<div class="container">
<h1>Security update for the Linux Kernel</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:1332-2</td>
</tr>
<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">bsc#1194869</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1200465">bsc#1200465</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1205316">bsc#1205316</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207948">bsc#1207948</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209635">bsc#1209635</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209657">bsc#1209657</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1212514">bsc#1212514</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213456">bsc#1213456</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214852">bsc#1214852</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215221">bsc#1215221</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215322">bsc#1215322</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217339">bsc#1217339</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217959">bsc#1217959</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217987">bsc#1217987</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217988">bsc#1217988</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217989">bsc#1217989</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218321">bsc#1218321</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218336">bsc#1218336</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218479">bsc#1218479</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218643">bsc#1218643</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218777">bsc#1218777</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219169">bsc#1219169</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219170">bsc#1219170</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219264">bsc#1219264</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219834">bsc#1219834</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220114">bsc#1220114</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220176">bsc#1220176</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220237">bsc#1220237</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220251">bsc#1220251</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220320">bsc#1220320</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220337">bsc#1220337</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220340">bsc#1220340</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220365">bsc#1220365</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220366">bsc#1220366</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220398">bsc#1220398</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220411">bsc#1220411</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220413">bsc#1220413</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220439">bsc#1220439</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220443">bsc#1220443</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220445">bsc#1220445</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220466">bsc#1220466</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220478">bsc#1220478</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220482">bsc#1220482</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220484">bsc#1220484</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220486">bsc#1220486</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220487">bsc#1220487</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220492">bsc#1220492</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220703">bsc#1220703</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220775">bsc#1220775</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220790">bsc#1220790</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220797">bsc#1220797</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220831">bsc#1220831</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220833">bsc#1220833</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220836">bsc#1220836</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220839">bsc#1220839</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220840">bsc#1220840</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220843">bsc#1220843</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220870">bsc#1220870</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220871">bsc#1220871</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220872">bsc#1220872</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220878">bsc#1220878</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220879">bsc#1220879</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220883">bsc#1220883</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220885">bsc#1220885</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220887">bsc#1220887</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220898">bsc#1220898</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220918">bsc#1220918</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220920">bsc#1220920</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220921">bsc#1220921</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220926">bsc#1220926</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220927">bsc#1220927</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220929">bsc#1220929</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220932">bsc#1220932</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220937">bsc#1220937</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220938">bsc#1220938</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220940">bsc#1220940</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220954">bsc#1220954</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220955">bsc#1220955</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220959">bsc#1220959</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220960">bsc#1220960</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220961">bsc#1220961</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220965">bsc#1220965</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220969">bsc#1220969</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220978">bsc#1220978</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220979">bsc#1220979</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220981">bsc#1220981</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220982">bsc#1220982</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220983">bsc#1220983</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220985">bsc#1220985</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220986">bsc#1220986</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220987">bsc#1220987</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220989">bsc#1220989</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220990">bsc#1220990</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221009">bsc#1221009</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221012">bsc#1221012</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221015">bsc#1221015</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221022">bsc#1221022</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221039">bsc#1221039</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221040">bsc#1221040</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221044">bsc#1221044</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221045">bsc#1221045</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221046">bsc#1221046</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221048">bsc#1221048</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221055">bsc#1221055</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221056">bsc#1221056</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221058">bsc#1221058</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221060">bsc#1221060</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221061">bsc#1221061</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221062">bsc#1221062</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221066">bsc#1221066</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221067">bsc#1221067</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221068">bsc#1221068</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221069">bsc#1221069</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221070">bsc#1221070</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221071">bsc#1221071</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221077">bsc#1221077</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221082">bsc#1221082</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221090">bsc#1221090</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221097">bsc#1221097</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221156">bsc#1221156</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221252">bsc#1221252</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221273">bsc#1221273</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221274">bsc#1221274</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221276">bsc#1221276</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221277">bsc#1221277</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221291">bsc#1221291</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221293">bsc#1221293</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221298">bsc#1221298</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221337">bsc#1221337</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221338">bsc#1221338</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221375">bsc#1221375</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221379">bsc#1221379</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221551">bsc#1221551</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221553">bsc#1221553</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221613">bsc#1221613</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221614">bsc#1221614</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221616">bsc#1221616</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221618">bsc#1221618</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221631">bsc#1221631</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221633">bsc#1221633</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221713">bsc#1221713</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221777">bsc#1221777</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221814">bsc#1221814</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221816">bsc#1221816</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221830">bsc#1221830</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221951">bsc#1221951</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222033">bsc#1222033</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222056">bsc#1222056</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222060">bsc#1222060</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222070">bsc#1222070</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222073">bsc#1222073</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222117">bsc#1222117</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222274">bsc#1222274</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222291">bsc#1222291</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222300">bsc#1222300</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222304">bsc#1222304</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222317">bsc#1222317</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222331">bsc#1222331</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222355">bsc#1222355</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222356">bsc#1222356</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222360">bsc#1222360</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222366">bsc#1222366</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222373">bsc#1222373</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222619">bsc#1222619</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-5759">jsc#PED-5759</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-7167">jsc#PED-7167</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-7619">jsc#PED-7619</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46925.html">CVE-2021-46925</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46926.html">CVE-2021-46926</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46927.html">CVE-2021-46927</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46929.html">CVE-2021-46929</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46930.html">CVE-2021-46930</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46931.html">CVE-2021-46931</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46933.html">CVE-2021-46933</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46936.html">CVE-2021-46936</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47082.html">CVE-2021-47082</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47087.html">CVE-2021-47087</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47091.html">CVE-2021-47091</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47093.html">CVE-2021-47093</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47094.html">CVE-2021-47094</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47095.html">CVE-2021-47095</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47096.html">CVE-2021-47096</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47097.html">CVE-2021-47097</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47098.html">CVE-2021-47098</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47099.html">CVE-2021-47099</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47100.html">CVE-2021-47100</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47101.html">CVE-2021-47101</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47102.html">CVE-2021-47102</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47104.html">CVE-2021-47104</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47105.html">CVE-2021-47105</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47107.html">CVE-2021-47107</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47108.html">CVE-2021-47108</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-4744.html">CVE-2022-4744</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48626.html">CVE-2022-48626</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48629.html">CVE-2022-48629</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48630.html">CVE-2022-48630</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-0160.html">CVE-2023-0160</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-28746.html">CVE-2023-28746</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-35827.html">CVE-2023-35827</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-4881.html">CVE-2023-4881</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52447.html">CVE-2023-52447</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52450.html">CVE-2023-52450</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52453.html">CVE-2023-52453</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52454.html">CVE-2023-52454</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52469.html">CVE-2023-52469</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52470.html">CVE-2023-52470</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52474.html">CVE-2023-52474</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52476.html">CVE-2023-52476</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52477.html">CVE-2023-52477</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52481.html">CVE-2023-52481</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52484.html">CVE-2023-52484</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52486.html">CVE-2023-52486</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52492.html">CVE-2023-52492</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52493.html">CVE-2023-52493</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52494.html">CVE-2023-52494</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52497.html">CVE-2023-52497</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52500.html">CVE-2023-52500</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52501.html">CVE-2023-52501</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52502.html">CVE-2023-52502</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52504.html">CVE-2023-52504</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52507.html">CVE-2023-52507</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52508.html">CVE-2023-52508</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52509.html">CVE-2023-52509</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52510.html">CVE-2023-52510</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52511.html">CVE-2023-52511</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52513.html">CVE-2023-52513</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52515.html">CVE-2023-52515</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52517.html">CVE-2023-52517</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52518.html">CVE-2023-52518</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52519.html">CVE-2023-52519</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52520.html">CVE-2023-52520</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52523.html">CVE-2023-52523</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52524.html">CVE-2023-52524</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52525.html">CVE-2023-52525</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52528.html">CVE-2023-52528</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52529.html">CVE-2023-52529</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52532.html">CVE-2023-52532</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52563.html">CVE-2023-52563</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52564.html">CVE-2023-52564</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52566.html">CVE-2023-52566</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52567.html">CVE-2023-52567</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52569.html">CVE-2023-52569</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52574.html">CVE-2023-52574</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52575.html">CVE-2023-52575</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52576.html">CVE-2023-52576</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52582.html">CVE-2023-52582</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52583.html">CVE-2023-52583</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52587.html">CVE-2023-52587</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52591.html">CVE-2023-52591</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52594.html">CVE-2023-52594</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52595.html">CVE-2023-52595</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52597.html">CVE-2023-52597</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52598.html">CVE-2023-52598</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52599.html">CVE-2023-52599</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52600.html">CVE-2023-52600</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52601.html">CVE-2023-52601</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52602.html">CVE-2023-52602</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52603.html">CVE-2023-52603</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52604.html">CVE-2023-52604</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52605.html">CVE-2023-52605</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52606.html">CVE-2023-52606</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52607.html">CVE-2023-52607</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52608.html">CVE-2023-52608</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52612.html">CVE-2023-52612</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52615.html">CVE-2023-52615</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52617.html">CVE-2023-52617</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52619.html">CVE-2023-52619</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52621.html">CVE-2023-52621</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52623.html">CVE-2023-52623</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52628.html">CVE-2023-52628</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52632.html">CVE-2023-52632</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52637.html">CVE-2023-52637</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52639.html">CVE-2023-52639</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-6356.html">CVE-2023-6356</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-6535.html">CVE-2023-6535</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-6536.html">CVE-2023-6536</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-7042.html">CVE-2023-7042</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-7192.html">CVE-2023-7192</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-0841.html">CVE-2024-0841</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-2201.html">CVE-2024-2201</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-22099.html">CVE-2024-22099</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-23307.html">CVE-2024-23307</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-25739.html">CVE-2024-25739</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26599.html">CVE-2024-26599</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26600.html">CVE-2024-26600</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26602.html">CVE-2024-26602</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26612.html">CVE-2024-26612</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26614.html">CVE-2024-26614</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26620.html">CVE-2024-26620</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26627.html">CVE-2024-26627</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26629.html">CVE-2024-26629</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26642.html">CVE-2024-26642</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26645.html">CVE-2024-26645</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26646.html">CVE-2024-26646</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26651.html">CVE-2024-26651</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26654.html">CVE-2024-26654</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26659.html">CVE-2024-26659</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26664.html">CVE-2024-26664</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26667.html">CVE-2024-26667</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26670.html">CVE-2024-26670</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26695.html">CVE-2024-26695</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26717.html">CVE-2024-26717</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-46925</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-46925</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-46926</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-46927</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-46927</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-46929</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-46929</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-46930</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-46930</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-46931</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-46931</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-46933</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-46933</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-46936</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-46936</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47082</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47087</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47093</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47094</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47095</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47096</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47097</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47099</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47100</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47101</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47102</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47104</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47105</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47107</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47108</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-4744</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-4744</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48626</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48626</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48629</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48630</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-0160</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-0160</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-28746</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-35827</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-4881</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-4881</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52447</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52447</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52450</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52450</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52454</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.5</span>
<span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52469</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52469</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52470</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52470</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52474</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52474</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52476</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52477</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52484</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52486</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52492</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.2</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52493</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52494</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52497</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52500</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52501</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52502</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52504</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52507</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.7</span>
<span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52508</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52509</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52510</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52511</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52513</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52515</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52517</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52518</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52519</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52520</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52523</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52524</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52525</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.5</span>
<span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52528</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.5</span>
<span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52529</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52532</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52563</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52564</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52566</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52567</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">2.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52569</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52574</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52575</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52576</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52582</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52583</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52587</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52591</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52594</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52595</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52597</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52598</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52603</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52605</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52606</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52607</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52608</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52612</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52615</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52617</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52619</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52621</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52623</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52628</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52632</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52637</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52639</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-6356</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.5</span>
<span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-6356</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-6535</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.5</span>
<span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-6535</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-6536</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.5</span>
<span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-6536</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-7042</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-7042</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-7192</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-7192</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-0841</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-0841</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-2201</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-22099</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-22099</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-23307</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-23307</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-25739</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-25739</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26599</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26599</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26600</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26600</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26602</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26602</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26612</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26614</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.9</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26627</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26629</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26642</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26645</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26646</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.9</span>
<span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26651</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.2</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26654</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26659</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26664</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26667</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26670</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26695</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26717</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">openSUSE Leap 15.5</li>
<li class="list-group-item">Public Cloud Module 15-SP5</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP5</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves 135 vulnerabilities, contains three features and has 29 security fixes can now be installed.</p>
<h2>Description:</h2>
<p>The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.</p>
<p>NOTE: This update has been retracted due to a bug in the BHI CPU sidechannel mitigation, which led to incorrect selection of other CPU mitigations.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2021-46925: Fixed kernel panic caused by race of smc_sock (bsc#1220466).</li>
<li>CVE-2021-46926: Fixed bug when detecting controllers in ALSA/hda/intel-sdw-acpi (bsc#1220478).</li>
<li>CVE-2021-46927: Fixed assertion bug in nitro_enclaves: Use get_user_pages_unlocked() (bsc#1220443).</li>
<li>CVE-2021-46929: Fixed use-after-free issue in sctp_sock_dump() (bsc#1220482).</li>
<li>CVE-2021-46930: Fixed usb/mtu3 list_head check warning (bsc#1220484).</li>
<li>CVE-2021-46931: Fixed wrong type casting in mlx5e_tx_reporter_dump_sq() (bsc#1220486).</li>
<li>CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).</li>
<li>CVE-2021-46936: Fixed use-after-free in tw_timer_handler() (bsc#1220439).</li>
<li>CVE-2021-47082: Fixed ouble free in tun_free_netdev() (bsc#1220969).</li>
<li>CVE-2021-47087: Fixed incorrect page free bug in tee/optee (bsc#1220954).</li>
<li>CVE-2021-47091: Fixed locking in ieee80211_start_ap()) error path (bsc#1220959).</li>
<li>CVE-2021-47093: Fixed memleak on registration failure in intel_pmc_core (bsc#1220978).</li>
<li>CVE-2021-47094: Fixed possible memory leak in KVM x86/mmu (bsc#1221551).</li>
<li>CVE-2021-47095: Fixed missing initialization in ipmi/ssif (bsc#1220979).</li>
<li>CVE-2021-47096: Fixed uninitalized user_pversion in ALSA rawmidi (bsc#1220981).</li>
<li>CVE-2021-47097: Fixed stack out of bound access in elantech_change_report_id() (bsc#1220982).</li>
<li>CVE-2021-47098: Fixed integer overflow/underflow in hysteresis calculations hwmon: (lm90) (bsc#1220983).</li>
<li>CVE-2021-47099: Fixed BUG_ON assertion in veth when skb entering GRO are cloned (bsc#1220955).</li>
<li>CVE-2021-47100: Fixed UAF when uninstall in ipmi (bsc#1220985).</li>
<li>CVE-2021-47101: Fixed uninit-value in asix_mdio_read() (bsc#1220987).</li>
<li>CVE-2021-47102: Fixed incorrect structure access In line: upper = info->upper_dev in net/marvell/prestera (bsc#1221009).</li>
<li>CVE-2021-47104: Fixed memory leak in qib_user_sdma_queue_pkts() (bsc#1220960).</li>
<li>CVE-2021-47105: Fixed potential memory leak in ice/xsk (bsc#1220961).</li>
<li>CVE-2021-47107: Fixed READDIR buffer overflow in NFSD (bsc#1220965).</li>
<li>CVE-2021-47108: Fixed possible NULL pointer dereference for mtk_hdmi_conf in drm/mediatek (bsc#1220986).</li>
<li>CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209635).</li>
<li>CVE-2022-48626: Fixed a potential use-after-free on remove path moxart (bsc#1220366).</li>
<li>CVE-2022-48629: Fixed possible memory leak in qcom-rng (bsc#1220989).</li>
<li>CVE-2022-48630: Fixed infinite loop on requests not multiple of WORD_SZ in crypto: qcom-rng (bsc#1220990).</li>
<li>CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system (bsc#1209657).</li>
<li>CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).</li>
<li>CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1212514).</li>
<li>CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221).</li>
<li>CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround (bsc#1220251).</li>
<li>CVE-2023-52450: Fixed NULL pointer dereference issue in upi_fill_topology() (bsc#1220237).</li>
<li>CVE-2023-52453: Fixed data corruption in hisi_acc_vfio_pci (bsc#1220337).</li>
<li>CVE-2023-52454: Fixed a kernel panic when host sends an invalid H2C PDU length (bsc#1220320).</li>
<li>CVE-2023-52469: Fixed a use-after-free in kv_parse_power_table (bsc#1220411).</li>
<li>CVE-2023-52470: Fixed null-ptr-deref in radeon_crtc_init() (bsc#1220413).</li>
<li>CVE-2023-52474: Fixed a vulnerability with non-PAGE_SIZE-end multi-iovec user SDMA requests (bsc#1220445).</li>
<li>CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI during vsyscall (bsc#1220703).</li>
<li>CVE-2023-52477: Fixed USB Hub accesses to uninitialized BOS descriptors (bsc#1220790).</li>
<li>CVE-2023-52481: Fixed speculative unprivileged load in Cortex-A520 (bsc#1220887).</li>
<li>CVE-2023-52484: Fixed a soft lockup triggered by arm_smmu_mm_invalidate_range (bsc#1220797).</li>
<li>CVE-2023-52486: Fixed possible use-after-free in drm (bsc#1221277).</li>
<li>CVE-2023-52492: Fixed a null-pointer-dereference in channel unregistration function __dma_async_device_channel_register() (bsc#1221276).</li>
<li>CVE-2023-52493: Fixed possible soft lockup in bus/mhi/host (bsc#1221274).</li>
<li>CVE-2023-52494: Fixed missing alignment check for event ring read pointer in bus/mhi/host (bsc#1221273).</li>
<li>CVE-2023-52497: Fixed data corruption in erofs (bsc#1220879).</li>
<li>CVE-2023-52500: Fixed information leaking when processing OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883).</li>
<li>CVE-2023-52501: Fixed possible memory corruption in ring-buffer (bsc#1220885).</li>
<li>CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220831).</li>
<li>CVE-2023-52504: Fixed possible out-of bounds in apply_alternatives() on a 5-level paging machine (bsc#1221553).</li>
<li>CVE-2023-52507: Fixed possible shift-out-of-bounds in nfc/nci (bsc#1220833).</li>
<li>CVE-2023-52508: Fixed null pointer dereference in nvme_fc_io_getuuid() (bsc#1221015).</li>
<li>CVE-2023-52509: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1220836).</li>
<li>CVE-2023-52510: Fixed a potential UAF in ca8210_probe() (bsc#1220898).</li>
<li>CVE-2023-52511: Fixed possible memory corruption in spi/sun6i (bsc#1221012).</li>
<li>CVE-2023-52513: Fixed connection failure handling in RDMA/siw (bsc#1221022).</li>
<li>CVE-2023-52515: Fixed possible use-after-free in RDMA/srp (bsc#1221048).</li>
<li>CVE-2023-52517: Fixed race between DMA RX transfer completion and RX FIFO drain in spi/sun6i (bsc#1221055).</li>
<li>CVE-2023-52518: Fixed information leak in bluetooth/hci_codec (bsc#1221056).</li>
<li>CVE-2023-52519: Fixed possible overflow in HID/intel-ish-hid/ipc (bsc#1220920).</li>
<li>CVE-2023-52520: Fixed reference leak in platform/x86/think-lmi (bsc#1220921).</li>
<li>CVE-2023-52523: Fixed wrong redirects to non-TCP sockets in bpf (bsc#1220926).</li>
<li>CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927).</li>
<li>CVE-2023-52525: Fixed out of bounds check mwifiex_process_rx_packet() (bsc#1220840).</li>
<li>CVE-2023-52528: Fixed uninit-value access in __smsc75xx_read_reg() (bsc#1220843).</li>
<li>CVE-2023-52529: Fixed a potential memory leak in sony_probe() (bsc#1220929).</li>
<li>CVE-2023-52532: Fixed a bug in TX CQE error handling (bsc#1220932).</li>
<li>CVE-2023-52563: Fixed memory leak on ->hpd_notify callback() in drm/meson (bsc#1220937).</li>
<li>CVE-2023-52564: Reverted invalid fix for UAF in gsm_cleanup_mux() (bsc#1220938).</li>
<li>CVE-2023-52566: Fixed potential use after free in nilfs_gccache_submit_read_data() (bsc#1220940).</li>
<li>CVE-2023-52567: Fixed possible Oops in serial/8250_port: when using IRQ polling (irq = 0) (bsc#1220839).</li>
<li>CVE-2023-52569: Fixed a bug in btrfs by remoning BUG() after failure to insert delayed dir index item (bsc#1220918).</li>
<li>CVE-2023-52574: Fixed a bug by hiding new member header_ops (bsc#1220870).</li>
<li>CVE-2023-52575: Fixed SBPB enablement for spec_rstack_overflow=off (bsc#1220871).</li>
<li>CVE-2023-52576: Fixed potential use after free in memblock_isolate_range() (bsc#1220872).</li>
<li>CVE-2023-52582: Fixed possible oops in netfs (bsc#1220878).</li>
<li>CVE-2023-52583: Fixed deadlock or deadcode of misusing dget() inside ceph (bsc#1221058).</li>
<li>CVE-2023-52587: Fixed mcast list locking in IB/ipoib (bsc#1221082).</li>
<li>CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).</li>
<li>CVE-2023-52594: Fixed potential array-index-out-of-bounds read in ath9k_htc_txstatus() (bsc#1221045).</li>
<li>CVE-2023-52595: Fixed possible deadlock in wifi/rt2x00 (bsc#1221046).</li>
<li>CVE-2023-52597: Fixed a setting of fpc register in KVM (bsc#1221040).</li>
<li>CVE-2023-52598: Fixed wrong setting of fpc register in s390/ptrace (bsc#1221060).</li>
<li>CVE-2023-52599: Fixed array-index-out-of-bounds in diNewExt() in jfs (bsc#1221062).</li>
<li>CVE-2023-52600: Fixed uaf in jfs_evict_inode() (bsc#1221071).</li>
<li>CVE-2023-52601: Fixed array-index-out-of-bounds in dbAdjTree() in jfs (bsc#1221068).</li>
<li>CVE-2023-52602: Fixed slab-out-of-bounds Read in dtSearch() in jfs (bsc#1221070).</li>
<li>CVE-2023-52603: Fixed array-index-out-of-bounds in dtSplitRoot() (bsc#1221066).</li>
<li>CVE-2023-52604: Fixed array-index-out-of-bounds in dbAdjTree() (bsc#1221067).</li>
<li>CVE-2023-52605: Fixed a NULL pointer dereference check (bsc#1221039)</li>
<li>CVE-2023-52606: Fixed possible kernel stack corruption in powerpc/lib (bsc#1221069).</li>
<li>CVE-2023-52607: Fixed a null-pointer-dereference in pgtable_cache_add kasprintf() (bsc#1221061).</li>
<li>CVE-2023-52608: Fixed possible race condition in firmware/arm_scmi (bsc#1221375).</li>
<li>CVE-2023-52612: Fixed req->dst buffer overflow in crypto/scomp (bsc#1221616).</li>
<li>CVE-2023-52615: Fixed page fault dead lock on mmap-ed hwrng (bsc#1221614).</li>
<li>CVE-2023-52617: Fixed stdev_release() crash after surprise hot remove (bsc#1221613).</li>
<li>CVE-2023-52619: Fixed possible crash when setting number of cpus to an odd number in pstore/ram (bsc#1221618).</li>
<li>CVE-2023-52621: Fixed missing asserion in bpf (bsc#1222073).</li>
<li>CVE-2023-52623: Fixed suspicious RCU usage in SUNRPC (bsc#1222060).</li>
<li>CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222117).</li>
<li>CVE-2023-52632: Fixed lock dependency warning with srcu in drm/amdkfd (bsc#1222274).</li>
<li>CVE-2023-52637: Fixed UAF in j1939_sk_match_filter() in can/k1939 (bsc#1222291).</li>
<li>CVE-2023-52639: Fixed race during shadow creation in KVM/s390/vsie Fixed (bsc#1222300).</li>
<li>CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).</li>
<li>CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).</li>
<li>CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).</li>
<li>CVE-2023-7042: Fixed a null-pointer-dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).</li>
<li>CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c (bsc#1218479).</li>
<li>CVE-2024-0841: Fixed null pointer dereference in hugetlbfs_fill_super() (bsc#1219264).</li>
<li>CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).</li>
<li>CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170).</li>
<li>CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).</li>
<li>CVE-2024-25739: Fixed possible crash in create_empty_lvol() in drivers/mtd/ubi/vtbl.c (bsc#1219834).</li>
<li>CVE-2024-26599: Fixed out-of-bounds access in of_pwm_single_xlate() (bsc#1220365).</li>
<li>CVE-2024-26600: Fixed NULL pointer dereference for SRP in phy-omap-usb2 (bsc#1220340).</li>
<li>CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).</li>
<li>CVE-2024-26612: Fixed Oops in fscache_put_cache() This function dereferences (bsc#1221291).</li>
<li>CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks (bsc#1221293).</li>
<li>CVE-2024-26620: Fixed possible device model violation in s390/vfio-ap (bsc#1221298).</li>
<li>CVE-2024-26627: Fixed possible hard lockup in scsi (bsc#1221090).</li>
<li>CVE-2024-26629: Fixed possible protocol violation via RELEASE_LOCKOWNER in nfsd (bsc#1221379).</li>
<li>CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter nf_tables (bsc#1221830).</li>
<li>CVE-2024-26645: Fixed missing visibility when inserting an element into tracing_map (bsc#1222056).</li>
<li>CVE-2024-26646: Fixed potential memory corruption when resuming from suspend or hibernation in thermal/intel/hfi (bsc#1222070).</li>
<li>CVE-2024-26651: Fixed possible oops via malicious devices in sr9800 (bsc#1221337).</li>
<li>CVE-2024-26654: Fixed use after free in ALSA/sh/aica (bsc#1222304).</li>
<li>CVE-2024-26659: Fixed wrong handling of isoc Babble and Buffer Overrun events in xhci (bsc#1222317).</li>
<li>CVE-2024-26664: Fixed out-of-bounds memory access in create_core_data() in hwmon coretemp (bsc#1222355).</li>
<li>CVE-2024-26667: Fixed null pointer reference in dpu_encoder_helper_phys_cleanup in drm/msm/dpu (bsc#1222331).</li>
<li>CVE-2024-26670: Fixed ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD workaround in kernel arm64 (bsc#1222356).</li>
<li>CVE-2024-26695: Fixed null pointer dereference in __sev_platform_shutdown_locked in crypto ccp (bsc#1222373).</li>
<li>CVE-2024-26717: Fixed null pointer dereference on failed power up in HID i2c-hid-of (bsc#1222360).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>Revert "PCI: tegra194: Enable support for 256 Byte payload" (git-fixes).</li>
<li>Revert "Revert "drm/amdgpu/display: change pipe policy for DCN 2.0"" (git-fixes).</li>
<li>Revert "SUNRPC dont update timeout value on connection reset" (git-fixes).</li>
<li>Revert "drm/amd: Disable PSR-SU on Parade 0803 TCON" (git-fixes).</li>
<li>Revert "drm/amd: Disable S/G for APUs when 64GB or more host memory" (git-fixes).</li>
<li>Revert "drm/amdgpu/display: change pipe policy for DCN 2.0" (git-fixes).</li>
<li>Revert "drm/amdgpu/display: change pipe policy for DCN 2.1" (git-fixes).</li>
<li>Revert "drm/vc4: hdmi: Enforce the minimum rate at runtime_resume" (git-fixes).</li>
<li>Revert "fbdev: flush deferred IO before closing (git-fixes)." (bsc#1221814)</li>
<li>acpi: CPPC: enable AMD CPPC V2 support for family 17h processors (git-fixes).</li>
<li>acpi: processor_idle: Fix memory leak in acpi_processor_power_exit() (git-fixes).</li>
<li>acpi: resource: Add Infinity laptops to irq1_edge_low_force_override (stable-fixes).</li>
<li>acpi: resource: Add MAIBENBEN X577 to irq1_edge_low_force_override (git-fixes).</li>
<li>acpi: resource: Do IRQ override on Lunnen Ground laptops (stable-fixes).</li>
<li>acpi: scan: Fix device check notification handling (git-fixes).</li>
<li>acpica: debugger: check status of acpi_evaluate_object() in acpi_db_walk_for_fields() (git-fixes).</li>
<li>alsa: aaci: Delete unused variable in aaci_do_suspend (git-fixes).</li>
<li>alsa: aoa: avoid false-positive format truncation warning (git-fixes).</li>
<li>alsa: aw2: avoid casting function pointers (git-fixes).</li>
<li>alsa: ctxfi: avoid casting function pointers (git-fixes).</li>
<li>alsa: hda/realtek - ALC285 reduce pop noise from Headphone port (stable-fixes).</li>
<li>alsa: hda/realtek - Add Headset Mic supported Acer NB platform (stable-fixes).</li>
<li>alsa: hda/realtek - Fix headset Mic no show at resume back for Lenovo ALC897 platform (git-fixes).</li>
<li>alsa: hda/realtek: Enable Mute LED on HP 840 G8 (MB 8AB8) (git-fixes).</li>
<li>alsa: hda/realtek: Update Panasonic CF-SZ6 quirk to support headset with microphone (git-fixes).</li>
<li>alsa: hda/realtek: fix ALC285 issues on HP Envy x360 laptops (stable-fixes).</li>
<li>alsa: hda/realtek: fix mute/micmute LED For HP mt440 (git-fixes).</li>
<li>alsa: hda/realtek: fix mute/micmute LEDs for HP EliteBook (stable-fixes).</li>
<li>alsa: seq: fix function cast warnings (git-fixes).</li>
<li>alsa: sh: aica: reorder cleanup operations to avoid UAF bugs (git-fixes).</li>
<li>alsa: usb-audio: Stop parsing channels bits when all channels are found (git-fixes).</li>
<li>arm64: dts: allwinner: h6: Add RX DMA channel for SPDIF (git-fixes)</li>
<li>arm64: dts: broadcom: bcmbca: bcm4908: drop invalid switch cells (git-fixes)</li>
<li>arm64: dts: imx8mm-kontron: Add support for ultra high speed modes on (git-fixes)</li>
<li>arm64: dts: imx8mm-venice-gw71xx: fix USB OTG VBUS (git-fixes)</li>
<li>arm64: dts: marvell: reorder crypto interrupts on Armada SoCs (git-fixes)</li>
<li>arm64: dts: rockchip: add ES8316 codec for ROCK Pi 4 (git-fixes)</li>
<li>arm64: dts: rockchip: add SPDIF node for ROCK Pi 4 (git-fixes)</li>
<li>arm64: dts: rockchip: fix regulator name on rk3399-rock-4 (git-fixes)</li>
<li>arm64: dts: rockchip: set num-cs property for spi on px30 (git-fixes)</li>
<li>arm64: mm: fix VA-range sanity check (git-fixes)</li>
<li>arm64: set __exception_irq_entry with __irq_entry as a default (git-fixes)</li>
<li>asoc: Intel: bytcr_rt5640: Add an extra entry for the Chuwi Vi8 tablet (stable-fixes).</li>
<li>asoc: amd: acp: Add missing error handling in sof-mach (git-fixes).</li>
<li>asoc: amd: acp: fix for acp_init function error handling (git-fixes).</li>
<li>asoc: madera: Fix typo in madera_set_fll_clks shift value (git-fixes).</li>
<li>asoc: meson: Use dev_err_probe() helper (stable-fixes).</li>
<li>asoc: meson: aiu: fix function pointer type mismatch (git-fixes).</li>
<li>asoc: meson: axg-tdm-interface: add frame rate constraint (git-fixes).</li>
<li>asoc: meson: axg-tdm-interface: fix mclk setup without mclk-fs (git-fixes).</li>
<li>asoc: meson: t9015: fix function pointer type mismatch (git-fixes).</li>
<li>asoc: ops: Fix wraparound for mask in snd_soc_get_volsw (git-fixes).</li>
<li>asoc: rcar: adg: correct TIMSEL setting for SSI9 (git-fixes).</li>
<li>asoc: rt5645: Make LattePanda board DMI match more precise (stable-fixes).</li>
<li>asoc: rt5682-sdw: fix locking sequence (git-fixes).</li>
<li>asoc: rt711-sdca: fix locking sequence (git-fixes).</li>
<li>asoc: rt711-sdw: fix locking sequence (git-fixes).</li>
<li>asoc: wm8962: Enable both SPKOUTR_ENA and SPKOUTL_ENA in mono mode (stable-fixes).</li>
<li>asoc: wm8962: Enable oscillator if selecting WM8962_FLL_OSC (stable-fixes).</li>
<li>asoc: wm8962: Fix up incorrect error message in wm8962_set_fll (stable-fixes).</li>
<li>ata: sata_mv: Fix PCI device ID table declaration compilation warning (git-fixes).</li>
<li>ata: sata_sx4: fix pdc20621_get_from_dimm() on 64-bit (git-fixes).</li>
<li>backlight: da9052: Fully initialize backlight_properties during probe (git-fixes).</li>
<li>backlight: lm3630a: Do not set bl->props.brightness in get_brightness (git-fixes).</li>
<li>backlight: lm3630a: Initialize backlight_properties on init (git-fixes).</li>
<li>backlight: lm3639: Fully initialize backlight_properties during probe (git-fixes).</li>
<li>backlight: lp8788: Fully initialize backlight_properties during probe (git-fixes).</li>
<li>blocklayoutdriver: Fix reference leak of pnfs_device_node (git-fixes).</li>
<li>bluetooth: hci_core: Fix possible buffer overflow (git-fixes).</li>
<li>bluetooth: mgmt: Remove leftover queuing of power_off work (git-fixes).</li>
<li>bluetooth: remove HCI_POWER_OFF_TIMEOUT (git-fixes).</li>
<li>bluetooth: remove superfluous call to hci_conn_check_pending() (git-fixes).</li>
<li>bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security (stable-fixes).</li>
<li>bpf, scripts: Correct GPL license name (git-fixes).</li>
<li>bpf, sockmap: Fix preempt_rt splat when using raw_spin_lock_t (git-fixes).</li>
<li>can: softing: remove redundant NULL check (git-fixes).</li>
<li>clk: zynq: Prevent null pointer dereference caused by kmalloc failure (git-fixes).</li>
<li>comedi: comedi_test: Prevent timers rescheduling during deletion (git-fixes).</li>
<li>coresight: etm4x: Do not access TRCIDR1 for identification (bsc#1220775)</li>
<li>coresight: etm4x: Fix accesses to TRCSEQRSTEVR and TRCSEQSTR (bsc#1220775)</li>
<li>coresight: etm: Override TRCIDR3.CCITMIN on errata affected cpus (bsc#1220775)</li>
<li>cpufreq: amd-pstate: Fix min_perf assignment in amd_pstate_adjust_perf() (git-fixes).</li>
<li>cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value (git-fixes).</li>
<li>crypto: arm/sha - fix function cast warnings (git-fixes).</li>
<li>crypto: qat - avoid division by zero (git-fixes).</li>
<li>crypto: qat - fix deadlock in backlog processing (git-fixes).</li>
<li>crypto: qat - fix double free during reset (git-fixes).</li>
<li>crypto: qat - fix state machines cleanup paths (bsc#1218321).</li>
<li>crypto: qat - fix unregistration of compression algorithms (git-fixes).</li>
<li>crypto: qat - fix unregistration of crypto algorithms (git-fixes).</li>
<li>crypto: qat - ignore subsequent state up commands (git-fixes).</li>
<li>crypto: qat - increase size of buffers (git-fixes).</li>
<li>crypto: qat - resolve race condition during AER recovery (git-fixes).</li>
<li>crypto: xilinx - call finalize with bh disabled (git-fixes).</li>
<li>doc-guide: kernel-doc: tell about object-like macros (git-fixes).</li>
<li>doc/README.SUSE: Update information about module support status (jsc#PED-5759)</li>
<li>drivers: hv: vmbus: Calculate ring buffer size for more efficient use of memory (git-fixes).</li>
<li>drm/amd/display: Add FAMS validation before trying to use it (git-fixes).</li>
<li>drm/amd/display: Add function for validate and update new stream (git-fixes).</li>
<li>drm/amd/display: Avoid ABM when ODM combine is enabled for eDP (git-fixes).</li>
<li>drm/amd/display: Blocking invalid 420 modes on HDMI TMDS for DCN31 (git-fixes).</li>
<li>drm/amd/display: Check if link state is valid (git-fixes).</li>
<li>drm/amd/display: Copy DC context in the commit streams (git-fixes).</li>
<li>drm/amd/display: Disable PSR-SU on Parade 0803 TCON again (git-fixes).</li>
<li>drm/amd/display: Enable fast plane updates on DCN3.2 and above (git-fixes).</li>
<li>drm/amd/display: Enable new commit sequence only for DCN32x (git-fixes).</li>
<li>drm/amd/display: Exit idle optimizations before attempt to access PHY (git-fixes).</li>
<li>drm/amd/display: Expand kernel doc for DC (git-fixes).</li>
<li>drm/amd/display: Fix a bug when searching for insert_above_mpcc (git-fixes).</li>
<li>drm/amd/display: Fix a potential buffer overflow in 'dp_dsc_clock_en_read()' (git-fixes).</li>
<li>drm/amd/display: Fix possible underflow for displays with large vblank (git-fixes).</li>
<li>drm/amd/display: Fix the delta clamping for shaper LUT (git-fixes).</li>
<li>drm/amd/display: Fix underflow issue on 175hz timing (git-fixes).</li>
<li>drm/amd/display: For prefetch mode > 0, extend prefetch if possible (git-fixes).</li>
<li>drm/amd/display: Guard DCN31 PHYD32CLK logic against chip family (git-fixes).</li>
<li>drm/amd/display: Guard against invalid RPTR/WPTR being set (git-fixes).</li>
<li>drm/amd/display: Handle seamless boot stream (git-fixes).</li>
<li>drm/amd/display: Handle virtual hardware detect (git-fixes).</li>
<li>drm/amd/display: Include surface of unaffected streams (git-fixes).</li>
<li>drm/amd/display: Include udelay when waiting for INBOX0 ACK (git-fixes).</li>
<li>drm/amd/display: Increase frame warning limit with KASAN or KCSAN in dml (git-fixes).</li>
<li>drm/amd/display: Keep PHY active for dp config (git-fixes).</li>
<li>drm/amd/display: Prevent vtotal from being set to 0 (git-fixes).</li>
<li>drm/amd/display: Remove min_dst_y_next_start check for Z8 (git-fixes).</li>
<li>drm/amd/display: Restore rptr/wptr for DMCUB as workaround (git-fixes).</li>
<li>drm/amd/display: Return the correct HDCP error code (stable-fixes).</li>
<li>drm/amd/display: Revert vblank change that causes null pointer crash (git-fixes).</li>
<li>drm/amd/display: Rework comments on dc file (git-fixes).</li>
<li>drm/amd/display: Rework context change check (git-fixes).</li>
<li>drm/amd/display: Set minimum requirement for using PSR-SU on Phoenix (git-fixes).</li>
<li>drm/amd/display: Set minimum requirement for using PSR-SU on Rembrandt (git-fixes).</li>
<li>drm/amd/display: Update OTG instance in the commit stream (git-fixes).</li>
<li>drm/amd/display: Update correct DCN314 register header (git-fixes).</li>
<li>drm/amd/display: Update min Z8 residency time to 2100 for DCN314 (git-fixes).</li>
<li>drm/amd/display: Use DRAM speed from validation for dummy p-state (git-fixes).</li>
<li>drm/amd/display: Use DTBCLK as refclk instead of DPREFCLK (git-fixes).</li>
<li>drm/amd/display: Use min transition for all SubVP plane add/remove (git-fixes).</li>
<li>drm/amd/display: Write to correct dirty_rect (git-fixes).</li>
<li>drm/amd/display: Wrong colorimetry workaround (git-fixes).</li>
<li>drm/amd/display: add FB_DAMAGE_CLIPS support (git-fixes).</li>
<li>drm/amd/display: add ODM case when looking for first split pipe (git-fixes).</li>
<li>drm/amd/display: always switch off ODM before committing more streams (git-fixes).</li>
<li>drm/amd/display: clean code-style issues in dcn30_set_mpc_shaper_3dlut (git-fixes).</li>
<li>drm/amd/display: dc.h: eliminate kernel-doc warnings (git-fixes).</li>
<li>drm/amd/display: ensure async flips are only accepted for fast updates (git-fixes).</li>
<li>drm/amd/display: fix ABM disablement (git-fixes).</li>
<li>drm/amd/display: fix a NULL pointer dereference in amdgpu_dm_i2c_xfer() (git-fixes).</li>
<li>drm/amd/display: fix dc/core/dc.c kernel-doc (git-fixes).</li>
<li>drm/amd/display: fix hw rotated modes when PSR-SU is enabled (git-fixes).</li>
<li>drm/amd/display: fix kernel-doc issues in dc.h (git-fixes).</li>
<li>drm/amd/display: fix unbounded requesting for high pixel rate modes on dcn315 (git-fixes).</li>
<li>drm/amd/display: handle range offsets in VRR ranges (stable-fixes).</li>
<li>drm/amd/display: perform a bounds check before filling dirty rectangles (git-fixes).</li>
<li>drm/amd/display: set per pipe dppclk to 0 when dpp is off (git-fixes).</li>
<li>drm/amd/display: update extended blank for dcn314 onwards (git-fixes).</li>
<li>drm/amd/display: use low clocks for no plane configs (git-fixes).</li>
<li>drm/amd/pm: Fix error of MACO flag setting code (git-fixes).</li>
<li>drm/amd/pm: fix a memleak in aldebaran_tables_init (git-fixes).</li>
<li>drm/amd/smu: use AverageGfxclkFrequency* to replace previous GFX Curr Clock (git-fixes).</li>
<li>drm/amd: Enable PCIe PME from D3 (git-fixes).</li>
<li>drm/amdgpu/pm: Fix the error of pwm1_enable setting (stable-fixes).</li>
<li>drm/amdgpu/pm: make gfxclock consistent for sienna cichlid (git-fixes).</li>
<li>drm/amdgpu/pm: make mclk consistent for smu 13.0.7 (git-fixes).</li>
<li>drm/amdgpu/smu13: drop compute workload workaround (git-fixes).</li>
<li>drm/amdgpu: Enable gpu reset for S3 abort cases on Raven series (stable-fixes).</li>
<li>drm/amdgpu: Fix missing break in ATOM_ARG_IMM Case of atom_get_src_int() (git-fixes).</li>
<li>drm/amdgpu: Force order between a read and write to the same address (git-fixes).</li>
<li>drm/amdgpu: Match against exact bootloader status (git-fixes).</li>
<li>drm/amdgpu: Unset context priority is now invalid (git-fixes).</li>
<li>drm/amdgpu: Update min() to min_t() in 'amdgpu_info_ioctl' (git-fixes).</li>
<li>drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag (stable-fixes).</li>
<li>drm/amdgpu: lower CS errors to debug severity (git-fixes).</li>
<li>drm/amdkfd: fix TLB flush after unmap for GFX9.4.2 (stable-fixes).</li>
<li>drm/bridge: tc358762: Instruct DSI host to generate HSE packets (git-fixes).</li>
<li>drm/display: fix typo (git-fixes).</li>
<li>drm/edid: Add quirk for OSVR HDK 2.0 (git-fixes).</li>
<li>drm/etnaviv: Restore some id values (git-fixes).</li>
<li>drm/exynos: do not return negative values from .get_modes() (stable-fixes).</li>
<li>drm/exynos: fix a possible null-pointer dereference due to data race in exynos_drm_crtc_atomic_disable() (git-fixes).</li>
<li>drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode() (stable-fixes).</li>
<li>drm/i915/gt: Do not generate the command streamer for all the CCS (git-fixes).</li>
<li>drm/i915/gt: Reset queue_priority_hint on parking (git-fixes).</li>
<li>drm/i915/gt: Use i915_vm_put on ppgtt_create error paths (git-fixes).</li>
<li>drm/i915/selftests: Fix dependency of some timeouts on HZ (git-fixes).</li>
<li>drm/i915: Add missing CCS documentation (git-fixes).</li>
<li>drm/i915: Call intel_pre_plane_updates() also for pipes getting enabled (git-fixes).</li>
<li>drm/i915: Check before removing mm notifier (git-fixes).</li>
<li>drm/lima: fix a memleak in lima_heap_alloc (git-fixes).</li>
<li>drm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip (git-fixes).</li>
<li>drm/mediatek: dsi: Fix DSI RGB666 formats and definitions (git-fixes).</li>
<li>drm/msm/dpu: Only enable DSC_MODE_MULTIPLEX if dsc_merge is enabled (git-fixes).</li>
<li>drm/msm/dpu: add division of drm_display_mode's hskew parameter (git-fixes).</li>
<li>drm/msm/dpu: fix the programming of INTF_CFG2_DATA_HCTL_EN (git-fixes).</li>
<li>drm/msm/dpu: improve DSC allocation (git-fixes).</li>
<li>drm/panel-edp: use put_sync in unprepare (git-fixes).</li>
<li>drm/panel: Move AUX B116XW03 out of panel-edp back to panel-simple (git-fixes).</li>
<li>drm/panel: auo,b101uan08.3: Fine tune the panel power sequence (git-fixes).</li>
<li>drm/panel: boe-tv101wum-nl6: Fine tune the panel power sequence (git-fixes).</li>
<li>drm/panel: do not return negative error codes from drm_panel_get_modes() (stable-fixes).</li>
<li>drm/panfrost: fix power transition timeout warnings (git-fixes).</li>
<li>drm/probe-helper: warn about negative .get_modes() (stable-fixes).</li>
<li>drm/qxl: remove unused <code>count</code> variable from <code>qxl_surface_id_alloc()</code> (git-fixes).</li>
<li>drm/qxl: remove unused variable from <code>qxl_process_single_command()</code> (git-fixes).</li>
<li>drm/radeon/ni: Fix wrong firmware size logging in ni_init_microcode() (git-fixes).</li>
<li>drm/radeon/ni_dpm: remove redundant NULL check (git-fixes).</li>
<li>drm/radeon: remove dead code in ni_mc_load_microcode() (git-fixes).</li>
<li>drm/rockchip: dsi: Clean up 'usage_mode' when failing to attach (git-fixes).</li>
<li>drm/rockchip: inno_hdmi: Fix video timing (git-fixes).</li>
<li>drm/rockchip: lvds: do not overwrite error code (git-fixes).</li>
<li>drm/rockchip: lvds: do not print scary message when probing defer (git-fixes).</li>
<li>drm/tegra: dpaux: Fix PM disable depth imbalance in tegra_dpaux_probe (git-fixes).</li>
<li>drm/tegra: dsi: Add missing check for of_find_device_by_node (git-fixes).</li>
<li>drm/tegra: dsi: Fix missing pm_runtime_disable() in the error handling path of tegra_dsi_probe() (git-fixes).</li>
<li>drm/tegra: dsi: Fix some error handling paths in tegra_dsi_probe() (git-fixes).</li>
<li>drm/tegra: dsi: Make use of the helper function dev_err_probe() (stable-fixes).</li>
<li>drm/tegra: hdmi: Convert to devm_platform_ioremap_resource() (stable-fixes).</li>
<li>drm/tegra: hdmi: Fix some error handling paths in tegra_hdmi_probe() (git-fixes).</li>
<li>drm/tegra: output: Fix missing i2c_put_adapter() in the error handling paths of tegra_output_probe() (git-fixes).</li>
<li>drm/tegra: put drm_gem_object ref on error in tegra_fb_create (git-fixes).</li>
<li>drm/tegra: rgb: Fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe() (git-fixes).</li>
<li>drm/tegra: rgb: Fix some error handling paths in tegra_dc_rgb_probe() (git-fixes).</li>
<li>drm/tidss: Fix initial plane zpos values (git-fixes).</li>
<li>drm/tidss: Fix sync-lost issue with two displays (git-fixes).</li>
<li>drm/ttm: Do not leak a resource on eviction error (git-fixes).</li>
<li>drm/ttm: Do not print error message if eviction was interrupted (git-fixes).</li>
<li>drm/vc4: Add module dependency on hdmi-codec (git-fixes).</li>
<li>drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed (git-fixes).</li>
<li>drm/vmwgfx: Fix possible null pointer derefence with invalid contexts (git-fixes).</li>
<li>drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node (git-fixes).</li>
<li>drm: Do not treat 0 as -1 in drm_fixp2int_ceil (git-fixes).</li>
<li>drm: Fix drm_fixp2int_round() making it add 0.5 (git-fixes).</li>
<li>drm: panel-orientation-quirks: Add quirk for Acer Switch V 10 (SW5-017) (git-fixes).</li>
<li>firewire: core: use long bus reset on gap count error (stable-fixes).</li>
<li>fix "coresight: etm4x: Change etm4_platform_driver driver for MMIO devices" (bsc#1220775) Hunk with clk_put(drvdata->pclk) was incorrectly moved to another function.</li>
<li>force config_TCG_TIS_CORE=m on aarch64 for workaround kconfig issues</li>
<li>group-source-files.pl: Quote filenames (boo#1221077). The kernel source now contains a file with a space in the name. Add quotes in group-source-files.pl to avoid splitting the filename. Also use -print0 / -0 when updating timestamps.</li>
<li>hid: amd_sfh: Update HPD sensor structure elements (git-fixes).</li>
<li>hid: lenovo: Add middleclick_workaround sysfs knob for cptkbd (git-fixes).</li>
<li>hid: multitouch: Add required quirk for Synaptics 0xcddc device (stable-fixes).</li>
<li>hv_netvsc: Calculate correct ring size when PAGE_SIZE is not 4 Kbytes (git-fixes).</li>
<li>hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove (git-fixes).</li>
<li>hv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed (git-fixes).</li>
<li>i2c: aspeed: Fix the dummy irq expected print (git-fixes).</li>
<li>i2c: i801: Avoid potential double call to gpiod_remove_lookup_table (git-fixes).</li>
<li>i2c: wmt: Fix an error handling path in wmt_i2c_probe() (git-fixes).</li>
<li>ib/ipoib: fix mcast list locking (git-fixes)</li>
<li>iio: dummy_evgen: remove Excess kernel-doc comments (git-fixes).</li>
<li>iio: pressure: dlhl60d: Initialize empty DLH bytes (git-fixes).</li>
<li>input: gpio_keys_polled - suppress deferred probe error for gpio (stable-fixes).</li>
<li>input: synaptics-rmi4 - fix UAF of IRQ domain on driver removal (git-fixes).</li>
<li>iommu/amd: Mark interrupt as managed (git-fixes).</li>
<li>iommu/dma: Trace bounce buffer usage when mapping buffers (git-fixes).</li>
<li>iommu/mediatek-v1: Fix an error handling path in mtk_iommu_v1_probe() (git-fixes).</li>
<li>iommu/mediatek: Fix forever loop in error handling (git-fixes).</li>
<li>iommu/vt-d: Allow to use flush-queue when first level is default (git-fixes).</li>
<li>iommu/vt-d: Do not issue ATS Invalidation request when device is disconnected (git-fixes).</li>
<li>iommu/vt-d: Fix PASID directory pointer coherency (git-fixes).</li>
<li>iommu/vt-d: Set No Execute Enable bit in PASID table entry (git-fixes).</li>
<li>kABI: PCI: Add locking to RMW PCI Express Capability Register accessors (kabi).</li>
<li>kconfig: fix infinite loop when expanding a macro at the end of file (git-fixes).</li>
<li>kernel-binary: Fix i386 build Fixes: 89eaf4cdce05 ("rpm templates: Move macro definitions below buildrequires")</li>
<li>kernel-binary: Move build script to the end All other spec templates have the build script at the end, only kernel-binary has it in the middle. Align with the other templates.</li>
<li>kernel-binary: certs: Avoid trailing space</li>
<li>kernel-binary: vdso: fix filelist for non-usrmerged kernel Fixes: a6ad8af207e6 ("rpm templates: Always define usrmerged")</li>
<li>kvm: s390: only deliver the set service event bits (git-fixes bsc#1221631).</li>
<li>leds: aw2013: Unlock mutex before destroying it (git-fixes).</li>
<li>lib/cmdline: Fix an invalid format specifier in an assertion msg (git-fixes).</li>
<li>make nvidia Grace-Hopper TPM related drivers build-ins (bsc#1221156)</li>
<li>md: fix data corruption for raid456 when reshape restart while grow up (git-fixes).</li>
<li>media: dvb-frontends: avoid stack overflow warnings with clang (git-fixes).</li>
<li>media: edia: dvbdev: fix a use-after-free (git-fixes).</li>
<li>media: em28xx: annotate unchecked call to media_device_register() (git-fixes).</li>
<li>media: go7007: add check of return value of go7007_read_addr() (git-fixes).</li>
<li>media: go7007: fix a memleak in go7007_load_encoder (git-fixes).</li>
<li>media: imx: csc/scaler: fix v4l2_ctrl_handler memory leak (git-fixes).</li>
<li>media: pvrusb2: fix pvr2_stream_callback casts (git-fixes).</li>
<li>media: pvrusb2: fix uaf in pvr2_context_set_notify (git-fixes).</li>
<li>media: pvrusb2: remove redundant NULL check (git-fixes).</li>
<li>media: staging: ipu3-imgu: Set fields before media_entity_pads_init() (git-fixes).</li>
<li>media: sun8i-di: Fix chroma difference threshold (git-fixes).</li>
<li>media: sun8i-di: Fix coefficient writes (git-fixes).</li>
<li>media: sun8i-di: Fix power on/off sequences (git-fixes).</li>
<li>media: tc358743: register v4l2 async device only after successful setup (git-fixes).</li>
<li>media: ttpci: fix two memleaks in budget_av_attach (git-fixes).</li>
<li>media: usbtv: Remove useless locks in usbtv_video_free() (git-fixes).</li>
<li>media: v4l2-mem2mem: fix a memleak in v4l2_m2m_register_entity (git-fixes).</li>
<li>media: v4l2-tpg: fix some memleaks in tpg_alloc (git-fixes).</li>
<li>media: xc4000: Fix atomicity violation in xc4000_get_frequency (git-fixes).</li>
<li>mfd: altera-sysmgr: Call of_node_put() only when of_parse_phandle() takes a ref (git-fixes).</li>
<li>mfd: syscon: Call of_node_put() only when of_parse_phandle() takes a ref (git-fixes).</li>
<li>mm,page_owner: Defer enablement of static branch (bsc#1222366).</li>
<li>mm,page_owner: Fix accounting of pages when migrating (bsc#1222366).</li>
<li>mm,page_owner: Fix printing of stack records (bsc#1222366).</li>
<li>mm,page_owner: Fix refcount imbalance (bsc#1222366).</li>
<li>mm,page_owner: Update metadata for tail pages (bsc#1222366).</li>
<li>mm,page_owner: check for null stack_record before bumping its refcount (bsc#1222366).</li>
<li>mm,page_owner: drop unnecessary check (bsc#1222366).</li>
<li>mm,page_owner: fix recursion (bsc#1222366).</li>
<li>mmc: core: Avoid negative index with array access (git-fixes).</li>
<li>mmc: core: Fix switch on gp3 partition (git-fixes).</li>
<li>mmc: core: Initialize mmc_blk_ioc_data (git-fixes).</li>
<li>mmc: mmci: stm32: fix DMA API overlapping mappings warning (git-fixes).</li>
<li>mmc: mmci: stm32: use a buffer for unaligned DMA requests (git-fixes).</li>
<li>mmc: tmio: avoid concurrent runs of mmc_request_done() (git-fixes).</li>
<li>mmc: wmt-sdmmc: remove an incorrect release_mem_region() call in the .remove function (git-fixes).</li>
<li>mtd: maps: physmap-core: fix flash size larger than 32-bit (git-fixes).</li>
<li>mtd: rawnand: lpc32xx_mlc: fix irq handler prototype (git-fixes).</li>
<li>mtd: rawnand: meson: fix scrambling mode value in command macro (git-fixes).</li>
<li>net/bnx2x: Prevent access to a freed page in page_pool (bsc#1215322).</li>
<li>net/x25: fix incorrect parameter validation in the x25_getsockopt() function (git-fixes).</li>
<li>net: Fix features skip in for_each_netdev_feature() (git-fixes).</li>
<li>net: lan78xx: fix runtime PM count underflow on link stop (git-fixes).</li>
<li>net: ll_temac: platform_get_resource replaced by wrong function (git-fixes).</li>
<li>net: mana: Fix Rx DMA datasize and skb_over_panic (git-fixes).</li>
<li>net: phy: fix phy_get_internal_delay accessing an empty array (git-fixes).</li>
<li>net: sunrpc: Fix an off by one in rpc_sockaddr2uaddr() (git-fixes).</li>
<li>nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet (git-fixes).</li>
<li>nfs: fix an off by one in root_nfs_cat() (git-fixes).</li>
<li>nfs: rename nfs_client_kset to nfs_kset (git-fixes).</li>
<li>nfsd: change LISTXATTRS cookie encoding to big-endian (git-fixes).</li>
<li>nfsd: convert the callback workqueue to use delayed_work (git-fixes).</li>
<li>nfsd: do not take fi_lock in nfsd_break_deleg_cb() (git-fixes).</li>
<li>nfsd: fix file memleak on client_opens_release (git-fixes).</li>
<li>nfsd: fix liSTXATTRS returning a short list with eof=TRUE (git-fixes).</li>
<li>nfsd: fix liSTXATTRS returning more bytes than maxcount (git-fixes).</li>
<li>nfsd: fix nfsd4_listxattr_validate_cookie (git-fixes).</li>
<li>nfsd: lock_rename() needs both directories to live on the same fs (git-fixes).</li>
<li>nfsd: reschedule CB operations when backchannel rpc_clnt is shut down (git-fixes).</li>
<li>nfsd: reset cb_seq_status after NFS4ERR_DELAY (git-fixes).</li>
<li>nfsd: retransmit callbacks after client reconnects (git-fixes).</li>
<li>nfsd: use vfs setgid helper (git-fixes).</li>
<li>nfsv4.1/pnfs: Ensure we handle the error NFS4ERR_RETURNCONFLICT (git-fixes).</li>
<li>nfsv4.1: fix SP4_MACH_CRED protection for pnfs IO (git-fixes).</li>
<li>nfsv4.1: fixup use EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes).</li>
<li>nfsv4.1: use EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes).</li>
<li>nfsv4.2: fix listxattr maximum XDR buffer size (git-fixes).</li>
<li>nfsv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 (git-fixes).</li>
<li>nfsv4.2: fix wrong shrinker_id (git-fixes).</li>
<li>nfsv4: fix a nfs4_state_manager() race (git-fixes).</li>
<li>nfsv4: fix a state manager thread deadlock regression (git-fixes).</li>
<li>nilfs2: fix failure to detect DAT corruption in btree and direct mappings (git-fixes).</li>
<li>nilfs2: prevent kernel bug at submit_bh_wbc() (git-fixes).</li>
<li>nouveau/dmem: handle kcalloc() allocation failure (git-fixes).</li>
<li>nouveau: reset the bo resource bus info after an eviction (git-fixes).</li>
<li>ntfs: fix use-after-free in ntfs_ucsncmp() (bsc#1221713).</li>
<li>nvme-fc: do not wait in vain when unloading module (git-fixes).</li>
<li>nvme: fix reconnection fail due to reserved tag allocation (git-fixes).</li>
<li>nvmet-fc: abort command when there is no binding (git-fixes).</li>
<li>nvmet-fc: avoid deadlock on delete association path (git-fixes).</li>
<li>nvmet-fc: defer cleanup using RCU properly (git-fixes).</li>
<li>nvmet-fc: hold reference on hostport match (git-fixes).</li>
<li>nvmet-fc: release reference on target port (git-fixes).</li>
<li>nvmet-fc: take ref count on tgtport before delete assoc (git-fixes).</li>
<li>nvmet-fcloop: swap the list_add_tail arguments (git-fixes).</li>
<li>nvmet-tcp: fix nvme tcp ida memory leak (git-fixes).</li>
<li>pNFS/flexfiles: Check the layout validity in ff_layout_mirror_prepare_stats (git-fixes).</li>
<li>pNFS: Fix a hang in nfs4_evict_inode() (git-fixes).</li>
<li>pNFS: Fix the pnfs block driver's calculation of layoutget size (git-fixes).</li>
<li>pci/aer: fix rootport attribute paths in ABI docs (git-fixes).</li>
<li>pci/aspm: use RMW accessors for changing LNKCTL (git-fixes).</li>
<li>pci/dpc: print all TLP Prefixes, not just the first (git-fixes).</li>
<li>pci/msi: prevent MSI hardware interrupt number truncation (bsc#1218777)</li>
<li>pci/p2pdma: Fix a sleeping issue in a RCU read section (git-fixes).</li>
<li>pci: add locking to RMW PCI Express Capability Register accessors (git-fixes).</li>
<li>pci: dwc: endpoint: Fix advertised resizable BAR size (git-fixes).</li>
<li>pci: dwc: endpoint: Fix dw_pcie_ep_raise_msix_irq() alignment support (git-fixes).</li>
<li>pci: dwc: fix a 64bit bug in dw_pcie_ep_raise_msix_irq() (git-fixes).</li>
<li>pci: fu740: Set the number of MSI vectors (git-fixes).</li>
<li>pci: lengthen reset delay for VideoPropulsion Torrent QN16e card (git-fixes).</li>
<li>pci: make link retraining use RMW accessors for changing LNKCTL (git-fixes).</li>
<li>pci: mark 3ware-9650SE Root Port Extended Tags as broken (git-fixes).</li>
<li>pci: mediatek-gen3: Fix translation window size calculation (git-fixes).</li>
<li>pci: mediatek: Clear interrupt status before dispatching handler (git-fixes).</li>
<li>pci: qcom: enable BDF to SID translation properly (git-fixes).</li>
<li>pci: qcom: use DWC helpers for modifying the read-only DBI registers (git-fixes).</li>
<li>pci: rockchip: Do not advertise MSI-X in PCIe capabilities (git-fixes).</li>
<li>pci: rockchip: Fix window mapping and address translation for endpoint (git-fixes).</li>
<li>pci: rockchip: Use 64-bit mask on MSI 64-bit PCI address (git-fixes).</li>
<li>pci: switchtec: Fix an error handling path in switchtec_pci_probe() (git-fixes).</li>
<li>pinctrl: mediatek: Drop bogus slew rate register range for MT8192 (git-fixes).</li>
<li>platform/mellanox: mlxreg-hotplug: Remove redundant NULL-check (git-fixes).</li>
<li>pm: suspend: Set mem_sleep_current during kernel command line setup (git-fixes).</li>
<li>powerpc/64s: POWER10 CPU Kconfig build option (bsc#1194869).</li>
<li>powerpc/boot: Disable power10 features after BOOTAFLAGS assignment (bsc#1194869).</li>
<li>powerpc/boot: Fix boot wrapper code generation with CONFIG_POWER10_CPU (bsc#1194869).</li>
<li>powerpc/lib/sstep: Do not use __{get/put}_user() on kernel addresses (bsc#1194869).</li>
<li>powerpc/lib/sstep: Remove unneeded #ifdef <strong>powerpc64</strong> (bsc#1194869).</li>
<li>powerpc/lib/sstep: Use l1_dcache_bytes() instead of opencoding (bsc#1194869).</li>
<li>powerpc/lib/sstep: use truncate_if_32bit() (bsc#1194869).</li>
<li>powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV (bsc#1220492 ltc#205270).</li>
<li>powerpc/pseries: Fix potential memleak in papr_get_attr() (bsc#1200465 ltc#197256 jsc#SLE-18130 git-fixes).</li>
<li>powerpc/sstep: Use bitwise instead of arithmetic operator for flags (bsc#1194869).</li>
<li>powerpc: add compile-time support for lbarx, lharx (bsc#1194869).</li>
<li>pwm: mediatek: Update kernel doc for struct pwm_mediatek_of_data (git-fixes).</li>
<li>qedf: Do not process stag work during unload (bsc#1214852).</li>
<li>qedf: Wait for stag work during unload (bsc#1214852).</li>
<li>raid1: fix use-after-free for original bio in raid1_write_request() (bsc#1221097).</li>
<li>ras/amd/fmpm: Add debugfs interface to print record entries (jsc#PED-7619).</li>
<li>ras/amd/fmpm: Avoid NULL ptr deref in get_saved_records() (jsc#PED-7619).</li>
<li>ras/amd/fmpm: Fix build when debugfs is not enabled (jsc#PED-7619).</li>
<li>ras/amd/fmpm: Fix off by one when unwinding on error (jsc#PED-7619).</li>
<li>ras/amd/fmpm: Safely handle saved records of various sizes (jsc#PED-7619).</li>
<li>ras/amd/fmpm: Save SPA values (jsc#PED-7619).</li>
<li>ras: Avoid build errors when CONFIG_DEBUG_FS=n (git-fixes).</li>
<li>ras: export helper to get ras_debugfs_dir (jsc#PED-7619).</li>
<li>rdma/device: Fix a race between mad_client and cm_client init (git-fixes)</li>
<li>rdma/hns: fix mis-modifying default congestion control algorithm (git-fixes)</li>
<li>rdma/ipoib: Fix error code return in ipoib_mcast_join (git-fixes)</li>
<li>rdma/irdma: Remove duplicate assignment (git-fixes)</li>
<li>rdma/mana_ib: Fix bug in creation of dma regions (git-fixes).</li>
<li>rdma/mlx5: fix fortify source warning while accessing Eth segment (git-fixes)</li>
<li>rdma/mlx5: relax DEVX access upon modify commands (git-fixes)</li>
<li>rdma/rtrs-clt: Check strnlen return len in sysfs mpath_policy_store() (git-fixes)</li>
<li>rdma/srpt: do not register event handler until srpt device is fully setup (git-fixes)</li>
<li>rtc: mt6397: select IRQ_DOMAIN instead of depending on it (git-fixes).</li>
<li>s390/pai: fix attr_event_free upper limit for pai device drivers (git-fixes bsc#1221633).</li>
<li>s390/vfio-ap: realize the VFIO_DEVICE_GET_IRQ_INFO ioctl (bsc#1205316).</li>
<li>s390/vfio-ap: realize the VFIO_DEVICE_SET_IRQS ioctl (bsc#1205316).</li>
<li>s390/vfio-ap: wire in the vfio_device_ops request callback (bsc#1205316).</li>
<li>s390/vtime: fix average steal time calculation (git-fixes bsc#1221951).</li>
<li>sched/rt: Disallow writing invalid values to sched_rt_period_us (bsc#1220176).</li>
<li>sched/rt: sysctl_sched_rr_timeslice show default timeslice after reset (bsc#1220176).</li>
<li>scsi: lpfc: Copyright updates for 14.4.0.1 patches (bsc#1221777).</li>
<li>scsi: lpfc: Correct size for cmdwqe/rspwqe for memset() (bsc#1221777).</li>
<li>scsi: lpfc: Correct size for wqe for memset() (bsc#1221777).</li>
<li>scsi: lpfc: Define lpfc_dmabuf type for ctx_buf ptr (bsc#1221777).</li>
<li>scsi: lpfc: Define lpfc_nodelist type for ctx_ndlp ptr (bsc#1221777).</li>
<li>scsi: lpfc: Define types in a union for generic void *context3 ptr (bsc#1221777).</li>
<li>scsi: lpfc: Move NPIV's transport unregistration to after resource clean up (bsc#1221777).</li>
<li>scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1221777).</li>
<li>scsi: lpfc: Remove IRQF_ONESHOT flag from threaded IRQ handling (bsc#1221777 bsc#1217959).</li>
<li>scsi: lpfc: Remove unnecessary log message in queuecommand path (bsc#1221777).</li>
<li>scsi: lpfc: Replace hbalock with ndlp lock in lpfc_nvme_unregister_port() (bsc#1221777).</li>
<li>scsi: lpfc: Update lpfc version to 14.4.0.1 (bsc#1221777).</li>
<li>scsi: lpfc: Update lpfc_ramp_down_queue_handler() logic (bsc#1221777).</li>
<li>scsi: lpfc: Use a dedicated lock for ras_fwlog state (bsc#1221777).</li>
<li>scsi: qedf: Remove set but unused variable 'page' (bsc#1214852).</li>
<li>scsi: qedf: Remove unused 'num_handled' variable (bsc#1214852).</li>
<li>scsi: qedf: Remove unused declaration (bsc#1214852).</li>
<li>scsi: qla2xxx: Change debug message during driver unload (bsc1221816).</li>
<li>scsi: qla2xxx: Delay I/O Abort on PCI error (bsc1221816).</li>
<li>scsi: qla2xxx: Fix N2N stuck connection (bsc1221816).</li>
<li>scsi: qla2xxx: Fix command flush on cable pull (bsc1221816).</li>
<li>scsi: qla2xxx: Fix double free of fcport (bsc1221816).</li>
<li>scsi: qla2xxx: Fix double free of the ha->vp_map pointer (bsc1221816).</li>
<li>scsi: qla2xxx: NVME|FCP prefer flag not being honored (bsc1221816).</li>
<li>scsi: qla2xxx: Prevent command send on chip reset (bsc1221816).</li>
<li>scsi: qla2xxx: Split FCE|EFT trace control (bsc1221816).</li>
<li>scsi: qla2xxx: Update manufacturer detail (bsc1221816).</li>
<li>scsi: qla2xxx: Update version to 10.02.09.200-k (bsc1221816).</li>
<li>scsi: storvsc: Fix ring buffer size calculation (git-fixes).</li>
<li>scsi: target: core: Silence the message about unknown VPD pages (bsc#1221252).</li>
<li>selftests/bpf: add generic BPF program tester-loader (bsc#1222033).</li>
<li>serial: 8250_exar: Do not remove GPIO device on suspend (git-fixes).</li>
<li>serial: max310x: fix syntax error in IRQ error message (git-fixes).</li>
<li>slimbus: core: Remove usage of the deprecated ida_simple_xx() API (git-fixes).</li>
<li>soc: fsl: qbman: Always disable interrupts when taking cgr_lock (git-fixes).</li>
<li>spi: lm70llp: fix links in doc and comments (git-fixes).</li>
<li>spi: spi-mt65xx: Fix NULL pointer access in interrupt handler (git-fixes).</li>
<li>sr9800: Add check for usbnet_get_endpoints (git-fixes).</li>
<li>stackdepot: rename pool_index to pool_index_plus_1 (git-fixes).</li>
<li>staging: vc04_services: fix information leak in create_component() (git-fixes).</li>
<li>sunrpc: Add an IS_ERR() check back to where it was (git-fixes).</li>
<li>sunrpc: ECONNRESET might require a rebind (git-fixes).</li>
<li>sunrpc: Fix RPC client cleaned up the freed pipefs dentries (git-fixes).</li>
<li>sunrpc: Fix a suspicious RCU usage warning (git-fixes).</li>
<li>sunrpc: fix a memleak in gss_import_v2_context (git-fixes).</li>
<li>sunrpc: fix some memleaks in gssx_dec_option_array (git-fixes).</li>
<li>svcrdma: Drop connection after an RDMA Read error (git-fixes).</li>
<li>tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619).</li>
<li>tty: serial: fsl_lpuart: avoid idle preamble pending if CTS is enabled (git-fixes).</li>
<li>tty: serial: samsung: fix tx_empty() to return TIOCSER_TEMT (git-fixes).</li>
<li>tty: vt: fix 20 vs 0x20 typo in EScsiignore (git-fixes).</li>
<li>ubifs: Queue up space reservation tasks if retrying many times (git-fixes).</li>
<li>ubifs: Remove unreachable code in dbg_check_ltab_lnum (git-fixes).</li>
<li>ubifs: Set page uptodate in the correct place (git-fixes).</li>
<li>ubifs: dbg_check_idx_size: Fix kmemleak if loading znode failed (git-fixes).</li>
<li>ubifs: fix sort function prototype (git-fixes).</li>
<li>usb: audio-v2: Correct comments for struct uac_clock_selector_descriptor (git-fixes).</li>
<li>usb: cdc-wdm: close race between read and workqueue (git-fixes).</li>
<li>usb: core: Fix deadlock in usb_deauthorize_interface() (git-fixes).</li>
<li>usb: dwc2: gadget: Fix exiting from clock gating (git-fixes).</li>
<li>usb: dwc2: gadget: LPM flow fix (git-fixes).</li>
<li>usb: dwc2: host: Fix ISOC flow in DDMA mode (git-fixes).</li>
<li>usb: dwc2: host: Fix hibernation flow (git-fixes).</li>
<li>usb: dwc2: host: Fix remote wakeup from hibernation (git-fixes).</li>
<li>usb: dwc3: Properly set system wakeup (git-fixes).</li>
<li>usb: gadget: ncm: Fix handling of zero block length packets (git-fixes).</li>
<li>usb: gadget: net2272: Use irqflags in the call to net2272_probe_fin (git-fixes).</li>
<li>usb: port: Do not try to peer unused USB ports based on location (git-fixes).</li>
<li>usb: typec: Return size of buffer if pd_set operation succeeds (git-fixes).</li>
<li>usb: typec: ucsi: Check for notifications after init (git-fixes).</li>
<li>usb: typec: ucsi: Clean up UCSI_CABLE_PROP macros (git-fixes).</li>
<li>usb: typec: ucsi: Clear EVENT_PENDING under PPM lock (git-fixes).</li>
<li>usb: usb-storage: Prevent divide-by-0 error in isd200_ata_command (git-fixes).</li>
<li>usb: xhci: Add error handling in xhci_map_urb_for_dma (git-fixes).</li>
<li>vboxsf: Avoid an spurious warning if load_nls_xxx() fails (git-fixes).</li>
<li>vt: fix unicode buffer corruption when deleting characters (git-fixes).</li>
<li>watchdog: stm32_iwdg: initialize default timeout (git-fixes).</li>
<li>wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (git-fixes).</li>
<li>wifi: ath11k: decrease MHI channel buffer length to 8KB (bsc#1207948).</li>
<li>wifi: ath11k: initialize rx_mcs_80 and rx_mcs_160 before use (git-fixes).</li>
<li>wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete (git-fixes).</li>
<li>wifi: b43: Disable QoS for bcm4331 (git-fixes).</li>
<li>wifi: b43: Stop correct queue in DMA worker when QoS is disabled (git-fixes).</li>
<li>wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled (git-fixes).</li>
<li>wifi: b43: Stop/wake correct queue in PIO Tx path when QoS is disabled (git-fixes).</li>
<li>wifi: brcmfmac: fix copyright year mentioned in platform_data header (git-fixes).</li>
<li>wifi: brcmsmac: avoid function pointer casts (git-fixes).</li>
<li>wifi: iwlwifi: dbg-tlv: ensure NUL termination (git-fixes).</li>
<li>wifi: iwlwifi: fix EWRD table validity check (git-fixes).</li>
<li>wifi: iwlwifi: fw: do not always use FW dump trig (git-fixes).</li>
<li>wifi: iwlwifi: mvm: do not set replay counters to 0xff (git-fixes).</li>
<li>wifi: iwlwifi: mvm: report beacon protection failures (git-fixes).</li>
<li>wifi: iwlwifi: mvm: rfi: fix potential response leaks (git-fixes).</li>
<li>wifi: iwlwifi: mvm: use FW rate for non-data only on new devices (git-fixes).</li>
<li>wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer() (git-fixes).</li>
<li>wifi: mwifiex: debugfs: Drop unnecessary error check for debugfs_create_dir() (git-fixes).</li>
<li>wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work (git-fixes).</li>
<li>wifi: rtw88: 8821c: Fix false alarm count (git-fixes).</li>
<li>wifi: wilc1000: fix RCU usage in connect path (git-fixes).</li>
<li>wifi: wilc1000: fix declarations ordering (stable-fixes).</li>
<li>wifi: wilc1000: fix multi-vif management when deleting a vif (git-fixes).</li>
<li>wifi: wilc1000: prevent use-after-free on vif when cleaning up all interfaces (git-fixes).</li>
<li>x86/CPU/AMD: Update the Zenbleed microcode revisions (git-fixes).</li>
<li>x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes).</li>
<li>x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (git-fixes).</li>
<li>xhci: handle isoc Babble and Buffer Overrun events properly (git-fixes).</li>
<li>xhci: process isoc TD properly when there was a transaction error mid TD (git-fixes).</li>
</ul>
<h2>Special Instructions and Notes:</h2>
<ul>
<li>Please reboot the system after installing this update.</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
openSUSE Leap 15.5
<br/>
<code>zypper in -t patch SUSE-2024-1332=1 openSUSE-SLE-15.5-2024-1332=1</code>
</li>
<li class="list-group-item">
Public Cloud Module 15-SP5
<br/>
<code>zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1332=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
openSUSE Leap 15.5 (aarch64 x86_64)
<ul>
<li>kernel-azure-extra-5.14.21-150500.33.42.1</li>
<li>cluster-md-kmp-azure-debuginfo-5.14.21-150500.33.42.1</li>
<li>kernel-azure-optional-5.14.21-150500.33.42.1</li>
<li>reiserfs-kmp-azure-5.14.21-150500.33.42.1</li>
<li>gfs2-kmp-azure-5.14.21-150500.33.42.1</li>
<li>kernel-syms-azure-5.14.21-150500.33.42.1</li>
<li>kernel-azure-devel-5.14.21-150500.33.42.1</li>
<li>kselftests-kmp-azure-5.14.21-150500.33.42.1</li>
<li>kselftests-kmp-azure-debuginfo-5.14.21-150500.33.42.1</li>
<li>kernel-azure-extra-debuginfo-5.14.21-150500.33.42.1</li>
<li>reiserfs-kmp-azure-debuginfo-5.14.21-150500.33.42.1</li>
<li>gfs2-kmp-azure-debuginfo-5.14.21-150500.33.42.1</li>
<li>cluster-md-kmp-azure-5.14.21-150500.33.42.1</li>
<li>kernel-azure-devel-debuginfo-5.14.21-150500.33.42.1</li>
<li>kernel-azure-debuginfo-5.14.21-150500.33.42.1</li>
<li>ocfs2-kmp-azure-debuginfo-5.14.21-150500.33.42.1</li>
<li>kernel-azure-livepatch-devel-5.14.21-150500.33.42.1</li>
<li>kernel-azure-debugsource-5.14.21-150500.33.42.1</li>
<li>dlm-kmp-azure-5.14.21-150500.33.42.1</li>
<li>kernel-azure-optional-debuginfo-5.14.21-150500.33.42.1</li>
<li>dlm-kmp-azure-debuginfo-5.14.21-150500.33.42.1</li>
<li>ocfs2-kmp-azure-5.14.21-150500.33.42.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.5 (aarch64 nosrc x86_64)
<ul>
<li>kernel-azure-5.14.21-150500.33.42.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.5 (x86_64)
<ul>
<li>kernel-azure-vdso-debuginfo-5.14.21-150500.33.42.1</li>
<li>kernel-azure-vdso-5.14.21-150500.33.42.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.5 (noarch)
<ul>
<li>kernel-devel-azure-5.14.21-150500.33.42.1</li>
<li>kernel-source-azure-5.14.21-150500.33.42.1</li>
</ul>
</li>
<li>
Public Cloud Module 15-SP5 (aarch64 nosrc x86_64)
<ul>
<li>kernel-azure-5.14.21-150500.33.42.1</li>
</ul>
</li>
<li>
Public Cloud Module 15-SP5 (aarch64 x86_64)
<ul>
<li>kernel-syms-azure-5.14.21-150500.33.42.1</li>
<li>kernel-azure-devel-5.14.21-150500.33.42.1</li>
<li>kernel-azure-debugsource-5.14.21-150500.33.42.1</li>
<li>kernel-azure-devel-debuginfo-5.14.21-150500.33.42.1</li>
<li>kernel-azure-debuginfo-5.14.21-150500.33.42.1</li>
</ul>
</li>
<li>
Public Cloud Module 15-SP5 (noarch)
<ul>
<li>kernel-devel-azure-5.14.21-150500.33.42.1</li>
<li>kernel-source-azure-5.14.21-150500.33.42.1</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46925.html">https://www.suse.com/security/cve/CVE-2021-46925.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46926.html">https://www.suse.com/security/cve/CVE-2021-46926.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46927.html">https://www.suse.com/security/cve/CVE-2021-46927.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46929.html">https://www.suse.com/security/cve/CVE-2021-46929.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46930.html">https://www.suse.com/security/cve/CVE-2021-46930.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46931.html">https://www.suse.com/security/cve/CVE-2021-46931.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46933.html">https://www.suse.com/security/cve/CVE-2021-46933.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46936.html">https://www.suse.com/security/cve/CVE-2021-46936.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47082.html">https://www.suse.com/security/cve/CVE-2021-47082.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47087.html">https://www.suse.com/security/cve/CVE-2021-47087.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47091.html">https://www.suse.com/security/cve/CVE-2021-47091.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47093.html">https://www.suse.com/security/cve/CVE-2021-47093.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47094.html">https://www.suse.com/security/cve/CVE-2021-47094.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47095.html">https://www.suse.com/security/cve/CVE-2021-47095.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47096.html">https://www.suse.com/security/cve/CVE-2021-47096.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47097.html">https://www.suse.com/security/cve/CVE-2021-47097.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47098.html">https://www.suse.com/security/cve/CVE-2021-47098.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47099.html">https://www.suse.com/security/cve/CVE-2021-47099.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47100.html">https://www.suse.com/security/cve/CVE-2021-47100.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47101.html">https://www.suse.com/security/cve/CVE-2021-47101.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47102.html">https://www.suse.com/security/cve/CVE-2021-47102.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47104.html">https://www.suse.com/security/cve/CVE-2021-47104.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47105.html">https://www.suse.com/security/cve/CVE-2021-47105.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47107.html">https://www.suse.com/security/cve/CVE-2021-47107.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47108.html">https://www.suse.com/security/cve/CVE-2021-47108.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-4744.html">https://www.suse.com/security/cve/CVE-2022-4744.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48626.html">https://www.suse.com/security/cve/CVE-2022-48626.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48629.html">https://www.suse.com/security/cve/CVE-2022-48629.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48630.html">https://www.suse.com/security/cve/CVE-2022-48630.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-0160.html">https://www.suse.com/security/cve/CVE-2023-0160.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-28746.html">https://www.suse.com/security/cve/CVE-2023-28746.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-35827.html">https://www.suse.com/security/cve/CVE-2023-35827.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-4881.html">https://www.suse.com/security/cve/CVE-2023-4881.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52447.html">https://www.suse.com/security/cve/CVE-2023-52447.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52450.html">https://www.suse.com/security/cve/CVE-2023-52450.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52453.html">https://www.suse.com/security/cve/CVE-2023-52453.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52454.html">https://www.suse.com/security/cve/CVE-2023-52454.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52469.html">https://www.suse.com/security/cve/CVE-2023-52469.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52470.html">https://www.suse.com/security/cve/CVE-2023-52470.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52474.html">https://www.suse.com/security/cve/CVE-2023-52474.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52476.html">https://www.suse.com/security/cve/CVE-2023-52476.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52477.html">https://www.suse.com/security/cve/CVE-2023-52477.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52481.html">https://www.suse.com/security/cve/CVE-2023-52481.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52484.html">https://www.suse.com/security/cve/CVE-2023-52484.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52486.html">https://www.suse.com/security/cve/CVE-2023-52486.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52492.html">https://www.suse.com/security/cve/CVE-2023-52492.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52493.html">https://www.suse.com/security/cve/CVE-2023-52493.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52494.html">https://www.suse.com/security/cve/CVE-2023-52494.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52497.html">https://www.suse.com/security/cve/CVE-2023-52497.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52500.html">https://www.suse.com/security/cve/CVE-2023-52500.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52501.html">https://www.suse.com/security/cve/CVE-2023-52501.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52502.html">https://www.suse.com/security/cve/CVE-2023-52502.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52504.html">https://www.suse.com/security/cve/CVE-2023-52504.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52507.html">https://www.suse.com/security/cve/CVE-2023-52507.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52508.html">https://www.suse.com/security/cve/CVE-2023-52508.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52509.html">https://www.suse.com/security/cve/CVE-2023-52509.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52510.html">https://www.suse.com/security/cve/CVE-2023-52510.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52511.html">https://www.suse.com/security/cve/CVE-2023-52511.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52513.html">https://www.suse.com/security/cve/CVE-2023-52513.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52515.html">https://www.suse.com/security/cve/CVE-2023-52515.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52517.html">https://www.suse.com/security/cve/CVE-2023-52517.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52518.html">https://www.suse.com/security/cve/CVE-2023-52518.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52519.html">https://www.suse.com/security/cve/CVE-2023-52519.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52520.html">https://www.suse.com/security/cve/CVE-2023-52520.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52523.html">https://www.suse.com/security/cve/CVE-2023-52523.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52524.html">https://www.suse.com/security/cve/CVE-2023-52524.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52525.html">https://www.suse.com/security/cve/CVE-2023-52525.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52528.html">https://www.suse.com/security/cve/CVE-2023-52528.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52529.html">https://www.suse.com/security/cve/CVE-2023-52529.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52532.html">https://www.suse.com/security/cve/CVE-2023-52532.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52563.html">https://www.suse.com/security/cve/CVE-2023-52563.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52564.html">https://www.suse.com/security/cve/CVE-2023-52564.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52566.html">https://www.suse.com/security/cve/CVE-2023-52566.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52567.html">https://www.suse.com/security/cve/CVE-2023-52567.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52569.html">https://www.suse.com/security/cve/CVE-2023-52569.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52574.html">https://www.suse.com/security/cve/CVE-2023-52574.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52575.html">https://www.suse.com/security/cve/CVE-2023-52575.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52576.html">https://www.suse.com/security/cve/CVE-2023-52576.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52582.html">https://www.suse.com/security/cve/CVE-2023-52582.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52583.html">https://www.suse.com/security/cve/CVE-2023-52583.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52587.html">https://www.suse.com/security/cve/CVE-2023-52587.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52591.html">https://www.suse.com/security/cve/CVE-2023-52591.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52594.html">https://www.suse.com/security/cve/CVE-2023-52594.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52595.html">https://www.suse.com/security/cve/CVE-2023-52595.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52597.html">https://www.suse.com/security/cve/CVE-2023-52597.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52598.html">https://www.suse.com/security/cve/CVE-2023-52598.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52599.html">https://www.suse.com/security/cve/CVE-2023-52599.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52600.html">https://www.suse.com/security/cve/CVE-2023-52600.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52601.html">https://www.suse.com/security/cve/CVE-2023-52601.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52602.html">https://www.suse.com/security/cve/CVE-2023-52602.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52603.html">https://www.suse.com/security/cve/CVE-2023-52603.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52604.html">https://www.suse.com/security/cve/CVE-2023-52604.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52605.html">https://www.suse.com/security/cve/CVE-2023-52605.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52606.html">https://www.suse.com/security/cve/CVE-2023-52606.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52607.html">https://www.suse.com/security/cve/CVE-2023-52607.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52608.html">https://www.suse.com/security/cve/CVE-2023-52608.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52612.html">https://www.suse.com/security/cve/CVE-2023-52612.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52615.html">https://www.suse.com/security/cve/CVE-2023-52615.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52617.html">https://www.suse.com/security/cve/CVE-2023-52617.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52619.html">https://www.suse.com/security/cve/CVE-2023-52619.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52621.html">https://www.suse.com/security/cve/CVE-2023-52621.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52623.html">https://www.suse.com/security/cve/CVE-2023-52623.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52628.html">https://www.suse.com/security/cve/CVE-2023-52628.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52632.html">https://www.suse.com/security/cve/CVE-2023-52632.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52637.html">https://www.suse.com/security/cve/CVE-2023-52637.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52639.html">https://www.suse.com/security/cve/CVE-2023-52639.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-6356.html">https://www.suse.com/security/cve/CVE-2023-6356.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-6535.html">https://www.suse.com/security/cve/CVE-2023-6535.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-6536.html">https://www.suse.com/security/cve/CVE-2023-6536.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-7042.html">https://www.suse.com/security/cve/CVE-2023-7042.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-7192.html">https://www.suse.com/security/cve/CVE-2023-7192.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-0841.html">https://www.suse.com/security/cve/CVE-2024-0841.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-2201.html">https://www.suse.com/security/cve/CVE-2024-2201.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-22099.html">https://www.suse.com/security/cve/CVE-2024-22099.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-23307.html">https://www.suse.com/security/cve/CVE-2024-23307.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-25739.html">https://www.suse.com/security/cve/CVE-2024-25739.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26599.html">https://www.suse.com/security/cve/CVE-2024-26599.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26600.html">https://www.suse.com/security/cve/CVE-2024-26600.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26602.html">https://www.suse.com/security/cve/CVE-2024-26602.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26612.html">https://www.suse.com/security/cve/CVE-2024-26612.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26614.html">https://www.suse.com/security/cve/CVE-2024-26614.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26620.html">https://www.suse.com/security/cve/CVE-2024-26620.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26627.html">https://www.suse.com/security/cve/CVE-2024-26627.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26629.html">https://www.suse.com/security/cve/CVE-2024-26629.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26642.html">https://www.suse.com/security/cve/CVE-2024-26642.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26645.html">https://www.suse.com/security/cve/CVE-2024-26645.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26646.html">https://www.suse.com/security/cve/CVE-2024-26646.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26651.html">https://www.suse.com/security/cve/CVE-2024-26651.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26654.html">https://www.suse.com/security/cve/CVE-2024-26654.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26659.html">https://www.suse.com/security/cve/CVE-2024-26659.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26664.html">https://www.suse.com/security/cve/CVE-2024-26664.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26667.html">https://www.suse.com/security/cve/CVE-2024-26667.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26670.html">https://www.suse.com/security/cve/CVE-2024-26670.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26695.html">https://www.suse.com/security/cve/CVE-2024-26695.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26717.html">https://www.suse.com/security/cve/CVE-2024-26717.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">https://bugzilla.suse.com/show_bug.cgi?id=1194869</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1200465">https://bugzilla.suse.com/show_bug.cgi?id=1200465</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1205316">https://bugzilla.suse.com/show_bug.cgi?id=1205316</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207948">https://bugzilla.suse.com/show_bug.cgi?id=1207948</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209635">https://bugzilla.suse.com/show_bug.cgi?id=1209635</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209657">https://bugzilla.suse.com/show_bug.cgi?id=1209657</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1212514">https://bugzilla.suse.com/show_bug.cgi?id=1212514</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213456">https://bugzilla.suse.com/show_bug.cgi?id=1213456</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214852">https://bugzilla.suse.com/show_bug.cgi?id=1214852</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215221">https://bugzilla.suse.com/show_bug.cgi?id=1215221</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215322">https://bugzilla.suse.com/show_bug.cgi?id=1215322</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217339">https://bugzilla.suse.com/show_bug.cgi?id=1217339</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217959">https://bugzilla.suse.com/show_bug.cgi?id=1217959</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217987">https://bugzilla.suse.com/show_bug.cgi?id=1217987</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217988">https://bugzilla.suse.com/show_bug.cgi?id=1217988</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217989">https://bugzilla.suse.com/show_bug.cgi?id=1217989</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218321">https://bugzilla.suse.com/show_bug.cgi?id=1218321</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218336">https://bugzilla.suse.com/show_bug.cgi?id=1218336</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218479">https://bugzilla.suse.com/show_bug.cgi?id=1218479</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218643">https://bugzilla.suse.com/show_bug.cgi?id=1218643</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218777">https://bugzilla.suse.com/show_bug.cgi?id=1218777</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219169">https://bugzilla.suse.com/show_bug.cgi?id=1219169</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219170">https://bugzilla.suse.com/show_bug.cgi?id=1219170</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219264">https://bugzilla.suse.com/show_bug.cgi?id=1219264</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219834">https://bugzilla.suse.com/show_bug.cgi?id=1219834</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220114">https://bugzilla.suse.com/show_bug.cgi?id=1220114</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220176">https://bugzilla.suse.com/show_bug.cgi?id=1220176</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220237">https://bugzilla.suse.com/show_bug.cgi?id=1220237</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220251">https://bugzilla.suse.com/show_bug.cgi?id=1220251</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220320">https://bugzilla.suse.com/show_bug.cgi?id=1220320</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220337">https://bugzilla.suse.com/show_bug.cgi?id=1220337</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220340">https://bugzilla.suse.com/show_bug.cgi?id=1220340</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220365">https://bugzilla.suse.com/show_bug.cgi?id=1220365</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220366">https://bugzilla.suse.com/show_bug.cgi?id=1220366</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220398">https://bugzilla.suse.com/show_bug.cgi?id=1220398</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220411">https://bugzilla.suse.com/show_bug.cgi?id=1220411</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220413">https://bugzilla.suse.com/show_bug.cgi?id=1220413</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220439">https://bugzilla.suse.com/show_bug.cgi?id=1220439</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220443">https://bugzilla.suse.com/show_bug.cgi?id=1220443</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220445">https://bugzilla.suse.com/show_bug.cgi?id=1220445</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220466">https://bugzilla.suse.com/show_bug.cgi?id=1220466</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220478">https://bugzilla.suse.com/show_bug.cgi?id=1220478</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220482">https://bugzilla.suse.com/show_bug.cgi?id=1220482</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220484">https://bugzilla.suse.com/show_bug.cgi?id=1220484</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220486">https://bugzilla.suse.com/show_bug.cgi?id=1220486</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220487">https://bugzilla.suse.com/show_bug.cgi?id=1220487</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220492">https://bugzilla.suse.com/show_bug.cgi?id=1220492</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220703">https://bugzilla.suse.com/show_bug.cgi?id=1220703</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220775">https://bugzilla.suse.com/show_bug.cgi?id=1220775</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220790">https://bugzilla.suse.com/show_bug.cgi?id=1220790</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220797">https://bugzilla.suse.com/show_bug.cgi?id=1220797</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220831">https://bugzilla.suse.com/show_bug.cgi?id=1220831</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220833">https://bugzilla.suse.com/show_bug.cgi?id=1220833</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220836">https://bugzilla.suse.com/show_bug.cgi?id=1220836</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220839">https://bugzilla.suse.com/show_bug.cgi?id=1220839</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220840">https://bugzilla.suse.com/show_bug.cgi?id=1220840</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220843">https://bugzilla.suse.com/show_bug.cgi?id=1220843</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220870">https://bugzilla.suse.com/show_bug.cgi?id=1220870</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220871">https://bugzilla.suse.com/show_bug.cgi?id=1220871</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220872">https://bugzilla.suse.com/show_bug.cgi?id=1220872</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220878">https://bugzilla.suse.com/show_bug.cgi?id=1220878</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220879">https://bugzilla.suse.com/show_bug.cgi?id=1220879</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220883">https://bugzilla.suse.com/show_bug.cgi?id=1220883</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220885">https://bugzilla.suse.com/show_bug.cgi?id=1220885</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220887">https://bugzilla.suse.com/show_bug.cgi?id=1220887</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220898">https://bugzilla.suse.com/show_bug.cgi?id=1220898</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220918">https://bugzilla.suse.com/show_bug.cgi?id=1220918</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220920">https://bugzilla.suse.com/show_bug.cgi?id=1220920</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220921">https://bugzilla.suse.com/show_bug.cgi?id=1220921</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220926">https://bugzilla.suse.com/show_bug.cgi?id=1220926</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220927">https://bugzilla.suse.com/show_bug.cgi?id=1220927</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220929">https://bugzilla.suse.com/show_bug.cgi?id=1220929</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220932">https://bugzilla.suse.com/show_bug.cgi?id=1220932</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220937">https://bugzilla.suse.com/show_bug.cgi?id=1220937</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220938">https://bugzilla.suse.com/show_bug.cgi?id=1220938</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220940">https://bugzilla.suse.com/show_bug.cgi?id=1220940</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220954">https://bugzilla.suse.com/show_bug.cgi?id=1220954</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220955">https://bugzilla.suse.com/show_bug.cgi?id=1220955</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220959">https://bugzilla.suse.com/show_bug.cgi?id=1220959</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220960">https://bugzilla.suse.com/show_bug.cgi?id=1220960</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220961">https://bugzilla.suse.com/show_bug.cgi?id=1220961</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220965">https://bugzilla.suse.com/show_bug.cgi?id=1220965</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220969">https://bugzilla.suse.com/show_bug.cgi?id=1220969</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220978">https://bugzilla.suse.com/show_bug.cgi?id=1220978</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220979">https://bugzilla.suse.com/show_bug.cgi?id=1220979</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220981">https://bugzilla.suse.com/show_bug.cgi?id=1220981</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220982">https://bugzilla.suse.com/show_bug.cgi?id=1220982</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220983">https://bugzilla.suse.com/show_bug.cgi?id=1220983</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220985">https://bugzilla.suse.com/show_bug.cgi?id=1220985</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220986">https://bugzilla.suse.com/show_bug.cgi?id=1220986</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220987">https://bugzilla.suse.com/show_bug.cgi?id=1220987</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220989">https://bugzilla.suse.com/show_bug.cgi?id=1220989</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220990">https://bugzilla.suse.com/show_bug.cgi?id=1220990</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221009">https://bugzilla.suse.com/show_bug.cgi?id=1221009</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221012">https://bugzilla.suse.com/show_bug.cgi?id=1221012</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221015">https://bugzilla.suse.com/show_bug.cgi?id=1221015</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221022">https://bugzilla.suse.com/show_bug.cgi?id=1221022</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221039">https://bugzilla.suse.com/show_bug.cgi?id=1221039</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221040">https://bugzilla.suse.com/show_bug.cgi?id=1221040</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221044">https://bugzilla.suse.com/show_bug.cgi?id=1221044</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221045">https://bugzilla.suse.com/show_bug.cgi?id=1221045</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221046">https://bugzilla.suse.com/show_bug.cgi?id=1221046</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221048">https://bugzilla.suse.com/show_bug.cgi?id=1221048</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221055">https://bugzilla.suse.com/show_bug.cgi?id=1221055</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221056">https://bugzilla.suse.com/show_bug.cgi?id=1221056</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221058">https://bugzilla.suse.com/show_bug.cgi?id=1221058</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221060">https://bugzilla.suse.com/show_bug.cgi?id=1221060</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221061">https://bugzilla.suse.com/show_bug.cgi?id=1221061</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221062">https://bugzilla.suse.com/show_bug.cgi?id=1221062</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221066">https://bugzilla.suse.com/show_bug.cgi?id=1221066</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221067">https://bugzilla.suse.com/show_bug.cgi?id=1221067</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221068">https://bugzilla.suse.com/show_bug.cgi?id=1221068</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221069">https://bugzilla.suse.com/show_bug.cgi?id=1221069</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221070">https://bugzilla.suse.com/show_bug.cgi?id=1221070</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221071">https://bugzilla.suse.com/show_bug.cgi?id=1221071</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221077">https://bugzilla.suse.com/show_bug.cgi?id=1221077</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221082">https://bugzilla.suse.com/show_bug.cgi?id=1221082</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221090">https://bugzilla.suse.com/show_bug.cgi?id=1221090</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221097">https://bugzilla.suse.com/show_bug.cgi?id=1221097</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221156">https://bugzilla.suse.com/show_bug.cgi?id=1221156</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221252">https://bugzilla.suse.com/show_bug.cgi?id=1221252</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221273">https://bugzilla.suse.com/show_bug.cgi?id=1221273</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221274">https://bugzilla.suse.com/show_bug.cgi?id=1221274</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221276">https://bugzilla.suse.com/show_bug.cgi?id=1221276</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221277">https://bugzilla.suse.com/show_bug.cgi?id=1221277</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221291">https://bugzilla.suse.com/show_bug.cgi?id=1221291</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221293">https://bugzilla.suse.com/show_bug.cgi?id=1221293</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221298">https://bugzilla.suse.com/show_bug.cgi?id=1221298</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221337">https://bugzilla.suse.com/show_bug.cgi?id=1221337</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221338">https://bugzilla.suse.com/show_bug.cgi?id=1221338</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221375">https://bugzilla.suse.com/show_bug.cgi?id=1221375</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221379">https://bugzilla.suse.com/show_bug.cgi?id=1221379</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221551">https://bugzilla.suse.com/show_bug.cgi?id=1221551</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221553">https://bugzilla.suse.com/show_bug.cgi?id=1221553</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221613">https://bugzilla.suse.com/show_bug.cgi?id=1221613</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221614">https://bugzilla.suse.com/show_bug.cgi?id=1221614</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221616">https://bugzilla.suse.com/show_bug.cgi?id=1221616</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221618">https://bugzilla.suse.com/show_bug.cgi?id=1221618</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221631">https://bugzilla.suse.com/show_bug.cgi?id=1221631</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221633">https://bugzilla.suse.com/show_bug.cgi?id=1221633</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221713">https://bugzilla.suse.com/show_bug.cgi?id=1221713</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221777">https://bugzilla.suse.com/show_bug.cgi?id=1221777</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221814">https://bugzilla.suse.com/show_bug.cgi?id=1221814</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221816">https://bugzilla.suse.com/show_bug.cgi?id=1221816</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221830">https://bugzilla.suse.com/show_bug.cgi?id=1221830</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221951">https://bugzilla.suse.com/show_bug.cgi?id=1221951</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222033">https://bugzilla.suse.com/show_bug.cgi?id=1222033</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222056">https://bugzilla.suse.com/show_bug.cgi?id=1222056</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222060">https://bugzilla.suse.com/show_bug.cgi?id=1222060</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222070">https://bugzilla.suse.com/show_bug.cgi?id=1222070</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222073">https://bugzilla.suse.com/show_bug.cgi?id=1222073</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222117">https://bugzilla.suse.com/show_bug.cgi?id=1222117</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222274">https://bugzilla.suse.com/show_bug.cgi?id=1222274</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222291">https://bugzilla.suse.com/show_bug.cgi?id=1222291</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222300">https://bugzilla.suse.com/show_bug.cgi?id=1222300</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222304">https://bugzilla.suse.com/show_bug.cgi?id=1222304</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222317">https://bugzilla.suse.com/show_bug.cgi?id=1222317</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222331">https://bugzilla.suse.com/show_bug.cgi?id=1222331</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222355">https://bugzilla.suse.com/show_bug.cgi?id=1222355</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222356">https://bugzilla.suse.com/show_bug.cgi?id=1222356</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222360">https://bugzilla.suse.com/show_bug.cgi?id=1222360</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222366">https://bugzilla.suse.com/show_bug.cgi?id=1222366</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222373">https://bugzilla.suse.com/show_bug.cgi?id=1222373</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222619">https://bugzilla.suse.com/show_bug.cgi?id=1222619</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-5759">https://jira.suse.com/browse/PED-5759</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-7167">https://jira.suse.com/browse/PED-7167</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-7619">https://jira.suse.com/browse/PED-7619</a>
</li>
</ul>
</div>