifetimes (bsc#1226610). * CVE-2024-36478: null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues' (bsc#1226841). * CVE-2024-38636: f2fs: multidev: fix to recognize valid zero block address (bsc#1226879). * CVE-2024-38661: s390/ap: Fix crash in AP internal function modify_bitmap() (bsc#1226996). * CVE-2024-38564: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (bsc#1226789). * CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786). * CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514). * CVE-2024-36917: block: fix overflow in blk_ioctl_discard() (bsc#1225770). * CVE-2024-38627: stm class: Fix a double free in stm_register_device() (bsc#1226857). * CVE-2024-38603: drivers/perf: hisi: hns3: Actually use devm_add_action_or_reset() (bsc#1226842). * CVE-2024-38553: net: fec: remove .ndo_poll_controller to avoid deadlock (bsc#1226744). * CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607). * CVE-2024-38556: net/mlx5: Add a timeout to acquire the command queue semaphore (bsc#1226774). * CVE-2024-38557: net/mlx5: Reload only IB representors upon lag disable/enable (bsc#1226781). * CVE-2024-38608: net/mlx5e: Fix netif state handling (bsc#1226746). * CVE-2024-38597: eth: sungem: remove .ndo_poll_controller to avoid deadlocks (bsc#1226749). * CVE-2024-38594: net: stmmac: move the EST lock to struct stmmac_priv (bsc#1226734). * CVE-2024-38569: drivers/perf: hisi_pcie: Fix out-of-bound access when valid event group (bsc#1226772). * CVE-2024-38568: drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group (bsc#1226771). * CVE-2024-26814: vfio/fsl-mc: Block calling interrupt handler without trigger (bsc#1222810). * CVE-2024-26813: vfio/platform: Create persistent IRQ handlers (bsc#1222809). * CVE-2024-36945: net/smc: fix neighbour and rtable leak in smc_ib_find_route() (bsc#1225823). * CVE-2024-36923: fs/9p: fix uninitialized values during inode evict (bsc#1225815). * CVE-2024-36971: net: fix __dst_negative_advice() race (bsc#1226145). * CVE-2024-27414: rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back (bsc#1224439). * CVE-2024-35886: ipv6: Fix infinite recursion in fib6_dump_done() (bsc#1224670). * CVE-2024-36024: drm/amd/display: Disable idle reallow as part of command/gpint execution (bsc#1225702). * CVE-2024-36903: ipv6: Fix potential uninit-value access in __ip6_make_skb() (bsc#1225741). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225737). * CVE-2024-35979: raid1: fix use-after-free for original bio in raid1_write_request() (bsc#1224572). * CVE-2024-35807: ext4: fix corruption during on-line resize (bsc#1224735). * CVE-2023-52622: ext4: avoid online resizing failures due to oversized flex bg (bsc#1222080). * CVE-2023-52843: llc: verify mac len before reading mac header (bsc#1224951). * CVE-2024-35898: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (bsc#1224498). * CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758). * CVE-2024-36882: mm: use memalloc_nofs_save() in page_cache_ra_order() (bsc#1225723). * CVE-2024-36916: blk-iocost: avoid out of bounds shift (bsc#1225759). * CVE-2024-36900: net: hns3: fix kernel crash when devlink reload during initialization (bsc#1225726). * CVE-2023-52787: blk-mq: make sure active queue usage is held for bio_integrity_prep() (bsc#1225105). * CVE-2024-35925: block: prevent division by zero in blk_rq_stat_sum() (bsc#1224661). * CVE-2023-52837: nbd: fix uaf in nbd_open (bsc#1224935). * CVE-2023-52786: ext4: fix racy may inline data check in dio write (bsc#1224939). * CVE-2024-36934: bna: ensure the copied buf is NUL terminated (bsc#1225760). * CVE-2024-36935: ice: ensure the copied buf is NUL terminated (bsc#1225763). * CVE-2024-36937: xdp: use flags field to disambiguate broadcast redirect (bsc#1225834). * CVE-2023-52672: pipe: wakeup wr_wait after setting max_usage (bsc#1224614). * CVE-2023-52845: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (bsc#1225585). * CVE-2024-36005: netfilter: nf_tables: honor table dormant flag from netdev release event path (bsc#1224539). * CVE-2024-26845: scsi: target: core: Add TMF to tmr_list handling (bsc#1223018). * CVE-2024-35892: net/sched: fix lockdep splat in qdisc_tree_reduce_backlog() (bsc#1224515). * CVE-2024-35848: eeprom: at24: fix memory corruption race condition (bsc#1224612). * CVE-2024-35884: udp: do not accept non-tunnel GSO skbs landing in a tunnel (bsc#1224520). * CVE-2024-35857: icmp: prevent possible NULL dereferences from icmp_build_probe() (bsc#1224619). * CVE-2023-52735: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself (bsc#1225475). * CVE-2024-35926: crypto: iaa - Fix async_disable descriptor leak (bsc#1224655). * CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING (bsc#1224575). * CVE-2024-36938: Fixed NULL pointer dereference in sk_psock_skb_ingress_enqueue (bsc#1225761). * CVE-2024-36008: ipv4: check for NULL idev in ip_route_use_hint() (bsc#1224540). * CVE-2024-35998: Fixed lock ordering potential deadlock in cifs_sync_mid_result (bsc#1224549). * CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548). * CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759) * CVE-2024-36957: octeontx2-af: avoid off-by-one read from userspace (bsc#1225762). * CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086) * CVE-2024-35880: io_uring/kbuf: hold io_buffer_list reference over mmap (bsc#1224523). * CVE-2024-35831: io_uring: Fix release of pinned pages when __io_uaddr_map fails (bsc#1224698). * CVE-2024-35827: io_uring/net: fix overflow check in io_recvmsg_mshot_prep() (bsc#1224606). * CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187). * CVE-2023-52699: sysv: don't call sb_bread() with pointers_lock held (bsc#1224659). The following non-security bugs were fixed: * KVM: arm64: Use local TLBI on permission relaxation (bsc#1219478). * KVM: x86/pmu: Prioritize VMX interception over #GP on RDPMC due to bad index (bsc#1226158). * NFS: abort nfs_atomic_open_v23 if name is too long (bsc#1219847). * NFS: add atomic_open for NFSv3 to handle O_TRUNC correctly (bsc#1219847). * NFS: avoid infinite loop in pnfs_update_layout (bsc#1219633 bsc#1226226). * PCI: Clear Secondary Status errors after enumeration (bsc#1226928) * RAS/AMD/ATL: Fix MI300 bank hash (bsc#1225300). * RAS/AMD/ATL: Use system settings for MI300 DRAM to normalized address translation (bsc#1225300). * Revert "build initrd without systemd" (bsc#1195775)" * arm64: mm: Batch dsb and isb when populating pgtables (jsc#PED-8688). * arm64: mm: Do not remap pgtables for allocate vs populate (jsc#PED-8688). * arm64: mm: Do not remap pgtables per-cont(pte|pmd) block (jsc#PED-8688). * bpf: check bpf_func_state->callback_depth when pruning states (bsc#1225903). * bpf: correct loop detection for iterators convergence (bsc#1225903). * bpf: exact states comparison for iterator convergence checks (bsc#1225903). * bpf: extract __check_reg_arg() utility function (bsc#1225903). * bpf: extract same_callsites() as utility function (bsc#1225903). * bpf: extract setup_func_entry() utility function (bsc#1225903). * bpf: keep track of max number of bpf_loop callback iterations (bsc#1225903). * bpf: move explored_state() closer to the beginning of verifier.c (bsc#1225903). * bpf: print full verifier states on infinite loop detection (bsc#1225903). * bpf: verify callbacks as if they are called unknown number of times (bsc#1225903). * bpf: widening for callback iterators (bsc#1225903). * cachefiles: remove requests from xarray during flushing requests (bsc#1226588). * ceph: add ceph_cap_unlink_work to fire check_caps() immediately (bsc#1226022). * ceph: always check dir caps asynchronously (bsc#1226022). * ceph: always queue a writeback when revoking the Fb caps (bsc#1226022). * ceph: break the check delayed cap loop every 5s (bsc#1226022). * ceph: switch to use cap_delay_lock for the unlink delay list (bsc#1226022). * crypto: deflate - Add aliases to deflate (bsc#1227190). * crypto: iaa - Account for cpu-less numa nodes (bsc#1227190). * ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958) * kABI: bpf: verifier kABI workaround (bsc#1225903). * net: ena: Fix redundant device NUMA node override (jsc#PED-8688). * net: mana: Enable MANA driver on ARM64 with 4K page size (jsc#PED-8491). * nfs: Avoid flushing many pages with NFS_FILE_SYNC (bsc#1218442). * nfs: Bump default write congestion size (bsc#1218442). * nfsd: optimise recalculate_deny_mode() for a common case (bsc#1217912). * nvme-fabrics: short-circuit reconnect retries (bsc#1186716). * nvme-tcp: Export the nvme_tcp_wq to sysfs (bsc#1224049). * nvme/tcp: Add wq_unbound modparam for nvme_tcp_wq (bsc#1224049). * nvme: do not retry authentication failures (bsc#1186716). * nvme: return kernel error codes for admin queue connect (bsc#1186716). * nvmet: lock config semaphore when accessing DH-HMAC-CHAP key (bsc#1186716). * nvmet: return DHCHAP status codes from nvmet_setup_auth() (bsc#1186716). * ocfs2: adjust enabling place for la window (bsc#1219224). * ocfs2: fix sparse warnings (bsc#1219224). * ocfs2: improve write IO performance when fragmentation is high (bsc#1219224). * ocfs2: speed up chain-list searching (bsc#1219224). * rpm/kernel-obs-build.spec.in: Add iso9660 (bsc#1226212). * rpm/kernel-obs-build.spec.in: Add networking modules for docker (bsc#1226211). * s390/cpacf: Make use of invalid opcode produce a link error (bsc#1227072). * sched/core: Fix incorrect initialization of the 'burst' parameter in cpu_max_write() (bsc#1226791). * selftests/bpf: test case for callback_depth states pruning logic (bsc#1225903). * selftests/bpf: test if state loops are detected in a tricky case (bsc#1225903). * selftests/bpf: test widening for iterating callbacks (bsc#1225903). * selftests/bpf: tests for iterating callbacks (bsc#1225903). * selftests/bpf: tests with delayed read/precision makrs in loop body (bsc#1225903). * selftests/bpf: track string payload offset as scalar in strobemeta (bsc#1225903). * selftests/bpf: track tcp payload offset as scalar in xdp_synproxy (bsc#1225903). * supported.conf: Add APM X-Gene SoC hardware monitoring driver (bsc#1223265 jsc#PED-8570) * tcp: Dump bound-only sockets in inet_diag (bsc#1204562). * x86/mce: Dynamically size space for machine check records (bsc#1222241). * x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015 bsc#1226962).

References

* bsc#1186716

* bsc#1195775

* bsc#1204562

* bsc#1209834

* bsc#1217481

* bsc#1217912

* bsc#1218442

* bsc#1219224

* bsc#1219478

* bsc#1219596

* bsc#1219633

* bsc#1219847

* bsc#1219953

* bsc#1221086

* bsc#1221777

* bsc#1221958

* bsc#1222011

* bsc#1222015

* bsc#1222080

* bsc#1222241

* bsc#1222380

* bsc#1222588

* bsc#1222617

* bsc#1222619

* bsc#1222809

* bsc#1222810

* bsc#1223018

* bsc#1223265

* bsc#1224049

* bsc#1224187

* bsc#1224439

* bsc#1224497

* bsc#1224498

* bsc#1224515

* bsc#1224520

* bsc#1224523

* bsc#1224539

* bsc#1224540

* bsc#1224549

* bsc#1224572

* bsc#1224575

* bsc#1224583

* bsc#1224584

* bsc#1224606

* bsc#1224612

* bsc#1224614

* bsc#1224619

* bsc#1224655

* bsc#1224659

* bsc#1224661

* bsc#1224662

* bsc#1224670

* bsc#1224673

* bsc#1224698

* bsc#1224735

* bsc#1224751

* bsc#1224759

* bsc#1224928

* bsc#1224930

* bsc#1224932

* bsc#1224933

* bsc#1224935

* bsc#1224937

* bsc#1224939

* bsc#1224941

* bsc#1224944

* bsc#1224946

* bsc#1224947

* bsc#1224949

* bsc#1224951

* bsc#1224988

* bsc#1224992

* bsc#1224998

* bsc#1225000

* bsc#1225001

* bsc#1225004

* bsc#1225006

* bsc#1225008

* bsc#1225009

* bsc#1225014

* bsc#1225015

* bsc#1225022

* bsc#1225025

* bsc#1225028

* bsc#1225029

* bsc#1225031

* bsc#1225036

* bsc#1225041

* bsc#1225044

* bsc#1225049

* bsc#1225050

* bsc#1225076

* bsc#1225077

* bsc#1225078

* bsc#1225081

* bsc#1225085

* bsc#1225086

* bsc#1225090

* bsc#1225092

* bsc#1225096

* bsc#1225097

* bsc#1225098

* bsc#1225101

* bsc#1225103

* bsc#1225104

* bsc#1225105

* bsc#1225106

* bsc#1225108

* bsc#1225120

* bsc#1225132

* bsc#1225180

* bsc#1225300

* bsc#1225391

* bsc#1225472

* bsc#1225475

* bsc#1225476

* bsc#1225477

* bsc#1225478

* bsc#1225485

* bsc#1225490

* bsc#1225527

* bsc#1225529

* bsc#1225530

* bsc#1225532

* bsc#1225534

* bsc#1225548

* bsc#1225550

* bsc#1225553

* bsc#1225554

* bsc#1225555

* bsc#1225556

* bsc#1225557

* bsc#1225559

* bsc#1225560

* bsc#1225564

* bsc#1225565

* bsc#1225566

* bsc#1225568

* bsc#1225569

* bsc#1225570

* bsc#1225571

* bsc#1225572

* bsc#1225573

* bsc#1225577

* bsc#1225581

* bsc#1225583

* bsc#1225584

* bsc#1225585

* bsc#1225586

* bsc#1225587

* bsc#1225588

* bsc#1225589

* bsc#1225590

* bsc#1225591

* bsc#1225592

* bsc#1225594

* bsc#1225595

* bsc#1225599

* bsc#1225602

* bsc#1225605

* bsc#1225609

* bsc#1225611

* bsc#1225681

* bsc#1225702

* bsc#1225723

* bsc#1225726

* bsc#1225731

* bsc#1225732

* bsc#1225737

* bsc#1225741

* bsc#1225758

* bsc#1225759

* bsc#1225760

* bsc#1225761

* bsc#1225762

* bsc#1225763

* bsc#1225767

* bsc#1225770

* bsc#1225815

* bsc#1225820

* bsc#1225823

* bsc#1225827

* bsc#1225834

* bsc#1225866

* bsc#1225872

* bsc#1225898

* bsc#1225903

* bsc#1226022

* bsc#1226131

* bsc#1226145

* bsc#1226149

* bsc#1226155

* bsc#1226158

* bsc#1226163

* bsc#1226211

* bsc#1226212

* bsc#1226226

* bsc#1226457

* bsc#1226503

* bsc#1226513

* bsc#1226514

* bsc#1226520

* bsc#1226582

* bsc#1226587

* bsc#1226588

* bsc#1226592

* bsc#1226593

* bsc#1226594

* bsc#1226595

* bsc#1226597

* bsc#1226607

* bsc#1226608

* bsc#1226610

* bsc#1226612

* bsc#1226613

* bsc#1226630

* bsc#1226632

* bsc#1226633

* bsc#1226634

* bsc#1226637

* bsc#1226657

* bsc#1226658

* bsc#1226734

* bsc#1226735

* bsc#1226737

* bsc#1226738

* bsc#1226739

* bsc#1226740

* bsc#1226741

* bsc#1226742

* bsc#1226744

* bsc#1226746

* bsc#1226747

* bsc#1226749

* bsc#1226754

* bsc#1226758

* bsc#1226760

* bsc#1226761

* bsc#1226764

* bsc#1226767

* bsc#1226768

* bsc#1226769

* bsc#1226771

* bsc#1226772

* bsc#1226774

* bsc#1226775

* bsc#1226776

* bsc#1226777

* bsc#1226780

* bsc#1226781

* bsc#1226786

* bsc#1226788

* bsc#1226789

* bsc#1226790

* bsc#1226791

* bsc#1226796

* bsc#1226799

* bsc#1226837

* bsc#1226839

* bsc#1226840

* bsc#1226841

* bsc#1226842

* bsc#1226844

* bsc#1226848

* bsc#1226852

* bsc#1226856

* bsc#1226857

* bsc#1226859

* bsc#1226861

* bsc#1226863

* bsc#1226864

* bsc#1226867

* bsc#1226868

* bsc#1226875

* bsc#1226876

* bsc#1226878

* bsc#1226879

* bsc#1226886

* bsc#1226890

* bsc#1226891

* bsc#1226894

* bsc#1226895

* bsc#1226905

* bsc#1226908

* bsc#1226909

* bsc#1226911

* bsc#1226928

* bsc#1226934

* bsc#1226938

* bsc#1226939

* bsc#1226941

* bsc#1226948

* bsc#1226949

* bsc#1226950

* bsc#1226962

* bsc#1226976

* bsc#1226989

* bsc#1226990

* bsc#1226992

* bsc#1226994

* bsc#1226995

* bsc#1226996

* bsc#1227066

* bsc#1227072

* bsc#1227085

* bsc#1227089

* bsc#1227090

* bsc#1227096

* bsc#1227101

* bsc#1227190

* jsc#PED-8491

* jsc#PED-8570

* jsc#PED-8688

Cross-

* CVE-2021-47432

* CVE-2022-48772

* CVE-2023-52622

* CVE-2023-52656

* CVE-2023-52672

* CVE-2023-52699

* CVE-2023-52735

* CVE-2023-52749

* CVE-2023-52750

* CVE-2023-52753

* CVE-2023-52754

* CVE-2023-52757

* CVE-2023-52759

* CVE-2023-52762

* CVE-2023-52763

* CVE-2023-52764

* CVE-2023-52765

* CVE-2023-52766

* CVE-2023-52767

* CVE-2023-52768

* CVE-2023-52769

* CVE-2023-52773

* CVE-2023-52774

* CVE-2023-52776

* CVE-2023-52777

* CVE-2023-52780

* CVE-2023-52781

* CVE-2023-52782

* CVE-2023-52783

* CVE-2023-52784

* CVE-2023-52786

* CVE-2023-52787

* CVE-2023-52788

* CVE-2023-52789

* CVE-2023-52791

* CVE-2023-52792

* CVE-2023-52794

* CVE-2023-52795

* CVE-2023-52796

* CVE-2023-52798

* CVE-2023-52799

* CVE-2023-52800

* CVE-2023-52801

* CVE-2023-52803

* CVE-2023-52804

* CVE-2023-52805

* CVE-2023-52806

* CVE-2023-52807

* CVE-2023-52808

* CVE-2023-52809

* CVE-2023-52810

* CVE-2023-52811

* CVE-2023-52812

* CVE-2023-52813

* CVE-2023-52814

* CVE-2023-52815

* CVE-2023-52816

* CVE-2023-52817

* CVE-2023-52818

* CVE-2023-52819

* CVE-2023-52821

* CVE-2023-52825

* CVE-2023-52826

* CVE-2023-52827

* CVE-2023-52829

* CVE-2023-52832

* CVE-2023-52833

* CVE-2023-52834

* CVE-2023-52835

* CVE-2023-52836

* CVE-2023-52837

* CVE-2023-52838

* CVE-2023-52840

* CVE-2023-52841

* CVE-2023-52842

* CVE-2023-52843

* CVE-2023-52844

* CVE-2023-52845

* CVE-2023-52846

* CVE-2023-52847

* CVE-2023-52849

* CVE-2023-52850

* CVE-2023-52851

* CVE-2023-52853

* CVE-2023-52854

* CVE-2023-52855

* CVE-2023-52856

* CVE-2023-52857

* CVE-2023-52858

* CVE-2023-52861

* CVE-2023-52862

* CVE-2023-52863

* CVE-2023-52864

* CVE-2023-52865

* CVE-2023-52866

* CVE-2023-52867

* CVE-2023-52868

* CVE-2023-52869

* CVE-2023-52870

* CVE-2023-52871

* CVE-2023-52872

* CVE-2023-52873

* CVE-2023-52874

* CVE-2023-52875

* CVE-2023-52876

* CVE-2023-52877

* CVE-2023-52878

* CVE-2023-52879

* CVE-2023-52880

* CVE-2023-52881

* CVE-2023-52883

* CVE-2023-52884

* CVE-2024-26482

* CVE-2024-26625

* CVE-2024-26676

* CVE-2024-26750

* CVE-2024-26758

* CVE-2024-26767

* CVE-2024-26780

* CVE-2024-26813

* CVE-2024-26814

* CVE-2024-26845

* CVE-2024-26889

* CVE-2024-26920

* CVE-2024-27414

* CVE-2024-27419

* CVE-2024-33619

* CVE-2024-34777

* CVE-2024-35247

* CVE-2024-35807

* CVE-2024-35827

* CVE-2024-35831

* CVE-2024-35843

* CVE-2024-35848

* CVE-2024-35857

* CVE-2024-35880

* CVE-2024-35884

* CVE-2024-35886

* CVE-2024-35892

* CVE-2024-35896

* CVE-2024-35898

* CVE-2024-35900

* CVE-2024-35925

* CVE-2024-35926

* CVE-2024-35957

* CVE-2024-35962

* CVE-2024-35970

* CVE-2024-35976

* CVE-2024-35979

* CVE-2024-35998

* CVE-2024-36005

* CVE-2024-36008

* CVE-2024-36010

* CVE-2024-36017

* CVE-2024-36024

* CVE-2024-36281

* CVE-2024-36477

* CVE-2024-36478

* CVE-2024-36479

* CVE-2024-36882

* CVE-2024-36887

* CVE-2024-36899

* CVE-2024-36900

* CVE-2024-36903

* CVE-2024-36904

* CVE-2024-36915

* CVE-2024-36916

* CVE-2024-36917

* CVE-2024-36919

* CVE-2024-36923

* CVE-2024-36924

* CVE-2024-36926

* CVE-2024-36934

* CVE-2024-36935

* CVE-2024-36937

* CVE-2024-36938

* CVE-2024-36945

* CVE-2024-36952

* CVE-2024-36957

* CVE-2024-36960

* CVE-2024-36962

* CVE-2024-36964

* CVE-2024-36965

* CVE-2024-36967

* CVE-2024-36969

* CVE-2024-36971

* CVE-2024-36972

* CVE-2024-36973

* CVE-2024-36975

* CVE-2024-36977

* CVE-2024-36978

* CVE-2024-37021

* CVE-2024-37078

* CVE-2024-37353

* CVE-2024-37354

* CVE-2024-38381

* CVE-2024-38384

* CVE-2024-38385

* CVE-2024-38388

* CVE-2024-38390

* CVE-2024-38391

* CVE-2024-38539

* CVE-2024-38540

* CVE-2024-38541

* CVE-2024-38543

* CVE-2024-38544

* CVE-2024-38545

* CVE-2024-38546

* CVE-2024-38547

* CVE-2024-38548

* CVE-2024-38549

* CVE-2024-38550

* CVE-2024-38551

* CVE-2024-38552

* CVE-2024-38553

* CVE-2024-38554

* CVE-2024-38555

* CVE-2024-38556

* CVE-2024-38557

* CVE-2024-38559

* CVE-2024-38560

* CVE-2024-38562

* CVE-2024-38564

* CVE-2024-38565

* CVE-2024-38566

* CVE-2024-38567

* CVE-2024-38568

* CVE-2024-38569

* CVE-2024-38570

* CVE-2024-38571

* CVE-2024-38572

* CVE-2024-38573

* CVE-2024-38575

* CVE-2024-38578

* CVE-2024-38579

* CVE-2024-38580

* CVE-2024-38581

* CVE-2024-38582

* CVE-2024-38583

* CVE-2024-38587

* CVE-2024-38588

* CVE-2024-38590

* CVE-2024-38591

* CVE-2024-38592

* CVE-2024-38594

* CVE-2024-38595

* CVE-2024-38597

* CVE-2024-38599

* CVE-2024-38600

* CVE-2024-38601

* CVE-2024-38602

* CVE-2024-38603

* CVE-2024-38605

* CVE-2024-38608

* CVE-2024-38610

* CVE-2024-38611

* CVE-2024-38615

* CVE-2024-38616

* CVE-2024-38617

* CVE-2024-38618

* CVE-2024-38619

* CVE-2024-38621

* CVE-2024-38622

* CVE-2024-38627

* CVE-2024-38628

* CVE-2024-38629

* CVE-2024-38630

* CVE-2024-38633

* CVE-2024-38634

* CVE-2024-38635

* CVE-2024-38636

* CVE-2024-38661

* CVE-2024-38663

* CVE-2024-38664

* CVE-2024-38780

* CVE-2024-39277

* CVE-2024-39291

* CVE-2024-39296

* CVE-2024-39301

* CVE-2024-39362

* CVE-2024-39371

* CVE-2024-39463

* CVE-2024-39466

* CVE-2024-39469

* CVE-2024-39471

CVSS scores:

* CVE-2021-47432 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52622 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52656 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2023-52672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52765 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

* CVE-2023-52767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52768 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H

* CVE-2023-52769 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2023-52769 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2023-52773 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52776 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

* CVE-2023-52777 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2023-52780 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52781 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

* CVE-2023-52782 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52783 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52783 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52784 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52786 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L

* CVE-2023-52787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

* CVE-2023-52795 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2023-52796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52798 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2023-52799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2023-52801 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52803 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2023-52804 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

* CVE-2023-52805 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

* CVE-2023-52806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52807 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H

* CVE-2023-52808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52811 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52812 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

* CVE-2023-52813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52815 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52818 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H

* CVE-2023-52819 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H

* CVE-2023-52821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52825 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2023-52826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52827 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

* CVE-2023-52827 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

* CVE-2023-52829 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

* CVE-2023-52832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52834 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H

* CVE-2023-52835 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2023-52836 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N

* CVE-2023-52837 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2023-52838 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2023-52840 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2023-52841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2023-52847 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H

* CVE-2023-52849 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52850 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52853 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52856 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52861 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52862 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52865 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52866 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52867 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H

* CVE-2023-52868 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52870 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52871 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

* CVE-2023-52872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52874 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N

* CVE-2023-52875 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52876 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52879 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

* CVE-2023-52881 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:L

* CVE-2023-52883 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52884 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-26625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-26676 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-26750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-26780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-26813 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-26814 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-26845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-26889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-27414 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H

* CVE-2024-27419 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N

* CVE-2024-33619 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-34777 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H

* CVE-2024-35247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35843 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-35848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L

* CVE-2024-35970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35998 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36017 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H

* CVE-2024-36024 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36477 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

* CVE-2024-36477 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-36478 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36479 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-36900 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36903 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-36915 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H

* CVE-2024-36916 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H

* CVE-2024-36917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36923 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

* CVE-2024-36924 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36934 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L

* CVE-2024-36935 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L

* CVE-2024-36937 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36938 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36945 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36952 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36957 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2024-36960 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H

* CVE-2024-36962 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-36965 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H

* CVE-2024-36965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36967 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36971 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-36971 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-36972 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36973 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36977 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36978 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L

* CVE-2024-37021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-37078 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2024-37353 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L

* CVE-2024-37354 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H

* CVE-2024-38381 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

* CVE-2024-38384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38388 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2024-38390 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38391 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2024-38539 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L

* CVE-2024-38540 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38541 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-38543 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38544 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38545 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38546 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38547 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38549 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38550 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38552 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H

* CVE-2024-38553 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38554 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38555 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38557 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38559 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-38560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38564 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

* CVE-2024-38565 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

* CVE-2024-38566 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38567 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38568 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L

* CVE-2024-38569 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L

* CVE-2024-38570 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-38571 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38572 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

* CVE-2024-38573 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38578 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H

* CVE-2024-38579 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H

* CVE-2024-38580 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38581 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H

* CVE-2024-38582 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38583 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-38587 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L

* CVE-2024-38588 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38590 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38591 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38592 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38594 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H

* CVE-2024-38595 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2024-38597 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38599 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

* CVE-2024-38600 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38601 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38602 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38605 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38608 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L

* CVE-2024-38610 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-38611 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L

* CVE-2024-38615 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38618 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38619 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38627 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38628 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38630 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-38633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38636 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2024-38661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38664 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-38780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-39277 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H

* CVE-2024-39277 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-39291 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-39291 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-39296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-39301 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-39362 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-39371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-39463 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-39466 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-39469 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-39471 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP6

* Development Tools Module 15-SP6

* Legacy Module 15-SP6

* openSUSE Leap 15.6

* SUSE Linux Enterprise Desktop 15 SP6

* SUSE Linux Enterprise High Availability Extension 15 SP6

* SUSE Linux Enterprise Live Patching 15-SP6

* SUSE Linux Enterprise Real Time 15 SP6

* SUSE Linux Enterprise Server 15 SP6

* SUSE Linux Enterprise Server for SAP Applications 15 SP6

* SUSE Linux Enterprise Workstation Extension 15 SP6

An update that solves 285 vulnerabilities, contains three features and has 25

security fixes can now be installed.

##

* https://www.suse.com/security/cve/CVE-2021-47432.html

* https://www.suse.com/security/cve/CVE-2022-48772.html

* https://www.suse.com/security/cve/CVE-2023-52622.html

* https://www.suse.com/security/cve/CVE-2023-52656.html

* https://www.suse.com/security/cve/CVE-2023-52672.html

* https://www.suse.com/security/cve/CVE-2023-52699.html

* https://www.suse.com/security/cve/CVE-2023-52735.html

* https://www.suse.com/security/cve/CVE-2023-52749.html

* https://www.suse.com/security/cve/CVE-2023-52750.html

* https://www.suse.com/security/cve/CVE-2023-52753.html

* https://www.suse.com/security/cve/CVE-2023-52754.html

* https://www.suse.com/security/cve/CVE-2023-52757.html

* https://www.suse.com/security/cve/CVE-2023-52759.html

* https://www.suse.com/security/cve/CVE-2023-52762.html

* https://www.suse.com/security/cve/CVE-2023-52763.html

* https://www.suse.com/security/cve/CVE-2023-52764.html

* https://www.suse.com/security/cve/CVE-2023-52765.html

* https://www.suse.com/security/cve/CVE-2023-52766.html

* https://www.suse.com/security/cve/CVE-2023-52767.html

* https://www.suse.com/security/cve/CVE-2023-52768.html

* https://www.suse.com/security/cve/CVE-2023-52769.html

* https://www.suse.com/security/cve/CVE-2023-52773.html

* https://www.suse.com/security/cve/CVE-2023-52774.html

* https://www.suse.com/security/cve/CVE-2023-52776.html

* https://www.suse.com/security/cve/CVE-2023-52777.html

* https://www.suse.com/security/cve/CVE-2023-52780.html

* https://www.suse.com/security/cve/CVE-2023-52781.html

* https://www.suse.com/security/cve/CVE-2023-52782.html

* https://www.suse.com/security/cve/CVE-2023-52783.html

* https://www.suse.com/security/cve/CVE-2023-52784.html

* https://www.suse.com/security/cve/CVE-2023-52786.html

* https://www.suse.com/security/cve/CVE-2023-52787.html

* https://www.suse.com/security/cve/CVE-2023-52788.html

* https://www.suse.com/security/cve/CVE-2023-52789.html

* https://www.suse.com/security/cve/CVE-2023-52791.html

* https://www.suse.com/security/cve/CVE-2023-52792.html

* https://www.suse.com/security/cve/CVE-2023-52794.html

* https://www.suse.com/security/cve/CVE-2023-52795.html

* https://www.suse.com/security/cve/CVE-2023-52796.html

* https://www.suse.com/security/cve/CVE-2023-52798.html

* https://www.suse.com/security/cve/CVE-2023-52799.html

* https://www.suse.com/security/cve/CVE-2023-52800.html

* https://www.suse.com/security/cve/CVE-2023-52801.html

* https://www.suse.com/security/cve/CVE-2023-52803.html

* https://www.suse.com/security/cve/CVE-2023-52804.html

* https://www.suse.com/security/cve/CVE-2023-52805.html

* https://www.suse.com/security/cve/CVE-2023-52806.html

* https://www.suse.com/security/cve/CVE-2023-52807.html

* https://www.suse.com/security/cve/CVE-2023-52808.html

* https://www.suse.com/security/cve/CVE-2023-52809.html

* https://www.suse.com/security/cve/CVE-2023-52810.html

* https://www.suse.com/security/cve/CVE-2023-52811.html

* https://www.suse.com/security/cve/CVE-2023-52812.html

* https://www.suse.com/security/cve/CVE-2023-52813.html

* https://www.suse.com/security/cve/CVE-2023-52814.html

* https://www.suse.com/security/cve/CVE-2023-52815.html

* https://www.suse.com/security/cve/CVE-2023-52816.html

* https://www.suse.com/security/cve/CVE-2023-52817.html

* https://www.suse.com/security/cve/CVE-2023-52818.html

* https://www.suse.com/security/cve/CVE-2023-52819.html

* https://www.suse.com/security/cve/CVE-2023-52821.html

* https://www.suse.com/security/cve/CVE-2023-52825.html

* https://www.suse.com/security/cve/CVE-2023-52826.html

* https://www.suse.com/security/cve/CVE-2023-52827.html

* https://www.suse.com/security/cve/CVE-2023-52829.html

* https://www.suse.com/security/cve/CVE-2023-52832.html

* https://www.suse.com/security/cve/CVE-2023-52833.html

* https://www.suse.com/security/cve/CVE-2023-52834.html

* https://www.suse.com/security/cve/CVE-2023-52835.html

* https://www.suse.com/security/cve/CVE-2023-52836.html

* https://www.suse.com/security/cve/CVE-2023-52837.html

* https://www.suse.com/security/cve/CVE-2023-52838.html

* https://www.suse.com/security/cve/CVE-2023-52840.html

* https://www.suse.com/security/cve/CVE-2023-52841.html

* https://www.suse.com/security/cve/CVE-2023-52842.html

* https://www.suse.com/security/cve/CVE-2023-52843.html

* https://www.suse.com/security/cve/CVE-2023-52844.html

* https://www.suse.com/security/cve/CVE-2023-52845.html

* https://www.suse.com/security/cve/CVE-2023-52846.html

* https://www.suse.com/security/cve/CVE-2023-52847.html

* https://www.suse.com/security/cve/CVE-2023-52849.html

* https://www.suse.com/security/cve/CVE-2023-52850.html

* https://www.suse.com/security/cve/CVE-2023-52851.html

* https://www.suse.com/security/cve/CVE-2023-52853.html

* https://www.suse.com/security/cve/CVE-2023-52854.html

* https://www.suse.com/security/cve/CVE-2023-52855.html

* https://www.suse.com/security/cve/CVE-2023-52856.html

* https://www.suse.com/security/cve/CVE-2023-52857.html

* https://www.suse.com/security/cve/CVE-2023-52858.html

* https://www.suse.com/security/cve/CVE-2023-52861.html

* https://www.suse.com/security/cve/CVE-2023-52862.html

* https://www.suse.com/security/cve/CVE-2023-52863.html

* https://www.suse.com/security/cve/CVE-2023-52864.html

* https://www.suse.com/security/cve/CVE-2023-52865.html

* https://www.suse.com/security/cve/CVE-2023-52866.html

* https://www.suse.com/security/cve/CVE-2023-52867.html

* https://www.suse.com/security/cve/CVE-2023-52868.html

* https://www.suse.com/security/cve/CVE-2023-52869.html

* https://www.suse.com/security/cve/CVE-2023-52870.html

* https://www.suse.com/security/cve/CVE-2023-52871.html

* https://www.suse.com/security/cve/CVE-2023-52872.html

* https://www.suse.com/security/cve/CVE-2023-52873.html

* https://www.suse.com/security/cve/CVE-2023-52874.html

* https://www.suse.com/security/cve/CVE-2023-52875.html

* https://www.suse.com/security/cve/CVE-2023-52876.html

* https://www.suse.com/security/cve/CVE-2023-52877.html

* https://www.suse.com/security/cve/CVE-2023-52878.html

* https://www.suse.com/security/cve/CVE-2023-52879.html

* https://www.suse.com/security/cve/CVE-2023-52880.html

* https://www.suse.com/security/cve/CVE-2023-52881.html

* https://www.suse.com/security/cve/CVE-2023-52883.html

* https://www.suse.com/security/cve/CVE-2023-52884.html

* https://www.suse.com/security/cve/CVE-2024-26482.html

* https://www.suse.com/security/cve/CVE-2024-26625.html

* https://www.suse.com/security/cve/CVE-2024-26676.html

* https://www.suse.com/security/cve/CVE-2024-26750.html

* https://www.suse.com/security/cve/CVE-2024-26758.html

* https://www.suse.com/security/cve/CVE-2024-26767.html

* https://www.suse.com/security/cve/CVE-2024-26780.html

* https://www.suse.com/security/cve/CVE-2024-26813.html

* https://www.suse.com/security/cve/CVE-2024-26814.html

* https://www.suse.com/security/cve/CVE-2024-26845.html

* https://www.suse.com/security/cve/CVE-2024-26889.html

* https://www.suse.com/security/cve/CVE-2024-26920.html

* https://www.suse.com/security/cve/CVE-2024-27414.html

* https://www.suse.com/security/cve/CVE-2024-27419.html

* https://www.suse.com/security/cve/CVE-2024-33619.html

* https://www.suse.com/security/cve/CVE-2024-34777.html

* https://www.suse.com/security/cve/CVE-2024-35247.html

* https://www.suse.com/security/cve/CVE-2024-35807.html

* https://www.suse.com/security/cve/CVE-2024-35827.html

* https://www.suse.com/security/cve/CVE-2024-35831.html

* https://www.suse.com/security/cve/CVE-2024-35843.html

* https://www.suse.com/security/cve/CVE-2024-35848.html

* https://www.suse.com/security/cve/CVE-2024-35857.html

* https://www.suse.com/security/cve/CVE-2024-35880.html

* https://www.suse.com/security/cve/CVE-2024-35884.html

* https://www.suse.com/security/cve/CVE-2024-35886.html

* https://www.suse.com/security/cve/CVE-2024-35892.html

* https://www.suse.com/security/cve/CVE-2024-35896.html

* https://www.suse.com/security/cve/CVE-2024-35898.html

* https://www.suse.com/security/cve/CVE-2024-35900.html

* https://www.suse.com/security/cve/CVE-2024-35925.html

* https://www.suse.com/security/cve/CVE-2024-35926.html

* https://www.suse.com/security/cve/CVE-2024-35957.html

* https://www.suse.com/security/cve/CVE-2024-35962.html

* https://www.suse.com/security/cve/CVE-2024-35970.html

* https://www.suse.com/security/cve/CVE-2024-35976.html

* https://www.suse.com/security/cve/CVE-2024-35979.html

* https://www.suse.com/security/cve/CVE-2024-35998.html

* https://www.suse.com/security/cve/CVE-2024-36005.html

* https://www.suse.com/security/cve/CVE-2024-36008.html

* https://www.suse.com/security/cve/CVE-2024-36010.html

* https://www.suse.com/security/cve/CVE-2024-36017.html

* https://www.suse.com/security/cve/CVE-2024-36024.html

* https://www.suse.com/security/cve/CVE-2024-36281.html

* https://www.suse.com/security/cve/CVE-2024-36477.html

* https://www.suse.com/security/cve/CVE-2024-36478.html

* https://www.suse.com/security/cve/CVE-2024-36479.html

* https://www.suse.com/security/cve/CVE-2024-36882.html

* https://www.suse.com/security/cve/CVE-2024-36887.html

* https://www.suse.com/security/cve/CVE-2024-36899.html

* https://www.suse.com/security/cve/CVE-2024-36900.html

* https://www.suse.com/security/cve/CVE-2024-36903.html

* https://www.suse.com/security/cve/CVE-2024-36904.html

* https://www.suse.com/security/cve/CVE-2024-36915.html

* https://www.suse.com/security/cve/CVE-2024-36916.html

* https://www.suse.com/security/cve/CVE-2024-36917.html

* https://www.suse.com/security/cve/CVE-2024-36919.html

* https://www.suse.com/security/cve/CVE-2024-36923.html

* https://www.suse.com/security/cve/CVE-2024-36924.html

* https://www.suse.com/security/cve/CVE-2024-36926.html

* https://www.suse.com/security/cve/CVE-2024-36934.html

* https://www.suse.com/security/cve/CVE-2024-36935.html

* https://www.suse.com/security/cve/CVE-2024-36937.html

* https://www.suse.com/security/cve/CVE-2024-36938.html

* https://www.suse.com/security/cve/CVE-2024-36945.html

* https://www.suse.com/security/cve/CVE-2024-36952.html

* https://www.suse.com/security/cve/CVE-2024-36957.html

* https://www.suse.com/security/cve/CVE-2024-36960.html

* https://www.suse.com/security/cve/CVE-2024-36962.html

* https://www.suse.com/security/cve/CVE-2024-36964.html

* https://www.suse.com/security/cve/CVE-2024-36965.html

* https://www.suse.com/security/cve/CVE-2024-36967.html

* https://www.suse.com/security/cve/CVE-2024-36969.html

* https://www.suse.com/security/cve/CVE-2024-36971.html

* https://www.suse.com/security/cve/CVE-2024-36972.html

* https://www.suse.com/security/cve/CVE-2024-36973.html

* https://www.suse.com/security/cve/CVE-2024-36975.html

* https://www.suse.com/security/cve/CVE-2024-36977.html

* https://www.suse.com/security/cve/CVE-2024-36978.html

* https://www.suse.com/security/cve/CVE-2024-37021.html

* https://www.suse.com/security/cve/CVE-2024-37078.html

* https://www.suse.com/security/cve/CVE-2024-37353.html

* https://www.suse.com/security/cve/CVE-2024-37354.html

* https://www.suse.com/security/cve/CVE-2024-38381.html

* https://www.suse.com/security/cve/CVE-2024-38384.html

* https://www.suse.com/security/cve/CVE-2024-38385.html

* https://www.suse.com/security/cve/CVE-2024-38388.html

* https://www.suse.com/security/cve/CVE-2024-38390.html

* https://www.suse.com/security/cve/CVE-2024-38391.html

* https://www.suse.com/security/cve/CVE-2024-38539.html

* https://www.suse.com/security/cve/CVE-2024-38540.html

* https://www.suse.com/security/cve/CVE-2024-38541.html

* https://www.suse.com/security/cve/CVE-2024-38543.html

* https://www.suse.com/security/cve/CVE-2024-38544.html

* https://www.suse.com/security/cve/CVE-2024-38545.html

* https://www.suse.com/security/cve/CVE-2024-38546.html

* https://www.suse.com/security/cve/CVE-2024-38547.html

* https://www.suse.com/security/cve/CVE-2024-38548.html

* https://www.suse.com/security/cve/CVE-2024-38549.html

* https://www.suse.com/security/cve/CVE-2024-38550.html

* https://www.suse.com/security/cve/CVE-2024-38551.html

* https://www.suse.com/security/cve/CVE-2024-38552.html

* https://www.suse.com/security/cve/CVE-2024-38553.html

* https://www.suse.com/security/cve/CVE-2024-38554.html

* https://www.suse.com/security/cve/CVE-2024-38555.html

* https://www.suse.com/security/cve/CVE-2024-38556.html

* https://www.suse.com/security/cve/CVE-2024-38557.html

* https://www.suse.com/security/cve/CVE-2024-38559.html

* https://www.suse.com/security/cve/CVE-2024-38560.html

* https://www.suse.com/security/cve/CVE-2024-38562.html

* https://www.suse.com/security/cve/CVE-2024-38564.html

* https://www.suse.com/security/cve/CVE-2024-38565.html

* https://www.suse.com/security/cve/CVE-2024-38566.html

* https://www.suse.com/security/cve/CVE-2024-38567.html

* https://www.suse.com/security/cve/CVE-2024-38568.html

* https://www.suse.com/security/cve/CVE-2024-38569.html

* https://www.suse.com/security/cve/CVE-2024-38570.html

* https://www.suse.com/security/cve/CVE-2024-38571.html

* https://www.suse.com/security/cve/CVE-2024-38572.html

* https://www.suse.com/security/cve/CVE-2024-38573.html

* https://www.suse.com/security/cve/CVE-2024-38575.html

* https://www.suse.com/security/cve/CVE-2024-38578.html

* https://www.suse.com/security/cve/CVE-2024-38579.html

* https://www.suse.com/security/cve/CVE-2024-38580.html

* https://www.suse.com/security/cve/CVE-2024-38581.html

* https://www.suse.com/security/cve/CVE-2024-38582.html

* https://www.suse.com/security/cve/CVE-2024-38583.html

* https://www.suse.com/security/cve/CVE-2024-38587.html

* https://www.suse.com/security/cve/CVE-2024-38588.html

* https://www.suse.com/security/cve/CVE-2024-38590.html

* https://www.suse.com/security/cve/CVE-2024-38591.html

* https://www.suse.com/security/cve/CVE-2024-38592.html

* https://www.suse.com/security/cve/CVE-2024-38594.html

* https://www.suse.com/security/cve/CVE-2024-38595.html

* https://www.suse.com/security/cve/CVE-2024-38597.html

* https://www.suse.com/security/cve/CVE-2024-38599.html

* https://www.suse.com/security/cve/CVE-2024-38600.html

* https://www.suse.com/security/cve/CVE-2024-38601.html

* https://www.suse.com/security/cve/CVE-2024-38602.html

* https://www.suse.com/security/cve/CVE-2024-38603.html

* https://www.suse.com/security/cve/CVE-2024-38605.html

* https://www.suse.com/security/cve/CVE-2024-38608.html

* https://www.suse.com/security/cve/CVE-2024-38610.html

* https://www.suse.com/security/cve/CVE-2024-38611.html

* https://www.suse.com/security/cve/CVE-2024-38615.html

* https://www.suse.com/security/cve/CVE-2024-38616.html

* https://www.suse.com/security/cve/CVE-2024-38617.html

* https://www.suse.com/security/cve/CVE-2024-38618.html

* https://www.suse.com/security/cve/CVE-2024-38619.html

* https://www.suse.com/security/cve/CVE-2024-38621.html

* https://www.suse.com/security/cve/CVE-2024-38622.html

* https://www.suse.com/security/cve/CVE-2024-38627.html

* https://www.suse.com/security/cve/CVE-2024-38628.html

* https://www.suse.com/security/cve/CVE-2024-38629.html

* https://www.suse.com/security/cve/CVE-2024-38630.html

* https://www.suse.com/security/cve/CVE-2024-38633.html

* https://www.suse.com/security/cve/CVE-2024-38634.html

* https://www.suse.com/security/cve/CVE-2024-38635.html

* https://www.suse.com/security/cve/CVE-2024-38636.html

* https://www.suse.com/security/cve/CVE-2024-38661.html

* https://www.suse.com/security/cve/CVE-2024-38663.html

* https://www.suse.com/security/cve/CVE-2024-38664.html

* https://www.suse.com/security/cve/CVE-2024-38780.html

* https://www.suse.com/security/cve/CVE-2024-39277.html

* https://www.suse.com/security/cve/CVE-2024-39291.html

* https://www.suse.com/security/cve/CVE-2024-39296.html

* https://www.suse.com/security/cve/CVE-2024-39301.html

* https://www.suse.com/security/cve/CVE-2024-39362.html

* https://www.suse.com/security/cve/CVE-2024-39371.html

* https://www.suse.com/security/cve/CVE-2024-39463.html

* https://www.suse.com/security/cve/CVE-2024-39466.html

* https://www.suse.com/security/cve/CVE-2024-39469.html

* https://www.suse.com/security/cve/CVE-2024-39471.html

* https://bugzilla.suse.com/show_bug.cgi?id=1186716

* https://bugzilla.suse.com/show_bug.cgi?id=1195775

* https://bugzilla.suse.com/show_bug.cgi?id=1204562

* https://bugzilla.suse.com/show_bug.cgi?id=1209834

* https://bugzilla.suse.com/show_bug.cgi?id=1217481

* https://bugzilla.suse.com/show_bug.cgi?id=1217912

* https://bugzilla.suse.com/show_bug.cgi?id=1218442

* https://bugzilla.suse.com/show_bug.cgi?id=1219224

* https://bugzilla.suse.com/show_bug.cgi?id=1219478

* https://bugzilla.suse.com/show_bug.cgi?id=1219596

* https://bugzilla.suse.com/show_bug.cgi?id=1219633

* https://bugzilla.suse.com/show_bug.cgi?id=1219847

* https://bugzilla.suse.com/show_bug.cgi?id=1219953

* https://bugzilla.suse.com/show_bug.cgi?id=1221086

* https://bugzilla.suse.com/show_bug.cgi?id=1221777

* https://bugzilla.suse.com/show_bug.cgi?id=1221958

* https://bugzilla.suse.com/show_bug.cgi?id=1222011

* https://bugzilla.suse.com/show_bug.cgi?id=1222015

* https://bugzilla.suse.com/show_bug.cgi?id=1222080

* https://bugzilla.suse.com/show_bug.cgi?id=1222241

* https://bugzilla.suse.com/show_bug.cgi?id=1222380

* https://bugzilla.suse.com/show_bug.cgi?id=1222588

* https://bugzilla.suse.com/show_bug.cgi?id=1222617

* https://bugzilla.suse.com/show_bug.cgi?id=1222619

* https://bugzilla.suse.com/show_bug.cgi?id=1222809

* https://bugzilla.suse.com/show_bug.cgi?id=1222810

* https://bugzilla.suse.com/show_bug.cgi?id=1223018

* https://bugzilla.suse.com/show_bug.cgi?id=1223265

* https://bugzilla.suse.com/show_bug.cgi?id=1224049

* https://bugzilla.suse.com/show_bug.cgi?id=1224187

* https://bugzilla.suse.com/show_bug.cgi?id=1224439

* https://bugzilla.suse.com/show_bug.cgi?id=1224497

* https://bugzilla.suse.com/show_bug.cgi?id=1224498

* https://bugzilla.suse.com/show_bug.cgi?id=1224515

* https://bugzilla.suse.com/show_bug.cgi?id=1224520

* https://bugzilla.suse.com/show_bug.cgi?id=1224523

* https://bugzilla.suse.com/show_bug.cgi?id=1224539

* https://bugzilla.suse.com/show_bug.cgi?id=1224540

* https://bugzilla.suse.com/show_bug.cgi?id=1224549

* https://bugzilla.suse.com/show_bug.cgi?id=1224572

* https://bugzilla.suse.com/show_bug.cgi?id=1224575

* https://bugzilla.suse.com/show_bug.cgi?id=1224583

* https://bugzilla.suse.com/show_bug.cgi?id=1224584

* https://bugzilla.suse.com/show_bug.cgi?id=1224606

* https://bugzilla.suse.com/show_bug.cgi?id=1224612

* https://bugzilla.suse.com/show_bug.cgi?id=1224614

* https://bugzilla.suse.com/show_bug.cgi?id=1224619

* https://bugzilla.suse.com/show_bug.cgi?id=1224655

* https://bugzilla.suse.com/show_bug.cgi?id=1224659

* https://bugzilla.suse.com/show_bug.cgi?id=1224661

* https://bugzilla.suse.com/show_bug.cgi?id=1224662

* https://bugzilla.suse.com/show_bug.cgi?id=1224670

* https://bugzilla.suse.com/show_bug.cgi?id=1224673

* https://bugzilla.suse.com/show_bug.cgi?id=1224698

* https://bugzilla.suse.com/show_bug.cgi?id=1224735

* https://bugzilla.suse.com/show_bug.cgi?id=1224751

* https://bugzilla.suse.com/show_bug.cgi?id=1224759

* https://bugzilla.suse.com/show_bug.cgi?id=1224928

* https://bugzilla.suse.com/show_bug.cgi?id=1224930

* https://bugzilla.suse.com/show_bug.cgi?id=1224932

* https://bugzilla.suse.com/show_bug.cgi?id=1224933

* https://bugzilla.suse.com/show_bug.cgi?id=1224935

* https://bugzilla.suse.com/show_bug.cgi?id=1224937

* https://bugzilla.suse.com/show_bug.cgi?id=1224939

* https://bugzilla.suse.com/show_bug.cgi?id=1224941

* https://bugzilla.suse.com/show_bug.cgi?id=1224944

* https://bugzilla.suse.com/show_bug.cgi?id=1224946

* https://bugzilla.suse.com/show_bug.cgi?id=1224947

* https://bugzilla.suse.com/show_bug.cgi?id=1224949

* https://bugzilla.suse.com/show_bug.cgi?id=1224951

* https://bugzilla.suse.com/show_bug.cgi?id=1224988

* https://bugzilla.suse.com/show_bug.cgi?id=1224992

* https://bugzilla.suse.com/show_bug.cgi?id=1224998

* https://bugzilla.suse.com/show_bug.cgi?id=1225000

* https://bugzilla.suse.com/show_bug.cgi?id=1225001

* https://bugzilla.suse.com/show_bug.cgi?id=1225004

* https://bugzilla.suse.com/show_bug.cgi?id=1225006

* https://bugzilla.suse.com/show_bug.cgi?id=1225008

* https://bugzilla.suse.com/show_bug.cgi?id=1225009

* https://bugzilla.suse.com/show_bug.cgi?id=1225014

* https://bugzilla.suse.com/show_bug.cgi?id=1225015

* https://bugzilla.suse.com/show_bug.cgi?id=1225022

* https://bugzilla.suse.com/show_bug.cgi?id=1225025

* https://bugzilla.suse.com/show_bug.cgi?id=1225028

* https://bugzilla.suse.com/show_bug.cgi?id=1225029

* https://bugzilla.suse.com/show_bug.cgi?id=1225031

* https://bugzilla.suse.com/show_bug.cgi?id=1225036

* https://bugzilla.suse.com/show_bug.cgi?id=1225041

* https://bugzilla.suse.com/show_bug.cgi?id=1225044

* https://bugzilla.suse.com/show_bug.cgi?id=1225049

* https://bugzilla.suse.com/show_bug.cgi?id=1225050

* https://bugzilla.suse.com/show_bug.cgi?id=1225076

* https://bugzilla.suse.com/show_bug.cgi?id=1225077

* https://bugzilla.suse.com/show_bug.cgi?id=1225078

* https://bugzilla.suse.com/show_bug.cgi?id=1225081

* https://bugzilla.suse.com/show_bug.cgi?id=1225085

* https://bugzilla.suse.com/show_bug.cgi?id=1225086

* https://bugzilla.suse.com/show_bug.cgi?id=1225090

* https://bugzilla.suse.com/show_bug.cgi?id=1225092

* https://bugzilla.suse.com/show_bug.cgi?id=1225096

* https://bugzilla.suse.com/show_bug.cgi?id=1225097

* https://bugzilla.suse.com/show_bug.cgi?id=1225098

* https://bugzilla.suse.com/show_bug.cgi?id=1225101

* https://bugzilla.suse.com/show_bug.cgi?id=1225103

* https://bugzilla.suse.com/show_bug.cgi?id=1225104

* https://bugzilla.suse.com/show_bug.cgi?id=1225105

* https://bugzilla.suse.com/show_bug.cgi?id=1225106

* https://bugzilla.suse.com/show_bug.cgi?id=1225108

* https://bugzilla.suse.com/show_bug.cgi?id=1225120

* https://bugzilla.suse.com/show_bug.cgi?id=1225132

* https://bugzilla.suse.com/show_bug.cgi?id=1225180

* https://bugzilla.suse.com/show_bug.cgi?id=1225300

* https://bugzilla.suse.com/show_bug.cgi?id=1225391

* https://bugzilla.suse.com/show_bug.cgi?id=1225472

* https://bugzilla.suse.com/show_bug.cgi?id=1225475

* https://bugzilla.suse.com/show_bug.cgi?id=1225476

* https://bugzilla.suse.com/show_bug.cgi?id=1225477

* https://bugzilla.suse.com/show_bug.cgi?id=1225478

* https://bugzilla.suse.com/show_bug.cgi?id=1225485

* https://bugzilla.suse.com/show_bug.cgi?id=1225490

* https://bugzilla.suse.com/show_bug.cgi?id=1225527

* https://bugzilla.suse.com/show_bug.cgi?id=1225529

* https://bugzilla.suse.com/show_bug.cgi?id=1225530

* https://bugzilla.suse.com/show_bug.cgi?id=1225532

* https://bugzilla.suse.com/show_bug.cgi?id=1225534

* https://bugzilla.suse.com/show_bug.cgi?id=1225548

* https://bugzilla.suse.com/show_bug.cgi?id=1225550

* https://bugzilla.suse.com/show_bug.cgi?id=1225553

* https://bugzilla.suse.com/show_bug.cgi?id=1225554

* https://bugzilla.suse.com/show_bug.cgi?id=1225555

* https://bugzilla.suse.com/show_bug.cgi?id=1225556

* https://bugzilla.suse.com/show_bug.cgi?id=1225557

* https://bugzilla.suse.com/show_bug.cgi?id=1225559

* https://bugzilla.suse.com/show_bug.cgi?id=1225560

* https://bugzilla.suse.com/show_bug.cgi?id=1225564

* https://bugzilla.suse.com/show_bug.cgi?id=1225565

* https://bugzilla.suse.com/show_bug.cgi?id=1225566

* https://bugzilla.suse.com/show_bug.cgi?id=1225568

* https://bugzilla.suse.com/show_bug.cgi?id=1225569

* https://bugzilla.suse.com/show_bug.cgi?id=1225570

* https://bugzilla.suse.com/show_bug.cgi?id=1225571

* https://bugzilla.suse.com/show_bug.cgi?id=1225572

* https://bugzilla.suse.com/show_bug.cgi?id=1225573

* https://bugzilla.suse.com/show_bug.cgi?id=1225577

* https://bugzilla.suse.com/show_bug.cgi?id=1225581

* https://bugzilla.suse.com/show_bug.cgi?id=1225583

* https://bugzilla.suse.com/show_bug.cgi?id=1225584

* https://bugzilla.suse.com/show_bug.cgi?id=1225585

* https://bugzilla.suse.com/show_bug.cgi?id=1225586

* https://bugzilla.suse.com/show_bug.cgi?id=1225587

* https://bugzilla.suse.com/show_bug.cgi?id=1225588

* https://bugzilla.suse.com/show_bug.cgi?id=1225589

* https://bugzilla.suse.com/show_bug.cgi?id=1225590

* https://bugzilla.suse.com/show_bug.cgi?id=1225591

* https://bugzilla.suse.com/show_bug.cgi?id=1225592

* https://bugzilla.suse.com/show_bug.cgi?id=1225594

* https://bugzilla.suse.com/show_bug.cgi?id=1225595

* https://bugzilla.suse.com/show_bug.cgi?id=1225599

* https://bugzilla.suse.com/show_bug.cgi?id=1225602

* https://bugzilla.suse.com/show_bug.cgi?id=1225605

* https://bugzilla.suse.com/show_bug.cgi?id=1225609

* https://bugzilla.suse.com/show_bug.cgi?id=1225611

* https://bugzilla.suse.com/show_bug.cgi?id=1225681

* https://bugzilla.suse.com/show_bug.cgi?id=1225702

* https://bugzilla.suse.com/show_bug.cgi?id=1225723

* https://bugzilla.suse.com/show_bug.cgi?id=1225726

* https://bugzilla.suse.com/show_bug.cgi?id=1225731

* https://bugzilla.suse.com/show_bug.cgi?id=1225732

* https://bugzilla.suse.com/show_bug.cgi?id=1225737

* https://bugzilla.suse.com/show_bug.cgi?id=1225741

* https://bugzilla.suse.com/show_bug.cgi?id=1225758

* https://bugzilla.suse.com/show_bug.cgi?id=1225759

* https://bugzilla.suse.com/show_bug.cgi?id=1225760

* https://bugzilla.suse.com/show_bug.cgi?id=1225761

* https://bugzilla.suse.com/show_bug.cgi?id=1225762

* https://bugzilla.suse.com/show_bug.cgi?id=1225763

* https://bugzilla.suse.com/show_bug.cgi?id=1225767

* https://bugzilla.suse.com/show_bug.cgi?id=1225770

* https://bugzilla.suse.com/show_bug.cgi?id=1225815

* https://bugzilla.suse.com/show_bug.cgi?id=1225820

* https://bugzilla.suse.com/show_bug.cgi?id=1225823

* https://bugzilla.suse.com/show_bug.cgi?id=1225827

* https://bugzilla.suse.com/show_bug.cgi?id=1225834

* https://bugzilla.suse.com/show_bug.cgi?id=1225866

* https://bugzilla.suse.com/show_bug.cgi?id=1225872

* https://bugzilla.suse.com/show_bug.cgi?id=1225898

* https://bugzilla.suse.com/show_bug.cgi?id=1225903

* https://bugzilla.suse.com/show_bug.cgi?id=1226022

* https://bugzilla.suse.com/show_bug.cgi?id=1226131

* https://bugzilla.suse.com/show_bug.cgi?id=1226145

* https://bugzilla.suse.com/show_bug.cgi?id=1226149

* https://bugzilla.suse.com/show_bug.cgi?id=1226155

* https://bugzilla.suse.com/show_bug.cgi?id=1226158

* https://bugzilla.suse.com/show_bug.cgi?id=1226163

* https://bugzilla.suse.com/show_bug.cgi?id=1226211

* https://bugzilla.suse.com/show_bug.cgi?id=1226212

* https://bugzilla.suse.com/show_bug.cgi?id=1226226

* https://bugzilla.suse.com/show_bug.cgi?id=1226457

* https://bugzilla.suse.com/show_bug.cgi?id=1226503

* https://bugzilla.suse.com/show_bug.cgi?id=1226513

* https://bugzilla.suse.com/show_bug.cgi?id=1226514

* https://bugzilla.suse.com/show_bug.cgi?id=1226520

* https://bugzilla.suse.com/show_bug.cgi?id=1226582

* https://bugzilla.suse.com/show_bug.cgi?id=1226587

* https://bugzilla.suse.com/show_bug.cgi?id=1226588

* https://bugzilla.suse.com/show_bug.cgi?id=1226592

* https://bugzilla.suse.com/show_bug.cgi?id=1226593

* https://bugzilla.suse.com/show_bug.cgi?id=1226594

* https://bugzilla.suse.com/show_bug.cgi?id=1226595

* https://bugzilla.suse.com/show_bug.cgi?id=1226597

* https://bugzilla.suse.com/show_bug.cgi?id=1226607

* https://bugzilla.suse.com/show_bug.cgi?id=1226608

* https://bugzilla.suse.com/show_bug.cgi?id=1226610

* https://bugzilla.suse.com/show_bug.cgi?id=1226612

* https://bugzilla.suse.com/show_bug.cgi?id=1226613

* https://bugzilla.suse.com/show_bug.cgi?id=1226630

* https://bugzilla.suse.com/show_bug.cgi?id=1226632

* https://bugzilla.suse.com/show_bug.cgi?id=1226633

* https://bugzilla.suse.com/show_bug.cgi?id=1226634

* https://bugzilla.suse.com/show_bug.cgi?id=1226637

* https://bugzilla.suse.com/show_bug.cgi?id=1226657

* https://bugzilla.suse.com/show_bug.cgi?id=1226658

* https://bugzilla.suse.com/show_bug.cgi?id=1226734

* https://bugzilla.suse.com/show_bug.cgi?id=1226735

* https://bugzilla.suse.com/show_bug.cgi?id=1226737

* https://bugzilla.suse.com/show_bug.cgi?id=1226738

* https://bugzilla.suse.com/show_bug.cgi?id=1226739

* https://bugzilla.suse.com/show_bug.cgi?id=1226740

* https://bugzilla.suse.com/show_bug.cgi?id=1226741

* https://bugzilla.suse.com/show_bug.cgi?id=1226742

* https://bugzilla.suse.com/show_bug.cgi?id=1226744

* https://bugzilla.suse.com/show_bug.cgi?id=1226746

* https://bugzilla.suse.com/show_bug.cgi?id=1226747

* https://bugzilla.suse.com/show_bug.cgi?id=1226749

* https://bugzilla.suse.com/show_bug.cgi?id=1226754

* https://bugzilla.suse.com/show_bug.cgi?id=1226758

* https://bugzilla.suse.com/show_bug.cgi?id=1226760

* https://bugzilla.suse.com/show_bug.cgi?id=1226761

* https://bugzilla.suse.com/show_bug.cgi?id=1226764

* https://bugzilla.suse.com/show_bug.cgi?id=1226767

* https://bugzilla.suse.com/show_bug.cgi?id=1226768

* https://bugzilla.suse.com/show_bug.cgi?id=1226769

* https://bugzilla.suse.com/show_bug.cgi?id=1226771

* https://bugzilla.suse.com/show_bug.cgi?id=1226772

* https://bugzilla.suse.com/show_bug.cgi?id=1226774

* https://bugzilla.suse.com/show_bug.cgi?id=1226775

* https://bugzilla.suse.com/show_bug.cgi?id=1226776

* https://bugzilla.suse.com/show_bug.cgi?id=1226777

* https://bugzilla.suse.com/show_bug.cgi?id=1226780

* https://bugzilla.suse.com/show_bug.cgi?id=1226781

* https://bugzilla.suse.com/show_bug.cgi?id=1226786

* https://bugzilla.suse.com/show_bug.cgi?id=1226788

* https://bugzilla.suse.com/show_bug.cgi?id=1226789

* https://bugzilla.suse.com/show_bug.cgi?id=1226790

* https://bugzilla.suse.com/show_bug.cgi?id=1226791

* https://bugzilla.suse.com/show_bug.cgi?id=1226796

* https://bugzilla.suse.com/show_bug.cgi?id=1226799

* https://bugzilla.suse.com/show_bug.cgi?id=1226837

* https://bugzilla.suse.com/show_bug.cgi?id=1226839

* https://bugzilla.suse.com/show_bug.cgi?id=1226840

* https://bugzilla.suse.com/show_bug.cgi?id=1226841

* https://bugzilla.suse.com/show_bug.cgi?id=1226842

* https://bugzilla.suse.com/show_bug.cgi?id=1226844

* https://bugzilla.suse.com/show_bug.cgi?id=1226848

* https://bugzilla.suse.com/show_bug.cgi?id=1226852

* https://bugzilla.suse.com/show_bug.cgi?id=1226856

* https://bugzilla.suse.com/show_bug.cgi?id=1226857

* https://bugzilla.suse.com/show_bug.cgi?id=1226859

* https://bugzilla.suse.com/show_bug.cgi?id=1226861

* https://bugzilla.suse.com/show_bug.cgi?id=1226863

* https://bugzilla.suse.com/show_bug.cgi?id=1226864

* https://bugzilla.suse.com/show_bug.cgi?id=1226867

* https://bugzilla.suse.com/show_bug.cgi?id=1226868

* https://bugzilla.suse.com/show_bug.cgi?id=1226875

* https://bugzilla.suse.com/show_bug.cgi?id=1226876

* https://bugzilla.suse.com/show_bug.cgi?id=1226878

* https://bugzilla.suse.com/show_bug.cgi?id=1226879

* https://bugzilla.suse.com/show_bug.cgi?id=1226886

* https://bugzilla.suse.com/show_bug.cgi?id=1226890

* https://bugzilla.suse.com/show_bug.cgi?id=1226891

* https://bugzilla.suse.com/show_bug.cgi?id=1226894

* https://bugzilla.suse.com/show_bug.cgi?id=1226895

* https://bugzilla.suse.com/show_bug.cgi?id=1226905

* https://bugzilla.suse.com/show_bug.cgi?id=1226908

* https://bugzilla.suse.com/show_bug.cgi?id=1226909

* https://bugzilla.suse.com/show_bug.cgi?id=1226911

* https://bugzilla.suse.com/show_bug.cgi?id=1226928

* https://bugzilla.suse.com/show_bug.cgi?id=1226934

* https://bugzilla.suse.com/show_bug.cgi?id=1226938

* https://bugzilla.suse.com/show_bug.cgi?id=1226939

* https://bugzilla.suse.com/show_bug.cgi?id=1226941

* https://bugzilla.suse.com/show_bug.cgi?id=1226948

* https://bugzilla.suse.com/show_bug.cgi?id=1226949

* https://bugzilla.suse.com/show_bug.cgi?id=1226950

* https://bugzilla.suse.com/show_bug.cgi?id=1226962

* https://bugzilla.suse.com/show_bug.cgi?id=1226976

* https://bugzilla.suse.com/show_bug.cgi?id=1226989

* https://bugzilla.suse.com/show_bug.cgi?id=1226990

* https://bugzilla.suse.com/show_bug.cgi?id=1226992

* https://bugzilla.suse.com/show_bug.cgi?id=1226994

* https://bugzilla.suse.com/show_bug.cgi?id=1226995

* https://bugzilla.suse.com/show_bug.cgi?id=1226996

* https://bugzilla.suse.com/show_bug.cgi?id=1227066

* https://bugzilla.suse.com/show_bug.cgi?id=1227072

* https://bugzilla.suse.com/show_bug.cgi?id=1227085

* https://bugzilla.suse.com/show_bug.cgi?id=1227089

* https://bugzilla.suse.com/show_bug.cgi?id=1227090

* https://bugzilla.suse.com/show_bug.cgi?id=1227096

* https://bugzilla.suse.com/show_bug.cgi?id=1227101

* https://bugzilla.suse.com/show_bug.cgi?id=1227190

* https://jira.suse.com/browse/PED-8491

* https://jira.suse.com/browse/PED-8570

* https://jira.suse.com/browse/PED-8688

Severity
Announcement ID: SUSE-SU-2024:2571-1
Rating: important

Related News