# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:3209-1  
Rating: important  
References:

  * bsc#1193629
  * bsc#1194111
  * bsc#1194765
  * bsc#1194869
  * bsc#1196261
  * bsc#1196516
  * bsc#1196894
  * bsc#1198017
  * bsc#1203329
  * bsc#1203330
  * bsc#1203360
  * bsc#1205462
  * bsc#1206006
  * bsc#1206258
  * bsc#1206843
  * bsc#1207158
  * bsc#1208783
  * bsc#1210644
  * bsc#1213580
  * bsc#1213632
  * bsc#1214285
  * bsc#1216834
  * bsc#1220428
  * bsc#1220877
  * bsc#1220962
  * bsc#1221269
  * bsc#1221326
  * bsc#1221630
  * bsc#1221645
  * bsc#1222335
  * bsc#1222350
  * bsc#1222372
  * bsc#1222387
  * bsc#1222634
  * bsc#1222808
  * bsc#1222967
  * bsc#1223074
  * bsc#1223191
  * bsc#1223508
  * bsc#1223720
  * bsc#1223742
  * bsc#1223777
  * bsc#1223803
  * bsc#1223807
  * bsc#1224105
  * bsc#1224415
  * bsc#1224496
  * bsc#1224510
  * bsc#1224542
  * bsc#1224578
  * bsc#1224639
  * bsc#1225162
  * bsc#1225352
  * bsc#1225428
  * bsc#1225524
  * bsc#1225578
  * bsc#1225582
  * bsc#1225773
  * bsc#1225814
  * bsc#1225827
  * bsc#1225832
  * bsc#1225903
  * bsc#1226168
  * bsc#1226530
  * bsc#1226613
  * bsc#1226742
  * bsc#1226765
  * bsc#1226798
  * bsc#1226801
  * bsc#1226874
  * bsc#1226885
  * bsc#1227079
  * bsc#1227623
  * bsc#1227761
  * bsc#1227830
  * bsc#1227863
  * bsc#1227867
  * bsc#1227929
  * bsc#1227937
  * bsc#1227958
  * bsc#1228020
  * bsc#1228065
  * bsc#1228114
  * bsc#1228410
  * bsc#1228426
  * bsc#1228427
  * bsc#1228429
  * bsc#1228446
  * bsc#1228447
  * bsc#1228449
  * bsc#1228450
  * bsc#1228452
  * bsc#1228456
  * bsc#1228463
  * bsc#1228466
  * bsc#1228467
  * bsc#1228469
  * bsc#1228480
  * bsc#1228481
  * bsc#1228482
  * bsc#1228483
  * bsc#1228484
  * bsc#1228485
  * bsc#1228487
  * bsc#1228489
  * bsc#1228491
  * bsc#1228493
  * bsc#1228494
  * bsc#1228495
  * bsc#1228496
  * bsc#1228501
  * bsc#1228503
  * bsc#1228509
  * bsc#1228513
  * bsc#1228515
  * bsc#1228516
  * bsc#1228526
  * bsc#1228531
  * bsc#1228563
  * bsc#1228564
  * bsc#1228567
  * bsc#1228576
  * bsc#1228579
  * bsc#1228584
  * bsc#1228588
  * bsc#1228590
  * bsc#1228615
  * bsc#1228616
  * bsc#1228635
  * bsc#1228636
  * bsc#1228654
  * bsc#1228656
  * bsc#1228658
  * bsc#1228660
  * bsc#1228662
  * bsc#1228667
  * bsc#1228673
  * bsc#1228677
  * bsc#1228687
  * bsc#1228706
  * bsc#1228708
  * bsc#1228710
  * bsc#1228718
  * bsc#1228720
  * bsc#1228721
  * bsc#1228722
  * bsc#1228724
  * bsc#1228726
  * bsc#1228727
  * bsc#1228733
  * bsc#1228748
  * bsc#1228766
  * bsc#1228779
  * bsc#1228801
  * bsc#1228850
  * bsc#1228857
  * bsc#1228959
  * bsc#1228964
  * bsc#1228966
  * bsc#1228967
  * bsc#1228979
  * bsc#1228988
  * bsc#1228989
  * bsc#1228991
  * bsc#1228992
  * bsc#1229042
  * bsc#1229054
  * bsc#1229086
  * bsc#1229136
  * bsc#1229154
  * bsc#1229187
  * bsc#1229188
  * bsc#1229190
  * bsc#1229287
  * bsc#1229290
  * bsc#1229292
  * bsc#1229296
  * bsc#1229297
  * bsc#1229301
  * bsc#1229303
  * bsc#1229304
  * bsc#1229305
  * bsc#1229307
  * bsc#1229309
  * bsc#1229312
  * bsc#1229314
  * bsc#1229315
  * bsc#1229317
  * bsc#1229318
  * bsc#1229319
  * bsc#1229327
  * bsc#1229341
  * bsc#1229345
  * bsc#1229346
  * bsc#1229347
  * bsc#1229349
  * bsc#1229350
  * bsc#1229351
  * bsc#1229354
  * bsc#1229356
  * bsc#1229357
  * bsc#1229358
  * bsc#1229359
  * bsc#1229360
  * bsc#1229366
  * bsc#1229370
  * bsc#1229373
  * bsc#1229374
  * bsc#1229381
  * bsc#1229382
  * bsc#1229383
  * bsc#1229386
  * bsc#1229388
  * bsc#1229391
  * bsc#1229392
  * bsc#1229395
  * bsc#1229398
  * bsc#1229399
  * bsc#1229400
  * bsc#1229407
  * bsc#1229409
  * bsc#1229410
  * bsc#1229411
  * bsc#1229413
  * bsc#1229414
  * bsc#1229417
  * bsc#1229418
  * bsc#1229444
  * bsc#1229453
  * bsc#1229454
  * bsc#1229481
  * bsc#1229482
  * bsc#1229488
  * bsc#1229489
  * bsc#1229490
  * bsc#1229493
  * bsc#1229495
  * bsc#1229497
  * bsc#1229500
  * bsc#1229503
  * bsc#1229506
  * bsc#1229507
  * bsc#1229508
  * bsc#1229509
  * bsc#1229510
  * bsc#1229512
  * bsc#1229516
  * bsc#1229521
  * bsc#1229522
  * bsc#1229523
  * bsc#1229524
  * bsc#1229525
  * bsc#1229526
  * bsc#1229527
  * bsc#1229528
  * bsc#1229529
  * bsc#1229531
  * bsc#1229533
  * bsc#1229535
  * bsc#1229536
  * bsc#1229537
  * bsc#1229540
  * bsc#1229544
  * bsc#1229545
  * bsc#1229546
  * bsc#1229547
  * bsc#1229548
  * bsc#1229554
  * bsc#1229557
  * bsc#1229558
  * bsc#1229559
  * bsc#1229560
  * bsc#1229562
  * bsc#1229564
  * bsc#1229565
  * bsc#1229566
  * bsc#1229568
  * bsc#1229569
  * bsc#1229572
  * bsc#1229573
  * bsc#1229576
  * bsc#1229581
  * bsc#1229588
  * bsc#1229598
  * bsc#1229603
  * bsc#1229604
  * bsc#1229605
  * bsc#1229608
  * bsc#1229611
  * bsc#1229612
  * bsc#1229613
  * bsc#1229614
  * bsc#1229615
  * bsc#1229616
  * bsc#1229617
  * bsc#1229620
  * bsc#1229622
  * bsc#1229623
  * bsc#1229624
  * bsc#1229625
  * bsc#1229626
  * bsc#1229628
  * bsc#1229629
  * bsc#1229630
  * bsc#1229631
  * bsc#1229632
  * bsc#1229635
  * bsc#1229636
  * bsc#1229637
  * bsc#1229638
  * bsc#1229639
  * bsc#1229641
  * bsc#1229642
  * bsc#1229643
  * bsc#1229645
  * bsc#1229657
  * bsc#1229658
  * bsc#1229662
  * bsc#1229664
  * bsc#1229707
  * bsc#1229739
  * bsc#1229743
  * bsc#1229746
  * bsc#1229754
  * bsc#1229755
  * bsc#1229756
  * bsc#1229759
  * bsc#1229761
  * bsc#1229767
  * bsc#1229768
  * bsc#1229781
  * bsc#1229784
  * bsc#1229787
  * bsc#1229788
  * bsc#1229789
  * bsc#1229792
  * bsc#1229820
  * jsc#PED-8491
  * jsc#PED-8779

  
Cross-References:

  * CVE-2021-4441
  * CVE-2021-47106
  * CVE-2021-47517
  * CVE-2021-47546
  * CVE-2022-38457
  * CVE-2022-40133
  * CVE-2022-48645
  * CVE-2022-48706
  * CVE-2022-48808
  * CVE-2022-48865
  * CVE-2022-48868
  * CVE-2022-48869
  * CVE-2022-48870
  * CVE-2022-48871
  * CVE-2022-48872
  * CVE-2022-48873
  * CVE-2022-48875
  * CVE-2022-48878
  * CVE-2022-48880
  * CVE-2022-48881
  * CVE-2022-48882
  * CVE-2022-48883
  * CVE-2022-48884
  * CVE-2022-48885
  * CVE-2022-48886
  * CVE-2022-48887
  * CVE-2022-48888
  * CVE-2022-48889
  * CVE-2022-48890
  * CVE-2022-48891
  * CVE-2022-48893
  * CVE-2022-48896
  * CVE-2022-48898
  * CVE-2022-48899
  * CVE-2022-48903
  * CVE-2022-48904
  * CVE-2022-48905
  * CVE-2022-48906
  * CVE-2022-48907
  * CVE-2022-48909
  * CVE-2022-48910
  * CVE-2022-48912
  * CVE-2022-48913
  * CVE-2022-48914
  * CVE-2022-48915
  * CVE-2022-48916
  * CVE-2022-48917
  * CVE-2022-48918
  * CVE-2022-48919
  * CVE-2022-48920
  * CVE-2022-48921
  * CVE-2022-48923
  * CVE-2022-48924
  * CVE-2022-48925
  * CVE-2022-48926
  * CVE-2022-48927
  * CVE-2022-48928
  * CVE-2022-48929
  * CVE-2022-48930
  * CVE-2022-48931
  * CVE-2022-48932
  * CVE-2022-48934
  * CVE-2022-48937
  * CVE-2022-48938
  * CVE-2022-48939
  * CVE-2022-48940
  * CVE-2022-48941
  * CVE-2022-48942
  * CVE-2022-48943
  * CVE-2023-3610
  * CVE-2023-52458
  * CVE-2023-52489
  * CVE-2023-52498
  * CVE-2023-52581
  * CVE-2023-52859
  * CVE-2023-52887
  * CVE-2023-52889
  * CVE-2023-52893
  * CVE-2023-52894
  * CVE-2023-52896
  * CVE-2023-52898
  * CVE-2023-52899
  * CVE-2023-52900
  * CVE-2023-52901
  * CVE-2023-52904
  * CVE-2023-52905
  * CVE-2023-52906
  * CVE-2023-52907
  * CVE-2023-52908
  * CVE-2023-52909
  * CVE-2023-52910
  * CVE-2023-52911
  * CVE-2023-52912
  * CVE-2023-52913
  * CVE-2024-26631
  * CVE-2024-26668
  * CVE-2024-26669
  * CVE-2024-26677
  * CVE-2024-26735
  * CVE-2024-26808
  * CVE-2024-26812
  * CVE-2024-26835
  * CVE-2024-26851
  * CVE-2024-27010
  * CVE-2024-27011
  * CVE-2024-27016
  * CVE-2024-27024
  * CVE-2024-27079
  * CVE-2024-27403
  * CVE-2024-31076
  * CVE-2024-35897
  * CVE-2024-35902
  * CVE-2024-35945
  * CVE-2024-35971
  * CVE-2024-36009
  * CVE-2024-36013
  * CVE-2024-36270
  * CVE-2024-36286
  * CVE-2024-36489
  * CVE-2024-36929
  * CVE-2024-36933
  * CVE-2024-36936
  * CVE-2024-36962
  * CVE-2024-38554
  * CVE-2024-38602
  * CVE-2024-38662
  * CVE-2024-39489
  * CVE-2024-40905
  * CVE-2024-40978
  * CVE-2024-40980
  * CVE-2024-40995
  * CVE-2024-41000
  * CVE-2024-41007
  * CVE-2024-41009
  * CVE-2024-41011
  * CVE-2024-41016
  * CVE-2024-41020
  * CVE-2024-41022
  * CVE-2024-41035
  * CVE-2024-41036
  * CVE-2024-41038
  * CVE-2024-41039
  * CVE-2024-41042
  * CVE-2024-41045
  * CVE-2024-41056
  * CVE-2024-41060
  * CVE-2024-41062
  * CVE-2024-41065
  * CVE-2024-41068
  * CVE-2024-41073
  * CVE-2024-41079
  * CVE-2024-41080
  * CVE-2024-41087
  * CVE-2024-41088
  * CVE-2024-41089
  * CVE-2024-41092
  * CVE-2024-41093
  * CVE-2024-41095
  * CVE-2024-41097
  * CVE-2024-41098
  * CVE-2024-42069
  * CVE-2024-42074
  * CVE-2024-42076
  * CVE-2024-42077
  * CVE-2024-42080
  * CVE-2024-42082
  * CVE-2024-42085
  * CVE-2024-42086
  * CVE-2024-42087
  * CVE-2024-42089
  * CVE-2024-42090
  * CVE-2024-42092
  * CVE-2024-42095
  * CVE-2024-42097
  * CVE-2024-42098
  * CVE-2024-42101
  * CVE-2024-42104
  * CVE-2024-42106
  * CVE-2024-42107
  * CVE-2024-42110
  * CVE-2024-42114
  * CVE-2024-42115
  * CVE-2024-42119
  * CVE-2024-42120
  * CVE-2024-42121
  * CVE-2024-42126
  * CVE-2024-42127
  * CVE-2024-42130
  * CVE-2024-42137
  * CVE-2024-42139
  * CVE-2024-42142
  * CVE-2024-42143
  * CVE-2024-42148
  * CVE-2024-42152
  * CVE-2024-42155
  * CVE-2024-42156
  * CVE-2024-42157
  * CVE-2024-42158
  * CVE-2024-42162
  * CVE-2024-42223
  * CVE-2024-42225
  * CVE-2024-42228
  * CVE-2024-42229
  * CVE-2024-42230
  * CVE-2024-42232
  * CVE-2024-42236
  * CVE-2024-42237
  * CVE-2024-42238
  * CVE-2024-42239
  * CVE-2024-42240
  * CVE-2024-42244
  * CVE-2024-42246
  * CVE-2024-42247
  * CVE-2024-42268
  * CVE-2024-42271
  * CVE-2024-42274
  * CVE-2024-42276
  * CVE-2024-42277
  * CVE-2024-42280
  * CVE-2024-42281
  * CVE-2024-42283
  * CVE-2024-42284
  * CVE-2024-42285
  * CVE-2024-42286
  * CVE-2024-42287
  * CVE-2024-42288
  * CVE-2024-42289
  * CVE-2024-42291
  * CVE-2024-42292
  * CVE-2024-42295
  * CVE-2024-42301
  * CVE-2024-42302
  * CVE-2024-42308
  * CVE-2024-42309
  * CVE-2024-42310
  * CVE-2024-42311
  * CVE-2024-42312
  * CVE-2024-42313
  * CVE-2024-42315
  * CVE-2024-42318
  * CVE-2024-42319
  * CVE-2024-42320
  * CVE-2024-42322
  * CVE-2024-43816
  * CVE-2024-43818
  * CVE-2024-43819
  * CVE-2024-43821
  * CVE-2024-43823
  * CVE-2024-43829
  * CVE-2024-43830
  * CVE-2024-43831
  * CVE-2024-43834
  * CVE-2024-43837
  * CVE-2024-43839
  * CVE-2024-43841
  * CVE-2024-43842
  * CVE-2024-43846
  * CVE-2024-43849
  * CVE-2024-43853
  * CVE-2024-43854
  * CVE-2024-43856
  * CVE-2024-43858
  * CVE-2024-43860
  * CVE-2024-43861
  * CVE-2024-43863
  * CVE-2024-43866
  * CVE-2024-43867
  * CVE-2024-43871
  * CVE-2024-43872
  * CVE-2024-43873
  * CVE-2024-43879
  * CVE-2024-43880
  * CVE-2024-43882
  * CVE-2024-43883
  * CVE-2024-43884
  * CVE-2024-43889
  * CVE-2024-43892
  * CVE-2024-43893
  * CVE-2024-43894
  * CVE-2024-43895
  * CVE-2024-43899
  * CVE-2024-43900
  * CVE-2024-43902
  * CVE-2024-43903
  * CVE-2024-43904
  * CVE-2024-43905
  * CVE-2024-43907
  * CVE-2024-43908
  * CVE-2024-43909
  * CVE-2024-44938
  * CVE-2024-44939
  * CVE-2024-44947

  
CVSS scores:

  * CVE-2021-4441 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47106 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2021-47517 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
  * CVE-2021-47546 ( SUSE ):  2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47546 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-38457 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-38457 ( NVD ):  6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H
  * CVE-2022-40133 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-40133 ( NVD ):  6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H
  * CVE-2022-48645 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48706 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2022-48808 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48808 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48865 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48865 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48868 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48868 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48869 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48869 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48870 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48870 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48871 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2022-48871 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2022-48872 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48872 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48873 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48873 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48875 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48875 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48878 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48878 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2022-48878 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48880 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-48880 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2022-48881 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-48881 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2022-48881 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2022-48882 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48882 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48882 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48883 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48883 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48884 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48884 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48885 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-48885 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2022-48885 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48886 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48886 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48887 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48887 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48888 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48888 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48889 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48889 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48890 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48890 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48891 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48891 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48893 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48893 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48896 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48898 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48899 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48903 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48904 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48905 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48906 ( SUSE ):  4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
  * CVE-2022-48907 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48909 ( SUSE ):  5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48910 ( SUSE ):  5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48912 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48912 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48913 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48913 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48914 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48915 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48915 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48916 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48917 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48918 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48918 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48919 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48919 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48919 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48920 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48920 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48921 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48923 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48923 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48924 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48924 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48925 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48925 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48926 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48926 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48927 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48927 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48928 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48928 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48929 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48929 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48930 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48930 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48931 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48931 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48932 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48932 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48934 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48934 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48937 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48937 ( NVD ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48938 ( SUSE ):  5.4
    CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48938 ( SUSE ):  6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48938 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48939 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48939 ( NVD ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48940 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48940 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48941 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48941 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48942 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48942 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48943 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48943 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-3610 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-3610 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52458 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52458 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52489 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52498 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52581 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52859 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52887 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2023-52887 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2023-52889 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52889 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52893 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52894 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-52894 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52896 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52898 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-52898 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52899 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-52899 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52900 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-52900 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52901 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52904 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52905 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52906 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52907 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52908 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52909 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52910 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52911 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52912 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-52912 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52913 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26631 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26668 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26669 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26677 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26735 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26808 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26812 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26835 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-26851 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27010 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27011 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27016 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27016 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27024 ( SUSE ):  4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-27079 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27403 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-31076 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35897 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35945 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35971 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36009 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36013 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36270 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36270 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36286 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-36489 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36489 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36929 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36933 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-36936 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-36962 ( SUSE ):  6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38554 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38554 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38602 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38602 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38662 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38662 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-39489 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-39489 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40905 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40978 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40980 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40980 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40995 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40995 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41000 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41000 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41007 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-41007 ( NVD ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-41009 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41009 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41011 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41011 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41016 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-41020 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-41020 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-41022 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-41022 ( SUSE ):  6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-41035 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41036 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41036 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41038 ( SUSE ):  6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
  * CVE-2024-41038 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41039 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-41039 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41042 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41045 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41056 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41060 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-41060 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41060 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41062 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-41062 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41065 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-41065 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41068 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-41073 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41073 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41079 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41080 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41080 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41087 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41087 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41088 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41088 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41089 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41089 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41092 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41092 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41093 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41093 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41095 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41095 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41097 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41097 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41098 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41098 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42069 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42069 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42074 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42074 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42076 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42076 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42077 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42077 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42080 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42080 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42082 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42082 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42085 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42085 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42086 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-42086 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-42087 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-42089 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42090 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42090 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42092 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42095 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42097 ( SUSE ):  2.4
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-42097 ( SUSE ):  2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
  * CVE-2024-42098 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42101 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42101 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42104 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-42104 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-42104 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-42106 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42107 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42110 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42114 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42114 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42115 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-42115 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42119 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42120 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42121 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42126 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42127 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42130 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-42130 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-42137 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42139 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42142 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42143 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-42143 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-42148 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42148 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-42152 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42152 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42155 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-42155 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-42155 ( NVD ):  1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-42156 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42156 ( NVD ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-42157 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42157 ( NVD ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-42158 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42158 ( NVD ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-42162 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42162 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-42223 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42223 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42225 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42225 ( NVD ):  7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-42228 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42228 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-42229 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-42229 ( NVD ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-42230 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-42230 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42230 ( NVD ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42232 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-42232 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-42232 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42236 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-42236 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-42236 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42237 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42237 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42238 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42238 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42239 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42239 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42240 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-42240 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42240 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42244 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-42244 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42244 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42246 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42246 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42247 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42247 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42268 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-42268 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42271 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-42271 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-42271 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-42274 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-42274 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42276 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-42276 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42277 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-42277 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42277 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42280 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42280 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-42281 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42283 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42283 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42284 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42284 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-42285 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42285 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-42286 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42286 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42287 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42287 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42288 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42288 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42289 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42289 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42291 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42292 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42295 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42301 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-42301 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-42302 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42302 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-42308 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42308 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42309 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42309 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42310 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42310 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42311 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-42311 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42312 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42313 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42313 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-42315 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42315 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42318 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42319 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42320 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42322 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43816 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43818 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43818 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43819 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43819 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43821 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43821 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43823 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43823 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43829 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43830 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43831 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43834 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43837 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43837 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43839 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43841 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43842 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43846 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43849 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43853 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43853 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43854 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43854 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43856 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43856 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43858 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43858 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-43860 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43860 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43861 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43861 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43863 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43863 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43866 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43867 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43871 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43871 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43872 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43872 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43873 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43873 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-43879 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43880 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43882 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-43882 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-43883 ( SUSE ):  5.4
    CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-43883 ( SUSE ):  6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-43884 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-43884 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43884 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43889 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-43889 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43889 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43892 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-43892 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43892 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43893 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-43893 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43893 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43894 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-43894 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43894 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43895 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-43895 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43895 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43899 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43899 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43900 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-43900 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-43902 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-43902 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43902 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43903 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-43903 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43903 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43904 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-43904 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43904 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43905 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-43905 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43905 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43907 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-43907 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43907 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43908 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-43908 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43908 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43909 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-43909 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43909 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44938 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-44938 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-44939 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-44939 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44947 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
  * CVE-2024-44947 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

  
Affected Products:

  * openSUSE Leap 15.5
  * openSUSE Leap Micro 5.5
  * SUSE Linux Enterprise High Performance Computing 15 SP5
  * SUSE Linux Enterprise Live Patching 15-SP5
  * SUSE Linux Enterprise Micro 5.5
  * SUSE Linux Enterprise Real Time 15 SP5
  * SUSE Linux Enterprise Server 15 SP5
  * SUSE Linux Enterprise Server for SAP Applications 15 SP5
  * SUSE Real Time Module 15-SP5

  
  
An update that solves 292 vulnerabilities, contains two features and has 45
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

  * CVE-2024-44947: Initialize beyond-EOF page contents before setting uptodate
    (bsc#1229454).
  * CVE-2024-36936: Touch soft lockup during memory accept (bsc#1225773).
  * CVE-2022-48706: Do proper cleanup if IFCVF init fails (bsc#1225524).
  * CVE-2024-43883: Do not drop references before new references are gained
    (bsc#1229707).
  * CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
  * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500).
  * CVE-2023-52489: Fix race in accessing memory_section->usage (bsc#1221326).
  * CVE-2024-43893: Check uartclk for zero to avoid divide by zero
    (bsc#1229759).
  * CVE-2024-43821: Fix a possible null pointer dereference (bsc#1229315).
  * CVE-2024-43900: Avoid use-after-free in load_firmware_cb() (bsc#1229756).
  * CVE-2024-44938: Fix shift-out-of-bounds in dbDiscardAG (bsc#1229792).
  * CVE-2024-44939: Fix null ptr deref in dtInsertEntry (bsc#1229820).
  * CVE-2024-41087: Fix double free on error (bsc#1228466).
  * CVE-2024-42277: Avoid NULL deref in sprd_iommu_hw_en (bsc#1229409).
  * CVE-2024-43902: Add null checker before passing variables (bsc#1229767).
  * CVE-2024-43904: Add null checks for 'stream' and 'plane' before
    dereferencing (bsc#1229768)
  * CVE-2024-43880: Put back removed metod in struct objagg_ops (bsc#1229481).
  * CVE-2024-43884: Add error handling to pair_device() (bsc#1229739)
  * CVE-2024-43899: Fix null pointer deref in dcn20_resource.c (bsc#1229754).
  * CVE-2022-48920: Get rid of warning on transaction commit when using
    flushoncommit (bsc#1229658).
  * CVE-2023-52906: Fix warning during failed attribute validation
    (bsc#1229527).
  * CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage.
    (bsc#1229503)
  * CVE-2024-43866: Always drain health in shutdown callback (bsc#1229495).
  * CVE-2024-26812: struct virqfd kABI workaround (bsc#1222808).
  * CVE-2022-48912: Fix use-after-free in __nf_register_net_hook() (bsc#1229641)
  * CVE-2024-27010: Fix mirred deadlock on device recursion (bsc#1223720).
  * CVE-2022-48906: Correctly set DATA_FIN timeout when number of retransmits is
    large (bsc#1229605)
  * CVE-2024-42155: Wipe copies of protected- and secure-keys (bsc#1228733).
  * CVE-2024-42156: Wipe copies of clear-key structures on failure
    (bsc#1228722).
  * CVE-2023-52899: Add exception protection processing for vd in
    axi_chan_handle_err function (bsc#1229569).
  * CVE-2024-42158: Use kfree_sensitive() to fix Coccinelle warnings
    (bsc#1228720).
  * CVE-2024-26631: Fix data-race in ipv6_mc_down / mld_ifc_work (bsc#1221630).
  * CVE-2024-43873: Always initialize seqpacket_allow (bsc#1229488)
  * CVE-2024-40905: Fix possible race in __fib6_drop_pcpu_from() (bsc#1227761)
  * CVE-2024-39489: Fix memleak in seg6_hmac_init_algo (bsc#1227623)
  * CVE-2021-47106: Fix use-after-free in nft_set_catchall_destroy()
    (bsc#1220962)
  * CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool
    (bsc#1225428).
  * CVE-2024-36489: Fix missing memory barrier in tls_init (bsc#1226874)
  * CVE-2024-41020: Fix fcntl/close race recovery compat path (bsc#1228427).
  * CVE-2024-27079: Fix NULL domain on device release (bsc#1223742).
  * CVE-2024-35897: Discard table flag update with pending basechain deletion
    (bsc#1224510).
  * CVE-2024-27403: Restore const specifier in flow_offload_route_init()
    (bsc#1224415).
  * CVE-2024-27011: Fix memleak in map from abort path (bsc#1223803).
  * CVE-2024-43819: Reject memory region operations for ucontrol VMs
    (bsc#1229290).
  * CVE-2024-26668: Reject configurations that cause integer overflow
    (bsc#1222335).
  * CVE-2024-26835: Set dormant flag on hook register failure (bsc#1222967).
  * CVE-2024-26808: Handle NETDEV_UNREGISTER for inet/ingress basechain
    (bsc#1222634).
  * CVE-2024-27016: Validate pppoe header (bsc#1223807).
  * CVE-2024-35945: Prevent nullptr exceptions on ISR (bsc#1224639).
  * CVE-2023-52581: Fix memleak when more than 255 elements expired
    (bsc#1220877).
  * CVE-2024-36013: Fix slab-use-after-free in l2cap_connect() (bsc#1225578).
  * CVE-2024-43837: Fix updating attached freplace prog in prog_array map
    (bsc#1229297).
  * CVE-2024-42291: Add a per-VF limit on number of FDIR filters (bsc#1229374).
  * CVE-2024-42268: Fix missing lock on sync reset reload (bsc#1229391).
  * CVE-2024-43834: Fix invalid wait context of page_pool_destroy()
    (bsc#1229314)
  * CVE-2024-36286: Acquire rcu_read_lock() in instance_destroy_rcu()
    (bsc#1226801)
  * CVE-2024-26851: Add protection for bmp length out of range (bsc#1223074)
  * CVE-2024-42157: Wipe sensitive data on failure (bsc#1228727).
  * CVE-2024-26677: Blacklist e7870cf13d20 (" Fix delayed ACKs to not set the
    reference serial number") (bsc#1222387)
  * CVE-2024-36009: Blacklist 467324bcfe1a ("ax25: Fix netdev refcount issue")
    (bsc#1224542)
  * CVE-2023-52859: Fix use-after-free when register pmu fails (bsc#1225582).
  * CVE-2024-42280: Fix a use after free in hfcmulti_tx() (bsc#1229388)
  * CVE-2024-42284: Return non-zero value from tipc_udp_addr2str() on error
    (bsc#1229382)
  * CVE-2024-42283: Initialize all fields in dumped nexthops (bsc#1229383)
  * CVE-2024-42312: Always initialize i_uid/i_gid (bsc#1229357)
  * CVE-2024-43854: Initialize integrity buffer to zero before writing it to
    media (bsc#1229345)
  * CVE-2024-42322: Properly dereference pe in ip_vs_add_service (bsc#1229347)
  * CVE-2024-42301: Fix the array out-of-bounds risk (bsc#1229407).
  * CVE-2024-42318: Do not lose track of restrictions on cred_transfer
    (bsc#1229351).
  * CVE-2024-26669: Fix chain template offload (bsc#1222350).
  * CVE-2023-52889: Fix null pointer deref when receiving skb during sock
    creation (bsc#1229287).
  * CVE-2022-48645: Move enetc_set_psfp() out of the common enetc_set_features()
    (bsc#1223508).
  * CVE-2024-41007: Use signed arithmetic in tcp_rtx_probe0_timed_out()
    (bsc#1227863).
  * CVE-2024-36933: Use correct mac_offset to unwind gso skb in
    nsh_gso_segment() (bsc#1225832).
  * CVE-2024-42295: Handle inconsistent state in nilfs_btnode_create_block()
    (bsc#1229370).
  * CVE-2024-42319: Move devm_mbox_controller_register() after
    devm_pm_runtime_enable() (bsc#1229350).
  * CVE-2024-43860: Skip over memory region when node value is NULL
    (bsc#1229319).
  * CVE-2024-43831: Handle invalid decoder vsi (bsc#1229309).
  * CVE-2024-43849: Protect locator_addr with the main mutex (bsc#1229307).
  * CVE-2024-43841: Do not use strlen() in const context (bsc#1229304).
  * CVE-2024-43839: Adjust 'name' buf size of bna_tcb and bna_ccb structures
    (bsc#1229301).
  * CVE-2024-41088: Fix infinite loop when xmit fails (bsc#1228469).
  * CVE-2024-42281: Fix a segment issue when downgrading gso_size (bsc#1229386).
  * CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400)
  * CVE-2024-41080: Fix possible deadlock in io_register_iowq_max_workers()
    (bsc#1228616).
  * CVE-2024-42246: Remap EPERM in case of connection failure in
    xs_tcp_setup_socket (bsc#1228989).
  * CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop().
    (bsc#1228959)
  * CVE-2024-26735: Fix possible use-after-free and null-ptr-deref
    (bsc#1222372).
  * CVE-2024-42106: Initialize pad field in struct inet_diag_req_v2
    (bsc#1228493).
  * CVE-2024-38662: Cover verifier checks for mutating sockmap/sockhash
    (bsc#1226885).
  * CVE-2024-42110: Move ntb_netdev_rx_handler() to call netif_rx() from
    __netif_rx() (bsc#1228501).
  * CVE-2024-42247: Avoid unaligned 64-bit memory accesses (bsc#1228988).
  * CVE-2022-48865: Fix kernel panic when enabling bearer (bsc#1228065).
  * CVE-2023-52498: Fix possible deadlocks in core system-wide PM code
    (bsc#1221269).
  * CVE-2024-41068: Fix sclp_init() cleanup on failure (bsc#1228579).
  * CVE-2022-48808: Fix panic when DSA master device unbinds on shutdown
    (bsc#1227958).
  * CVE-2024-42095: Fix Errata i2310 with RX FIFO level check (bsc#1228446).
  * CVE-2024-40978: Fix crash while reading debugfs attribute (bsc#1227929).
  * CVE-2024-42107: Do not process extts if PTP is disabled (bsc#1228494).
  * CVE-2024-42139: Fix improper extts handling (bsc#1228503).
  * CVE-2024-42148: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487).
  * CVE-2024-42142: E-switch, Create ingress ACL when needed (bsc#1228491).
  * CVE-2024-42162: Account for stopped queues when reading NIC stats
    (bsc#1228706).
  * CVE-2024-42082: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482).
  * CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526).
  * CVE-2023-3610: Fixed use-after-free vulnerability in nf_tables can be
    exploited to achieve local privilege escalation (bsc#1213580).
  * CVE-2024-42228: Using uninitialized value *size when calling
    amdgpu_vce_cs_reloc (bsc#1228667).
  * CVE-2024-40995: Fix possible infinite loop in tcf_idr_check_alloc()
    (bsc#1227830).
  * CVE-2024-38602: Merge repeat codes in ax25_dev_device_down() (bsc#1226613).
  * CVE-2024-38554: Fix reference count leak issue of net_device (bsc#1226742).
  * CVE-2024-36929: Reject skb_copy(_expand) for fraglist GSO skbs
    (bsc#1225814).
  * CVE-2024-41009: Fix overrunning reservations in ringbuf (bsc#1228020).
  * CVE-2024-27024: Fix WARNING in rds_conn_connect_if_down (bsc#1223777).

The following non-security bugs were fixed:

  * ACPI: bus: Indicate support for IRQ ResourceSource thru _OSC (git-fixes).
  * ACPI: bus: Indicate support for the Generic Event Device thru _OSC (git-
    fixes).
  * ACPI: bus: Rework system-level device notification handling (git-fixes).
  * ACPI: thermal: Drop nocrt parameter (git-fixes).
  * ACPI: x86: s2idle: Post-increment variables when getting constraints (git-
    fixes).
  * afs: Do not cross .backup mountpoint from backup volume (git-fixes).
  * ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-
    fixes).
  * ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).
  * ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks
    (stable-fixes).
  * ALSA: hda/realtek: Fix noise from speakers on Lenovo IdeaPad 3 15IAU7 (git-
    fixes).
  * ALSA: line6: Fix racy access to midibuf (stable-fixes).
  * ALSA: timer: Relax start tick time check for slave timer elements (git-
    fixes).
  * ALSA: usb-audio: Add delay quirk for VIVO USB-C-XE710 HEADSET (stable-
    fixes).
  * ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).
  * ALSA: usb-audio: Support Yamaha P-125 quirk entry (stable-fixes).
  * ALSA: usb: Fix UBSAN warning in parse_audio_unit() (stable-fixes).
  * arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git-
    fixes)
  * arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git-
    fixes)
  * arm64: Add Neoverse-V2 part (git-fixes)
  * arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git-
    fixes)
  * arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git-
    fixes)
  * arm64: barrier: Restore spec_bar() macro (git-fixes)
  * arm64: cpufeature: Add missing .field_width for GIC system registers (git-
    fixes)
  * arm64: cpufeature: Fix the visibility of compat hwcaps (git-fixes)
  * arm64: cpufeature: Force HWCAP to be based on the sysreg visible to (git-
    fixes)
  * arm64: cputype: Add Cortex-A720 definitions (git-fixes)
  * arm64: cputype: Add Cortex-A725 definitions (git-fixes)
  * arm64: cputype: Add Cortex-X1C definitions (git-fixes)
  * arm64: cputype: Add Cortex-X3 definitions (git-fixes)
  * arm64: cputype: Add Cortex-X4 definitions (git-fixes)
  * arm64: cputype: Add Cortex-X925 definitions (git-fixes)
  * arm64: cputype: Add Neoverse-V3 definitions (git-fixes)
  * arm64: dts: rockchip: Increase VOP clk rate on RK3328 (git-fixes)
  * arm64: dts: rockchip: Increase VOP clk rate on RK3328 (git-fixes)
  * arm64: errata: Expand speculative SSBS workaround (again) (git-fixes)
  * arm64: errata: Expand speculative SSBS workaround (git-fixes)
  * arm64: errata: Unify speculative SSBS errata logic (git-fixes) Also update
    default configuration.
  * arm64: Fix KASAN random tag seed initialization (git-fixes)
  * arm64: Fix KASAN random tag seed initialization (git-fixes)
  * ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).
  * ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).
  * ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes).
  * async: Introduce async_schedule_dev_nocall() (bsc#1221269).
  * async: Split async_schedule_node_domain() (bsc#1221269).
  * Bluetooth: Fix usage of __hci_cmd_sync_status (git-fixes).
  * Bluetooth: hci_core: Fix not handling hibernation actions (git-fixes).
  * Bluetooth: l2cap: always unlock channel in l2cap_conless_channel() (git-
    fixes).
  * Bluetooth: L2CAP: Fix deadlock (git-fixes).
  * bpf: Fix a kernel verifier crash in stacksafe() (bsc#1225903).
  * bpf: kprobe: remove unused declaring of bpf_kprobe_override (git-fixes).
  * btrfs: fix leak of qgroup extent records after transaction abort (git-
    fixes).
  * btrfs: make btrfs_destroy_delayed_refs() return void (git-fixes).
  * btrfs: remove unnecessary prototype declarations at disk-io.c (git-fixes).
  * btrfs: sysfs: update fs features directory asynchronously (bsc#1226168).
  * cachefiles: propagate errors from vfs_getxattr() to avoid infinite loop
    (bsc#1229418).
  * ceph: issue a cap release immediately if no cap exists (bsc#1225162).
  * ceph: periodically flush the cap releases (bsc#1225162).
  * cpu/SMT: Enable SMT only if a core is online (bsc#1214285 bsc#1205462
    ltc#200161 ltc#200588 git-fixes).
  * cpuidle, ACPI: Evaluate LPI arch_flags for broadcast timer (git-fixes).
  * docs: KVM: Fix register ID of SPSR_FIQ (git-fixes).
  * drm: add missing MODULE_DESCRIPTION() macros (stable-fixes).
  * drm: panel-orientation-quirks: Add labels for both Valve Steam Deck
    revisions (stable-fixes).
  * drm: panel-orientation-quirks: Add quirk for Aya Neo KUN (stable-fixes).
  * drm: panel-orientation-quirks: Add quirk for Lenovo Yoga Tab 3 X90F (stable-
    fixes).
  * drm: panel-orientation-quirks: Add quirk for Nanote UMPC-01 (stable-fixes).
  * drm: panel-orientation-quirks: Add quirk for OrangePi Neo (stable-fixes).
  * drm/amd/amdgpu/imu_v11_0: Increase buffer size to ensure all possible values
    can be stored (stable-fixes).
  * drm/amd/display: Add NULL check for 'afb' before dereferencing in
    amdgpu_dm_plane_handle_cursor_update (stable-fixes).
  * drm/amd/display: avoid using null object of framebuffer (git-fixes).
  * drm/amd/display: Fix && vs || typos (git-fixes).
  * drm/amd/display: Skip Recompute DSC Params if no Stream on Link (stable-
    fixes).
  * drm/amd/display: Validate hw_points_num before using it (stable-fixes).
  * drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr (stable-
    fixes).
  * drm/amdgpu: Actually check flags for all context ops (stable-fixes).
  * drm/amdgpu: Add lock around VF RLCG interface (stable-fixes).
  * drm/amdgpu: fix dereference null return value for the function
    amdgpu_vm_pt_parent (stable-fixes).
  * drm/amdgpu: Fix the null pointer dereference to ras_manager (stable-fixes).
  * drm/amdgpu: Validate TA binary size (stable-fixes).
  * drm/amdgpu/jpeg2: properly set atomics vmid field (stable-fixes).
  * drm/amdgpu/pm: Fix the null pointer dereference for smu7 (stable-fixes).
  * drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules
    (stable-fixes).
  * drm/amdgpu/pm: Fix the param type of set_power_profile_mode (stable-fixes).
  * drm/bridge: analogix_dp: properly handle zero sized AUX transactions
    (stable-fixes).
  * drm/bridge: tc358768: Attempt to fix DSI horizontal timings (stable-fixes).
  * drm/client: fix null pointer dereference in drm_client_modeset_probe (git-
    fixes).
  * drm/dp_mst: Skip CSN if topology probing is not done yet (stable-fixes).
  * drm/lima: set gp bus_stop bit before hard reset (stable-fixes).
  * drm/msm/dp: reset the link phy params before link training (git-fixes).
  * drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails (git-fixes).
  * drm/msm/dpu: do not play tricks with debug macros (git-fixes).
  * drm/tegra: Zero-initialize iosys_map (stable-fixes).
  * exfat: fix inode->i_blocks for non-512 byte sector size device (git-fixes).
  * exfat: fix potential deadlock on __exfat_get_dentry_set (git-fixes).
  * exfat: redefine DIR_DELETED as the bad cluster number (git-fixes).
  * exfat: support dynamic allocate bh for exfat_entry_set_cache (git-fixes).
  * fs/netfs/fscache_cookie: add missing "n_accesses" check (bsc#1229453).
  * fuse: Initialize beyond-EOF page contents before setting uptodate
    (bsc#1229454).
  * genirq: Add might_sleep() to disable_irq() (git-fixes).
  * genirq: Always limit the affinity to online CPUs (git-fixes).
  * genirq: Do not return error on missing optional irq_request_resources()
    (git-fixes).
  * genirq: Take the proposed affinity at face value if force==true (git-fixes).
  * genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline (git-
    fixes).
  * genirq/generic_chip: Make irq_remove_generic_chip() irqdomain aware (git-
    fixes).
  * genirq/ipi: Fix NULL pointer deref in irq_data_get_affinity_mask() (git-
    fixes).
  * genirq/irqdesc: Do not try to remove non-existing sysfs files (git-fixes).
  * genirq/matrix: Exclude managed interrupts in irq_matrix_allocated() (git-
    fixes).
  * genirq/msi: Shutdown managed interrupts with unsatifiable affinities (git-
    fixes).
  * gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey (git-
    fixes).
  * hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode()
    (git-fixes).
  * i2c: smbus: Improve handling of stuck alerts (git-fixes).
  * i2c: smbus: Send alert notifications to all devices if source not found
    (git-fixes).
  * iommu/amd: Convert comma to semicolon (git-fixes).
  * ip6_tunnel: Fix broken GRO (bsc#1229444).
  * ipv6: sr: fix incorrect unregister order (git-fixes).
  * irqdomain: Drop bogus fwspec-mapping error handling (git-fixes).
  * irqdomain: Fix association race (git-fixes).
  * irqdomain: Fix disassociation race (git-fixes).
  * irqdomain: Fix domain registration race (git-fixes).
  * irqdomain: Fix mapping-creation race (git-fixes).
  * irqdomain: Fixed unbalanced fwnode get and put (git-fixes).
  * irqdomain: Look for existing mapping only once (git-fixes).
  * irqdomain: Refactor __irq_domain_alloc_irqs() (git-fixes).
  * irqdomain: Report irq number for NOMAP domains (git-fixes).
  * kprobes: Fix to check symbol prefixes correctly (git-fixes).
  * lockd: move from strlcpy with unused retval to strscpy (git-fixes).
  * memcg: protect concurrent access to mem_cgroup_idr (git-fixes).
  * mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes).
  * mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes).
  * mmc: dw_mmc: allow biu and ciu clocks to defer (git-fixes).
  * mmc: mmc_test: Fix NULL dereference on allocation failure (git-fixes).
  * net: ks8851: Fix another TX stall caused by wrong ISR flag handling (git-
    fixes).
  * net: ks8851: Fix deadlock with the SPI chip variant (git-fixes).
  * net: ks8851: Fix potential TX stall after interface reopen (git-fixes).
  * net: ks8851: Fix TX stall caused by TX buffer overrun (gix-fixes).
  * net: mana: Add support for page sizes other than 4KB on ARM64 (jsc#PED-8491
    bsc#1226530).
  * net: mana: Fix doorbell out of order violation and avoid unnecessary
    doorbell rings (bsc#1229154).
  * net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git-
    fixes).
  * net: mana: Fix RX buf alloc_size alignment and atomic op panic
    (bsc#1229086).
  * net: remove two BUG() from skb_checksum_help() (bsc#1229312).
  * net: usb: qmi_wwan: fix memory leak for not ip packets (git-fixes).
  * net/rds: fix possible cp null dereference (git-fixes).
  * net/sched: initialize noop_qdisc owner (git-fixes).
  * nfc: pn533: Add poll mod list filling check (git-fixes).
  * nfs: expose /proc/net/sunrpc/nfs in net namespaces (git-fixes).
  * nfs: make the rpc_stat per net namespace (git-fixes).
  * NFSD: add posix ACLs to struct nfsd_attrs (git-fixes).
  * NFSD: add security label to struct nfsd_attrs (git-fixes).
  * NFSD: fix regression with setting ACLs (git-fixes).
  * NFSD: Fix strncpy() fortify warning (git-fixes).
  * NFSD: Increase NFSD_MAX_OPS_PER_COMPOUND (git-fixes).
  * NFSD: introduce struct nfsd_attrs (git-fixes).
  * NFSD: move from strlcpy with unused retval to strscpy (git-fixes).
  * NFSD: Optimize DRC bucket pruning (git-fixes).
  * nfsd: return error if nfs4_setacl fails (git-fixes).
  * NFSD: set attributes when creating symlinks (git-fixes).
  * nfsd: use locks_inode_context helper (git-fixes).
  * nilfs2: Remove check for PageError (git-fixes).
  * nvme_core: scan namespaces asynchronously (bsc#1224105).
  * ocfs2: use coarse time for new created files (git-fixes).
  * padata: Fix possible divide-by-0 panic in padata_mt_helper() (git-fixes).
  * perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09 (git-
    fixes).
  * platform/x86/amd/hsmp: Add support for ACPI based probing (jsc#PED-8779).
  * platform/x86/amd/hsmp: Cache pci_dev in struct hsmp_socket (jsc#PED-8779).
  * platform/x86/amd/hsmp: Change devm_kzalloc() to devm_kcalloc()
    (jsc#PED-8779).
  * platform/x86/amd/hsmp: Check HSMP support on AMD family of processors
    (jsc#PED-8779).
  * platform/x86/amd/hsmp: Check num_sockets against MAX_AMD_SOCKETS
    (jsc#PED-8779).
  * platform/x86/amd/hsmp: Create static func to handle platdev (jsc#PED-8779).
  * platform/x86/amd/hsmp: Define a struct to hold mailbox regs (jsc#PED-8779).
  * platform/x86/amd/hsmp: Move dev from platdev to hsmp_socket (jsc#PED-8779).
  * platform/x86/amd/hsmp: Move hsmp_test to probe (jsc#PED-8779).
  * platform/x86/amd/hsmp: Non-ACPI support for AMD F1A_M00~0Fh (jsc#PED-8779).
  * platform/x86/amd/hsmp: Remove extra parenthesis and add a space
    (jsc#PED-8779).
  * platform/x86/amd/hsmp: Restructure sysfs group creation (jsc#PED-8779).
  * platform/x86/amd/hsmp: switch to use device_add_groups() (jsc#PED-8779).
  * power: supply: axp288_charger: Fix constant_charge_voltage writes (git-
    fixes).
  * power: supply: axp288_charger: Round constant_charge_voltage writes down
    (git-fixes).
  * powerpc: Fail build if using recordmcount with binutils v2.37 (bsc#1194869).
  * powerpc: Mark .opd section read-only (bsc#1194869).
  * powerpc: use generic version of arch_is_kernel_initmem_freed()
    (bsc#1194869).
  * powerpc: xor_vmx: Add '-mhard-float' to CFLAGS (bsc#1194869).
  * powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for CONFIG_PCI=n
    (bsc#1194869).
  * powerpc/io: Avoid clang null pointer arithmetic warnings (bsc#1194869).
  * powerpc/kexec_file: fix cpus node update to FDT (bsc#1194869).
  * powerpc/kexec: make the update_cpus_node() function public (bsc#1194869).
  * powerpc/kexec: split CONFIG_KEXEC_FILE and CONFIG_CRASH_DUMP (bsc#1194869).
  * powerpc/pseries: Add failure related checks for h_get_mpp and h_get_ppp
    (bsc#1194869).
  * powerpc/pseries: Whitelist dtl slub object for copying to userspace
    (bsc#1194869).
  * powerpc/radix: Move some functions into #ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE
    (bsc#1194869).
  * powerpc/topology: Check if a core is online (bsc#1214285 bsc#1205462
    ltc#200161 ltc#200588 git-fixes).
  * powerpc/xmon: Check cpu id in commands "c#", "dp#" and "dx#" (bsc#1194869).
  * RDMA/mana_ib: Use virtual address in dma regions for MRs (git-fixes).
  * RDMA/rxe: Fix incomplete state save in rxe_requester (git-fixes)
  * RDMA/rxe: Fix rxe_modify_srq (git-fixes)
  * RDMA/rxe: Handle zero length rdma (git-fixes)
  * RDMA/rxe: Move work queue code to subroutines (git-fixes)
  * s390/cpacf: get rid of register asm (git-fixes bsc#1227079 bsc#1229187).
  * s390/cpacf: Make use of invalid opcode produce a link error (git-fixes
    bsc#1227079).
  * s390/cpacf: Split and rework cpacf query functions (git-fixes bsc#1229187).
  * s390/dasd: fix error checks in dasd_copy_pair_store() (git-fixes
    bsc#1229190).
  * s390/dasd: fix error recovery leading to data corruption on ESE devices
    (git-fixes bsc#1229573).
  * s390/sclp: Prevent release of buffer in I/O (git-fixes bsc#1229572).
  * s390/uv: Panic for set and remove shared access UVC errors (git-fixes
    bsc#1229188).
  * spi: spi-fsl-lpspi: Fix scldiv calculation (git-fixes).
  * sunrpc: add a struct rpc_stats arg to rpc_create_args (git-fixes).
  * SUNRPC: Fix a race to wake a sync task (git-fixes).
  * swiotlb: fix swiotlb_bounce() to do partial sync's correctly (git-fixes).
  * syscalls: fix compat_sys_io_pgetevents_time64 usage (git-fixes).
  * tracing: Return from tracing_buffers_read() if the file has been closed
    (bsc#1229136 git-fixes).
  * ubifs: add check for crypto_shash_tfm_digest (git-fixes).
  * ubifs: dbg_orphan_check: Fix missed key type checking (git-fixes).
  * ubifs: Fix adding orphan entry twice for the same inode (git-fixes).
  * ubifs: Fix unattached xattr inode if powercut happens after deleting (git-
    fixes).
  * vfio/pci: fix potential memory leak in vfio_intx_enable() (git-fixes).
  * wifi: iwlwifi: fw: fix wgds rev 3 exact size (git-fixes).
  * wifi: mwifiex: duplicate static structs used in driver instances (git-
    fixes).
  * x86/APM: drop the duplicate APM_MINOR_DEV macro (git-fixes).
  * x86/insn: Fix PUSH instruction in x86 instruction decoder opcode map (git-
    fixes).
  * x86/mm: Fix pti_clone_entry_text() for i386 (git-fixes).
  * x86/mtrr: Check if fixed MTRRs exist before saving them (git-fixes).
  * x86/pm: Work around false positive kmemleak report in msr_build_context()
    (git-fixes).
  * xfs: Fix missing interval for missing_owner in xfs fsmap (git-fixes).
  * xfs: Fix the owner setting issue for rmap query in xfs fsmap (git-fixes).
  * xfs: use XFS_BUF_DADDR_NULL for daddrs in getfsmap code (git-fixes).
  * xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration
    (git-fixes).
  * xprtrdma: Fix rpcrdma_reqs_reset() (git-fixes).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise Live Patching 15-SP5  
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3209=1

  * SUSE Real Time Module 15-SP5  
    zypper in -t patch SUSE-SLE-Module-RT-15-SP5-2024-3209=1

  * openSUSE Leap 15.5  
    zypper in -t patch SUSE-2024-3209=1 openSUSE-SLE-15.5-2024-3209=1

  * openSUSE Leap Micro 5.5  
    zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3209=1

  * SUSE Linux Enterprise Micro 5.5  
    zypper in -t patch SUSE-SLE-Micro-5.5-2024-3209=1

## Package List:

  * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64)
    * kernel-livepatch-5_14_21-150500_13_67-rt-debuginfo-1-150500.11.3.2
    * kernel-livepatch-5_14_21-150500_13_67-rt-1-150500.11.3.2
    * kernel-livepatch-SLE15-SP5-RT_Update_19-debugsource-1-150500.11.3.2
  * SUSE Real Time Module 15-SP5 (x86_64)
    * ocfs2-kmp-rt-5.14.21-150500.13.67.3
    * kernel-rt-devel-5.14.21-150500.13.67.3
    * gfs2-kmp-rt-5.14.21-150500.13.67.3
    * kernel-syms-rt-5.14.21-150500.13.67.1
    * kernel-rt-vdso-5.14.21-150500.13.67.3
    * gfs2-kmp-rt-debuginfo-5.14.21-150500.13.67.3
    * kernel-rt_debug-vdso-5.14.21-150500.13.67.3
    * kernel-rt-debugsource-5.14.21-150500.13.67.3
    * kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.67.3
    * cluster-md-kmp-rt-5.14.21-150500.13.67.3
    * ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.67.3
    * dlm-kmp-rt-5.14.21-150500.13.67.3
    * kernel-rt_debug-debugsource-5.14.21-150500.13.67.3
    * kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.67.3
    * kernel-rt_debug-debuginfo-5.14.21-150500.13.67.3
    * dlm-kmp-rt-debuginfo-5.14.21-150500.13.67.3
    * cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.67.3
    * kernel-rt-vdso-debuginfo-5.14.21-150500.13.67.3
    * kernel-rt-debuginfo-5.14.21-150500.13.67.3
    * kernel-rt_debug-devel-5.14.21-150500.13.67.3
    * kernel-rt-devel-debuginfo-5.14.21-150500.13.67.3
  * SUSE Real Time Module 15-SP5 (noarch)
    * kernel-devel-rt-5.14.21-150500.13.67.3
    * kernel-source-rt-5.14.21-150500.13.67.3
  * SUSE Real Time Module 15-SP5 (nosrc x86_64)
    * kernel-rt_debug-5.14.21-150500.13.67.3
    * kernel-rt-5.14.21-150500.13.67.3
  * openSUSE Leap 15.5 (noarch)
    * kernel-devel-rt-5.14.21-150500.13.67.3
    * kernel-source-rt-5.14.21-150500.13.67.3
  * openSUSE Leap 15.5 (x86_64)
    * ocfs2-kmp-rt-5.14.21-150500.13.67.3
    * kernel-rt-devel-5.14.21-150500.13.67.3
    * kernel-rt-extra-debuginfo-5.14.21-150500.13.67.3
    * gfs2-kmp-rt-5.14.21-150500.13.67.3
    * kernel-livepatch-5_14_21-150500_13_67-rt-debuginfo-1-150500.11.3.2
    * kselftests-kmp-rt-5.14.21-150500.13.67.3
    * kernel-rt-livepatch-devel-5.14.21-150500.13.67.3
    * kselftests-kmp-rt-debuginfo-5.14.21-150500.13.67.3
    * reiserfs-kmp-rt-5.14.21-150500.13.67.3
    * kernel-syms-rt-5.14.21-150500.13.67.1
    * kernel-rt-livepatch-5.14.21-150500.13.67.3
    * kernel-rt-vdso-5.14.21-150500.13.67.3
    * gfs2-kmp-rt-debuginfo-5.14.21-150500.13.67.3
    * kernel-rt_debug-vdso-5.14.21-150500.13.67.3
    * kernel-rt-debugsource-5.14.21-150500.13.67.3
    * kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.67.3
    * cluster-md-kmp-rt-5.14.21-150500.13.67.3
    * ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.67.3
    * reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.67.3
    * dlm-kmp-rt-5.14.21-150500.13.67.3
    * kernel-rt_debug-debugsource-5.14.21-150500.13.67.3
    * kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.67.3
    * kernel-livepatch-5_14_21-150500_13_67-rt-1-150500.11.3.2
    * kernel-rt_debug-debuginfo-5.14.21-150500.13.67.3
    * dlm-kmp-rt-debuginfo-5.14.21-150500.13.67.3
    * cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.67.3
    * kernel-rt-vdso-debuginfo-5.14.21-150500.13.67.3
    * kernel-rt-debuginfo-5.14.21-150500.13.67.3
    * kernel-rt_debug-devel-5.14.21-150500.13.67.3
    * kernel-livepatch-SLE15-SP5-RT_Update_19-debugsource-1-150500.11.3.2
    * kernel-rt-extra-5.14.21-150500.13.67.3
    * kernel-rt-optional-5.14.21-150500.13.67.3
    * kernel-rt-optional-debuginfo-5.14.21-150500.13.67.3
    * kernel-rt-devel-debuginfo-5.14.21-150500.13.67.3
    * kernel-rt_debug-livepatch-devel-5.14.21-150500.13.67.3
  * openSUSE Leap 15.5 (nosrc x86_64)
    * kernel-rt_debug-5.14.21-150500.13.67.3
    * kernel-rt-5.14.21-150500.13.67.3
  * openSUSE Leap Micro 5.5 (nosrc x86_64)
    * kernel-rt-5.14.21-150500.13.67.3
  * openSUSE Leap Micro 5.5 (x86_64)
    * kernel-rt-debugsource-5.14.21-150500.13.67.3
    * kernel-rt-debuginfo-5.14.21-150500.13.67.3
  * SUSE Linux Enterprise Micro 5.5 (nosrc x86_64)
    * kernel-rt-5.14.21-150500.13.67.3
  * SUSE Linux Enterprise Micro 5.5 (x86_64)
    * kernel-rt-debugsource-5.14.21-150500.13.67.3
    * kernel-rt-debuginfo-5.14.21-150500.13.67.3
  * SUSE Linux Enterprise Micro 5.5 (noarch)
    * kernel-source-rt-5.14.21-150500.13.67.3

## References:

  * https://www.suse.com/security/cve/CVE-2021-4441.html
  * https://www.suse.com/security/cve/CVE-2021-47106.html
  * https://www.suse.com/security/cve/CVE-2021-47517.html
  * https://www.suse.com/security/cve/CVE-2021-47546.html
  * https://www.suse.com/security/cve/CVE-2022-38457.html
  * https://www.suse.com/security/cve/CVE-2022-40133.html
  * https://www.suse.com/security/cve/CVE-2022-48645.html
  * https://www.suse.com/security/cve/CVE-2022-48706.html
  * https://www.suse.com/security/cve/CVE-2022-48808.html
  * https://www.suse.com/security/cve/CVE-2022-48865.html
  * https://www.suse.com/security/cve/CVE-2022-48868.html
  * https://www.suse.com/security/cve/CVE-2022-48869.html
  * https://www.suse.com/security/cve/CVE-2022-48870.html
  * https://www.suse.com/security/cve/CVE-2022-48871.html
  * https://www.suse.com/security/cve/CVE-2022-48872.html
  * https://www.suse.com/security/cve/CVE-2022-48873.html
  * https://www.suse.com/security/cve/CVE-2022-48875.html
  * https://www.suse.com/security/cve/CVE-2022-48878.html
  * https://www.suse.com/security/cve/CVE-2022-48880.html
  * https://www.suse.com/security/cve/CVE-2022-48881.html
  * https://www.suse.com/security/cve/CVE-2022-48882.html
  * https://www.suse.com/security/cve/CVE-2022-48883.html
  * https://www.suse.com/security/cve/CVE-2022-48884.html
  * https://www.suse.com/security/cve/CVE-2022-48885.html
  * https://www.suse.com/security/cve/CVE-2022-48886.html
  * https://www.suse.com/security/cve/CVE-2022-48887.html
  * https://www.suse.com/security/cve/CVE-2022-48888.html
  * https://www.suse.com/security/cve/CVE-2022-48889.html
  * https://www.suse.com/security/cve/CVE-2022-48890.html
  * https://www.suse.com/security/cve/CVE-2022-48891.html
  * https://www.suse.com/security/cve/CVE-2022-48893.html
  * https://www.suse.com/security/cve/CVE-2022-48896.html
  * https://www.suse.com/security/cve/CVE-2022-48898.html
  * https://www.suse.com/security/cve/CVE-2022-48899.html
  * https://www.suse.com/security/cve/CVE-2022-48903.html
  * https://www.suse.com/security/cve/CVE-2022-48904.html
  * https://www.suse.com/security/cve/CVE-2022-48905.html
  * https://www.suse.com/security/cve/CVE-2022-48906.html
  * https://www.suse.com/security/cve/CVE-2022-48907.html
  * https://www.suse.com/security/cve/CVE-2022-48909.html
  * https://www.suse.com/security/cve/CVE-2022-48910.html
  * https://www.suse.com/security/cve/CVE-2022-48912.html
  * https://www.suse.com/security/cve/CVE-2022-48913.html
  * https://www.suse.com/security/cve/CVE-2022-48914.html
  * https://www.suse.com/security/cve/CVE-2022-48915.html
  * https://www.suse.com/security/cve/CVE-2022-48916.html
  * https://www.suse.com/security/cve/CVE-2022-48917.html
  * https://www.suse.com/security/cve/CVE-2022-48918.html
  * https://www.suse.com/security/cve/CVE-2022-48919.html
  * https://www.suse.com/security/cve/CVE-2022-48920.html
  * https://www.suse.com/security/cve/CVE-2022-48921.html
  * https://www.suse.com/security/cve/CVE-2022-48923.html
  * https://www.suse.com/security/cve/CVE-2022-48924.html
  * https://www.suse.com/security/cve/CVE-2022-48925.html
  * https://www.suse.com/security/cve/CVE-2022-48926.html
  * https://www.suse.com/security/cve/CVE-2022-48927.html
  * https://www.suse.com/security/cve/CVE-2022-48928.html
  * https://www.suse.com/security/cve/CVE-2022-48929.html
  * https://www.suse.com/security/cve/CVE-2022-48930.html
  * https://www.suse.com/security/cve/CVE-2022-48931.html
  * https://www.suse.com/security/cve/CVE-2022-48932.html
  * https://www.suse.com/security/cve/CVE-2022-48934.html
  * https://www.suse.com/security/cve/CVE-2022-48937.html
  * https://www.suse.com/security/cve/CVE-2022-48938.html
  * https://www.suse.com/security/cve/CVE-2022-48939.html
  * https://www.suse.com/security/cve/CVE-2022-48940.html
  * https://www.suse.com/security/cve/CVE-2022-48941.html
  * https://www.suse.com/security/cve/CVE-2022-48942.html
  * https://www.suse.com/security/cve/CVE-2022-48943.html
  * https://www.suse.com/security/cve/CVE-2023-3610.html
  * https://www.suse.com/security/cve/CVE-2023-52458.html
  * https://www.suse.com/security/cve/CVE-2023-52489.html
  * https://www.suse.com/security/cve/CVE-2023-52498.html
  * https://www.suse.com/security/cve/CVE-2023-52581.html
  * https://www.suse.com/security/cve/CVE-2023-52859.html
  * https://www.suse.com/security/cve/CVE-2023-52887.html
  * https://www.suse.com/security/cve/CVE-2023-52889.html
  * https://www.suse.com/security/cve/CVE-2023-52893.html
  * https://www.suse.com/security/cve/CVE-2023-52894.html
  * https://www.suse.com/security/cve/CVE-2023-52896.html
  * https://www.suse.com/security/cve/CVE-2023-52898.html
  * https://www.suse.com/security/cve/CVE-2023-52899.html
  * https://www.suse.com/security/cve/CVE-2023-52900.html
  * https://www.suse.com/security/cve/CVE-2023-52901.html
  * https://www.suse.com/security/cve/CVE-2023-52904.html
  * https://www.suse.com/security/cve/CVE-2023-52905.html
  * https://www.suse.com/security/cve/CVE-2023-52906.html
  * https://www.suse.com/security/cve/CVE-2023-52907.html
  * https://www.suse.com/security/cve/CVE-2023-52908.html
  * https://www.suse.com/security/cve/CVE-2023-52909.html
  * https://www.suse.com/security/cve/CVE-2023-52910.html
  * https://www.suse.com/security/cve/CVE-2023-52911.html
  * https://www.suse.com/security/cve/CVE-2023-52912.html
  * https://www.suse.com/security/cve/CVE-2023-52913.html
  * https://www.suse.com/security/cve/CVE-2024-26631.html
  * https://www.suse.com/security/cve/CVE-2024-26668.html
  * https://www.suse.com/security/cve/CVE-2024-26669.html
  * https://www.suse.com/security/cve/CVE-2024-26677.html
  * https://www.suse.com/security/cve/CVE-2024-26735.html
  * https://www.suse.com/security/cve/CVE-2024-26808.html
  * https://www.suse.com/security/cve/CVE-2024-26812.html
  * https://www.suse.com/security/cve/CVE-2024-26835.html
  * https://www.suse.com/security/cve/CVE-2024-26851.html
  * https://www.suse.com/security/cve/CVE-2024-27010.html
  * https://www.suse.com/security/cve/CVE-2024-27011.html
  * https://www.suse.com/security/cve/CVE-2024-27016.html
  * https://www.suse.com/security/cve/CVE-2024-27024.html
  * https://www.suse.com/security/cve/CVE-2024-27079.html
  * https://www.suse.com/security/cve/CVE-2024-27403.html
  * https://www.suse.com/security/cve/CVE-2024-31076.html
  * https://www.suse.com/security/cve/CVE-2024-35897.html
  * https://www.suse.com/security/cve/CVE-2024-35902.html
  * https://www.suse.com/security/cve/CVE-2024-35945.html
  * https://www.suse.com/security/cve/CVE-2024-35971.html
  * https://www.suse.com/security/cve/CVE-2024-36009.html
  * https://www.suse.com/security/cve/CVE-2024-36013.html
  * https://www.suse.com/security/cve/CVE-2024-36270.html
  * https://www.suse.com/security/cve/CVE-2024-36286.html
  * https://www.suse.com/security/cve/CVE-2024-36489.html
  * https://www.suse.com/security/cve/CVE-2024-36929.html
  * https://www.suse.com/security/cve/CVE-2024-36933.html
  * https://www.suse.com/security/cve/CVE-2024-36936.html
  * https://www.suse.com/security/cve/CVE-2024-36962.html
  * https://www.suse.com/security/cve/CVE-2024-38554.html
  * https://www.suse.com/security/cve/CVE-2024-38602.html
  * https://www.suse.com/security/cve/CVE-2024-38662.html
  * https://www.suse.com/security/cve/CVE-2024-39489.html
  * https://www.suse.com/security/cve/CVE-2024-40905.html
  * https://www.suse.com/security/cve/CVE-2024-40978.html
  * https://www.suse.com/security/cve/CVE-2024-40980.html
  * https://www.suse.com/security/cve/CVE-2024-40995.html
  * https://www.suse.com/security/cve/CVE-2024-41000.html
  * https://www.suse.com/security/cve/CVE-2024-41007.html
  * https://www.suse.com/security/cve/CVE-2024-41009.html
  * https://www.suse.com/security/cve/CVE-2024-41011.html
  * https://www.suse.com/security/cve/CVE-2024-41016.html
  * https://www.suse.com/security/cve/CVE-2024-41020.html
  * https://www.suse.com/security/cve/CVE-2024-41022.html
  * https://www.suse.com/security/cve/CVE-2024-41035.html
  * https://www.suse.com/security/cve/CVE-2024-41036.html
  * https://www.suse.com/security/cve/CVE-2024-41038.html
  * https://www.suse.com/security/cve/CVE-2024-41039.html
  * https://www.suse.com/security/cve/CVE-2024-41042.html
  * https://www.suse.com/security/cve/CVE-2024-41045.html
  * https://www.suse.com/security/cve/CVE-2024-41056.html
  * https://www.suse.com/security/cve/CVE-2024-41060.html
  * https://www.suse.com/security/cve/CVE-2024-41062.html
  * https://www.suse.com/security/cve/CVE-2024-41065.html
  * https://www.suse.com/security/cve/CVE-2024-41068.html
  * https://www.suse.com/security/cve/CVE-2024-41073.html
  * https://www.suse.com/security/cve/CVE-2024-41079.html
  * https://www.suse.com/security/cve/CVE-2024-41080.html
  * https://www.suse.com/security/cve/CVE-2024-41087.html
  * https://www.suse.com/security/cve/CVE-2024-41088.html
  * https://www.suse.com/security/cve/CVE-2024-41089.html
  * https://www.suse.com/security/cve/CVE-2024-41092.html
  * https://www.suse.com/security/cve/CVE-2024-41093.html
  * https://www.suse.com/security/cve/CVE-2024-41095.html
  * https://www.suse.com/security/cve/CVE-2024-41097.html
  * https://www.suse.com/security/cve/CVE-2024-41098.html
  * https://www.suse.com/security/cve/CVE-2024-42069.html
  * https://www.suse.com/security/cve/CVE-2024-42074.html
  * https://www.suse.com/security/cve/CVE-2024-42076.html
  * https://www.suse.com/security/cve/CVE-2024-42077.html
  * https://www.suse.com/security/cve/CVE-2024-42080.html
  * https://www.suse.com/security/cve/CVE-2024-42082.html
  * https://www.suse.com/security/cve/CVE-2024-42085.html
  * https://www.suse.com/security/cve/CVE-2024-42086.html
  * https://www.suse.com/security/cve/CVE-2024-42087.html
  * https://www.suse.com/security/cve/CVE-2024-42089.html
  * https://www.suse.com/security/cve/CVE-2024-42090.html
  * https://www.suse.com/security/cve/CVE-2024-42092.html
  * https://www.suse.com/security/cve/CVE-2024-42095.html
  * https://www.suse.com/security/cve/CVE-2024-42097.html
  * https://www.suse.com/security/cve/CVE-2024-42098.html
  * https://www.suse.com/security/cve/CVE-2024-42101.html
  * https://www.suse.com/security/cve/CVE-2024-42104.html
  * https://www.suse.com/security/cve/CVE-2024-42106.html
  * https://www.suse.com/security/cve/CVE-2024-42107.html
  * https://www.suse.com/security/cve/CVE-2024-42110.html
  * https://www.suse.com/security/cve/CVE-2024-42114.html
  * https://www.suse.com/security/cve/CVE-2024-42115.html
  * https://www.suse.com/security/cve/CVE-2024-42119.html
  * https://www.suse.com/security/cve/CVE-2024-42120.html
  * https://www.suse.com/security/cve/CVE-2024-42121.html
  * https://www.suse.com/security/cve/CVE-2024-42126.html
  * https://www.suse.com/security/cve/CVE-2024-42127.html
  * https://www.suse.com/security/cve/CVE-2024-42130.html
  * https://www.suse.com/security/cve/CVE-2024-42137.html
  * https://www.suse.com/security/cve/CVE-2024-42139.html
  * https://www.suse.com/security/cve/CVE-2024-42142.html
  * https://www.suse.com/security/cve/CVE-2024-42143.html
  * https://www.suse.com/security/cve/CVE-2024-42148.html
  * https://www.suse.com/security/cve/CVE-2024-42152.html
  * https://www.suse.com/security/cve/CVE-2024-42155.html
  * https://www.suse.com/security/cve/CVE-2024-42156.html
  * https://www.suse.com/security/cve/CVE-2024-42157.html
  * https://www.suse.com/security/cve/CVE-2024-42158.html
  * https://www.suse.com/security/cve/CVE-2024-42162.html
  * https://www.suse.com/security/cve/CVE-2024-42223.html
  * https://www.suse.com/security/cve/CVE-2024-42225.html
  * https://www.suse.com/security/cve/CVE-2024-42228.html
  * https://www.suse.com/security/cve/CVE-2024-42229.html
  * https://www.suse.com/security/cve/CVE-2024-42230.html
  * https://www.suse.com/security/cve/CVE-2024-42232.html
  * https://www.suse.com/security/cve/CVE-2024-42236.html
  * https://www.suse.com/security/cve/CVE-2024-42237.html
  * https://www.suse.com/security/cve/CVE-2024-42238.html
  * https://www.suse.com/security/cve/CVE-2024-42239.html
  * https://www.suse.com/security/cve/CVE-2024-42240.html
  * https://www.suse.com/security/cve/CVE-2024-42244.html
  * https://www.suse.com/security/cve/CVE-2024-42246.html
  * https://www.suse.com/security/cve/CVE-2024-42247.html
  * https://www.suse.com/security/cve/CVE-2024-42268.html
  * https://www.suse.com/security/cve/CVE-2024-42271.html
  * https://www.suse.com/security/cve/CVE-2024-42274.html
  * https://www.suse.com/security/cve/CVE-2024-42276.html
  * https://www.suse.com/security/cve/CVE-2024-42277.html
  * https://www.suse.com/security/cve/CVE-2024-42280.html
  * https://www.suse.com/security/cve/CVE-2024-42281.html
  * https://www.suse.com/security/cve/CVE-2024-42283.html
  * https://www.suse.com/security/cve/CVE-2024-42284.html
  * https://www.suse.com/security/cve/CVE-2024-42285.html
  * https://www.suse.com/security/cve/CVE-2024-42286.html
  * https://www.suse.com/security/cve/CVE-2024-42287.html
  * https://www.suse.com/security/cve/CVE-2024-42288.html
  * https://www.suse.com/security/cve/CVE-2024-42289.html
  * https://www.suse.com/security/cve/CVE-2024-42291.html
  * https://www.suse.com/security/cve/CVE-2024-42292.html
  * https://www.suse.com/security/cve/CVE-2024-42295.html
  * https://www.suse.com/security/cve/CVE-2024-42301.html
  * https://www.suse.com/security/cve/CVE-2024-42302.html
  * https://www.suse.com/security/cve/CVE-2024-42308.html
  * https://www.suse.com/security/cve/CVE-2024-42309.html
  * https://www.suse.com/security/cve/CVE-2024-42310.html
  * https://www.suse.com/security/cve/CVE-2024-42311.html
  * https://www.suse.com/security/cve/CVE-2024-42312.html
  * https://www.suse.com/security/cve/CVE-2024-42313.html
  * https://www.suse.com/security/cve/CVE-2024-42315.html
  * https://www.suse.com/security/cve/CVE-2024-42318.html
  * https://www.suse.com/security/cve/CVE-2024-42319.html
  * https://www.suse.com/security/cve/CVE-2024-42320.html
  * https://www.suse.com/security/cve/CVE-2024-42322.html
  * https://www.suse.com/security/cve/CVE-2024-43816.html
  * https://www.suse.com/security/cve/CVE-2024-43818.html
  * https://www.suse.com/security/cve/CVE-2024-43819.html
  * https://www.suse.com/security/cve/CVE-2024-43821.html
  * https://www.suse.com/security/cve/CVE-2024-43823.html
  * https://www.suse.com/security/cve/CVE-2024-43829.html
  * https://www.suse.com/security/cve/CVE-2024-43830.html
  * https://www.suse.com/security/cve/CVE-2024-43831.html
  * https://www.suse.com/security/cve/CVE-2024-43834.html
  * https://www.suse.com/security/cve/CVE-2024-43837.html
  * https://www.suse.com/security/cve/CVE-2024-43839.html
  * https://www.suse.com/security/cve/CVE-2024-43841.html
  * https://www.suse.com/security/cve/CVE-2024-43842.html
  * https://www.suse.com/security/cve/CVE-2024-43846.html
  * https://www.suse.com/security/cve/CVE-2024-43849.html
  * https://www.suse.com/security/cve/CVE-2024-43853.html
  * https://www.suse.com/security/cve/CVE-2024-43854.html
  * https://www.suse.com/security/cve/CVE-2024-43856.html
  * https://www.suse.com/security/cve/CVE-2024-43858.html
  * https://www.suse.com/security/cve/CVE-2024-43860.html
  * https://www.suse.com/security/cve/CVE-2024-43861.html
  * https://www.suse.com/security/cve/CVE-2024-43863.html
  * https://www.suse.com/security/cve/CVE-2024-43866.html
  * https://www.suse.com/security/cve/CVE-2024-43867.html
  * https://www.suse.com/security/cve/CVE-2024-43871.html
  * https://www.suse.com/security/cve/CVE-2024-43872.html
  * https://www.suse.com/security/cve/CVE-2024-43873.html
  * https://www.suse.com/security/cve/CVE-2024-43879.html
  * https://www.suse.com/security/cve/CVE-2024-43880.html
  * https://www.suse.com/security/cve/CVE-2024-43882.html
  * https://www.suse.com/security/cve/CVE-2024-43883.html
  * https://www.suse.com/security/cve/CVE-2024-43884.html
  * https://www.suse.com/security/cve/CVE-2024-43889.html
  * https://www.suse.com/security/cve/CVE-2024-43892.html
  * https://www.suse.com/security/cve/CVE-2024-43893.html
  * https://www.suse.com/security/cve/CVE-2024-43894.html
  * https://www.suse.com/security/cve/CVE-2024-43895.html
  * https://www.suse.com/security/cve/CVE-2024-43899.html
  * https://www.suse.com/security/cve/CVE-2024-43900.html
  * https://www.suse.com/security/cve/CVE-2024-43902.html
  * https://www.suse.com/security/cve/CVE-2024-43903.html
  * https://www.suse.com/security/cve/CVE-2024-43904.html
  * https://www.suse.com/security/cve/CVE-2024-43905.html
  * https://www.suse.com/security/cve/CVE-2024-43907.html
  * https://www.suse.com/security/cve/CVE-2024-43908.html
  * https://www.suse.com/security/cve/CVE-2024-43909.html
  * https://www.suse.com/security/cve/CVE-2024-44938.html
  * https://www.suse.com/security/cve/CVE-2024-44939.html
  * https://www.suse.com/security/cve/CVE-2024-44947.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1193629
  * https://bugzilla.suse.com/show_bug.cgi?id=1194111
  * https://bugzilla.suse.com/show_bug.cgi?id=1194765
  * https://bugzilla.suse.com/show_bug.cgi?id=1194869
  * https://bugzilla.suse.com/show_bug.cgi?id=1196261
  * https://bugzilla.suse.com/show_bug.cgi?id=1196516
  * https://bugzilla.suse.com/show_bug.cgi?id=1196894
  * https://bugzilla.suse.com/show_bug.cgi?id=1198017
  * https://bugzilla.suse.com/show_bug.cgi?id=1203329
  * https://bugzilla.suse.com/show_bug.cgi?id=1203330
  * https://bugzilla.suse.com/show_bug.cgi?id=1203360
  * https://bugzilla.suse.com/show_bug.cgi?id=1205462
  * https://bugzilla.suse.com/show_bug.cgi?id=1206006
  * https://bugzilla.suse.com/show_bug.cgi?id=1206258
  * https://bugzilla.suse.com/show_bug.cgi?id=1206843
  * https://bugzilla.suse.com/show_bug.cgi?id=1207158
  * https://bugzilla.suse.com/show_bug.cgi?id=1208783
  * https://bugzilla.suse.com/show_bug.cgi?id=1210644
  * https://bugzilla.suse.com/show_bug.cgi?id=1213580
  * https://bugzilla.suse.com/show_bug.cgi?id=1213632
  * https://bugzilla.suse.com/show_bug.cgi?id=1214285
  * https://bugzilla.suse.com/show_bug.cgi?id=1216834
  * https://bugzilla.suse.com/show_bug.cgi?id=1220428
  * https://bugzilla.suse.com/show_bug.cgi?id=1220877
  * https://bugzilla.suse.com/show_bug.cgi?id=1220962
  * https://bugzilla.suse.com/show_bug.cgi?id=1221269
  * https://bugzilla.suse.com/show_bug.cgi?id=1221326
  * https://bugzilla.suse.com/show_bug.cgi?id=1221630
  * https://bugzilla.suse.com/show_bug.cgi?id=1221645
  * https://bugzilla.suse.com/show_bug.cgi?id=1222335
  * https://bugzilla.suse.com/show_bug.cgi?id=1222350
  * https://bugzilla.suse.com/show_bug.cgi?id=1222372
  * https://bugzilla.suse.com/show_bug.cgi?id=1222387
  * https://bugzilla.suse.com/show_bug.cgi?id=1222634
  * https://bugzilla.suse.com/show_bug.cgi?id=1222808
  * https://bugzilla.suse.com/show_bug.cgi?id=1222967
  * https://bugzilla.suse.com/show_bug.cgi?id=1223074
  * https://bugzilla.suse.com/show_bug.cgi?id=1223191
  * https://bugzilla.suse.com/show_bug.cgi?id=1223508
  * https://bugzilla.suse.com/show_bug.cgi?id=1223720
  * https://bugzilla.suse.com/show_bug.cgi?id=1223742
  * https://bugzilla.suse.com/show_bug.cgi?id=1223777
  * https://bugzilla.suse.com/show_bug.cgi?id=1223803
  * https://bugzilla.suse.com/show_bug.cgi?id=1223807
  * https://bugzilla.suse.com/show_bug.cgi?id=1224105
  * https://bugzilla.suse.com/show_bug.cgi?id=1224415
  * https://bugzilla.suse.com/show_bug.cgi?id=1224496
  * https://bugzilla.suse.com/show_bug.cgi?id=1224510
  * https://bugzilla.suse.com/show_bug.cgi?id=1224542
  * https://bugzilla.suse.com/show_bug.cgi?id=1224578
  * https://bugzilla.suse.com/show_bug.cgi?id=1224639
  * https://bugzilla.suse.com/show_bug.cgi?id=1225162
  * https://bugzilla.suse.com/show_bug.cgi?id=1225352
  * https://bugzilla.suse.com/show_bug.cgi?id=1225428
  * https://bugzilla.suse.com/show_bug.cgi?id=1225524
  * https://bugzilla.suse.com/show_bug.cgi?id=1225578
  * https://bugzilla.suse.com/show_bug.cgi?id=1225582
  * https://bugzilla.suse.com/show_bug.cgi?id=1225773
  * https://bugzilla.suse.com/show_bug.cgi?id=1225814
  * https://bugzilla.suse.com/show_bug.cgi?id=1225827
  * https://bugzilla.suse.com/show_bug.cgi?id=1225832
  * https://bugzilla.suse.com/show_bug.cgi?id=1225903
  * https://bugzilla.suse.com/show_bug.cgi?id=1226168
  * https://bugzilla.suse.com/show_bug.cgi?id=1226530
  * https://bugzilla.suse.com/show_bug.cgi?id=1226613
  * https://bugzilla.suse.com/show_bug.cgi?id=1226742
  * https://bugzilla.suse.com/show_bug.cgi?id=1226765
  * https://bugzilla.suse.com/show_bug.cgi?id=1226798
  * https://bugzilla.suse.com/show_bug.cgi?id=1226801
  * https://bugzilla.suse.com/show_bug.cgi?id=1226874
  * https://bugzilla.suse.com/show_bug.cgi?id=1226885
  * https://bugzilla.suse.com/show_bug.cgi?id=1227079
  * https://bugzilla.suse.com/show_bug.cgi?id=1227623
  * https://bugzilla.suse.com/show_bug.cgi?id=1227761
  * https://bugzilla.suse.com/show_bug.cgi?id=1227830
  * https://bugzilla.suse.com/show_bug.cgi?id=1227863
  * https://bugzilla.suse.com/show_bug.cgi?id=1227867
  * https://bugzilla.suse.com/show_bug.cgi?id=1227929
  * https://bugzilla.suse.com/show_bug.cgi?id=1227937
  * https://bugzilla.suse.com/show_bug.cgi?id=1227958
  * https://bugzilla.suse.com/show_bug.cgi?id=1228020
  * https://bugzilla.suse.com/show_bug.cgi?id=1228065
  * https://bugzilla.suse.com/show_bug.cgi?id=1228114
  * https://bugzilla.suse.com/show_bug.cgi?id=1228410
  * https://bugzilla.suse.com/show_bug.cgi?id=1228426
  * https://bugzilla.suse.com/show_bug.cgi?id=1228427
  * https://bugzilla.suse.com/show_bug.cgi?id=1228429
  * https://bugzilla.suse.com/show_bug.cgi?id=1228446
  * https://bugzilla.suse.com/show_bug.cgi?id=1228447
  * https://bugzilla.suse.com/show_bug.cgi?id=1228449
  * https://bugzilla.suse.com/show_bug.cgi?id=1228450
  * https://bugzilla.suse.com/show_bug.cgi?id=1228452
  * https://bugzilla.suse.com/show_bug.cgi?id=1228456
  * https://bugzilla.suse.com/show_bug.cgi?id=1228463
  * https://bugzilla.suse.com/show_bug.cgi?id=1228466
  * https://bugzilla.suse.com/show_bug.cgi?id=1228467
  * https://bugzilla.suse.com/show_bug.cgi?id=1228469
  * https://bugzilla.suse.com/show_bug.cgi?id=1228480
  * https://bugzilla.suse.com/show_bug.cgi?id=1228481
  * https://bugzilla.suse.com/show_bug.cgi?id=1228482
  * https://bugzilla.suse.com/show_bug.cgi?id=1228483
  * https://bugzilla.suse.com/show_bug.cgi?id=1228484
  * https://bugzilla.suse.com/show_bug.cgi?id=1228485
  * https://bugzilla.suse.com/show_bug.cgi?id=1228487
  * https://bugzilla.suse.com/show_bug.cgi?id=1228489
  * https://bugzilla.suse.com/show_bug.cgi?id=1228491
  * https://bugzilla.suse.com/show_bug.cgi?id=1228493
  * https://bugzilla.suse.com/show_bug.cgi?id=1228494
  * https://bugzilla.suse.com/show_bug.cgi?id=1228495
  * https://bugzilla.suse.com/show_bug.cgi?id=1228496
  * https://bugzilla.suse.com/show_bug.cgi?id=1228501
  * https://bugzilla.suse.com/show_bug.cgi?id=1228503
  * https://bugzilla.suse.com/show_bug.cgi?id=1228509
  * https://bugzilla.suse.com/show_bug.cgi?id=1228513
  * https://bugzilla.suse.com/show_bug.cgi?id=1228515
  * https://bugzilla.suse.com/show_bug.cgi?id=1228516
  * https://bugzilla.suse.com/show_bug.cgi?id=1228526
  * https://bugzilla.suse.com/show_bug.cgi?id=1228531
  * https://bugzilla.suse.com/show_bug.cgi?id=1228563
  * https://bugzilla.suse.com/show_bug.cgi?id=1228564
  * https://bugzilla.suse.com/show_bug.cgi?id=1228567
  * https://bugzilla.suse.com/show_bug.cgi?id=1228576
  * https://bugzilla.suse.com/show_bug.cgi?id=1228579
  * https://bugzilla.suse.com/show_bug.cgi?id=1228584
  * https://bugzilla.suse.com/show_bug.cgi?id=1228588
  * https://bugzilla.suse.com/show_bug.cgi?id=1228590
  * https://bugzilla.suse.com/show_bug.cgi?id=1228615
  * https://bugzilla.suse.com/show_bug.cgi?id=1228616
  * https://bugzilla.suse.com/show_bug.cgi?id=1228635
  * https://bugzilla.suse.com/show_bug.cgi?id=1228636
  * https://bugzilla.suse.com/show_bug.cgi?id=1228654
  * https://bugzilla.suse.com/show_bug.cgi?id=1228656
  * https://bugzilla.suse.com/show_bug.cgi?id=1228658
  * https://bugzilla.suse.com/show_bug.cgi?id=1228660
  * https://bugzilla.suse.com/show_bug.cgi?id=1228662
  * https://bugzilla.suse.com/show_bug.cgi?id=1228667
  * https://bugzilla.suse.com/show_bug.cgi?id=1228673
  * https://bugzilla.suse.com/show_bug.cgi?id=1228677
  * https://bugzilla.suse.com/show_bug.cgi?id=1228687
  * https://bugzilla.suse.com/show_bug.cgi?id=1228706
  * https://bugzilla.suse.com/show_bug.cgi?id=1228708
  * https://bugzilla.suse.com/show_bug.cgi?id=1228710
  * https://bugzilla.suse.com/show_bug.cgi?id=1228718
  * https://bugzilla.suse.com/show_bug.cgi?id=1228720
  * https://bugzilla.suse.com/show_bug.cgi?id=1228721
  * https://bugzilla.suse.com/show_bug.cgi?id=1228722
  * https://bugzilla.suse.com/show_bug.cgi?id=1228724
  * https://bugzilla.suse.com/show_bug.cgi?id=1228726
  * https://bugzilla.suse.com/show_bug.cgi?id=1228727
  * https://bugzilla.suse.com/show_bug.cgi?id=1228733
  * https://bugzilla.suse.com/show_bug.cgi?id=1228748
  * https://bugzilla.suse.com/show_bug.cgi?id=1228766
  * https://bugzilla.suse.com/show_bug.cgi?id=1228779
  * https://bugzilla.suse.com/show_bug.cgi?id=1228801
  * https://bugzilla.suse.com/show_bug.cgi?id=1228850
  * https://bugzilla.suse.com/show_bug.cgi?id=1228857
  * https://bugzilla.suse.com/show_bug.cgi?id=1228959
  * https://bugzilla.suse.com/show_bug.cgi?id=1228964
  * https://bugzilla.suse.com/show_bug.cgi?id=1228966
  * https://bugzilla.suse.com/show_bug.cgi?id=1228967
  * https://bugzilla.suse.com/show_bug.cgi?id=1228979
  * https://bugzilla.suse.com/show_bug.cgi?id=1228988
  * https://bugzilla.suse.com/show_bug.cgi?id=1228989
  * https://bugzilla.suse.com/show_bug.cgi?id=1228991
  * https://bugzilla.suse.com/show_bug.cgi?id=1228992
  * https://bugzilla.suse.com/show_bug.cgi?id=1229042
  * https://bugzilla.suse.com/show_bug.cgi?id=1229054
  * https://bugzilla.suse.com/show_bug.cgi?id=1229086
  * https://bugzilla.suse.com/show_bug.cgi?id=1229136
  * https://bugzilla.suse.com/show_bug.cgi?id=1229154
  * https://bugzilla.suse.com/show_bug.cgi?id=1229187
  * https://bugzilla.suse.com/show_bug.cgi?id=1229188
  * https://bugzilla.suse.com/show_bug.cgi?id=1229190
  * https://bugzilla.suse.com/show_bug.cgi?id=1229287
  * https://bugzilla.suse.com/show_bug.cgi?id=1229290
  * https://bugzilla.suse.com/show_bug.cgi?id=1229292
  * https://bugzilla.suse.com/show_bug.cgi?id=1229296
  * https://bugzilla.suse.com/show_bug.cgi?id=1229297
  * https://bugzilla.suse.com/show_bug.cgi?id=1229301
  * https://bugzilla.suse.com/show_bug.cgi?id=1229303
  * https://bugzilla.suse.com/show_bug.cgi?id=1229304
  * https://bugzilla.suse.com/show_bug.cgi?id=1229305
  * https://bugzilla.suse.com/show_bug.cgi?id=1229307
  * https://bugzilla.suse.com/show_bug.cgi?id=1229309
  * https://bugzilla.suse.com/show_bug.cgi?id=1229312
  * https://bugzilla.suse.com/show_bug.cgi?id=1229314
  * https://bugzilla.suse.com/show_bug.cgi?id=1229315
  * https://bugzilla.suse.com/show_bug.cgi?id=1229317
  * https://bugzilla.suse.com/show_bug.cgi?id=1229318
  * https://bugzilla.suse.com/show_bug.cgi?id=1229319
  * https://bugzilla.suse.com/show_bug.cgi?id=1229327
  * https://bugzilla.suse.com/show_bug.cgi?id=1229341
  * https://bugzilla.suse.com/show_bug.cgi?id=1229345
  * https://bugzilla.suse.com/show_bug.cgi?id=1229346
  * https://bugzilla.suse.com/show_bug.cgi?id=1229347
  * https://bugzilla.suse.com/show_bug.cgi?id=1229349
  * https://bugzilla.suse.com/show_bug.cgi?id=1229350
  * https://bugzilla.suse.com/show_bug.cgi?id=1229351
  * https://bugzilla.suse.com/show_bug.cgi?id=1229354
  * https://bugzilla.suse.com/show_bug.cgi?id=1229356
  * https://bugzilla.suse.com/show_bug.cgi?id=1229357
  * https://bugzilla.suse.com/show_bug.cgi?id=1229358
  * https://bugzilla.suse.com/show_bug.cgi?id=1229359
  * https://bugzilla.suse.com/show_bug.cgi?id=1229360
  * https://bugzilla.suse.com/show_bug.cgi?id=1229366
  * https://bugzilla.suse.com/show_bug.cgi?id=1229370
  * https://bugzilla.suse.com/show_bug.cgi?id=1229373
  * https://bugzilla.suse.com/show_bug.cgi?id=1229374
  * https://bugzilla.suse.com/show_bug.cgi?id=1229381
  * https://bugzilla.suse.com/show_bug.cgi?id=1229382
  * https://bugzilla.suse.com/show_bug.cgi?id=1229383
  * https://bugzilla.suse.com/show_bug.cgi?id=1229386
  * https://bugzilla.suse.com/show_bug.cgi?id=1229388
  * https://bugzilla.suse.com/show_bug.cgi?id=1229391
  * https://bugzilla.suse.com/show_bug.cgi?id=1229392
  * https://bugzilla.suse.com/show_bug.cgi?id=1229395
  * https://bugzilla.suse.com/show_bug.cgi?id=1229398
  * https://bugzilla.suse.com/show_bug.cgi?id=1229399
  * https://bugzilla.suse.com/show_bug.cgi?id=1229400
  * https://bugzilla.suse.com/show_bug.cgi?id=1229407
  * https://bugzilla.suse.com/show_bug.cgi?id=1229409
  * https://bugzilla.suse.com/show_bug.cgi?id=1229410
  * https://bugzilla.suse.com/show_bug.cgi?id=1229411
  * https://bugzilla.suse.com/show_bug.cgi?id=1229413
  * https://bugzilla.suse.com/show_bug.cgi?id=1229414
  * https://bugzilla.suse.com/show_bug.cgi?id=1229417
  * https://bugzilla.suse.com/show_bug.cgi?id=1229418
  * https://bugzilla.suse.com/show_bug.cgi?id=1229444
  * https://bugzilla.suse.com/show_bug.cgi?id=1229453
  * https://bugzilla.suse.com/show_bug.cgi?id=1229454
  * https://bugzilla.suse.com/show_bug.cgi?id=1229481
  * https://bugzilla.suse.com/show_bug.cgi?id=1229482
  * https://bugzilla.suse.com/show_bug.cgi?id=1229488
  * https://bugzilla.suse.com/show_bug.cgi?id=1229489
  * https://bugzilla.suse.com/show_bug.cgi?id=1229490
  * https://bugzilla.suse.com/show_bug.cgi?id=1229493
  * https://bugzilla.suse.com/show_bug.cgi?id=1229495
  * https://bugzilla.suse.com/show_bug.cgi?id=1229497
  * https://bugzilla.suse.com/show_bug.cgi?id=1229500
  * https://bugzilla.suse.com/show_bug.cgi?id=1229503
  * https://bugzilla.suse.com/show_bug.cgi?id=1229506
  * https://bugzilla.suse.com/show_bug.cgi?id=1229507
  * https://bugzilla.suse.com/show_bug.cgi?id=1229508
  * https://bugzilla.suse.com/show_bug.cgi?id=1229509
  * https://bugzilla.suse.com/show_bug.cgi?id=1229510
  * https://bugzilla.suse.com/show_bug.cgi?id=1229512
  * https://bugzilla.suse.com/show_bug.cgi?id=1229516
  * https://bugzilla.suse.com/show_bug.cgi?id=1229521
  * https://bugzilla.suse.com/show_bug.cgi?id=1229522
  * https://bugzilla.suse.com/show_bug.cgi?id=1229523
  * https://bugzilla.suse.com/show_bug.cgi?id=1229524
  * https://bugzilla.suse.com/show_bug.cgi?id=1229525
  * https://bugzilla.suse.com/show_bug.cgi?id=1229526
  * https://bugzilla.suse.com/show_bug.cgi?id=1229527
  * https://bugzilla.suse.com/show_bug.cgi?id=1229528
  * https://bugzilla.suse.com/show_bug.cgi?id=1229529
  * https://bugzilla.suse.com/show_bug.cgi?id=1229531
  * https://bugzilla.suse.com/show_bug.cgi?id=1229533
  * https://bugzilla.suse.com/show_bug.cgi?id=1229535
  * https://bugzilla.suse.com/show_bug.cgi?id=1229536
  * https://bugzilla.suse.com/show_bug.cgi?id=1229537
  * https://bugzilla.suse.com/show_bug.cgi?id=1229540
  * https://bugzilla.suse.com/show_bug.cgi?id=1229544
  * https://bugzilla.suse.com/show_bug.cgi?id=1229545
  * https://bugzilla.suse.com/show_bug.cgi?id=1229546
  * https://bugzilla.suse.com/show_bug.cgi?id=1229547
  * https://bugzilla.suse.com/show_bug.cgi?id=1229548
  * https://bugzilla.suse.com/show_bug.cgi?id=1229554
  * https://bugzilla.suse.com/show_bug.cgi?id=1229557
  * https://bugzilla.suse.com/show_bug.cgi?id=1229558
  * https://bugzilla.suse.com/show_bug.cgi?id=1229559
  * https://bugzilla.suse.com/show_bug.cgi?id=1229560
  * https://bugzilla.suse.com/show_bug.cgi?id=1229562
  * https://bugzilla.suse.com/show_bug.cgi?id=1229564
  * https://bugzilla.suse.com/show_bug.cgi?id=1229565
  * https://bugzilla.suse.com/show_bug.cgi?id=1229566
  * https://bugzilla.suse.com/show_bug.cgi?id=1229568
  * https://bugzilla.suse.com/show_bug.cgi?id=1229569
  * https://bugzilla.suse.com/show_bug.cgi?id=1229572
  * https://bugzilla.suse.com/show_bug.cgi?id=1229573
  * https://bugzilla.suse.com/show_bug.cgi?id=1229576
  * https://bugzilla.suse.com/show_bug.cgi?id=1229581
  * https://bugzilla.suse.com/show_bug.cgi?id=1229588
  * https://bugzilla.suse.com/show_bug.cgi?id=1229598
  * https://bugzilla.suse.com/show_bug.cgi?id=1229603
  * https://bugzilla.suse.com/show_bug.cgi?id=1229604
  * https://bugzilla.suse.com/show_bug.cgi?id=1229605
  * https://bugzilla.suse.com/show_bug.cgi?id=1229608
  * https://bugzilla.suse.com/show_bug.cgi?id=1229611
  * https://bugzilla.suse.com/show_bug.cgi?id=1229612
  * https://bugzilla.suse.com/show_bug.cgi?id=1229613
  * https://bugzilla.suse.com/show_bug.cgi?id=1229614
  * https://bugzilla.suse.com/show_bug.cgi?id=1229615
  * https://bugzilla.suse.com/show_bug.cgi?id=1229616
  * https://bugzilla.suse.com/show_bug.cgi?id=1229617
  * https://bugzilla.suse.com/show_bug.cgi?id=1229620
  * https://bugzilla.suse.com/show_bug.cgi?id=1229622
  * https://bugzilla.suse.com/show_bug.cgi?id=1229623
  * https://bugzilla.suse.com/show_bug.cgi?id=1229624
  * https://bugzilla.suse.com/show_bug.cgi?id=1229625
  * https://bugzilla.suse.com/show_bug.cgi?id=1229626
  * https://bugzilla.suse.com/show_bug.cgi?id=1229628
  * https://bugzilla.suse.com/show_bug.cgi?id=1229629
  * https://bugzilla.suse.com/show_bug.cgi?id=1229630
  * https://bugzilla.suse.com/show_bug.cgi?id=1229631
  * https://bugzilla.suse.com/show_bug.cgi?id=1229632
  * https://bugzilla.suse.com/show_bug.cgi?id=1229635
  * https://bugzilla.suse.com/show_bug.cgi?id=1229636
  * https://bugzilla.suse.com/show_bug.cgi?id=1229637
  * https://bugzilla.suse.com/show_bug.cgi?id=1229638
  * https://bugzilla.suse.com/show_bug.cgi?id=1229639
  * https://bugzilla.suse.com/show_bug.cgi?id=1229641
  * https://bugzilla.suse.com/show_bug.cgi?id=1229642
  * https://bugzilla.suse.com/show_bug.cgi?id=1229643
  * https://bugzilla.suse.com/show_bug.cgi?id=1229645
  * https://bugzilla.suse.com/show_bug.cgi?id=1229657
  * https://bugzilla.suse.com/show_bug.cgi?id=1229658
  * https://bugzilla.suse.com/show_bug.cgi?id=1229662
  * https://bugzilla.suse.com/show_bug.cgi?id=1229664
  * https://bugzilla.suse.com/show_bug.cgi?id=1229707
  * https://bugzilla.suse.com/show_bug.cgi?id=1229739
  * https://bugzilla.suse.com/show_bug.cgi?id=1229743
  * https://bugzilla.suse.com/show_bug.cgi?id=1229746
  * https://bugzilla.suse.com/show_bug.cgi?id=1229754
  * https://bugzilla.suse.com/show_bug.cgi?id=1229755
  * https://bugzilla.suse.com/show_bug.cgi?id=1229756
  * https://bugzilla.suse.com/show_bug.cgi?id=1229759
  * https://bugzilla.suse.com/show_bug.cgi?id=1229761
  * https://bugzilla.suse.com/show_bug.cgi?id=1229767
  * https://bugzilla.suse.com/show_bug.cgi?id=1229768
  * https://bugzilla.suse.com/show_bug.cgi?id=1229781
  * https://bugzilla.suse.com/show_bug.cgi?id=1229784
  * https://bugzilla.suse.com/show_bug.cgi?id=1229787
  * https://bugzilla.suse.com/show_bug.cgi?id=1229788
  * https://bugzilla.suse.com/show_bug.cgi?id=1229789
  * https://bugzilla.suse.com/show_bug.cgi?id=1229792
  * https://bugzilla.suse.com/show_bug.cgi?id=1229820
  * https://jira.suse.com/browse/PED-8491
  * https://jira.suse.com/browse/PED-8779

SUSE: 2024:3209-1 important: the Linux Kernel Security Advisory Updates

September 11, 2024
* bsc#1193629 * bsc#1194111 * bsc#1194765 * bsc#1194869 * bsc#1196261

Summary

## The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-44947: Initialize beyond-EOF page contents before setting uptodate (bsc#1229454). * CVE-2024-36936: Touch soft lockup during memory accept (bsc#1225773). * CVE-2022-48706: Do proper cleanup if IFCVF init fails (bsc#1225524). * CVE-2024-43883: Do not drop references before new references are gained (bsc#1229707). * CVE-2024-41062: Sync sock recv cb and release (bsc#1228576). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500). * CVE-2023-52489: Fix race in accessing memory_section->usage (bsc#1221326). * CVE-2024-43893: Check uartclk for zero to avoid divide by zero (bsc#1229759). * CVE-2024-43821: Fix a possible null pointer dereference (bsc#1229315). * CVE-2024-43900: Avoid use-after-free in load_firmware_cb() (bsc#1229756). * CVE-2024-44938: Fix shift-out-of-bounds in dbDiscardAG (bsc#1229792). * CVE-2024-44939: Fix null ptr deref in dtInsertEntry (bsc#1229820). * CVE-2024-41087: Fix double free on error (bsc#1228466). * CVE-2024-42277: Avoid NULL deref in sprd_iommu_hw_en (bsc#1229409). * CVE-2024-43902: Add null checker before passing variables (bsc#1229767). * CVE-2024-43904: Add null checks for 'stream' and 'plane' before dereferencing (bsc#1229768) * CVE-2024-43880: Put back removed metod in struct objagg_ops (bsc#1229481). * CVE-2024-43884: Add error handling to pair_device() (bsc#1229739) * CVE-2024-43899: Fix null pointer deref in dcn20_resource.c (bsc#1229754). * CVE-2022-48920: Get rid of warning on transaction commit when using flushoncommit (bsc#1229658). * CVE-2023-52906: Fix warning during failed attribute validation (bsc#1229527). * CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503) * CVE-2024-43866: Always drain health in shutdown callback (bsc#1229495). * CVE-2024-26812: struct virqfd kABI workaround (bsc#1222808). * CVE-2022-48912: Fix use-after-free in __nf_register_net_hook() (bsc#1229641) * CVE-2024-27010: Fix mirred deadlock on device recursion (bsc#1223720). * CVE-2022-48906: Correctly set DATA_FIN timeout when number of retransmits is large (bsc#1229605) * CVE-2024-42155: Wipe copies of protected- and secure-keys (bsc#1228733). * CVE-2024-42156: Wipe copies of clear-key structures on failure (bsc#1228722). * CVE-2023-52899: Add exception protection processing for vd in axi_chan_handle_err function (bsc#1229569). * CVE-2024-42158: Use kfree_sensitive() to fix Coccinelle warnings (bsc#1228720). * CVE-2024-26631: Fix data-race in ipv6_mc_down / mld_ifc_work (bsc#1221630). * CVE-2024-43873: Always initialize seqpacket_allow (bsc#1229488) * CVE-2024-40905: Fix possible race in __fib6_drop_pcpu_from() (bsc#1227761) * CVE-2024-39489: Fix memleak in seg6_hmac_init_algo (bsc#1227623) * CVE-2021-47106: Fix use-after-free in nft_set_catchall_destroy() (bsc#1220962) * CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225428). * CVE-2024-36489: Fix missing memory barrier in tls_init (bsc#1226874) * CVE-2024-41020: Fix fcntl/close race recovery compat path (bsc#1228427). * CVE-2024-27079: Fix NULL domain on device release (bsc#1223742). * CVE-2024-35897: Discard table flag update with pending basechain deletion (bsc#1224510). * CVE-2024-27403: Restore const specifier in flow_offload_route_init() (bsc#1224415). * CVE-2024-27011: Fix memleak in map from abort path (bsc#1223803). * CVE-2024-43819: Reject memory region operations for ucontrol VMs (bsc#1229290). * CVE-2024-26668: Reject configurations that cause integer overflow (bsc#1222335). * CVE-2024-26835: Set dormant flag on hook register failure (bsc#1222967). * CVE-2024-26808: Handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634). * CVE-2024-27016: Validate pppoe header (bsc#1223807). * CVE-2024-35945: Prevent nullptr exceptions on ISR (bsc#1224639). * CVE-2023-52581: Fix memleak when more than 255 elements expired (bsc#1220877). * CVE-2024-36013: Fix slab-use-after-free in l2cap_connect() (bsc#1225578). * CVE-2024-43837: Fix updating attached freplace prog in prog_array map (bsc#1229297). * CVE-2024-42291: Add a per-VF limit on number of FDIR filters (bsc#1229374). * CVE-2024-42268: Fix missing lock on sync reset reload (bsc#1229391). * CVE-2024-43834: Fix invalid wait context of page_pool_destroy() (bsc#1229314) * CVE-2024-36286: Acquire rcu_read_lock() in instance_destroy_rcu() (bsc#1226801) * CVE-2024-26851: Add protection for bmp length out of range (bsc#1223074) * CVE-2024-42157: Wipe sensitive data on failure (bsc#1228727). * CVE-2024-26677: Blacklist e7870cf13d20 (" Fix delayed ACKs to not set the reference serial number") (bsc#1222387) * CVE-2024-36009: Blacklist 467324bcfe1a ("ax25: Fix netdev refcount issue") (bsc#1224542) * CVE-2023-52859: Fix use-after-free when register pmu fails (bsc#1225582). * CVE-2024-42280: Fix a use after free in hfcmulti_tx() (bsc#1229388) * CVE-2024-42284: Return non-zero value from tipc_udp_addr2str() on error (bsc#1229382) * CVE-2024-42283: Initialize all fields in dumped nexthops (bsc#1229383) * CVE-2024-42312: Always initialize i_uid/i_gid (bsc#1229357) * CVE-2024-43854: Initialize integrity buffer to zero before writing it to media (bsc#1229345) * CVE-2024-42322: Properly dereference pe in ip_vs_add_service (bsc#1229347) * CVE-2024-42301: Fix the array out-of-bounds risk (bsc#1229407). * CVE-2024-42318: Do not lose track of restrictions on cred_transfer (bsc#1229351). * CVE-2024-26669: Fix chain template offload (bsc#1222350). * CVE-2023-52889: Fix null pointer deref when receiving skb during sock creation (bsc#1229287). * CVE-2022-48645: Move enetc_set_psfp() out of the common enetc_set_features() (bsc#1223508). * CVE-2024-41007: Use signed arithmetic in tcp_rtx_probe0_timed_out() (bsc#1227863). * CVE-2024-36933: Use correct mac_offset to unwind gso skb in nsh_gso_segment() (bsc#1225832). * CVE-2024-42295: Handle inconsistent state in nilfs_btnode_create_block() (bsc#1229370). * CVE-2024-42319: Move devm_mbox_controller_register() after devm_pm_runtime_enable() (bsc#1229350). * CVE-2024-43860: Skip over memory region when node value is NULL (bsc#1229319). * CVE-2024-43831: Handle invalid decoder vsi (bsc#1229309). * CVE-2024-43849: Protect locator_addr with the main mutex (bsc#1229307). * CVE-2024-43841: Do not use strlen() in const context (bsc#1229304). * CVE-2024-43839: Adjust 'name' buf size of bna_tcb and bna_ccb structures (bsc#1229301). * CVE-2024-41088: Fix infinite loop when xmit fails (bsc#1228469). * CVE-2024-42281: Fix a segment issue when downgrading gso_size (bsc#1229386). * CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400) * CVE-2024-41080: Fix possible deadlock in io_register_iowq_max_workers() (bsc#1228616). * CVE-2024-42246: Remap EPERM in case of connection failure in xs_tcp_setup_socket (bsc#1228989). * CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop(). (bsc#1228959) * CVE-2024-26735: Fix possible use-after-free and null-ptr-deref (bsc#1222372). * CVE-2024-42106: Initialize pad field in struct inet_diag_req_v2 (bsc#1228493). * CVE-2024-38662: Cover verifier checks for mutating sockmap/sockhash (bsc#1226885). * CVE-2024-42110: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() (bsc#1228501). * CVE-2024-42247: Avoid unaligned 64-bit memory accesses (bsc#1228988). * CVE-2022-48865: Fix kernel panic when enabling bearer (bsc#1228065). * CVE-2023-52498: Fix possible deadlocks in core system-wide PM code (bsc#1221269). * CVE-2024-41068: Fix sclp_init() cleanup on failure (bsc#1228579). * CVE-2022-48808: Fix panic when DSA master device unbinds on shutdown (bsc#1227958). * CVE-2024-42095: Fix Errata i2310 with RX FIFO level check (bsc#1228446). * CVE-2024-40978: Fix crash while reading debugfs attribute (bsc#1227929). * CVE-2024-42107: Do not process extts if PTP is disabled (bsc#1228494). * CVE-2024-42139: Fix improper extts handling (bsc#1228503). * CVE-2024-42148: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487). * CVE-2024-42142: E-switch, Create ingress ACL when needed (bsc#1228491). * CVE-2024-42162: Account for stopped queues when reading NIC stats (bsc#1228706). * CVE-2024-42082: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482). * CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526). * CVE-2023-3610: Fixed use-after-free vulnerability in nf_tables can be exploited to achieve local privilege escalation (bsc#1213580). * CVE-2024-42228: Using uninitialized value *size when calling amdgpu_vce_cs_reloc (bsc#1228667). * CVE-2024-40995: Fix possible infinite loop in tcf_idr_check_alloc() (bsc#1227830). * CVE-2024-38602: Merge repeat codes in ax25_dev_device_down() (bsc#1226613). * CVE-2024-38554: Fix reference count leak issue of net_device (bsc#1226742). * CVE-2024-36929: Reject skb_copy(_expand) for fraglist GSO skbs (bsc#1225814). * CVE-2024-41009: Fix overrunning reservations in ringbuf (bsc#1228020). * CVE-2024-27024: Fix WARNING in rds_conn_connect_if_down (bsc#1223777). The following non-security bugs were fixed: * ACPI: bus: Indicate support for IRQ ResourceSource thru _OSC (git-fixes). * ACPI: bus: Indicate support for the Generic Event Device thru _OSC (git- fixes). * ACPI: bus: Rework system-level device notification handling (git-fixes). * ACPI: thermal: Drop nocrt parameter (git-fixes). * ACPI: x86: s2idle: Post-increment variables when getting constraints (git- fixes). * afs: Do not cross .backup mountpoint from backup volume (git-fixes). * ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable- fixes). * ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes). * ALSA: hda/realtek: Fix noise from speakers on Lenovo IdeaPad 3 15IAU7 (git- fixes). * ALSA: line6: Fix racy access to midibuf (stable-fixes). * ALSA: timer: Relax start tick time check for slave timer elements (git- fixes). * ALSA: usb-audio: Add delay quirk for VIVO USB-C-XE710 HEADSET (stable- fixes). * ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes). * ALSA: usb-audio: Support Yamaha P-125 quirk entry (stable-fixes). * ALSA: usb: Fix UBSAN warning in parse_audio_unit() (stable-fixes). * arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git- fixes) * arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git- fixes) * arm64: Add Neoverse-V2 part (git-fixes) * arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git- fixes) * arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git- fixes) * arm64: barrier: Restore spec_bar() macro (git-fixes) * arm64: cpufeature: Add missing .field_width for GIC system registers (git- fixes) * arm64: cpufeature: Fix the visibility of compat hwcaps (git-fixes) * arm64: cpufeature: Force HWCAP to be based on the sysreg visible to (git- fixes) * arm64: cputype: Add Cortex-A720 definitions (git-fixes) * arm64: cputype: Add Cortex-A725 definitions (git-fixes) * arm64: cputype: Add Cortex-X1C definitions (git-fixes) * arm64: cputype: Add Cortex-X3 definitions (git-fixes) * arm64: cputype: Add Cortex-X4 definitions (git-fixes) * arm64: cputype: Add Cortex-X925 definitions (git-fixes) * arm64: cputype: Add Neoverse-V3 definitions (git-fixes) * arm64: dts: rockchip: Increase VOP clk rate on RK3328 (git-fixes) * arm64: dts: rockchip: Increase VOP clk rate on RK3328 (git-fixes) * arm64: errata: Expand speculative SSBS workaround (again) (git-fixes) * arm64: errata: Expand speculative SSBS workaround (git-fixes) * arm64: errata: Unify speculative SSBS errata logic (git-fixes) Also update default configuration. * arm64: Fix KASAN random tag seed initialization (git-fixes) * arm64: Fix KASAN random tag seed initialization (git-fixes) * ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes). * ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes). * async: Introduce async_schedule_dev_nocall() (bsc#1221269). * async: Split async_schedule_node_domain() (bsc#1221269). * Bluetooth: Fix usage of __hci_cmd_sync_status (git-fixes). * Bluetooth: hci_core: Fix not handling hibernation actions (git-fixes). * Bluetooth: l2cap: always unlock channel in l2cap_conless_channel() (git- fixes). * Bluetooth: L2CAP: Fix deadlock (git-fixes). * bpf: Fix a kernel verifier crash in stacksafe() (bsc#1225903). * bpf: kprobe: remove unused declaring of bpf_kprobe_override (git-fixes). * btrfs: fix leak of qgroup extent records after transaction abort (git- fixes). * btrfs: make btrfs_destroy_delayed_refs() return void (git-fixes). * btrfs: remove unnecessary prototype declarations at disk-io.c (git-fixes). * btrfs: sysfs: update fs features directory asynchronously (bsc#1226168). * cachefiles: propagate errors from vfs_getxattr() to avoid infinite loop (bsc#1229418). * ceph: issue a cap release immediately if no cap exists (bsc#1225162). * ceph: periodically flush the cap releases (bsc#1225162). * cpu/SMT: Enable SMT only if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes). * cpuidle, ACPI: Evaluate LPI arch_flags for broadcast timer (git-fixes). * docs: KVM: Fix register ID of SPSR_FIQ (git-fixes). * drm: add missing MODULE_DESCRIPTION() macros (stable-fixes). * drm: panel-orientation-quirks: Add labels for both Valve Steam Deck revisions (stable-fixes). * drm: panel-orientation-quirks: Add quirk for Aya Neo KUN (stable-fixes). * drm: panel-orientation-quirks: Add quirk for Lenovo Yoga Tab 3 X90F (stable- fixes). * drm: panel-orientation-quirks: Add quirk for Nanote UMPC-01 (stable-fixes). * drm: panel-orientation-quirks: Add quirk for OrangePi Neo (stable-fixes). * drm/amd/amdgpu/imu_v11_0: Increase buffer size to ensure all possible values can be stored (stable-fixes). * drm/amd/display: Add NULL check for 'afb' before dereferencing in amdgpu_dm_plane_handle_cursor_update (stable-fixes). * drm/amd/display: avoid using null object of framebuffer (git-fixes). * drm/amd/display: Fix && vs || typos (git-fixes). * drm/amd/display: Skip Recompute DSC Params if no Stream on Link (stable- fixes). * drm/amd/display: Validate hw_points_num before using it (stable-fixes). * drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr (stable- fixes). * drm/amdgpu: Actually check flags for all context ops (stable-fixes). * drm/amdgpu: Add lock around VF RLCG interface (stable-fixes). * drm/amdgpu: fix dereference null return value for the function amdgpu_vm_pt_parent (stable-fixes). * drm/amdgpu: Fix the null pointer dereference to ras_manager (stable-fixes). * drm/amdgpu: Validate TA binary size (stable-fixes). * drm/amdgpu/jpeg2: properly set atomics vmid field (stable-fixes). * drm/amdgpu/pm: Fix the null pointer dereference for smu7 (stable-fixes). * drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules (stable-fixes). * drm/amdgpu/pm: Fix the param type of set_power_profile_mode (stable-fixes). * drm/bridge: analogix_dp: properly handle zero sized AUX transactions (stable-fixes). * drm/bridge: tc358768: Attempt to fix DSI horizontal timings (stable-fixes). * drm/client: fix null pointer dereference in drm_client_modeset_probe (git- fixes). * drm/dp_mst: Skip CSN if topology probing is not done yet (stable-fixes). * drm/lima: set gp bus_stop bit before hard reset (stable-fixes). * drm/msm/dp: reset the link phy params before link training (git-fixes). * drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails (git-fixes). * drm/msm/dpu: do not play tricks with debug macros (git-fixes). * drm/tegra: Zero-initialize iosys_map (stable-fixes). * exfat: fix inode->i_blocks for non-512 byte sector size device (git-fixes). * exfat: fix potential deadlock on __exfat_get_dentry_set (git-fixes). * exfat: redefine DIR_DELETED as the bad cluster number (git-fixes). * exfat: support dynamic allocate bh for exfat_entry_set_cache (git-fixes). * fs/netfs/fscache_cookie: add missing "n_accesses" check (bsc#1229453). * fuse: Initialize beyond-EOF page contents before setting uptodate (bsc#1229454). * genirq: Add might_sleep() to disable_irq() (git-fixes). * genirq: Always limit the affinity to online CPUs (git-fixes). * genirq: Do not return error on missing optional irq_request_resources() (git-fixes). * genirq: Take the proposed affinity at face value if force==true (git-fixes). * genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline (git- fixes). * genirq/generic_chip: Make irq_remove_generic_chip() irqdomain aware (git- fixes). * genirq/ipi: Fix NULL pointer deref in irq_data_get_affinity_mask() (git- fixes). * genirq/irqdesc: Do not try to remove non-existing sysfs files (git-fixes). * genirq/matrix: Exclude managed interrupts in irq_matrix_allocated() (git- fixes). * genirq/msi: Shutdown managed interrupts with unsatifiable affinities (git- fixes). * gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey (git- fixes). * hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode() (git-fixes). * i2c: smbus: Improve handling of stuck alerts (git-fixes). * i2c: smbus: Send alert notifications to all devices if source not found (git-fixes). * iommu/amd: Convert comma to semicolon (git-fixes). * ip6_tunnel: Fix broken GRO (bsc#1229444). * ipv6: sr: fix incorrect unregister order (git-fixes). * irqdomain: Drop bogus fwspec-mapping error handling (git-fixes). * irqdomain: Fix association race (git-fixes). * irqdomain: Fix disassociation race (git-fixes). * irqdomain: Fix domain registration race (git-fixes). * irqdomain: Fix mapping-creation race (git-fixes). * irqdomain: Fixed unbalanced fwnode get and put (git-fixes). * irqdomain: Look for existing mapping only once (git-fixes). * irqdomain: Refactor __irq_domain_alloc_irqs() (git-fixes). * irqdomain: Report irq number for NOMAP domains (git-fixes). * kprobes: Fix to check symbol prefixes correctly (git-fixes). * lockd: move from strlcpy with unused retval to strscpy (git-fixes). * memcg: protect concurrent access to mem_cgroup_idr (git-fixes). * mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes). * mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes). * mmc: dw_mmc: allow biu and ciu clocks to defer (git-fixes). * mmc: mmc_test: Fix NULL dereference on allocation failure (git-fixes). * net: ks8851: Fix another TX stall caused by wrong ISR flag handling (git- fixes). * net: ks8851: Fix deadlock with the SPI chip variant (git-fixes). * net: ks8851: Fix potential TX stall after interface reopen (git-fixes). * net: ks8851: Fix TX stall caused by TX buffer overrun (gix-fixes). * net: mana: Add support for page sizes other than 4KB on ARM64 (jsc#PED-8491 bsc#1226530). * net: mana: Fix doorbell out of order violation and avoid unnecessary doorbell rings (bsc#1229154). * net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git- fixes). * net: mana: Fix RX buf alloc_size alignment and atomic op panic (bsc#1229086). * net: remove two BUG() from skb_checksum_help() (bsc#1229312). * net: usb: qmi_wwan: fix memory leak for not ip packets (git-fixes). * net/rds: fix possible cp null dereference (git-fixes). * net/sched: initialize noop_qdisc owner (git-fixes). * nfc: pn533: Add poll mod list filling check (git-fixes). * nfs: expose /proc/net/sunrpc/nfs in net namespaces (git-fixes). * nfs: make the rpc_stat per net namespace (git-fixes). * NFSD: add posix ACLs to struct nfsd_attrs (git-fixes). * NFSD: add security label to struct nfsd_attrs (git-fixes). * NFSD: fix regression with setting ACLs (git-fixes). * NFSD: Fix strncpy() fortify warning (git-fixes). * NFSD: Increase NFSD_MAX_OPS_PER_COMPOUND (git-fixes). * NFSD: introduce struct nfsd_attrs (git-fixes). * NFSD: move from strlcpy with unused retval to strscpy (git-fixes). * NFSD: Optimize DRC bucket pruning (git-fixes). * nfsd: return error if nfs4_setacl fails (git-fixes). * NFSD: set attributes when creating symlinks (git-fixes). * nfsd: use locks_inode_context helper (git-fixes). * nilfs2: Remove check for PageError (git-fixes). * nvme_core: scan namespaces asynchronously (bsc#1224105). * ocfs2: use coarse time for new created files (git-fixes). * padata: Fix possible divide-by-0 panic in padata_mt_helper() (git-fixes). * perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09 (git- fixes). * platform/x86/amd/hsmp: Add support for ACPI based probing (jsc#PED-8779). * platform/x86/amd/hsmp: Cache pci_dev in struct hsmp_socket (jsc#PED-8779). * platform/x86/amd/hsmp: Change devm_kzalloc() to devm_kcalloc() (jsc#PED-8779). * platform/x86/amd/hsmp: Check HSMP support on AMD family of processors (jsc#PED-8779). * platform/x86/amd/hsmp: Check num_sockets against MAX_AMD_SOCKETS (jsc#PED-8779). * platform/x86/amd/hsmp: Create static func to handle platdev (jsc#PED-8779). * platform/x86/amd/hsmp: Define a struct to hold mailbox regs (jsc#PED-8779). * platform/x86/amd/hsmp: Move dev from platdev to hsmp_socket (jsc#PED-8779). * platform/x86/amd/hsmp: Move hsmp_test to probe (jsc#PED-8779). * platform/x86/amd/hsmp: Non-ACPI support for AMD F1A_M00~0Fh (jsc#PED-8779). * platform/x86/amd/hsmp: Remove extra parenthesis and add a space (jsc#PED-8779). * platform/x86/amd/hsmp: Restructure sysfs group creation (jsc#PED-8779). * platform/x86/amd/hsmp: switch to use device_add_groups() (jsc#PED-8779). * power: supply: axp288_charger: Fix constant_charge_voltage writes (git- fixes). * power: supply: axp288_charger: Round constant_charge_voltage writes down (git-fixes). * powerpc: Fail build if using recordmcount with binutils v2.37 (bsc#1194869). * powerpc: Mark .opd section read-only (bsc#1194869). * powerpc: use generic version of arch_is_kernel_initmem_freed() (bsc#1194869). * powerpc: xor_vmx: Add '-mhard-float' to CFLAGS (bsc#1194869). * powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for CONFIG_PCI=n (bsc#1194869). * powerpc/io: Avoid clang null pointer arithmetic warnings (bsc#1194869). * powerpc/kexec_file: fix cpus node update to FDT (bsc#1194869). * powerpc/kexec: make the update_cpus_node() function public (bsc#1194869). * powerpc/kexec: split CONFIG_KEXEC_FILE and CONFIG_CRASH_DUMP (bsc#1194869). * powerpc/pseries: Add failure related checks for h_get_mpp and h_get_ppp (bsc#1194869). * powerpc/pseries: Whitelist dtl slub object for copying to userspace (bsc#1194869). * powerpc/radix: Move some functions into #ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE (bsc#1194869). * powerpc/topology: Check if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes). * powerpc/xmon: Check cpu id in commands "c#", "dp#" and "dx#" (bsc#1194869). * RDMA/mana_ib: Use virtual address in dma regions for MRs (git-fixes). * RDMA/rxe: Fix incomplete state save in rxe_requester (git-fixes) * RDMA/rxe: Fix rxe_modify_srq (git-fixes) * RDMA/rxe: Handle zero length rdma (git-fixes) * RDMA/rxe: Move work queue code to subroutines (git-fixes) * s390/cpacf: get rid of register asm (git-fixes bsc#1227079 bsc#1229187). * s390/cpacf: Make use of invalid opcode produce a link error (git-fixes bsc#1227079). * s390/cpacf: Split and rework cpacf query functions (git-fixes bsc#1229187). * s390/dasd: fix error checks in dasd_copy_pair_store() (git-fixes bsc#1229190). * s390/dasd: fix error recovery leading to data corruption on ESE devices (git-fixes bsc#1229573). * s390/sclp: Prevent release of buffer in I/O (git-fixes bsc#1229572). * s390/uv: Panic for set and remove shared access UVC errors (git-fixes bsc#1229188). * spi: spi-fsl-lpspi: Fix scldiv calculation (git-fixes). * sunrpc: add a struct rpc_stats arg to rpc_create_args (git-fixes). * SUNRPC: Fix a race to wake a sync task (git-fixes). * swiotlb: fix swiotlb_bounce() to do partial sync's correctly (git-fixes). * syscalls: fix compat_sys_io_pgetevents_time64 usage (git-fixes). * tracing: Return from tracing_buffers_read() if the file has been closed (bsc#1229136 git-fixes). * ubifs: add check for crypto_shash_tfm_digest (git-fixes). * ubifs: dbg_orphan_check: Fix missed key type checking (git-fixes). * ubifs: Fix adding orphan entry twice for the same inode (git-fixes). * ubifs: Fix unattached xattr inode if powercut happens after deleting (git- fixes). * vfio/pci: fix potential memory leak in vfio_intx_enable() (git-fixes). * wifi: iwlwifi: fw: fix wgds rev 3 exact size (git-fixes). * wifi: mwifiex: duplicate static structs used in driver instances (git- fixes). * x86/APM: drop the duplicate APM_MINOR_DEV macro (git-fixes). * x86/insn: Fix PUSH instruction in x86 instruction decoder opcode map (git- fixes). * x86/mm: Fix pti_clone_entry_text() for i386 (git-fixes). * x86/mtrr: Check if fixed MTRRs exist before saving them (git-fixes). * x86/pm: Work around false positive kmemleak report in msr_build_context() (git-fixes). * xfs: Fix missing interval for missing_owner in xfs fsmap (git-fixes). * xfs: Fix the owner setting issue for rmap query in xfs fsmap (git-fixes). * xfs: use XFS_BUF_DADDR_NULL for daddrs in getfsmap code (git-fixes). * xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration (git-fixes). * xprtrdma: Fix rpcrdma_reqs_reset() (git-fixes).

References

* bsc#1193629

* bsc#1194111

* bsc#1194765

* bsc#1194869

* bsc#1196261

* bsc#1196516

* bsc#1196894

* bsc#1198017

* bsc#1203329

* bsc#1203330

* bsc#1203360

* bsc#1205462

* bsc#1206006

* bsc#1206258

* bsc#1206843

* bsc#1207158

* bsc#1208783

* bsc#1210644

* bsc#1213580

* bsc#1213632

* bsc#1214285

* bsc#1216834

* bsc#1220428

* bsc#1220877

* bsc#1220962

* bsc#1221269

* bsc#1221326

* bsc#1221630

* bsc#1221645

* bsc#1222335

* bsc#1222350

* bsc#1222372

* bsc#1222387

* bsc#1222634

* bsc#1222808

* bsc#1222967

* bsc#1223074

* bsc#1223191

* bsc#1223508

* bsc#1223720

* bsc#1223742

* bsc#1223777

* bsc#1223803

* bsc#1223807

* bsc#1224105

* bsc#1224415

* bsc#1224496

* bsc#1224510

* bsc#1224542

* bsc#1224578

* bsc#1224639

* bsc#1225162

* bsc#1225352

* bsc#1225428

* bsc#1225524

* bsc#1225578

* bsc#1225582

* bsc#1225773

* bsc#1225814

* bsc#1225827

* bsc#1225832

* bsc#1225903

* bsc#1226168

* bsc#1226530

* bsc#1226613

* bsc#1226742

* bsc#1226765

* bsc#1226798

* bsc#1226801

* bsc#1226874

* bsc#1226885

* bsc#1227079

* bsc#1227623

* bsc#1227761

* bsc#1227830

* bsc#1227863

* bsc#1227867

* bsc#1227929

* bsc#1227937

* bsc#1227958

* bsc#1228020

* bsc#1228065

* bsc#1228114

* bsc#1228410

* bsc#1228426

* bsc#1228427

* bsc#1228429

* bsc#1228446

* bsc#1228447

* bsc#1228449

* bsc#1228450

* bsc#1228452

* bsc#1228456

* bsc#1228463

* bsc#1228466

* bsc#1228467

* bsc#1228469

* bsc#1228480

* bsc#1228481

* bsc#1228482

* bsc#1228483

* bsc#1228484

* bsc#1228485

* bsc#1228487

* bsc#1228489

* bsc#1228491

* bsc#1228493

* bsc#1228494

* bsc#1228495

* bsc#1228496

* bsc#1228501

* bsc#1228503

* bsc#1228509

* bsc#1228513

* bsc#1228515

* bsc#1228516

* bsc#1228526

* bsc#1228531

* bsc#1228563

* bsc#1228564

* bsc#1228567

* bsc#1228576

* bsc#1228579

* bsc#1228584

* bsc#1228588

* bsc#1228590

* bsc#1228615

* bsc#1228616

* bsc#1228635

* bsc#1228636

* bsc#1228654

* bsc#1228656

* bsc#1228658

* bsc#1228660

* bsc#1228662

* bsc#1228667

* bsc#1228673

* bsc#1228677

* bsc#1228687

* bsc#1228706

* bsc#1228708

* bsc#1228710

* bsc#1228718

* bsc#1228720

* bsc#1228721

* bsc#1228722

* bsc#1228724

* bsc#1228726

* bsc#1228727

* bsc#1228733

* bsc#1228748

* bsc#1228766

* bsc#1228779

* bsc#1228801

* bsc#1228850

* bsc#1228857

* bsc#1228959

* bsc#1228964

* bsc#1228966

* bsc#1228967

* bsc#1228979

* bsc#1228988

* bsc#1228989

* bsc#1228991

* bsc#1228992

* bsc#1229042

* bsc#1229054

* bsc#1229086

* bsc#1229136

* bsc#1229154

* bsc#1229187

* bsc#1229188

* bsc#1229190

* bsc#1229287

* bsc#1229290

* bsc#1229292

* bsc#1229296

* bsc#1229297

* bsc#1229301

* bsc#1229303

* bsc#1229304

* bsc#1229305

* bsc#1229307

* bsc#1229309

* bsc#1229312

* bsc#1229314

* bsc#1229315

* bsc#1229317

* bsc#1229318

* bsc#1229319

* bsc#1229327

* bsc#1229341

* bsc#1229345

* bsc#1229346

* bsc#1229347

* bsc#1229349

* bsc#1229350

* bsc#1229351

* bsc#1229354

* bsc#1229356

* bsc#1229357

* bsc#1229358

* bsc#1229359

* bsc#1229360

* bsc#1229366

* bsc#1229370

* bsc#1229373

* bsc#1229374

* bsc#1229381

* bsc#1229382

* bsc#1229383

* bsc#1229386

* bsc#1229388

* bsc#1229391

* bsc#1229392

* bsc#1229395

* bsc#1229398

* bsc#1229399

* bsc#1229400

* bsc#1229407

* bsc#1229409

* bsc#1229410

* bsc#1229411

* bsc#1229413

* bsc#1229414

* bsc#1229417

* bsc#1229418

* bsc#1229444

* bsc#1229453

* bsc#1229454

* bsc#1229481

* bsc#1229482

* bsc#1229488

* bsc#1229489

* bsc#1229490

* bsc#1229493

* bsc#1229495

* bsc#1229497

* bsc#1229500

* bsc#1229503

* bsc#1229506

* bsc#1229507

* bsc#1229508

* bsc#1229509

* bsc#1229510

* bsc#1229512

* bsc#1229516

* bsc#1229521

* bsc#1229522

* bsc#1229523

* bsc#1229524

* bsc#1229525

* bsc#1229526

* bsc#1229527

* bsc#1229528

* bsc#1229529

* bsc#1229531

* bsc#1229533

* bsc#1229535

* bsc#1229536

* bsc#1229537

* bsc#1229540

* bsc#1229544

* bsc#1229545

* bsc#1229546

* bsc#1229547

* bsc#1229548

* bsc#1229554

* bsc#1229557

* bsc#1229558

* bsc#1229559

* bsc#1229560

* bsc#1229562

* bsc#1229564

* bsc#1229565

* bsc#1229566

* bsc#1229568

* bsc#1229569

* bsc#1229572

* bsc#1229573

* bsc#1229576

* bsc#1229581

* bsc#1229588

* bsc#1229598

* bsc#1229603

* bsc#1229604

* bsc#1229605

* bsc#1229608

* bsc#1229611

* bsc#1229612

* bsc#1229613

* bsc#1229614

* bsc#1229615

* bsc#1229616

* bsc#1229617

* bsc#1229620

* bsc#1229622

* bsc#1229623

* bsc#1229624

* bsc#1229625

* bsc#1229626

* bsc#1229628

* bsc#1229629

* bsc#1229630

* bsc#1229631

* bsc#1229632

* bsc#1229635

* bsc#1229636

* bsc#1229637

* bsc#1229638

* bsc#1229639

* bsc#1229641

* bsc#1229642

* bsc#1229643

* bsc#1229645

* bsc#1229657

* bsc#1229658

* bsc#1229662

* bsc#1229664

* bsc#1229707

* bsc#1229739

* bsc#1229743

* bsc#1229746

* bsc#1229754

* bsc#1229755

* bsc#1229756

* bsc#1229759

* bsc#1229761

* bsc#1229767

* bsc#1229768

* bsc#1229781

* bsc#1229784

* bsc#1229787

* bsc#1229788

* bsc#1229789

* bsc#1229792

* bsc#1229820

* jsc#PED-8491

* jsc#PED-8779

Cross-

* CVE-2021-4441

* CVE-2021-47106

* CVE-2021-47517

* CVE-2021-47546

* CVE-2022-38457

* CVE-2022-40133

* CVE-2022-48645

* CVE-2022-48706

* CVE-2022-48808

* CVE-2022-48865

* CVE-2022-48868

* CVE-2022-48869

* CVE-2022-48870

* CVE-2022-48871

* CVE-2022-48872

* CVE-2022-48873

* CVE-2022-48875

* CVE-2022-48878

* CVE-2022-48880

* CVE-2022-48881

* CVE-2022-48882

* CVE-2022-48883

* CVE-2022-48884

* CVE-2022-48885

* CVE-2022-48886

* CVE-2022-48887

* CVE-2022-48888

* CVE-2022-48889

* CVE-2022-48890

* CVE-2022-48891

* CVE-2022-48893

* CVE-2022-48896

* CVE-2022-48898

* CVE-2022-48899

* CVE-2022-48903

* CVE-2022-48904

* CVE-2022-48905

* CVE-2022-48906

* CVE-2022-48907

* CVE-2022-48909

* CVE-2022-48910

* CVE-2022-48912

* CVE-2022-48913

* CVE-2022-48914

* CVE-2022-48915

* CVE-2022-48916

* CVE-2022-48917

* CVE-2022-48918

* CVE-2022-48919

* CVE-2022-48920

* CVE-2022-48921

* CVE-2022-48923

* CVE-2022-48924

* CVE-2022-48925

* CVE-2022-48926

* CVE-2022-48927

* CVE-2022-48928

* CVE-2022-48929

* CVE-2022-48930

* CVE-2022-48931

* CVE-2022-48932

* CVE-2022-48934

* CVE-2022-48937

* CVE-2022-48938

* CVE-2022-48939

* CVE-2022-48940

* CVE-2022-48941

* CVE-2022-48942

* CVE-2022-48943

* CVE-2023-3610

* CVE-2023-52458

* CVE-2023-52489

* CVE-2023-52498

* CVE-2023-52581

* CVE-2023-52859

* CVE-2023-52887

* CVE-2023-52889

* CVE-2023-52893

* CVE-2023-52894

* CVE-2023-52896

* CVE-2023-52898

* CVE-2023-52899

* CVE-2023-52900

* CVE-2023-52901

* CVE-2023-52904

* CVE-2023-52905

* CVE-2023-52906

* CVE-2023-52907

* CVE-2023-52908

* CVE-2023-52909

* CVE-2023-52910

* CVE-2023-52911

* CVE-2023-52912

* CVE-2023-52913

* CVE-2024-26631

* CVE-2024-26668

* CVE-2024-26669

* CVE-2024-26677

* CVE-2024-26735

* CVE-2024-26808

* CVE-2024-26812

* CVE-2024-26835

* CVE-2024-26851

* CVE-2024-27010

* CVE-2024-27011

* CVE-2024-27016

* CVE-2024-27024

* CVE-2024-27079

* CVE-2024-27403

* CVE-2024-31076

* CVE-2024-35897

* CVE-2024-35902

* CVE-2024-35945

* CVE-2024-35971

* CVE-2024-36009

* CVE-2024-36013

* CVE-2024-36270

* CVE-2024-36286

* CVE-2024-36489

* CVE-2024-36929

* CVE-2024-36933

* CVE-2024-36936

* CVE-2024-36962

* CVE-2024-38554

* CVE-2024-38602

* CVE-2024-38662

* CVE-2024-39489

* CVE-2024-40905

* CVE-2024-40978

* CVE-2024-40980

* CVE-2024-40995

* CVE-2024-41000

* CVE-2024-41007

* CVE-2024-41009

* CVE-2024-41011

* CVE-2024-41016

* CVE-2024-41020

* CVE-2024-41022

* CVE-2024-41035

* CVE-2024-41036

* CVE-2024-41038

* CVE-2024-41039

* CVE-2024-41042

* CVE-2024-41045

* CVE-2024-41056

* CVE-2024-41060

* CVE-2024-41062

* CVE-2024-41065

* CVE-2024-41068

* CVE-2024-41073

* CVE-2024-41079

* CVE-2024-41080

* CVE-2024-41087

* CVE-2024-41088

* CVE-2024-41089

* CVE-2024-41092

* CVE-2024-41093

* CVE-2024-41095

* CVE-2024-41097

* CVE-2024-41098

* CVE-2024-42069

* CVE-2024-42074

* CVE-2024-42076

* CVE-2024-42077

* CVE-2024-42080

* CVE-2024-42082

* CVE-2024-42085

* CVE-2024-42086

* CVE-2024-42087

* CVE-2024-42089

* CVE-2024-42090

* CVE-2024-42092

* CVE-2024-42095

* CVE-2024-42097

* CVE-2024-42098

* CVE-2024-42101

* CVE-2024-42104

* CVE-2024-42106

* CVE-2024-42107

* CVE-2024-42110

* CVE-2024-42114

* CVE-2024-42115

* CVE-2024-42119

* CVE-2024-42120

* CVE-2024-42121

* CVE-2024-42126

* CVE-2024-42127

* CVE-2024-42130

* CVE-2024-42137

* CVE-2024-42139

* CVE-2024-42142

* CVE-2024-42143

* CVE-2024-42148

* CVE-2024-42152

* CVE-2024-42155

* CVE-2024-42156

* CVE-2024-42157

* CVE-2024-42158

* CVE-2024-42162

* CVE-2024-42223

* CVE-2024-42225

* CVE-2024-42228

* CVE-2024-42229

* CVE-2024-42230

* CVE-2024-42232

* CVE-2024-42236

* CVE-2024-42237

* CVE-2024-42238

* CVE-2024-42239

* CVE-2024-42240

* CVE-2024-42244

* CVE-2024-42246

* CVE-2024-42247

* CVE-2024-42268

* CVE-2024-42271

* CVE-2024-42274

* CVE-2024-42276

* CVE-2024-42277

* CVE-2024-42280

* CVE-2024-42281

* CVE-2024-42283

* CVE-2024-42284

* CVE-2024-42285

* CVE-2024-42286

* CVE-2024-42287

* CVE-2024-42288

* CVE-2024-42289

* CVE-2024-42291

* CVE-2024-42292

* CVE-2024-42295

* CVE-2024-42301

* CVE-2024-42302

* CVE-2024-42308

* CVE-2024-42309

* CVE-2024-42310

* CVE-2024-42311

* CVE-2024-42312

* CVE-2024-42313

* CVE-2024-42315

* CVE-2024-42318

* CVE-2024-42319

* CVE-2024-42320

* CVE-2024-42322

* CVE-2024-43816

* CVE-2024-43818

* CVE-2024-43819

* CVE-2024-43821

* CVE-2024-43823

* CVE-2024-43829

* CVE-2024-43830

* CVE-2024-43831

* CVE-2024-43834

* CVE-2024-43837

* CVE-2024-43839

* CVE-2024-43841

* CVE-2024-43842

* CVE-2024-43846

* CVE-2024-43849

* CVE-2024-43853

* CVE-2024-43854

* CVE-2024-43856

* CVE-2024-43858

* CVE-2024-43860

* CVE-2024-43861

* CVE-2024-43863

* CVE-2024-43866

* CVE-2024-43867

* CVE-2024-43871

* CVE-2024-43872

* CVE-2024-43873

* CVE-2024-43879

* CVE-2024-43880

* CVE-2024-43882

* CVE-2024-43883

* CVE-2024-43884

* CVE-2024-43889

* CVE-2024-43892

* CVE-2024-43893

* CVE-2024-43894

* CVE-2024-43895

* CVE-2024-43899

* CVE-2024-43900

* CVE-2024-43902

* CVE-2024-43903

* CVE-2024-43904

* CVE-2024-43905

* CVE-2024-43907

* CVE-2024-43908

* CVE-2024-43909

* CVE-2024-44938

* CVE-2024-44939

* CVE-2024-44947

CVSS scores:

* CVE-2021-4441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47106 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H

* CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H

* CVE-2021-47546 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L

* CVE-2021-47546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-38457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-38457 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H

* CVE-2022-40133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-40133 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H

* CVE-2022-48645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48706 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L

* CVE-2022-48808 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2022-48808 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48869 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48869 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

* CVE-2022-48871 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

* CVE-2022-48872 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48872 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48873 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48875 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48878 ( SUSE ): 6.9

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2022-48878 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H

* CVE-2022-48878 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48880 ( SUSE ): 4.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N

* CVE-2022-48880 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L

* CVE-2022-48881 ( SUSE ): 4.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N

* CVE-2022-48881 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L

* CVE-2022-48881 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

* CVE-2022-48882 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2022-48882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48883 ( SUSE ): 7.3

CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

* CVE-2022-48883 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48884 ( SUSE ): 7.3

CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

* CVE-2022-48884 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48885 ( SUSE ): 4.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N

* CVE-2022-48885 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L

* CVE-2022-48885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48886 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48887 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48904 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2022-48905 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2022-48906 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L

* CVE-2022-48907 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2022-48909 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

* CVE-2022-48910 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

* CVE-2022-48912 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48912 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48913 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48919 ( SUSE ): 7.1

CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

* CVE-2022-48919 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48919 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48920 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2022-48920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48923 ( SUSE ): 7.3

CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

* CVE-2022-48923 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48924 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48925 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48927 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48928 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48931 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48932 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48934 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48937 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2022-48938 ( SUSE ): 5.4

CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

* CVE-2022-48938 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48939 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2022-48940 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48941 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48942 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48942 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48943 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2023-3610 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2023-3610 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2023-52458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52458 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52489 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52887 ( SUSE ): 0.0

CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N

* CVE-2023-52887 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N

* CVE-2023-52889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52894 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2023-52894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52898 ( SUSE ): 5.7

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2023-52898 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52899 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2023-52899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52900 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2023-52900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52912 ( SUSE ): 6.7

CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2023-52912 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-26631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-26668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-26669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-26677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-26735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-26808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-26812 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-26835 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

* CVE-2024-26851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-27010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-27011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-27016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-27016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-27024 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2024-27079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-27403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-31076 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36270 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36286 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N

* CVE-2024-36489 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36929 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36933 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

* CVE-2024-36936 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2024-36962 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38554 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38554 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38602 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38602 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38662 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38662 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N

* CVE-2024-39489 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2024-39489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40978 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40980 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41000 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-41007 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2024-41007 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2024-41009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41011 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-41011 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

* CVE-2024-41020 ( SUSE ): 5.8

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-41020 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H

* CVE-2024-41022 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-41022 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H

* CVE-2024-41035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41036 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41036 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41038 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

* CVE-2024-41038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41039 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

* CVE-2024-41039 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-41042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41045 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-41056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41060 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-41060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41062 ( SUSE ): 7.3

CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

* CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-41065 ( SUSE ): 6.7

CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-41065 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41068 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2024-41073 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-41073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-41079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-41087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-41088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41088 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41092 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-41093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41097 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42082 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42086 ( SUSE ): 5.8

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N

* CVE-2024-42086 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H

* CVE-2024-42087 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2024-42089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42097 ( SUSE ): 2.4

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

* CVE-2024-42097 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L

* CVE-2024-42098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42104 ( SUSE ): 6.9

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-42104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H

* CVE-2024-42104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-42106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42115 ( SUSE ): 5.7

CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-42115 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42130 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

* CVE-2024-42130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

* CVE-2024-42137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42143 ( SUSE ): 0.0

CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N

* CVE-2024-42143 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N

* CVE-2024-42148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42148 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-42152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42152 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42155 ( SUSE ): 5.6

CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

* CVE-2024-42155 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N

* CVE-2024-42155 ( NVD ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N

* CVE-2024-42156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42156 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N

* CVE-2024-42157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42157 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N

* CVE-2024-42158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42158 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N

* CVE-2024-42162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42162 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-42223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42225 ( NVD ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-42228 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-42229 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N

* CVE-2024-42229 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N

* CVE-2024-42230 ( SUSE ): 6.7

CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-42230 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42230 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42232 ( SUSE ): 7.3

CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

* CVE-2024-42232 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-42232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42236 ( SUSE ): 5.8

CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N

* CVE-2024-42236 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H

* CVE-2024-42236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42238 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42240 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-42240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42244 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-42244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42244 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42246 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42247 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42268 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2024-42268 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42271 ( SUSE ): 7.3

CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

* CVE-2024-42271 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-42271 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-42274 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-42274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42276 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-42276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42277 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-42277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42277 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42280 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-42281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42283 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42283 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42284 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-42285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42285 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-42286 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42286 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42287 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42289 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42291 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-42301 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-42302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-42308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42308 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42309 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42310 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42311 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

* CVE-2024-42311 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42313 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-42315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42315 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42322 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43818 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43823 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43837 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-43860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43872 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-43879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43882 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-43882 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-43883 ( SUSE ): 5.4

CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

* CVE-2024-43883 ( SUSE ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-43884 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-43884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43884 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43889 ( SUSE ): 5.7

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-43889 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43892 ( SUSE ): 5.7

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-43892 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43892 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43893 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-43893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43894 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-43894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43894 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43895 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-43895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43895 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43900 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-43900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-43902 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-43902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43903 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-43903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43904 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-43904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43905 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-43905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43907 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-43907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43908 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-43908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43909 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-43909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-44938 ( SUSE ): 7.3

CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

* CVE-2024-44938 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-44939 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-44939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-44947 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N

* CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* openSUSE Leap 15.5

* openSUSE Leap Micro 5.5

* SUSE Linux Enterprise High Performance Computing 15 SP5

* SUSE Linux Enterprise Live Patching 15-SP5

* SUSE Linux Enterprise Micro 5.5

* SUSE Linux Enterprise Real Time 15 SP5

* SUSE Linux Enterprise Server 15 SP5

* SUSE Linux Enterprise Server for SAP Applications 15 SP5

* SUSE Real Time Module 15-SP5

An update that solves 292 vulnerabilities, contains two features and has 45

security fixes can now be installed.

##

* https://www.suse.com/security/cve/CVE-2021-4441.html

* https://www.suse.com/security/cve/CVE-2021-47106.html

* https://www.suse.com/security/cve/CVE-2021-47517.html

* https://www.suse.com/security/cve/CVE-2021-47546.html

* https://www.suse.com/security/cve/CVE-2022-38457.html

* https://www.suse.com/security/cve/CVE-2022-40133.html

* https://www.suse.com/security/cve/CVE-2022-48645.html

* https://www.suse.com/security/cve/CVE-2022-48706.html

* https://www.suse.com/security/cve/CVE-2022-48808.html

* https://www.suse.com/security/cve/CVE-2022-48865.html

* https://www.suse.com/security/cve/CVE-2022-48868.html

* https://www.suse.com/security/cve/CVE-2022-48869.html

* https://www.suse.com/security/cve/CVE-2022-48870.html

* https://www.suse.com/security/cve/CVE-2022-48871.html

* https://www.suse.com/security/cve/CVE-2022-48872.html

* https://www.suse.com/security/cve/CVE-2022-48873.html

* https://www.suse.com/security/cve/CVE-2022-48875.html

* https://www.suse.com/security/cve/CVE-2022-48878.html

* https://www.suse.com/security/cve/CVE-2022-48880.html

* https://www.suse.com/security/cve/CVE-2022-48881.html

* https://www.suse.com/security/cve/CVE-2022-48882.html

* https://www.suse.com/security/cve/CVE-2022-48883.html

* https://www.suse.com/security/cve/CVE-2022-48884.html

* https://www.suse.com/security/cve/CVE-2022-48885.html

* https://www.suse.com/security/cve/CVE-2022-48886.html

* https://www.suse.com/security/cve/CVE-2022-48887.html

* https://www.suse.com/security/cve/CVE-2022-48888.html

* https://www.suse.com/security/cve/CVE-2022-48889.html

* https://www.suse.com/security/cve/CVE-2022-48890.html

* https://www.suse.com/security/cve/CVE-2022-48891.html

* https://www.suse.com/security/cve/CVE-2022-48893.html

* https://www.suse.com/security/cve/CVE-2022-48896.html

* https://www.suse.com/security/cve/CVE-2022-48898.html

* https://www.suse.com/security/cve/CVE-2022-48899.html

* https://www.suse.com/security/cve/CVE-2022-48903.html

* https://www.suse.com/security/cve/CVE-2022-48904.html

* https://www.suse.com/security/cve/CVE-2022-48905.html

* https://www.suse.com/security/cve/CVE-2022-48906.html

* https://www.suse.com/security/cve/CVE-2022-48907.html

* https://www.suse.com/security/cve/CVE-2022-48909.html

* https://www.suse.com/security/cve/CVE-2022-48910.html

* https://www.suse.com/security/cve/CVE-2022-48912.html

* https://www.suse.com/security/cve/CVE-2022-48913.html

* https://www.suse.com/security/cve/CVE-2022-48914.html

* https://www.suse.com/security/cve/CVE-2022-48915.html

* https://www.suse.com/security/cve/CVE-2022-48916.html

* https://www.suse.com/security/cve/CVE-2022-48917.html

* https://www.suse.com/security/cve/CVE-2022-48918.html

* https://www.suse.com/security/cve/CVE-2022-48919.html

* https://www.suse.com/security/cve/CVE-2022-48920.html

* https://www.suse.com/security/cve/CVE-2022-48921.html

* https://www.suse.com/security/cve/CVE-2022-48923.html

* https://www.suse.com/security/cve/CVE-2022-48924.html

* https://www.suse.com/security/cve/CVE-2022-48925.html

* https://www.suse.com/security/cve/CVE-2022-48926.html

* https://www.suse.com/security/cve/CVE-2022-48927.html

* https://www.suse.com/security/cve/CVE-2022-48928.html

* https://www.suse.com/security/cve/CVE-2022-48929.html

* https://www.suse.com/security/cve/CVE-2022-48930.html

* https://www.suse.com/security/cve/CVE-2022-48931.html

* https://www.suse.com/security/cve/CVE-2022-48932.html

* https://www.suse.com/security/cve/CVE-2022-48934.html

* https://www.suse.com/security/cve/CVE-2022-48937.html

* https://www.suse.com/security/cve/CVE-2022-48938.html

* https://www.suse.com/security/cve/CVE-2022-48939.html

* https://www.suse.com/security/cve/CVE-2022-48940.html

* https://www.suse.com/security/cve/CVE-2022-48941.html

* https://www.suse.com/security/cve/CVE-2022-48942.html

* https://www.suse.com/security/cve/CVE-2022-48943.html

* https://www.suse.com/security/cve/CVE-2023-3610.html

* https://www.suse.com/security/cve/CVE-2023-52458.html

* https://www.suse.com/security/cve/CVE-2023-52489.html

* https://www.suse.com/security/cve/CVE-2023-52498.html

* https://www.suse.com/security/cve/CVE-2023-52581.html

* https://www.suse.com/security/cve/CVE-2023-52859.html

* https://www.suse.com/security/cve/CVE-2023-52887.html

* https://www.suse.com/security/cve/CVE-2023-52889.html

* https://www.suse.com/security/cve/CVE-2023-52893.html

* https://www.suse.com/security/cve/CVE-2023-52894.html

* https://www.suse.com/security/cve/CVE-2023-52896.html

* https://www.suse.com/security/cve/CVE-2023-52898.html

* https://www.suse.com/security/cve/CVE-2023-52899.html

* https://www.suse.com/security/cve/CVE-2023-52900.html

* https://www.suse.com/security/cve/CVE-2023-52901.html

* https://www.suse.com/security/cve/CVE-2023-52904.html

* https://www.suse.com/security/cve/CVE-2023-52905.html

* https://www.suse.com/security/cve/CVE-2023-52906.html

* https://www.suse.com/security/cve/CVE-2023-52907.html

* https://www.suse.com/security/cve/CVE-2023-52908.html

* https://www.suse.com/security/cve/CVE-2023-52909.html

* https://www.suse.com/security/cve/CVE-2023-52910.html

* https://www.suse.com/security/cve/CVE-2023-52911.html

* https://www.suse.com/security/cve/CVE-2023-52912.html

* https://www.suse.com/security/cve/CVE-2023-52913.html

* https://www.suse.com/security/cve/CVE-2024-26631.html

* https://www.suse.com/security/cve/CVE-2024-26668.html

* https://www.suse.com/security/cve/CVE-2024-26669.html

* https://www.suse.com/security/cve/CVE-2024-26677.html

* https://www.suse.com/security/cve/CVE-2024-26735.html

* https://www.suse.com/security/cve/CVE-2024-26808.html

* https://www.suse.com/security/cve/CVE-2024-26812.html

* https://www.suse.com/security/cve/CVE-2024-26835.html

* https://www.suse.com/security/cve/CVE-2024-26851.html

* https://www.suse.com/security/cve/CVE-2024-27010.html

* https://www.suse.com/security/cve/CVE-2024-27011.html

* https://www.suse.com/security/cve/CVE-2024-27016.html

* https://www.suse.com/security/cve/CVE-2024-27024.html

* https://www.suse.com/security/cve/CVE-2024-27079.html

* https://www.suse.com/security/cve/CVE-2024-27403.html

* https://www.suse.com/security/cve/CVE-2024-31076.html

* https://www.suse.com/security/cve/CVE-2024-35897.html

* https://www.suse.com/security/cve/CVE-2024-35902.html

* https://www.suse.com/security/cve/CVE-2024-35945.html

* https://www.suse.com/security/cve/CVE-2024-35971.html

* https://www.suse.com/security/cve/CVE-2024-36009.html

* https://www.suse.com/security/cve/CVE-2024-36013.html

* https://www.suse.com/security/cve/CVE-2024-36270.html

* https://www.suse.com/security/cve/CVE-2024-36286.html

* https://www.suse.com/security/cve/CVE-2024-36489.html

* https://www.suse.com/security/cve/CVE-2024-36929.html

* https://www.suse.com/security/cve/CVE-2024-36933.html

* https://www.suse.com/security/cve/CVE-2024-36936.html

* https://www.suse.com/security/cve/CVE-2024-36962.html

* https://www.suse.com/security/cve/CVE-2024-38554.html

* https://www.suse.com/security/cve/CVE-2024-38602.html

* https://www.suse.com/security/cve/CVE-2024-38662.html

* https://www.suse.com/security/cve/CVE-2024-39489.html

* https://www.suse.com/security/cve/CVE-2024-40905.html

* https://www.suse.com/security/cve/CVE-2024-40978.html

* https://www.suse.com/security/cve/CVE-2024-40980.html

* https://www.suse.com/security/cve/CVE-2024-40995.html

* https://www.suse.com/security/cve/CVE-2024-41000.html

* https://www.suse.com/security/cve/CVE-2024-41007.html

* https://www.suse.com/security/cve/CVE-2024-41009.html

* https://www.suse.com/security/cve/CVE-2024-41011.html

* https://www.suse.com/security/cve/CVE-2024-41016.html

* https://www.suse.com/security/cve/CVE-2024-41020.html

* https://www.suse.com/security/cve/CVE-2024-41022.html

* https://www.suse.com/security/cve/CVE-2024-41035.html

* https://www.suse.com/security/cve/CVE-2024-41036.html

* https://www.suse.com/security/cve/CVE-2024-41038.html

* https://www.suse.com/security/cve/CVE-2024-41039.html

* https://www.suse.com/security/cve/CVE-2024-41042.html

* https://www.suse.com/security/cve/CVE-2024-41045.html

* https://www.suse.com/security/cve/CVE-2024-41056.html

* https://www.suse.com/security/cve/CVE-2024-41060.html

* https://www.suse.com/security/cve/CVE-2024-41062.html

* https://www.suse.com/security/cve/CVE-2024-41065.html

* https://www.suse.com/security/cve/CVE-2024-41068.html

* https://www.suse.com/security/cve/CVE-2024-41073.html

* https://www.suse.com/security/cve/CVE-2024-41079.html

* https://www.suse.com/security/cve/CVE-2024-41080.html

* https://www.suse.com/security/cve/CVE-2024-41087.html

* https://www.suse.com/security/cve/CVE-2024-41088.html

* https://www.suse.com/security/cve/CVE-2024-41089.html

* https://www.suse.com/security/cve/CVE-2024-41092.html

* https://www.suse.com/security/cve/CVE-2024-41093.html

* https://www.suse.com/security/cve/CVE-2024-41095.html

* https://www.suse.com/security/cve/CVE-2024-41097.html

* https://www.suse.com/security/cve/CVE-2024-41098.html

* https://www.suse.com/security/cve/CVE-2024-42069.html

* https://www.suse.com/security/cve/CVE-2024-42074.html

* https://www.suse.com/security/cve/CVE-2024-42076.html

* https://www.suse.com/security/cve/CVE-2024-42077.html

* https://www.suse.com/security/cve/CVE-2024-42080.html

* https://www.suse.com/security/cve/CVE-2024-42082.html

* https://www.suse.com/security/cve/CVE-2024-42085.html

* https://www.suse.com/security/cve/CVE-2024-42086.html

* https://www.suse.com/security/cve/CVE-2024-42087.html

* https://www.suse.com/security/cve/CVE-2024-42089.html

* https://www.suse.com/security/cve/CVE-2024-42090.html

* https://www.suse.com/security/cve/CVE-2024-42092.html

* https://www.suse.com/security/cve/CVE-2024-42095.html

* https://www.suse.com/security/cve/CVE-2024-42097.html

* https://www.suse.com/security/cve/CVE-2024-42098.html

* https://www.suse.com/security/cve/CVE-2024-42101.html

* https://www.suse.com/security/cve/CVE-2024-42104.html

* https://www.suse.com/security/cve/CVE-2024-42106.html

* https://www.suse.com/security/cve/CVE-2024-42107.html

* https://www.suse.com/security/cve/CVE-2024-42110.html

* https://www.suse.com/security/cve/CVE-2024-42114.html

* https://www.suse.com/security/cve/CVE-2024-42115.html

* https://www.suse.com/security/cve/CVE-2024-42119.html

* https://www.suse.com/security/cve/CVE-2024-42120.html

* https://www.suse.com/security/cve/CVE-2024-42121.html

* https://www.suse.com/security/cve/CVE-2024-42126.html

* https://www.suse.com/security/cve/CVE-2024-42127.html

* https://www.suse.com/security/cve/CVE-2024-42130.html

* https://www.suse.com/security/cve/CVE-2024-42137.html

* https://www.suse.com/security/cve/CVE-2024-42139.html

* https://www.suse.com/security/cve/CVE-2024-42142.html

* https://www.suse.com/security/cve/CVE-2024-42143.html

* https://www.suse.com/security/cve/CVE-2024-42148.html

* https://www.suse.com/security/cve/CVE-2024-42152.html

* https://www.suse.com/security/cve/CVE-2024-42155.html

* https://www.suse.com/security/cve/CVE-2024-42156.html

* https://www.suse.com/security/cve/CVE-2024-42157.html

* https://www.suse.com/security/cve/CVE-2024-42158.html

* https://www.suse.com/security/cve/CVE-2024-42162.html

* https://www.suse.com/security/cve/CVE-2024-42223.html

* https://www.suse.com/security/cve/CVE-2024-42225.html

* https://www.suse.com/security/cve/CVE-2024-42228.html

* https://www.suse.com/security/cve/CVE-2024-42229.html

* https://www.suse.com/security/cve/CVE-2024-42230.html

* https://www.suse.com/security/cve/CVE-2024-42232.html

* https://www.suse.com/security/cve/CVE-2024-42236.html

* https://www.suse.com/security/cve/CVE-2024-42237.html

* https://www.suse.com/security/cve/CVE-2024-42238.html

* https://www.suse.com/security/cve/CVE-2024-42239.html

* https://www.suse.com/security/cve/CVE-2024-42240.html

* https://www.suse.com/security/cve/CVE-2024-42244.html

* https://www.suse.com/security/cve/CVE-2024-42246.html

* https://www.suse.com/security/cve/CVE-2024-42247.html

* https://www.suse.com/security/cve/CVE-2024-42268.html

* https://www.suse.com/security/cve/CVE-2024-42271.html

* https://www.suse.com/security/cve/CVE-2024-42274.html

* https://www.suse.com/security/cve/CVE-2024-42276.html

* https://www.suse.com/security/cve/CVE-2024-42277.html

* https://www.suse.com/security/cve/CVE-2024-42280.html

* https://www.suse.com/security/cve/CVE-2024-42281.html

* https://www.suse.com/security/cve/CVE-2024-42283.html

* https://www.suse.com/security/cve/CVE-2024-42284.html

* https://www.suse.com/security/cve/CVE-2024-42285.html

* https://www.suse.com/security/cve/CVE-2024-42286.html

* https://www.suse.com/security/cve/CVE-2024-42287.html

* https://www.suse.com/security/cve/CVE-2024-42288.html

* https://www.suse.com/security/cve/CVE-2024-42289.html

* https://www.suse.com/security/cve/CVE-2024-42291.html

* https://www.suse.com/security/cve/CVE-2024-42292.html

* https://www.suse.com/security/cve/CVE-2024-42295.html

* https://www.suse.com/security/cve/CVE-2024-42301.html

* https://www.suse.com/security/cve/CVE-2024-42302.html

* https://www.suse.com/security/cve/CVE-2024-42308.html

* https://www.suse.com/security/cve/CVE-2024-42309.html

* https://www.suse.com/security/cve/CVE-2024-42310.html

* https://www.suse.com/security/cve/CVE-2024-42311.html

* https://www.suse.com/security/cve/CVE-2024-42312.html

* https://www.suse.com/security/cve/CVE-2024-42313.html

* https://www.suse.com/security/cve/CVE-2024-42315.html

* https://www.suse.com/security/cve/CVE-2024-42318.html

* https://www.suse.com/security/cve/CVE-2024-42319.html

* https://www.suse.com/security/cve/CVE-2024-42320.html

* https://www.suse.com/security/cve/CVE-2024-42322.html

* https://www.suse.com/security/cve/CVE-2024-43816.html

* https://www.suse.com/security/cve/CVE-2024-43818.html

* https://www.suse.com/security/cve/CVE-2024-43819.html

* https://www.suse.com/security/cve/CVE-2024-43821.html

* https://www.suse.com/security/cve/CVE-2024-43823.html

* https://www.suse.com/security/cve/CVE-2024-43829.html

* https://www.suse.com/security/cve/CVE-2024-43830.html

* https://www.suse.com/security/cve/CVE-2024-43831.html

* https://www.suse.com/security/cve/CVE-2024-43834.html

* https://www.suse.com/security/cve/CVE-2024-43837.html

* https://www.suse.com/security/cve/CVE-2024-43839.html

* https://www.suse.com/security/cve/CVE-2024-43841.html

* https://www.suse.com/security/cve/CVE-2024-43842.html

* https://www.suse.com/security/cve/CVE-2024-43846.html

* https://www.suse.com/security/cve/CVE-2024-43849.html

* https://www.suse.com/security/cve/CVE-2024-43853.html

* https://www.suse.com/security/cve/CVE-2024-43854.html

* https://www.suse.com/security/cve/CVE-2024-43856.html

* https://www.suse.com/security/cve/CVE-2024-43858.html

* https://www.suse.com/security/cve/CVE-2024-43860.html

* https://www.suse.com/security/cve/CVE-2024-43861.html

* https://www.suse.com/security/cve/CVE-2024-43863.html

* https://www.suse.com/security/cve/CVE-2024-43866.html

* https://www.suse.com/security/cve/CVE-2024-43867.html

* https://www.suse.com/security/cve/CVE-2024-43871.html

* https://www.suse.com/security/cve/CVE-2024-43872.html

* https://www.suse.com/security/cve/CVE-2024-43873.html

* https://www.suse.com/security/cve/CVE-2024-43879.html

* https://www.suse.com/security/cve/CVE-2024-43880.html

* https://www.suse.com/security/cve/CVE-2024-43882.html

* https://www.suse.com/security/cve/CVE-2024-43883.html

* https://www.suse.com/security/cve/CVE-2024-43884.html

* https://www.suse.com/security/cve/CVE-2024-43889.html

* https://www.suse.com/security/cve/CVE-2024-43892.html

* https://www.suse.com/security/cve/CVE-2024-43893.html

* https://www.suse.com/security/cve/CVE-2024-43894.html

* https://www.suse.com/security/cve/CVE-2024-43895.html

* https://www.suse.com/security/cve/CVE-2024-43899.html

* https://www.suse.com/security/cve/CVE-2024-43900.html

* https://www.suse.com/security/cve/CVE-2024-43902.html

* https://www.suse.com/security/cve/CVE-2024-43903.html

* https://www.suse.com/security/cve/CVE-2024-43904.html

* https://www.suse.com/security/cve/CVE-2024-43905.html

* https://www.suse.com/security/cve/CVE-2024-43907.html

* https://www.suse.com/security/cve/CVE-2024-43908.html

* https://www.suse.com/security/cve/CVE-2024-43909.html

* https://www.suse.com/security/cve/CVE-2024-44938.html

* https://www.suse.com/security/cve/CVE-2024-44939.html

* https://www.suse.com/security/cve/CVE-2024-44947.html

* https://bugzilla.suse.com/show_bug.cgi?id=1193629

* https://bugzilla.suse.com/show_bug.cgi?id=1194111

* https://bugzilla.suse.com/show_bug.cgi?id=1194765

* https://bugzilla.suse.com/show_bug.cgi?id=1194869

* https://bugzilla.suse.com/show_bug.cgi?id=1196261

* https://bugzilla.suse.com/show_bug.cgi?id=1196516

* https://bugzilla.suse.com/show_bug.cgi?id=1196894

* https://bugzilla.suse.com/show_bug.cgi?id=1198017

* https://bugzilla.suse.com/show_bug.cgi?id=1203329

* https://bugzilla.suse.com/show_bug.cgi?id=1203330

* https://bugzilla.suse.com/show_bug.cgi?id=1203360

* https://bugzilla.suse.com/show_bug.cgi?id=1205462

* https://bugzilla.suse.com/show_bug.cgi?id=1206006

* https://bugzilla.suse.com/show_bug.cgi?id=1206258

* https://bugzilla.suse.com/show_bug.cgi?id=1206843

* https://bugzilla.suse.com/show_bug.cgi?id=1207158

* https://bugzilla.suse.com/show_bug.cgi?id=1208783

* https://bugzilla.suse.com/show_bug.cgi?id=1210644

* https://bugzilla.suse.com/show_bug.cgi?id=1213580

* https://bugzilla.suse.com/show_bug.cgi?id=1213632

* https://bugzilla.suse.com/show_bug.cgi?id=1214285

* https://bugzilla.suse.com/show_bug.cgi?id=1216834

* https://bugzilla.suse.com/show_bug.cgi?id=1220428

* https://bugzilla.suse.com/show_bug.cgi?id=1220877

* https://bugzilla.suse.com/show_bug.cgi?id=1220962

* https://bugzilla.suse.com/show_bug.cgi?id=1221269

* https://bugzilla.suse.com/show_bug.cgi?id=1221326

* https://bugzilla.suse.com/show_bug.cgi?id=1221630

* https://bugzilla.suse.com/show_bug.cgi?id=1221645

* https://bugzilla.suse.com/show_bug.cgi?id=1222335

* https://bugzilla.suse.com/show_bug.cgi?id=1222350

* https://bugzilla.suse.com/show_bug.cgi?id=1222372

* https://bugzilla.suse.com/show_bug.cgi?id=1222387

* https://bugzilla.suse.com/show_bug.cgi?id=1222634

* https://bugzilla.suse.com/show_bug.cgi?id=1222808

* https://bugzilla.suse.com/show_bug.cgi?id=1222967

* https://bugzilla.suse.com/show_bug.cgi?id=1223074

* https://bugzilla.suse.com/show_bug.cgi?id=1223191

* https://bugzilla.suse.com/show_bug.cgi?id=1223508

* https://bugzilla.suse.com/show_bug.cgi?id=1223720

* https://bugzilla.suse.com/show_bug.cgi?id=1223742

* https://bugzilla.suse.com/show_bug.cgi?id=1223777

* https://bugzilla.suse.com/show_bug.cgi?id=1223803

* https://bugzilla.suse.com/show_bug.cgi?id=1223807

* https://bugzilla.suse.com/show_bug.cgi?id=1224105

* https://bugzilla.suse.com/show_bug.cgi?id=1224415

* https://bugzilla.suse.com/show_bug.cgi?id=1224496

* https://bugzilla.suse.com/show_bug.cgi?id=1224510

* https://bugzilla.suse.com/show_bug.cgi?id=1224542

* https://bugzilla.suse.com/show_bug.cgi?id=1224578

* https://bugzilla.suse.com/show_bug.cgi?id=1224639

* https://bugzilla.suse.com/show_bug.cgi?id=1225162

* https://bugzilla.suse.com/show_bug.cgi?id=1225352

* https://bugzilla.suse.com/show_bug.cgi?id=1225428

* https://bugzilla.suse.com/show_bug.cgi?id=1225524

* https://bugzilla.suse.com/show_bug.cgi?id=1225578

* https://bugzilla.suse.com/show_bug.cgi?id=1225582

* https://bugzilla.suse.com/show_bug.cgi?id=1225773

* https://bugzilla.suse.com/show_bug.cgi?id=1225814

* https://bugzilla.suse.com/show_bug.cgi?id=1225827

* https://bugzilla.suse.com/show_bug.cgi?id=1225832

* https://bugzilla.suse.com/show_bug.cgi?id=1225903

* https://bugzilla.suse.com/show_bug.cgi?id=1226168

* https://bugzilla.suse.com/show_bug.cgi?id=1226530

* https://bugzilla.suse.com/show_bug.cgi?id=1226613

* https://bugzilla.suse.com/show_bug.cgi?id=1226742

* https://bugzilla.suse.com/show_bug.cgi?id=1226765

* https://bugzilla.suse.com/show_bug.cgi?id=1226798

* https://bugzilla.suse.com/show_bug.cgi?id=1226801

* https://bugzilla.suse.com/show_bug.cgi?id=1226874

* https://bugzilla.suse.com/show_bug.cgi?id=1226885

* https://bugzilla.suse.com/show_bug.cgi?id=1227079

* https://bugzilla.suse.com/show_bug.cgi?id=1227623

* https://bugzilla.suse.com/show_bug.cgi?id=1227761

* https://bugzilla.suse.com/show_bug.cgi?id=1227830

* https://bugzilla.suse.com/show_bug.cgi?id=1227863

* https://bugzilla.suse.com/show_bug.cgi?id=1227867

* https://bugzilla.suse.com/show_bug.cgi?id=1227929

* https://bugzilla.suse.com/show_bug.cgi?id=1227937

* https://bugzilla.suse.com/show_bug.cgi?id=1227958

* https://bugzilla.suse.com/show_bug.cgi?id=1228020

* https://bugzilla.suse.com/show_bug.cgi?id=1228065

* https://bugzilla.suse.com/show_bug.cgi?id=1228114

* https://bugzilla.suse.com/show_bug.cgi?id=1228410

* https://bugzilla.suse.com/show_bug.cgi?id=1228426

* https://bugzilla.suse.com/show_bug.cgi?id=1228427

* https://bugzilla.suse.com/show_bug.cgi?id=1228429

* https://bugzilla.suse.com/show_bug.cgi?id=1228446

* https://bugzilla.suse.com/show_bug.cgi?id=1228447

* https://bugzilla.suse.com/show_bug.cgi?id=1228449

* https://bugzilla.suse.com/show_bug.cgi?id=1228450

* https://bugzilla.suse.com/show_bug.cgi?id=1228452

* https://bugzilla.suse.com/show_bug.cgi?id=1228456

* https://bugzilla.suse.com/show_bug.cgi?id=1228463

* https://bugzilla.suse.com/show_bug.cgi?id=1228466

* https://bugzilla.suse.com/show_bug.cgi?id=1228467

* https://bugzilla.suse.com/show_bug.cgi?id=1228469

* https://bugzilla.suse.com/show_bug.cgi?id=1228480

* https://bugzilla.suse.com/show_bug.cgi?id=1228481

* https://bugzilla.suse.com/show_bug.cgi?id=1228482

* https://bugzilla.suse.com/show_bug.cgi?id=1228483

* https://bugzilla.suse.com/show_bug.cgi?id=1228484

* https://bugzilla.suse.com/show_bug.cgi?id=1228485

* https://bugzilla.suse.com/show_bug.cgi?id=1228487

* https://bugzilla.suse.com/show_bug.cgi?id=1228489

* https://bugzilla.suse.com/show_bug.cgi?id=1228491

* https://bugzilla.suse.com/show_bug.cgi?id=1228493

* https://bugzilla.suse.com/show_bug.cgi?id=1228494

* https://bugzilla.suse.com/show_bug.cgi?id=1228495

* https://bugzilla.suse.com/show_bug.cgi?id=1228496

* https://bugzilla.suse.com/show_bug.cgi?id=1228501

* https://bugzilla.suse.com/show_bug.cgi?id=1228503

* https://bugzilla.suse.com/show_bug.cgi?id=1228509

* https://bugzilla.suse.com/show_bug.cgi?id=1228513

* https://bugzilla.suse.com/show_bug.cgi?id=1228515

* https://bugzilla.suse.com/show_bug.cgi?id=1228516

* https://bugzilla.suse.com/show_bug.cgi?id=1228526

* https://bugzilla.suse.com/show_bug.cgi?id=1228531

* https://bugzilla.suse.com/show_bug.cgi?id=1228563

* https://bugzilla.suse.com/show_bug.cgi?id=1228564

* https://bugzilla.suse.com/show_bug.cgi?id=1228567

* https://bugzilla.suse.com/show_bug.cgi?id=1228576

* https://bugzilla.suse.com/show_bug.cgi?id=1228579

* https://bugzilla.suse.com/show_bug.cgi?id=1228584

* https://bugzilla.suse.com/show_bug.cgi?id=1228588

* https://bugzilla.suse.com/show_bug.cgi?id=1228590

* https://bugzilla.suse.com/show_bug.cgi?id=1228615

* https://bugzilla.suse.com/show_bug.cgi?id=1228616

* https://bugzilla.suse.com/show_bug.cgi?id=1228635

* https://bugzilla.suse.com/show_bug.cgi?id=1228636

* https://bugzilla.suse.com/show_bug.cgi?id=1228654

* https://bugzilla.suse.com/show_bug.cgi?id=1228656

* https://bugzilla.suse.com/show_bug.cgi?id=1228658

* https://bugzilla.suse.com/show_bug.cgi?id=1228660

* https://bugzilla.suse.com/show_bug.cgi?id=1228662

* https://bugzilla.suse.com/show_bug.cgi?id=1228667

* https://bugzilla.suse.com/show_bug.cgi?id=1228673

* https://bugzilla.suse.com/show_bug.cgi?id=1228677

* https://bugzilla.suse.com/show_bug.cgi?id=1228687

* https://bugzilla.suse.com/show_bug.cgi?id=1228706

* https://bugzilla.suse.com/show_bug.cgi?id=1228708

* https://bugzilla.suse.com/show_bug.cgi?id=1228710

* https://bugzilla.suse.com/show_bug.cgi?id=1228718

* https://bugzilla.suse.com/show_bug.cgi?id=1228720

* https://bugzilla.suse.com/show_bug.cgi?id=1228721

* https://bugzilla.suse.com/show_bug.cgi?id=1228722

* https://bugzilla.suse.com/show_bug.cgi?id=1228724

* https://bugzilla.suse.com/show_bug.cgi?id=1228726

* https://bugzilla.suse.com/show_bug.cgi?id=1228727

* https://bugzilla.suse.com/show_bug.cgi?id=1228733

* https://bugzilla.suse.com/show_bug.cgi?id=1228748

* https://bugzilla.suse.com/show_bug.cgi?id=1228766

* https://bugzilla.suse.com/show_bug.cgi?id=1228779

* https://bugzilla.suse.com/show_bug.cgi?id=1228801

* https://bugzilla.suse.com/show_bug.cgi?id=1228850

* https://bugzilla.suse.com/show_bug.cgi?id=1228857

* https://bugzilla.suse.com/show_bug.cgi?id=1228959

* https://bugzilla.suse.com/show_bug.cgi?id=1228964

* https://bugzilla.suse.com/show_bug.cgi?id=1228966

* https://bugzilla.suse.com/show_bug.cgi?id=1228967

* https://bugzilla.suse.com/show_bug.cgi?id=1228979

* https://bugzilla.suse.com/show_bug.cgi?id=1228988

* https://bugzilla.suse.com/show_bug.cgi?id=1228989

* https://bugzilla.suse.com/show_bug.cgi?id=1228991

* https://bugzilla.suse.com/show_bug.cgi?id=1228992

* https://bugzilla.suse.com/show_bug.cgi?id=1229042

* https://bugzilla.suse.com/show_bug.cgi?id=1229054

* https://bugzilla.suse.com/show_bug.cgi?id=1229086

* https://bugzilla.suse.com/show_bug.cgi?id=1229136

* https://bugzilla.suse.com/show_bug.cgi?id=1229154

* https://bugzilla.suse.com/show_bug.cgi?id=1229187

* https://bugzilla.suse.com/show_bug.cgi?id=1229188

* https://bugzilla.suse.com/show_bug.cgi?id=1229190

* https://bugzilla.suse.com/show_bug.cgi?id=1229287

* https://bugzilla.suse.com/show_bug.cgi?id=1229290

* https://bugzilla.suse.com/show_bug.cgi?id=1229292

* https://bugzilla.suse.com/show_bug.cgi?id=1229296

* https://bugzilla.suse.com/show_bug.cgi?id=1229297

* https://bugzilla.suse.com/show_bug.cgi?id=1229301

* https://bugzilla.suse.com/show_bug.cgi?id=1229303

* https://bugzilla.suse.com/show_bug.cgi?id=1229304

* https://bugzilla.suse.com/show_bug.cgi?id=1229305

* https://bugzilla.suse.com/show_bug.cgi?id=1229307

* https://bugzilla.suse.com/show_bug.cgi?id=1229309

* https://bugzilla.suse.com/show_bug.cgi?id=1229312

* https://bugzilla.suse.com/show_bug.cgi?id=1229314

* https://bugzilla.suse.com/show_bug.cgi?id=1229315

* https://bugzilla.suse.com/show_bug.cgi?id=1229317

* https://bugzilla.suse.com/show_bug.cgi?id=1229318

* https://bugzilla.suse.com/show_bug.cgi?id=1229319

* https://bugzilla.suse.com/show_bug.cgi?id=1229327

* https://bugzilla.suse.com/show_bug.cgi?id=1229341

* https://bugzilla.suse.com/show_bug.cgi?id=1229345

* https://bugzilla.suse.com/show_bug.cgi?id=1229346

* https://bugzilla.suse.com/show_bug.cgi?id=1229347

* https://bugzilla.suse.com/show_bug.cgi?id=1229349

* https://bugzilla.suse.com/show_bug.cgi?id=1229350

* https://bugzilla.suse.com/show_bug.cgi?id=1229351

* https://bugzilla.suse.com/show_bug.cgi?id=1229354

* https://bugzilla.suse.com/show_bug.cgi?id=1229356

* https://bugzilla.suse.com/show_bug.cgi?id=1229357

* https://bugzilla.suse.com/show_bug.cgi?id=1229358

* https://bugzilla.suse.com/show_bug.cgi?id=1229359

* https://bugzilla.suse.com/show_bug.cgi?id=1229360

* https://bugzilla.suse.com/show_bug.cgi?id=1229366

* https://bugzilla.suse.com/show_bug.cgi?id=1229370

* https://bugzilla.suse.com/show_bug.cgi?id=1229373

* https://bugzilla.suse.com/show_bug.cgi?id=1229374

* https://bugzilla.suse.com/show_bug.cgi?id=1229381

* https://bugzilla.suse.com/show_bug.cgi?id=1229382

* https://bugzilla.suse.com/show_bug.cgi?id=1229383

* https://bugzilla.suse.com/show_bug.cgi?id=1229386

* https://bugzilla.suse.com/show_bug.cgi?id=1229388

* https://bugzilla.suse.com/show_bug.cgi?id=1229391

* https://bugzilla.suse.com/show_bug.cgi?id=1229392

* https://bugzilla.suse.com/show_bug.cgi?id=1229395

* https://bugzilla.suse.com/show_bug.cgi?id=1229398

* https://bugzilla.suse.com/show_bug.cgi?id=1229399

* https://bugzilla.suse.com/show_bug.cgi?id=1229400

* https://bugzilla.suse.com/show_bug.cgi?id=1229407

* https://bugzilla.suse.com/show_bug.cgi?id=1229409

* https://bugzilla.suse.com/show_bug.cgi?id=1229410

* https://bugzilla.suse.com/show_bug.cgi?id=1229411

* https://bugzilla.suse.com/show_bug.cgi?id=1229413

* https://bugzilla.suse.com/show_bug.cgi?id=1229414

* https://bugzilla.suse.com/show_bug.cgi?id=1229417

* https://bugzilla.suse.com/show_bug.cgi?id=1229418

* https://bugzilla.suse.com/show_bug.cgi?id=1229444

* https://bugzilla.suse.com/show_bug.cgi?id=1229453

* https://bugzilla.suse.com/show_bug.cgi?id=1229454

* https://bugzilla.suse.com/show_bug.cgi?id=1229481

* https://bugzilla.suse.com/show_bug.cgi?id=1229482

* https://bugzilla.suse.com/show_bug.cgi?id=1229488

* https://bugzilla.suse.com/show_bug.cgi?id=1229489

* https://bugzilla.suse.com/show_bug.cgi?id=1229490

* https://bugzilla.suse.com/show_bug.cgi?id=1229493

* https://bugzilla.suse.com/show_bug.cgi?id=1229495

* https://bugzilla.suse.com/show_bug.cgi?id=1229497

* https://bugzilla.suse.com/show_bug.cgi?id=1229500

* https://bugzilla.suse.com/show_bug.cgi?id=1229503

* https://bugzilla.suse.com/show_bug.cgi?id=1229506

* https://bugzilla.suse.com/show_bug.cgi?id=1229507

* https://bugzilla.suse.com/show_bug.cgi?id=1229508

* https://bugzilla.suse.com/show_bug.cgi?id=1229509

* https://bugzilla.suse.com/show_bug.cgi?id=1229510

* https://bugzilla.suse.com/show_bug.cgi?id=1229512

* https://bugzilla.suse.com/show_bug.cgi?id=1229516

* https://bugzilla.suse.com/show_bug.cgi?id=1229521

* https://bugzilla.suse.com/show_bug.cgi?id=1229522

* https://bugzilla.suse.com/show_bug.cgi?id=1229523

* https://bugzilla.suse.com/show_bug.cgi?id=1229524

* https://bugzilla.suse.com/show_bug.cgi?id=1229525

* https://bugzilla.suse.com/show_bug.cgi?id=1229526

* https://bugzilla.suse.com/show_bug.cgi?id=1229527

* https://bugzilla.suse.com/show_bug.cgi?id=1229528

* https://bugzilla.suse.com/show_bug.cgi?id=1229529

* https://bugzilla.suse.com/show_bug.cgi?id=1229531

* https://bugzilla.suse.com/show_bug.cgi?id=1229533

* https://bugzilla.suse.com/show_bug.cgi?id=1229535

* https://bugzilla.suse.com/show_bug.cgi?id=1229536

* https://bugzilla.suse.com/show_bug.cgi?id=1229537

* https://bugzilla.suse.com/show_bug.cgi?id=1229540

* https://bugzilla.suse.com/show_bug.cgi?id=1229544

* https://bugzilla.suse.com/show_bug.cgi?id=1229545

* https://bugzilla.suse.com/show_bug.cgi?id=1229546

* https://bugzilla.suse.com/show_bug.cgi?id=1229547

* https://bugzilla.suse.com/show_bug.cgi?id=1229548

* https://bugzilla.suse.com/show_bug.cgi?id=1229554

* https://bugzilla.suse.com/show_bug.cgi?id=1229557

* https://bugzilla.suse.com/show_bug.cgi?id=1229558

* https://bugzilla.suse.com/show_bug.cgi?id=1229559

* https://bugzilla.suse.com/show_bug.cgi?id=1229560

* https://bugzilla.suse.com/show_bug.cgi?id=1229562

* https://bugzilla.suse.com/show_bug.cgi?id=1229564

* https://bugzilla.suse.com/show_bug.cgi?id=1229565

* https://bugzilla.suse.com/show_bug.cgi?id=1229566

* https://bugzilla.suse.com/show_bug.cgi?id=1229568

* https://bugzilla.suse.com/show_bug.cgi?id=1229569

* https://bugzilla.suse.com/show_bug.cgi?id=1229572

* https://bugzilla.suse.com/show_bug.cgi?id=1229573

* https://bugzilla.suse.com/show_bug.cgi?id=1229576

* https://bugzilla.suse.com/show_bug.cgi?id=1229581

* https://bugzilla.suse.com/show_bug.cgi?id=1229588

* https://bugzilla.suse.com/show_bug.cgi?id=1229598

* https://bugzilla.suse.com/show_bug.cgi?id=1229603

* https://bugzilla.suse.com/show_bug.cgi?id=1229604

* https://bugzilla.suse.com/show_bug.cgi?id=1229605

* https://bugzilla.suse.com/show_bug.cgi?id=1229608

* https://bugzilla.suse.com/show_bug.cgi?id=1229611

* https://bugzilla.suse.com/show_bug.cgi?id=1229612

* https://bugzilla.suse.com/show_bug.cgi?id=1229613

* https://bugzilla.suse.com/show_bug.cgi?id=1229614

* https://bugzilla.suse.com/show_bug.cgi?id=1229615

* https://bugzilla.suse.com/show_bug.cgi?id=1229616

* https://bugzilla.suse.com/show_bug.cgi?id=1229617

* https://bugzilla.suse.com/show_bug.cgi?id=1229620

* https://bugzilla.suse.com/show_bug.cgi?id=1229622

* https://bugzilla.suse.com/show_bug.cgi?id=1229623

* https://bugzilla.suse.com/show_bug.cgi?id=1229624

* https://bugzilla.suse.com/show_bug.cgi?id=1229625

* https://bugzilla.suse.com/show_bug.cgi?id=1229626

* https://bugzilla.suse.com/show_bug.cgi?id=1229628

* https://bugzilla.suse.com/show_bug.cgi?id=1229629

* https://bugzilla.suse.com/show_bug.cgi?id=1229630

* https://bugzilla.suse.com/show_bug.cgi?id=1229631

* https://bugzilla.suse.com/show_bug.cgi?id=1229632

* https://bugzilla.suse.com/show_bug.cgi?id=1229635

* https://bugzilla.suse.com/show_bug.cgi?id=1229636

* https://bugzilla.suse.com/show_bug.cgi?id=1229637

* https://bugzilla.suse.com/show_bug.cgi?id=1229638

* https://bugzilla.suse.com/show_bug.cgi?id=1229639

* https://bugzilla.suse.com/show_bug.cgi?id=1229641

* https://bugzilla.suse.com/show_bug.cgi?id=1229642

* https://bugzilla.suse.com/show_bug.cgi?id=1229643

* https://bugzilla.suse.com/show_bug.cgi?id=1229645

* https://bugzilla.suse.com/show_bug.cgi?id=1229657

* https://bugzilla.suse.com/show_bug.cgi?id=1229658

* https://bugzilla.suse.com/show_bug.cgi?id=1229662

* https://bugzilla.suse.com/show_bug.cgi?id=1229664

* https://bugzilla.suse.com/show_bug.cgi?id=1229707

* https://bugzilla.suse.com/show_bug.cgi?id=1229739

* https://bugzilla.suse.com/show_bug.cgi?id=1229743

* https://bugzilla.suse.com/show_bug.cgi?id=1229746

* https://bugzilla.suse.com/show_bug.cgi?id=1229754

* https://bugzilla.suse.com/show_bug.cgi?id=1229755

* https://bugzilla.suse.com/show_bug.cgi?id=1229756

* https://bugzilla.suse.com/show_bug.cgi?id=1229759

* https://bugzilla.suse.com/show_bug.cgi?id=1229761

* https://bugzilla.suse.com/show_bug.cgi?id=1229767

* https://bugzilla.suse.com/show_bug.cgi?id=1229768

* https://bugzilla.suse.com/show_bug.cgi?id=1229781

* https://bugzilla.suse.com/show_bug.cgi?id=1229784

* https://bugzilla.suse.com/show_bug.cgi?id=1229787

* https://bugzilla.suse.com/show_bug.cgi?id=1229788

* https://bugzilla.suse.com/show_bug.cgi?id=1229789

* https://bugzilla.suse.com/show_bug.cgi?id=1229792

* https://bugzilla.suse.com/show_bug.cgi?id=1229820

* https://jira.suse.com/browse/PED-8491

* https://jira.suse.com/browse/PED-8779

Severity
Announcement ID: SUSE-SU-2024:3209-1
Rating: important

Related News