<div class="container">
<h1>Security update for the Linux Kernel</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:3249-1</td>
</tr>
<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1176447">bsc#1176447</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195668">bsc#1195668</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195928">bsc#1195928</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195957">bsc#1195957</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1196018">bsc#1196018</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1196516">bsc#1196516</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1196823">bsc#1196823</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1202346">bsc#1202346</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209636">bsc#1209636</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209799">bsc#1209799</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1210629">bsc#1210629</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216834">bsc#1216834</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220185">bsc#1220185</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220186">bsc#1220186</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222251">bsc#1222251</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222728">bsc#1222728</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223948">bsc#1223948</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225109">bsc#1225109</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225584">bsc#1225584</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227832">bsc#1227832</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227924">bsc#1227924</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227928">bsc#1227928</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227932">bsc#1227932</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227935">bsc#1227935</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227941">bsc#1227941</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227942">bsc#1227942</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227945">bsc#1227945</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227952">bsc#1227952</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227964">bsc#1227964</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227969">bsc#1227969</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227985">bsc#1227985</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227987">bsc#1227987</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227988">bsc#1227988</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227989">bsc#1227989</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227997">bsc#1227997</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228000">bsc#1228000</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228002">bsc#1228002</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228004">bsc#1228004</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228005">bsc#1228005</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228006">bsc#1228006</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228015">bsc#1228015</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228020">bsc#1228020</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228037">bsc#1228037</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228045">bsc#1228045</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228060">bsc#1228060</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228062">bsc#1228062</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228066">bsc#1228066</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228114">bsc#1228114</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228516">bsc#1228516</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228576">bsc#1228576</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228959">bsc#1228959</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229400">bsc#1229400</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229454">bsc#1229454</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229500">bsc#1229500</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229503">bsc#1229503</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229510">bsc#1229510</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229512">bsc#1229512</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229598">bsc#1229598</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229604">bsc#1229604</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229607">bsc#1229607</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229620">bsc#1229620</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229621">bsc#1229621</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229624">bsc#1229624</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229626">bsc#1229626</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229629">bsc#1229629</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229630">bsc#1229630</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229637">bsc#1229637</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229641">bsc#1229641</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229657">bsc#1229657</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229707">bsc#1229707</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-4441.html">CVE-2021-4441</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-0854.html">CVE-2022-0854</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-20368.html">CVE-2022-20368</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-28748.html">CVE-2022-28748</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-2964.html">CVE-2022-2964</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48686.html">CVE-2022-48686</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48775.html">CVE-2022-48775</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48778.html">CVE-2022-48778</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48787.html">CVE-2022-48787</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48788.html">CVE-2022-48788</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48789.html">CVE-2022-48789</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48790.html">CVE-2022-48790</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48791.html">CVE-2022-48791</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48798.html">CVE-2022-48798</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48802.html">CVE-2022-48802</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48805.html">CVE-2022-48805</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48811.html">CVE-2022-48811</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48823.html">CVE-2022-48823</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48824.html">CVE-2022-48824</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48827.html">CVE-2022-48827</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48834.html">CVE-2022-48834</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48835.html">CVE-2022-48835</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48836.html">CVE-2022-48836</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48837.html">CVE-2022-48837</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48838.html">CVE-2022-48838</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48839.html">CVE-2022-48839</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48843.html">CVE-2022-48843</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48851.html">CVE-2022-48851</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48853.html">CVE-2022-48853</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48856.html">CVE-2022-48856</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48857.html">CVE-2022-48857</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48858.html">CVE-2022-48858</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48872.html">CVE-2022-48872</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48873.html">CVE-2022-48873</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48901.html">CVE-2022-48901</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48905.html">CVE-2022-48905</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48912.html">CVE-2022-48912</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48917.html">CVE-2022-48917</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48919.html">CVE-2022-48919</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48925.html">CVE-2022-48925</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48926.html">CVE-2022-48926</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48928.html">CVE-2022-48928</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48930.html">CVE-2022-48930</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48933.html">CVE-2022-48933</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48934.html">CVE-2022-48934</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-1582.html">CVE-2023-1582</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-2176.html">CVE-2023-2176</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52854.html">CVE-2023-52854</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26583.html">CVE-2024-26583</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26584.html">CVE-2024-26584</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26800.html">CVE-2024-26800</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40910.html">CVE-2024-40910</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41009.html">CVE-2024-41009</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41011.html">CVE-2024-41011</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41062.html">CVE-2024-41062</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42077.html">CVE-2024-42077</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42232.html">CVE-2024-42232</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42271.html">CVE-2024-42271</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43861.html">CVE-2024-43861</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43882.html">CVE-2024-43882</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43883.html">CVE-2024-43883</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44947.html">CVE-2024-44947</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-4441</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-4441</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-0854</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-0854</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-20368</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-20368</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-28748</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.7</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-2964</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-2964</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48686</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48686</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48775</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48775</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48778</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48778</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48787</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48787</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48788</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48788</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48789</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48789</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48790</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48790</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48791</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48791</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48798</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48802</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48805</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.6</span>
<span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48811</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48823</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48824</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48824</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48827</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48834</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">0.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48834</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48835</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48835</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48836</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48836</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48837</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48837</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48838</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48838</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48839</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48839</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48843</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48843</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48851</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48851</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48853</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48853</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48856</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48856</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48857</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48857</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48858</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48858</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48872</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48872</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48873</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48873</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48901</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48901</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48905</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48905</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48912</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48912</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48917</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48917</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48919</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48919</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48919</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48925</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48925</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48926</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48926</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48928</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48928</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48930</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48930</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48933</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48933</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48934</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48934</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-1582</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-1582</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-2176</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-2176</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52854</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26583</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26583</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26584</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26584</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26800</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40910</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40910</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-41009</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-41009</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-41011</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-41011</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-41062</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.3</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-41062</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-42077</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-42077</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-42232</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.3</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-42232</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-42232</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-42271</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.3</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-42271</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-42271</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-43861</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-43861</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-43882</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-43882</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-43883</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.4</span>
<span class="cvss-vector">CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-43883</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.4</span>
<span class="cvss-vector">CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44947</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44947</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">openSUSE Leap 15.3</li>
<li class="list-group-item">SUSE Enterprise Storage 7.1</li>
<li class="list-group-item">SUSE Linux Enterprise High Availability Extension 15 SP3</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP3</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing LTSS 15 SP3</li>
<li class="list-group-item">SUSE Linux Enterprise Live Patching 15-SP3</li>
<li class="list-group-item">SUSE Linux Enterprise Micro 5.1</li>
<li class="list-group-item">SUSE Linux Enterprise Micro 5.2</li>
<li class="list-group-item">SUSE Linux Enterprise Micro for Rancher 5.2</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP3</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP3</li>
<li class="list-group-item">SUSE Manager Proxy 4.2</li>
<li class="list-group-item">SUSE Manager Retail Branch Server 4.2</li>
<li class="list-group-item">SUSE Manager Server 4.2</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves 62 vulnerabilities and has eight security fixes can now be installed.</p>
<h2>Description:</h2>
<p>The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2024-44947: Initialize beyond-EOF page contents before setting uptodate (bsc#1229454).</li>
<li>CVE-2022-48919: Fix double free race when mount fails in cifs_get_root() (bsc#1229657).</li>
<li>CVE-2023-52854: Fix refcnt handling in padata_free_shell() (bsc#1225584).</li>
<li>CVE-2024-43883: Do not drop references before new references are gained (bsc#1229707).</li>
<li>CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).</li>
<li>CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500).</li>
<li>CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503)</li>
<li>CVE-2022-48912: Fix use-after-free in __nf_register_net_hook() (bsc#1229641)</li>
<li>CVE-2022-48872: Fix use-after-free race condition for maps (bsc#1229510).</li>
<li>CVE-2022-48873: Do not remove map on creater_process and device_release (bsc#1229512).</li>
<li>CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400)</li>
<li>CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop(). (bsc#1228959)</li>
<li>CVE-2024-40910: Fix refcount imbalance on inbound connections (bsc#1227832).</li>
<li>CVE-2022-48686: Fixed UAF when detecting digest errors (bsc#1223948).</li>
<li>CVE-2024-41009: bpf: Fix overrunning reservations in ringbuf (bsc#1228020).</li>
<li>CVE-2022-48791: Fix use-after-free for aborted TMF sas_task (bsc#1228002)</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>Bluetooth: L2CAP: Fix deadlock (git-fixes).</li>
<li>powerpc: Remove support for PowerPC 601 (Remove unused and malformed assembly causing build error).</li>
<li>sched/psi: use kernfs polling functions for PSI trigger polling (bsc#1209799 bsc#1225109).</li>
<li>scsi: pm80xx: Fix TMF task completion race condition (bsc#1228002).</li>
</ul>
<h2>Special Instructions and Notes:</h2>
<ul>
<li>Please reboot the system after installing this update.</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
openSUSE Leap 15.3
<br/>
<code>zypper in -t patch SUSE-2024-3249=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Live Patching 15-SP3
<br/>
<code>zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-3249=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise High Availability Extension 15 SP3
<br/>
<code>zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-3249=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
<br/>
<code>zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3249=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
<br/>
<code>zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3249=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Server for SAP Applications 15 SP3
<br/>
<code>zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3249=1</code>
</li>
<li class="list-group-item">
SUSE Enterprise Storage 7.1
<br/>
<code>zypper in -t patch SUSE-Storage-7.1-2024-3249=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Micro 5.1
<br/>
<code>zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3249=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Micro 5.2
<br/>
<code>zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3249=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Micro for Rancher 5.2
<br/>
<code>zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3249=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
openSUSE Leap 15.3 (noarch nosrc)
<ul>
<li>kernel-docs-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.3 (noarch)
<ul>
<li>kernel-source-vanilla-5.3.18-150300.59.174.1</li>
<li>kernel-docs-html-5.3.18-150300.59.174.1</li>
<li>kernel-source-5.3.18-150300.59.174.1</li>
<li>kernel-macros-5.3.18-150300.59.174.1</li>
<li>kernel-devel-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.3 (nosrc ppc64le x86_64)
<ul>
<li>kernel-debug-5.3.18-150300.59.174.1</li>
<li>kernel-kvmsmall-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.3 (ppc64le x86_64)
<ul>
<li>kernel-debug-debugsource-5.3.18-150300.59.174.1</li>
<li>kernel-debug-devel-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-debug-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.174.1</li>
<li>kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-kvmsmall-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-kvmsmall-devel-5.3.18-150300.59.174.1</li>
<li>kernel-kvmsmall-debugsource-5.3.18-150300.59.174.1</li>
<li>kernel-debug-livepatch-devel-5.3.18-150300.59.174.1</li>
<li>kernel-debug-devel-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64)
<ul>
<li>reiserfs-kmp-default-5.3.18-150300.59.174.1</li>
<li>kernel-default-livepatch-5.3.18-150300.59.174.1</li>
<li>kernel-default-extra-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-obs-build-5.3.18-150300.59.174.1</li>
<li>kernel-default-optional-5.3.18-150300.59.174.1</li>
<li>kernel-default-base-5.3.18-150300.59.174.1.150300.18.103.1</li>
<li>kernel-default-livepatch-devel-5.3.18-150300.59.174.1</li>
<li>gfs2-kmp-default-5.3.18-150300.59.174.1</li>
<li>kernel-default-debuginfo-5.3.18-150300.59.174.1</li>
<li>dlm-kmp-default-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-obs-qa-5.3.18-150300.59.174.1</li>
<li>ocfs2-kmp-default-debuginfo-5.3.18-150300.59.174.1</li>
<li>cluster-md-kmp-default-5.3.18-150300.59.174.1</li>
<li>cluster-md-kmp-default-debuginfo-5.3.18-150300.59.174.1</li>
<li>kselftests-kmp-default-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-default-extra-5.3.18-150300.59.174.1</li>
<li>kernel-default-debugsource-5.3.18-150300.59.174.1</li>
<li>ocfs2-kmp-default-5.3.18-150300.59.174.1</li>
<li>kernel-syms-5.3.18-150300.59.174.1</li>
<li>kernel-default-devel-5.3.18-150300.59.174.1</li>
<li>kernel-obs-build-debugsource-5.3.18-150300.59.174.1</li>
<li>reiserfs-kmp-default-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-default-devel-debuginfo-5.3.18-150300.59.174.1</li>
<li>dlm-kmp-default-5.3.18-150300.59.174.1</li>
<li>kernel-default-optional-debuginfo-5.3.18-150300.59.174.1</li>
<li>kselftests-kmp-default-5.3.18-150300.59.174.1</li>
<li>gfs2-kmp-default-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-default-base-rebuild-5.3.18-150300.59.174.1.150300.18.103.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc)
<ul>
<li>kernel-default-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.3 (ppc64le s390x x86_64)
<ul>
<li>kernel-livepatch-5_3_18-150300_59_174-default-1-150300.7.3.1</li>
<li>kernel-livepatch-5_3_18-150300_59_174-default-debuginfo-1-150300.7.3.1</li>
<li>kernel-livepatch-SLE15-SP3_Update_48-debugsource-1-150300.7.3.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.3 (x86_64)
<ul>
<li>kernel-livepatch-5_3_18-150300_59_174-preempt-1-150300.7.3.1</li>
<li>kernel-livepatch-5_3_18-150300_59_174-preempt-debuginfo-1-150300.7.3.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.3 (aarch64 x86_64)
<ul>
<li>kernel-preempt-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-preempt-devel-debuginfo-5.3.18-150300.59.174.1</li>
<li>gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-preempt-extra-5.3.18-150300.59.174.1</li>
<li>kernel-preempt-livepatch-devel-5.3.18-150300.59.174.1</li>
<li>kernel-preempt-optional-5.3.18-150300.59.174.1</li>
<li>ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-preempt-debugsource-5.3.18-150300.59.174.1</li>
<li>kernel-preempt-devel-5.3.18-150300.59.174.1</li>
<li>gfs2-kmp-preempt-5.3.18-150300.59.174.1</li>
<li>kselftests-kmp-preempt-5.3.18-150300.59.174.1</li>
<li>reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.174.1</li>
<li>dlm-kmp-preempt-5.3.18-150300.59.174.1</li>
<li>ocfs2-kmp-preempt-5.3.18-150300.59.174.1</li>
<li>kernel-preempt-optional-debuginfo-5.3.18-150300.59.174.1</li>
<li>cluster-md-kmp-preempt-5.3.18-150300.59.174.1</li>
<li>kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-preempt-extra-debuginfo-5.3.18-150300.59.174.1</li>
<li>reiserfs-kmp-preempt-5.3.18-150300.59.174.1</li>
<li>cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.174.1</li>
<li>dlm-kmp-preempt-debuginfo-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.3 (aarch64 nosrc x86_64)
<ul>
<li>kernel-preempt-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.3 (nosrc s390x)
<ul>
<li>kernel-zfcpdump-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.3 (s390x)
<ul>
<li>kernel-zfcpdump-debugsource-5.3.18-150300.59.174.1</li>
<li>kernel-zfcpdump-debuginfo-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.3 (nosrc)
<ul>
<li>dtb-aarch64-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.3 (aarch64)
<ul>
<li>dtb-socionext-5.3.18-150300.59.174.1</li>
<li>kernel-64kb-extra-5.3.18-150300.59.174.1</li>
<li>reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.174.1</li>
<li>dtb-freescale-5.3.18-150300.59.174.1</li>
<li>dtb-lg-5.3.18-150300.59.174.1</li>
<li>kernel-64kb-optional-5.3.18-150300.59.174.1</li>
<li>dtb-zte-5.3.18-150300.59.174.1</li>
<li>cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.174.1</li>
<li>dtb-apm-5.3.18-150300.59.174.1</li>
<li>dtb-al-5.3.18-150300.59.174.1</li>
<li>cluster-md-kmp-64kb-5.3.18-150300.59.174.1</li>
<li>reiserfs-kmp-64kb-5.3.18-150300.59.174.1</li>
<li>kernel-64kb-devel-debuginfo-5.3.18-150300.59.174.1</li>
<li>dtb-renesas-5.3.18-150300.59.174.1</li>
<li>kernel-64kb-optional-debuginfo-5.3.18-150300.59.174.1</li>
<li>dtb-exynos-5.3.18-150300.59.174.1</li>
<li>kselftests-kmp-64kb-5.3.18-150300.59.174.1</li>
<li>dtb-sprd-5.3.18-150300.59.174.1</li>
<li>kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.174.1</li>
<li>dtb-allwinner-5.3.18-150300.59.174.1</li>
<li>dtb-marvell-5.3.18-150300.59.174.1</li>
<li>dtb-cavium-5.3.18-150300.59.174.1</li>
<li>ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.174.1</li>
<li>dtb-rockchip-5.3.18-150300.59.174.1</li>
<li>dtb-arm-5.3.18-150300.59.174.1</li>
<li>gfs2-kmp-64kb-5.3.18-150300.59.174.1</li>
<li>dlm-kmp-64kb-5.3.18-150300.59.174.1</li>
<li>dtb-xilinx-5.3.18-150300.59.174.1</li>
<li>dtb-mediatek-5.3.18-150300.59.174.1</li>
<li>dtb-amd-5.3.18-150300.59.174.1</li>
<li>kernel-64kb-extra-debuginfo-5.3.18-150300.59.174.1</li>
<li>ocfs2-kmp-64kb-5.3.18-150300.59.174.1</li>
<li>gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-64kb-devel-5.3.18-150300.59.174.1</li>
<li>dtb-altera-5.3.18-150300.59.174.1</li>
<li>dtb-broadcom-5.3.18-150300.59.174.1</li>
<li>dtb-nvidia-5.3.18-150300.59.174.1</li>
<li>dlm-kmp-64kb-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-64kb-livepatch-devel-5.3.18-150300.59.174.1</li>
<li>dtb-hisilicon-5.3.18-150300.59.174.1</li>
<li>kernel-64kb-debugsource-5.3.18-150300.59.174.1</li>
<li>dtb-qcom-5.3.18-150300.59.174.1</li>
<li>kernel-64kb-debuginfo-5.3.18-150300.59.174.1</li>
<li>dtb-amlogic-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.3 (aarch64 nosrc)
<ul>
<li>kernel-64kb-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Live Patching 15-SP3 (nosrc)
<ul>
<li>kernel-default-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
<ul>
<li>kernel-default-livepatch-5.3.18-150300.59.174.1</li>
<li>kernel-default-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-default-debugsource-5.3.18-150300.59.174.1</li>
<li>kernel-livepatch-5_3_18-150300_59_174-default-1-150300.7.3.1</li>
<li>kernel-default-livepatch-devel-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64)
<ul>
<li>gfs2-kmp-default-5.3.18-150300.59.174.1</li>
<li>cluster-md-kmp-default-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-default-debuginfo-5.3.18-150300.59.174.1</li>
<li>dlm-kmp-default-debuginfo-5.3.18-150300.59.174.1</li>
<li>dlm-kmp-default-5.3.18-150300.59.174.1</li>
<li>kernel-default-debugsource-5.3.18-150300.59.174.1</li>
<li>ocfs2-kmp-default-debuginfo-5.3.18-150300.59.174.1</li>
<li>gfs2-kmp-default-debuginfo-5.3.18-150300.59.174.1</li>
<li>cluster-md-kmp-default-5.3.18-150300.59.174.1</li>
<li>ocfs2-kmp-default-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc)
<ul>
<li>kernel-default-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc)
<ul>
<li>kernel-64kb-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64)
<ul>
<li>kernel-64kb-devel-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-64kb-debugsource-5.3.18-150300.59.174.1</li>
<li>kernel-64kb-devel-5.3.18-150300.59.174.1</li>
<li>kernel-64kb-debuginfo-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc x86_64)
<ul>
<li>kernel-preempt-5.3.18-150300.59.174.1</li>
<li>kernel-default-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64)
<ul>
<li>kernel-default-devel-5.3.18-150300.59.174.1</li>
<li>reiserfs-kmp-default-5.3.18-150300.59.174.1</li>
<li>kernel-obs-build-debugsource-5.3.18-150300.59.174.1</li>
<li>kernel-preempt-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-preempt-devel-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-default-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-default-devel-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-syms-5.3.18-150300.59.174.1</li>
<li>kernel-default-debugsource-5.3.18-150300.59.174.1</li>
<li>kernel-obs-build-5.3.18-150300.59.174.1</li>
<li>kernel-preempt-debugsource-5.3.18-150300.59.174.1</li>
<li>kernel-preempt-devel-5.3.18-150300.59.174.1</li>
<li>reiserfs-kmp-default-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-default-base-5.3.18-150300.59.174.1.150300.18.103.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
<ul>
<li>kernel-source-5.3.18-150300.59.174.1</li>
<li>kernel-devel-5.3.18-150300.59.174.1</li>
<li>kernel-macros-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc)
<ul>
<li>kernel-docs-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc)
<ul>
<li>kernel-64kb-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64)
<ul>
<li>kernel-64kb-devel-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-64kb-debugsource-5.3.18-150300.59.174.1</li>
<li>kernel-64kb-devel-5.3.18-150300.59.174.1</li>
<li>kernel-64kb-debuginfo-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64 nosrc)
<ul>
<li>kernel-default-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64)
<ul>
<li>kernel-default-devel-5.3.18-150300.59.174.1</li>
<li>reiserfs-kmp-default-5.3.18-150300.59.174.1</li>
<li>kernel-obs-build-debugsource-5.3.18-150300.59.174.1</li>
<li>kernel-default-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-default-devel-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-default-debugsource-5.3.18-150300.59.174.1</li>
<li>kernel-obs-build-5.3.18-150300.59.174.1</li>
<li>kernel-syms-5.3.18-150300.59.174.1</li>
<li>reiserfs-kmp-default-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-default-base-5.3.18-150300.59.174.1.150300.18.103.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
<ul>
<li>kernel-source-5.3.18-150300.59.174.1</li>
<li>kernel-devel-5.3.18-150300.59.174.1</li>
<li>kernel-macros-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch nosrc)
<ul>
<li>kernel-docs-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc x86_64)
<ul>
<li>kernel-preempt-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64)
<ul>
<li>kernel-preempt-debugsource-5.3.18-150300.59.174.1</li>
<li>kernel-preempt-devel-5.3.18-150300.59.174.1</li>
<li>kernel-preempt-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-preempt-devel-debuginfo-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (nosrc s390x)
<ul>
<li>kernel-zfcpdump-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (s390x)
<ul>
<li>kernel-zfcpdump-debugsource-5.3.18-150300.59.174.1</li>
<li>kernel-zfcpdump-debuginfo-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le x86_64)
<ul>
<li>kernel-default-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
<ul>
<li>kernel-default-devel-5.3.18-150300.59.174.1</li>
<li>reiserfs-kmp-default-5.3.18-150300.59.174.1</li>
<li>kernel-obs-build-debugsource-5.3.18-150300.59.174.1</li>
<li>kernel-default-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-default-devel-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-default-debugsource-5.3.18-150300.59.174.1</li>
<li>kernel-obs-build-5.3.18-150300.59.174.1</li>
<li>kernel-syms-5.3.18-150300.59.174.1</li>
<li>reiserfs-kmp-default-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-default-base-5.3.18-150300.59.174.1.150300.18.103.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
<ul>
<li>kernel-source-5.3.18-150300.59.174.1</li>
<li>kernel-devel-5.3.18-150300.59.174.1</li>
<li>kernel-macros-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc)
<ul>
<li>kernel-docs-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64)
<ul>
<li>kernel-preempt-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
<ul>
<li>kernel-preempt-debugsource-5.3.18-150300.59.174.1</li>
<li>kernel-preempt-devel-5.3.18-150300.59.174.1</li>
<li>kernel-preempt-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-preempt-devel-debuginfo-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Enterprise Storage 7.1 (aarch64 nosrc)
<ul>
<li>kernel-64kb-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Enterprise Storage 7.1 (aarch64)
<ul>
<li>kernel-64kb-devel-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-64kb-debugsource-5.3.18-150300.59.174.1</li>
<li>kernel-64kb-devel-5.3.18-150300.59.174.1</li>
<li>kernel-64kb-debuginfo-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64)
<ul>
<li>kernel-preempt-5.3.18-150300.59.174.1</li>
<li>kernel-default-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Enterprise Storage 7.1 (aarch64 x86_64)
<ul>
<li>kernel-default-devel-5.3.18-150300.59.174.1</li>
<li>reiserfs-kmp-default-5.3.18-150300.59.174.1</li>
<li>kernel-obs-build-debugsource-5.3.18-150300.59.174.1</li>
<li>kernel-preempt-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-preempt-devel-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-default-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-default-devel-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-syms-5.3.18-150300.59.174.1</li>
<li>kernel-default-debugsource-5.3.18-150300.59.174.1</li>
<li>kernel-obs-build-5.3.18-150300.59.174.1</li>
<li>kernel-preempt-debugsource-5.3.18-150300.59.174.1</li>
<li>kernel-preempt-devel-5.3.18-150300.59.174.1</li>
<li>reiserfs-kmp-default-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-default-base-5.3.18-150300.59.174.1.150300.18.103.1</li>
</ul>
</li>
<li>
SUSE Enterprise Storage 7.1 (noarch)
<ul>
<li>kernel-source-5.3.18-150300.59.174.1</li>
<li>kernel-devel-5.3.18-150300.59.174.1</li>
<li>kernel-macros-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Enterprise Storage 7.1 (noarch nosrc)
<ul>
<li>kernel-docs-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64)
<ul>
<li>kernel-default-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
<ul>
<li>kernel-default-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-default-base-5.3.18-150300.59.174.1.150300.18.103.1</li>
<li>kernel-default-debugsource-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64)
<ul>
<li>kernel-default-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64)
<ul>
<li>kernel-default-base-5.3.18-150300.59.174.1.150300.18.103.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
<ul>
<li>kernel-default-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-default-debugsource-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64)
<ul>
<li>kernel-default-5.3.18-150300.59.174.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64)
<ul>
<li>kernel-default-base-5.3.18-150300.59.174.1.150300.18.103.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
<ul>
<li>kernel-default-debuginfo-5.3.18-150300.59.174.1</li>
<li>kernel-default-debugsource-5.3.18-150300.59.174.1</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-4441.html">https://www.suse.com/security/cve/CVE-2021-4441.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-0854.html">https://www.suse.com/security/cve/CVE-2022-0854.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-20368.html">https://www.suse.com/security/cve/CVE-2022-20368.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-28748.html">https://www.suse.com/security/cve/CVE-2022-28748.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-2964.html">https://www.suse.com/security/cve/CVE-2022-2964.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48686.html">https://www.suse.com/security/cve/CVE-2022-48686.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48775.html">https://www.suse.com/security/cve/CVE-2022-48775.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48778.html">https://www.suse.com/security/cve/CVE-2022-48778.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48787.html">https://www.suse.com/security/cve/CVE-2022-48787.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48788.html">https://www.suse.com/security/cve/CVE-2022-48788.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48789.html">https://www.suse.com/security/cve/CVE-2022-48789.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48790.html">https://www.suse.com/security/cve/CVE-2022-48790.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48791.html">https://www.suse.com/security/cve/CVE-2022-48791.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48798.html">https://www.suse.com/security/cve/CVE-2022-48798.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48802.html">https://www.suse.com/security/cve/CVE-2022-48802.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48805.html">https://www.suse.com/security/cve/CVE-2022-48805.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48811.html">https://www.suse.com/security/cve/CVE-2022-48811.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48823.html">https://www.suse.com/security/cve/CVE-2022-48823.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48824.html">https://www.suse.com/security/cve/CVE-2022-48824.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48827.html">https://www.suse.com/security/cve/CVE-2022-48827.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48834.html">https://www.suse.com/security/cve/CVE-2022-48834.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48835.html">https://www.suse.com/security/cve/CVE-2022-48835.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48836.html">https://www.suse.com/security/cve/CVE-2022-48836.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48837.html">https://www.suse.com/security/cve/CVE-2022-48837.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48838.html">https://www.suse.com/security/cve/CVE-2022-48838.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48839.html">https://www.suse.com/security/cve/CVE-2022-48839.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48843.html">https://www.suse.com/security/cve/CVE-2022-48843.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48851.html">https://www.suse.com/security/cve/CVE-2022-48851.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48853.html">https://www.suse.com/security/cve/CVE-2022-48853.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48856.html">https://www.suse.com/security/cve/CVE-2022-48856.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48857.html">https://www.suse.com/security/cve/CVE-2022-48857.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48858.html">https://www.suse.com/security/cve/CVE-2022-48858.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48872.html">https://www.suse.com/security/cve/CVE-2022-48872.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48873.html">https://www.suse.com/security/cve/CVE-2022-48873.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48901.html">https://www.suse.com/security/cve/CVE-2022-48901.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48905.html">https://www.suse.com/security/cve/CVE-2022-48905.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48912.html">https://www.suse.com/security/cve/CVE-2022-48912.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48917.html">https://www.suse.com/security/cve/CVE-2022-48917.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48919.html">https://www.suse.com/security/cve/CVE-2022-48919.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48925.html">https://www.suse.com/security/cve/CVE-2022-48925.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48926.html">https://www.suse.com/security/cve/CVE-2022-48926.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48928.html">https://www.suse.com/security/cve/CVE-2022-48928.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48930.html">https://www.suse.com/security/cve/CVE-2022-48930.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48933.html">https://www.suse.com/security/cve/CVE-2022-48933.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48934.html">https://www.suse.com/security/cve/CVE-2022-48934.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-1582.html">https://www.suse.com/security/cve/CVE-2023-1582.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-2176.html">https://www.suse.com/security/cve/CVE-2023-2176.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52854.html">https://www.suse.com/security/cve/CVE-2023-52854.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26583.html">https://www.suse.com/security/cve/CVE-2024-26583.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26584.html">https://www.suse.com/security/cve/CVE-2024-26584.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26800.html">https://www.suse.com/security/cve/CVE-2024-26800.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40910.html">https://www.suse.com/security/cve/CVE-2024-40910.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41009.html">https://www.suse.com/security/cve/CVE-2024-41009.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41011.html">https://www.suse.com/security/cve/CVE-2024-41011.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41062.html">https://www.suse.com/security/cve/CVE-2024-41062.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42077.html">https://www.suse.com/security/cve/CVE-2024-42077.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42232.html">https://www.suse.com/security/cve/CVE-2024-42232.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42271.html">https://www.suse.com/security/cve/CVE-2024-42271.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43861.html">https://www.suse.com/security/cve/CVE-2024-43861.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43882.html">https://www.suse.com/security/cve/CVE-2024-43882.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43883.html">https://www.suse.com/security/cve/CVE-2024-43883.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44947.html">https://www.suse.com/security/cve/CVE-2024-44947.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1176447">https://bugzilla.suse.com/show_bug.cgi?id=1176447</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195668">https://bugzilla.suse.com/show_bug.cgi?id=1195668</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195928">https://bugzilla.suse.com/show_bug.cgi?id=1195928</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195957">https://bugzilla.suse.com/show_bug.cgi?id=1195957</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1196018">https://bugzilla.suse.com/show_bug.cgi?id=1196018</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1196516">https://bugzilla.suse.com/show_bug.cgi?id=1196516</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1196823">https://bugzilla.suse.com/show_bug.cgi?id=1196823</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1202346">https://bugzilla.suse.com/show_bug.cgi?id=1202346</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209636">https://bugzilla.suse.com/show_bug.cgi?id=1209636</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209799">https://bugzilla.suse.com/show_bug.cgi?id=1209799</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1210629">https://bugzilla.suse.com/show_bug.cgi?id=1210629</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216834">https://bugzilla.suse.com/show_bug.cgi?id=1216834</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220185">https://bugzilla.suse.com/show_bug.cgi?id=1220185</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220186">https://bugzilla.suse.com/show_bug.cgi?id=1220186</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222251">https://bugzilla.suse.com/show_bug.cgi?id=1222251</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222728">https://bugzilla.suse.com/show_bug.cgi?id=1222728</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223948">https://bugzilla.suse.com/show_bug.cgi?id=1223948</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225109">https://bugzilla.suse.com/show_bug.cgi?id=1225109</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225584">https://bugzilla.suse.com/show_bug.cgi?id=1225584</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227832">https://bugzilla.suse.com/show_bug.cgi?id=1227832</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227924">https://bugzilla.suse.com/show_bug.cgi?id=1227924</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227928">https://bugzilla.suse.com/show_bug.cgi?id=1227928</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227932">https://bugzilla.suse.com/show_bug.cgi?id=1227932</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227935">https://bugzilla.suse.com/show_bug.cgi?id=1227935</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227941">https://bugzilla.suse.com/show_bug.cgi?id=1227941</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227942">https://bugzilla.suse.com/show_bug.cgi?id=1227942</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227945">https://bugzilla.suse.com/show_bug.cgi?id=1227945</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227952">https://bugzilla.suse.com/show_bug.cgi?id=1227952</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227964">https://bugzilla.suse.com/show_bug.cgi?id=1227964</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227969">https://bugzilla.suse.com/show_bug.cgi?id=1227969</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227985">https://bugzilla.suse.com/show_bug.cgi?id=1227985</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227987">https://bugzilla.suse.com/show_bug.cgi?id=1227987</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227988">https://bugzilla.suse.com/show_bug.cgi?id=1227988</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227989">https://bugzilla.suse.com/show_bug.cgi?id=1227989</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227997">https://bugzilla.suse.com/show_bug.cgi?id=1227997</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228000">https://bugzilla.suse.com/show_bug.cgi?id=1228000</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228002">https://bugzilla.suse.com/show_bug.cgi?id=1228002</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228004">https://bugzilla.suse.com/show_bug.cgi?id=1228004</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228005">https://bugzilla.suse.com/show_bug.cgi?id=1228005</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228006">https://bugzilla.suse.com/show_bug.cgi?id=1228006</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228015">https://bugzilla.suse.com/show_bug.cgi?id=1228015</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228020">https://bugzilla.suse.com/show_bug.cgi?id=1228020</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228037">https://bugzilla.suse.com/show_bug.cgi?id=1228037</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228045">https://bugzilla.suse.com/show_bug.cgi?id=1228045</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228060">https://bugzilla.suse.com/show_bug.cgi?id=1228060</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228062">https://bugzilla.suse.com/show_bug.cgi?id=1228062</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228066">https://bugzilla.suse.com/show_bug.cgi?id=1228066</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228114">https://bugzilla.suse.com/show_bug.cgi?id=1228114</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228516">https://bugzilla.suse.com/show_bug.cgi?id=1228516</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228576">https://bugzilla.suse.com/show_bug.cgi?id=1228576</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228959">https://bugzilla.suse.com/show_bug.cgi?id=1228959</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229400">https://bugzilla.suse.com/show_bug.cgi?id=1229400</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229454">https://bugzilla.suse.com/show_bug.cgi?id=1229454</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229500">https://bugzilla.suse.com/show_bug.cgi?id=1229500</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229503">https://bugzilla.suse.com/show_bug.cgi?id=1229503</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229510">https://bugzilla.suse.com/show_bug.cgi?id=1229510</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229512">https://bugzilla.suse.com/show_bug.cgi?id=1229512</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229598">https://bugzilla.suse.com/show_bug.cgi?id=1229598</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229604">https://bugzilla.suse.com/show_bug.cgi?id=1229604</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229607">https://bugzilla.suse.com/show_bug.cgi?id=1229607</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229620">https://bugzilla.suse.com/show_bug.cgi?id=1229620</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229621">https://bugzilla.suse.com/show_bug.cgi?id=1229621</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229624">https://bugzilla.suse.com/show_bug.cgi?id=1229624</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229626">https://bugzilla.suse.com/show_bug.cgi?id=1229626</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229629">https://bugzilla.suse.com/show_bug.cgi?id=1229629</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229630">https://bugzilla.suse.com/show_bug.cgi?id=1229630</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229637">https://bugzilla.suse.com/show_bug.cgi?id=1229637</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229641">https://bugzilla.suse.com/show_bug.cgi?id=1229641</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229657">https://bugzilla.suse.com/show_bug.cgi?id=1229657</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229707">https://bugzilla.suse.com/show_bug.cgi?id=1229707</a>
</li>
</ul>
</div>