SUSE-SU-2025:0289-1: important: Security update for the Linux Kernel
SLE-SECURITY-UPDATES
null at suse.de
Wed Jan 29 20:35:13 UTC 2025
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2025:0289-1
Release Date: 2025-01-29T16:11:30Z
Rating: important
References:
* bsc#1012628
* bsc#1194869
* bsc#1214954
* bsc#1215199
* bsc#1216813
* bsc#1218470
* bsc#1220355
* bsc#1220711
* bsc#1220773
* bsc#1221326
* bsc#1224095
* bsc#1224726
* bsc#1225743
* bsc#1225758
* bsc#1225820
* bsc#1225897
* bsc#1227445
* bsc#1228526
* bsc#1228592
* bsc#1229809
* bsc#1229833
* bsc#1230205
* bsc#1230413
* bsc#1230557
* bsc#1230697
* bsc#1230807
* bsc#1230827
* bsc#1231016
* bsc#1231854
* bsc#1231909
* bsc#1231963
* bsc#1232087
* bsc#1232157
* bsc#1232158
* bsc#1232166
* bsc#1232193
* bsc#1232198
* bsc#1232201
* bsc#1232418
* bsc#1232419
* bsc#1232420
* bsc#1232421
* bsc#1232436
* bsc#1232882
* bsc#1233038
* bsc#1233055
* bsc#1233070
* bsc#1233096
* bsc#1233112
* bsc#1233200
* bsc#1233201
* bsc#1233204
* bsc#1233239
* bsc#1233259
* bsc#1233260
* bsc#1233324
* bsc#1233328
* bsc#1233461
* bsc#1233467
* bsc#1233468
* bsc#1233469
* bsc#1233485
* bsc#1233488
* bsc#1233523
* bsc#1233546
* bsc#1233547
* bsc#1233550
* bsc#1233558
* bsc#1233568
* bsc#1233637
* bsc#1233638
* bsc#1233642
* bsc#1233772
* bsc#1233837
* bsc#1234024
* bsc#1234069
* bsc#1234071
* bsc#1234073
* bsc#1234075
* bsc#1234076
* bsc#1234077
* bsc#1234078
* bsc#1234079
* bsc#1234085
* bsc#1234086
* bsc#1234139
* bsc#1234140
* bsc#1234141
* bsc#1234142
* bsc#1234143
* bsc#1234144
* bsc#1234145
* bsc#1234146
* bsc#1234147
* bsc#1234148
* bsc#1234149
* bsc#1234150
* bsc#1234153
* bsc#1234155
* bsc#1234156
* bsc#1234158
* bsc#1234159
* bsc#1234160
* bsc#1234161
* bsc#1234162
* bsc#1234163
* bsc#1234164
* bsc#1234165
* bsc#1234166
* bsc#1234167
* bsc#1234168
* bsc#1234169
* bsc#1234170
* bsc#1234171
* bsc#1234172
* bsc#1234173
* bsc#1234174
* bsc#1234175
* bsc#1234176
* bsc#1234177
* bsc#1234178
* bsc#1234179
* bsc#1234180
* bsc#1234181
* bsc#1234182
* bsc#1234183
* bsc#1234184
* bsc#1234185
* bsc#1234186
* bsc#1234187
* bsc#1234188
* bsc#1234189
* bsc#1234190
* bsc#1234191
* bsc#1234192
* bsc#1234193
* bsc#1234194
* bsc#1234195
* bsc#1234196
* bsc#1234197
* bsc#1234198
* bsc#1234199
* bsc#1234200
* bsc#1234201
* bsc#1234203
* bsc#1234204
* bsc#1234205
* bsc#1234207
* bsc#1234208
* bsc#1234209
* bsc#1234219
* bsc#1234220
* bsc#1234221
* bsc#1234223
* bsc#1234237
* bsc#1234238
* bsc#1234239
* bsc#1234240
* bsc#1234241
* bsc#1234242
* bsc#1234243
* bsc#1234278
* bsc#1234279
* bsc#1234280
* bsc#1234281
* bsc#1234282
* bsc#1234294
* bsc#1234338
* bsc#1234357
* bsc#1234381
* bsc#1234454
* bsc#1234464
* bsc#1234605
* bsc#1234619
* bsc#1234635
* bsc#1234651
* bsc#1234652
* bsc#1234654
* bsc#1234655
* bsc#1234657
* bsc#1234658
* bsc#1234659
* bsc#1234668
* bsc#1234690
* bsc#1234725
* bsc#1234726
* bsc#1234810
* bsc#1234811
* bsc#1234825
* bsc#1234826
* bsc#1234827
* bsc#1234829
* bsc#1234832
* bsc#1234834
* bsc#1234843
* bsc#1234846
* bsc#1234848
* bsc#1234853
* bsc#1234855
* bsc#1234856
* bsc#1234863
* bsc#1234884
* bsc#1234887
* bsc#1234888
* bsc#1234889
* bsc#1234891
* bsc#1234893
* bsc#1234898
* bsc#1234899
* bsc#1234900
* bsc#1234901
* bsc#1234905
* bsc#1234906
* bsc#1234907
* bsc#1234909
* bsc#1234911
* bsc#1234912
* bsc#1234916
* bsc#1234918
* bsc#1234920
* bsc#1234921
* bsc#1234922
* bsc#1234923
* bsc#1234929
* bsc#1234930
* bsc#1234931
* bsc#1234934
* bsc#1234937
* bsc#1234948
* bsc#1234950
* bsc#1234952
* bsc#1234957
* bsc#1234960
* bsc#1234962
* bsc#1234963
* bsc#1234968
* bsc#1234969
* bsc#1234970
* bsc#1234971
* bsc#1234973
* bsc#1234974
* bsc#1234989
* bsc#1234999
* bsc#1235000
* bsc#1235002
* bsc#1235003
* bsc#1235004
* bsc#1235007
* bsc#1235009
* bsc#1235011
* bsc#1235016
* bsc#1235019
* bsc#1235031
* bsc#1235032
* bsc#1235033
* bsc#1235035
* bsc#1235037
* bsc#1235038
* bsc#1235039
* bsc#1235040
* bsc#1235042
* bsc#1235043
* bsc#1235045
* bsc#1235046
* bsc#1235050
* bsc#1235051
* bsc#1235053
* bsc#1235054
* bsc#1235056
* bsc#1235057
* bsc#1235059
* bsc#1235061
* bsc#1235065
* bsc#1235070
* bsc#1235073
* bsc#1235075
* bsc#1235100
* bsc#1235108
* bsc#1235112
* bsc#1235115
* bsc#1235117
* bsc#1235122
* bsc#1235123
* bsc#1235125
* bsc#1235128
* bsc#1235132
* bsc#1235133
* bsc#1235134
* bsc#1235138
* bsc#1235155
* bsc#1235160
* bsc#1235219
* bsc#1235220
* bsc#1235222
* bsc#1235223
* bsc#1235224
* bsc#1235227
* bsc#1235241
* bsc#1235246
* bsc#1235249
* bsc#1235251
* bsc#1235252
* bsc#1235389
* bsc#1235391
* bsc#1235406
* bsc#1235409
* bsc#1235410
* bsc#1235412
* bsc#1235413
* bsc#1235415
* bsc#1235416
* bsc#1235417
* bsc#1235423
* bsc#1235424
* bsc#1235425
* bsc#1235426
* bsc#1235427
* bsc#1235428
* bsc#1235429
* bsc#1235433
* bsc#1235437
* bsc#1235439
* bsc#1235444
* bsc#1235445
* bsc#1235449
* bsc#1235451
* bsc#1235454
* bsc#1235458
* bsc#1235459
* bsc#1235464
* bsc#1235466
* bsc#1235473
* bsc#1235479
* bsc#1235480
* bsc#1235483
* bsc#1235486
* bsc#1235488
* bsc#1235491
* bsc#1235494
* bsc#1235495
* bsc#1235496
* bsc#1235497
* bsc#1235500
* bsc#1235502
* bsc#1235503
* bsc#1235507
* bsc#1235519
* bsc#1235520
* bsc#1235521
* bsc#1235523
* bsc#1235526
* bsc#1235528
* bsc#1235532
* bsc#1235533
* bsc#1235534
* bsc#1235537
* bsc#1235538
* bsc#1235550
* bsc#1235552
* bsc#1235555
* bsc#1235557
* bsc#1235563
* bsc#1235564
* bsc#1235565
* bsc#1235568
* bsc#1235570
* bsc#1235571
* bsc#1235577
* bsc#1235584
* bsc#1235587
* bsc#1235611
* bsc#1235616
* bsc#1235622
* bsc#1235627
* bsc#1235632
* bsc#1235635
* bsc#1235641
* bsc#1235643
* bsc#1235645
* bsc#1235646
* bsc#1235647
* bsc#1235650
* bsc#1235653
* bsc#1235657
* bsc#1235663
* bsc#1235700
* bsc#1235705
* bsc#1235707
* bsc#1235708
* bsc#1235710
* bsc#1235714
* bsc#1235716
* bsc#1235720
* bsc#1235723
* bsc#1235727
* bsc#1235730
* bsc#1235737
* bsc#1235739
* bsc#1235745
* bsc#1235747
* bsc#1235750
* bsc#1235753
* bsc#1235759
* bsc#1235764
* bsc#1235768
* bsc#1235776
* bsc#1235777
* bsc#1235778
* bsc#1235779
* bsc#1235793
* bsc#1235798
* bsc#1235806
* bsc#1235808
* bsc#1235812
* bsc#1235814
* bsc#1235818
* bsc#1235842
* bsc#1235894
* bsc#1235902
* bsc#1235903
* bsc#1235906
* bsc#1235918
* bsc#1235919
* bsc#1235920
* bsc#1235924
* bsc#1235940
* bsc#1235946
* bsc#1235952
* bsc#1235964
* bsc#1235965
* bsc#1235967
* bsc#1235969
* bsc#1235976
* bsc#1235977
* bsc#1236078
* bsc#1236080
* bsc#1236082
* bsc#1236088
* bsc#1236090
* bsc#1236091
* bsc#1236096
* bsc#1236097
* bsc#1236098
* bsc#1236101
* bsc#1236102
* bsc#1236104
* bsc#1236106
* bsc#1236120
* bsc#1236125
* bsc#1236131
* bsc#1236138
* bsc#1236143
* bsc#1236144
* bsc#1236145
* bsc#1236168
* bsc#1236178
* bsc#1236180
* bsc#1236181
* bsc#1236190
* bsc#1236198
* bsc#1236227
* bsc#1236248
* jsc#PED-10467
* jsc#PED-7242
Cross-References:
* CVE-2023-52489
* CVE-2023-52923
* CVE-2024-26596
* CVE-2024-26924
* CVE-2024-27397
* CVE-2024-35839
* CVE-2024-36476
* CVE-2024-36908
* CVE-2024-36915
* CVE-2024-39282
* CVE-2024-39480
* CVE-2024-41042
* CVE-2024-43913
* CVE-2024-44934
* CVE-2024-44996
* CVE-2024-45828
* CVE-2024-46680
* CVE-2024-46765
* CVE-2024-46800
* CVE-2024-46896
* CVE-2024-47141
* CVE-2024-47143
* CVE-2024-47678
* CVE-2024-47809
* CVE-2024-48873
* CVE-2024-48881
* CVE-2024-49569
* CVE-2024-49854
* CVE-2024-49884
* CVE-2024-49915
* CVE-2024-49944
* CVE-2024-49951
* CVE-2024-49952
* CVE-2024-49998
* CVE-2024-50016
* CVE-2024-50018
* CVE-2024-50039
* CVE-2024-50047
* CVE-2024-50051
* CVE-2024-50106
* CVE-2024-50143
* CVE-2024-50151
* CVE-2024-50154
* CVE-2024-50199
* CVE-2024-50202
* CVE-2024-50203
* CVE-2024-50211
* CVE-2024-50228
* CVE-2024-50252
* CVE-2024-50256
* CVE-2024-50262
* CVE-2024-50272
* CVE-2024-50278
* CVE-2024-50279
* CVE-2024-50280
* CVE-2024-50296
* CVE-2024-50299
* CVE-2024-52332
* CVE-2024-53043
* CVE-2024-53050
* CVE-2024-53051
* CVE-2024-53055
* CVE-2024-53056
* CVE-2024-53064
* CVE-2024-53090
* CVE-2024-53091
* CVE-2024-53095
* CVE-2024-53099
* CVE-2024-53103
* CVE-2024-53105
* CVE-2024-53110
* CVE-2024-53111
* CVE-2024-53113
* CVE-2024-53117
* CVE-2024-53118
* CVE-2024-53119
* CVE-2024-53120
* CVE-2024-53121
* CVE-2024-53122
* CVE-2024-53125
* CVE-2024-53126
* CVE-2024-53127
* CVE-2024-53129
* CVE-2024-53130
* CVE-2024-53131
* CVE-2024-53133
* CVE-2024-53134
* CVE-2024-53136
* CVE-2024-53138
* CVE-2024-53141
* CVE-2024-53142
* CVE-2024-53144
* CVE-2024-53146
* CVE-2024-53148
* CVE-2024-53150
* CVE-2024-53151
* CVE-2024-53154
* CVE-2024-53155
* CVE-2024-53156
* CVE-2024-53157
* CVE-2024-53158
* CVE-2024-53159
* CVE-2024-53160
* CVE-2024-53161
* CVE-2024-53162
* CVE-2024-53164
* CVE-2024-53166
* CVE-2024-53168
* CVE-2024-53169
* CVE-2024-53170
* CVE-2024-53171
* CVE-2024-53172
* CVE-2024-53173
* CVE-2024-53174
* CVE-2024-53175
* CVE-2024-53179
* CVE-2024-53180
* CVE-2024-53185
* CVE-2024-53188
* CVE-2024-53190
* CVE-2024-53191
* CVE-2024-53194
* CVE-2024-53195
* CVE-2024-53196
* CVE-2024-53197
* CVE-2024-53198
* CVE-2024-53200
* CVE-2024-53201
* CVE-2024-53202
* CVE-2024-53206
* CVE-2024-53207
* CVE-2024-53208
* CVE-2024-53209
* CVE-2024-53210
* CVE-2024-53213
* CVE-2024-53214
* CVE-2024-53215
* CVE-2024-53216
* CVE-2024-53217
* CVE-2024-53222
* CVE-2024-53224
* CVE-2024-53227
* CVE-2024-53229
* CVE-2024-53230
* CVE-2024-53231
* CVE-2024-53232
* CVE-2024-53233
* CVE-2024-53234
* CVE-2024-53236
* CVE-2024-53237
* CVE-2024-53239
* CVE-2024-53240
* CVE-2024-53241
* CVE-2024-53685
* CVE-2024-53690
* CVE-2024-54680
* CVE-2024-55639
* CVE-2024-55881
* CVE-2024-55916
* CVE-2024-56369
* CVE-2024-56372
* CVE-2024-56531
* CVE-2024-56532
* CVE-2024-56533
* CVE-2024-56536
* CVE-2024-56538
* CVE-2024-56539
* CVE-2024-56543
* CVE-2024-56546
* CVE-2024-56548
* CVE-2024-56549
* CVE-2024-56551
* CVE-2024-56557
* CVE-2024-56558
* CVE-2024-56562
* CVE-2024-56566
* CVE-2024-56567
* CVE-2024-56568
* CVE-2024-56569
* CVE-2024-56570
* CVE-2024-56571
* CVE-2024-56572
* CVE-2024-56573
* CVE-2024-56574
* CVE-2024-56575
* CVE-2024-56576
* CVE-2024-56577
* CVE-2024-56578
* CVE-2024-56582
* CVE-2024-56584
* CVE-2024-56587
* CVE-2024-56588
* CVE-2024-56589
* CVE-2024-56590
* CVE-2024-56593
* CVE-2024-56594
* CVE-2024-56595
* CVE-2024-56596
* CVE-2024-56597
* CVE-2024-56598
* CVE-2024-56599
* CVE-2024-5660
* CVE-2024-56602
* CVE-2024-56603
* CVE-2024-56604
* CVE-2024-56605
* CVE-2024-56606
* CVE-2024-56607
* CVE-2024-56609
* CVE-2024-56611
* CVE-2024-56614
* CVE-2024-56615
* CVE-2024-56616
* CVE-2024-56617
* CVE-2024-56619
* CVE-2024-56620
* CVE-2024-56622
* CVE-2024-56623
* CVE-2024-56625
* CVE-2024-56629
* CVE-2024-56630
* CVE-2024-56631
* CVE-2024-56632
* CVE-2024-56634
* CVE-2024-56635
* CVE-2024-56636
* CVE-2024-56637
* CVE-2024-56641
* CVE-2024-56642
* CVE-2024-56643
* CVE-2024-56644
* CVE-2024-56645
* CVE-2024-56648
* CVE-2024-56649
* CVE-2024-56651
* CVE-2024-56654
* CVE-2024-56656
* CVE-2024-56659
* CVE-2024-56660
* CVE-2024-56661
* CVE-2024-56662
* CVE-2024-56663
* CVE-2024-56664
* CVE-2024-56667
* CVE-2024-56670
* CVE-2024-56672
* CVE-2024-56675
* CVE-2024-56677
* CVE-2024-56678
* CVE-2024-56681
* CVE-2024-56683
* CVE-2024-56687
* CVE-2024-56688
* CVE-2024-56690
* CVE-2024-56691
* CVE-2024-56694
* CVE-2024-56698
* CVE-2024-56700
* CVE-2024-56701
* CVE-2024-56704
* CVE-2024-56705
* CVE-2024-56708
* CVE-2024-56709
* CVE-2024-56712
* CVE-2024-56716
* CVE-2024-56722
* CVE-2024-56723
* CVE-2024-56724
* CVE-2024-56729
* CVE-2024-56739
* CVE-2024-56741
* CVE-2024-56745
* CVE-2024-56746
* CVE-2024-56747
* CVE-2024-56748
* CVE-2024-56752
* CVE-2024-56754
* CVE-2024-56755
* CVE-2024-56756
* CVE-2024-56759
* CVE-2024-56760
* CVE-2024-56765
* CVE-2024-56766
* CVE-2024-56767
* CVE-2024-56769
* CVE-2024-56774
* CVE-2024-56775
* CVE-2024-56776
* CVE-2024-56777
* CVE-2024-56778
* CVE-2024-56779
* CVE-2024-56780
* CVE-2024-56787
* CVE-2024-57791
* CVE-2024-57792
* CVE-2024-57793
* CVE-2024-57795
* CVE-2024-57798
* CVE-2024-57801
* CVE-2024-57804
* CVE-2024-57809
* CVE-2024-57838
* CVE-2024-57849
* CVE-2024-57850
* CVE-2024-57857
* CVE-2024-57874
* CVE-2024-57876
* CVE-2024-57887
* CVE-2024-57888
* CVE-2024-57890
* CVE-2024-57892
* CVE-2024-57893
* CVE-2024-57896
* CVE-2024-57897
* CVE-2024-57899
* CVE-2024-57903
* CVE-2024-57904
* CVE-2024-57906
* CVE-2024-57907
* CVE-2024-57908
* CVE-2024-57910
* CVE-2024-57911
* CVE-2024-57912
* CVE-2024-57913
* CVE-2024-57915
* CVE-2024-57916
* CVE-2024-57922
* CVE-2024-57926
* CVE-2024-57929
* CVE-2024-57932
* CVE-2024-57933
* CVE-2024-57935
* CVE-2024-57936
* CVE-2024-57940
* CVE-2024-8805
* CVE-2025-21632
* CVE-2025-21645
* CVE-2025-21646
* CVE-2025-21649
* CVE-2025-21650
* CVE-2025-21651
* CVE-2025-21656
* CVE-2025-21662
CVSS scores:
* CVE-2023-52489 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52923 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52923 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26596 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-26596 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26924 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36476 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-36476 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36476 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36908 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-36915 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-39282 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-39282 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39480 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-39480 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43913 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-43913 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-43913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45828 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-45828 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46680 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
* CVE-2024-46680 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46765 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46896 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47141 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47141 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47143 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47143 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47678 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-47678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-47809 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-48873 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-48873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-48881 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-48881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49569 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49569 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49854 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49854 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49854 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49915 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49951 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49998 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50018 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50039 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50051 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50051 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50143 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50143 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50143 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50151 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-50151 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50202 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50202 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50203 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50203 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50203 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50211 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50211 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50228 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50252 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50256 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50256 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50262 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50262 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50262 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50262 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50272 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50278 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
* CVE-2024-50278 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50280 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50296 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50299 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50299 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-52332 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-52332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53043 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53043 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53050 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53091 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53099 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53099 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-53099 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53103 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53105 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53110 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53111 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53111 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53113 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53117 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53118 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53119 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53120 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53121 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53122 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53127 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53129 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53130 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53131 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53133 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53136 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53138 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-53138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53141 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53141 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53141 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53142 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-53142 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53146 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53146 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53148 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53148 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53150 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53150 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-53150 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53151 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53151 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53151 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53154 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53154 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53155 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53155 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53155 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53156 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53156 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53156 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53157 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53158 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53158 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-53159 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-53159 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-53160 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53160 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53161 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53161 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53162 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53162 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-53164 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53164 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53166 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53166 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53166 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53168 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53168 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53169 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53169 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53170 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53170 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53170 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53171 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53171 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53171 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53172 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53173 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53173 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53174 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53175 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-53175 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-53179 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53179 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53180 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53180 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53185 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53188 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53190 ( SUSE ): 1.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-53190 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-53191 ( SUSE ): 7.5
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53191 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53194 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53194 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53195 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-53195 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-53196 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-53196 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-53197 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-53197 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-53198 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-53198 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-53200 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53200 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53201 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53202 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-53202 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-53202 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53206 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53206 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-53206 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53207 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53207 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53208 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53209 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53209 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53210 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53213 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53213 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53213 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53214 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53214 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53215 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53216 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53216 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-53217 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53222 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53222 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53222 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53224 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53224 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53227 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53227 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53229 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53230 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53230 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53231 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53232 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53232 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53233 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53234 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53234 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53236 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53236 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53237 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53237 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53239 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53241 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-53241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-53685 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53690 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54680 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-54680 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-55639 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-55639 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-55881 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-55881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-55916 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-55916 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-55916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56369 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56369 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56369 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56372 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56372 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56531 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56531 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56532 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56532 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56533 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56533 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56536 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56536 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56536 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56538 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56538 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56539 ( SUSE ): 8.6
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56539 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-56543 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56546 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56546 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56548 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56549 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56549 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56549 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56551 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56551 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56551 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56557 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56558 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56562 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56566 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56566 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-56567 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56567 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56567 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56568 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56568 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56569 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56569 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56570 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56570 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56571 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56571 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56572 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56572 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56572 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56573 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56573 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56574 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56574 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56574 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56575 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56576 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56576 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56577 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56577 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56577 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56578 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56578 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56578 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56582 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56582 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56584 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56587 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56587 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56588 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56588 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56589 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56590 ( SUSE ): 6.9
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56590 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56593 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56593 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56593 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56594 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56594 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56595 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56595 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56595 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56596 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56596 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56596 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56597 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56597 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-56598 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56598 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56599 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56599 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56599 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-5660 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56602 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56602 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56603 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56603 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56604 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56604 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56604 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56606 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56606 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56607 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56609 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56609 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56611 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56611 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56614 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56614 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56614 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56615 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56615 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56616 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56617 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56617 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56619 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56619 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56620 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56620 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56620 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56622 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56622 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56623 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56623 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56623 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56625 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56629 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56629 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56630 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56631 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56631 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56632 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56634 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56635 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56635 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56636 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56636 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-56637 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56641 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56642 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56642 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56643 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56643 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56643 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56644 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56644 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56645 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56645 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56648 ( SUSE ): 8.6
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56648 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56649 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56649 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56651 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56651 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56654 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56654 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56654 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56656 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56656 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56659 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56659 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56660 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56660 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56661 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56662 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56662 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
* CVE-2024-56662 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-56663 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56663 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-56663 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-56664 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56664 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56667 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56670 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56670 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56672 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56672 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56672 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56675 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56675 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56677 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56677 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56678 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56678 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56681 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56681 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-56683 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56687 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56687 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56688 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56690 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56690 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56691 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56694 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56698 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56700 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56700 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56701 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56704 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56704 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56705 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56705 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56708 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56708 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56708 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56709 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56712 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56716 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56722 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56722 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56723 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56724 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56724 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56729 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56729 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56729 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56739 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56741 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56741 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56741 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56745 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56746 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56746 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56747 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56747 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56747 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56748 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56748 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56752 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56754 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56754 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-56754 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56755 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56755 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56756 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56756 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-56756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56759 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56759 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56760 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56760 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56765 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56765 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56766 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56766 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56767 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56767 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56769 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56769 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-56769 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56774 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56774 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56775 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56775 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56776 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56777 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56778 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56778 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56779 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56780 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56780 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56787 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57791 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57791 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57792 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57792 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57793 ( SUSE ): 6.2
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-57793 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-57795 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57795 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57798 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57801 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57801 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57801 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57804 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57804 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-57809 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57838 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57849 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57849 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57850 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57850 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57857 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57857 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57874 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57874 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-57876 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57876 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57887 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57887 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57888 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57890 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57890 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-57890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57892 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57893 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57893 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57896 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57896 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57897 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57899 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57899 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-57903 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57904 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57906 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57906 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-57907 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57907 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-57908 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57908 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-57908 ( SUSE ): 3.3 AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-57910 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57910 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-57911 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-57912 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-57913 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57913 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-57915 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57915 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57916 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57916 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57922 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57926 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57929 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57929 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57932 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57933 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57935 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57936 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57940 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57940 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21632 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21645 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21646 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21649 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21650 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21651 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21651 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21656 ( SUSE ): 1.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-21656 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L
* CVE-2025-21662 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21662 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Confidential Computing Module 15-SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves 343 vulnerabilities, contains two features and has 119
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP6 Confidential Computing kernel was updated to
receive various security bugfixes.
The following security bugs were fixed:
* CVE-2023-52489: mm/sparsemem: fix race in accessing memory_section->usage
(bsc#1221326).
* CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check on non-
DSA netdevice events (bsc#1220355).
* CVE-2024-26924: scsi: lpfc: Release hbalock before calling
lpfc_worker_wake_up() (bsc#1225820).
* CVE-2024-27397: netfilter: nf_tables: use timestamp to check for set element
timeout (bsc#1224095).
* CVE-2024-35839: kABI fix for netfilter: bridge: replace physindev with
physinif in nf_bridge_info (bsc#1224726).
* CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies
(bsc#1225758).
* CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526).
* CVE-2024-44934: net: bridge: mcast: wait for previous gc cycles when
removing port (bsc#1229809).
* CVE-2024-44996: vsock: fix recursive ->recvmsg calls (bsc#1230205).
* CVE-2024-45828: i3c: mipi-i3c-hci: Mask ring interrupts before ring stop
request (bsc#1235705).
* CVE-2024-46680: Bluetooth: btnxpuart: Fix random crash seen while removing
driver (bsc#1230557).
* CVE-2024-46765: ice: protect XDP configuration with a mutex (bsc#1230807).
* CVE-2024-46800: sch/netem: fix use after free in netem_dequeue
(bsc#1230827).
* CVE-2024-47678: icmp: change the order of rate limits (bsc#1231854).
* CVE-2024-48881: bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again
(bsc#1235727).
* CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in
sctp_listen_start (bsc#1232166).
* CVE-2024-49951: Bluetooth: MGMT: Fix possible crash on mgmt_index_removed
(bsc#1232158).
* CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption
(bsc#1232157).
* CVE-2024-49998: net: dsa: improve shutdown sequence (bsc#1232087).
* CVE-2024-50018: net: napi: Prevent overflow of napi_defer_hard_irqs
(bsc#1232419).
* CVE-2024-50039: kABI: Restore deleted
EXPORT_SYMBOL(__qdisc_calculate_pkt_len) (bsc#1231909).
* CVE-2024-50143: udf: fix uninit-value use in udf_get_fileshortad
(bsc#1233038).
* CVE-2024-50151: smb: client: fix OOBs when building SMB2_IOCTL request
(bsc#1233055).
* CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112).
* CVE-2024-50202: nilfs2: propagate directory read errors from
nilfs_find_entry() (bsc#1233324).
* CVE-2024-50252: mlxsw: spectrum_ipip: Fix memory leak when changing remote
IPv6 address (bsc#1233201).
* CVE-2024-50256: netfilter: nf_reject_ipv6: fix potential crash in
nf_send_reset6() (bsc#1233200).
* CVE-2024-50262: bpf: Fix out-of-bounds write in trie_get_next_key()
(bsc#1233239).
* CVE-2024-50278, CVE-2024-50280: dm cache: fix flushing uninitialized
delayed_work on cache_ctr error (bsc#1233467 bsc#1233469).
* CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first
resume (bsc#1233467).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233468).
* CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver
(bsc#1233485).
* CVE-2024-50299: sctp: properly validate chunk size in sctp_sf_ootb()
(bsc#1233488).
* CVE-2024-53043: mctp i2c: handle NULL header address (bsc#1233523).
* CVE-2024-53050: drm/i915/hdcp: Add encoder check in hdcp2_get_capability
(bsc#1233546).
* CVE-2024-53051: drm/i915/hdcp: Add encoder check in
intel_hdcp_get_capability (bsc#1233547).
* CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction
(bsc#1233550).
* CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in
mtk_crtc_destroy() (bsc#1233568).
* CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558
bsc#1234464).
* CVE-2024-53090: afs: Fix lock recursion (bsc#1233637).
* CVE-2024-53091: bpf: Add sk_is_inet and IS_ICSK check in
tls_sw_has_ctx_tx/rx (bsc#1233638).
* CVE-2024-53099: bpf: Check validity of link->type in bpf_link_show_fdinfo()
(bsc#1233772).
* CVE-2024-53105: mm: page_alloc: move mlocked flag clearance into
free_pages_prepare() (bsc#1234069).
* CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error
(bsc#1234085).
* CVE-2024-53111: mm/mremap: fix address wraparound in move_page_tables()
(bsc#1234086).
* CVE-2024-53113: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof
(bsc#1234077).
* CVE-2024-53117: virtio/vsock: Improve MSG_ZEROCOPY error handling
(bsc#1234079).
* CVE-2024-53118: vsock: Fix sk_error_queue memory leak (bsc#1234071).
* CVE-2024-53119: virtio/vsock: Fix accept_queue memory leak (bsc#1234073).
* CVE-2024-53121: net/mlx5: fs, lock FTE when checking if active
(bsc#1234078).
* CVE-2024-53122: mptcp: cope racing subflow creation in
mptcp_rcv_space_adjust (bsc#1234076).
* CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def
(bsc#1234156).
* CVE-2024-53130: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint
(bsc#1234219).
* CVE-2024-53131: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint
(bsc#1234220).
* CVE-2024-53133: drm/amd/display: Handle dml allocation failure to avoid
crash (bsc#1234221)
* CVE-2024-53134: pmdomain: imx93-blk-ctrl: correct remove path (bsc#1234159).
* CVE-2024-53138: net/mlx5e: kTLS, Fix incorrect page refcounting
(bsc#1234223).
* CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt
(bsc#1234381).
* CVE-2024-53160: rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu
(bsc#1234810).
* CVE-2024-53161: EDAC/bluefield: Fix potential integer overflow
(bsc#1234856).
* CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863).
* CVE-2024-53170: block: fix uaf for flush rq while iterating tags
(bsc#1234888).
* CVE-2024-53172: ubi: fastmap: Fix duplicate slab cache names while attaching
(bsc#1234898).
* CVE-2024-53175: ipc: fix memleak if msg_init_ns failed in create_ipc_ns
(bsc#1234893).
* CVE-2024-53179: smb: client: fix use-after-free of signing key
(bsc#1234921).
* CVE-2024-53185: smb: client: fix NULL ptr deref in crypto_aead_setkey()
(bsc#1234901).
* CVE-2024-53195: KVM: arm64: Get rid of userspace_irqchip_in_use
(bsc#1234957).
* CVE-2024-53196: KVM: arm64: Do not retire aborted MMIO instruction
(bsc#1234906).
* CVE-2024-53198: xen: Fix the issue of resource not being properly released
in xenbus_dev_probe() (bsc#1234923).
* CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended
capability (bsc#1235004).
* CVE-2024-53216: nfsd: fix UAF when access ex_uuid or ex_stats (bsc#1235003).
* CVE-2024-53222: zram: fix NULL pointer in comp_algorithm_show()
(bsc#1234974).
* CVE-2024-53227: scsi: bfa: Fix use-after-free in bfad_im_module_exit()
(bsc#1235011).
* CVE-2024-53232: iommu/s390: Implement blocking domain (bsc#1235050).
* CVE-2024-53234: erofs: handle NONHEAD !delta[1] lclusters gracefully
(bsc#1235045).
* CVE-2024-53236: xsk: Free skb when TX metadata options are invalid
(bsc#1235000).
* CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281).
* CVE-2024-53241: x86/xen: use new hypercall functions instead of hypercall
page (XSA-466 bsc#1234282).
* CVE-2024-53685: ceph: give up on paths longer than PATH_MAX (bsc#1235720).
* CVE-2024-55639: net: renesas: rswitch: avoid use-after-put for a device tree
node (bsc#1235737).
* CVE-2024-55881: KVM: x86: Play nice with protected guests in
complete_hypercall_exit() (bsc#1235745).
* CVE-2024-56372: net: tun: fix tun_napi_alloc_frags() (bsc#1235753).
* CVE-2024-56549: cachefiles: Fix NULL pointer dereference in object->file
(bsc#1234912).
* CVE-2024-56566: mm/slub: Avoid list corruption when removing a slab from the
full list (bsc#1235033).
* CVE-2024-56568: iommu/arm-smmu: Defer probe of clients after smmu device
bound (bsc#1235032).
* CVE-2024-56569: ftrace: Fix regression with module command in
stack_trace_filter (bsc#1235031).
* CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function
(bsc#1235035).
* CVE-2024-56582: btrfs: fix use-after-free in btrfs_encoded_read_endio()
(bsc#1235128).
* CVE-2024-56588: scsi: hisi_sas: Create all dump files during debugfs
initialization (bsc#1235123).
* CVE-2024-56589: scsi: hisi_sas: Add cond_resched() for no forced preemption
model (bsc#1235241).
* CVE-2024-56599: wifi: ath10k: avoid NULL pointer error during sdio remove
(bsc#1235138).
* CVE-2024-56602: net: ieee802154: do not leave a dangling sk pointer in
ieee802154_create() (bsc#1235521).
* CVE-2024-56603: net: af_can: do not leave a dangling sk pointer in
can_create() (bsc#1235415).
* CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in
rfcomm_sock_alloc() (bsc#1235056).
* CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error
in l2cap_sock_create() (bsc#1235061).
* CVE-2024-56611: mm/mempolicy: fix migrate_to_node() assuming there is at
least one VMA in a MM (bsc#1235391).
* CVE-2024-56614: xsk: fix OOB map writes when deleting elements
(bsc#1235424).
* CVE-2024-56615: bpf: fix OOB devmap writes when deleting elements
(bsc#1235426).
* CVE-2024-56617: cacheinfo: Allocate memory during CPU hotplug if not done
from the primary CPU (bsc#1235429).
* CVE-2024-56620: scsi: ufs: qcom: Only free platform MSIs when ESI is enabled
(bsc#1235227).
* CVE-2024-56622: scsi: ufs: core: sysfs: Prevent div by zero (bsc#1235251).
* CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release()
(bsc#1235480).
* CVE-2024-56635: net: avoid potential UAF in default_operstate()
(bsc#1235519).
* CVE-2024-56636: geneve: do not assume mac header is set in geneve_xmit_skb()
(bsc#1235520).
* CVE-2024-56637: netfilter: ipset: Hold module reference while requesting a
module (bsc#1235523).
* CVE-2024-56641: net/smc: initialize close_work early to avoid warning
(bsc#1235526).
* CVE-2024-56643: dccp: Fix memory leak in dccp_feat_change_recv
(bsc#1235132).
* CVE-2024-56648: net: hsr: avoid potential out-of-bound access in
fill_frame_info() (bsc#1235451).
* CVE-2024-56649: net: enetc: Do not configure preemptible TCs if SIs do not
support (bsc#1235449).
* CVE-2024-56656: bnxt_en: Fix aggregation ID mask to prevent oops on 5760X
chips (bsc#1235444).
* CVE-2024-56659: net: lapb: increase LAPB_HEADER_LEN (bsc#1235439).
* CVE-2024-56660: net/mlx5: DR, prevent potential error pointer dereference
(bsc#1235437).
* CVE-2024-56664: bpf, sockmap: Fix race between element replace and close()
(bsc#1235249).
* CVE-2024-56675: bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors
(bsc#1235555).
* CVE-2024-56694: bpf: fix recursive lock when verdict program return SK_PASS
(bsc#1235412).
* CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584).
* CVE-2024-56708: EDAC/igen6: Avoid segmentation fault on module unload
(bsc#1235564).
* CVE-2024-56712: udmabuf: fix memory leak on last export_udmabuf() error path
(bsc#1235565).
* CVE-2024-56716: netdevsim: prevent bad user input in
nsim_dev_health_break_write() (bsc#1235587).
* CVE-2024-56729: smb: Initialize cfid->tcon before performing network ops
(bsc#1235503).
* CVE-2024-56747: scsi: qedi: Fix a possible memory leak in
qedi_alloc_and_init_sb() (bsc#1234934).
* CVE-2024-56748: scsi: qedf: Fix a possible memory leak in
qedf_alloc_and_init_sb() (bsc#1235627).
* CVE-2024-56755: netfs/fscache: Add a memory barrier for
FSCACHE_VOLUME_CREATING (bsc#1234920).
* CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing
is enabled (bsc#1235645).
* CVE-2024-56774: btrfs: add a sanity check for btrfs root in
btrfs_search_slot() (bsc#1235653).
* CVE-2024-56775: drm/amd/display: Fix handling of plane refcount
(bsc#1235657).
* CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining
clc data (bsc#1235759).
* CVE-2024-57793: virt: tdx-guest: Just leak decrypted memory on unrecoverable
errors (bsc#1235768).
* CVE-2024-57795: RDMA/rxe: Remove the direct link to net_device
(bsc#1235906).
* CVE-2024-57801: net/mlx5e: Skip restore TC rules for vport rep without
loaded flag (bsc#1235940).
* CVE-2024-57804: scsi: mpi3mr: Fix corrupt config pages PHY state is switched
in sysfs (bsc#1235779).
* CVE-2024-57809: PCI: imx6: Fix suspend/resume support on i.MX6QDL
(bsc#1235793).
* CVE-2024-57838: s390/entry: Mark IRQ entries to fix stack depot warnings
(bsc#1235798).
* CVE-2024-57857: RDMA/siw: Remove direct link to net_device (bsc#1235946).
* CVE-2024-57892: ocfs2: fix slab-use-after-free due to dangling pointer
dqi_priv (bsc#1235964).
* CVE-2024-57896: btrfs: flush delalloc workers queue before stopping cleaner
kthread during unmount (bsc#1235965).
* CVE-2024-57903: net: restrict SO_REUSEPORT to inet sockets (bsc#1235967).
* CVE-2024-57929: dm array: fix releasing a faulty array block twice in
dm_array_cursor_end (bsc#1236096).
* CVE-2024-57932: gve: guard XDP xmit NDO on existence of xdp queues
(bsc#1236190).
* CVE-2024-57933: gve: guard XSK operations on the existence of queues
(bsc#1236178).
* CVE-2025-21632: x86/fpu: Ensure shadow stack is active before "getting"
registers (bsc#1236106).
* CVE-2025-21649: net: hns3: fix kernel crash when 1588 is sent on HIP08
devices (bsc#1236143).
* CVE-2025-21650: net: hns3: fixed hclge_fetch_pf_reg accesses bar space out
of bounds issue (bsc#1236144).
* CVE-2025-21651: net: hns3: do not auto enable misc vector (bsc#1236145).
* CVE-2025-21662: net/mlx5: Fix variable not being completed when function
returns (bsc#1236198).
The following non-security bugs were fixed:
* 9p: v9fs_fid_find: also lookup by inode if not found dentry (git-fixes).
* ACPI/HMAT: Move HMAT messages to pr_debug() (bsc#1234294)
* ACPI/IORT: Add PMCG platform information for HiSilicon HIP09A (stable-
fixes).
* ACPI/IORT: Add PMCG platform information for HiSilicon HIP10/11 (stable-
fixes).
* ACPI: PCC: Add PCC shared memory region command and status bitfields
(stable-fixes).
* ACPI: PRM: Add PRM handler direct call support (jsc#PED-10467).
* ACPI: resource: Add Asus Vivobook X1504VAP to irq1_level_low_skip_override[]
(stable-fixes).
* ACPI: resource: Add TongFang GM5HG0A to irq1_edge_low_force_override[]
(stable-fixes).
* ACPI: resource: Fix memory resource type union access (git-fixes).
* ACPI: x86: Add skip i2c clients quirk for Acer Iconia One 8 A1-840 (stable-
fixes).
* ACPI: x86: Clean up Asus entries in acpi_quirk_skip_dmi_ids[] (stable-
fixes).
* ACPI: x86: Make UART skip quirks work on PCI UARTs without an UID (stable-
fixes).
* ACPICA: events/evxfregn: do not release the ContextMutex that was never
acquired (git-fixes).
* ALSA hda/realtek: Add quirk for Framework F111:000C (stable-fixes).
* ALSA: hda/conexant: fix Z60MR100 startup pop issue (stable-fixes).
* ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).
* ALSA: hda/realtek - Add support for ASUS Zen AIO 27 Z272SD_A272SD audio
(stable-fixes).
* ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks
(stable-fixes).
* ALSA: hda/realtek: Add new alc2xx-fixup-headset-mic model (stable-fixes).
* ALSA: hda/realtek: Add support for Ayaneo System using CS35L41 HDA (stable-
fixes).
* ALSA: hda/realtek: Add support for Galaxy Book2 Pro (NP950XEE) (stable-
fixes).
* ALSA: hda/realtek: Add support for Samsung Galaxy Book3 360 (NP730QFG)
(stable-fixes).
* ALSA: hda/realtek: Enable mute and micmute LED on HP ProBook 430 G8 (stable-
fixes).
* ALSA: hda/realtek: Fix headset mic on Acer Nitro 5 (stable-fixes).
* ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-
fixes).
* ALSA: line6: Fix racy access to midibuf (stable-fixes).
* ALSA: seq: Check UMP support for midi_version change (git-fixes).
* ALSA: seq: oss: Fix races at processing SysEx messages (stable-fixes).
* ALSA: seq: ump: Fix seq port updates per FB info notify (git-fixes).
* ALSA: seq: ump: Use automatic cleanup of kfree() (stable-fixes).
* ALSA: seq: ump: Use guard() for locking (stable-fixes).
* ALSA: ump: Use guard() for locking (stable-fixes).
* ALSA: usb-audio: Add implicit feedback quirk for Yamaha THR5 (stable-fixes).
* ALSA: usb-audio: Fix a DMA to stack memory bug (git-fixes).
* ALSA: usb-audio: Notify xrun for low-latency mode (git-fixes).
* ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).
* ALSA: usb-audio: US16x08: Initialize array before use (git-fixes).
* ALSA: usb-audio: add mixer mapping for Corsair HS80 (stable-fixes).
* ASoC: Intel: avs: da7219: Remove suspend_pre() and resume_post() (stable-
fixes).
* ASoC: Intel: sof_sdw: add quirk for Dell SKU 0B8C (stable-fixes).
* ASoC: Intel: sof_sdw: fix jack detection on ADL-N variant RVP (stable-
fixes).
* ASoC: SOF: Remove libraries from topology lookups (git-fixes).
* ASoC: SOF: ipc3-topology: fix resource leaks in
sof_ipc3_widget_setup_comp_dai() (git-fixes).
* ASoC: amd: yc: Add a quirk for microfone on Lenovo ThinkPad P14s Gen 5
21MES00B00 (stable-fixes).
* ASoC: amd: yc: Add quirk for microphone on Lenovo Thinkpad T14s Gen 6
21M1CTO1WW (stable-fixes).
* ASoC: amd: yc: Fix the wrong return value (git-fixes).
* ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes).
* ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes).
* ASoC: amd: yc: fix internal mic on Redmi G 2022 (stable-fixes).
* ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes).
* ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes).
* ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable-
fixes).
* ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes).
* ASoC: hdmi-codec: reorder channel allocation list (stable-fixes).
* ASoC: mediatek: disable buffer pre-allocation (stable-fixes).
* ASoC: mediatek: mt8188-mt6359: Remove hardcoded dmic codec (git-fixes).
* ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes).
* ASoC: nau8822: Lower debug print priority (stable-fixes).
* ASoC: rt722: add delay time to wait for the calibration procedure (stable-
fixes).
* Bluetooth: Add support ITTIM PE50-M75C (stable-fixes).
* Bluetooth: Fix type of len in rfcomm_sock_getsockopt{,_old}() (stable-
fixes).
* Bluetooth: ISO: Reassociate a socket with an active BIS (stable-fixes).
* Bluetooth: L2CAP: do not leave dangling sk pointer on error in
l2cap_sock_create() (stable-fixes).
* Bluetooth: MGMT: Fix Add Device to responding before completing (git-fixes).
* Bluetooth: MGMT: Fix possible deadlocks (git-fixes).
* Bluetooth: SCO: Add support for 16 bits transparent voice setting (git-
fixes).
* Bluetooth: btnxpuart: Fix driver sending truncated data (git-fixes).
* Bluetooth: btnxpuart: Resolve TX timeout error in power save stress test
(bsc#1230557)
* Bluetooth: btusb: Add RTL8852BE device 0489:e123 to device tables (stable-
fixes).
* Bluetooth: btusb: Add USB HW IDs for MT7921/MT7922/MT7925 (stable-fixes).
* Bluetooth: btusb: Add new VID/PID 0489/e111 for MT7925 (stable-fixes).
* Bluetooth: btusb: Add new VID/PID 13d3/3602 for MT7925 (stable-fixes).
* Bluetooth: btusb: add callback function in btusb suspend/resume (stable-
fixes).
* Bluetooth: btusb: mediatek: add callback function in btusb_disconnect
(stable-fixes).
* Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet
(stable-fixes).
* Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating (git-
fixes).
* Bluetooth: hci_sync: Fix not setting Random Address when required (git-
fixes).
* Bluetooth: iso: Fix recursive locking warning (git-fixes).
* Disable ceph (jsc#PED-7242)
* Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
(jsc#PED-6143).
* Documentation: PM: Clarify pm_runtime_resume_and_get() return value (git-
fixes).
* Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet (git-
fixes).
* Drop uvcvideo fix due to regression (bsc#1235894)
* HID: magicmouse: Apple Magic Trackpad 2 USB-C driver support (stable-fixes).
* HID: wacom: fix when get product name maybe null pointer (git-fixes).
* Input: bbnsm_pwrkey - fix missed key press after suspend (git-fixes).
* KVM: Fix conflict of IOCTL definition of KVM_MEMORY_MAPPING (jsc#PED-6143).
* KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits (bsc#1234635).
* KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL (jsc#PED-6143).
* KVM: TDX: Add TSX_CTRL msr into uret_msrs list (jsc#PED-6143).
* KVM: TDX: Add a method to ignore dirty logging (jsc#PED-6143).
* KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch
(jsc#PED-6143).
* KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
(jsc#PED-6143).
* KVM: TDX: Add a place holder to handle TDX VM exit (jsc#PED-6143).
* KVM: TDX: Add accessors VMX VMCS helpers (jsc#PED-6143).
* KVM: TDX: Add helper function to read TDX metadata in array (jsc#PED-6143).
* KVM: TDX: Add helper functions to allocate/free TDX private host key id
(jsc#PED-6143).
* KVM: TDX: Add is_private check for mmu_alloc_root (jsc#PED-6143).
* KVM: TDX: Add load_mmu_pgd method for TDX (jsc#PED-6143).
* KVM: TDX: Add methods to ignore VMX preemption timer (jsc#PED-6143).
* KVM: TDX: Add methods to ignore accesses to TSC (jsc#PED-6143).
* KVM: TDX: Add methods to ignore guest instruction emulation (jsc#PED-6143).
* KVM: TDX: Add methods to ignore virtual apic related operation
(jsc#PED-6143).
* KVM: TDX: Add support for find pending IRQ in a protected local APIC
(jsc#PED-6143).
* KVM: TDX: Complete interrupts after tdexit (jsc#PED-6143).
* KVM: TDX: Create initial guest memory (jsc#PED-6143).
* KVM: TDX: Do TDX specific vcpu initialization (jsc#PED-6143).
* KVM: TDX: Do not use NO_RBP_MOD for backward compatibility (jsc#PED-6143).
* KVM: TDX: Emulate Xen MTRR disablement (jsc#PED-6143).
* KVM: TDX: Extend memory measurement with initial guest memory
(jsc#PED-6143).
* KVM: TDX: Finalize VM initialization (jsc#PED-6143).
* KVM: TDX: Fix incompatibility with QEMU definition (jsc#PED-6143).
* KVM: TDX: Fix is_private for page fault handler (jsc#PED-6143).
* KVM: TDX: Get system-wide info about TDX module on initialization
(jsc#PED-6143).
* KVM: TDX: Handle EXIT_REASON_OTHER_SMI with MSMI (jsc#PED-6143).
* KVM: TDX: Handle MSR IA32_FEAT_CTL MSR and IA32_MCG_EXT_CTL (jsc#PED-6143).
* KVM: TDX: Handle MSR MTRRCap and MTRRDefType access (jsc#PED-6143).
* KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall (jsc#PED-6143).
* KVM: TDX: Handle TDX PV CPUID hypercall (jsc#PED-6143).
* KVM: TDX: Handle TDX PV HLT hypercall (jsc#PED-6143).
* KVM: TDX: Handle TDX PV MMIO hypercall (jsc#PED-6143).
* KVM: TDX: Handle TDX PV port io hypercall (jsc#PED-6143).
* KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall (jsc#PED-6143).
* KVM: TDX: Handle vmentry failure for INTEL TD guest (jsc#PED-6143).
* KVM: TDX: Ignore setting up mce (jsc#PED-6143).
* KVM: TDX: Implement TDX vcpu enter/exit path (jsc#PED-6143).
* KVM: TDX: Implement callbacks for MSR operations for TDX (jsc#PED-6143).
* KVM: TDX: Implement interrupt injection (jsc#PED-6143).
* KVM: TDX: Implement methods to inject NMI (jsc#PED-6143).
* KVM: TDX: Inhibit APICv for TDX guest (jsc#PED-6143).
* KVM: TDX: MTRR: implement get_mt_mask() for TDX (jsc#PED-6143).
* KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific (jsc#PED-6143).
* KVM: TDX: Make pmu_intel.c ignore guest TD case (jsc#PED-6143).
* KVM: TDX: Refuse to unplug the last cpu on the package (jsc#PED-6143).
* KVM: TDX: Require TDP MMU and mmio caching for TDX (jsc#PED-6143).
* KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
(jsc#PED-6143).
* KVM: TDX: Return -EINTR for KVM_MEMORY_MAPPING when signal pending
(jsc#PED-6143).
* KVM: TDX: Silently discard SMI request (jsc#PED-6143).
* KVM: TDX: Silently ignore INIT/SIPI (jsc#PED-6143).
* KVM: TDX: TDP MMU TDX support (jsc#PED-6143).
* KVM: TDX: create/destroy VM structure (jsc#PED-6143).
* KVM: TDX: create/free TDX vcpu structure (jsc#PED-6143).
* KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT (jsc#PED-6143).
* KVM: TDX: handle EXIT_REASON_OTHER_SMI (jsc#PED-6143).
* KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL (jsc#PED-6143).
* KVM: TDX: handle ept violation/misconfig exit (jsc#PED-6143).
* KVM: TDX: handle vcpu migration over logical processor (jsc#PED-6143).
* KVM: TDX: initialize VM with TDX specific parameters (jsc#PED-6143).
* KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
(jsc#PED-6143).
* KVM: TDX: restore debug store when TD exit (jsc#PED-6143).
* KVM: TDX: restore host xsave state when exit from the guest TD
(jsc#PED-6143).
* KVM: TDX: restore user ret MSRs (jsc#PED-6143).
* KVM: TDX: vcpu_run: save/restore host state(host kernel gs) (jsc#PED-6143).
* KVM: TDX: x86: Add ioctl to get TDX systemwide parameters (jsc#PED-6143).
* KVM: VMX: Move NMI/exception handler to common helper (jsc#PED-6143).
* KVM: VMX: Split out guts of EPT violation to common/exposed function
(jsc#PED-6143).
* KVM: s390: Reject KVM_SET_GSI_ROUTING on ucontrol VMs (git-fixes
bsc#1235776).
* KVM: s390: Reject setting flic pfault attributes on ucontrol VMs (git-fixes
bsc#1235777).
* KVM: s390: vsie: fix virtual/physical address in unpin_scb() (git-fixes
bsc#1235778).
* KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
(jsc#PED-6143).
* KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page (jsc#PED-6143).
* KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
(jsc#PED-6143).
* KVM: x86/mmu: Alloc TDP MMU roots while holding mmu_lock for read
(jsc#PED-6143).
* KVM: x86/mmu: Allow passing '-1' for "all" as_id for TDP MMU iterators
(jsc#PED-6143).
* KVM: x86/mmu: Check for usable TDP MMU root while holding mmu_lock for read
(jsc#PED-6143).
* KVM: x86/mmu: Disallow fast page fault on private GPA (jsc#PED-6143).
* KVM: x86/mmu: Do not do TLB flush when zappings SPTEs in invalid roots
(jsc#PED-6143).
* KVM: x86/mmu: Do not enable page track for TD guest (jsc#PED-6143).
* KVM: x86/mmu: Free TDP MMU roots while holding mmy_lock for read
(jsc#PED-6143).
* KVM: x86/mmu: Precisely invalidate MMU root_role during CPUID update (git-
fixes).
* KVM: x86/mmu: Skip invalid TDP MMU roots when write-protecting SPTEs
(jsc#PED-6143).
* KVM: x86/mmu: Skip invalid roots when zapping leaf SPTEs for GFN range
(jsc#PED-6143).
* KVM: x86/mmu: Zap invalidated TDP MMU roots at 4KiB granularity
(jsc#PED-6143).
* KVM: x86/tdp_mmu: Apply mmu notifier callback to only shared GPA
(jsc#PED-6143).
* KVM: x86/tdp_mmu: Do not zap private pages for unsupported cases
(jsc#PED-6143).
* KVM: x86/tdp_mmu: Fix to return original flush on unsupported cases
(jsc#PED-6143).
* KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
(jsc#PED-6143).
* KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU (jsc#PED-6143).
* KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
(jsc#PED-6143).
* KVM: x86: Add hooks in kvm_arch_vcpu_memory_mapping() (jsc#PED-6143).
* KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
(jsc#PED-6143).
* KVM: x86: Assume timer IRQ was injected if APIC state is proteced
(jsc#PED-6143).
* KVM: x86: Split core of hypercall emulation to helper function
(jsc#PED-6143).
* KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
(jsc#PED-6143).
* NFS/pnfs: Fix a live lock between recalled layouts and layoutget (git-
fixes).
* NFSD: Async COPY result needs to return a write verifier (git-fixes).
* NFSD: Cap the number of bytes copied by nfs4_reset_recoverydir() (git-
fixes).
* NFSD: Fix nfsd4_shutdown_copy() (git-fixes).
* NFSD: Prevent NULL dereference in nfsd4_process_cb_update() (git-fixes).
* NFSD: Prevent a potential integer overflow (git-fixes).
* NFSD: Remove a never-true comparison (git-fixes).
* NFSD: initialize copy->cp_clp early in nfsd4_copy for use by trace point
(git-fixes).
* NFSv4.0: Fix a use-after-free problem in the asynchronous open() (git-
fixes).
* Octeontx2-pf: Free send queue buffers incase of leaf to inner (git-fixes).
* PCI/AER: Disable AER service on suspend (stable-fixes).
* PCI/MSI: Handle lack of irqdomain gracefully (git-fixes).
* PCI: Add 'reset_subordinate' to reset hierarchy below bridge (stable-fixes).
* PCI: Add ACS quirk for Broadcom BCM5760X NIC (stable-fixes).
* PCI: Add ACS quirk for Wangxun FF5xxx NICs (stable-fixes).
* PCI: Add T_PERST_CLK_US macro (git-fixes).
* PCI: Detect and trust built-in Thunderbolt chips (stable-fixes).
* PCI: Fix use-after-free of slot->bus on hot remove (stable-fixes).
* PCI: Use preserve_config in place of pci_flags (stable-fixes).
* PCI: cadence: Extract link setup sequence from cdns_pcie_host_setup()
(stable-fixes).
* PCI: cadence: Set cdns_pcie_host_init() global (stable-fixes).
* PCI: cpqphp: Use PCI_POSSIBLE_ERROR() to check config reads (stable-fixes).
* PCI: j721e: Add PCIe 4x lane selection support (stable-fixes).
* PCI: j721e: Add per platform maximum lane settings (stable-fixes).
* PCI: j721e: Add reset GPIO to struct j721e_pcie (stable-fixes).
* PCI: j721e: Add suspend and resume support (git-fixes).
* PCI: j721e: Use T_PERST_CLK_US macro (git-fixes).
* PCI: qcom: Add support for IPQ9574 (stable-fixes).
* PCI: vmd: Add DID 8086:B06F and 8086:B60B for Intel client SKUs (stable-
fixes).
* PCI: vmd: Set devices to D0 before enabling PM L1 Substates (stable-fixes).
* RAS/AMD/ATL: Translate normalized to system physical addresses using PRM
(jsc#PED-10467).
* RDMA/bnxt_re: Add check for path mtu in modify_qp (git-fixes)
* RDMA/bnxt_re: Add send queue size check for variable wqe (git-fixes)
* RDMA/bnxt_re: Avoid initializing the software queue for user queues (git-
fixes)
* RDMA/bnxt_re: Avoid sending the modify QP workaround for latest adapters
(git-fixes)
* RDMA/bnxt_re: Disable use of reserved wqes (git-fixes)
* RDMA/bnxt_re: Fix MSN table size for variable wqe mode (git-fixes)
* RDMA/bnxt_re: Fix max SGEs for the Work Request (git-fixes)
* RDMA/bnxt_re: Fix max_qp_wrs reported (git-fixes)
* RDMA/bnxt_re: Fix reporting hw_ver in query_device (git-fixes)
* RDMA/bnxt_re: Fix the check for 9060 condition (git-fixes)
* RDMA/bnxt_re: Fix the locking while accessing the QP table (git-fixes)
* RDMA/bnxt_re: Fix the max WQE size for static WQE support (git-fixes)
* RDMA/bnxt_re: Fix the max WQEs used in Static WQE mode (git-fixes)
* RDMA/bnxt_re: Remove always true dattr validity check (git-fixes)
* RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes)
* RDMA/hns: Fix accessing invalid dip_ctx during destroying QP (git-fixes)
* RDMA/hns: Fix mapping error of zero-hop WQE buffer (git-fixes)
* RDMA/hns: Fix missing flush CQE for DWQE (git-fixes)
* RDMA/hns: Fix warning storm caused by invalid input in IO path (git-fixes)
* RDMA/mlx5: Enforce same type port association for multiport RoCE (git-fixes)
* RDMA/rtrs: Ensure 'ib_sge list' is accessible (git-fixes)
* RDMA/uverbs: Prevent integer overflow issue (git-fixes)
* RFC: KVM: x86, TDX: Add check for KVM_SET_CPUID2 (jsc#PED-6143).
* RFC: KVM: x86: Add x86 callback to check cpuid (jsc#PED-6143).
* Revert "block/mq-deadline: use correct way to throttling write requests"
(bsc#1234146).
* Revert "btrfs: fix use-after-free waiting for encoded read endios
(bsc#1235128)"
* Revert "igb: Disable threaded IRQ for igb_msix_other" (git-fixes).
* Revert "mm, kmsan: fix infinite recursion due to RCU critical section"
(bsc#1230413)
* Revert "mm/sparsemem: fix race in accessing memory_section->usage"
(bsc#1230413)
* Revert "mm: prevent derefencing NULL ptr in pfn_section_valid()"
(bsc#1230413)
* Revert "mtd: spi-nor: core: replace dummy buswidth from addr to data" (git-
fixes).
* Revert "unicode: Do not special case ignorable code points" (stable-fixes).
* Revert 'arm64: Kconfig: Make SME depend on BROKEN for now'
* SUNRPC: make sure cache entry active before cache_show (git-fixes).
* SUNRPC: timeout and cancel TLS handshake with -ETIMEDOUT (git-fixes).
* USB: core: Disable LPM only for non-suspended ports (git-fixes).
* USB: serial: cp210x: add Phoenix Contact UPS Device (stable-fixes).
* USB: serial: option: add MediaTek T7XX compositions (stable-fixes).
* USB: serial: option: add MeiG Smart SLM770A (stable-fixes).
* USB: serial: option: add MeiG Smart SRM815 (stable-fixes).
* USB: serial: option: add Neoway N723-EA support (stable-fixes).
* USB: serial: option: add Netprisma LCUK54 modules for WWAN Ready (stable-
fixes).
* USB: serial: option: add TCL IK512 MBIM & ECM (stable-fixes).
* USB: serial: option: add Telit FE910C04 rmnet compositions (stable-fixes).
* USB: usblp: return error when setting unsupported protocol (git-fixes).
* VM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
(jsc#PED-6143).
* accel/habanalabs/gaudi2: unsecure tpc count registers (stable-fixes).
* accel/habanalabs: export dma-buf only if size/offset multiples of PAGE_SIZE
(stable-fixes).
* accel/habanalabs: fix debugfs files permissions (stable-fixes).
* accel/habanalabs: increase HL_MAX_STR to 64 bytes to avoid warnings (stable-
fixes).
* acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl (git-fixes).
* af_unix: Call manage_oob() for every skb in unix_stream_read_generic()
(bsc#1234725).
* afs: Automatically generate trace tag enums (git-fixes).
* afs: Fix missing subdir edit when renamed between parent dirs (git-fixes).
* afs: Fix the maximum cell name length (git-fixes).
* amdgpu/uvd: get ring reference from rq scheduler (git-fixes).
* arch: Introduce arch_{,try_}_cmpxchg128{,_local}() (bsc#1220773).
* arch: Remove cmpxchg_double (bsc#1220773).
* arch: consolidate arch_irq_work_raise prototypes (git-fixes).
* arm64: Ensure bits ASID[15:8] are masked out when the kernel uses
(bsc#1234605)
* arm64: Force position-independent veneers (git-fixes).
* arm64: Kconfig: Make SME depend on BROKEN for now (git-fixes).
* arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer (git-
fixes)
* arm64: dts: freescale: imx8mm-verdin: Fix SD regulator startup delay (git-
fixes)
* arm64: dts: freescale: imx8mp-verdin: Fix SD regulator startup delay (git-
fixes)
* arm64: dts: imx8-ss-vpu: Fix imx8qm VPU IRQs (git-fixes)
* arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes).
* arm64: dts: imx8qxp: Add VPU subsystem file (git-fixes)
* arm64: dts: imx93: add nvmem property for eqos (git-fixes)
* arm64: dts: imx93: add nvmem property for fec1 (git-fixes)
* arm64: dts: imx93: add ocotp node (git-fixes)
* arm64: dts: rockchip: Add DTS for FriendlyARM NanoPi R2S Plus (git-fixes)
* arm64: dts: rockchip: Correct GPIO polarity on brcm BT nodes (git-fixes)
* arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc (git-fixes)
* arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards (git-fixes)
* arm64: dts: rockchip: Fix bluetooth properties on rk3566 box demo (git-
fixes)
* arm64: dts: rockchip: Fix reset-gpios property on brcm BT nodes (git-fixes)
* arm64: dts: rockchip: Fix rt5651 compatible value on (git-fixes)
* arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-eaidk-610 (git-
fixes)
* arm64: dts: rockchip: Fix wakeup prop names on PineNote BT node (git-fixes)
* arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma (git-
fixes)
* arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328 (git-fixes)
* arm64: dts: rockchip: Remove undocumented supports-emmc property (git-fixes)
* arm64: dts: rockchip: add hevc power domain clock to rk3328 (git-fixes).
* arm64: dts: rockchip: fix i2c2 pinctrl-names property on (git-fixes)
* arm64: dts: rockchip: remove num-slots property from (git-fixes)
* arm64: dts: rockchip: remove orphaned pinctrl-names from pinephone (git-
fixes)
* arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes)
* arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL (git-
fixes).
* arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git-
fixes)
* arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes)
* arm64: tegra: Move AGX Orin nodes to correct location (git-fixes)
* arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git-
fixes)
* autofs: fix memory leak of waitqueues in autofs_catatonic_mode (git-fixes).
* batman-adv: Do not let TT changes list grows indefinitely (git-fixes).
* batman-adv: Do not send uninitialized TT changes (git-fixes).
* batman-adv: Remove uninitialized data in full table TT response (git-fixes).
* blk-cgroup: Fix UAF in blkcg_unpin_online() (bsc#1234726).
* blk-core: use pr_warn_ratelimited() in bio_check_ro() (bsc#1234139).
* blk-iocost: Fix an UBSAN shift-out-of-bounds warning (bsc#1234144).
* blk-iocost: do not WARN if iocg was already offlined (bsc#1234147).
* blk-throttle: fix lockdep warning of "cgroup_mutex or RCU read lock
required!" (bsc#1234140).
* blk-wbt-Fix-detection-of-dirty-throttled-tasks.patch: Update tags
* block, bfq: choose the last bfqq from merge chain in bfq_setup_cooperator()
(bsc#1234149).
* block, bfq: do not break merge chain in bfq_split_bfqq() (bsc#1234150).
* block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234160).
* block, bfq: fix procress reference leakage for bfqq in merge chain
(bsc#1234280).
* block, bfq: fix uaf for accessing waker_bfqq after splitting (bsc#1234279).
* block/mq-deadline: Fix the tag reservation code (bsc#1234148).
* block: Call .limit_depth() after .hctx has been set (bsc#1234148).
* block: Fix where bio IO priority gets set (bsc#1234145).
* block: prevent an integer overflow in bvec_try_merge_hw_page (bsc#1234142).
* block: update the stable_writes flag in bdev_add (bsc#1234141).
* bnxt_en: Fix GSO type for HW GRO packets on 5750X chips (git-fixes)
* bnxt_en: Fix receive ring space parameters when XDP is active (git-fixes).
* bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down
(git-fixes).
* bnxt_en: Set backplane link modes correctly for ethtool (git-fixes).
* bpf, arm64: Fix address emission with tag-based KASAN enabled (git-fixes)
* bpf, arm64: Remove garbage frame for struct_ops trampoline (git-fixes)
* bpf, x86: Fix PROBE_MEM runtime load check (git-fixes).
* bpf: verifier: prevent userspace memory access (git-fixes).
* btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235445).
* btrfs: fix use-after-free waiting for encoded read endios (bsc#1235128)
* btrfs: fix use-after-free waiting for encoded read endios (bsc#1235445).
* can: c_can: c_can_handle_bus_err(): update statistics if skb allocation
fails (git-fixes).
* can: dev: can_set_termination(): allow sleeping GPIOs (git-fixes).
* can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes).
* can: gs_usb: add VID/PID for Xylanta SAINT3 product family (stable-fixes).
* can: hi311x: hi3110_can_ist(): fix potential use-after-free (git-fixes).
* can: hi311x: hi3110_can_ist(): fix {rx,tx}_errors statistics (git-fixes).
* can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics
(git-fixes).
* can: j1939: fix error in J1939 documentation (stable-fixes).
* can: j1939: j1939_session_new(): fix skb reference counting (git-fixes).
* can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git-
fixes).
* can: mcp251xfd: mcp251xfd_get_tef_len(): work around erratum DS80000789E 6
(git-fixes).
* can: sja1000: sja1000_err(): fix {rx,tx}_errors statistics (git-fixes).
* can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL
(git-fixes).
* can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes).
* ceph: improve error handling and short/overflow-read logic in
__ceph_sync_read() (bsc#1228592).
* cleanup: Add conditional guard support (stable-fixes).
* cleanup: Adjust scoped_guard() macros to avoid potential warning (stable-
fixes).
* cleanup: Remove address space of returned pointer (git-fixes).
* clocksource/drivers/timer-ti-dm: Fix child node refcount handling (git-
fixes).
* clocksource/drivers:sp804: Make user selectable (git-fixes).
* counter: stm32-timer-cnt: Add check for clk_enable() (git-fixes).
* counter: ti-ecap-capture: Add check for clk_enable() (git-fixes).
* cpufreq: intel_pstate: Check turbo_is_disabled() in store_no_turbo()
(bsc#1234619).
* cpufreq: intel_pstate: Do not update global.turbo_disabled after
initialization (bsc#1234619).
* cpufreq: intel_pstate: Drop redundant locking from
intel_pstate_driver_cleanup() (bsc#1234619).
* cpufreq: intel_pstate: Fix unchecked HWP MSR access (bsc#1234619).
* cpufreq: intel_pstate: Fold intel_pstate_max_within_limits() into caller
(bsc#1234619).
* cpufreq: intel_pstate: Get rid of unnecessary READ_ONCE() annotations
(bsc#1234619).
* cpufreq: intel_pstate: Read global.no_turbo under READ_ONCE() (bsc#1234619).
* cpufreq: intel_pstate: Rearrange show_no_turbo() and store_no_turbo()
(bsc#1234619).
* cpufreq: intel_pstate: Refine computation of P-state for given frequency
(bsc#1234619).
* cpufreq: intel_pstate: Replace three global.turbo_disabled checks
(bsc#1234619).
* cpufreq: intel_pstate: Revise global turbo disable check (bsc#1234619).
* cpufreq: intel_pstate: Simplify spinlock locking (bsc#1234619).
* cpufreq: intel_pstate: Update the maximum CPU frequency consistently
(bsc#1234619).
* cpufreq: intel_pstate: Use __ro_after_init for three variables
(bsc#1234619).
* cpufreq: intel_pstate: Wait for canceled delayed work to complete
(bsc#1234619).
* crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes
(git-fixes).
* crypto: ecdsa - Avoid signed integer overflow on signature decoding (stable-
fixes).
* crypto: ecdsa - Convert byte arrays with key coordinates to digits (stable-
fixes).
* crypto: ecdsa - Rename keylen to bufsize where necessary (stable-fixes).
* crypto: ecdsa - Use ecc_digits_from_bytes to convert signature (stable-
fixes).
* crypto: qat - disable IOV in adf_dev_stop() (git-fixes).
* crypto: x86/sha256 - Add parentheses around macros' single arguments
(stable-fixes).
* cyrpto/b128ops: Remove struct u128 (bsc#1220773).
* devlink: Fix length of eswitch inline-mode (git-fixes).
* dlm: fix possible lkb_resource null dereference (git-fixes).
* dma-buf: fix dma_fence_array_signaled v4 (stable-fixes).
* dma-debug: fix a possible deadlock on radix_lock (stable-fixes).
* dma-fence: Fix reference leak on fence merge failure path (git-fixes).
* dma-fence: Use kernel's sort for merging fences (git-fixes).
* dmaengine: apple-admac: Avoid accessing registers in probe (git-fixes).
* dmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset (git-
fixes).
* dmaengine: dw: Select only supported masters for ACPI devices (git-fixes).
* dmaengine: idxd: Check for driver name match before sva user feature
(bsc#1234357).
* dmaengine: mv_xor: fix child node refcount handling in early exit (git-
fixes).
* dmaengine: tegra: Return correct DMA status when paused (git-fixes).
* driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link
(stable-fixes).
* driver core: fw_devlink: Improve logs for cycle detection (stable-fixes).
* driver core: fw_devlink: Stop trying to optimize cycle detection logic (git-
fixes).
* drivers: net: ionic: add missed debugfs cleanup to ionic_probe() error path
(git-fixes).
* drm/amd/display: Add HDR workaround for specific eDP (stable-fixes).
* drm/amd/display: Add NULL check for clk_mgr in dcn32_init_hw (stable-fixes).
* drm/amd/display: Add check for granularity in dml ceil/floor helpers
(stable-fixes).
* drm/amd/display: Allow backlight to go below
`AMDGPU_DM_DEFAULT_MIN_BACKLIGHT` (stable-fixes).
* drm/amd/display: Avoid overflow assignment in link_dp_cts (stable-fixes).
* drm/amd/display: Fix DSC-re-computing (stable-fixes).
* drm/amd/display: Fix Synaptics Cascaded Panamera DSC Determination (stable-
fixes).
* drm/amd/display: Fix incorrect DSC recompute trigger (stable-fixes).
* drm/amd/display: Revert Avoid overflow assignment (stable-fixes).
* drm/amd/display: Use gpuvm_min_page_size_kbytes for DML2 surfaces (stable-
fixes).
* drm/amd/display: increase MAX_SURFACES to the value supported by hw (stable-
fixes).
* drm/amd/pm: fix the high voltage issue after unload (stable-fixes).
* drm/amd/pm: update current_socclk and current_uclk in gpu_metrics on smu
v13.0.7 (stable-fixes).
* drm/amdgpu/gfx10: use rlc safe mode for soft recovery (stable-fixes).
* drm/amdgpu/gfx11: use rlc safe mode for soft recovery (stable-fixes).
* drm/amdgpu/gfx9: properly handle error ints on all pipes (stable-fixes).
* drm/amdgpu/gfx9: use rlc safe mode for soft recovery (stable-fixes).
* drm/amdgpu/hdp5.2: do a posting read when flushing HDP (stable-fixes).
* drm/amdgpu/pm: Remove gpu_od if it's an empty directory (stable-fixes).
* drm/amdgpu/umsch: do not execute umsch test when GPU is in reset/suspend
(stable-fixes).
* drm/amdgpu/umsch: reinitialize write pointer in hw init (stable-fixes).
* drm/amdgpu/vcn: reset fw_shared when VCPU buffers corrupted on vcn v4.0.3
(stable-fixes).
* drm/amdgpu: Block MMR_READ IOCTL in reset (stable-fixes).
* drm/amdgpu: Dereference the ATCS ACPI buffer (stable-fixes).
* drm/amdgpu: add raven1 gfxoff quirk (stable-fixes).
* drm/amdgpu: add smu 14.0.1 discovery support (stable-fixes).
* drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts for vega20_ih
(stable-fixes).
* drm/amdgpu: differentiate external rev id for gfx 11.5.0 (stable-fixes).
* drm/amdgpu: disallow multiple BO_HANDLES chunks in one submit (stable-
fixes).
* drm/amdgpu: do not access invalid sched (git-fixes).
* drm/amdgpu: enable gfxoff quirk on HP 705G4 (stable-fixes).
* drm/amdgpu: fix unchecked return value warning for amdgpu_gfx (stable-
fixes).
* drm/amdgpu: fix usage slab after free (stable-fixes).
* drm/amdgpu: prevent BO_HANDLES error from being overwritten (git-fixes).
* drm/amdgpu: refine error handling in amdgpu_ttm_tt_pin_userptr (stable-
fixes).
* drm/amdgpu: set the right AMDGPU sg segment limitation (stable-fixes).
* drm/amdgpu: skip amdgpu_device_cache_pci_state under sriov (stable-fixes).
* drm/amdkfd: Correct the migration DMA map direction (stable-fixes).
* drm/amdkfd: Fix resource leak in criu restore queue (stable-fixes).
* drm/amdkfd: Use device based logging for errors (stable-fixes).
* drm/amdkfd: Use the correct wptr size (stable-fixes).
* drm/amdkfd: fixed page fault when enable MES shader debugger (git-fixes).
* drm/amdkfd: pause autosuspend when creating pdd (stable-fixes).
* drm/bridge: adv7511_audio: Update Audio InfoFrame properly (git-fixes).
* drm/bridge: it6505: Enable module autoloading (stable-fixes).
* drm/bridge: it6505: Fix inverted reset polarity (git-fixes).
* drm/bridge: it6505: update usleep_range for RC circuit charge time (stable-
fixes).
* drm/display: Fix building with GCC 15 (stable-fixes).
* drm/dp_mst: Ensure mst_primary pointer is valid in
drm_dp_mst_handle_up_req() (stable-fixes).
* drm/dp_mst: Fix MST sideband message body length check (stable-fixes).
* drm/dp_mst: Fix resetting msg rx state after topology removal (git-fixes).
* drm/dp_mst: Verify request type in the corresponding down message reply
(stable-fixes).
* drm/etnaviv: flush shader L1 cache after user commandstream (stable-fixes).
* drm/i915/dg1: Fix power gate sequence (git-fixes).
* drm/i915: Fix NULL pointer dereference in capture_engine (git-fixes).
* drm/i915: Fix memory leak by correcting cache object name in error handler
(git-fixes).
* drm/mcde: Enable module autoloading (stable-fixes).
* drm/mediatek: Add return value check when reading DPCD (git-fixes).
* drm/mediatek: Add support for 180-degree rotation in the display driver
(git-fixes).
* drm/mediatek: Fix YCbCr422 color format issue for DP (git-fixes).
* drm/mediatek: Fix mode valid issue for dp (git-fixes).
* drm/mediatek: Set private->all_drm_private[i]->drm to NULL if mtk_drm_bind
returns err (git-fixes).
* drm/mediatek: mtk_dsi: Add registers to pdata to fix MT8186/MT8188 (git-
fixes).
* drm/mediatek: stop selecting foreign drivers (git-fixes).
* drm/modes: Avoid divide by zero harder in drm_mode_vrefresh() (stable-
fixes).
* drm/nouveau/gsp: Use the sg allocator for level 2 of radix3 (stable-fixes).
* drm/panel: novatek-nt35950: fix return value check in nt35950_probe() (git-
fixes).
* drm/panel: simple: Add Microchip AC69T88A LVDS Display panel (stable-fixes).
* drm/printer: Allow NULL data in devcoredump printer (stable-fixes).
* drm/radeon/r100: Handle unknown family in r100_cp_init_microcode() (stable-
fixes).
* drm/radeon/r600_cs: Fix possible int overflow in r600_packet3_check()
(stable-fixes).
* drm/radeon: Fix spurious unplug event on radeon HDMI (git-fixes).
* drm/radeon: add helper rdev_to_drm(rdev) (stable-fixes).
* drm/radeon: change rdev->ddev to rdev_to_drm(rdev) (stable-fixes).
* drm/sched: memset() 'job' in drm_sched_job_init() (stable-fixes).
* drm/sti: Add __iomem for mixer_dbg_mxn's parameter (git-fixes).
* drm/v3d: Enable Performance Counters before clearing them (git-fixes).
* drm/v3d: Ensure job pointer is set to NULL after job completion (git-fixes).
* drm/vc4: hdmi: Avoid log spam for audio start failure (stable-fixes).
* drm/vc4: hvs: Set AXI panic modes for the HVS (stable-fixes).
* drm/vmwgfx: Add new keep_resv BO param (git-fixes).
* drm: adv7511: Drop dsi single lane support (git-fixes).
* drm: adv7511: Fix use-after-free in adv7533_attach_dsi() (git-fixes).
* drm: panel-orientation-quirks: Add quirk for AYA NEO 2 model (stable-fixes).
* drm: panel-orientation-quirks: Add quirk for AYA NEO Founder edition
(stable-fixes).
* drm: panel-orientation-quirks: Add quirk for AYA NEO GEEK (stable-fixes).
* drm: panel-orientation-quirks: Make Lenovo Yoga Tab 3 X90F DMI match less
strict (stable-fixes).
* erofs: avoid debugging output for (de)compressed data (git-fixes).
* exfat: ensure that ctime is updated whenever the mtime is (git-fixes).
* exfat: fix the infinite loop in __exfat_free_cluster() (git-fixes).
* exfat: fix the infinite loop in exfat_readdir() (git-fixes).
* exfat: fix uninit-value in __exfat_get_dentry_set (git-fixes).
* ext4: add a new helper to check if es must be kept (bsc#1234170).
* ext4: add correct group descriptors and reserved GDT blocks to system zone
(bsc#1234164).
* ext4: add missed brelse in update_backups (bsc#1234171).
* ext4: allow for the last group to be marked as trimmed (bsc#1234278).
* ext4: avoid buffer_head leak in ext4_mark_inode_used() (bsc#1234191).
* ext4: avoid excessive credit estimate in ext4_tmpfile() (bsc#1234180).
* ext4: avoid negative min_clusters in find_group_orlov() (bsc#1234193).
* ext4: avoid overlapping preallocations due to overflow (bsc#1234162).
* ext4: avoid potential buffer_head leak in __ext4_new_inode() (bsc#1234192).
* ext4: avoid writing unitialized memory to disk in EA inodes (bsc#1234187).
* ext4: check the extent status again before inserting delalloc block
(bsc#1234186).
* ext4: clear EXT4_GROUP_INFO_WAS_TRIMMED_BIT even mount with discard
(bsc#1234190).
* ext4: convert to exclusive lock while inserting delalloc extents
(bsc#1234178).
* ext4: correct best extent lstart adjustment logic (bsc#1234179).
* ext4: correct grp validation in ext4_mb_good_group (bsc#1234163).
* ext4: correct return value of ext4_convert_meta_bg (bsc#1234172).
* ext4: correct the hole length returned by ext4_map_blocks() (bsc#1234178).
* ext4: correct the start block of counting reserved clusters (bsc#1234169).
* ext4: do not let fstrim block system suspend
(https://bugzilla.kernel.org/show_bug.cgi?id=216322 bsc#1234166).
* ext4: do not trim the group with corrupted block bitmap (bsc#1234177).
* ext4: factor out __es_alloc_extent() and __es_free_extent() (bsc#1234170).
* ext4: factor out a common helper to query extent map (bsc#1234186).
* ext4: fix inconsistent between segment fstrim and full fstrim (bsc#1234176).
* ext4: fix incorrect tid assumption in __jbd2_log_wait_for_space()
(bsc#1234188).
* ext4: fix incorrect tid assumption in ext4_wait_for_tail_page_commit()
(bsc#1234188).
* ext4: fix incorrect tid assumption in jbd2_journal_shrink_checkpoint_list()
(bsc#1234188).
* ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup}
(bsc#1214954).
* ext4: fix potential unnitialized variable (bsc#1234183).
* ext4: fix race between writepages and remount (bsc#1234168).
* ext4: fix rec_len verify error (bsc#1234167).
* ext4: fix slab-use-after-free in ext4_es_insert_extent() (bsc#1234170).
* ext4: fix uninitialized variable in ext4_inlinedir_to_tree (bsc#1234185).
* ext4: forbid commit inconsistent quota data when errors=remount-ro
(bsc#1234178).
* ext4: make ext4_es_insert_delayed_block() return void (bsc#1234170).
* ext4: make ext4_es_insert_extent() return void (bsc#1234170).
* ext4: make ext4_es_remove_extent() return void (bsc#1234170).
* ext4: make ext4_zeroout_es() return void (bsc#1234170).
* ext4: make sure allocate pending entry not fail (bsc#1234170).
* ext4: mark buffer new if it is unwritten to avoid stale data exposure
(bsc#1234175).
* ext4: move 'ix' sanity check to corrent position (bsc#1234174).
* ext4: move setting of trimmed bit into ext4_try_to_trim_range()
(bsc#1234165).
* ext4: nested locking for xattr inode (bsc#1234189).
* ext4: propagate errors from ext4_find_extent() in ext4_insert_range()
(bsc#1234194).
* ext4: refactor ext4_da_map_blocks() (bsc#1234178).
* ext4: remove gdb backup copy for meta bg in setup_new_flex_group_blocks
(bsc#1234173).
* ext4: remove the redundant folio_wait_stable() (bsc#1234184).
* ext4: set the type of max_zeroout to unsigned int to avoid overflow
(bsc#1234182).
* ext4: set type of ac_groups_linear_remaining to __u32 to avoid overflow
(bsc#1234181).
* ext4: use pre-allocated es in __es_insert_extent() (bsc#1234170).
* ext4: use pre-allocated es in __es_remove_extent() (bsc#1234170).
* ext4: using nofail preallocation in ext4_es_insert_delayed_block()
(bsc#1234170).
* ext4: using nofail preallocation in ext4_es_insert_extent() (bsc#1234170).
* ext4: using nofail preallocation in ext4_es_remove_extent() (bsc#1234170).
* filemap: Fix bounds checking in filemap_read() (bsc#1234209).
* filemap: add a per-mapping stable writes flag (bsc#1234141).
* firmware: arm_scmi: Reject clear channel request on A2P (stable-fixes).
* fs-writeback: do not requeue a clean inode having skipped pages
(bsc#1234200).
* fs/writeback: bail out if there is no more inodes for IO and queued once
(bsc#1234207).
* fsnotify: fix sending inotify event with unexpected filename (bsc#1234198).
* genirq/cpuhotplug: Retry with cpu_online_mask when migration fails (git-
fixes).
* genirq/cpuhotplug: Skip suspended interrupts when restoring affinity (git-
fixes).
* genirq/irqdesc: Honor caller provided affinity in alloc_desc() (git-fixes).
* gpio: grgpio: Add NULL check in grgpio_probe (git-fixes).
* gpio: grgpio: use a helper variable to store the address of ofdev->dev
(stable-fixes).
* gpio: xilinx: Convert gpio_lock to raw spinlock (git-fixes).
* hfsplus: do not query the device logical block size multiple times (git-
fixes).
* hvc/xen: fix console unplug (git-fixes).
* hvc/xen: fix error path in xen_hvc_init() to always register frontend driver
(git-fixes).
* hvc/xen: fix event channel handling for secondary consoles (git-fixes).
* hwmon: (drivetemp) Fix driver producing garbage data when SCSI errors occur
(git-fixes).
* hwmon: (nct6775) Add 665-ACE/600M-CL to ASUS WMI monitoring list (stable-
fixes).
* hwmon: (pmbus/core) clear faults after setting smbalert mask (git-fixes).
* hwmon: (pmbus_core) Allow to hook PMBUS_SMBALERT_MASK (stable-fixes).
* hwmon: (tmp513) Do not use "proxy" headers (stable-fixes).
* hwmon: (tmp513) Fix Current Register value interpretation (git-fixes).
* hwmon: (tmp513) Fix division of negative numbers (git-fixes).
* hwmon: (tmp513) Fix interpretation of values of Shunt Voltage and Limit
Registers (git-fixes).
* hwmon: (tmp513) Fix interpretation of values of Temperature Result and Limit
Registers (git-fixes).
* hwmon: (tmp513) Simplify with dev_err_probe() (stable-fixes).
* hwmon: (tmp513) Use SI constants from units.h (stable-fixes).
* i2c: core: fix reference leak in i2c_register_adapter() (git-fixes).
* i2c: i801: Add support for Intel Arrow Lake-H (stable-fixes).
* i2c: i801: Add support for Intel Panther Lake (stable-fixes).
* i2c: imx: add imx7d compatible string for applying erratum ERR007805 (git-
fixes).
* i2c: microchip-core: actually use repeated sends (git-fixes).
* i2c: microchip-core: fix "ghost" detections (git-fixes).
* i2c: mux: demux-pinctrl: check initial mux selection, too (git-fixes).
* i2c: pnx: Fix timeout in wait functions (git-fixes).
* i2c: rcar: fix NACK handling when being a target (git-fixes).
* i2c: riic: Always round-up when calculating bus period (git-fixes).
* i2c: xgene-slimpro: Migrate to use generic PCC shmem related macros (stable-
fixes).
* i40e: Fix handling changed priv flags (git-fixes).
* i915/guc: Accumulate active runtime on gt reset (git-fixes).
* i915/guc: Ensure busyness counter increases motonically (git-fixes).
* i915/guc: Reset engine utilization buffer before registration (git-fixes).
* iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes).
* ice: Unbind the workqueue (bsc#1234989)
* ice: change q_index variable type to s16 to store -1 value (git-fixes).
* ice: consistently use q_idx in ice_vc_cfg_qs_msg() (git-fixes).
* ice: fix PHY Clock Recovery availability check (git-fixes).
* idpf: add support for SW triggered interrupts (bsc#1235507).
* idpf: enable WB_ON_ITR (bsc#1235507).
* idpf: trigger SW interrupt when exiting wb_on_itr mode (bsc#1235507).
* ieee802154: ca8210: Add missing check for kfifo_alloc() in ca8210_probe()
(git-fixes).
* igb: Fix potential invalid memory access in igb_init_module() (git-fixes).
* iio: adc: ad7124: Disable all channels at probe time (git-fixes).
* iio: adc: at91: call input_free_device() on allocated iio_dev (git-fixes).
* iio: adc: rockchip_saradc: fix information leak in triggered buffer (git-
fixes).
* iio: adc: ti-ads124s08: Use gpiod_set_value_cansleep() (git-fixes).
* iio: adc: ti-ads8688: fix information leak in triggered buffer (git-fixes).
* iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered
buffer (git-fixes).
* iio: gyro: fxas21002c: Fix missing data update in trigger handler (git-
fixes).
* iio: imu: kmx61: fix information leak in triggered buffer (git-fixes).
* iio: inkern: call iio_device_put() only on mapped devices (git-fixes).
* iio: light: vcnl4035: fix information leak in triggered buffer (git-fixes).
* iio: magnetometer: yas530: use signed integer type for clamp limits (git-
fixes).
* iio: pressure: zpa2326: fix information leak in triggered buffer (git-
fixes).
* iio: test : check null return of kunit_kmalloc in iio_rescale_test_scale
(git-fixes).
* instrumentation: Wire up cmpxchg128() (bsc#1220773).
* io_uring/rw: avoid punting to io-wq directly (git-fixes).
* io_uring/tctx: work around xa_store() allocation error issue (git-fixes).
* io_uring: Fix registered ring file refcount leak (git-fixes).
* io_uring: always lock __io_cqring_overflow_flush (git-fixes).
* io_uring: check if iowq is killed before queuing (git-fixes).
* iommu/io-pgtable-arm: Fix stage-2 map/unmap for concatenated tables (git-
fixes).
* irqchip/gic-v3: Force propagation of the active state with a read-back
(stable-fixes).
* irqchip/gic: Correct declaration of *percpu_base pointer in union gic_base
(stable-fixes).
* irqflags: Explicitly ignore lockdep_hrtimer_exit() argument (git-fixes).
* isofs: handle CDs with bad root inode but good Joliet root directory
(bsc#1234199).
* ixgbe: downgrade logging of unsupported VF API version to debug (git-fixes).
* ixgbevf: stop attempting IPSEC offload on Mailbox API 1.5 (git-fixes).
* jffs2: Fix rtime decompressor (git-fixes).
* jffs2: Prevent rtime decompress memory corruption (git-fixes).
* jffs2: fix use of uninitialized variable (git-fixes).
* jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree (git-
fixes).
* jfs: array-index-out-of-bounds fix in dtReadFirst (git-fixes).
* jfs: fix array-index-out-of-bounds in jfs_readdir (git-fixes).
* jfs: fix shift-out-of-bounds in dbSplit (git-fixes).
* jfs: xattr: check invalid xattr size more strictly (git-fixes).
* kABI workaround for struct drm_dp_mst_topology_mgr (git-fixes).
* kABI: Fix kABI after TDX KVM backports (jsc#PED-6143).
* kABI: Restore exported __arm_smccc_sve_check (git-fixes)
* kabi/severities: make vcap_find_actionfield PASS (bsc#1220773)
* kasan: make report_lock a raw spinlock (git-fixes).
* kdb: Fix buffer overflow during tab-complete (bsc#1234652).
* kdb: Fix console handling when editing and tab-completing commands
(bsc#1234655).
* kdb: Merge identical case statements in kdb_read() (bsc#1234657).
* kdb: Use format-specifiers rather than memset() for padding in kdb_read()
(bsc#1234658).
* kdb: Use format-strings rather than '\0' injection in kdb_read()
(bsc#1234654).
* kdb: Use the passed prompt in kdb_position_cursor() (bsc#1234654).
* kdb: address -Wformat-security warnings (bsc#1234659).
* kgdb: Flush console before entering kgdb on panic (bsc#1234651).
* leds: class: Protect brightness_show() with led_cdev->led_access mutex
(stable-fixes).
* lib/stackdepot: print disabled message only if truly disabled (git-fixes).
* linux/dmaengine.h: fix a few kernel-doc warnings (git-fixes).
* locking/atomic/x86: Correct the definition of __arch_try_cmpxchg128()
(bsc#1220773 git-fix).
* loop: fix the the direct I/O support check when used on top of block devices
(bsc#1234143).
* mac80211: fix user-power when emulating chanctx (stable-fixes).
* mailbox: pcc: Add support for platform notification handling (stable-fixes).
* mailbox: pcc: Support shared interrupt for multiple subspaces (stable-
fixes).
* media: cx231xx: Add support for Dexatek USB Video Grabber 1d19:6108 (stable-
fixes).
* media: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg (git-
fixes).
* media: uvcvideo: Add a quirk for the Kaiweets KTI-W02 infrared camera
(stable-fixes).
* media: uvcvideo: Force UVC version to 1.0a for 0408:4035 (stable-fixes).
* media: uvcvideo: RealSense D421 Depth module metadata (stable-fixes).
* memory tiering: count PGPROMOTE_SUCCESS when mem tiering is enabled (git-
fixes).
* memory-failure: use a folio in me_huge_page() (git-fixes).
* mfd: da9052-spi: Change read-mask to write-mask (git-fixes).
* mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices (git-fixes).
* mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device (git-fixes).
* mfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device (git-fixes).
* misc: microchip: pci1xxxx: Resolve kernel panic during GPIO IRQ handling
(git-fixes).
* misc: microchip: pci1xxxx: Resolve return code mismatch during GPIO set
config (git-fixes).
* mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes).
* mm,page_owner: do not remove __GFP_NOLOCKDEP in add_stack_record_to_list
(git-fixes).
* mm/filemap: avoid buffered read/write race to read inconsistent data
(bsc#1234204).
* mm/memory-failure: cast index to loff_t before shifting it (git-fixes).
* mm/memory-failure: check the mapcount of the precise page (git-fixes).
* mm/memory-failure: fix crash in split_huge_page_to_list from
soft_offline_page (git-fixes).
* mm/memory-failure: pass the folio and the page to collect_procs() (git-
fixes).
* mm/memory-failure: use raw_spinlock_t in struct memory_failure_cpu (git-
fixes).
* mm/memory_hotplug: add missing mem_hotplug_lock (git-fixes).
* mm/memory_hotplug: fix error handling in add_memory_resource() (git-fixes).
* mm/memory_hotplug: prevent accessing by index=-1 (git-fixes).
* mm/memory_hotplug: use pfn math in place of direct struct page manipulation
(git-fixes).
* mm/migrate: correct nr_failed in migrate_pages_sync() (git-fixes).
* mm/migrate: fix deadlock in migrate_pages_batch() on large folios (git-
fixes).
* mm/migrate: putback split folios when numa hint migration fails (git-fixes).
* mm/migrate: split source folio if it is on deferred split list (git-fixes).
* mm/page_owner: remove free_ts from page_owner output (git-fixes).
* mm/readahead: do not allow order-1 folio (bsc#1234205).
* mm/readahead: limit page cache size in page_cache_ra_order() (bsc#1234208).
* mm: convert DAX lock/unlock page to lock/unlock folio (git-fixes).
* mm: memory-failure: ensure moving HWPoison flag to the raw error pages (git-
fixes).
* mm: memory-failure: fetch compound head after extra page refcnt is held
(git-fixes).
* mm: memory-failure: fix potential page refcnt leak in memory_failure() (git-
fixes).
* mm: memory-failure: fix race window when trying to get hugetlb folio (git-
fixes).
* mm: memory-failure: remove unneeded PageHuge() check (git-fixes).
* mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes).
* mmc: core: Add SD card quirk for broken poweroff notification (stable-
fixes).
* mmc: core: Further prevent card detect during shutdown (git-fixes).
* mmc: mtk-sd: Fix MMC_CAP2_CRYPTO flag setting (git-fixes).
* mmc: mtk-sd: fix devm_clk_get_optional usage (stable-fixes).
* mmc: sdhci-esdhc-imx: enable quirks SDHCI_QUIRK_NO_LED (stable-fixes).
* mmc: sdhci-pci: Add DMI quirk for missing CD GPIO on Vexia Edu Atla 10
tablet (stable-fixes).
* mmc: sdhci-tegra: Remove SDHCI_QUIRK_BROKEN_ADMA_ZEROLEN_DESC quirk (git-
fixes).
* modpost: fix the missed iteration for the max bit in do_input() (git-fixes).
* mtd: diskonchip: Cast an operand to prevent potential overflow (git-fixes).
* mtd: hyperbus: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes).
* mtd: hyperbus: rpc-if: Convert to platform remove callback returning void
(stable-fixes).
* mtd: rawnand: arasan: Fix double assertion of chip-select (git-fixes).
* mtd: rawnand: arasan: Fix missing de-registration of NAND (git-fixes).
* mtd: rawnand: fix double free in atmel_pmecc_create_user() (git-fixes).
* net :mana :Request a V2 response version for MANA_QUERY_GF_STAT (git-fixes).
* net/ipv6: release expired exception dst cached in socket (bsc#1216813).
* net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes).
* net/mlx5e: Remove workaround to avoid syndrome for internal port (git-
fixes).
* net/mlx5e: clear xdp features on non-uplink representors (git-fixes).
* net/qed: allow old cards not supporting "num_images" to work (git-fixes).
* net: Return error from sk_stream_wait_connect() if sk_wait_event() fails
(git-fixes).
* net: mana: Increase the DEF_RX_BUFFERS_PER_QUEUE to 1024 (bsc#1235246).
* net: usb: qmi_wwan: add Quectel RG650V (stable-fixes).
* net: usb: qmi_wwan: add Telit FE910C04 compositions (stable-fixes).
* net: wwan: iosm: Properly check for valid exec stage in ipc_mmio_init()
(git-fixes).
* net: wwan: t7xx: Fix FSM command timeout issue (git-fixes).
* netdevsim: copy addresses for both in and out paths (git-fixes).
* nfs: ignore SB_RDONLY when mounting nfs (git-fixes).
* nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur (git-fixes).
* nfsd: make sure exp active before svc_export_show (git-fixes).
* nfsd: release svc_expkey/svc_export with rcu_work (git-fixes).
* nfsd: restore callback functionality for NFSv4.0 (git-fixes).
* nilfs2: fix buffer head leaks in calls to truncate_inode_pages() (git-
fixes).
* nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()
(git-fixes).
* nilfs2: prevent use of deleted inode (git-fixes).
* nvme-pci: 512 byte aligned dma pool segment quirk (git-fixes).
* nvme-rdma: unquiesce admin_q before destroy it (git-fixes).
* nvme-tcp: fix the memleak while create new ctrl failed (git-fixes).
* nvme/multipath: Fix RCU list traversal to use SRCU primitive (git-fixes).
* nvme: apple: fix device reference counting (git-fixes).
* nvme: fix metadata handling in nvme-passthrough (git-fixes).
* nvmet-loop: avoid using mutex in IO hotpath (git-fixes).
* ocfs2: fix uninitialized value in ocfs2_file_read_iter() (git-fixes).
* ocfs2: free inode when ocfs2_get_init_inode() fails (git-fixes).
* of/irq: Fix using uninitialized variable @addr_len in API of_irq_parse_one()
(git-fixes).
* of: Fix error path in of_parse_phandle_with_args_map() (git-fixes).
* of: Fix refcount leakage for OF node returned by __of_get_dma_parent() (git-
fixes).
* of: address: Report error on resource bounds overflow (stable-fixes).
* parisc: Raise minimal GCC version (bsc#1220773).
* parisc: Raise minimal GCC version to 12.0.0 (bsc#1220773 git-fix).
* percpu: Add {raw,this}_cpu_try_cmpxchg() (bsc#1220773).
* percpu: Fix self-assignment of __old in raw_cpu_generic_try_cmpxchg()
(bsc#1220773 git-fix).
* percpu: Wire up cmpxchg128 (bsc#1220773).
* phy: core: Fix an OF node refcount leakage in _of_phy_get() (git-fixes).
* phy: core: Fix an OF node refcount leakage in of_phy_provider_lookup() (git-
fixes).
* phy: core: Fix that API devm_of_phy_provider_unregister() fails to
unregister the phy provider (git-fixes).
* phy: core: Fix that API devm_phy_destroy() fails to destroy the phy (git-
fixes).
* phy: core: Fix that API devm_phy_put() fails to release the phy (git-fixes).
* phy: qcom-qmp: Fix register name in RX Lane config of SC8280XP (git-fixes).
* phy: rockchip: naneng-combphy: fix phy reset (git-fixes).
* phy: usb: Toggle the PHY power during init (git-fixes).
* pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking
(git-fixes).
* pinctrl: qcom-pmic-gpio: add support for PM8937 (stable-fixes).
* pinctrl: qcom: spmi-mpp: Add PM8937 compatible (stable-fixes).
* pinmux: Use sequential access to access desc->pinmux data (stable-fixes).
* platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git-
fixes).
* platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled
it (git-fixes).
* platform/x86/intel-uncore-freq: Ignore minor version change (bsc#1225897).
* platform/x86/intel/tpmi: Add defines to get version information
(bsc#1225897).
* platform/x86: asus-nb-wmi: Ignore unknown event 0xCF (stable-fixes).
* platform/x86: dell-smbios-base: Extends support to Alienware products
(stable-fixes).
* platform/x86: dell-wmi-base: Handle META key Lock/Unlock events (stable-
fixes).
* platform/x86: thinkpad_acpi: Fix for ThinkPad's with ECFW showing incorrect
fan speed (stable-fixes).
* power: supply: gpio-charger: Fix set charge current limits (git-fixes).
* powerpc/64s: Fix unnecessary copy to 0 when kernel is booted at address 0
(bsc#1215199).
* powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869).
* powerpc/book3s64/hugetlb: Fix disabling hugetlb when fadump is active
(bsc#1235108).
* powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init()
(bsc#1215199).
* powerpc/fadump: Refactor and prepare fadump_cma_init for late init
(bsc#1215199).
* powerpc/iommu: Move pSeries specific functions to pseries/iommu.c
(bsc#1220711 ltc#205755).
* powerpc/iommu: Only build sPAPR access functions on pSeries (bsc#1220711
ltc#205755).
* powerpc/kexec: Fix return of uninitialized variable (bsc#1194869).
* powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869).
* powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).
* powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL
(bsc#1194869).
* powerpc/powernv/pci: Remove MVE code (bsc#1220711 ltc#205755).
* powerpc/powernv/pci: Remove ioda1 support (bsc#1220711 ltc#205755).
* powerpc/powernv/pci: Remove last IODA1 defines (bsc#1220711 ltc#205755).
* powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869).
* powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW
(bsc#1218470 ltc#204531).
* powerpc/pseries/vas: Add close() callback in vas_vm_ops struct
(bsc#1234825).
* powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector
(bsc#1194869).
* powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869).
* powerpc/pseries: Use correct data types from pseries_hp_errorlog struct
(bsc#1215199).
* powerpc/vdso: Inconditionally use CFUNC macro (bsc#1215199).
* proc/softirqs: replace seq_printf with seq_put_decimal_ull_width (git-
fixes).
* quota: Fix rcu annotations of inode dquot pointers (bsc#1234197).
* quota: explicitly forbid quota files from being encrypted (bsc#1234196).
* quota: flush quota_release_work upon quota writeback (bsc#1234195).
* quota: simplify drop_dquot_ref() (bsc#1234197).
* readahead: use ilog2 instead of a while loop in page_cache_ra_order()
(bsc#1234208).
* regmap: Use correct format specifier for logging range errors (stable-
fixes).
* regmap: detach regmap from dev on regmap_exit (git-fixes).
* regulator: rk808: Add apply_bit for BUCK3 on RK809 (stable-fixes).
* rtc: cmos: avoid taking rtc_lock for extended period of time (stable-fixes).
* s390/cio: Do not unregister the subchannel based on DNV (git-fixes).
* s390/cpum_sf: Convert to cmpxchg128() (bsc#1220773).
* s390/cpum_sf: Handle CPU hotplug remove during sampling (git-fixes).
* s390/cpum_sf: Remove WARN_ON_ONCE statements (git-fixes).
* s390/facility: Disable compile time optimization for decompressor code (git-
fixes).
* s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct() (git-fixes).
* s390/pageattr: Implement missing kernel_page_present() (git-fixes).
* s390x config: IOMMU_DEFAULT_DMA_LAZY=y (bsc#1235646)
* scatterlist: fix incorrect func name in kernel-doc (git-fixes).
* sched/numa: fix memory leak due to the overwritten vma->numab_state (git
fixes (sched/numa)).
* scsi: lpfc: Add handling for LS_RJT reason explanation authentication
required (bsc#1235409).
* scsi: lpfc: Add support for large fw object application layer reads
(bsc#1235409).
* scsi: lpfc: Change lpfc_nodelist save_flags member into a bitmask
(bsc#1235409).
* scsi: lpfc: Copyright updates for 14.4.0.7 patches (bsc#1235409).
* scsi: lpfc: Delete NLP_TARGET_REMOVE flag due to obsolete usage
(bsc#1235409).
* scsi: lpfc: Modify handling of ADISC based on ndlp state and RPI
registration (bsc#1235409).
* scsi: lpfc: Redefine incorrect type in lpfc_create_device_data()
(bsc#1235409).
* scsi: lpfc: Restrict the REG_FCFI MAM field to FCoE adapters only
(bsc#1235409).
* scsi: lpfc: Update definition of firmware configuration mbox cmds
(bsc#1235409).
* scsi: lpfc: Update lpfc version to 14.4.0.7 (bsc#1235409).
* scsi: qla2xxx: Fix NVMe and NPIV connect issue (bsc#1235406).
* scsi: qla2xxx: Fix abort in bsg timeout (bsc#1235406).
* scsi: qla2xxx: Fix use after free on unload (bsc#1235406).
* scsi: qla2xxx: Remove check req_sg_cnt should be equal to rsp_sg_cnt
(bsc#1235406).
* scsi: qla2xxx: Remove the unused 'del_list_entry' field in struct fc_port
(bsc#1235406).
* scsi: qla2xxx: Supported speed displayed incorrectly for VPorts
(bsc#1235406).
* scsi: qla2xxx: Update version to 10.02.09.400-k (bsc#1235406).
* scsi: storvsc: Do not flag MAINTENANCE_IN return of SRB_STATUS_DATA_OVERRUN
as an error (git-fixes).
* selftests/bpf: Test PROBE_MEM of VSYSCALL_ADDR on x86-64 (git-fixes).
* selftests: mptcp: avoid spurious errors on disconnect (git-fixes).
* serial: 8250_dw: Add Sophgo SG2044 quirk (stable-fixes).
* serial: 8250_dw: Do not use struct dw8250_data outside of 8250_dw (git-
fixes).
* serial: 8250_dw: Replace ACPI device check by a quirk (git-fixes).
* serial: 8250_fintek: Add support for F81216E (stable-fixes).
* serial: Do not hold the port lock when setting rx-during-tx GPIO (git-
fixes).
* serial: amba-pl011: Fix RX stall when DMA is used (git-fixes).
* serial: amba-pl011: Use port lock wrappers (stable-fixes).
* serial: amba-pl011: fix build regression (git-fixes).
* serial: do not use uninitialized value in uart_poll_init() (git-fixes).
* serial: imx: only set receiver level if it is zero (git-fixes).
* serial: imx: set receiver level before starting uart (git-fixes).
* serial: qcom-geni: Do not cancel/abort if we can't get the port lock (git-
fixes).
* serial: qcom-geni: disable interrupts during console writes (git-fixes).
* serial: qcom-geni: fix arg types for qcom_geni_serial_poll_bit() (git-
fixes).
* serial: qcom-geni: fix console corruption (git-fixes).
* serial: qcom-geni: fix dma rx cancellation (git-fixes).
* serial: qcom-geni: fix false console tx restart (git-fixes).
* serial: qcom-geni: fix fifo polling timeout (git-fixes).
* serial: qcom-geni: fix hard lockup on buffer flush (git-fixes).
* serial: qcom-geni: fix polled console corruption (git-fixes).
* serial: qcom-geni: fix polled console initialisation (git-fixes).
* serial: qcom-geni: fix receiver enable (git-fixes).
* serial: qcom-geni: fix shutdown race (git-fixes).
* serial: qcom-geni: fix soft lockup on sw flow control and suspend (git-
fixes).
* serial: qcom-geni: introduce qcom_geni_serial_poll_bitfield() (git-fixes).
* serial: qcom-geni: revert broken hibernation support (git-fixes).
* serial: stm32: Return IRQ_NONE in the ISR if no handling happend (git-
fixes).
* serial: stm32: do not always set SER_RS485_RX_DURING_TX if RS485 is enabled
(git-fixes).
* slub: Replace cmpxchg_double() (bsc#1220773).
* slub: Replace cmpxchg_double() - KABI fix (bsc#1220773).
* smb: client: fix TCP timers deadlock after rmmod (git-fixes) [hcarvalho: fix
issue described in bsc#1233642]
* soc/fsl: cpm: qmc: Convert to platform remove callback returning void
(stable-fixes).
* soc: fsl: cpm1: qmc: Fix blank line and spaces (stable-fixes).
* soc: fsl: cpm1: qmc: Introduce qmc_init_resource() and its CPM1 version
(stable-fixes).
* soc: fsl: cpm1: qmc: Introduce qmc_{init,exit}_xcc() and their CPM1 version
(stable-fixes).
* soc: fsl: cpm1: qmc: Re-order probe() operations (stable-fixes).
* soc: fsl: cpm1: qmc: Set the ret error code on platform_get_irq() failure
(git-fixes).
* soc: imx8m: Probe the SoC driver as platform driver (stable-fixes).
* soc: qcom: Add check devm_kasprintf() returned value (stable-fixes).
* soc: qcom: geni-se: Add M_TX_FIFO_NOT_EMPTY bit definition (git-fixes).
* soc: qcom: geni-se: add GP_LENGTH/IRQ_EN_SET/IRQ_EN_CLEAR registers (git-
fixes).
* soc: qcom: socinfo: fix revision check in qcom_socinfo_probe() (git-fixes).
* sound: usb: enable DSD output for ddHiFi TC44C (stable-fixes).
* sound: usb: format: do not warn that raw DSD is unsupported (stable-fixes).
* spi: aspeed: Fix an error handling path in aspeed_spi_[read|write]_user()
(git-fixes).
* spi: mpc52xx: Add cancel_work_sync before module remove (git-fixes).
* stackdepot: rename pool_index to pool_index_plus_1 (git-fixes).
* stackdepot: respect __GFP_NOLOCKDEP allocation flag (git-fixes).
* staging: iio: ad9832: Correct phase range check (git-fixes).
* staging: iio: ad9834: Correct phase range check (git-fixes).
* sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport (git-fixes).
* sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (git-fixes).
* sunrpc: handle -ENOTCONN in xs_tcp_setup_socket() (git-fixes).
* svcrdma: Address an integer overflow (git-fixes).
* svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init() (git-
fixes).
* swiotlb: Enforce page alignment in swiotlb_alloc() (git-fixes).
* swiotlb: Reinstate page-alignment for mappings >= PAGE_SIZE (git-fixes).
* tdx: following fixup for mapping_level porting conflict (jsc#PED-6143).
* tdx: init has_private_mem during tdx init (jsc#PED-6143).
* the end of (the first phase of) TDX KVM patch series (jsc#PED-6143).
* thermal/drivers/qcom/tsens-v1: Add support for MSM8937 tsens (stable-fixes).
* thermal: of: fix OF node leak in of_thermal_zone_find() (git-fixes).
* thunderbolt: Add support for Intel Lunar Lake (stable-fixes).
* thunderbolt: Add support for Intel Panther Lake-M/P (stable-fixes).
* tipc: fix NULL deref in cleanup_bearer() (bsc#1235433).
* tools: hv: change permissions of NetworkManager configuration file (git-
fixes).
* tpm/eventlog: Limit memory allocations for event logs with excessive size
(bsc#1233260 bsc#1233259 bsc#1232421).
* tpm: Map the ACPI provided event log (bsc#1233260 bsc#1233259 bsc#1232421).
* tpm_tis_spi: Release chip select when flow control fails (bsc#1234338)
* tty: serial: 8250: Fix another runtime PM usage counter underflow (git-
fixes).
* tty: serial: kgdboc: Fix 8250_* kgdb over serial (git-fixes).
* types: Introduce [us]128 (bsc#1220773).
* ubifs: Correct the total block count by deducting journal reservation (git-
fixes).
* ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit (git-
fixes).
* udf: Fix lock ordering in udf_evict_inode() (bsc#1234238).
* udf: fix uninit-value use in udf_get_fileshortad (bsc#1234243).
* udf: prevent integer overflow in udf_bitmap_free_blocks() (bsc#1234239).
* udf: refactor inode_bmap() to handle error (bsc#1234242).
* udf: refactor udf_current_aext() to handle error (bsc#1234240).
* udf: refactor udf_next_aext() to handle error (bsc#1234241).
* udf: udftime: prevent overflow in udf_disk_stamp_to_time() (bsc#1234237).
* usb-storage: Add max sectors quirk for Nokia 208 (stable-fixes).
* usb: add support for new USB device ID 0x17EF:0x3098 for the r8152 driver
(stable-fixes).
* usb: cdns3-ti: Add workaround for Errata i2409 (stable-fixes).
* usb: cdns3: Add quirk flag to enable suspend residency (stable-fixes).
* usb: chipidea: add CI_HDRC_FORCE_VBUS_ACTIVE_ALWAYS flag (stable-fixes).
* usb: chipidea: udc: handle USB Error Interrupt if IOC not set (stable-
fixes).
* usb: dwc2: Fix HCD port connection race (git-fixes).
* usb: dwc2: Fix HCD resume (git-fixes).
* usb: dwc2: gadget: Do not write invalid mapped sg entries into dma_desc with
iommu enabled (stable-fixes).
* usb: dwc2: hcd: Fix GetPortStatus & SetPortFeature (git-fixes).
* usb: dwc3-am62: Disable autosuspend during remove (git-fixes).
* usb: dwc3: ep0: Do not clear ep0 DWC3_EP_TRANSFER_STARTED (git-fixes).
* usb: dwc3: ep0: Do not reset resource alloc flag (git-fixes).
* usb: dwc3: ep0: Do not reset resource alloc flag (including ep0) (git-
fixes).
* usb: dwc3: gadget: Rewrite endpoint allocation flow (stable-fixes).
* usb: dwc3: gadget: fix writing NYET threshold (git-fixes).
* usb: dwc3: xilinx: make sure pipe clock is deselected in usb2 only mode
(git-fixes).
* usb: ehci-hcd: fix call balance of clocks handling routines (git-fixes).
* usb: fix reference leak in usb_new_device() (git-fixes).
* usb: gadget: configfs: Ignore trailing LF for user strings to cdev (git-
fixes).
* usb: gadget: f_fs: Remove WARN_ON in functionfs_bind (git-fixes).
* usb: gadget: f_uac2: Fix incorrect setting of bNumEndpoints (git-fixes).
* usb: gadget: u_serial: Disable ep before setting port to null to fix the
crash caused by port being null (git-fixes).
* usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to
accessing null pointer (git-fixes).
* usb: host: max3421-hcd: Correctly abort a USB request (git-fixes).
* usb: typec: anx7411: fix OF node reference leaks in
anx7411_typec_switch_probe() (git-fixes).
* usb: typec: anx7411: fix fwnode_handle reference leak (git-fixes).
* usb: typec: tcpm/tcpci_maxim: fix error code in
max_contaminant_read_resistance_kohm() (git-fixes).
* usb: typec: use cleanup facility for 'altmodes_node' (stable-fixes).
* vDPA/ifcvf: Fix pci_read_config_byte() return code handling (git-fixes).
* vdpa/mlx5: Fix PA offset with unaligned starting iotlb map (git-fixes).
* vdpa/mlx5: Fix suboptimal range on iotlb iteration (git-fixes).
* vdpa: solidrun: Fix UB bug with devres (git-fixes).
* vfs: fix readahead(2) on block devices (bsc#1234201).
* vmscan,migrate: fix page count imbalance on node stats when demoting pages
(git-fixes).
* watchdog: apple: Actually flush writes after requesting watchdog restart
(git-fixes).
* watchdog: mediatek: Make sure system reset gets asserted in
mtk_wdt_restart() (git-fixes).
* watchdog: rti: of: honor timeout-sec property (git-fixes).
* watchdog: rzg2l_wdt: Power on the watchdog domain in the restart handler
(stable-fixes).
* watchdog: rzg2l_wdt: Rely on the reset driver for doing proper reset
(stable-fixes).
* watchdog: rzg2l_wdt: Remove reset de-assert from probe (stable-fixes).
* wifi: ath12k: fix atomic calls in ath12k_mac_op_set_bitrate_mask() (stable-
fixes).
* wifi: ath5k: add PCI ID for Arcadyan devices (git-fixes).
* wifi: ath5k: add PCI ID for SX76X (git-fixes).
* wifi: brcmfmac: Fix oops due to NULL pointer dereference in
brcmf_sdiod_sglist_rw() (stable-fixes).
* wifi: cfg80211: sme: init n_channels before channels[] access (git-fixes).
* wifi: cw1200: Fix potential NULL dereference (git-fixes).
* wifi: ipw2x00: libipw_rx_any(): fix bad alignment (stable-fixes).
* wifi: iwlwifi: mvm: Use the sync timepoint API in suspend (stable-fixes).
* wifi: mac80211: Add non-atomic station iterator (stable-fixes).
* wifi: mac80211: clean up 'ret' in sta_link_apply_parameters() (stable-
fixes).
* wifi: mac80211: export ieee80211_purge_tx_queue() for drivers (stable-
fixes).
* wifi: mac80211: fix mbss changed flags corruption on 32 bit systems (stable-
fixes).
* wifi: mac80211: fix station NSS capability initialization order (git-fixes).
* wifi: mac80211: init cnt before accessing elem in
ieee80211_copy_mbssid_beacon (git-fixes).
* wifi: mac80211: wake the queues in case of failure in resume (stable-fixes).
* wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one (git-fixes).
* wifi: rtlwifi: Drastically reduce the attempts to read efuse in case of
failures (stable-fixes).
* wifi: rtw88: use ieee80211_purge_tx_queue() to purge TX skb (stable-fixes).
* wifi: rtw89: check return value of ieee80211_probereq_get() for RNR (stable-
fixes).
* workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from
!WQ_MEM_RECLAIM worker (bsc#1235416).
* writeback, cgroup: switch inodes with dirty timestamps to release dying
cgwbs (bsc#1234203).
* x86,amd_iommu: Replace cmpxchg_double() (bsc#1220773).
* x86,intel_iommu: Replace cmpxchg_double() (bsc#1220773).
* x86/hyperv: Fix hv tsc page based sched_clock for hibernation (git-fixes).
* x86/kexec: Reset TDX private memory on platforms with TDX erratum
(jsc#PED-6143).
* x86/kexec: do unconditional WBINVD for bare-metal in relocate_kernel()
(jsc#PED-6143).
* x86/kexec: do unconditional WBINVD for bare-metal in stop_this_cpu()
(jsc#PED-6143).
* x86/static-call: Remove early_boot_irqs_disabled check to fix Xen PVH dom0
(git-fixes).
* x86/virt/tdx: Add TDX memory reset notifier to reset other private pages
(jsc#PED-6143).
* x86/virt/tdx: Exclude memory region hole within CMR as TDMR's reserved area
(jsc#PED-6143).
* x86/virt/tdx: Explicitly save/restore RBP for seamcall_saved_ret()
(jsc#PED-6143).
* x86/virt/tdx: Get information about TDX module and TDX-capable memory
(jsc#PED-6143).
* xfs: do not allocate COW extents when unsharing a hole (git-fixes).
* xfs: fix sb_spino_align checks for large fsblock sizes (git-fixes).
* xfs: remove unknown compat feature check in superblock write validation
(git-fixes).
* xfs: return from xfs_symlink_verify early on V4 filesystems (git-fixes).
* xfs: sb_spino_align is not verified (git-fixes).
* xhci: Add usb cold attach (CAS) as a reason to resume root hub (git-fixes).
* xhci: Allow RPM on the USB controller (1022:43f7) by default (stable-fixes).
* xhci: fix possible null pointer deref during xhci urb enqueue (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Confidential Computing Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Confidential-Computing-15-SP6-2025-289=1
## Package List:
* Confidential Computing Module 15-SP6 (nosrc x86_64)
* kernel-coco-6.4.0-15061.12.coco15sp6.1
* kernel-coco_debug-6.4.0-15061.12.coco15sp6.1
* Confidential Computing Module 15-SP6 (x86_64)
* kernel-coco-devel-6.4.0-15061.12.coco15sp6.1
* kernel-coco-debugsource-6.4.0-15061.12.coco15sp6.1
* kernel-coco_debug-devel-6.4.0-15061.12.coco15sp6.1
* kernel-coco_debug-devel-debuginfo-6.4.0-15061.12.coco15sp6.1
* kernel-coco-debuginfo-6.4.0-15061.12.coco15sp6.1
* kernel-coco_debug-debuginfo-6.4.0-15061.12.coco15sp6.1
* kernel-coco_debug-debugsource-6.4.0-15061.12.coco15sp6.1
* reiserfs-kmp-coco-6.4.0-15061.12.coco15sp6.1
* reiserfs-kmp-coco-debuginfo-6.4.0-15061.12.coco15sp6.1
* kernel-syms-coco-6.4.0-15061.12.coco15sp6.1
* kernel-coco-vdso-debuginfo-6.4.0-15061.12.coco15sp6.1
* Confidential Computing Module 15-SP6 (noarch)
* kernel-devel-coco-6.4.0-15061.12.coco15sp6.1
* kernel-source-coco-6.4.0-15061.12.coco15sp6.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52489.html
* https://www.suse.com/security/cve/CVE-2023-52923.html
* https://www.suse.com/security/cve/CVE-2024-26596.html
* https://www.suse.com/security/cve/CVE-2024-26924.html
* https://www.suse.com/security/cve/CVE-2024-27397.html
* https://www.suse.com/security/cve/CVE-2024-35839.html
* https://www.suse.com/security/cve/CVE-2024-36476.html
* https://www.suse.com/security/cve/CVE-2024-36908.html
* https://www.suse.com/security/cve/CVE-2024-36915.html
* https://www.suse.com/security/cve/CVE-2024-39282.html
* https://www.suse.com/security/cve/CVE-2024-39480.html
* https://www.suse.com/security/cve/CVE-2024-41042.html
* https://www.suse.com/security/cve/CVE-2024-43913.html
* https://www.suse.com/security/cve/CVE-2024-44934.html
* https://www.suse.com/security/cve/CVE-2024-44996.html
* https://www.suse.com/security/cve/CVE-2024-45828.html
* https://www.suse.com/security/cve/CVE-2024-46680.html
* https://www.suse.com/security/cve/CVE-2024-46765.html
* https://www.suse.com/security/cve/CVE-2024-46800.html
* https://www.suse.com/security/cve/CVE-2024-46896.html
* https://www.suse.com/security/cve/CVE-2024-47141.html
* https://www.suse.com/security/cve/CVE-2024-47143.html
* https://www.suse.com/security/cve/CVE-2024-47678.html
* https://www.suse.com/security/cve/CVE-2024-47809.html
* https://www.suse.com/security/cve/CVE-2024-48873.html
* https://www.suse.com/security/cve/CVE-2024-48881.html
* https://www.suse.com/security/cve/CVE-2024-49569.html
* https://www.suse.com/security/cve/CVE-2024-49854.html
* https://www.suse.com/security/cve/CVE-2024-49884.html
* https://www.suse.com/security/cve/CVE-2024-49915.html
* https://www.suse.com/security/cve/CVE-2024-49944.html
* https://www.suse.com/security/cve/CVE-2024-49951.html
* https://www.suse.com/security/cve/CVE-2024-49952.html
* https://www.suse.com/security/cve/CVE-2024-49998.html
* https://www.suse.com/security/cve/CVE-2024-50016.html
* https://www.suse.com/security/cve/CVE-2024-50018.html
* https://www.suse.com/security/cve/CVE-2024-50039.html
* https://www.suse.com/security/cve/CVE-2024-50047.html
* https://www.suse.com/security/cve/CVE-2024-50051.html
* https://www.suse.com/security/cve/CVE-2024-50106.html
* https://www.suse.com/security/cve/CVE-2024-50143.html
* https://www.suse.com/security/cve/CVE-2024-50151.html
* https://www.suse.com/security/cve/CVE-2024-50154.html
* https://www.suse.com/security/cve/CVE-2024-50199.html
* https://www.suse.com/security/cve/CVE-2024-50202.html
* https://www.suse.com/security/cve/CVE-2024-50203.html
* https://www.suse.com/security/cve/CVE-2024-50211.html
* https://www.suse.com/security/cve/CVE-2024-50228.html
* https://www.suse.com/security/cve/CVE-2024-50252.html
* https://www.suse.com/security/cve/CVE-2024-50256.html
* https://www.suse.com/security/cve/CVE-2024-50262.html
* https://www.suse.com/security/cve/CVE-2024-50272.html
* https://www.suse.com/security/cve/CVE-2024-50278.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50280.html
* https://www.suse.com/security/cve/CVE-2024-50296.html
* https://www.suse.com/security/cve/CVE-2024-50299.html
* https://www.suse.com/security/cve/CVE-2024-52332.html
* https://www.suse.com/security/cve/CVE-2024-53043.html
* https://www.suse.com/security/cve/CVE-2024-53050.html
* https://www.suse.com/security/cve/CVE-2024-53051.html
* https://www.suse.com/security/cve/CVE-2024-53055.html
* https://www.suse.com/security/cve/CVE-2024-53056.html
* https://www.suse.com/security/cve/CVE-2024-53064.html
* https://www.suse.com/security/cve/CVE-2024-53090.html
* https://www.suse.com/security/cve/CVE-2024-53091.html
* https://www.suse.com/security/cve/CVE-2024-53095.html
* https://www.suse.com/security/cve/CVE-2024-53099.html
* https://www.suse.com/security/cve/CVE-2024-53103.html
* https://www.suse.com/security/cve/CVE-2024-53105.html
* https://www.suse.com/security/cve/CVE-2024-53110.html
* https://www.suse.com/security/cve/CVE-2024-53111.html
* https://www.suse.com/security/cve/CVE-2024-53113.html
* https://www.suse.com/security/cve/CVE-2024-53117.html
* https://www.suse.com/security/cve/CVE-2024-53118.html
* https://www.suse.com/security/cve/CVE-2024-53119.html
* https://www.suse.com/security/cve/CVE-2024-53120.html
* https://www.suse.com/security/cve/CVE-2024-53121.html
* https://www.suse.com/security/cve/CVE-2024-53122.html
* https://www.suse.com/security/cve/CVE-2024-53125.html
* https://www.suse.com/security/cve/CVE-2024-53126.html
* https://www.suse.com/security/cve/CVE-2024-53127.html
* https://www.suse.com/security/cve/CVE-2024-53129.html
* https://www.suse.com/security/cve/CVE-2024-53130.html
* https://www.suse.com/security/cve/CVE-2024-53131.html
* https://www.suse.com/security/cve/CVE-2024-53133.html
* https://www.suse.com/security/cve/CVE-2024-53134.html
* https://www.suse.com/security/cve/CVE-2024-53136.html
* https://www.suse.com/security/cve/CVE-2024-53138.html
* https://www.suse.com/security/cve/CVE-2024-53141.html
* https://www.suse.com/security/cve/CVE-2024-53142.html
* https://www.suse.com/security/cve/CVE-2024-53144.html
* https://www.suse.com/security/cve/CVE-2024-53146.html
* https://www.suse.com/security/cve/CVE-2024-53148.html
* https://www.suse.com/security/cve/CVE-2024-53150.html
* https://www.suse.com/security/cve/CVE-2024-53151.html
* https://www.suse.com/security/cve/CVE-2024-53154.html
* https://www.suse.com/security/cve/CVE-2024-53155.html
* https://www.suse.com/security/cve/CVE-2024-53156.html
* https://www.suse.com/security/cve/CVE-2024-53157.html
* https://www.suse.com/security/cve/CVE-2024-53158.html
* https://www.suse.com/security/cve/CVE-2024-53159.html
* https://www.suse.com/security/cve/CVE-2024-53160.html
* https://www.suse.com/security/cve/CVE-2024-53161.html
* https://www.suse.com/security/cve/CVE-2024-53162.html
* https://www.suse.com/security/cve/CVE-2024-53164.html
* https://www.suse.com/security/cve/CVE-2024-53166.html
* https://www.suse.com/security/cve/CVE-2024-53168.html
* https://www.suse.com/security/cve/CVE-2024-53169.html
* https://www.suse.com/security/cve/CVE-2024-53170.html
* https://www.suse.com/security/cve/CVE-2024-53171.html
* https://www.suse.com/security/cve/CVE-2024-53172.html
* https://www.suse.com/security/cve/CVE-2024-53173.html
* https://www.suse.com/security/cve/CVE-2024-53174.html
* https://www.suse.com/security/cve/CVE-2024-53175.html
* https://www.suse.com/security/cve/CVE-2024-53179.html
* https://www.suse.com/security/cve/CVE-2024-53180.html
* https://www.suse.com/security/cve/CVE-2024-53185.html
* https://www.suse.com/security/cve/CVE-2024-53188.html
* https://www.suse.com/security/cve/CVE-2024-53190.html
* https://www.suse.com/security/cve/CVE-2024-53191.html
* https://www.suse.com/security/cve/CVE-2024-53194.html
* https://www.suse.com/security/cve/CVE-2024-53195.html
* https://www.suse.com/security/cve/CVE-2024-53196.html
* https://www.suse.com/security/cve/CVE-2024-53197.html
* https://www.suse.com/security/cve/CVE-2024-53198.html
* https://www.suse.com/security/cve/CVE-2024-53200.html
* https://www.suse.com/security/cve/CVE-2024-53201.html
* https://www.suse.com/security/cve/CVE-2024-53202.html
* https://www.suse.com/security/cve/CVE-2024-53206.html
* https://www.suse.com/security/cve/CVE-2024-53207.html
* https://www.suse.com/security/cve/CVE-2024-53208.html
* https://www.suse.com/security/cve/CVE-2024-53209.html
* https://www.suse.com/security/cve/CVE-2024-53210.html
* https://www.suse.com/security/cve/CVE-2024-53213.html
* https://www.suse.com/security/cve/CVE-2024-53214.html
* https://www.suse.com/security/cve/CVE-2024-53215.html
* https://www.suse.com/security/cve/CVE-2024-53216.html
* https://www.suse.com/security/cve/CVE-2024-53217.html
* https://www.suse.com/security/cve/CVE-2024-53222.html
* https://www.suse.com/security/cve/CVE-2024-53224.html
* https://www.suse.com/security/cve/CVE-2024-53227.html
* https://www.suse.com/security/cve/CVE-2024-53229.html
* https://www.suse.com/security/cve/CVE-2024-53230.html
* https://www.suse.com/security/cve/CVE-2024-53231.html
* https://www.suse.com/security/cve/CVE-2024-53232.html
* https://www.suse.com/security/cve/CVE-2024-53233.html
* https://www.suse.com/security/cve/CVE-2024-53234.html
* https://www.suse.com/security/cve/CVE-2024-53236.html
* https://www.suse.com/security/cve/CVE-2024-53237.html
* https://www.suse.com/security/cve/CVE-2024-53239.html
* https://www.suse.com/security/cve/CVE-2024-53240.html
* https://www.suse.com/security/cve/CVE-2024-53241.html
* https://www.suse.com/security/cve/CVE-2024-53685.html
* https://www.suse.com/security/cve/CVE-2024-53690.html
* https://www.suse.com/security/cve/CVE-2024-54680.html
* https://www.suse.com/security/cve/CVE-2024-55639.html
* https://www.suse.com/security/cve/CVE-2024-55881.html
* https://www.suse.com/security/cve/CVE-2024-55916.html
* https://www.suse.com/security/cve/CVE-2024-56369.html
* https://www.suse.com/security/cve/CVE-2024-56372.html
* https://www.suse.com/security/cve/CVE-2024-56531.html
* https://www.suse.com/security/cve/CVE-2024-56532.html
* https://www.suse.com/security/cve/CVE-2024-56533.html
* https://www.suse.com/security/cve/CVE-2024-56536.html
* https://www.suse.com/security/cve/CVE-2024-56538.html
* https://www.suse.com/security/cve/CVE-2024-56539.html
* https://www.suse.com/security/cve/CVE-2024-56543.html
* https://www.suse.com/security/cve/CVE-2024-56546.html
* https://www.suse.com/security/cve/CVE-2024-56548.html
* https://www.suse.com/security/cve/CVE-2024-56549.html
* https://www.suse.com/security/cve/CVE-2024-56551.html
* https://www.suse.com/security/cve/CVE-2024-56557.html
* https://www.suse.com/security/cve/CVE-2024-56558.html
* https://www.suse.com/security/cve/CVE-2024-56562.html
* https://www.suse.com/security/cve/CVE-2024-56566.html
* https://www.suse.com/security/cve/CVE-2024-56567.html
* https://www.suse.com/security/cve/CVE-2024-56568.html
* https://www.suse.com/security/cve/CVE-2024-56569.html
* https://www.suse.com/security/cve/CVE-2024-56570.html
* https://www.suse.com/security/cve/CVE-2024-56571.html
* https://www.suse.com/security/cve/CVE-2024-56572.html
* https://www.suse.com/security/cve/CVE-2024-56573.html
* https://www.suse.com/security/cve/CVE-2024-56574.html
* https://www.suse.com/security/cve/CVE-2024-56575.html
* https://www.suse.com/security/cve/CVE-2024-56576.html
* https://www.suse.com/security/cve/CVE-2024-56577.html
* https://www.suse.com/security/cve/CVE-2024-56578.html
* https://www.suse.com/security/cve/CVE-2024-56582.html
* https://www.suse.com/security/cve/CVE-2024-56584.html
* https://www.suse.com/security/cve/CVE-2024-56587.html
* https://www.suse.com/security/cve/CVE-2024-56588.html
* https://www.suse.com/security/cve/CVE-2024-56589.html
* https://www.suse.com/security/cve/CVE-2024-56590.html
* https://www.suse.com/security/cve/CVE-2024-56593.html
* https://www.suse.com/security/cve/CVE-2024-56594.html
* https://www.suse.com/security/cve/CVE-2024-56595.html
* https://www.suse.com/security/cve/CVE-2024-56596.html
* https://www.suse.com/security/cve/CVE-2024-56597.html
* https://www.suse.com/security/cve/CVE-2024-56598.html
* https://www.suse.com/security/cve/CVE-2024-56599.html
* https://www.suse.com/security/cve/CVE-2024-5660.html
* https://www.suse.com/security/cve/CVE-2024-56602.html
* https://www.suse.com/security/cve/CVE-2024-56603.html
* https://www.suse.com/security/cve/CVE-2024-56604.html
* https://www.suse.com/security/cve/CVE-2024-56605.html
* https://www.suse.com/security/cve/CVE-2024-56606.html
* https://www.suse.com/security/cve/CVE-2024-56607.html
* https://www.suse.com/security/cve/CVE-2024-56609.html
* https://www.suse.com/security/cve/CVE-2024-56611.html
* https://www.suse.com/security/cve/CVE-2024-56614.html
* https://www.suse.com/security/cve/CVE-2024-56615.html
* https://www.suse.com/security/cve/CVE-2024-56616.html
* https://www.suse.com/security/cve/CVE-2024-56617.html
* https://www.suse.com/security/cve/CVE-2024-56619.html
* https://www.suse.com/security/cve/CVE-2024-56620.html
* https://www.suse.com/security/cve/CVE-2024-56622.html
* https://www.suse.com/security/cve/CVE-2024-56623.html
* https://www.suse.com/security/cve/CVE-2024-56625.html
* https://www.suse.com/security/cve/CVE-2024-56629.html
* https://www.suse.com/security/cve/CVE-2024-56630.html
* https://www.suse.com/security/cve/CVE-2024-56631.html
* https://www.suse.com/security/cve/CVE-2024-56632.html
* https://www.suse.com/security/cve/CVE-2024-56634.html
* https://www.suse.com/security/cve/CVE-2024-56635.html
* https://www.suse.com/security/cve/CVE-2024-56636.html
* https://www.suse.com/security/cve/CVE-2024-56637.html
* https://www.suse.com/security/cve/CVE-2024-56641.html
* https://www.suse.com/security/cve/CVE-2024-56642.html
* https://www.suse.com/security/cve/CVE-2024-56643.html
* https://www.suse.com/security/cve/CVE-2024-56644.html
* https://www.suse.com/security/cve/CVE-2024-56645.html
* https://www.suse.com/security/cve/CVE-2024-56648.html
* https://www.suse.com/security/cve/CVE-2024-56649.html
* https://www.suse.com/security/cve/CVE-2024-56651.html
* https://www.suse.com/security/cve/CVE-2024-56654.html
* https://www.suse.com/security/cve/CVE-2024-56656.html
* https://www.suse.com/security/cve/CVE-2024-56659.html
* https://www.suse.com/security/cve/CVE-2024-56660.html
* https://www.suse.com/security/cve/CVE-2024-56661.html
* https://www.suse.com/security/cve/CVE-2024-56662.html
* https://www.suse.com/security/cve/CVE-2024-56663.html
* https://www.suse.com/security/cve/CVE-2024-56664.html
* https://www.suse.com/security/cve/CVE-2024-56667.html
* https://www.suse.com/security/cve/CVE-2024-56670.html
* https://www.suse.com/security/cve/CVE-2024-56672.html
* https://www.suse.com/security/cve/CVE-2024-56675.html
* https://www.suse.com/security/cve/CVE-2024-56677.html
* https://www.suse.com/security/cve/CVE-2024-56678.html
* https://www.suse.com/security/cve/CVE-2024-56681.html
* https://www.suse.com/security/cve/CVE-2024-56683.html
* https://www.suse.com/security/cve/CVE-2024-56687.html
* https://www.suse.com/security/cve/CVE-2024-56688.html
* https://www.suse.com/security/cve/CVE-2024-56690.html
* https://www.suse.com/security/cve/CVE-2024-56691.html
* https://www.suse.com/security/cve/CVE-2024-56694.html
* https://www.suse.com/security/cve/CVE-2024-56698.html
* https://www.suse.com/security/cve/CVE-2024-56700.html
* https://www.suse.com/security/cve/CVE-2024-56701.html
* https://www.suse.com/security/cve/CVE-2024-56704.html
* https://www.suse.com/security/cve/CVE-2024-56705.html
* https://www.suse.com/security/cve/CVE-2024-56708.html
* https://www.suse.com/security/cve/CVE-2024-56709.html
* https://www.suse.com/security/cve/CVE-2024-56712.html
* https://www.suse.com/security/cve/CVE-2024-56716.html
* https://www.suse.com/security/cve/CVE-2024-56722.html
* https://www.suse.com/security/cve/CVE-2024-56723.html
* https://www.suse.com/security/cve/CVE-2024-56724.html
* https://www.suse.com/security/cve/CVE-2024-56729.html
* https://www.suse.com/security/cve/CVE-2024-56739.html
* https://www.suse.com/security/cve/CVE-2024-56741.html
* https://www.suse.com/security/cve/CVE-2024-56745.html
* https://www.suse.com/security/cve/CVE-2024-56746.html
* https://www.suse.com/security/cve/CVE-2024-56747.html
* https://www.suse.com/security/cve/CVE-2024-56748.html
* https://www.suse.com/security/cve/CVE-2024-56752.html
* https://www.suse.com/security/cve/CVE-2024-56754.html
* https://www.suse.com/security/cve/CVE-2024-56755.html
* https://www.suse.com/security/cve/CVE-2024-56756.html
* https://www.suse.com/security/cve/CVE-2024-56759.html
* https://www.suse.com/security/cve/CVE-2024-56760.html
* https://www.suse.com/security/cve/CVE-2024-56765.html
* https://www.suse.com/security/cve/CVE-2024-56766.html
* https://www.suse.com/security/cve/CVE-2024-56767.html
* https://www.suse.com/security/cve/CVE-2024-56769.html
* https://www.suse.com/security/cve/CVE-2024-56774.html
* https://www.suse.com/security/cve/CVE-2024-56775.html
* https://www.suse.com/security/cve/CVE-2024-56776.html
* https://www.suse.com/security/cve/CVE-2024-56777.html
* https://www.suse.com/security/cve/CVE-2024-56778.html
* https://www.suse.com/security/cve/CVE-2024-56779.html
* https://www.suse.com/security/cve/CVE-2024-56780.html
* https://www.suse.com/security/cve/CVE-2024-56787.html
* https://www.suse.com/security/cve/CVE-2024-57791.html
* https://www.suse.com/security/cve/CVE-2024-57792.html
* https://www.suse.com/security/cve/CVE-2024-57793.html
* https://www.suse.com/security/cve/CVE-2024-57795.html
* https://www.suse.com/security/cve/CVE-2024-57798.html
* https://www.suse.com/security/cve/CVE-2024-57801.html
* https://www.suse.com/security/cve/CVE-2024-57804.html
* https://www.suse.com/security/cve/CVE-2024-57809.html
* https://www.suse.com/security/cve/CVE-2024-57838.html
* https://www.suse.com/security/cve/CVE-2024-57849.html
* https://www.suse.com/security/cve/CVE-2024-57850.html
* https://www.suse.com/security/cve/CVE-2024-57857.html
* https://www.suse.com/security/cve/CVE-2024-57874.html
* https://www.suse.com/security/cve/CVE-2024-57876.html
* https://www.suse.com/security/cve/CVE-2024-57887.html
* https://www.suse.com/security/cve/CVE-2024-57888.html
* https://www.suse.com/security/cve/CVE-2024-57890.html
* https://www.suse.com/security/cve/CVE-2024-57892.html
* https://www.suse.com/security/cve/CVE-2024-57893.html
* https://www.suse.com/security/cve/CVE-2024-57896.html
* https://www.suse.com/security/cve/CVE-2024-57897.html
* https://www.suse.com/security/cve/CVE-2024-57899.html
* https://www.suse.com/security/cve/CVE-2024-57903.html
* https://www.suse.com/security/cve/CVE-2024-57904.html
* https://www.suse.com/security/cve/CVE-2024-57906.html
* https://www.suse.com/security/cve/CVE-2024-57907.html
* https://www.suse.com/security/cve/CVE-2024-57908.html
* https://www.suse.com/security/cve/CVE-2024-57910.html
* https://www.suse.com/security/cve/CVE-2024-57911.html
* https://www.suse.com/security/cve/CVE-2024-57912.html
* https://www.suse.com/security/cve/CVE-2024-57913.html
* https://www.suse.com/security/cve/CVE-2024-57915.html
* https://www.suse.com/security/cve/CVE-2024-57916.html
* https://www.suse.com/security/cve/CVE-2024-57922.html
* https://www.suse.com/security/cve/CVE-2024-57926.html
* https://www.suse.com/security/cve/CVE-2024-57929.html
* https://www.suse.com/security/cve/CVE-2024-57932.html
* https://www.suse.com/security/cve/CVE-2024-57933.html
* https://www.suse.com/security/cve/CVE-2024-57935.html
* https://www.suse.com/security/cve/CVE-2024-57936.html
* https://www.suse.com/security/cve/CVE-2024-57940.html
* https://www.suse.com/security/cve/CVE-2024-8805.html
* https://www.suse.com/security/cve/CVE-2025-21632.html
* https://www.suse.com/security/cve/CVE-2025-21645.html
* https://www.suse.com/security/cve/CVE-2025-21646.html
* https://www.suse.com/security/cve/CVE-2025-21649.html
* https://www.suse.com/security/cve/CVE-2025-21650.html
* https://www.suse.com/security/cve/CVE-2025-21651.html
* https://www.suse.com/security/cve/CVE-2025-21656.html
* https://www.suse.com/security/cve/CVE-2025-21662.html
* https://bugzilla.suse.com/show_bug.cgi?id=1012628
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1214954
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1216813
* https://bugzilla.suse.com/show_bug.cgi?id=1218470
* https://bugzilla.suse.com/show_bug.cgi?id=1220355
* https://bugzilla.suse.com/show_bug.cgi?id=1220711
* https://bugzilla.suse.com/show_bug.cgi?id=1220773
* https://bugzilla.suse.com/show_bug.cgi?id=1221326
* https://bugzilla.suse.com/show_bug.cgi?id=1224095
* https://bugzilla.suse.com/show_bug.cgi?id=1224726
* https://bugzilla.suse.com/show_bug.cgi?id=1225743
* https://bugzilla.suse.com/show_bug.cgi?id=1225758
* https://bugzilla.suse.com/show_bug.cgi?id=1225820
* https://bugzilla.suse.com/show_bug.cgi?id=1225897
* https://bugzilla.suse.com/show_bug.cgi?id=1227445
* https://bugzilla.suse.com/show_bug.cgi?id=1228526
* https://bugzilla.suse.com/show_bug.cgi?id=1228592
* https://bugzilla.suse.com/show_bug.cgi?id=1229809
* https://bugzilla.suse.com/show_bug.cgi?id=1229833
* https://bugzilla.suse.com/show_bug.cgi?id=1230205
* https://bugzilla.suse.com/show_bug.cgi?id=1230413
* https://bugzilla.suse.com/show_bug.cgi?id=1230557
* https://bugzilla.suse.com/show_bug.cgi?id=1230697
* https://bugzilla.suse.com/show_bug.cgi?id=1230807
* https://bugzilla.suse.com/show_bug.cgi?id=1230827
* https://bugzilla.suse.com/show_bug.cgi?id=1231016
* https://bugzilla.suse.com/show_bug.cgi?id=1231854
* https://bugzilla.suse.com/show_bug.cgi?id=1231909
* https://bugzilla.suse.com/show_bug.cgi?id=1231963
* https://bugzilla.suse.com/show_bug.cgi?id=1232087
* https://bugzilla.suse.com/show_bug.cgi?id=1232157
* https://bugzilla.suse.com/show_bug.cgi?id=1232158
* https://bugzilla.suse.com/show_bug.cgi?id=1232166
* https://bugzilla.suse.com/show_bug.cgi?id=1232193
* https://bugzilla.suse.com/show_bug.cgi?id=1232198
* https://bugzilla.suse.com/show_bug.cgi?id=1232201
* https://bugzilla.suse.com/show_bug.cgi?id=1232418
* https://bugzilla.suse.com/show_bug.cgi?id=1232419
* https://bugzilla.suse.com/show_bug.cgi?id=1232420
* https://bugzilla.suse.com/show_bug.cgi?id=1232421
* https://bugzilla.suse.com/show_bug.cgi?id=1232436
* https://bugzilla.suse.com/show_bug.cgi?id=1232882
* https://bugzilla.suse.com/show_bug.cgi?id=1233038
* https://bugzilla.suse.com/show_bug.cgi?id=1233055
* https://bugzilla.suse.com/show_bug.cgi?id=1233070
* https://bugzilla.suse.com/show_bug.cgi?id=1233096
* https://bugzilla.suse.com/show_bug.cgi?id=1233112
* https://bugzilla.suse.com/show_bug.cgi?id=1233200
* https://bugzilla.suse.com/show_bug.cgi?id=1233201
* https://bugzilla.suse.com/show_bug.cgi?id=1233204
* https://bugzilla.suse.com/show_bug.cgi?id=1233239
* https://bugzilla.suse.com/show_bug.cgi?id=1233259
* https://bugzilla.suse.com/show_bug.cgi?id=1233260
* https://bugzilla.suse.com/show_bug.cgi?id=1233324
* https://bugzilla.suse.com/show_bug.cgi?id=1233328
* https://bugzilla.suse.com/show_bug.cgi?id=1233461
* https://bugzilla.suse.com/show_bug.cgi?id=1233467
* https://bugzilla.suse.com/show_bug.cgi?id=1233468
* https://bugzilla.suse.com/show_bug.cgi?id=1233469
* https://bugzilla.suse.com/show_bug.cgi?id=1233485
* https://bugzilla.suse.com/show_bug.cgi?id=1233488
* https://bugzilla.suse.com/show_bug.cgi?id=1233523
* https://bugzilla.suse.com/show_bug.cgi?id=1233546
* https://bugzilla.suse.com/show_bug.cgi?id=1233547
* https://bugzilla.suse.com/show_bug.cgi?id=1233550
* https://bugzilla.suse.com/show_bug.cgi?id=1233558
* https://bugzilla.suse.com/show_bug.cgi?id=1233568
* https://bugzilla.suse.com/show_bug.cgi?id=1233637
* https://bugzilla.suse.com/show_bug.cgi?id=1233638
* https://bugzilla.suse.com/show_bug.cgi?id=1233642
* https://bugzilla.suse.com/show_bug.cgi?id=1233772
* https://bugzilla.suse.com/show_bug.cgi?id=1233837
* https://bugzilla.suse.com/show_bug.cgi?id=1234024
* https://bugzilla.suse.com/show_bug.cgi?id=1234069
* https://bugzilla.suse.com/show_bug.cgi?id=1234071
* https://bugzilla.suse.com/show_bug.cgi?id=1234073
* https://bugzilla.suse.com/show_bug.cgi?id=1234075
* https://bugzilla.suse.com/show_bug.cgi?id=1234076
* https://bugzilla.suse.com/show_bug.cgi?id=1234077
* https://bugzilla.suse.com/show_bug.cgi?id=1234078
* https://bugzilla.suse.com/show_bug.cgi?id=1234079
* https://bugzilla.suse.com/show_bug.cgi?id=1234085
* https://bugzilla.suse.com/show_bug.cgi?id=1234086
* https://bugzilla.suse.com/show_bug.cgi?id=1234139
* https://bugzilla.suse.com/show_bug.cgi?id=1234140
* https://bugzilla.suse.com/show_bug.cgi?id=1234141
* https://bugzilla.suse.com/show_bug.cgi?id=1234142
* https://bugzilla.suse.com/show_bug.cgi?id=1234143
* https://bugzilla.suse.com/show_bug.cgi?id=1234144
* https://bugzilla.suse.com/show_bug.cgi?id=1234145
* https://bugzilla.suse.com/show_bug.cgi?id=1234146
* https://bugzilla.suse.com/show_bug.cgi?id=1234147
* https://bugzilla.suse.com/show_bug.cgi?id=1234148
* https://bugzilla.suse.com/show_bug.cgi?id=1234149
* https://bugzilla.suse.com/show_bug.cgi?id=1234150
* https://bugzilla.suse.com/show_bug.cgi?id=1234153
* https://bugzilla.suse.com/show_bug.cgi?id=1234155
* https://bugzilla.suse.com/show_bug.cgi?id=1234156
* https://bugzilla.suse.com/show_bug.cgi?id=1234158
* https://bugzilla.suse.com/show_bug.cgi?id=1234159
* https://bugzilla.suse.com/show_bug.cgi?id=1234160
* https://bugzilla.suse.com/show_bug.cgi?id=1234161
* https://bugzilla.suse.com/show_bug.cgi?id=1234162
* https://bugzilla.suse.com/show_bug.cgi?id=1234163
* https://bugzilla.suse.com/show_bug.cgi?id=1234164
* https://bugzilla.suse.com/show_bug.cgi?id=1234165
* https://bugzilla.suse.com/show_bug.cgi?id=1234166
* https://bugzilla.suse.com/show_bug.cgi?id=1234167
* https://bugzilla.suse.com/show_bug.cgi?id=1234168
* https://bugzilla.suse.com/show_bug.cgi?id=1234169
* https://bugzilla.suse.com/show_bug.cgi?id=1234170
* https://bugzilla.suse.com/show_bug.cgi?id=1234171
* https://bugzilla.suse.com/show_bug.cgi?id=1234172
* https://bugzilla.suse.com/show_bug.cgi?id=1234173
* https://bugzilla.suse.com/show_bug.cgi?id=1234174
* https://bugzilla.suse.com/show_bug.cgi?id=1234175
* https://bugzilla.suse.com/show_bug.cgi?id=1234176
* https://bugzilla.suse.com/show_bug.cgi?id=1234177
* https://bugzilla.suse.com/show_bug.cgi?id=1234178
* https://bugzilla.suse.com/show_bug.cgi?id=1234179
* https://bugzilla.suse.com/show_bug.cgi?id=1234180
* https://bugzilla.suse.com/show_bug.cgi?id=1234181
* https://bugzilla.suse.com/show_bug.cgi?id=1234182
* https://bugzilla.suse.com/show_bug.cgi?id=1234183
* https://bugzilla.suse.com/show_bug.cgi?id=1234184
* https://bugzilla.suse.com/show_bug.cgi?id=1234185
* https://bugzilla.suse.com/show_bug.cgi?id=1234186
* https://bugzilla.suse.com/show_bug.cgi?id=1234187
* https://bugzilla.suse.com/show_bug.cgi?id=1234188
* https://bugzilla.suse.com/show_bug.cgi?id=1234189
* https://bugzilla.suse.com/show_bug.cgi?id=1234190
* https://bugzilla.suse.com/show_bug.cgi?id=1234191
* https://bugzilla.suse.com/show_bug.cgi?id=1234192
* https://bugzilla.suse.com/show_bug.cgi?id=1234193
* https://bugzilla.suse.com/show_bug.cgi?id=1234194
* https://bugzilla.suse.com/show_bug.cgi?id=1234195
* https://bugzilla.suse.com/show_bug.cgi?id=1234196
* https://bugzilla.suse.com/show_bug.cgi?id=1234197
* https://bugzilla.suse.com/show_bug.cgi?id=1234198
* https://bugzilla.suse.com/show_bug.cgi?id=1234199
* https://bugzilla.suse.com/show_bug.cgi?id=1234200
* https://bugzilla.suse.com/show_bug.cgi?id=1234201
* https://bugzilla.suse.com/show_bug.cgi?id=1234203
* https://bugzilla.suse.com/show_bug.cgi?id=1234204
* https://bugzilla.suse.com/show_bug.cgi?id=1234205
* https://bugzilla.suse.com/show_bug.cgi?id=1234207
* https://bugzilla.suse.com/show_bug.cgi?id=1234208
* https://bugzilla.suse.com/show_bug.cgi?id=1234209
* https://bugzilla.suse.com/show_bug.cgi?id=1234219
* https://bugzilla.suse.com/show_bug.cgi?id=1234220
* https://bugzilla.suse.com/show_bug.cgi?id=1234221
* https://bugzilla.suse.com/show_bug.cgi?id=1234223
* https://bugzilla.suse.com/show_bug.cgi?id=1234237
* https://bugzilla.suse.com/show_bug.cgi?id=1234238
* https://bugzilla.suse.com/show_bug.cgi?id=1234239
* https://bugzilla.suse.com/show_bug.cgi?id=1234240
* https://bugzilla.suse.com/show_bug.cgi?id=1234241
* https://bugzilla.suse.com/show_bug.cgi?id=1234242
* https://bugzilla.suse.com/show_bug.cgi?id=1234243
* https://bugzilla.suse.com/show_bug.cgi?id=1234278
* https://bugzilla.suse.com/show_bug.cgi?id=1234279
* https://bugzilla.suse.com/show_bug.cgi?id=1234280
* https://bugzilla.suse.com/show_bug.cgi?id=1234281
* https://bugzilla.suse.com/show_bug.cgi?id=1234282
* https://bugzilla.suse.com/show_bug.cgi?id=1234294
* https://bugzilla.suse.com/show_bug.cgi?id=1234338
* https://bugzilla.suse.com/show_bug.cgi?id=1234357
* https://bugzilla.suse.com/show_bug.cgi?id=1234381
* https://bugzilla.suse.com/show_bug.cgi?id=1234454
* https://bugzilla.suse.com/show_bug.cgi?id=1234464
* https://bugzilla.suse.com/show_bug.cgi?id=1234605
* https://bugzilla.suse.com/show_bug.cgi?id=1234619
* https://bugzilla.suse.com/show_bug.cgi?id=1234635
* https://bugzilla.suse.com/show_bug.cgi?id=1234651
* https://bugzilla.suse.com/show_bug.cgi?id=1234652
* https://bugzilla.suse.com/show_bug.cgi?id=1234654
* https://bugzilla.suse.com/show_bug.cgi?id=1234655
* https://bugzilla.suse.com/show_bug.cgi?id=1234657
* https://bugzilla.suse.com/show_bug.cgi?id=1234658
* https://bugzilla.suse.com/show_bug.cgi?id=1234659
* https://bugzilla.suse.com/show_bug.cgi?id=1234668
* https://bugzilla.suse.com/show_bug.cgi?id=1234690
* https://bugzilla.suse.com/show_bug.cgi?id=1234725
* https://bugzilla.suse.com/show_bug.cgi?id=1234726
* https://bugzilla.suse.com/show_bug.cgi?id=1234810
* https://bugzilla.suse.com/show_bug.cgi?id=1234811
* https://bugzilla.suse.com/show_bug.cgi?id=1234825
* https://bugzilla.suse.com/show_bug.cgi?id=1234826
* https://bugzilla.suse.com/show_bug.cgi?id=1234827
* https://bugzilla.suse.com/show_bug.cgi?id=1234829
* https://bugzilla.suse.com/show_bug.cgi?id=1234832
* https://bugzilla.suse.com/show_bug.cgi?id=1234834
* https://bugzilla.suse.com/show_bug.cgi?id=1234843
* https://bugzilla.suse.com/show_bug.cgi?id=1234846
* https://bugzilla.suse.com/show_bug.cgi?id=1234848
* https://bugzilla.suse.com/show_bug.cgi?id=1234853
* https://bugzilla.suse.com/show_bug.cgi?id=1234855
* https://bugzilla.suse.com/show_bug.cgi?id=1234856
* https://bugzilla.suse.com/show_bug.cgi?id=1234863
* https://bugzilla.suse.com/show_bug.cgi?id=1234884
* https://bugzilla.suse.com/show_bug.cgi?id=1234887
* https://bugzilla.suse.com/show_bug.cgi?id=1234888
* https://bugzilla.suse.com/show_bug.cgi?id=1234889
* https://bugzilla.suse.com/show_bug.cgi?id=1234891
* https://bugzilla.suse.com/show_bug.cgi?id=1234893
* https://bugzilla.suse.com/show_bug.cgi?id=1234898
* https://bugzilla.suse.com/show_bug.cgi?id=1234899
* https://bugzilla.suse.com/show_bug.cgi?id=1234900
* https://bugzilla.suse.com/show_bug.cgi?id=1234901
* https://bugzilla.suse.com/show_bug.cgi?id=1234905
* https://bugzilla.suse.com/show_bug.cgi?id=1234906
* https://bugzilla.suse.com/show_bug.cgi?id=1234907
* https://bugzilla.suse.com/show_bug.cgi?id=1234909
* https://bugzilla.suse.com/show_bug.cgi?id=1234911
* https://bugzilla.suse.com/show_bug.cgi?id=1234912
* https://bugzilla.suse.com/show_bug.cgi?id=1234916
* https://bugzilla.suse.com/show_bug.cgi?id=1234918
* https://bugzilla.suse.com/show_bug.cgi?id=1234920
* https://bugzilla.suse.com/show_bug.cgi?id=1234921
* https://bugzilla.suse.com/show_bug.cgi?id=1234922
* https://bugzilla.suse.com/show_bug.cgi?id=1234923
* https://bugzilla.suse.com/show_bug.cgi?id=1234929
* https://bugzilla.suse.com/show_bug.cgi?id=1234930
* https://bugzilla.suse.com/show_bug.cgi?id=1234931
* https://bugzilla.suse.com/show_bug.cgi?id=1234934
* https://bugzilla.suse.com/show_bug.cgi?id=1234937
* https://bugzilla.suse.com/show_bug.cgi?id=1234948
* https://bugzilla.suse.com/show_bug.cgi?id=1234950
* https://bugzilla.suse.com/show_bug.cgi?id=1234952
* https://bugzilla.suse.com/show_bug.cgi?id=1234957
* https://bugzilla.suse.com/show_bug.cgi?id=1234960
* https://bugzilla.suse.com/show_bug.cgi?id=1234962
* https://bugzilla.suse.com/show_bug.cgi?id=1234963
* https://bugzilla.suse.com/show_bug.cgi?id=1234968
* https://bugzilla.suse.com/show_bug.cgi?id=1234969
* https://bugzilla.suse.com/show_bug.cgi?id=1234970
* https://bugzilla.suse.com/show_bug.cgi?id=1234971
* https://bugzilla.suse.com/show_bug.cgi?id=1234973
* https://bugzilla.suse.com/show_bug.cgi?id=1234974
* https://bugzilla.suse.com/show_bug.cgi?id=1234989
* https://bugzilla.suse.com/show_bug.cgi?id=1234999
* https://bugzilla.suse.com/show_bug.cgi?id=1235000
* https://bugzilla.suse.com/show_bug.cgi?id=1235002
* https://bugzilla.suse.com/show_bug.cgi?id=1235003
* https://bugzilla.suse.com/show_bug.cgi?id=1235004
* https://bugzilla.suse.com/show_bug.cgi?id=1235007
* https://bugzilla.suse.com/show_bug.cgi?id=1235009
* https://bugzilla.suse.com/show_bug.cgi?id=1235011
* https://bugzilla.suse.com/show_bug.cgi?id=1235016
* https://bugzilla.suse.com/show_bug.cgi?id=1235019
* https://bugzilla.suse.com/show_bug.cgi?id=1235031
* https://bugzilla.suse.com/show_bug.cgi?id=1235032
* https://bugzilla.suse.com/show_bug.cgi?id=1235033
* https://bugzilla.suse.com/show_bug.cgi?id=1235035
* https://bugzilla.suse.com/show_bug.cgi?id=1235037
* https://bugzilla.suse.com/show_bug.cgi?id=1235038
* https://bugzilla.suse.com/show_bug.cgi?id=1235039
* https://bugzilla.suse.com/show_bug.cgi?id=1235040
* https://bugzilla.suse.com/show_bug.cgi?id=1235042
* https://bugzilla.suse.com/show_bug.cgi?id=1235043
* https://bugzilla.suse.com/show_bug.cgi?id=1235045
* https://bugzilla.suse.com/show_bug.cgi?id=1235046
* https://bugzilla.suse.com/show_bug.cgi?id=1235050
* https://bugzilla.suse.com/show_bug.cgi?id=1235051
* https://bugzilla.suse.com/show_bug.cgi?id=1235053
* https://bugzilla.suse.com/show_bug.cgi?id=1235054
* https://bugzilla.suse.com/show_bug.cgi?id=1235056
* https://bugzilla.suse.com/show_bug.cgi?id=1235057
* https://bugzilla.suse.com/show_bug.cgi?id=1235059
* https://bugzilla.suse.com/show_bug.cgi?id=1235061
* https://bugzilla.suse.com/show_bug.cgi?id=1235065
* https://bugzilla.suse.com/show_bug.cgi?id=1235070
* https://bugzilla.suse.com/show_bug.cgi?id=1235073
* https://bugzilla.suse.com/show_bug.cgi?id=1235075
* https://bugzilla.suse.com/show_bug.cgi?id=1235100
* https://bugzilla.suse.com/show_bug.cgi?id=1235108
* https://bugzilla.suse.com/show_bug.cgi?id=1235112
* https://bugzilla.suse.com/show_bug.cgi?id=1235115
* https://bugzilla.suse.com/show_bug.cgi?id=1235117
* https://bugzilla.suse.com/show_bug.cgi?id=1235122
* https://bugzilla.suse.com/show_bug.cgi?id=1235123
* https://bugzilla.suse.com/show_bug.cgi?id=1235125
* https://bugzilla.suse.com/show_bug.cgi?id=1235128
* https://bugzilla.suse.com/show_bug.cgi?id=1235132
* https://bugzilla.suse.com/show_bug.cgi?id=1235133
* https://bugzilla.suse.com/show_bug.cgi?id=1235134
* https://bugzilla.suse.com/show_bug.cgi?id=1235138
* https://bugzilla.suse.com/show_bug.cgi?id=1235155
* https://bugzilla.suse.com/show_bug.cgi?id=1235160
* https://bugzilla.suse.com/show_bug.cgi?id=1235219
* https://bugzilla.suse.com/show_bug.cgi?id=1235220
* https://bugzilla.suse.com/show_bug.cgi?id=1235222
* https://bugzilla.suse.com/show_bug.cgi?id=1235223
* https://bugzilla.suse.com/show_bug.cgi?id=1235224
* https://bugzilla.suse.com/show_bug.cgi?id=1235227
* https://bugzilla.suse.com/show_bug.cgi?id=1235241
* https://bugzilla.suse.com/show_bug.cgi?id=1235246
* https://bugzilla.suse.com/show_bug.cgi?id=1235249
* https://bugzilla.suse.com/show_bug.cgi?id=1235251
* https://bugzilla.suse.com/show_bug.cgi?id=1235252
* https://bugzilla.suse.com/show_bug.cgi?id=1235389
* https://bugzilla.suse.com/show_bug.cgi?id=1235391
* https://bugzilla.suse.com/show_bug.cgi?id=1235406
* https://bugzilla.suse.com/show_bug.cgi?id=1235409
* https://bugzilla.suse.com/show_bug.cgi?id=1235410
* https://bugzilla.suse.com/show_bug.cgi?id=1235412
* https://bugzilla.suse.com/show_bug.cgi?id=1235413
* https://bugzilla.suse.com/show_bug.cgi?id=1235415
* https://bugzilla.suse.com/show_bug.cgi?id=1235416
* https://bugzilla.suse.com/show_bug.cgi?id=1235417
* https://bugzilla.suse.com/show_bug.cgi?id=1235423
* https://bugzilla.suse.com/show_bug.cgi?id=1235424
* https://bugzilla.suse.com/show_bug.cgi?id=1235425
* https://bugzilla.suse.com/show_bug.cgi?id=1235426
* https://bugzilla.suse.com/show_bug.cgi?id=1235427
* https://bugzilla.suse.com/show_bug.cgi?id=1235428
* https://bugzilla.suse.com/show_bug.cgi?id=1235429
* https://bugzilla.suse.com/show_bug.cgi?id=1235433
* https://bugzilla.suse.com/show_bug.cgi?id=1235437
* https://bugzilla.suse.com/show_bug.cgi?id=1235439
* https://bugzilla.suse.com/show_bug.cgi?id=1235444
* https://bugzilla.suse.com/show_bug.cgi?id=1235445
* https://bugzilla.suse.com/show_bug.cgi?id=1235449
* https://bugzilla.suse.com/show_bug.cgi?id=1235451
* https://bugzilla.suse.com/show_bug.cgi?id=1235454
* https://bugzilla.suse.com/show_bug.cgi?id=1235458
* https://bugzilla.suse.com/show_bug.cgi?id=1235459
* https://bugzilla.suse.com/show_bug.cgi?id=1235464
* https://bugzilla.suse.com/show_bug.cgi?id=1235466
* https://bugzilla.suse.com/show_bug.cgi?id=1235473
* https://bugzilla.suse.com/show_bug.cgi?id=1235479
* https://bugzilla.suse.com/show_bug.cgi?id=1235480
* https://bugzilla.suse.com/show_bug.cgi?id=1235483
* https://bugzilla.suse.com/show_bug.cgi?id=1235486
* https://bugzilla.suse.com/show_bug.cgi?id=1235488
* https://bugzilla.suse.com/show_bug.cgi?id=1235491
* https://bugzilla.suse.com/show_bug.cgi?id=1235494
* https://bugzilla.suse.com/show_bug.cgi?id=1235495
* https://bugzilla.suse.com/show_bug.cgi?id=1235496
* https://bugzilla.suse.com/show_bug.cgi?id=1235497
* https://bugzilla.suse.com/show_bug.cgi?id=1235500
* https://bugzilla.suse.com/show_bug.cgi?id=1235502
* https://bugzilla.suse.com/show_bug.cgi?id=1235503
* https://bugzilla.suse.com/show_bug.cgi?id=1235507
* https://bugzilla.suse.com/show_bug.cgi?id=1235519
* https://bugzilla.suse.com/show_bug.cgi?id=1235520
* https://bugzilla.suse.com/show_bug.cgi?id=1235521
* https://bugzilla.suse.com/show_bug.cgi?id=1235523
* https://bugzilla.suse.com/show_bug.cgi?id=1235526
* https://bugzilla.suse.com/show_bug.cgi?id=1235528
* https://bugzilla.suse.com/show_bug.cgi?id=1235532
* https://bugzilla.suse.com/show_bug.cgi?id=1235533
* https://bugzilla.suse.com/show_bug.cgi?id=1235534
* https://bugzilla.suse.com/show_bug.cgi?id=1235537
* https://bugzilla.suse.com/show_bug.cgi?id=1235538
* https://bugzilla.suse.com/show_bug.cgi?id=1235550
* https://bugzilla.suse.com/show_bug.cgi?id=1235552
* https://bugzilla.suse.com/show_bug.cgi?id=1235555
* https://bugzilla.suse.com/show_bug.cgi?id=1235557
* https://bugzilla.suse.com/show_bug.cgi?id=1235563
* https://bugzilla.suse.com/show_bug.cgi?id=1235564
* https://bugzilla.suse.com/show_bug.cgi?id=1235565
* https://bugzilla.suse.com/show_bug.cgi?id=1235568
* https://bugzilla.suse.com/show_bug.cgi?id=1235570
* https://bugzilla.suse.com/show_bug.cgi?id=1235571
* https://bugzilla.suse.com/show_bug.cgi?id=1235577
* https://bugzilla.suse.com/show_bug.cgi?id=1235584
* https://bugzilla.suse.com/show_bug.cgi?id=1235587
* https://bugzilla.suse.com/show_bug.cgi?id=1235611
* https://bugzilla.suse.com/show_bug.cgi?id=1235616
* https://bugzilla.suse.com/show_bug.cgi?id=1235622
* https://bugzilla.suse.com/show_bug.cgi?id=1235627
* https://bugzilla.suse.com/show_bug.cgi?id=1235632
* https://bugzilla.suse.com/show_bug.cgi?id=1235635
* https://bugzilla.suse.com/show_bug.cgi?id=1235641
* https://bugzilla.suse.com/show_bug.cgi?id=1235643
* https://bugzilla.suse.com/show_bug.cgi?id=1235645
* https://bugzilla.suse.com/show_bug.cgi?id=1235646
* https://bugzilla.suse.com/show_bug.cgi?id=1235647
* https://bugzilla.suse.com/show_bug.cgi?id=1235650
* https://bugzilla.suse.com/show_bug.cgi?id=1235653
* https://bugzilla.suse.com/show_bug.cgi?id=1235657
* https://bugzilla.suse.com/show_bug.cgi?id=1235663
* https://bugzilla.suse.com/show_bug.cgi?id=1235700
* https://bugzilla.suse.com/show_bug.cgi?id=1235705
* https://bugzilla.suse.com/show_bug.cgi?id=1235707
* https://bugzilla.suse.com/show_bug.cgi?id=1235708
* https://bugzilla.suse.com/show_bug.cgi?id=1235710
* https://bugzilla.suse.com/show_bug.cgi?id=1235714
* https://bugzilla.suse.com/show_bug.cgi?id=1235716
* https://bugzilla.suse.com/show_bug.cgi?id=1235720
* https://bugzilla.suse.com/show_bug.cgi?id=1235723
* https://bugzilla.suse.com/show_bug.cgi?id=1235727
* https://bugzilla.suse.com/show_bug.cgi?id=1235730
* https://bugzilla.suse.com/show_bug.cgi?id=1235737
* https://bugzilla.suse.com/show_bug.cgi?id=1235739
* https://bugzilla.suse.com/show_bug.cgi?id=1235745
* https://bugzilla.suse.com/show_bug.cgi?id=1235747
* https://bugzilla.suse.com/show_bug.cgi?id=1235750
* https://bugzilla.suse.com/show_bug.cgi?id=1235753
* https://bugzilla.suse.com/show_bug.cgi?id=1235759
* https://bugzilla.suse.com/show_bug.cgi?id=1235764
* https://bugzilla.suse.com/show_bug.cgi?id=1235768
* https://bugzilla.suse.com/show_bug.cgi?id=1235776
* https://bugzilla.suse.com/show_bug.cgi?id=1235777
* https://bugzilla.suse.com/show_bug.cgi?id=1235778
* https://bugzilla.suse.com/show_bug.cgi?id=1235779
* https://bugzilla.suse.com/show_bug.cgi?id=1235793
* https://bugzilla.suse.com/show_bug.cgi?id=1235798
* https://bugzilla.suse.com/show_bug.cgi?id=1235806
* https://bugzilla.suse.com/show_bug.cgi?id=1235808
* https://bugzilla.suse.com/show_bug.cgi?id=1235812
* https://bugzilla.suse.com/show_bug.cgi?id=1235814
* https://bugzilla.suse.com/show_bug.cgi?id=1235818
* https://bugzilla.suse.com/show_bug.cgi?id=1235842
* https://bugzilla.suse.com/show_bug.cgi?id=1235894
* https://bugzilla.suse.com/show_bug.cgi?id=1235902
* https://bugzilla.suse.com/show_bug.cgi?id=1235903
* https://bugzilla.suse.com/show_bug.cgi?id=1235906
* https://bugzilla.suse.com/show_bug.cgi?id=1235918
* https://bugzilla.suse.com/show_bug.cgi?id=1235919
* https://bugzilla.suse.com/show_bug.cgi?id=1235920
* https://bugzilla.suse.com/show_bug.cgi?id=1235924
* https://bugzilla.suse.com/show_bug.cgi?id=1235940
* https://bugzilla.suse.com/show_bug.cgi?id=1235946
* https://bugzilla.suse.com/show_bug.cgi?id=1235952
* https://bugzilla.suse.com/show_bug.cgi?id=1235964
* https://bugzilla.suse.com/show_bug.cgi?id=1235965
* https://bugzilla.suse.com/show_bug.cgi?id=1235967
* https://bugzilla.suse.com/show_bug.cgi?id=1235969
* https://bugzilla.suse.com/show_bug.cgi?id=1235976
* https://bugzilla.suse.com/show_bug.cgi?id=1235977
* https://bugzilla.suse.com/show_bug.cgi?id=1236078
* https://bugzilla.suse.com/show_bug.cgi?id=1236080
* https://bugzilla.suse.com/show_bug.cgi?id=1236082
* https://bugzilla.suse.com/show_bug.cgi?id=1236088
* https://bugzilla.suse.com/show_bug.cgi?id=1236090
* https://bugzilla.suse.com/show_bug.cgi?id=1236091
* https://bugzilla.suse.com/show_bug.cgi?id=1236096
* https://bugzilla.suse.com/show_bug.cgi?id=1236097
* https://bugzilla.suse.com/show_bug.cgi?id=1236098
* https://bugzilla.suse.com/show_bug.cgi?id=1236101
* https://bugzilla.suse.com/show_bug.cgi?id=1236102
* https://bugzilla.suse.com/show_bug.cgi?id=1236104
* https://bugzilla.suse.com/show_bug.cgi?id=1236106
* https://bugzilla.suse.com/show_bug.cgi?id=1236120
* https://bugzilla.suse.com/show_bug.cgi?id=1236125
* https://bugzilla.suse.com/show_bug.cgi?id=1236131
* https://bugzilla.suse.com/show_bug.cgi?id=1236138
* https://bugzilla.suse.com/show_bug.cgi?id=1236143
* https://bugzilla.suse.com/show_bug.cgi?id=1236144
* https://bugzilla.suse.com/show_bug.cgi?id=1236145
* https://bugzilla.suse.com/show_bug.cgi?id=1236168
* https://bugzilla.suse.com/show_bug.cgi?id=1236178
* https://bugzilla.suse.com/show_bug.cgi?id=1236180
* https://bugzilla.suse.com/show_bug.cgi?id=1236181
* https://bugzilla.suse.com/show_bug.cgi?id=1236190
* https://bugzilla.suse.com/show_bug.cgi?id=1236198
* https://bugzilla.suse.com/show_bug.cgi?id=1236227
* https://bugzilla.suse.com/show_bug.cgi?id=1236248
* https://jira.suse.com/browse/PED-10467
* https://jira.suse.com/browse/PED-7242
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20250129/3d447740/attachment-0001.htm>
More information about the sle-security-updates
mailing list