SUSE-SU-2024:2571-1: important: Security update for the Linux Kernel
SLE-UPDATES
null at suse.de
Mon Jul 22 20:34:22 UTC 2024
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:2571-1
Rating: important
References:
* bsc#1186716
* bsc#1195775
* bsc#1204562
* bsc#1209834
* bsc#1217481
* bsc#1217912
* bsc#1218442
* bsc#1219224
* bsc#1219478
* bsc#1219596
* bsc#1219633
* bsc#1219847
* bsc#1219953
* bsc#1221086
* bsc#1221777
* bsc#1221958
* bsc#1222011
* bsc#1222015
* bsc#1222080
* bsc#1222241
* bsc#1222380
* bsc#1222588
* bsc#1222617
* bsc#1222619
* bsc#1222809
* bsc#1222810
* bsc#1223018
* bsc#1223265
* bsc#1224049
* bsc#1224187
* bsc#1224439
* bsc#1224497
* bsc#1224498
* bsc#1224515
* bsc#1224520
* bsc#1224523
* bsc#1224539
* bsc#1224540
* bsc#1224549
* bsc#1224572
* bsc#1224575
* bsc#1224583
* bsc#1224584
* bsc#1224606
* bsc#1224612
* bsc#1224614
* bsc#1224619
* bsc#1224655
* bsc#1224659
* bsc#1224661
* bsc#1224662
* bsc#1224670
* bsc#1224673
* bsc#1224698
* bsc#1224735
* bsc#1224751
* bsc#1224759
* bsc#1224928
* bsc#1224930
* bsc#1224932
* bsc#1224933
* bsc#1224935
* bsc#1224937
* bsc#1224939
* bsc#1224941
* bsc#1224944
* bsc#1224946
* bsc#1224947
* bsc#1224949
* bsc#1224951
* bsc#1224988
* bsc#1224992
* bsc#1224998
* bsc#1225000
* bsc#1225001
* bsc#1225004
* bsc#1225006
* bsc#1225008
* bsc#1225009
* bsc#1225014
* bsc#1225015
* bsc#1225022
* bsc#1225025
* bsc#1225028
* bsc#1225029
* bsc#1225031
* bsc#1225036
* bsc#1225041
* bsc#1225044
* bsc#1225049
* bsc#1225050
* bsc#1225076
* bsc#1225077
* bsc#1225078
* bsc#1225081
* bsc#1225085
* bsc#1225086
* bsc#1225090
* bsc#1225092
* bsc#1225096
* bsc#1225097
* bsc#1225098
* bsc#1225101
* bsc#1225103
* bsc#1225104
* bsc#1225105
* bsc#1225106
* bsc#1225108
* bsc#1225120
* bsc#1225132
* bsc#1225180
* bsc#1225300
* bsc#1225391
* bsc#1225472
* bsc#1225475
* bsc#1225476
* bsc#1225477
* bsc#1225478
* bsc#1225485
* bsc#1225490
* bsc#1225527
* bsc#1225529
* bsc#1225530
* bsc#1225532
* bsc#1225534
* bsc#1225548
* bsc#1225550
* bsc#1225553
* bsc#1225554
* bsc#1225555
* bsc#1225556
* bsc#1225557
* bsc#1225559
* bsc#1225560
* bsc#1225564
* bsc#1225565
* bsc#1225566
* bsc#1225568
* bsc#1225569
* bsc#1225570
* bsc#1225571
* bsc#1225572
* bsc#1225573
* bsc#1225577
* bsc#1225581
* bsc#1225583
* bsc#1225584
* bsc#1225585
* bsc#1225586
* bsc#1225587
* bsc#1225588
* bsc#1225589
* bsc#1225590
* bsc#1225591
* bsc#1225592
* bsc#1225594
* bsc#1225595
* bsc#1225599
* bsc#1225602
* bsc#1225605
* bsc#1225609
* bsc#1225611
* bsc#1225681
* bsc#1225702
* bsc#1225723
* bsc#1225726
* bsc#1225731
* bsc#1225732
* bsc#1225737
* bsc#1225741
* bsc#1225758
* bsc#1225759
* bsc#1225760
* bsc#1225761
* bsc#1225762
* bsc#1225763
* bsc#1225767
* bsc#1225770
* bsc#1225815
* bsc#1225820
* bsc#1225823
* bsc#1225827
* bsc#1225834
* bsc#1225866
* bsc#1225872
* bsc#1225898
* bsc#1225903
* bsc#1226022
* bsc#1226131
* bsc#1226145
* bsc#1226149
* bsc#1226155
* bsc#1226158
* bsc#1226163
* bsc#1226211
* bsc#1226212
* bsc#1226226
* bsc#1226457
* bsc#1226503
* bsc#1226513
* bsc#1226514
* bsc#1226520
* bsc#1226582
* bsc#1226587
* bsc#1226588
* bsc#1226592
* bsc#1226593
* bsc#1226594
* bsc#1226595
* bsc#1226597
* bsc#1226607
* bsc#1226608
* bsc#1226610
* bsc#1226612
* bsc#1226613
* bsc#1226630
* bsc#1226632
* bsc#1226633
* bsc#1226634
* bsc#1226637
* bsc#1226657
* bsc#1226658
* bsc#1226734
* bsc#1226735
* bsc#1226737
* bsc#1226738
* bsc#1226739
* bsc#1226740
* bsc#1226741
* bsc#1226742
* bsc#1226744
* bsc#1226746
* bsc#1226747
* bsc#1226749
* bsc#1226754
* bsc#1226758
* bsc#1226760
* bsc#1226761
* bsc#1226764
* bsc#1226767
* bsc#1226768
* bsc#1226769
* bsc#1226771
* bsc#1226772
* bsc#1226774
* bsc#1226775
* bsc#1226776
* bsc#1226777
* bsc#1226780
* bsc#1226781
* bsc#1226786
* bsc#1226788
* bsc#1226789
* bsc#1226790
* bsc#1226791
* bsc#1226796
* bsc#1226799
* bsc#1226837
* bsc#1226839
* bsc#1226840
* bsc#1226841
* bsc#1226842
* bsc#1226844
* bsc#1226848
* bsc#1226852
* bsc#1226856
* bsc#1226857
* bsc#1226859
* bsc#1226861
* bsc#1226863
* bsc#1226864
* bsc#1226867
* bsc#1226868
* bsc#1226875
* bsc#1226876
* bsc#1226878
* bsc#1226879
* bsc#1226886
* bsc#1226890
* bsc#1226891
* bsc#1226894
* bsc#1226895
* bsc#1226905
* bsc#1226908
* bsc#1226909
* bsc#1226911
* bsc#1226928
* bsc#1226934
* bsc#1226938
* bsc#1226939
* bsc#1226941
* bsc#1226948
* bsc#1226949
* bsc#1226950
* bsc#1226962
* bsc#1226976
* bsc#1226989
* bsc#1226990
* bsc#1226992
* bsc#1226994
* bsc#1226995
* bsc#1226996
* bsc#1227066
* bsc#1227072
* bsc#1227085
* bsc#1227089
* bsc#1227090
* bsc#1227096
* bsc#1227101
* bsc#1227190
* jsc#PED-8491
* jsc#PED-8570
* jsc#PED-8688
Cross-References:
* CVE-2021-47432
* CVE-2022-48772
* CVE-2023-52622
* CVE-2023-52656
* CVE-2023-52672
* CVE-2023-52699
* CVE-2023-52735
* CVE-2023-52749
* CVE-2023-52750
* CVE-2023-52753
* CVE-2023-52754
* CVE-2023-52757
* CVE-2023-52759
* CVE-2023-52762
* CVE-2023-52763
* CVE-2023-52764
* CVE-2023-52765
* CVE-2023-52766
* CVE-2023-52767
* CVE-2023-52768
* CVE-2023-52769
* CVE-2023-52773
* CVE-2023-52774
* CVE-2023-52776
* CVE-2023-52777
* CVE-2023-52780
* CVE-2023-52781
* CVE-2023-52782
* CVE-2023-52783
* CVE-2023-52784
* CVE-2023-52786
* CVE-2023-52787
* CVE-2023-52788
* CVE-2023-52789
* CVE-2023-52791
* CVE-2023-52792
* CVE-2023-52794
* CVE-2023-52795
* CVE-2023-52796
* CVE-2023-52798
* CVE-2023-52799
* CVE-2023-52800
* CVE-2023-52801
* CVE-2023-52803
* CVE-2023-52804
* CVE-2023-52805
* CVE-2023-52806
* CVE-2023-52807
* CVE-2023-52808
* CVE-2023-52809
* CVE-2023-52810
* CVE-2023-52811
* CVE-2023-52812
* CVE-2023-52813
* CVE-2023-52814
* CVE-2023-52815
* CVE-2023-52816
* CVE-2023-52817
* CVE-2023-52818
* CVE-2023-52819
* CVE-2023-52821
* CVE-2023-52825
* CVE-2023-52826
* CVE-2023-52827
* CVE-2023-52829
* CVE-2023-52832
* CVE-2023-52833
* CVE-2023-52834
* CVE-2023-52835
* CVE-2023-52836
* CVE-2023-52837
* CVE-2023-52838
* CVE-2023-52840
* CVE-2023-52841
* CVE-2023-52842
* CVE-2023-52843
* CVE-2023-52844
* CVE-2023-52845
* CVE-2023-52846
* CVE-2023-52847
* CVE-2023-52849
* CVE-2023-52850
* CVE-2023-52851
* CVE-2023-52853
* CVE-2023-52854
* CVE-2023-52855
* CVE-2023-52856
* CVE-2023-52857
* CVE-2023-52858
* CVE-2023-52861
* CVE-2023-52862
* CVE-2023-52863
* CVE-2023-52864
* CVE-2023-52865
* CVE-2023-52866
* CVE-2023-52867
* CVE-2023-52868
* CVE-2023-52869
* CVE-2023-52870
* CVE-2023-52871
* CVE-2023-52872
* CVE-2023-52873
* CVE-2023-52874
* CVE-2023-52875
* CVE-2023-52876
* CVE-2023-52877
* CVE-2023-52878
* CVE-2023-52879
* CVE-2023-52880
* CVE-2023-52881
* CVE-2023-52883
* CVE-2023-52884
* CVE-2024-26482
* CVE-2024-26625
* CVE-2024-26676
* CVE-2024-26750
* CVE-2024-26758
* CVE-2024-26767
* CVE-2024-26780
* CVE-2024-26813
* CVE-2024-26814
* CVE-2024-26845
* CVE-2024-26889
* CVE-2024-26920
* CVE-2024-27414
* CVE-2024-27419
* CVE-2024-33619
* CVE-2024-34777
* CVE-2024-35247
* CVE-2024-35807
* CVE-2024-35827
* CVE-2024-35831
* CVE-2024-35843
* CVE-2024-35848
* CVE-2024-35857
* CVE-2024-35880
* CVE-2024-35884
* CVE-2024-35886
* CVE-2024-35892
* CVE-2024-35896
* CVE-2024-35898
* CVE-2024-35900
* CVE-2024-35925
* CVE-2024-35926
* CVE-2024-35957
* CVE-2024-35962
* CVE-2024-35970
* CVE-2024-35976
* CVE-2024-35979
* CVE-2024-35998
* CVE-2024-36005
* CVE-2024-36008
* CVE-2024-36010
* CVE-2024-36017
* CVE-2024-36024
* CVE-2024-36281
* CVE-2024-36477
* CVE-2024-36478
* CVE-2024-36479
* CVE-2024-36882
* CVE-2024-36887
* CVE-2024-36899
* CVE-2024-36900
* CVE-2024-36903
* CVE-2024-36904
* CVE-2024-36915
* CVE-2024-36916
* CVE-2024-36917
* CVE-2024-36919
* CVE-2024-36923
* CVE-2024-36924
* CVE-2024-36926
* CVE-2024-36934
* CVE-2024-36935
* CVE-2024-36937
* CVE-2024-36938
* CVE-2024-36945
* CVE-2024-36952
* CVE-2024-36957
* CVE-2024-36960
* CVE-2024-36962
* CVE-2024-36964
* CVE-2024-36965
* CVE-2024-36967
* CVE-2024-36969
* CVE-2024-36971
* CVE-2024-36972
* CVE-2024-36973
* CVE-2024-36975
* CVE-2024-36977
* CVE-2024-36978
* CVE-2024-37021
* CVE-2024-37078
* CVE-2024-37353
* CVE-2024-37354
* CVE-2024-38381
* CVE-2024-38384
* CVE-2024-38385
* CVE-2024-38388
* CVE-2024-38390
* CVE-2024-38391
* CVE-2024-38539
* CVE-2024-38540
* CVE-2024-38541
* CVE-2024-38543
* CVE-2024-38544
* CVE-2024-38545
* CVE-2024-38546
* CVE-2024-38547
* CVE-2024-38548
* CVE-2024-38549
* CVE-2024-38550
* CVE-2024-38551
* CVE-2024-38552
* CVE-2024-38553
* CVE-2024-38554
* CVE-2024-38555
* CVE-2024-38556
* CVE-2024-38557
* CVE-2024-38559
* CVE-2024-38560
* CVE-2024-38562
* CVE-2024-38564
* CVE-2024-38565
* CVE-2024-38566
* CVE-2024-38567
* CVE-2024-38568
* CVE-2024-38569
* CVE-2024-38570
* CVE-2024-38571
* CVE-2024-38572
* CVE-2024-38573
* CVE-2024-38575
* CVE-2024-38578
* CVE-2024-38579
* CVE-2024-38580
* CVE-2024-38581
* CVE-2024-38582
* CVE-2024-38583
* CVE-2024-38587
* CVE-2024-38588
* CVE-2024-38590
* CVE-2024-38591
* CVE-2024-38592
* CVE-2024-38594
* CVE-2024-38595
* CVE-2024-38597
* CVE-2024-38599
* CVE-2024-38600
* CVE-2024-38601
* CVE-2024-38602
* CVE-2024-38603
* CVE-2024-38605
* CVE-2024-38608
* CVE-2024-38610
* CVE-2024-38611
* CVE-2024-38615
* CVE-2024-38616
* CVE-2024-38617
* CVE-2024-38618
* CVE-2024-38619
* CVE-2024-38621
* CVE-2024-38622
* CVE-2024-38627
* CVE-2024-38628
* CVE-2024-38629
* CVE-2024-38630
* CVE-2024-38633
* CVE-2024-38634
* CVE-2024-38635
* CVE-2024-38636
* CVE-2024-38661
* CVE-2024-38663
* CVE-2024-38664
* CVE-2024-38780
* CVE-2024-39277
* CVE-2024-39291
* CVE-2024-39296
* CVE-2024-39301
* CVE-2024-39362
* CVE-2024-39371
* CVE-2024-39463
* CVE-2024-39466
* CVE-2024-39469
* CVE-2024-39471
CVSS scores:
* CVE-2021-47432 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52622 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52656 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52765 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52768 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52769 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52769 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52773 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52776 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-52777 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52780 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52781 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52782 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52783 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52783 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52784 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52786 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-52787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-52795 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52798 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52801 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52803 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52804 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52805 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52807 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52811 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52812 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52815 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52818 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52819 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52825 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52827 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52827 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52829 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-52832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52834 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52835 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52836 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2023-52837 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52838 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52840 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52847 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52849 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52850 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52853 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52856 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52861 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52862 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52865 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52866 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52867 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52868 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52870 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52871 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-52872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52874 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
* CVE-2023-52875 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52876 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52879 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52881 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:L
* CVE-2023-52883 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52884 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26676 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26813 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26814 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27414 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-27419 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-33619 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-34777 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-35247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35843 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-35970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35998 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36017 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-36024 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36477 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-36477 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36478 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36479 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36900 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36903 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36915 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-36916 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-36917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36923 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-36924 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36934 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L
* CVE-2024-36935 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L
* CVE-2024-36937 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36938 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36945 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36952 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36957 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36960 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-36962 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36965 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-36965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36967 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36971 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36971 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36972 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36973 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36977 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36978 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-37021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-37078 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-37353 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-37354 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-38381 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-38384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38388 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-38390 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38391 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-38539 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-38540 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38541 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38543 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38544 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38545 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38546 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38547 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38549 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38550 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38552 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-38553 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38554 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38555 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38557 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38559 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38564 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-38565 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-38566 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38567 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38568 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-38569 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-38570 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38571 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38572 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-38573 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38578 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-38579 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-38580 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38581 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-38582 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38583 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38587 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-38588 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38590 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38591 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38592 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38594 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-38595 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-38597 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38599 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-38600 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38601 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38602 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38605 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38608 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-38610 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38611 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-38615 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38618 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38619 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38627 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38628 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38630 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38636 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-38661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38664 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39277 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-39277 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-39291 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39291 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-39296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39301 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39362 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39463 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-39466 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39469 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39471 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP6
* Development Tools Module 15-SP6
* Legacy Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Availability Extension 15 SP6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP6
An update that solves 285 vulnerabilities, contains three features and has 25
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2024-39371: io_uring: check for non-NULL file pointer in
io_file_can_poll() (bsc#1226990).
* CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame()
(bsc#1225098).
* CVE-2024-38610: drivers/virt/acrn: fix PFNMAP PTE checks in
acrn_vm_ram_map() (bsc#1226758).
* CVE-2024-37354: btrfs: fix crash on racing fsync and size-extending write
into prealloc (bsc#1227101).
* CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources
after upload (bsc#1225767).
* CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated
(bsc#1226785).
* CVE-2024-38570: gfs2: Fix potential glock use-after-free on unmount
(bsc#1226775).
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225732).
* CVE-2023-52840: Fix use after free in rmi_unregister_function()
(bsc#1224928).
* CVE-2024-38545: RDMA/hns: Fix UAF for cq async event (bsc#1226595).
* CVE-2023-52834: atl1c: Work around the DMA RX overflow issue (bsc#1225599).
* CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096).
* CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086).
* CVE-2023-52821: Fixed a possible null pointer dereference (bsc#1225022).
* CVE-2023-52867: Fixed possible buffer overflow (bsc#1225009).
* CVE-2024-38578: ecryptfs: Fix buffer size for tag 66 packet (bsc#1226634,).
* CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
(bsc#1225866).
* CVE-2023-52759: Ignore negated quota changes (bsc#1225560).
* CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
* CVE-2023-52807: Fixed out-of-bounds access may occur when coalesce info is
read via debugfs (bsc#1225097).
* CVE-2023-52864: Fixed opening of char device (bsc#1225132).
* CVE-2024-36926: Fixed LPAR panics during boot up with a frozen PE
(bsc#1222011).
* CVE-2023-52871: Handle a second device without data corruption (bsc#1225534)
* CVE-2023-52795: Fixed use after free in vhost_vdpa_probe() (bsc#1225085).
* CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).
* CVE-2024-37353: virtio: fixed a double free in vp_del_vqs() (bsc#1226875).
* CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994).
* CVE-2024-35843: iommu/vt-d: Use device rbtree in iopf reporting path
(bsc#1224751).
* CVE-2024-37078: nilfs2: fix potential kernel bug due to lack of writeback
flag waiting (bsc#1227066).
* CVE-2024-35247: fpga: region: add owner module and take its refcount
(bsc#1226948).
* CVE-2024-36479: fpga: bridge: add owner module and take its refcount
(bsc#1226949).
* CVE-2024-37021: fpga: manager: add owner module and take its refcount
(bsc#1226950).
* CVE-2024-36281: net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly
delete status rules (bsc#1226799).
* CVE-2024-38580: epoll: be better about file lifetimes (bsc#1226610).
* CVE-2024-36478: null_blk: fix null-ptr-dereference while configuring 'power'
and 'submit_queues' (bsc#1226841).
* CVE-2024-38636: f2fs: multidev: fix to recognize valid zero block address
(bsc#1226879).
* CVE-2024-38661: s390/ap: Fix crash in AP internal function modify_bitmap()
(bsc#1226996).
* CVE-2024-38564: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in
BPF_LINK_CREATE (bsc#1226789).
* CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated
(bsc#1226786).
* CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in
multiq_tune() (bsc#1226514).
* CVE-2024-36917: block: fix overflow in blk_ioctl_discard() (bsc#1225770).
* CVE-2024-38627: stm class: Fix a double free in stm_register_device()
(bsc#1226857).
* CVE-2024-38603: drivers/perf: hisi: hns3: Actually use
devm_add_action_or_reset() (bsc#1226842).
* CVE-2024-38553: net: fec: remove .ndo_poll_controller to avoid deadlock
(bsc#1226744).
* CVE-2024-38555: net/mlx5: Discard command completions in internal error
(bsc#1226607).
* CVE-2024-38556: net/mlx5: Add a timeout to acquire the command queue
semaphore (bsc#1226774).
* CVE-2024-38557: net/mlx5: Reload only IB representors upon lag
disable/enable (bsc#1226781).
* CVE-2024-38608: net/mlx5e: Fix netif state handling (bsc#1226746).
* CVE-2024-38597: eth: sungem: remove .ndo_poll_controller to avoid deadlocks
(bsc#1226749).
* CVE-2024-38594: net: stmmac: move the EST lock to struct stmmac_priv
(bsc#1226734).
* CVE-2024-38569: drivers/perf: hisi_pcie: Fix out-of-bound access when valid
event group (bsc#1226772).
* CVE-2024-38568: drivers/perf: hisi: hns3: Fix out-of-bound access when valid
event group (bsc#1226771).
* CVE-2024-26814: vfio/fsl-mc: Block calling interrupt handler without trigger
(bsc#1222810).
* CVE-2024-26813: vfio/platform: Create persistent IRQ handlers (bsc#1222809).
* CVE-2024-36945: net/smc: fix neighbour and rtable leak in
smc_ib_find_route() (bsc#1225823).
* CVE-2024-36923: fs/9p: fix uninitialized values during inode evict
(bsc#1225815).
* CVE-2024-36971: net: fix __dst_negative_advice() race (bsc#1226145).
* CVE-2024-27414: rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back
(bsc#1224439).
* CVE-2024-35886: ipv6: Fix infinite recursion in fib6_dump_done()
(bsc#1224670).
* CVE-2024-36024: drm/amd/display: Disable idle reallow as part of
command/gpint execution (bsc#1225702).
* CVE-2024-36903: ipv6: Fix potential uninit-value access in __ip6_make_skb()
(bsc#1225741).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1225737).
* CVE-2024-35979: raid1: fix use-after-free for original bio in
raid1_write_request() (bsc#1224572).
* CVE-2024-35807: ext4: fix corruption during on-line resize (bsc#1224735).
* CVE-2023-52622: ext4: avoid online resizing failures due to oversized flex
bg (bsc#1222080).
* CVE-2023-52843: llc: verify mac len before reading mac header (bsc#1224951).
* CVE-2024-35898: netfilter: nf_tables: Fix potential data-race in
__nft_flowtable_type_get() (bsc#1224498).
* CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies
(bsc#1225758).
* CVE-2024-36882: mm: use memalloc_nofs_save() in page_cache_ra_order()
(bsc#1225723).
* CVE-2024-36916: blk-iocost: avoid out of bounds shift (bsc#1225759).
* CVE-2024-36900: net: hns3: fix kernel crash when devlink reload during
initialization (bsc#1225726).
* CVE-2023-52787: blk-mq: make sure active queue usage is held for
bio_integrity_prep() (bsc#1225105).
* CVE-2024-35925: block: prevent division by zero in blk_rq_stat_sum()
(bsc#1224661).
* CVE-2023-52837: nbd: fix uaf in nbd_open (bsc#1224935).
* CVE-2023-52786: ext4: fix racy may inline data check in dio write
(bsc#1224939).
* CVE-2024-36934: bna: ensure the copied buf is NUL terminated (bsc#1225760).
* CVE-2024-36935: ice: ensure the copied buf is NUL terminated (bsc#1225763).
* CVE-2024-36937: xdp: use flags field to disambiguate broadcast redirect
(bsc#1225834).
* CVE-2023-52672: pipe: wakeup wr_wait after setting max_usage (bsc#1224614).
* CVE-2023-52845: tipc: Change nla_policy for bearer-related names to
NLA_NUL_STRING (bsc#1225585).
* CVE-2024-36005: netfilter: nf_tables: honor table dormant flag from netdev
release event path (bsc#1224539).
* CVE-2024-26845: scsi: target: core: Add TMF to tmr_list handling
(bsc#1223018).
* CVE-2024-35892: net/sched: fix lockdep splat in qdisc_tree_reduce_backlog()
(bsc#1224515).
* CVE-2024-35848: eeprom: at24: fix memory corruption race condition
(bsc#1224612).
* CVE-2024-35884: udp: do not accept non-tunnel GSO skbs landing in a tunnel
(bsc#1224520).
* CVE-2024-35857: icmp: prevent possible NULL dereferences from
icmp_build_probe() (bsc#1224619).
* CVE-2023-52735: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call
itself (bsc#1225475).
* CVE-2024-35926: crypto: iaa - Fix async_disable descriptor leak
(bsc#1224655).
* CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING
(bsc#1224575).
* CVE-2024-36938: Fixed NULL pointer dereference in
sk_psock_skb_ingress_enqueue (bsc#1225761).
* CVE-2024-36008: ipv4: check for NULL idev in ip_route_use_hint()
(bsc#1224540).
* CVE-2024-35998: Fixed lock ordering potential deadlock in
cifs_sync_mid_result (bsc#1224549).
* CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548).
* CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759)
* CVE-2024-36957: octeontx2-af: avoid off-by-one read from userspace
(bsc#1225762).
* CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
* CVE-2024-35880: io_uring/kbuf: hold io_buffer_list reference over mmap
(bsc#1224523).
* CVE-2024-35831: io_uring: Fix release of pinned pages when __io_uaddr_map
fails (bsc#1224698).
* CVE-2024-35827: io_uring/net: fix overflow check in io_recvmsg_mshot_prep()
(bsc#1224606).
* CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187).
* CVE-2023-52699: sysv: don't call sb_bread() with pointers_lock held
(bsc#1224659).
The following non-security bugs were fixed:
* KVM: arm64: Use local TLBI on permission relaxation (bsc#1219478).
* KVM: x86/pmu: Prioritize VMX interception over #GP on RDPMC due to bad index
(bsc#1226158).
* NFS: abort nfs_atomic_open_v23 if name is too long (bsc#1219847).
* NFS: add atomic_open for NFSv3 to handle O_TRUNC correctly (bsc#1219847).
* NFS: avoid infinite loop in pnfs_update_layout (bsc#1219633 bsc#1226226).
* PCI: Clear Secondary Status errors after enumeration (bsc#1226928)
* RAS/AMD/ATL: Fix MI300 bank hash (bsc#1225300).
* RAS/AMD/ATL: Use system settings for MI300 DRAM to normalized address
translation (bsc#1225300).
* Revert "build initrd without systemd" (bsc#1195775)"
* arm64: mm: Batch dsb and isb when populating pgtables (jsc#PED-8688).
* arm64: mm: Do not remap pgtables for allocate vs populate (jsc#PED-8688).
* arm64: mm: Do not remap pgtables per-cont(pte|pmd) block (jsc#PED-8688).
* bpf: check bpf_func_state->callback_depth when pruning states (bsc#1225903).
* bpf: correct loop detection for iterators convergence (bsc#1225903).
* bpf: exact states comparison for iterator convergence checks (bsc#1225903).
* bpf: extract __check_reg_arg() utility function (bsc#1225903).
* bpf: extract same_callsites() as utility function (bsc#1225903).
* bpf: extract setup_func_entry() utility function (bsc#1225903).
* bpf: keep track of max number of bpf_loop callback iterations (bsc#1225903).
* bpf: move explored_state() closer to the beginning of verifier.c
(bsc#1225903).
* bpf: print full verifier states on infinite loop detection (bsc#1225903).
* bpf: verify callbacks as if they are called unknown number of times
(bsc#1225903).
* bpf: widening for callback iterators (bsc#1225903).
* cachefiles: remove requests from xarray during flushing requests
(bsc#1226588).
* ceph: add ceph_cap_unlink_work to fire check_caps() immediately
(bsc#1226022).
* ceph: always check dir caps asynchronously (bsc#1226022).
* ceph: always queue a writeback when revoking the Fb caps (bsc#1226022).
* ceph: break the check delayed cap loop every 5s (bsc#1226022).
* ceph: switch to use cap_delay_lock for the unlink delay list (bsc#1226022).
* crypto: deflate - Add aliases to deflate (bsc#1227190).
* crypto: iaa - Account for cpu-less numa nodes (bsc#1227190).
* ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958)
* kABI: bpf: verifier kABI workaround (bsc#1225903).
* net: ena: Fix redundant device NUMA node override (jsc#PED-8688).
* net: mana: Enable MANA driver on ARM64 with 4K page size (jsc#PED-8491).
* nfs: Avoid flushing many pages with NFS_FILE_SYNC (bsc#1218442).
* nfs: Bump default write congestion size (bsc#1218442).
* nfsd: optimise recalculate_deny_mode() for a common case (bsc#1217912).
* nvme-fabrics: short-circuit reconnect retries (bsc#1186716).
* nvme-tcp: Export the nvme_tcp_wq to sysfs (bsc#1224049).
* nvme/tcp: Add wq_unbound modparam for nvme_tcp_wq (bsc#1224049).
* nvme: do not retry authentication failures (bsc#1186716).
* nvme: return kernel error codes for admin queue connect (bsc#1186716).
* nvmet: lock config semaphore when accessing DH-HMAC-CHAP key (bsc#1186716).
* nvmet: return DHCHAP status codes from nvmet_setup_auth() (bsc#1186716).
* ocfs2: adjust enabling place for la window (bsc#1219224).
* ocfs2: fix sparse warnings (bsc#1219224).
* ocfs2: improve write IO performance when fragmentation is high
(bsc#1219224).
* ocfs2: speed up chain-list searching (bsc#1219224).
* rpm/kernel-obs-build.spec.in: Add iso9660 (bsc#1226212).
* rpm/kernel-obs-build.spec.in: Add networking modules for docker
(bsc#1226211).
* s390/cpacf: Make use of invalid opcode produce a link error (bsc#1227072).
* sched/core: Fix incorrect initialization of the 'burst' parameter in
cpu_max_write() (bsc#1226791).
* selftests/bpf: test case for callback_depth states pruning logic
(bsc#1225903).
* selftests/bpf: test if state loops are detected in a tricky case
(bsc#1225903).
* selftests/bpf: test widening for iterating callbacks (bsc#1225903).
* selftests/bpf: tests for iterating callbacks (bsc#1225903).
* selftests/bpf: tests with delayed read/precision makrs in loop body
(bsc#1225903).
* selftests/bpf: track string payload offset as scalar in strobemeta
(bsc#1225903).
* selftests/bpf: track tcp payload offset as scalar in xdp_synproxy
(bsc#1225903).
* supported.conf: Add APM X-Gene SoC hardware monitoring driver (bsc#1223265
jsc#PED-8570)
* tcp: Dump bound-only sockets in inet_diag (bsc#1204562).
* x86/mce: Dynamically size space for machine check records (bsc#1222241).
* x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015
bsc#1226962).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-2571=1 SUSE-2024-2571=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2571=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-2571=1
* Legacy Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-2571=1
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-2571=1
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.
* SUSE Linux Enterprise High Availability Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-2571=1
* SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-2571=1
## Package List:
* openSUSE Leap 15.6 (noarch nosrc)
* kernel-docs-6.4.0-150600.23.14.2
* openSUSE Leap 15.6 (noarch)
* kernel-source-vanilla-6.4.0-150600.23.14.2
* kernel-devel-6.4.0-150600.23.14.2
* kernel-source-6.4.0-150600.23.14.2
* kernel-docs-html-6.4.0-150600.23.14.2
* kernel-macros-6.4.0-150600.23.14.2
* openSUSE Leap 15.6 (nosrc ppc64le x86_64)
* kernel-debug-6.4.0-150600.23.14.2
* openSUSE Leap 15.6 (ppc64le x86_64)
* kernel-debug-debugsource-6.4.0-150600.23.14.2
* kernel-debug-devel-6.4.0-150600.23.14.2
* kernel-debug-livepatch-devel-6.4.0-150600.23.14.2
* kernel-debug-devel-debuginfo-6.4.0-150600.23.14.2
* kernel-debug-debuginfo-6.4.0-150600.23.14.2
* openSUSE Leap 15.6 (x86_64)
* kernel-debug-vdso-debuginfo-6.4.0-150600.23.14.2
* kernel-debug-vdso-6.4.0-150600.23.14.2
* kernel-kvmsmall-vdso-6.4.0-150600.23.14.2
* kernel-default-vdso-debuginfo-6.4.0-150600.23.14.2
* kernel-default-vdso-6.4.0-150600.23.14.2
* kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.14.2
* openSUSE Leap 15.6 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-debugsource-6.4.0-150600.23.14.2
* kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.14.2
* kernel-kvmsmall-debuginfo-6.4.0-150600.23.14.2
* kernel-default-base-rebuild-6.4.0-150600.23.14.2.150600.12.4.3
* kernel-default-base-6.4.0-150600.23.14.2.150600.12.4.3
* kernel-kvmsmall-livepatch-devel-6.4.0-150600.23.14.2
* kernel-kvmsmall-devel-6.4.0-150600.23.14.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kernel-obs-build-debugsource-6.4.0-150600.23.14.2
* ocfs2-kmp-default-debuginfo-6.4.0-150600.23.14.2
* kernel-default-livepatch-6.4.0-150600.23.14.2
* kernel-obs-build-6.4.0-150600.23.14.2
* reiserfs-kmp-default-debuginfo-6.4.0-150600.23.14.2
* kernel-syms-6.4.0-150600.23.14.2
* kernel-default-extra-debuginfo-6.4.0-150600.23.14.2
* ocfs2-kmp-default-6.4.0-150600.23.14.2
* kernel-default-extra-6.4.0-150600.23.14.2
* kernel-default-optional-debuginfo-6.4.0-150600.23.14.2
* kernel-default-optional-6.4.0-150600.23.14.2
* gfs2-kmp-default-6.4.0-150600.23.14.2
* kselftests-kmp-default-debuginfo-6.4.0-150600.23.14.2
* dlm-kmp-default-debuginfo-6.4.0-150600.23.14.2
* kselftests-kmp-default-6.4.0-150600.23.14.2
* reiserfs-kmp-default-6.4.0-150600.23.14.2
* kernel-default-devel-6.4.0-150600.23.14.2
* kernel-default-debuginfo-6.4.0-150600.23.14.2
* kernel-default-devel-debuginfo-6.4.0-150600.23.14.2
* kernel-default-livepatch-devel-6.4.0-150600.23.14.2
* dlm-kmp-default-6.4.0-150600.23.14.2
* kernel-default-debugsource-6.4.0-150600.23.14.2
* gfs2-kmp-default-debuginfo-6.4.0-150600.23.14.2
* cluster-md-kmp-default-debuginfo-6.4.0-150600.23.14.2
* cluster-md-kmp-default-6.4.0-150600.23.14.2
* kernel-obs-qa-6.4.0-150600.23.14.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-6.4.0-150600.23.14.2
* openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-6.4.0-150600.23.14.2
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_14-default-1-150600.13.3.2
* kernel-livepatch-6_4_0-150600_23_14-default-debuginfo-1-150600.13.3.2
* kernel-livepatch-SLE15-SP6_Update_2-debugsource-1-150600.13.3.2
* openSUSE Leap 15.6 (nosrc s390x)
* kernel-zfcpdump-6.4.0-150600.23.14.2
* openSUSE Leap 15.6 (s390x)
* kernel-zfcpdump-debuginfo-6.4.0-150600.23.14.2
* kernel-zfcpdump-debugsource-6.4.0-150600.23.14.2
* openSUSE Leap 15.6 (nosrc)
* dtb-aarch64-6.4.0-150600.23.14.1
* openSUSE Leap 15.6 (aarch64)
* dlm-kmp-64kb-6.4.0-150600.23.14.1
* kernel-64kb-devel-debuginfo-6.4.0-150600.23.14.1
* dtb-cavium-6.4.0-150600.23.14.1
* dtb-socionext-6.4.0-150600.23.14.1
* dtb-hisilicon-6.4.0-150600.23.14.1
* kernel-64kb-livepatch-devel-6.4.0-150600.23.14.1
* kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.14.1
* dtb-apple-6.4.0-150600.23.14.1
* dlm-kmp-64kb-debuginfo-6.4.0-150600.23.14.1
* kernel-64kb-debuginfo-6.4.0-150600.23.14.1
* dtb-sprd-6.4.0-150600.23.14.1
* dtb-broadcom-6.4.0-150600.23.14.1
* kernel-64kb-devel-6.4.0-150600.23.14.1
* kernel-64kb-extra-6.4.0-150600.23.14.1
* reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.14.1
* dtb-marvell-6.4.0-150600.23.14.1
* gfs2-kmp-64kb-6.4.0-150600.23.14.1
* ocfs2-kmp-64kb-6.4.0-150600.23.14.1
* dtb-amlogic-6.4.0-150600.23.14.1
* dtb-mediatek-6.4.0-150600.23.14.1
* dtb-apm-6.4.0-150600.23.14.1
* dtb-arm-6.4.0-150600.23.14.1
* gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.14.1
* dtb-freescale-6.4.0-150600.23.14.1
* reiserfs-kmp-64kb-6.4.0-150600.23.14.1
* kselftests-kmp-64kb-6.4.0-150600.23.14.1
* kernel-64kb-debugsource-6.4.0-150600.23.14.1
* dtb-qcom-6.4.0-150600.23.14.1
* dtb-exynos-6.4.0-150600.23.14.1
* dtb-xilinx-6.4.0-150600.23.14.1
* kernel-64kb-optional-6.4.0-150600.23.14.1
* dtb-renesas-6.4.0-150600.23.14.1
* dtb-amazon-6.4.0-150600.23.14.1
* cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.14.1
* dtb-nvidia-6.4.0-150600.23.14.1
* dtb-lg-6.4.0-150600.23.14.1
* kernel-64kb-optional-debuginfo-6.4.0-150600.23.14.1
* dtb-allwinner-6.4.0-150600.23.14.1
* cluster-md-kmp-64kb-6.4.0-150600.23.14.1
* kernel-64kb-extra-debuginfo-6.4.0-150600.23.14.1
* dtb-altera-6.4.0-150600.23.14.1
* ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.14.1
* dtb-rockchip-6.4.0-150600.23.14.1
* dtb-amd-6.4.0-150600.23.14.1
* openSUSE Leap 15.6 (aarch64 nosrc)
* kernel-64kb-6.4.0-150600.23.14.1
* Basesystem Module 15-SP6 (aarch64 nosrc)
* kernel-64kb-6.4.0-150600.23.14.1
* Basesystem Module 15-SP6 (aarch64)
* kernel-64kb-devel-debuginfo-6.4.0-150600.23.14.1
* kernel-64kb-debuginfo-6.4.0-150600.23.14.1
* kernel-64kb-devel-6.4.0-150600.23.14.1
* kernel-64kb-debugsource-6.4.0-150600.23.14.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-6.4.0-150600.23.14.2
* Basesystem Module 15-SP6 (aarch64 ppc64le x86_64)
* kernel-default-base-6.4.0-150600.23.14.2.150600.12.4.3
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kernel-default-debugsource-6.4.0-150600.23.14.2
* kernel-default-devel-6.4.0-150600.23.14.2
* kernel-default-devel-debuginfo-6.4.0-150600.23.14.2
* kernel-default-debuginfo-6.4.0-150600.23.14.2
* Basesystem Module 15-SP6 (noarch)
* kernel-devel-6.4.0-150600.23.14.2
* kernel-macros-6.4.0-150600.23.14.2
* Basesystem Module 15-SP6 (nosrc s390x)
* kernel-zfcpdump-6.4.0-150600.23.14.2
* Basesystem Module 15-SP6 (s390x)
* kernel-zfcpdump-debuginfo-6.4.0-150600.23.14.2
* kernel-zfcpdump-debugsource-6.4.0-150600.23.14.2
* Development Tools Module 15-SP6 (noarch nosrc)
* kernel-docs-6.4.0-150600.23.14.2
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kernel-obs-build-debugsource-6.4.0-150600.23.14.2
* kernel-syms-6.4.0-150600.23.14.2
* kernel-obs-build-6.4.0-150600.23.14.2
* Development Tools Module 15-SP6 (noarch)
* kernel-source-6.4.0-150600.23.14.2
* Legacy Module 15-SP6 (nosrc)
* kernel-default-6.4.0-150600.23.14.2
* Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kernel-default-debugsource-6.4.0-150600.23.14.2
* reiserfs-kmp-default-debuginfo-6.4.0-150600.23.14.2
* reiserfs-kmp-default-6.4.0-150600.23.14.2
* kernel-default-debuginfo-6.4.0-150600.23.14.2
* SUSE Linux Enterprise Live Patching 15-SP6 (nosrc)
* kernel-default-6.4.0-150600.23.14.2
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_14-default-debuginfo-1-150600.13.3.2
* kernel-livepatch-SLE15-SP6_Update_2-debugsource-1-150600.13.3.2
* kernel-livepatch-6_4_0-150600_23_14-default-1-150600.13.3.2
* kernel-default-debugsource-6.4.0-150600.23.14.2
* kernel-default-livepatch-6.4.0-150600.23.14.2
* kernel-default-debuginfo-6.4.0-150600.23.14.2
* kernel-default-livepatch-devel-6.4.0-150600.23.14.2
* SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le
s390x x86_64)
* gfs2-kmp-default-6.4.0-150600.23.14.2
* dlm-kmp-default-6.4.0-150600.23.14.2
* ocfs2-kmp-default-debuginfo-6.4.0-150600.23.14.2
* dlm-kmp-default-debuginfo-6.4.0-150600.23.14.2
* ocfs2-kmp-default-6.4.0-150600.23.14.2
* kernel-default-debugsource-6.4.0-150600.23.14.2
* gfs2-kmp-default-debuginfo-6.4.0-150600.23.14.2
* cluster-md-kmp-default-debuginfo-6.4.0-150600.23.14.2
* kernel-default-debuginfo-6.4.0-150600.23.14.2
* cluster-md-kmp-default-6.4.0-150600.23.14.2
* SUSE Linux Enterprise High Availability Extension 15 SP6 (nosrc)
* kernel-default-6.4.0-150600.23.14.2
* SUSE Linux Enterprise Workstation Extension 15 SP6 (nosrc)
* kernel-default-6.4.0-150600.23.14.2
* SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
* kernel-default-extra-6.4.0-150600.23.14.2
* kernel-default-extra-debuginfo-6.4.0-150600.23.14.2
* kernel-default-debugsource-6.4.0-150600.23.14.2
* kernel-default-debuginfo-6.4.0-150600.23.14.2
## References:
* https://www.suse.com/security/cve/CVE-2021-47432.html
* https://www.suse.com/security/cve/CVE-2022-48772.html
* https://www.suse.com/security/cve/CVE-2023-52622.html
* https://www.suse.com/security/cve/CVE-2023-52656.html
* https://www.suse.com/security/cve/CVE-2023-52672.html
* https://www.suse.com/security/cve/CVE-2023-52699.html
* https://www.suse.com/security/cve/CVE-2023-52735.html
* https://www.suse.com/security/cve/CVE-2023-52749.html
* https://www.suse.com/security/cve/CVE-2023-52750.html
* https://www.suse.com/security/cve/CVE-2023-52753.html
* https://www.suse.com/security/cve/CVE-2023-52754.html
* https://www.suse.com/security/cve/CVE-2023-52757.html
* https://www.suse.com/security/cve/CVE-2023-52759.html
* https://www.suse.com/security/cve/CVE-2023-52762.html
* https://www.suse.com/security/cve/CVE-2023-52763.html
* https://www.suse.com/security/cve/CVE-2023-52764.html
* https://www.suse.com/security/cve/CVE-2023-52765.html
* https://www.suse.com/security/cve/CVE-2023-52766.html
* https://www.suse.com/security/cve/CVE-2023-52767.html
* https://www.suse.com/security/cve/CVE-2023-52768.html
* https://www.suse.com/security/cve/CVE-2023-52769.html
* https://www.suse.com/security/cve/CVE-2023-52773.html
* https://www.suse.com/security/cve/CVE-2023-52774.html
* https://www.suse.com/security/cve/CVE-2023-52776.html
* https://www.suse.com/security/cve/CVE-2023-52777.html
* https://www.suse.com/security/cve/CVE-2023-52780.html
* https://www.suse.com/security/cve/CVE-2023-52781.html
* https://www.suse.com/security/cve/CVE-2023-52782.html
* https://www.suse.com/security/cve/CVE-2023-52783.html
* https://www.suse.com/security/cve/CVE-2023-52784.html
* https://www.suse.com/security/cve/CVE-2023-52786.html
* https://www.suse.com/security/cve/CVE-2023-52787.html
* https://www.suse.com/security/cve/CVE-2023-52788.html
* https://www.suse.com/security/cve/CVE-2023-52789.html
* https://www.suse.com/security/cve/CVE-2023-52791.html
* https://www.suse.com/security/cve/CVE-2023-52792.html
* https://www.suse.com/security/cve/CVE-2023-52794.html
* https://www.suse.com/security/cve/CVE-2023-52795.html
* https://www.suse.com/security/cve/CVE-2023-52796.html
* https://www.suse.com/security/cve/CVE-2023-52798.html
* https://www.suse.com/security/cve/CVE-2023-52799.html
* https://www.suse.com/security/cve/CVE-2023-52800.html
* https://www.suse.com/security/cve/CVE-2023-52801.html
* https://www.suse.com/security/cve/CVE-2023-52803.html
* https://www.suse.com/security/cve/CVE-2023-52804.html
* https://www.suse.com/security/cve/CVE-2023-52805.html
* https://www.suse.com/security/cve/CVE-2023-52806.html
* https://www.suse.com/security/cve/CVE-2023-52807.html
* https://www.suse.com/security/cve/CVE-2023-52808.html
* https://www.suse.com/security/cve/CVE-2023-52809.html
* https://www.suse.com/security/cve/CVE-2023-52810.html
* https://www.suse.com/security/cve/CVE-2023-52811.html
* https://www.suse.com/security/cve/CVE-2023-52812.html
* https://www.suse.com/security/cve/CVE-2023-52813.html
* https://www.suse.com/security/cve/CVE-2023-52814.html
* https://www.suse.com/security/cve/CVE-2023-52815.html
* https://www.suse.com/security/cve/CVE-2023-52816.html
* https://www.suse.com/security/cve/CVE-2023-52817.html
* https://www.suse.com/security/cve/CVE-2023-52818.html
* https://www.suse.com/security/cve/CVE-2023-52819.html
* https://www.suse.com/security/cve/CVE-2023-52821.html
* https://www.suse.com/security/cve/CVE-2023-52825.html
* https://www.suse.com/security/cve/CVE-2023-52826.html
* https://www.suse.com/security/cve/CVE-2023-52827.html
* https://www.suse.com/security/cve/CVE-2023-52829.html
* https://www.suse.com/security/cve/CVE-2023-52832.html
* https://www.suse.com/security/cve/CVE-2023-52833.html
* https://www.suse.com/security/cve/CVE-2023-52834.html
* https://www.suse.com/security/cve/CVE-2023-52835.html
* https://www.suse.com/security/cve/CVE-2023-52836.html
* https://www.suse.com/security/cve/CVE-2023-52837.html
* https://www.suse.com/security/cve/CVE-2023-52838.html
* https://www.suse.com/security/cve/CVE-2023-52840.html
* https://www.suse.com/security/cve/CVE-2023-52841.html
* https://www.suse.com/security/cve/CVE-2023-52842.html
* https://www.suse.com/security/cve/CVE-2023-52843.html
* https://www.suse.com/security/cve/CVE-2023-52844.html
* https://www.suse.com/security/cve/CVE-2023-52845.html
* https://www.suse.com/security/cve/CVE-2023-52846.html
* https://www.suse.com/security/cve/CVE-2023-52847.html
* https://www.suse.com/security/cve/CVE-2023-52849.html
* https://www.suse.com/security/cve/CVE-2023-52850.html
* https://www.suse.com/security/cve/CVE-2023-52851.html
* https://www.suse.com/security/cve/CVE-2023-52853.html
* https://www.suse.com/security/cve/CVE-2023-52854.html
* https://www.suse.com/security/cve/CVE-2023-52855.html
* https://www.suse.com/security/cve/CVE-2023-52856.html
* https://www.suse.com/security/cve/CVE-2023-52857.html
* https://www.suse.com/security/cve/CVE-2023-52858.html
* https://www.suse.com/security/cve/CVE-2023-52861.html
* https://www.suse.com/security/cve/CVE-2023-52862.html
* https://www.suse.com/security/cve/CVE-2023-52863.html
* https://www.suse.com/security/cve/CVE-2023-52864.html
* https://www.suse.com/security/cve/CVE-2023-52865.html
* https://www.suse.com/security/cve/CVE-2023-52866.html
* https://www.suse.com/security/cve/CVE-2023-52867.html
* https://www.suse.com/security/cve/CVE-2023-52868.html
* https://www.suse.com/security/cve/CVE-2023-52869.html
* https://www.suse.com/security/cve/CVE-2023-52870.html
* https://www.suse.com/security/cve/CVE-2023-52871.html
* https://www.suse.com/security/cve/CVE-2023-52872.html
* https://www.suse.com/security/cve/CVE-2023-52873.html
* https://www.suse.com/security/cve/CVE-2023-52874.html
* https://www.suse.com/security/cve/CVE-2023-52875.html
* https://www.suse.com/security/cve/CVE-2023-52876.html
* https://www.suse.com/security/cve/CVE-2023-52877.html
* https://www.suse.com/security/cve/CVE-2023-52878.html
* https://www.suse.com/security/cve/CVE-2023-52879.html
* https://www.suse.com/security/cve/CVE-2023-52880.html
* https://www.suse.com/security/cve/CVE-2023-52881.html
* https://www.suse.com/security/cve/CVE-2023-52883.html
* https://www.suse.com/security/cve/CVE-2023-52884.html
* https://www.suse.com/security/cve/CVE-2024-26482.html
* https://www.suse.com/security/cve/CVE-2024-26625.html
* https://www.suse.com/security/cve/CVE-2024-26676.html
* https://www.suse.com/security/cve/CVE-2024-26750.html
* https://www.suse.com/security/cve/CVE-2024-26758.html
* https://www.suse.com/security/cve/CVE-2024-26767.html
* https://www.suse.com/security/cve/CVE-2024-26780.html
* https://www.suse.com/security/cve/CVE-2024-26813.html
* https://www.suse.com/security/cve/CVE-2024-26814.html
* https://www.suse.com/security/cve/CVE-2024-26845.html
* https://www.suse.com/security/cve/CVE-2024-26889.html
* https://www.suse.com/security/cve/CVE-2024-26920.html
* https://www.suse.com/security/cve/CVE-2024-27414.html
* https://www.suse.com/security/cve/CVE-2024-27419.html
* https://www.suse.com/security/cve/CVE-2024-33619.html
* https://www.suse.com/security/cve/CVE-2024-34777.html
* https://www.suse.com/security/cve/CVE-2024-35247.html
* https://www.suse.com/security/cve/CVE-2024-35807.html
* https://www.suse.com/security/cve/CVE-2024-35827.html
* https://www.suse.com/security/cve/CVE-2024-35831.html
* https://www.suse.com/security/cve/CVE-2024-35843.html
* https://www.suse.com/security/cve/CVE-2024-35848.html
* https://www.suse.com/security/cve/CVE-2024-35857.html
* https://www.suse.com/security/cve/CVE-2024-35880.html
* https://www.suse.com/security/cve/CVE-2024-35884.html
* https://www.suse.com/security/cve/CVE-2024-35886.html
* https://www.suse.com/security/cve/CVE-2024-35892.html
* https://www.suse.com/security/cve/CVE-2024-35896.html
* https://www.suse.com/security/cve/CVE-2024-35898.html
* https://www.suse.com/security/cve/CVE-2024-35900.html
* https://www.suse.com/security/cve/CVE-2024-35925.html
* https://www.suse.com/security/cve/CVE-2024-35926.html
* https://www.suse.com/security/cve/CVE-2024-35957.html
* https://www.suse.com/security/cve/CVE-2024-35962.html
* https://www.suse.com/security/cve/CVE-2024-35970.html
* https://www.suse.com/security/cve/CVE-2024-35976.html
* https://www.suse.com/security/cve/CVE-2024-35979.html
* https://www.suse.com/security/cve/CVE-2024-35998.html
* https://www.suse.com/security/cve/CVE-2024-36005.html
* https://www.suse.com/security/cve/CVE-2024-36008.html
* https://www.suse.com/security/cve/CVE-2024-36010.html
* https://www.suse.com/security/cve/CVE-2024-36017.html
* https://www.suse.com/security/cve/CVE-2024-36024.html
* https://www.suse.com/security/cve/CVE-2024-36281.html
* https://www.suse.com/security/cve/CVE-2024-36477.html
* https://www.suse.com/security/cve/CVE-2024-36478.html
* https://www.suse.com/security/cve/CVE-2024-36479.html
* https://www.suse.com/security/cve/CVE-2024-36882.html
* https://www.suse.com/security/cve/CVE-2024-36887.html
* https://www.suse.com/security/cve/CVE-2024-36899.html
* https://www.suse.com/security/cve/CVE-2024-36900.html
* https://www.suse.com/security/cve/CVE-2024-36903.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-36915.html
* https://www.suse.com/security/cve/CVE-2024-36916.html
* https://www.suse.com/security/cve/CVE-2024-36917.html
* https://www.suse.com/security/cve/CVE-2024-36919.html
* https://www.suse.com/security/cve/CVE-2024-36923.html
* https://www.suse.com/security/cve/CVE-2024-36924.html
* https://www.suse.com/security/cve/CVE-2024-36926.html
* https://www.suse.com/security/cve/CVE-2024-36934.html
* https://www.suse.com/security/cve/CVE-2024-36935.html
* https://www.suse.com/security/cve/CVE-2024-36937.html
* https://www.suse.com/security/cve/CVE-2024-36938.html
* https://www.suse.com/security/cve/CVE-2024-36945.html
* https://www.suse.com/security/cve/CVE-2024-36952.html
* https://www.suse.com/security/cve/CVE-2024-36957.html
* https://www.suse.com/security/cve/CVE-2024-36960.html
* https://www.suse.com/security/cve/CVE-2024-36962.html
* https://www.suse.com/security/cve/CVE-2024-36964.html
* https://www.suse.com/security/cve/CVE-2024-36965.html
* https://www.suse.com/security/cve/CVE-2024-36967.html
* https://www.suse.com/security/cve/CVE-2024-36969.html
* https://www.suse.com/security/cve/CVE-2024-36971.html
* https://www.suse.com/security/cve/CVE-2024-36972.html
* https://www.suse.com/security/cve/CVE-2024-36973.html
* https://www.suse.com/security/cve/CVE-2024-36975.html
* https://www.suse.com/security/cve/CVE-2024-36977.html
* https://www.suse.com/security/cve/CVE-2024-36978.html
* https://www.suse.com/security/cve/CVE-2024-37021.html
* https://www.suse.com/security/cve/CVE-2024-37078.html
* https://www.suse.com/security/cve/CVE-2024-37353.html
* https://www.suse.com/security/cve/CVE-2024-37354.html
* https://www.suse.com/security/cve/CVE-2024-38381.html
* https://www.suse.com/security/cve/CVE-2024-38384.html
* https://www.suse.com/security/cve/CVE-2024-38385.html
* https://www.suse.com/security/cve/CVE-2024-38388.html
* https://www.suse.com/security/cve/CVE-2024-38390.html
* https://www.suse.com/security/cve/CVE-2024-38391.html
* https://www.suse.com/security/cve/CVE-2024-38539.html
* https://www.suse.com/security/cve/CVE-2024-38540.html
* https://www.suse.com/security/cve/CVE-2024-38541.html
* https://www.suse.com/security/cve/CVE-2024-38543.html
* https://www.suse.com/security/cve/CVE-2024-38544.html
* https://www.suse.com/security/cve/CVE-2024-38545.html
* https://www.suse.com/security/cve/CVE-2024-38546.html
* https://www.suse.com/security/cve/CVE-2024-38547.html
* https://www.suse.com/security/cve/CVE-2024-38548.html
* https://www.suse.com/security/cve/CVE-2024-38549.html
* https://www.suse.com/security/cve/CVE-2024-38550.html
* https://www.suse.com/security/cve/CVE-2024-38551.html
* https://www.suse.com/security/cve/CVE-2024-38552.html
* https://www.suse.com/security/cve/CVE-2024-38553.html
* https://www.suse.com/security/cve/CVE-2024-38554.html
* https://www.suse.com/security/cve/CVE-2024-38555.html
* https://www.suse.com/security/cve/CVE-2024-38556.html
* https://www.suse.com/security/cve/CVE-2024-38557.html
* https://www.suse.com/security/cve/CVE-2024-38559.html
* https://www.suse.com/security/cve/CVE-2024-38560.html
* https://www.suse.com/security/cve/CVE-2024-38562.html
* https://www.suse.com/security/cve/CVE-2024-38564.html
* https://www.suse.com/security/cve/CVE-2024-38565.html
* https://www.suse.com/security/cve/CVE-2024-38566.html
* https://www.suse.com/security/cve/CVE-2024-38567.html
* https://www.suse.com/security/cve/CVE-2024-38568.html
* https://www.suse.com/security/cve/CVE-2024-38569.html
* https://www.suse.com/security/cve/CVE-2024-38570.html
* https://www.suse.com/security/cve/CVE-2024-38571.html
* https://www.suse.com/security/cve/CVE-2024-38572.html
* https://www.suse.com/security/cve/CVE-2024-38573.html
* https://www.suse.com/security/cve/CVE-2024-38575.html
* https://www.suse.com/security/cve/CVE-2024-38578.html
* https://www.suse.com/security/cve/CVE-2024-38579.html
* https://www.suse.com/security/cve/CVE-2024-38580.html
* https://www.suse.com/security/cve/CVE-2024-38581.html
* https://www.suse.com/security/cve/CVE-2024-38582.html
* https://www.suse.com/security/cve/CVE-2024-38583.html
* https://www.suse.com/security/cve/CVE-2024-38587.html
* https://www.suse.com/security/cve/CVE-2024-38588.html
* https://www.suse.com/security/cve/CVE-2024-38590.html
* https://www.suse.com/security/cve/CVE-2024-38591.html
* https://www.suse.com/security/cve/CVE-2024-38592.html
* https://www.suse.com/security/cve/CVE-2024-38594.html
* https://www.suse.com/security/cve/CVE-2024-38595.html
* https://www.suse.com/security/cve/CVE-2024-38597.html
* https://www.suse.com/security/cve/CVE-2024-38599.html
* https://www.suse.com/security/cve/CVE-2024-38600.html
* https://www.suse.com/security/cve/CVE-2024-38601.html
* https://www.suse.com/security/cve/CVE-2024-38602.html
* https://www.suse.com/security/cve/CVE-2024-38603.html
* https://www.suse.com/security/cve/CVE-2024-38605.html
* https://www.suse.com/security/cve/CVE-2024-38608.html
* https://www.suse.com/security/cve/CVE-2024-38610.html
* https://www.suse.com/security/cve/CVE-2024-38611.html
* https://www.suse.com/security/cve/CVE-2024-38615.html
* https://www.suse.com/security/cve/CVE-2024-38616.html
* https://www.suse.com/security/cve/CVE-2024-38617.html
* https://www.suse.com/security/cve/CVE-2024-38618.html
* https://www.suse.com/security/cve/CVE-2024-38619.html
* https://www.suse.com/security/cve/CVE-2024-38621.html
* https://www.suse.com/security/cve/CVE-2024-38622.html
* https://www.suse.com/security/cve/CVE-2024-38627.html
* https://www.suse.com/security/cve/CVE-2024-38628.html
* https://www.suse.com/security/cve/CVE-2024-38629.html
* https://www.suse.com/security/cve/CVE-2024-38630.html
* https://www.suse.com/security/cve/CVE-2024-38633.html
* https://www.suse.com/security/cve/CVE-2024-38634.html
* https://www.suse.com/security/cve/CVE-2024-38635.html
* https://www.suse.com/security/cve/CVE-2024-38636.html
* https://www.suse.com/security/cve/CVE-2024-38661.html
* https://www.suse.com/security/cve/CVE-2024-38663.html
* https://www.suse.com/security/cve/CVE-2024-38664.html
* https://www.suse.com/security/cve/CVE-2024-38780.html
* https://www.suse.com/security/cve/CVE-2024-39277.html
* https://www.suse.com/security/cve/CVE-2024-39291.html
* https://www.suse.com/security/cve/CVE-2024-39296.html
* https://www.suse.com/security/cve/CVE-2024-39301.html
* https://www.suse.com/security/cve/CVE-2024-39362.html
* https://www.suse.com/security/cve/CVE-2024-39371.html
* https://www.suse.com/security/cve/CVE-2024-39463.html
* https://www.suse.com/security/cve/CVE-2024-39466.html
* https://www.suse.com/security/cve/CVE-2024-39469.html
* https://www.suse.com/security/cve/CVE-2024-39471.html
* https://bugzilla.suse.com/show_bug.cgi?id=1186716
* https://bugzilla.suse.com/show_bug.cgi?id=1195775
* https://bugzilla.suse.com/show_bug.cgi?id=1204562
* https://bugzilla.suse.com/show_bug.cgi?id=1209834
* https://bugzilla.suse.com/show_bug.cgi?id=1217481
* https://bugzilla.suse.com/show_bug.cgi?id=1217912
* https://bugzilla.suse.com/show_bug.cgi?id=1218442
* https://bugzilla.suse.com/show_bug.cgi?id=1219224
* https://bugzilla.suse.com/show_bug.cgi?id=1219478
* https://bugzilla.suse.com/show_bug.cgi?id=1219596
* https://bugzilla.suse.com/show_bug.cgi?id=1219633
* https://bugzilla.suse.com/show_bug.cgi?id=1219847
* https://bugzilla.suse.com/show_bug.cgi?id=1219953
* https://bugzilla.suse.com/show_bug.cgi?id=1221086
* https://bugzilla.suse.com/show_bug.cgi?id=1221777
* https://bugzilla.suse.com/show_bug.cgi?id=1221958
* https://bugzilla.suse.com/show_bug.cgi?id=1222011
* https://bugzilla.suse.com/show_bug.cgi?id=1222015
* https://bugzilla.suse.com/show_bug.cgi?id=1222080
* https://bugzilla.suse.com/show_bug.cgi?id=1222241
* https://bugzilla.suse.com/show_bug.cgi?id=1222380
* https://bugzilla.suse.com/show_bug.cgi?id=1222588
* https://bugzilla.suse.com/show_bug.cgi?id=1222617
* https://bugzilla.suse.com/show_bug.cgi?id=1222619
* https://bugzilla.suse.com/show_bug.cgi?id=1222809
* https://bugzilla.suse.com/show_bug.cgi?id=1222810
* https://bugzilla.suse.com/show_bug.cgi?id=1223018
* https://bugzilla.suse.com/show_bug.cgi?id=1223265
* https://bugzilla.suse.com/show_bug.cgi?id=1224049
* https://bugzilla.suse.com/show_bug.cgi?id=1224187
* https://bugzilla.suse.com/show_bug.cgi?id=1224439
* https://bugzilla.suse.com/show_bug.cgi?id=1224497
* https://bugzilla.suse.com/show_bug.cgi?id=1224498
* https://bugzilla.suse.com/show_bug.cgi?id=1224515
* https://bugzilla.suse.com/show_bug.cgi?id=1224520
* https://bugzilla.suse.com/show_bug.cgi?id=1224523
* https://bugzilla.suse.com/show_bug.cgi?id=1224539
* https://bugzilla.suse.com/show_bug.cgi?id=1224540
* https://bugzilla.suse.com/show_bug.cgi?id=1224549
* https://bugzilla.suse.com/show_bug.cgi?id=1224572
* https://bugzilla.suse.com/show_bug.cgi?id=1224575
* https://bugzilla.suse.com/show_bug.cgi?id=1224583
* https://bugzilla.suse.com/show_bug.cgi?id=1224584
* https://bugzilla.suse.com/show_bug.cgi?id=1224606
* https://bugzilla.suse.com/show_bug.cgi?id=1224612
* https://bugzilla.suse.com/show_bug.cgi?id=1224614
* https://bugzilla.suse.com/show_bug.cgi?id=1224619
* https://bugzilla.suse.com/show_bug.cgi?id=1224655
* https://bugzilla.suse.com/show_bug.cgi?id=1224659
* https://bugzilla.suse.com/show_bug.cgi?id=1224661
* https://bugzilla.suse.com/show_bug.cgi?id=1224662
* https://bugzilla.suse.com/show_bug.cgi?id=1224670
* https://bugzilla.suse.com/show_bug.cgi?id=1224673
* https://bugzilla.suse.com/show_bug.cgi?id=1224698
* https://bugzilla.suse.com/show_bug.cgi?id=1224735
* https://bugzilla.suse.com/show_bug.cgi?id=1224751
* https://bugzilla.suse.com/show_bug.cgi?id=1224759
* https://bugzilla.suse.com/show_bug.cgi?id=1224928
* https://bugzilla.suse.com/show_bug.cgi?id=1224930
* https://bugzilla.suse.com/show_bug.cgi?id=1224932
* https://bugzilla.suse.com/show_bug.cgi?id=1224933
* https://bugzilla.suse.com/show_bug.cgi?id=1224935
* https://bugzilla.suse.com/show_bug.cgi?id=1224937
* https://bugzilla.suse.com/show_bug.cgi?id=1224939
* https://bugzilla.suse.com/show_bug.cgi?id=1224941
* https://bugzilla.suse.com/show_bug.cgi?id=1224944
* https://bugzilla.suse.com/show_bug.cgi?id=1224946
* https://bugzilla.suse.com/show_bug.cgi?id=1224947
* https://bugzilla.suse.com/show_bug.cgi?id=1224949
* https://bugzilla.suse.com/show_bug.cgi?id=1224951
* https://bugzilla.suse.com/show_bug.cgi?id=1224988
* https://bugzilla.suse.com/show_bug.cgi?id=1224992
* https://bugzilla.suse.com/show_bug.cgi?id=1224998
* https://bugzilla.suse.com/show_bug.cgi?id=1225000
* https://bugzilla.suse.com/show_bug.cgi?id=1225001
* https://bugzilla.suse.com/show_bug.cgi?id=1225004
* https://bugzilla.suse.com/show_bug.cgi?id=1225006
* https://bugzilla.suse.com/show_bug.cgi?id=1225008
* https://bugzilla.suse.com/show_bug.cgi?id=1225009
* https://bugzilla.suse.com/show_bug.cgi?id=1225014
* https://bugzilla.suse.com/show_bug.cgi?id=1225015
* https://bugzilla.suse.com/show_bug.cgi?id=1225022
* https://bugzilla.suse.com/show_bug.cgi?id=1225025
* https://bugzilla.suse.com/show_bug.cgi?id=1225028
* https://bugzilla.suse.com/show_bug.cgi?id=1225029
* https://bugzilla.suse.com/show_bug.cgi?id=1225031
* https://bugzilla.suse.com/show_bug.cgi?id=1225036
* https://bugzilla.suse.com/show_bug.cgi?id=1225041
* https://bugzilla.suse.com/show_bug.cgi?id=1225044
* https://bugzilla.suse.com/show_bug.cgi?id=1225049
* https://bugzilla.suse.com/show_bug.cgi?id=1225050
* https://bugzilla.suse.com/show_bug.cgi?id=1225076
* https://bugzilla.suse.com/show_bug.cgi?id=1225077
* https://bugzilla.suse.com/show_bug.cgi?id=1225078
* https://bugzilla.suse.com/show_bug.cgi?id=1225081
* https://bugzilla.suse.com/show_bug.cgi?id=1225085
* https://bugzilla.suse.com/show_bug.cgi?id=1225086
* https://bugzilla.suse.com/show_bug.cgi?id=1225090
* https://bugzilla.suse.com/show_bug.cgi?id=1225092
* https://bugzilla.suse.com/show_bug.cgi?id=1225096
* https://bugzilla.suse.com/show_bug.cgi?id=1225097
* https://bugzilla.suse.com/show_bug.cgi?id=1225098
* https://bugzilla.suse.com/show_bug.cgi?id=1225101
* https://bugzilla.suse.com/show_bug.cgi?id=1225103
* https://bugzilla.suse.com/show_bug.cgi?id=1225104
* https://bugzilla.suse.com/show_bug.cgi?id=1225105
* https://bugzilla.suse.com/show_bug.cgi?id=1225106
* https://bugzilla.suse.com/show_bug.cgi?id=1225108
* https://bugzilla.suse.com/show_bug.cgi?id=1225120
* https://bugzilla.suse.com/show_bug.cgi?id=1225132
* https://bugzilla.suse.com/show_bug.cgi?id=1225180
* https://bugzilla.suse.com/show_bug.cgi?id=1225300
* https://bugzilla.suse.com/show_bug.cgi?id=1225391
* https://bugzilla.suse.com/show_bug.cgi?id=1225472
* https://bugzilla.suse.com/show_bug.cgi?id=1225475
* https://bugzilla.suse.com/show_bug.cgi?id=1225476
* https://bugzilla.suse.com/show_bug.cgi?id=1225477
* https://bugzilla.suse.com/show_bug.cgi?id=1225478
* https://bugzilla.suse.com/show_bug.cgi?id=1225485
* https://bugzilla.suse.com/show_bug.cgi?id=1225490
* https://bugzilla.suse.com/show_bug.cgi?id=1225527
* https://bugzilla.suse.com/show_bug.cgi?id=1225529
* https://bugzilla.suse.com/show_bug.cgi?id=1225530
* https://bugzilla.suse.com/show_bug.cgi?id=1225532
* https://bugzilla.suse.com/show_bug.cgi?id=1225534
* https://bugzilla.suse.com/show_bug.cgi?id=1225548
* https://bugzilla.suse.com/show_bug.cgi?id=1225550
* https://bugzilla.suse.com/show_bug.cgi?id=1225553
* https://bugzilla.suse.com/show_bug.cgi?id=1225554
* https://bugzilla.suse.com/show_bug.cgi?id=1225555
* https://bugzilla.suse.com/show_bug.cgi?id=1225556
* https://bugzilla.suse.com/show_bug.cgi?id=1225557
* https://bugzilla.suse.com/show_bug.cgi?id=1225559
* https://bugzilla.suse.com/show_bug.cgi?id=1225560
* https://bugzilla.suse.com/show_bug.cgi?id=1225564
* https://bugzilla.suse.com/show_bug.cgi?id=1225565
* https://bugzilla.suse.com/show_bug.cgi?id=1225566
* https://bugzilla.suse.com/show_bug.cgi?id=1225568
* https://bugzilla.suse.com/show_bug.cgi?id=1225569
* https://bugzilla.suse.com/show_bug.cgi?id=1225570
* https://bugzilla.suse.com/show_bug.cgi?id=1225571
* https://bugzilla.suse.com/show_bug.cgi?id=1225572
* https://bugzilla.suse.com/show_bug.cgi?id=1225573
* https://bugzilla.suse.com/show_bug.cgi?id=1225577
* https://bugzilla.suse.com/show_bug.cgi?id=1225581
* https://bugzilla.suse.com/show_bug.cgi?id=1225583
* https://bugzilla.suse.com/show_bug.cgi?id=1225584
* https://bugzilla.suse.com/show_bug.cgi?id=1225585
* https://bugzilla.suse.com/show_bug.cgi?id=1225586
* https://bugzilla.suse.com/show_bug.cgi?id=1225587
* https://bugzilla.suse.com/show_bug.cgi?id=1225588
* https://bugzilla.suse.com/show_bug.cgi?id=1225589
* https://bugzilla.suse.com/show_bug.cgi?id=1225590
* https://bugzilla.suse.com/show_bug.cgi?id=1225591
* https://bugzilla.suse.com/show_bug.cgi?id=1225592
* https://bugzilla.suse.com/show_bug.cgi?id=1225594
* https://bugzilla.suse.com/show_bug.cgi?id=1225595
* https://bugzilla.suse.com/show_bug.cgi?id=1225599
* https://bugzilla.suse.com/show_bug.cgi?id=1225602
* https://bugzilla.suse.com/show_bug.cgi?id=1225605
* https://bugzilla.suse.com/show_bug.cgi?id=1225609
* https://bugzilla.suse.com/show_bug.cgi?id=1225611
* https://bugzilla.suse.com/show_bug.cgi?id=1225681
* https://bugzilla.suse.com/show_bug.cgi?id=1225702
* https://bugzilla.suse.com/show_bug.cgi?id=1225723
* https://bugzilla.suse.com/show_bug.cgi?id=1225726
* https://bugzilla.suse.com/show_bug.cgi?id=1225731
* https://bugzilla.suse.com/show_bug.cgi?id=1225732
* https://bugzilla.suse.com/show_bug.cgi?id=1225737
* https://bugzilla.suse.com/show_bug.cgi?id=1225741
* https://bugzilla.suse.com/show_bug.cgi?id=1225758
* https://bugzilla.suse.com/show_bug.cgi?id=1225759
* https://bugzilla.suse.com/show_bug.cgi?id=1225760
* https://bugzilla.suse.com/show_bug.cgi?id=1225761
* https://bugzilla.suse.com/show_bug.cgi?id=1225762
* https://bugzilla.suse.com/show_bug.cgi?id=1225763
* https://bugzilla.suse.com/show_bug.cgi?id=1225767
* https://bugzilla.suse.com/show_bug.cgi?id=1225770
* https://bugzilla.suse.com/show_bug.cgi?id=1225815
* https://bugzilla.suse.com/show_bug.cgi?id=1225820
* https://bugzilla.suse.com/show_bug.cgi?id=1225823
* https://bugzilla.suse.com/show_bug.cgi?id=1225827
* https://bugzilla.suse.com/show_bug.cgi?id=1225834
* https://bugzilla.suse.com/show_bug.cgi?id=1225866
* https://bugzilla.suse.com/show_bug.cgi?id=1225872
* https://bugzilla.suse.com/show_bug.cgi?id=1225898
* https://bugzilla.suse.com/show_bug.cgi?id=1225903
* https://bugzilla.suse.com/show_bug.cgi?id=1226022
* https://bugzilla.suse.com/show_bug.cgi?id=1226131
* https://bugzilla.suse.com/show_bug.cgi?id=1226145
* https://bugzilla.suse.com/show_bug.cgi?id=1226149
* https://bugzilla.suse.com/show_bug.cgi?id=1226155
* https://bugzilla.suse.com/show_bug.cgi?id=1226158
* https://bugzilla.suse.com/show_bug.cgi?id=1226163
* https://bugzilla.suse.com/show_bug.cgi?id=1226211
* https://bugzilla.suse.com/show_bug.cgi?id=1226212
* https://bugzilla.suse.com/show_bug.cgi?id=1226226
* https://bugzilla.suse.com/show_bug.cgi?id=1226457
* https://bugzilla.suse.com/show_bug.cgi?id=1226503
* https://bugzilla.suse.com/show_bug.cgi?id=1226513
* https://bugzilla.suse.com/show_bug.cgi?id=1226514
* https://bugzilla.suse.com/show_bug.cgi?id=1226520
* https://bugzilla.suse.com/show_bug.cgi?id=1226582
* https://bugzilla.suse.com/show_bug.cgi?id=1226587
* https://bugzilla.suse.com/show_bug.cgi?id=1226588
* https://bugzilla.suse.com/show_bug.cgi?id=1226592
* https://bugzilla.suse.com/show_bug.cgi?id=1226593
* https://bugzilla.suse.com/show_bug.cgi?id=1226594
* https://bugzilla.suse.com/show_bug.cgi?id=1226595
* https://bugzilla.suse.com/show_bug.cgi?id=1226597
* https://bugzilla.suse.com/show_bug.cgi?id=1226607
* https://bugzilla.suse.com/show_bug.cgi?id=1226608
* https://bugzilla.suse.com/show_bug.cgi?id=1226610
* https://bugzilla.suse.com/show_bug.cgi?id=1226612
* https://bugzilla.suse.com/show_bug.cgi?id=1226613
* https://bugzilla.suse.com/show_bug.cgi?id=1226630
* https://bugzilla.suse.com/show_bug.cgi?id=1226632
* https://bugzilla.suse.com/show_bug.cgi?id=1226633
* https://bugzilla.suse.com/show_bug.cgi?id=1226634
* https://bugzilla.suse.com/show_bug.cgi?id=1226637
* https://bugzilla.suse.com/show_bug.cgi?id=1226657
* https://bugzilla.suse.com/show_bug.cgi?id=1226658
* https://bugzilla.suse.com/show_bug.cgi?id=1226734
* https://bugzilla.suse.com/show_bug.cgi?id=1226735
* https://bugzilla.suse.com/show_bug.cgi?id=1226737
* https://bugzilla.suse.com/show_bug.cgi?id=1226738
* https://bugzilla.suse.com/show_bug.cgi?id=1226739
* https://bugzilla.suse.com/show_bug.cgi?id=1226740
* https://bugzilla.suse.com/show_bug.cgi?id=1226741
* https://bugzilla.suse.com/show_bug.cgi?id=1226742
* https://bugzilla.suse.com/show_bug.cgi?id=1226744
* https://bugzilla.suse.com/show_bug.cgi?id=1226746
* https://bugzilla.suse.com/show_bug.cgi?id=1226747
* https://bugzilla.suse.com/show_bug.cgi?id=1226749
* https://bugzilla.suse.com/show_bug.cgi?id=1226754
* https://bugzilla.suse.com/show_bug.cgi?id=1226758
* https://bugzilla.suse.com/show_bug.cgi?id=1226760
* https://bugzilla.suse.com/show_bug.cgi?id=1226761
* https://bugzilla.suse.com/show_bug.cgi?id=1226764
* https://bugzilla.suse.com/show_bug.cgi?id=1226767
* https://bugzilla.suse.com/show_bug.cgi?id=1226768
* https://bugzilla.suse.com/show_bug.cgi?id=1226769
* https://bugzilla.suse.com/show_bug.cgi?id=1226771
* https://bugzilla.suse.com/show_bug.cgi?id=1226772
* https://bugzilla.suse.com/show_bug.cgi?id=1226774
* https://bugzilla.suse.com/show_bug.cgi?id=1226775
* https://bugzilla.suse.com/show_bug.cgi?id=1226776
* https://bugzilla.suse.com/show_bug.cgi?id=1226777
* https://bugzilla.suse.com/show_bug.cgi?id=1226780
* https://bugzilla.suse.com/show_bug.cgi?id=1226781
* https://bugzilla.suse.com/show_bug.cgi?id=1226786
* https://bugzilla.suse.com/show_bug.cgi?id=1226788
* https://bugzilla.suse.com/show_bug.cgi?id=1226789
* https://bugzilla.suse.com/show_bug.cgi?id=1226790
* https://bugzilla.suse.com/show_bug.cgi?id=1226791
* https://bugzilla.suse.com/show_bug.cgi?id=1226796
* https://bugzilla.suse.com/show_bug.cgi?id=1226799
* https://bugzilla.suse.com/show_bug.cgi?id=1226837
* https://bugzilla.suse.com/show_bug.cgi?id=1226839
* https://bugzilla.suse.com/show_bug.cgi?id=1226840
* https://bugzilla.suse.com/show_bug.cgi?id=1226841
* https://bugzilla.suse.com/show_bug.cgi?id=1226842
* https://bugzilla.suse.com/show_bug.cgi?id=1226844
* https://bugzilla.suse.com/show_bug.cgi?id=1226848
* https://bugzilla.suse.com/show_bug.cgi?id=1226852
* https://bugzilla.suse.com/show_bug.cgi?id=1226856
* https://bugzilla.suse.com/show_bug.cgi?id=1226857
* https://bugzilla.suse.com/show_bug.cgi?id=1226859
* https://bugzilla.suse.com/show_bug.cgi?id=1226861
* https://bugzilla.suse.com/show_bug.cgi?id=1226863
* https://bugzilla.suse.com/show_bug.cgi?id=1226864
* https://bugzilla.suse.com/show_bug.cgi?id=1226867
* https://bugzilla.suse.com/show_bug.cgi?id=1226868
* https://bugzilla.suse.com/show_bug.cgi?id=1226875
* https://bugzilla.suse.com/show_bug.cgi?id=1226876
* https://bugzilla.suse.com/show_bug.cgi?id=1226878
* https://bugzilla.suse.com/show_bug.cgi?id=1226879
* https://bugzilla.suse.com/show_bug.cgi?id=1226886
* https://bugzilla.suse.com/show_bug.cgi?id=1226890
* https://bugzilla.suse.com/show_bug.cgi?id=1226891
* https://bugzilla.suse.com/show_bug.cgi?id=1226894
* https://bugzilla.suse.com/show_bug.cgi?id=1226895
* https://bugzilla.suse.com/show_bug.cgi?id=1226905
* https://bugzilla.suse.com/show_bug.cgi?id=1226908
* https://bugzilla.suse.com/show_bug.cgi?id=1226909
* https://bugzilla.suse.com/show_bug.cgi?id=1226911
* https://bugzilla.suse.com/show_bug.cgi?id=1226928
* https://bugzilla.suse.com/show_bug.cgi?id=1226934
* https://bugzilla.suse.com/show_bug.cgi?id=1226938
* https://bugzilla.suse.com/show_bug.cgi?id=1226939
* https://bugzilla.suse.com/show_bug.cgi?id=1226941
* https://bugzilla.suse.com/show_bug.cgi?id=1226948
* https://bugzilla.suse.com/show_bug.cgi?id=1226949
* https://bugzilla.suse.com/show_bug.cgi?id=1226950
* https://bugzilla.suse.com/show_bug.cgi?id=1226962
* https://bugzilla.suse.com/show_bug.cgi?id=1226976
* https://bugzilla.suse.com/show_bug.cgi?id=1226989
* https://bugzilla.suse.com/show_bug.cgi?id=1226990
* https://bugzilla.suse.com/show_bug.cgi?id=1226992
* https://bugzilla.suse.com/show_bug.cgi?id=1226994
* https://bugzilla.suse.com/show_bug.cgi?id=1226995
* https://bugzilla.suse.com/show_bug.cgi?id=1226996
* https://bugzilla.suse.com/show_bug.cgi?id=1227066
* https://bugzilla.suse.com/show_bug.cgi?id=1227072
* https://bugzilla.suse.com/show_bug.cgi?id=1227085
* https://bugzilla.suse.com/show_bug.cgi?id=1227089
* https://bugzilla.suse.com/show_bug.cgi?id=1227090
* https://bugzilla.suse.com/show_bug.cgi?id=1227096
* https://bugzilla.suse.com/show_bug.cgi?id=1227101
* https://bugzilla.suse.com/show_bug.cgi?id=1227190
* https://jira.suse.com/browse/PED-8491
* https://jira.suse.com/browse/PED-8570
* https://jira.suse.com/browse/PED-8688
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20240722/cca96bf7/attachment.htm>
More information about the sle-updates
mailing list