SUSE-SU-2024:2571-1: important: Security update for the Linux Kernel

SLE-UPDATES null at suse.de
Mon Jul 22 20:34:22 UTC 2024



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:2571-1  
Rating: important  
References:

  * bsc#1186716
  * bsc#1195775
  * bsc#1204562
  * bsc#1209834
  * bsc#1217481
  * bsc#1217912
  * bsc#1218442
  * bsc#1219224
  * bsc#1219478
  * bsc#1219596
  * bsc#1219633
  * bsc#1219847
  * bsc#1219953
  * bsc#1221086
  * bsc#1221777
  * bsc#1221958
  * bsc#1222011
  * bsc#1222015
  * bsc#1222080
  * bsc#1222241
  * bsc#1222380
  * bsc#1222588
  * bsc#1222617
  * bsc#1222619
  * bsc#1222809
  * bsc#1222810
  * bsc#1223018
  * bsc#1223265
  * bsc#1224049
  * bsc#1224187
  * bsc#1224439
  * bsc#1224497
  * bsc#1224498
  * bsc#1224515
  * bsc#1224520
  * bsc#1224523
  * bsc#1224539
  * bsc#1224540
  * bsc#1224549
  * bsc#1224572
  * bsc#1224575
  * bsc#1224583
  * bsc#1224584
  * bsc#1224606
  * bsc#1224612
  * bsc#1224614
  * bsc#1224619
  * bsc#1224655
  * bsc#1224659
  * bsc#1224661
  * bsc#1224662
  * bsc#1224670
  * bsc#1224673
  * bsc#1224698
  * bsc#1224735
  * bsc#1224751
  * bsc#1224759
  * bsc#1224928
  * bsc#1224930
  * bsc#1224932
  * bsc#1224933
  * bsc#1224935
  * bsc#1224937
  * bsc#1224939
  * bsc#1224941
  * bsc#1224944
  * bsc#1224946
  * bsc#1224947
  * bsc#1224949
  * bsc#1224951
  * bsc#1224988
  * bsc#1224992
  * bsc#1224998
  * bsc#1225000
  * bsc#1225001
  * bsc#1225004
  * bsc#1225006
  * bsc#1225008
  * bsc#1225009
  * bsc#1225014
  * bsc#1225015
  * bsc#1225022
  * bsc#1225025
  * bsc#1225028
  * bsc#1225029
  * bsc#1225031
  * bsc#1225036
  * bsc#1225041
  * bsc#1225044
  * bsc#1225049
  * bsc#1225050
  * bsc#1225076
  * bsc#1225077
  * bsc#1225078
  * bsc#1225081
  * bsc#1225085
  * bsc#1225086
  * bsc#1225090
  * bsc#1225092
  * bsc#1225096
  * bsc#1225097
  * bsc#1225098
  * bsc#1225101
  * bsc#1225103
  * bsc#1225104
  * bsc#1225105
  * bsc#1225106
  * bsc#1225108
  * bsc#1225120
  * bsc#1225132
  * bsc#1225180
  * bsc#1225300
  * bsc#1225391
  * bsc#1225472
  * bsc#1225475
  * bsc#1225476
  * bsc#1225477
  * bsc#1225478
  * bsc#1225485
  * bsc#1225490
  * bsc#1225527
  * bsc#1225529
  * bsc#1225530
  * bsc#1225532
  * bsc#1225534
  * bsc#1225548
  * bsc#1225550
  * bsc#1225553
  * bsc#1225554
  * bsc#1225555
  * bsc#1225556
  * bsc#1225557
  * bsc#1225559
  * bsc#1225560
  * bsc#1225564
  * bsc#1225565
  * bsc#1225566
  * bsc#1225568
  * bsc#1225569
  * bsc#1225570
  * bsc#1225571
  * bsc#1225572
  * bsc#1225573
  * bsc#1225577
  * bsc#1225581
  * bsc#1225583
  * bsc#1225584
  * bsc#1225585
  * bsc#1225586
  * bsc#1225587
  * bsc#1225588
  * bsc#1225589
  * bsc#1225590
  * bsc#1225591
  * bsc#1225592
  * bsc#1225594
  * bsc#1225595
  * bsc#1225599
  * bsc#1225602
  * bsc#1225605
  * bsc#1225609
  * bsc#1225611
  * bsc#1225681
  * bsc#1225702
  * bsc#1225723
  * bsc#1225726
  * bsc#1225731
  * bsc#1225732
  * bsc#1225737
  * bsc#1225741
  * bsc#1225758
  * bsc#1225759
  * bsc#1225760
  * bsc#1225761
  * bsc#1225762
  * bsc#1225763
  * bsc#1225767
  * bsc#1225770
  * bsc#1225815
  * bsc#1225820
  * bsc#1225823
  * bsc#1225827
  * bsc#1225834
  * bsc#1225866
  * bsc#1225872
  * bsc#1225898
  * bsc#1225903
  * bsc#1226022
  * bsc#1226131
  * bsc#1226145
  * bsc#1226149
  * bsc#1226155
  * bsc#1226158
  * bsc#1226163
  * bsc#1226211
  * bsc#1226212
  * bsc#1226226
  * bsc#1226457
  * bsc#1226503
  * bsc#1226513
  * bsc#1226514
  * bsc#1226520
  * bsc#1226582
  * bsc#1226587
  * bsc#1226588
  * bsc#1226592
  * bsc#1226593
  * bsc#1226594
  * bsc#1226595
  * bsc#1226597
  * bsc#1226607
  * bsc#1226608
  * bsc#1226610
  * bsc#1226612
  * bsc#1226613
  * bsc#1226630
  * bsc#1226632
  * bsc#1226633
  * bsc#1226634
  * bsc#1226637
  * bsc#1226657
  * bsc#1226658
  * bsc#1226734
  * bsc#1226735
  * bsc#1226737
  * bsc#1226738
  * bsc#1226739
  * bsc#1226740
  * bsc#1226741
  * bsc#1226742
  * bsc#1226744
  * bsc#1226746
  * bsc#1226747
  * bsc#1226749
  * bsc#1226754
  * bsc#1226758
  * bsc#1226760
  * bsc#1226761
  * bsc#1226764
  * bsc#1226767
  * bsc#1226768
  * bsc#1226769
  * bsc#1226771
  * bsc#1226772
  * bsc#1226774
  * bsc#1226775
  * bsc#1226776
  * bsc#1226777
  * bsc#1226780
  * bsc#1226781
  * bsc#1226786
  * bsc#1226788
  * bsc#1226789
  * bsc#1226790
  * bsc#1226791
  * bsc#1226796
  * bsc#1226799
  * bsc#1226837
  * bsc#1226839
  * bsc#1226840
  * bsc#1226841
  * bsc#1226842
  * bsc#1226844
  * bsc#1226848
  * bsc#1226852
  * bsc#1226856
  * bsc#1226857
  * bsc#1226859
  * bsc#1226861
  * bsc#1226863
  * bsc#1226864
  * bsc#1226867
  * bsc#1226868
  * bsc#1226875
  * bsc#1226876
  * bsc#1226878
  * bsc#1226879
  * bsc#1226886
  * bsc#1226890
  * bsc#1226891
  * bsc#1226894
  * bsc#1226895
  * bsc#1226905
  * bsc#1226908
  * bsc#1226909
  * bsc#1226911
  * bsc#1226928
  * bsc#1226934
  * bsc#1226938
  * bsc#1226939
  * bsc#1226941
  * bsc#1226948
  * bsc#1226949
  * bsc#1226950
  * bsc#1226962
  * bsc#1226976
  * bsc#1226989
  * bsc#1226990
  * bsc#1226992
  * bsc#1226994
  * bsc#1226995
  * bsc#1226996
  * bsc#1227066
  * bsc#1227072
  * bsc#1227085
  * bsc#1227089
  * bsc#1227090
  * bsc#1227096
  * bsc#1227101
  * bsc#1227190
  * jsc#PED-8491
  * jsc#PED-8570
  * jsc#PED-8688

  
Cross-References:

  * CVE-2021-47432
  * CVE-2022-48772
  * CVE-2023-52622
  * CVE-2023-52656
  * CVE-2023-52672
  * CVE-2023-52699
  * CVE-2023-52735
  * CVE-2023-52749
  * CVE-2023-52750
  * CVE-2023-52753
  * CVE-2023-52754
  * CVE-2023-52757
  * CVE-2023-52759
  * CVE-2023-52762
  * CVE-2023-52763
  * CVE-2023-52764
  * CVE-2023-52765
  * CVE-2023-52766
  * CVE-2023-52767
  * CVE-2023-52768
  * CVE-2023-52769
  * CVE-2023-52773
  * CVE-2023-52774
  * CVE-2023-52776
  * CVE-2023-52777
  * CVE-2023-52780
  * CVE-2023-52781
  * CVE-2023-52782
  * CVE-2023-52783
  * CVE-2023-52784
  * CVE-2023-52786
  * CVE-2023-52787
  * CVE-2023-52788
  * CVE-2023-52789
  * CVE-2023-52791
  * CVE-2023-52792
  * CVE-2023-52794
  * CVE-2023-52795
  * CVE-2023-52796
  * CVE-2023-52798
  * CVE-2023-52799
  * CVE-2023-52800
  * CVE-2023-52801
  * CVE-2023-52803
  * CVE-2023-52804
  * CVE-2023-52805
  * CVE-2023-52806
  * CVE-2023-52807
  * CVE-2023-52808
  * CVE-2023-52809
  * CVE-2023-52810
  * CVE-2023-52811
  * CVE-2023-52812
  * CVE-2023-52813
  * CVE-2023-52814
  * CVE-2023-52815
  * CVE-2023-52816
  * CVE-2023-52817
  * CVE-2023-52818
  * CVE-2023-52819
  * CVE-2023-52821
  * CVE-2023-52825
  * CVE-2023-52826
  * CVE-2023-52827
  * CVE-2023-52829
  * CVE-2023-52832
  * CVE-2023-52833
  * CVE-2023-52834
  * CVE-2023-52835
  * CVE-2023-52836
  * CVE-2023-52837
  * CVE-2023-52838
  * CVE-2023-52840
  * CVE-2023-52841
  * CVE-2023-52842
  * CVE-2023-52843
  * CVE-2023-52844
  * CVE-2023-52845
  * CVE-2023-52846
  * CVE-2023-52847
  * CVE-2023-52849
  * CVE-2023-52850
  * CVE-2023-52851
  * CVE-2023-52853
  * CVE-2023-52854
  * CVE-2023-52855
  * CVE-2023-52856
  * CVE-2023-52857
  * CVE-2023-52858
  * CVE-2023-52861
  * CVE-2023-52862
  * CVE-2023-52863
  * CVE-2023-52864
  * CVE-2023-52865
  * CVE-2023-52866
  * CVE-2023-52867
  * CVE-2023-52868
  * CVE-2023-52869
  * CVE-2023-52870
  * CVE-2023-52871
  * CVE-2023-52872
  * CVE-2023-52873
  * CVE-2023-52874
  * CVE-2023-52875
  * CVE-2023-52876
  * CVE-2023-52877
  * CVE-2023-52878
  * CVE-2023-52879
  * CVE-2023-52880
  * CVE-2023-52881
  * CVE-2023-52883
  * CVE-2023-52884
  * CVE-2024-26482
  * CVE-2024-26625
  * CVE-2024-26676
  * CVE-2024-26750
  * CVE-2024-26758
  * CVE-2024-26767
  * CVE-2024-26780
  * CVE-2024-26813
  * CVE-2024-26814
  * CVE-2024-26845
  * CVE-2024-26889
  * CVE-2024-26920
  * CVE-2024-27414
  * CVE-2024-27419
  * CVE-2024-33619
  * CVE-2024-34777
  * CVE-2024-35247
  * CVE-2024-35807
  * CVE-2024-35827
  * CVE-2024-35831
  * CVE-2024-35843
  * CVE-2024-35848
  * CVE-2024-35857
  * CVE-2024-35880
  * CVE-2024-35884
  * CVE-2024-35886
  * CVE-2024-35892
  * CVE-2024-35896
  * CVE-2024-35898
  * CVE-2024-35900
  * CVE-2024-35925
  * CVE-2024-35926
  * CVE-2024-35957
  * CVE-2024-35962
  * CVE-2024-35970
  * CVE-2024-35976
  * CVE-2024-35979
  * CVE-2024-35998
  * CVE-2024-36005
  * CVE-2024-36008
  * CVE-2024-36010
  * CVE-2024-36017
  * CVE-2024-36024
  * CVE-2024-36281
  * CVE-2024-36477
  * CVE-2024-36478
  * CVE-2024-36479
  * CVE-2024-36882
  * CVE-2024-36887
  * CVE-2024-36899
  * CVE-2024-36900
  * CVE-2024-36903
  * CVE-2024-36904
  * CVE-2024-36915
  * CVE-2024-36916
  * CVE-2024-36917
  * CVE-2024-36919
  * CVE-2024-36923
  * CVE-2024-36924
  * CVE-2024-36926
  * CVE-2024-36934
  * CVE-2024-36935
  * CVE-2024-36937
  * CVE-2024-36938
  * CVE-2024-36945
  * CVE-2024-36952
  * CVE-2024-36957
  * CVE-2024-36960
  * CVE-2024-36962
  * CVE-2024-36964
  * CVE-2024-36965
  * CVE-2024-36967
  * CVE-2024-36969
  * CVE-2024-36971
  * CVE-2024-36972
  * CVE-2024-36973
  * CVE-2024-36975
  * CVE-2024-36977
  * CVE-2024-36978
  * CVE-2024-37021
  * CVE-2024-37078
  * CVE-2024-37353
  * CVE-2024-37354
  * CVE-2024-38381
  * CVE-2024-38384
  * CVE-2024-38385
  * CVE-2024-38388
  * CVE-2024-38390
  * CVE-2024-38391
  * CVE-2024-38539
  * CVE-2024-38540
  * CVE-2024-38541
  * CVE-2024-38543
  * CVE-2024-38544
  * CVE-2024-38545
  * CVE-2024-38546
  * CVE-2024-38547
  * CVE-2024-38548
  * CVE-2024-38549
  * CVE-2024-38550
  * CVE-2024-38551
  * CVE-2024-38552
  * CVE-2024-38553
  * CVE-2024-38554
  * CVE-2024-38555
  * CVE-2024-38556
  * CVE-2024-38557
  * CVE-2024-38559
  * CVE-2024-38560
  * CVE-2024-38562
  * CVE-2024-38564
  * CVE-2024-38565
  * CVE-2024-38566
  * CVE-2024-38567
  * CVE-2024-38568
  * CVE-2024-38569
  * CVE-2024-38570
  * CVE-2024-38571
  * CVE-2024-38572
  * CVE-2024-38573
  * CVE-2024-38575
  * CVE-2024-38578
  * CVE-2024-38579
  * CVE-2024-38580
  * CVE-2024-38581
  * CVE-2024-38582
  * CVE-2024-38583
  * CVE-2024-38587
  * CVE-2024-38588
  * CVE-2024-38590
  * CVE-2024-38591
  * CVE-2024-38592
  * CVE-2024-38594
  * CVE-2024-38595
  * CVE-2024-38597
  * CVE-2024-38599
  * CVE-2024-38600
  * CVE-2024-38601
  * CVE-2024-38602
  * CVE-2024-38603
  * CVE-2024-38605
  * CVE-2024-38608
  * CVE-2024-38610
  * CVE-2024-38611
  * CVE-2024-38615
  * CVE-2024-38616
  * CVE-2024-38617
  * CVE-2024-38618
  * CVE-2024-38619
  * CVE-2024-38621
  * CVE-2024-38622
  * CVE-2024-38627
  * CVE-2024-38628
  * CVE-2024-38629
  * CVE-2024-38630
  * CVE-2024-38633
  * CVE-2024-38634
  * CVE-2024-38635
  * CVE-2024-38636
  * CVE-2024-38661
  * CVE-2024-38663
  * CVE-2024-38664
  * CVE-2024-38780
  * CVE-2024-39277
  * CVE-2024-39291
  * CVE-2024-39296
  * CVE-2024-39301
  * CVE-2024-39362
  * CVE-2024-39371
  * CVE-2024-39463
  * CVE-2024-39466
  * CVE-2024-39469
  * CVE-2024-39471

  
CVSS scores:

  * CVE-2021-47432 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48772 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52622 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52656 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-52672 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52699 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52735 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52749 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52750 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52753 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52753 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52754 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52757 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52759 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52762 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52763 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52764 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52765 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52766 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-52767 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52768 ( SUSE ):  5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-52769 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52769 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52773 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52773 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52774 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52776 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
  * CVE-2023-52777 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52780 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52781 ( SUSE ):  4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-52782 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52783 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52783 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52784 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52786 ( SUSE ):  3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2023-52787 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52788 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52789 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52791 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52792 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52794 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2023-52795 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52796 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52798 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52799 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52800 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52801 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52803 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52804 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2023-52805 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2023-52806 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52806 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52807 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
  * CVE-2023-52808 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52809 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52809 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52810 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52811 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52812 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2023-52813 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52814 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52814 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52815 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52815 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52816 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52817 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52817 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52818 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-52819 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-52821 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52821 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52825 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52826 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52827 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-52827 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2023-52829 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
  * CVE-2023-52832 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52833 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52834 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-52835 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-52836 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N
  * CVE-2023-52837 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52838 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-52840 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52841 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52842 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52843 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52844 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52845 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52846 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52847 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-52849 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52850 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52851 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52853 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52854 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52855 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52856 ( SUSE ):  4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52857 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52858 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52861 ( SUSE ):  4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52862 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52863 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52864 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52865 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52866 ( SUSE ):  6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52867 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
  * CVE-2023-52868 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52869 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52870 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52871 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2023-52872 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52873 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52874 ( SUSE ):  3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
  * CVE-2023-52875 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52876 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52877 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52878 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52879 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52880 ( SUSE ):  8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52881 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:L
  * CVE-2023-52883 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52884 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26625 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26676 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26750 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26780 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26813 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26814 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26845 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26889 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27414 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-27419 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
  * CVE-2024-33619 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-34777 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-35247 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35807 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35827 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35831 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35843 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-35848 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35857 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35880 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35884 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35886 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35892 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35896 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35898 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35900 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35925 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35926 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2024-35970 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35976 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35979 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35998 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36005 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36008 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36008 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36010 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36017 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-36024 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36281 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36477 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-36477 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36478 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36479 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36882 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36887 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36899 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36900 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36903 ( SUSE ):  5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-36904 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36915 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-36916 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-36917 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36919 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36923 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-36924 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36926 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36926 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36934 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L
  * CVE-2024-36935 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L
  * CVE-2024-36937 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36938 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36938 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36945 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36952 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36957 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-36960 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-36962 ( SUSE ):  6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36964 ( SUSE ):  7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36965 ( SUSE ):  5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-36965 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36967 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36967 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36969 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36969 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36971 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36971 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36972 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36973 ( SUSE ):  6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36975 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36977 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36978 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
  * CVE-2024-37021 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-37078 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-37353 ( SUSE ):  3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-37354 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-38381 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-38384 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38385 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38388 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-38390 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38391 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-38539 ( SUSE ):  2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-38540 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38541 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38543 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38544 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38545 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38546 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38547 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38548 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38549 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38550 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38551 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38552 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-38553 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38554 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38555 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38556 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38557 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38559 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38560 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38562 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38564 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-38565 ( SUSE ):  5.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2024-38566 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38567 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38568 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
  * CVE-2024-38569 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
  * CVE-2024-38570 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38571 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38572 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-38573 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38575 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38578 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-38579 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-38580 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38581 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-38582 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38583 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38587 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
  * CVE-2024-38588 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38590 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38591 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38592 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38594 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-38595 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-38597 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38599 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-38600 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38601 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38602 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38603 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38605 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38608 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2024-38610 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38611 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2024-38615 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38616 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38617 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38618 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38619 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38621 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38622 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38627 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38628 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38629 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38630 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38633 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38634 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38635 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38636 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-38661 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38663 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38664 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38664 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38780 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38780 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39277 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-39277 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-39291 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39291 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-39296 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39301 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39362 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39371 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39463 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-39466 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39469 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39471 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

  
Affected Products:

  * Basesystem Module 15-SP6
  * Development Tools Module 15-SP6
  * Legacy Module 15-SP6
  * openSUSE Leap 15.6
  * SUSE Linux Enterprise Desktop 15 SP6
  * SUSE Linux Enterprise High Availability Extension 15 SP6
  * SUSE Linux Enterprise Live Patching 15-SP6
  * SUSE Linux Enterprise Real Time 15 SP6
  * SUSE Linux Enterprise Server 15 SP6
  * SUSE Linux Enterprise Server for SAP Applications 15 SP6
  * SUSE Linux Enterprise Workstation Extension 15 SP6

  
  
An update that solves 285 vulnerabilities, contains three features and has 25
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

  * CVE-2024-39371: io_uring: check for non-NULL file pointer in
    io_file_can_poll() (bsc#1226990).
  * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame()
    (bsc#1225098).
  * CVE-2024-38610: drivers/virt/acrn: fix PFNMAP PTE checks in
    acrn_vm_ram_map() (bsc#1226758).
  * CVE-2024-37354: btrfs: fix crash on racing fsync and size-extending write
    into prealloc (bsc#1227101).
  * CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources
    after upload (bsc#1225767).
  * CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated
    (bsc#1226785).
  * CVE-2024-38570: gfs2: Fix potential glock use-after-free on unmount
    (bsc#1226775).
  * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
    (bsc#1225732).
  * CVE-2023-52840: Fix use after free in rmi_unregister_function()
    (bsc#1224928).
  * CVE-2024-38545: RDMA/hns: Fix UAF for cq async event (bsc#1226595).
  * CVE-2023-52834: atl1c: Work around the DMA RX overflow issue (bsc#1225599).
  * CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096).
  * CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086).
  * CVE-2023-52821: Fixed a possible null pointer dereference (bsc#1225022).
  * CVE-2023-52867: Fixed possible buffer overflow (bsc#1225009).
  * CVE-2024-38578: ecryptfs: Fix buffer size for tag 66 packet (bsc#1226634,).
  * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
    (bsc#1225866).
  * CVE-2023-52759: Ignore negated quota changes (bsc#1225560).
  * CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
  * CVE-2023-52807: Fixed out-of-bounds access may occur when coalesce info is
    read via debugfs (bsc#1225097).
  * CVE-2023-52864: Fixed opening of char device (bsc#1225132).
  * CVE-2024-36926: Fixed LPAR panics during boot up with a frozen PE
    (bsc#1222011).
  * CVE-2023-52871: Handle a second device without data corruption (bsc#1225534)
  * CVE-2023-52795: Fixed use after free in vhost_vdpa_probe() (bsc#1225085).
  * CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).
  * CVE-2024-37353: virtio: fixed a double free in vp_del_vqs() (bsc#1226875).
  * CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994).
  * CVE-2024-35843: iommu/vt-d: Use device rbtree in iopf reporting path
    (bsc#1224751).
  * CVE-2024-37078: nilfs2: fix potential kernel bug due to lack of writeback
    flag waiting (bsc#1227066).
  * CVE-2024-35247: fpga: region: add owner module and take its refcount
    (bsc#1226948).
  * CVE-2024-36479: fpga: bridge: add owner module and take its refcount
    (bsc#1226949).
  * CVE-2024-37021: fpga: manager: add owner module and take its refcount
    (bsc#1226950).
  * CVE-2024-36281: net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly
    delete status rules (bsc#1226799).
  * CVE-2024-38580: epoll: be better about file lifetimes (bsc#1226610).
  * CVE-2024-36478: null_blk: fix null-ptr-dereference while configuring 'power'
    and 'submit_queues' (bsc#1226841).
  * CVE-2024-38636: f2fs: multidev: fix to recognize valid zero block address
    (bsc#1226879).
  * CVE-2024-38661: s390/ap: Fix crash in AP internal function modify_bitmap()
    (bsc#1226996).
  * CVE-2024-38564: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in
    BPF_LINK_CREATE (bsc#1226789).
  * CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated
    (bsc#1226786).
  * CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in
    multiq_tune() (bsc#1226514).
  * CVE-2024-36917: block: fix overflow in blk_ioctl_discard() (bsc#1225770).
  * CVE-2024-38627: stm class: Fix a double free in stm_register_device()
    (bsc#1226857).
  * CVE-2024-38603: drivers/perf: hisi: hns3: Actually use
    devm_add_action_or_reset() (bsc#1226842).
  * CVE-2024-38553: net: fec: remove .ndo_poll_controller to avoid deadlock
    (bsc#1226744).
  * CVE-2024-38555: net/mlx5: Discard command completions in internal error
    (bsc#1226607).
  * CVE-2024-38556: net/mlx5: Add a timeout to acquire the command queue
    semaphore (bsc#1226774).
  * CVE-2024-38557: net/mlx5: Reload only IB representors upon lag
    disable/enable (bsc#1226781).
  * CVE-2024-38608: net/mlx5e: Fix netif state handling (bsc#1226746).
  * CVE-2024-38597: eth: sungem: remove .ndo_poll_controller to avoid deadlocks
    (bsc#1226749).
  * CVE-2024-38594: net: stmmac: move the EST lock to struct stmmac_priv
    (bsc#1226734).
  * CVE-2024-38569: drivers/perf: hisi_pcie: Fix out-of-bound access when valid
    event group (bsc#1226772).
  * CVE-2024-38568: drivers/perf: hisi: hns3: Fix out-of-bound access when valid
    event group (bsc#1226771).
  * CVE-2024-26814: vfio/fsl-mc: Block calling interrupt handler without trigger
    (bsc#1222810).
  * CVE-2024-26813: vfio/platform: Create persistent IRQ handlers (bsc#1222809).
  * CVE-2024-36945: net/smc: fix neighbour and rtable leak in
    smc_ib_find_route() (bsc#1225823).
  * CVE-2024-36923: fs/9p: fix uninitialized values during inode evict
    (bsc#1225815).
  * CVE-2024-36971: net: fix __dst_negative_advice() race (bsc#1226145).
  * CVE-2024-27414: rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back
    (bsc#1224439).
  * CVE-2024-35886: ipv6: Fix infinite recursion in fib6_dump_done()
    (bsc#1224670).
  * CVE-2024-36024: drm/amd/display: Disable idle reallow as part of
    command/gpint execution (bsc#1225702).
  * CVE-2024-36903: ipv6: Fix potential uninit-value access in __ip6_make_skb()
    (bsc#1225741).
  * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
    (bsc#1225737).
  * CVE-2024-35979: raid1: fix use-after-free for original bio in
    raid1_write_request() (bsc#1224572).
  * CVE-2024-35807: ext4: fix corruption during on-line resize (bsc#1224735).
  * CVE-2023-52622: ext4: avoid online resizing failures due to oversized flex
    bg (bsc#1222080).
  * CVE-2023-52843: llc: verify mac len before reading mac header (bsc#1224951).
  * CVE-2024-35898: netfilter: nf_tables: Fix potential data-race in
    __nft_flowtable_type_get() (bsc#1224498).
  * CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies
    (bsc#1225758).
  * CVE-2024-36882: mm: use memalloc_nofs_save() in page_cache_ra_order()
    (bsc#1225723).
  * CVE-2024-36916: blk-iocost: avoid out of bounds shift (bsc#1225759).
  * CVE-2024-36900: net: hns3: fix kernel crash when devlink reload during
    initialization (bsc#1225726).
  * CVE-2023-52787: blk-mq: make sure active queue usage is held for
    bio_integrity_prep() (bsc#1225105).
  * CVE-2024-35925: block: prevent division by zero in blk_rq_stat_sum()
    (bsc#1224661).
  * CVE-2023-52837: nbd: fix uaf in nbd_open (bsc#1224935).
  * CVE-2023-52786: ext4: fix racy may inline data check in dio write
    (bsc#1224939).
  * CVE-2024-36934: bna: ensure the copied buf is NUL terminated (bsc#1225760).
  * CVE-2024-36935: ice: ensure the copied buf is NUL terminated (bsc#1225763).
  * CVE-2024-36937: xdp: use flags field to disambiguate broadcast redirect
    (bsc#1225834).
  * CVE-2023-52672: pipe: wakeup wr_wait after setting max_usage (bsc#1224614).
  * CVE-2023-52845: tipc: Change nla_policy for bearer-related names to
    NLA_NUL_STRING (bsc#1225585).
  * CVE-2024-36005: netfilter: nf_tables: honor table dormant flag from netdev
    release event path (bsc#1224539).
  * CVE-2024-26845: scsi: target: core: Add TMF to tmr_list handling
    (bsc#1223018).
  * CVE-2024-35892: net/sched: fix lockdep splat in qdisc_tree_reduce_backlog()
    (bsc#1224515).
  * CVE-2024-35848: eeprom: at24: fix memory corruption race condition
    (bsc#1224612).
  * CVE-2024-35884: udp: do not accept non-tunnel GSO skbs landing in a tunnel
    (bsc#1224520).
  * CVE-2024-35857: icmp: prevent possible NULL dereferences from
    icmp_build_probe() (bsc#1224619).
  * CVE-2023-52735: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call
    itself (bsc#1225475).
  * CVE-2024-35926: crypto: iaa - Fix async_disable descriptor leak
    (bsc#1224655).
  * CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING
    (bsc#1224575).
  * CVE-2024-36938: Fixed NULL pointer dereference in
    sk_psock_skb_ingress_enqueue (bsc#1225761).
  * CVE-2024-36008: ipv4: check for NULL idev in ip_route_use_hint()
    (bsc#1224540).
  * CVE-2024-35998: Fixed lock ordering potential deadlock in
    cifs_sync_mid_result (bsc#1224549).
  * CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548).
  * CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759)
  * CVE-2024-36957: octeontx2-af: avoid off-by-one read from userspace
    (bsc#1225762).
  * CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
  * CVE-2024-35880: io_uring/kbuf: hold io_buffer_list reference over mmap
    (bsc#1224523).
  * CVE-2024-35831: io_uring: Fix release of pinned pages when __io_uaddr_map
    fails (bsc#1224698).
  * CVE-2024-35827: io_uring/net: fix overflow check in io_recvmsg_mshot_prep()
    (bsc#1224606).
  * CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187).
  * CVE-2023-52699: sysv: don't call sb_bread() with pointers_lock held
    (bsc#1224659).

The following non-security bugs were fixed:

  * KVM: arm64: Use local TLBI on permission relaxation (bsc#1219478).
  * KVM: x86/pmu: Prioritize VMX interception over #GP on RDPMC due to bad index
    (bsc#1226158).
  * NFS: abort nfs_atomic_open_v23 if name is too long (bsc#1219847).
  * NFS: add atomic_open for NFSv3 to handle O_TRUNC correctly (bsc#1219847).
  * NFS: avoid infinite loop in pnfs_update_layout (bsc#1219633 bsc#1226226).
  * PCI: Clear Secondary Status errors after enumeration (bsc#1226928)
  * RAS/AMD/ATL: Fix MI300 bank hash (bsc#1225300).
  * RAS/AMD/ATL: Use system settings for MI300 DRAM to normalized address
    translation (bsc#1225300).
  * Revert "build initrd without systemd" (bsc#1195775)"
  * arm64: mm: Batch dsb and isb when populating pgtables (jsc#PED-8688).
  * arm64: mm: Do not remap pgtables for allocate vs populate (jsc#PED-8688).
  * arm64: mm: Do not remap pgtables per-cont(pte|pmd) block (jsc#PED-8688).
  * bpf: check bpf_func_state->callback_depth when pruning states (bsc#1225903).
  * bpf: correct loop detection for iterators convergence (bsc#1225903).
  * bpf: exact states comparison for iterator convergence checks (bsc#1225903).
  * bpf: extract __check_reg_arg() utility function (bsc#1225903).
  * bpf: extract same_callsites() as utility function (bsc#1225903).
  * bpf: extract setup_func_entry() utility function (bsc#1225903).
  * bpf: keep track of max number of bpf_loop callback iterations (bsc#1225903).
  * bpf: move explored_state() closer to the beginning of verifier.c
    (bsc#1225903).
  * bpf: print full verifier states on infinite loop detection (bsc#1225903).
  * bpf: verify callbacks as if they are called unknown number of times
    (bsc#1225903).
  * bpf: widening for callback iterators (bsc#1225903).
  * cachefiles: remove requests from xarray during flushing requests
    (bsc#1226588).
  * ceph: add ceph_cap_unlink_work to fire check_caps() immediately
    (bsc#1226022).
  * ceph: always check dir caps asynchronously (bsc#1226022).
  * ceph: always queue a writeback when revoking the Fb caps (bsc#1226022).
  * ceph: break the check delayed cap loop every 5s (bsc#1226022).
  * ceph: switch to use cap_delay_lock for the unlink delay list (bsc#1226022).
  * crypto: deflate - Add aliases to deflate (bsc#1227190).
  * crypto: iaa - Account for cpu-less numa nodes (bsc#1227190).
  * ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958)
  * kABI: bpf: verifier kABI workaround (bsc#1225903).
  * net: ena: Fix redundant device NUMA node override (jsc#PED-8688).
  * net: mana: Enable MANA driver on ARM64 with 4K page size (jsc#PED-8491).
  * nfs: Avoid flushing many pages with NFS_FILE_SYNC (bsc#1218442).
  * nfs: Bump default write congestion size (bsc#1218442).
  * nfsd: optimise recalculate_deny_mode() for a common case (bsc#1217912).
  * nvme-fabrics: short-circuit reconnect retries (bsc#1186716).
  * nvme-tcp: Export the nvme_tcp_wq to sysfs (bsc#1224049).
  * nvme/tcp: Add wq_unbound modparam for nvme_tcp_wq (bsc#1224049).
  * nvme: do not retry authentication failures (bsc#1186716).
  * nvme: return kernel error codes for admin queue connect (bsc#1186716).
  * nvmet: lock config semaphore when accessing DH-HMAC-CHAP key (bsc#1186716).
  * nvmet: return DHCHAP status codes from nvmet_setup_auth() (bsc#1186716).
  * ocfs2: adjust enabling place for la window (bsc#1219224).
  * ocfs2: fix sparse warnings (bsc#1219224).
  * ocfs2: improve write IO performance when fragmentation is high
    (bsc#1219224).
  * ocfs2: speed up chain-list searching (bsc#1219224).
  * rpm/kernel-obs-build.spec.in: Add iso9660 (bsc#1226212).
  * rpm/kernel-obs-build.spec.in: Add networking modules for docker
    (bsc#1226211).
  * s390/cpacf: Make use of invalid opcode produce a link error (bsc#1227072).
  * sched/core: Fix incorrect initialization of the 'burst' parameter in
    cpu_max_write() (bsc#1226791).
  * selftests/bpf: test case for callback_depth states pruning logic
    (bsc#1225903).
  * selftests/bpf: test if state loops are detected in a tricky case
    (bsc#1225903).
  * selftests/bpf: test widening for iterating callbacks (bsc#1225903).
  * selftests/bpf: tests for iterating callbacks (bsc#1225903).
  * selftests/bpf: tests with delayed read/precision makrs in loop body
    (bsc#1225903).
  * selftests/bpf: track string payload offset as scalar in strobemeta
    (bsc#1225903).
  * selftests/bpf: track tcp payload offset as scalar in xdp_synproxy
    (bsc#1225903).
  * supported.conf: Add APM X-Gene SoC hardware monitoring driver (bsc#1223265
    jsc#PED-8570)
  * tcp: Dump bound-only sockets in inet_diag (bsc#1204562).
  * x86/mce: Dynamically size space for machine check records (bsc#1222241).
  * x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015
    bsc#1226962).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * openSUSE Leap 15.6  
    zypper in -t patch openSUSE-SLE-15.6-2024-2571=1 SUSE-2024-2571=1

  * Basesystem Module 15-SP6  
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2571=1

  * Development Tools Module 15-SP6  
    zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-2571=1

  * Legacy Module 15-SP6  
    zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-2571=1

  * SUSE Linux Enterprise Live Patching 15-SP6  
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-2571=1  
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.

  * SUSE Linux Enterprise High Availability Extension 15 SP6  
    zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-2571=1

  * SUSE Linux Enterprise Workstation Extension 15 SP6  
    zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-2571=1

## Package List:

  * openSUSE Leap 15.6 (noarch nosrc)
    * kernel-docs-6.4.0-150600.23.14.2
  * openSUSE Leap 15.6 (noarch)
    * kernel-source-vanilla-6.4.0-150600.23.14.2
    * kernel-devel-6.4.0-150600.23.14.2
    * kernel-source-6.4.0-150600.23.14.2
    * kernel-docs-html-6.4.0-150600.23.14.2
    * kernel-macros-6.4.0-150600.23.14.2
  * openSUSE Leap 15.6 (nosrc ppc64le x86_64)
    * kernel-debug-6.4.0-150600.23.14.2
  * openSUSE Leap 15.6 (ppc64le x86_64)
    * kernel-debug-debugsource-6.4.0-150600.23.14.2
    * kernel-debug-devel-6.4.0-150600.23.14.2
    * kernel-debug-livepatch-devel-6.4.0-150600.23.14.2
    * kernel-debug-devel-debuginfo-6.4.0-150600.23.14.2
    * kernel-debug-debuginfo-6.4.0-150600.23.14.2
  * openSUSE Leap 15.6 (x86_64)
    * kernel-debug-vdso-debuginfo-6.4.0-150600.23.14.2
    * kernel-debug-vdso-6.4.0-150600.23.14.2
    * kernel-kvmsmall-vdso-6.4.0-150600.23.14.2
    * kernel-default-vdso-debuginfo-6.4.0-150600.23.14.2
    * kernel-default-vdso-6.4.0-150600.23.14.2
    * kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.14.2
  * openSUSE Leap 15.6 (aarch64 ppc64le x86_64)
    * kernel-kvmsmall-debugsource-6.4.0-150600.23.14.2
    * kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.14.2
    * kernel-kvmsmall-debuginfo-6.4.0-150600.23.14.2
    * kernel-default-base-rebuild-6.4.0-150600.23.14.2.150600.12.4.3
    * kernel-default-base-6.4.0-150600.23.14.2.150600.12.4.3
    * kernel-kvmsmall-livepatch-devel-6.4.0-150600.23.14.2
    * kernel-kvmsmall-devel-6.4.0-150600.23.14.2
  * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
    * kernel-obs-build-debugsource-6.4.0-150600.23.14.2
    * ocfs2-kmp-default-debuginfo-6.4.0-150600.23.14.2
    * kernel-default-livepatch-6.4.0-150600.23.14.2
    * kernel-obs-build-6.4.0-150600.23.14.2
    * reiserfs-kmp-default-debuginfo-6.4.0-150600.23.14.2
    * kernel-syms-6.4.0-150600.23.14.2
    * kernel-default-extra-debuginfo-6.4.0-150600.23.14.2
    * ocfs2-kmp-default-6.4.0-150600.23.14.2
    * kernel-default-extra-6.4.0-150600.23.14.2
    * kernel-default-optional-debuginfo-6.4.0-150600.23.14.2
    * kernel-default-optional-6.4.0-150600.23.14.2
    * gfs2-kmp-default-6.4.0-150600.23.14.2
    * kselftests-kmp-default-debuginfo-6.4.0-150600.23.14.2
    * dlm-kmp-default-debuginfo-6.4.0-150600.23.14.2
    * kselftests-kmp-default-6.4.0-150600.23.14.2
    * reiserfs-kmp-default-6.4.0-150600.23.14.2
    * kernel-default-devel-6.4.0-150600.23.14.2
    * kernel-default-debuginfo-6.4.0-150600.23.14.2
    * kernel-default-devel-debuginfo-6.4.0-150600.23.14.2
    * kernel-default-livepatch-devel-6.4.0-150600.23.14.2
    * dlm-kmp-default-6.4.0-150600.23.14.2
    * kernel-default-debugsource-6.4.0-150600.23.14.2
    * gfs2-kmp-default-debuginfo-6.4.0-150600.23.14.2
    * cluster-md-kmp-default-debuginfo-6.4.0-150600.23.14.2
    * cluster-md-kmp-default-6.4.0-150600.23.14.2
    * kernel-obs-qa-6.4.0-150600.23.14.2
  * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc)
    * kernel-default-6.4.0-150600.23.14.2
  * openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64)
    * kernel-kvmsmall-6.4.0-150600.23.14.2
  * openSUSE Leap 15.6 (ppc64le s390x x86_64)
    * kernel-livepatch-6_4_0-150600_23_14-default-1-150600.13.3.2
    * kernel-livepatch-6_4_0-150600_23_14-default-debuginfo-1-150600.13.3.2
    * kernel-livepatch-SLE15-SP6_Update_2-debugsource-1-150600.13.3.2
  * openSUSE Leap 15.6 (nosrc s390x)
    * kernel-zfcpdump-6.4.0-150600.23.14.2
  * openSUSE Leap 15.6 (s390x)
    * kernel-zfcpdump-debuginfo-6.4.0-150600.23.14.2
    * kernel-zfcpdump-debugsource-6.4.0-150600.23.14.2
  * openSUSE Leap 15.6 (nosrc)
    * dtb-aarch64-6.4.0-150600.23.14.1
  * openSUSE Leap 15.6 (aarch64)
    * dlm-kmp-64kb-6.4.0-150600.23.14.1
    * kernel-64kb-devel-debuginfo-6.4.0-150600.23.14.1
    * dtb-cavium-6.4.0-150600.23.14.1
    * dtb-socionext-6.4.0-150600.23.14.1
    * dtb-hisilicon-6.4.0-150600.23.14.1
    * kernel-64kb-livepatch-devel-6.4.0-150600.23.14.1
    * kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.14.1
    * dtb-apple-6.4.0-150600.23.14.1
    * dlm-kmp-64kb-debuginfo-6.4.0-150600.23.14.1
    * kernel-64kb-debuginfo-6.4.0-150600.23.14.1
    * dtb-sprd-6.4.0-150600.23.14.1
    * dtb-broadcom-6.4.0-150600.23.14.1
    * kernel-64kb-devel-6.4.0-150600.23.14.1
    * kernel-64kb-extra-6.4.0-150600.23.14.1
    * reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.14.1
    * dtb-marvell-6.4.0-150600.23.14.1
    * gfs2-kmp-64kb-6.4.0-150600.23.14.1
    * ocfs2-kmp-64kb-6.4.0-150600.23.14.1
    * dtb-amlogic-6.4.0-150600.23.14.1
    * dtb-mediatek-6.4.0-150600.23.14.1
    * dtb-apm-6.4.0-150600.23.14.1
    * dtb-arm-6.4.0-150600.23.14.1
    * gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.14.1
    * dtb-freescale-6.4.0-150600.23.14.1
    * reiserfs-kmp-64kb-6.4.0-150600.23.14.1
    * kselftests-kmp-64kb-6.4.0-150600.23.14.1
    * kernel-64kb-debugsource-6.4.0-150600.23.14.1
    * dtb-qcom-6.4.0-150600.23.14.1
    * dtb-exynos-6.4.0-150600.23.14.1
    * dtb-xilinx-6.4.0-150600.23.14.1
    * kernel-64kb-optional-6.4.0-150600.23.14.1
    * dtb-renesas-6.4.0-150600.23.14.1
    * dtb-amazon-6.4.0-150600.23.14.1
    * cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.14.1
    * dtb-nvidia-6.4.0-150600.23.14.1
    * dtb-lg-6.4.0-150600.23.14.1
    * kernel-64kb-optional-debuginfo-6.4.0-150600.23.14.1
    * dtb-allwinner-6.4.0-150600.23.14.1
    * cluster-md-kmp-64kb-6.4.0-150600.23.14.1
    * kernel-64kb-extra-debuginfo-6.4.0-150600.23.14.1
    * dtb-altera-6.4.0-150600.23.14.1
    * ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.14.1
    * dtb-rockchip-6.4.0-150600.23.14.1
    * dtb-amd-6.4.0-150600.23.14.1
  * openSUSE Leap 15.6 (aarch64 nosrc)
    * kernel-64kb-6.4.0-150600.23.14.1
  * Basesystem Module 15-SP6 (aarch64 nosrc)
    * kernel-64kb-6.4.0-150600.23.14.1
  * Basesystem Module 15-SP6 (aarch64)
    * kernel-64kb-devel-debuginfo-6.4.0-150600.23.14.1
    * kernel-64kb-debuginfo-6.4.0-150600.23.14.1
    * kernel-64kb-devel-6.4.0-150600.23.14.1
    * kernel-64kb-debugsource-6.4.0-150600.23.14.1
  * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64 nosrc)
    * kernel-default-6.4.0-150600.23.14.2
  * Basesystem Module 15-SP6 (aarch64 ppc64le x86_64)
    * kernel-default-base-6.4.0-150600.23.14.2.150600.12.4.3
  * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
    * kernel-default-debugsource-6.4.0-150600.23.14.2
    * kernel-default-devel-6.4.0-150600.23.14.2
    * kernel-default-devel-debuginfo-6.4.0-150600.23.14.2
    * kernel-default-debuginfo-6.4.0-150600.23.14.2
  * Basesystem Module 15-SP6 (noarch)
    * kernel-devel-6.4.0-150600.23.14.2
    * kernel-macros-6.4.0-150600.23.14.2
  * Basesystem Module 15-SP6 (nosrc s390x)
    * kernel-zfcpdump-6.4.0-150600.23.14.2
  * Basesystem Module 15-SP6 (s390x)
    * kernel-zfcpdump-debuginfo-6.4.0-150600.23.14.2
    * kernel-zfcpdump-debugsource-6.4.0-150600.23.14.2
  * Development Tools Module 15-SP6 (noarch nosrc)
    * kernel-docs-6.4.0-150600.23.14.2
  * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
    * kernel-obs-build-debugsource-6.4.0-150600.23.14.2
    * kernel-syms-6.4.0-150600.23.14.2
    * kernel-obs-build-6.4.0-150600.23.14.2
  * Development Tools Module 15-SP6 (noarch)
    * kernel-source-6.4.0-150600.23.14.2
  * Legacy Module 15-SP6 (nosrc)
    * kernel-default-6.4.0-150600.23.14.2
  * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64)
    * kernel-default-debugsource-6.4.0-150600.23.14.2
    * reiserfs-kmp-default-debuginfo-6.4.0-150600.23.14.2
    * reiserfs-kmp-default-6.4.0-150600.23.14.2
    * kernel-default-debuginfo-6.4.0-150600.23.14.2
  * SUSE Linux Enterprise Live Patching 15-SP6 (nosrc)
    * kernel-default-6.4.0-150600.23.14.2
  * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
    * kernel-livepatch-6_4_0-150600_23_14-default-debuginfo-1-150600.13.3.2
    * kernel-livepatch-SLE15-SP6_Update_2-debugsource-1-150600.13.3.2
    * kernel-livepatch-6_4_0-150600_23_14-default-1-150600.13.3.2
    * kernel-default-debugsource-6.4.0-150600.23.14.2
    * kernel-default-livepatch-6.4.0-150600.23.14.2
    * kernel-default-debuginfo-6.4.0-150600.23.14.2
    * kernel-default-livepatch-devel-6.4.0-150600.23.14.2
  * SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le
    s390x x86_64)
    * gfs2-kmp-default-6.4.0-150600.23.14.2
    * dlm-kmp-default-6.4.0-150600.23.14.2
    * ocfs2-kmp-default-debuginfo-6.4.0-150600.23.14.2
    * dlm-kmp-default-debuginfo-6.4.0-150600.23.14.2
    * ocfs2-kmp-default-6.4.0-150600.23.14.2
    * kernel-default-debugsource-6.4.0-150600.23.14.2
    * gfs2-kmp-default-debuginfo-6.4.0-150600.23.14.2
    * cluster-md-kmp-default-debuginfo-6.4.0-150600.23.14.2
    * kernel-default-debuginfo-6.4.0-150600.23.14.2
    * cluster-md-kmp-default-6.4.0-150600.23.14.2
  * SUSE Linux Enterprise High Availability Extension 15 SP6 (nosrc)
    * kernel-default-6.4.0-150600.23.14.2
  * SUSE Linux Enterprise Workstation Extension 15 SP6 (nosrc)
    * kernel-default-6.4.0-150600.23.14.2
  * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
    * kernel-default-extra-6.4.0-150600.23.14.2
    * kernel-default-extra-debuginfo-6.4.0-150600.23.14.2
    * kernel-default-debugsource-6.4.0-150600.23.14.2
    * kernel-default-debuginfo-6.4.0-150600.23.14.2

## References:

  * https://www.suse.com/security/cve/CVE-2021-47432.html
  * https://www.suse.com/security/cve/CVE-2022-48772.html
  * https://www.suse.com/security/cve/CVE-2023-52622.html
  * https://www.suse.com/security/cve/CVE-2023-52656.html
  * https://www.suse.com/security/cve/CVE-2023-52672.html
  * https://www.suse.com/security/cve/CVE-2023-52699.html
  * https://www.suse.com/security/cve/CVE-2023-52735.html
  * https://www.suse.com/security/cve/CVE-2023-52749.html
  * https://www.suse.com/security/cve/CVE-2023-52750.html
  * https://www.suse.com/security/cve/CVE-2023-52753.html
  * https://www.suse.com/security/cve/CVE-2023-52754.html
  * https://www.suse.com/security/cve/CVE-2023-52757.html
  * https://www.suse.com/security/cve/CVE-2023-52759.html
  * https://www.suse.com/security/cve/CVE-2023-52762.html
  * https://www.suse.com/security/cve/CVE-2023-52763.html
  * https://www.suse.com/security/cve/CVE-2023-52764.html
  * https://www.suse.com/security/cve/CVE-2023-52765.html
  * https://www.suse.com/security/cve/CVE-2023-52766.html
  * https://www.suse.com/security/cve/CVE-2023-52767.html
  * https://www.suse.com/security/cve/CVE-2023-52768.html
  * https://www.suse.com/security/cve/CVE-2023-52769.html
  * https://www.suse.com/security/cve/CVE-2023-52773.html
  * https://www.suse.com/security/cve/CVE-2023-52774.html
  * https://www.suse.com/security/cve/CVE-2023-52776.html
  * https://www.suse.com/security/cve/CVE-2023-52777.html
  * https://www.suse.com/security/cve/CVE-2023-52780.html
  * https://www.suse.com/security/cve/CVE-2023-52781.html
  * https://www.suse.com/security/cve/CVE-2023-52782.html
  * https://www.suse.com/security/cve/CVE-2023-52783.html
  * https://www.suse.com/security/cve/CVE-2023-52784.html
  * https://www.suse.com/security/cve/CVE-2023-52786.html
  * https://www.suse.com/security/cve/CVE-2023-52787.html
  * https://www.suse.com/security/cve/CVE-2023-52788.html
  * https://www.suse.com/security/cve/CVE-2023-52789.html
  * https://www.suse.com/security/cve/CVE-2023-52791.html
  * https://www.suse.com/security/cve/CVE-2023-52792.html
  * https://www.suse.com/security/cve/CVE-2023-52794.html
  * https://www.suse.com/security/cve/CVE-2023-52795.html
  * https://www.suse.com/security/cve/CVE-2023-52796.html
  * https://www.suse.com/security/cve/CVE-2023-52798.html
  * https://www.suse.com/security/cve/CVE-2023-52799.html
  * https://www.suse.com/security/cve/CVE-2023-52800.html
  * https://www.suse.com/security/cve/CVE-2023-52801.html
  * https://www.suse.com/security/cve/CVE-2023-52803.html
  * https://www.suse.com/security/cve/CVE-2023-52804.html
  * https://www.suse.com/security/cve/CVE-2023-52805.html
  * https://www.suse.com/security/cve/CVE-2023-52806.html
  * https://www.suse.com/security/cve/CVE-2023-52807.html
  * https://www.suse.com/security/cve/CVE-2023-52808.html
  * https://www.suse.com/security/cve/CVE-2023-52809.html
  * https://www.suse.com/security/cve/CVE-2023-52810.html
  * https://www.suse.com/security/cve/CVE-2023-52811.html
  * https://www.suse.com/security/cve/CVE-2023-52812.html
  * https://www.suse.com/security/cve/CVE-2023-52813.html
  * https://www.suse.com/security/cve/CVE-2023-52814.html
  * https://www.suse.com/security/cve/CVE-2023-52815.html
  * https://www.suse.com/security/cve/CVE-2023-52816.html
  * https://www.suse.com/security/cve/CVE-2023-52817.html
  * https://www.suse.com/security/cve/CVE-2023-52818.html
  * https://www.suse.com/security/cve/CVE-2023-52819.html
  * https://www.suse.com/security/cve/CVE-2023-52821.html
  * https://www.suse.com/security/cve/CVE-2023-52825.html
  * https://www.suse.com/security/cve/CVE-2023-52826.html
  * https://www.suse.com/security/cve/CVE-2023-52827.html
  * https://www.suse.com/security/cve/CVE-2023-52829.html
  * https://www.suse.com/security/cve/CVE-2023-52832.html
  * https://www.suse.com/security/cve/CVE-2023-52833.html
  * https://www.suse.com/security/cve/CVE-2023-52834.html
  * https://www.suse.com/security/cve/CVE-2023-52835.html
  * https://www.suse.com/security/cve/CVE-2023-52836.html
  * https://www.suse.com/security/cve/CVE-2023-52837.html
  * https://www.suse.com/security/cve/CVE-2023-52838.html
  * https://www.suse.com/security/cve/CVE-2023-52840.html
  * https://www.suse.com/security/cve/CVE-2023-52841.html
  * https://www.suse.com/security/cve/CVE-2023-52842.html
  * https://www.suse.com/security/cve/CVE-2023-52843.html
  * https://www.suse.com/security/cve/CVE-2023-52844.html
  * https://www.suse.com/security/cve/CVE-2023-52845.html
  * https://www.suse.com/security/cve/CVE-2023-52846.html
  * https://www.suse.com/security/cve/CVE-2023-52847.html
  * https://www.suse.com/security/cve/CVE-2023-52849.html
  * https://www.suse.com/security/cve/CVE-2023-52850.html
  * https://www.suse.com/security/cve/CVE-2023-52851.html
  * https://www.suse.com/security/cve/CVE-2023-52853.html
  * https://www.suse.com/security/cve/CVE-2023-52854.html
  * https://www.suse.com/security/cve/CVE-2023-52855.html
  * https://www.suse.com/security/cve/CVE-2023-52856.html
  * https://www.suse.com/security/cve/CVE-2023-52857.html
  * https://www.suse.com/security/cve/CVE-2023-52858.html
  * https://www.suse.com/security/cve/CVE-2023-52861.html
  * https://www.suse.com/security/cve/CVE-2023-52862.html
  * https://www.suse.com/security/cve/CVE-2023-52863.html
  * https://www.suse.com/security/cve/CVE-2023-52864.html
  * https://www.suse.com/security/cve/CVE-2023-52865.html
  * https://www.suse.com/security/cve/CVE-2023-52866.html
  * https://www.suse.com/security/cve/CVE-2023-52867.html
  * https://www.suse.com/security/cve/CVE-2023-52868.html
  * https://www.suse.com/security/cve/CVE-2023-52869.html
  * https://www.suse.com/security/cve/CVE-2023-52870.html
  * https://www.suse.com/security/cve/CVE-2023-52871.html
  * https://www.suse.com/security/cve/CVE-2023-52872.html
  * https://www.suse.com/security/cve/CVE-2023-52873.html
  * https://www.suse.com/security/cve/CVE-2023-52874.html
  * https://www.suse.com/security/cve/CVE-2023-52875.html
  * https://www.suse.com/security/cve/CVE-2023-52876.html
  * https://www.suse.com/security/cve/CVE-2023-52877.html
  * https://www.suse.com/security/cve/CVE-2023-52878.html
  * https://www.suse.com/security/cve/CVE-2023-52879.html
  * https://www.suse.com/security/cve/CVE-2023-52880.html
  * https://www.suse.com/security/cve/CVE-2023-52881.html
  * https://www.suse.com/security/cve/CVE-2023-52883.html
  * https://www.suse.com/security/cve/CVE-2023-52884.html
  * https://www.suse.com/security/cve/CVE-2024-26482.html
  * https://www.suse.com/security/cve/CVE-2024-26625.html
  * https://www.suse.com/security/cve/CVE-2024-26676.html
  * https://www.suse.com/security/cve/CVE-2024-26750.html
  * https://www.suse.com/security/cve/CVE-2024-26758.html
  * https://www.suse.com/security/cve/CVE-2024-26767.html
  * https://www.suse.com/security/cve/CVE-2024-26780.html
  * https://www.suse.com/security/cve/CVE-2024-26813.html
  * https://www.suse.com/security/cve/CVE-2024-26814.html
  * https://www.suse.com/security/cve/CVE-2024-26845.html
  * https://www.suse.com/security/cve/CVE-2024-26889.html
  * https://www.suse.com/security/cve/CVE-2024-26920.html
  * https://www.suse.com/security/cve/CVE-2024-27414.html
  * https://www.suse.com/security/cve/CVE-2024-27419.html
  * https://www.suse.com/security/cve/CVE-2024-33619.html
  * https://www.suse.com/security/cve/CVE-2024-34777.html
  * https://www.suse.com/security/cve/CVE-2024-35247.html
  * https://www.suse.com/security/cve/CVE-2024-35807.html
  * https://www.suse.com/security/cve/CVE-2024-35827.html
  * https://www.suse.com/security/cve/CVE-2024-35831.html
  * https://www.suse.com/security/cve/CVE-2024-35843.html
  * https://www.suse.com/security/cve/CVE-2024-35848.html
  * https://www.suse.com/security/cve/CVE-2024-35857.html
  * https://www.suse.com/security/cve/CVE-2024-35880.html
  * https://www.suse.com/security/cve/CVE-2024-35884.html
  * https://www.suse.com/security/cve/CVE-2024-35886.html
  * https://www.suse.com/security/cve/CVE-2024-35892.html
  * https://www.suse.com/security/cve/CVE-2024-35896.html
  * https://www.suse.com/security/cve/CVE-2024-35898.html
  * https://www.suse.com/security/cve/CVE-2024-35900.html
  * https://www.suse.com/security/cve/CVE-2024-35925.html
  * https://www.suse.com/security/cve/CVE-2024-35926.html
  * https://www.suse.com/security/cve/CVE-2024-35957.html
  * https://www.suse.com/security/cve/CVE-2024-35962.html
  * https://www.suse.com/security/cve/CVE-2024-35970.html
  * https://www.suse.com/security/cve/CVE-2024-35976.html
  * https://www.suse.com/security/cve/CVE-2024-35979.html
  * https://www.suse.com/security/cve/CVE-2024-35998.html
  * https://www.suse.com/security/cve/CVE-2024-36005.html
  * https://www.suse.com/security/cve/CVE-2024-36008.html
  * https://www.suse.com/security/cve/CVE-2024-36010.html
  * https://www.suse.com/security/cve/CVE-2024-36017.html
  * https://www.suse.com/security/cve/CVE-2024-36024.html
  * https://www.suse.com/security/cve/CVE-2024-36281.html
  * https://www.suse.com/security/cve/CVE-2024-36477.html
  * https://www.suse.com/security/cve/CVE-2024-36478.html
  * https://www.suse.com/security/cve/CVE-2024-36479.html
  * https://www.suse.com/security/cve/CVE-2024-36882.html
  * https://www.suse.com/security/cve/CVE-2024-36887.html
  * https://www.suse.com/security/cve/CVE-2024-36899.html
  * https://www.suse.com/security/cve/CVE-2024-36900.html
  * https://www.suse.com/security/cve/CVE-2024-36903.html
  * https://www.suse.com/security/cve/CVE-2024-36904.html
  * https://www.suse.com/security/cve/CVE-2024-36915.html
  * https://www.suse.com/security/cve/CVE-2024-36916.html
  * https://www.suse.com/security/cve/CVE-2024-36917.html
  * https://www.suse.com/security/cve/CVE-2024-36919.html
  * https://www.suse.com/security/cve/CVE-2024-36923.html
  * https://www.suse.com/security/cve/CVE-2024-36924.html
  * https://www.suse.com/security/cve/CVE-2024-36926.html
  * https://www.suse.com/security/cve/CVE-2024-36934.html
  * https://www.suse.com/security/cve/CVE-2024-36935.html
  * https://www.suse.com/security/cve/CVE-2024-36937.html
  * https://www.suse.com/security/cve/CVE-2024-36938.html
  * https://www.suse.com/security/cve/CVE-2024-36945.html
  * https://www.suse.com/security/cve/CVE-2024-36952.html
  * https://www.suse.com/security/cve/CVE-2024-36957.html
  * https://www.suse.com/security/cve/CVE-2024-36960.html
  * https://www.suse.com/security/cve/CVE-2024-36962.html
  * https://www.suse.com/security/cve/CVE-2024-36964.html
  * https://www.suse.com/security/cve/CVE-2024-36965.html
  * https://www.suse.com/security/cve/CVE-2024-36967.html
  * https://www.suse.com/security/cve/CVE-2024-36969.html
  * https://www.suse.com/security/cve/CVE-2024-36971.html
  * https://www.suse.com/security/cve/CVE-2024-36972.html
  * https://www.suse.com/security/cve/CVE-2024-36973.html
  * https://www.suse.com/security/cve/CVE-2024-36975.html
  * https://www.suse.com/security/cve/CVE-2024-36977.html
  * https://www.suse.com/security/cve/CVE-2024-36978.html
  * https://www.suse.com/security/cve/CVE-2024-37021.html
  * https://www.suse.com/security/cve/CVE-2024-37078.html
  * https://www.suse.com/security/cve/CVE-2024-37353.html
  * https://www.suse.com/security/cve/CVE-2024-37354.html
  * https://www.suse.com/security/cve/CVE-2024-38381.html
  * https://www.suse.com/security/cve/CVE-2024-38384.html
  * https://www.suse.com/security/cve/CVE-2024-38385.html
  * https://www.suse.com/security/cve/CVE-2024-38388.html
  * https://www.suse.com/security/cve/CVE-2024-38390.html
  * https://www.suse.com/security/cve/CVE-2024-38391.html
  * https://www.suse.com/security/cve/CVE-2024-38539.html
  * https://www.suse.com/security/cve/CVE-2024-38540.html
  * https://www.suse.com/security/cve/CVE-2024-38541.html
  * https://www.suse.com/security/cve/CVE-2024-38543.html
  * https://www.suse.com/security/cve/CVE-2024-38544.html
  * https://www.suse.com/security/cve/CVE-2024-38545.html
  * https://www.suse.com/security/cve/CVE-2024-38546.html
  * https://www.suse.com/security/cve/CVE-2024-38547.html
  * https://www.suse.com/security/cve/CVE-2024-38548.html
  * https://www.suse.com/security/cve/CVE-2024-38549.html
  * https://www.suse.com/security/cve/CVE-2024-38550.html
  * https://www.suse.com/security/cve/CVE-2024-38551.html
  * https://www.suse.com/security/cve/CVE-2024-38552.html
  * https://www.suse.com/security/cve/CVE-2024-38553.html
  * https://www.suse.com/security/cve/CVE-2024-38554.html
  * https://www.suse.com/security/cve/CVE-2024-38555.html
  * https://www.suse.com/security/cve/CVE-2024-38556.html
  * https://www.suse.com/security/cve/CVE-2024-38557.html
  * https://www.suse.com/security/cve/CVE-2024-38559.html
  * https://www.suse.com/security/cve/CVE-2024-38560.html
  * https://www.suse.com/security/cve/CVE-2024-38562.html
  * https://www.suse.com/security/cve/CVE-2024-38564.html
  * https://www.suse.com/security/cve/CVE-2024-38565.html
  * https://www.suse.com/security/cve/CVE-2024-38566.html
  * https://www.suse.com/security/cve/CVE-2024-38567.html
  * https://www.suse.com/security/cve/CVE-2024-38568.html
  * https://www.suse.com/security/cve/CVE-2024-38569.html
  * https://www.suse.com/security/cve/CVE-2024-38570.html
  * https://www.suse.com/security/cve/CVE-2024-38571.html
  * https://www.suse.com/security/cve/CVE-2024-38572.html
  * https://www.suse.com/security/cve/CVE-2024-38573.html
  * https://www.suse.com/security/cve/CVE-2024-38575.html
  * https://www.suse.com/security/cve/CVE-2024-38578.html
  * https://www.suse.com/security/cve/CVE-2024-38579.html
  * https://www.suse.com/security/cve/CVE-2024-38580.html
  * https://www.suse.com/security/cve/CVE-2024-38581.html
  * https://www.suse.com/security/cve/CVE-2024-38582.html
  * https://www.suse.com/security/cve/CVE-2024-38583.html
  * https://www.suse.com/security/cve/CVE-2024-38587.html
  * https://www.suse.com/security/cve/CVE-2024-38588.html
  * https://www.suse.com/security/cve/CVE-2024-38590.html
  * https://www.suse.com/security/cve/CVE-2024-38591.html
  * https://www.suse.com/security/cve/CVE-2024-38592.html
  * https://www.suse.com/security/cve/CVE-2024-38594.html
  * https://www.suse.com/security/cve/CVE-2024-38595.html
  * https://www.suse.com/security/cve/CVE-2024-38597.html
  * https://www.suse.com/security/cve/CVE-2024-38599.html
  * https://www.suse.com/security/cve/CVE-2024-38600.html
  * https://www.suse.com/security/cve/CVE-2024-38601.html
  * https://www.suse.com/security/cve/CVE-2024-38602.html
  * https://www.suse.com/security/cve/CVE-2024-38603.html
  * https://www.suse.com/security/cve/CVE-2024-38605.html
  * https://www.suse.com/security/cve/CVE-2024-38608.html
  * https://www.suse.com/security/cve/CVE-2024-38610.html
  * https://www.suse.com/security/cve/CVE-2024-38611.html
  * https://www.suse.com/security/cve/CVE-2024-38615.html
  * https://www.suse.com/security/cve/CVE-2024-38616.html
  * https://www.suse.com/security/cve/CVE-2024-38617.html
  * https://www.suse.com/security/cve/CVE-2024-38618.html
  * https://www.suse.com/security/cve/CVE-2024-38619.html
  * https://www.suse.com/security/cve/CVE-2024-38621.html
  * https://www.suse.com/security/cve/CVE-2024-38622.html
  * https://www.suse.com/security/cve/CVE-2024-38627.html
  * https://www.suse.com/security/cve/CVE-2024-38628.html
  * https://www.suse.com/security/cve/CVE-2024-38629.html
  * https://www.suse.com/security/cve/CVE-2024-38630.html
  * https://www.suse.com/security/cve/CVE-2024-38633.html
  * https://www.suse.com/security/cve/CVE-2024-38634.html
  * https://www.suse.com/security/cve/CVE-2024-38635.html
  * https://www.suse.com/security/cve/CVE-2024-38636.html
  * https://www.suse.com/security/cve/CVE-2024-38661.html
  * https://www.suse.com/security/cve/CVE-2024-38663.html
  * https://www.suse.com/security/cve/CVE-2024-38664.html
  * https://www.suse.com/security/cve/CVE-2024-38780.html
  * https://www.suse.com/security/cve/CVE-2024-39277.html
  * https://www.suse.com/security/cve/CVE-2024-39291.html
  * https://www.suse.com/security/cve/CVE-2024-39296.html
  * https://www.suse.com/security/cve/CVE-2024-39301.html
  * https://www.suse.com/security/cve/CVE-2024-39362.html
  * https://www.suse.com/security/cve/CVE-2024-39371.html
  * https://www.suse.com/security/cve/CVE-2024-39463.html
  * https://www.suse.com/security/cve/CVE-2024-39466.html
  * https://www.suse.com/security/cve/CVE-2024-39469.html
  * https://www.suse.com/security/cve/CVE-2024-39471.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1186716
  * https://bugzilla.suse.com/show_bug.cgi?id=1195775
  * https://bugzilla.suse.com/show_bug.cgi?id=1204562
  * https://bugzilla.suse.com/show_bug.cgi?id=1209834
  * https://bugzilla.suse.com/show_bug.cgi?id=1217481
  * https://bugzilla.suse.com/show_bug.cgi?id=1217912
  * https://bugzilla.suse.com/show_bug.cgi?id=1218442
  * https://bugzilla.suse.com/show_bug.cgi?id=1219224
  * https://bugzilla.suse.com/show_bug.cgi?id=1219478
  * https://bugzilla.suse.com/show_bug.cgi?id=1219596
  * https://bugzilla.suse.com/show_bug.cgi?id=1219633
  * https://bugzilla.suse.com/show_bug.cgi?id=1219847
  * https://bugzilla.suse.com/show_bug.cgi?id=1219953
  * https://bugzilla.suse.com/show_bug.cgi?id=1221086
  * https://bugzilla.suse.com/show_bug.cgi?id=1221777
  * https://bugzilla.suse.com/show_bug.cgi?id=1221958
  * https://bugzilla.suse.com/show_bug.cgi?id=1222011
  * https://bugzilla.suse.com/show_bug.cgi?id=1222015
  * https://bugzilla.suse.com/show_bug.cgi?id=1222080
  * https://bugzilla.suse.com/show_bug.cgi?id=1222241
  * https://bugzilla.suse.com/show_bug.cgi?id=1222380
  * https://bugzilla.suse.com/show_bug.cgi?id=1222588
  * https://bugzilla.suse.com/show_bug.cgi?id=1222617
  * https://bugzilla.suse.com/show_bug.cgi?id=1222619
  * https://bugzilla.suse.com/show_bug.cgi?id=1222809
  * https://bugzilla.suse.com/show_bug.cgi?id=1222810
  * https://bugzilla.suse.com/show_bug.cgi?id=1223018
  * https://bugzilla.suse.com/show_bug.cgi?id=1223265
  * https://bugzilla.suse.com/show_bug.cgi?id=1224049
  * https://bugzilla.suse.com/show_bug.cgi?id=1224187
  * https://bugzilla.suse.com/show_bug.cgi?id=1224439
  * https://bugzilla.suse.com/show_bug.cgi?id=1224497
  * https://bugzilla.suse.com/show_bug.cgi?id=1224498
  * https://bugzilla.suse.com/show_bug.cgi?id=1224515
  * https://bugzilla.suse.com/show_bug.cgi?id=1224520
  * https://bugzilla.suse.com/show_bug.cgi?id=1224523
  * https://bugzilla.suse.com/show_bug.cgi?id=1224539
  * https://bugzilla.suse.com/show_bug.cgi?id=1224540
  * https://bugzilla.suse.com/show_bug.cgi?id=1224549
  * https://bugzilla.suse.com/show_bug.cgi?id=1224572
  * https://bugzilla.suse.com/show_bug.cgi?id=1224575
  * https://bugzilla.suse.com/show_bug.cgi?id=1224583
  * https://bugzilla.suse.com/show_bug.cgi?id=1224584
  * https://bugzilla.suse.com/show_bug.cgi?id=1224606
  * https://bugzilla.suse.com/show_bug.cgi?id=1224612
  * https://bugzilla.suse.com/show_bug.cgi?id=1224614
  * https://bugzilla.suse.com/show_bug.cgi?id=1224619
  * https://bugzilla.suse.com/show_bug.cgi?id=1224655
  * https://bugzilla.suse.com/show_bug.cgi?id=1224659
  * https://bugzilla.suse.com/show_bug.cgi?id=1224661
  * https://bugzilla.suse.com/show_bug.cgi?id=1224662
  * https://bugzilla.suse.com/show_bug.cgi?id=1224670
  * https://bugzilla.suse.com/show_bug.cgi?id=1224673
  * https://bugzilla.suse.com/show_bug.cgi?id=1224698
  * https://bugzilla.suse.com/show_bug.cgi?id=1224735
  * https://bugzilla.suse.com/show_bug.cgi?id=1224751
  * https://bugzilla.suse.com/show_bug.cgi?id=1224759
  * https://bugzilla.suse.com/show_bug.cgi?id=1224928
  * https://bugzilla.suse.com/show_bug.cgi?id=1224930
  * https://bugzilla.suse.com/show_bug.cgi?id=1224932
  * https://bugzilla.suse.com/show_bug.cgi?id=1224933
  * https://bugzilla.suse.com/show_bug.cgi?id=1224935
  * https://bugzilla.suse.com/show_bug.cgi?id=1224937
  * https://bugzilla.suse.com/show_bug.cgi?id=1224939
  * https://bugzilla.suse.com/show_bug.cgi?id=1224941
  * https://bugzilla.suse.com/show_bug.cgi?id=1224944
  * https://bugzilla.suse.com/show_bug.cgi?id=1224946
  * https://bugzilla.suse.com/show_bug.cgi?id=1224947
  * https://bugzilla.suse.com/show_bug.cgi?id=1224949
  * https://bugzilla.suse.com/show_bug.cgi?id=1224951
  * https://bugzilla.suse.com/show_bug.cgi?id=1224988
  * https://bugzilla.suse.com/show_bug.cgi?id=1224992
  * https://bugzilla.suse.com/show_bug.cgi?id=1224998
  * https://bugzilla.suse.com/show_bug.cgi?id=1225000
  * https://bugzilla.suse.com/show_bug.cgi?id=1225001
  * https://bugzilla.suse.com/show_bug.cgi?id=1225004
  * https://bugzilla.suse.com/show_bug.cgi?id=1225006
  * https://bugzilla.suse.com/show_bug.cgi?id=1225008
  * https://bugzilla.suse.com/show_bug.cgi?id=1225009
  * https://bugzilla.suse.com/show_bug.cgi?id=1225014
  * https://bugzilla.suse.com/show_bug.cgi?id=1225015
  * https://bugzilla.suse.com/show_bug.cgi?id=1225022
  * https://bugzilla.suse.com/show_bug.cgi?id=1225025
  * https://bugzilla.suse.com/show_bug.cgi?id=1225028
  * https://bugzilla.suse.com/show_bug.cgi?id=1225029
  * https://bugzilla.suse.com/show_bug.cgi?id=1225031
  * https://bugzilla.suse.com/show_bug.cgi?id=1225036
  * https://bugzilla.suse.com/show_bug.cgi?id=1225041
  * https://bugzilla.suse.com/show_bug.cgi?id=1225044
  * https://bugzilla.suse.com/show_bug.cgi?id=1225049
  * https://bugzilla.suse.com/show_bug.cgi?id=1225050
  * https://bugzilla.suse.com/show_bug.cgi?id=1225076
  * https://bugzilla.suse.com/show_bug.cgi?id=1225077
  * https://bugzilla.suse.com/show_bug.cgi?id=1225078
  * https://bugzilla.suse.com/show_bug.cgi?id=1225081
  * https://bugzilla.suse.com/show_bug.cgi?id=1225085
  * https://bugzilla.suse.com/show_bug.cgi?id=1225086
  * https://bugzilla.suse.com/show_bug.cgi?id=1225090
  * https://bugzilla.suse.com/show_bug.cgi?id=1225092
  * https://bugzilla.suse.com/show_bug.cgi?id=1225096
  * https://bugzilla.suse.com/show_bug.cgi?id=1225097
  * https://bugzilla.suse.com/show_bug.cgi?id=1225098
  * https://bugzilla.suse.com/show_bug.cgi?id=1225101
  * https://bugzilla.suse.com/show_bug.cgi?id=1225103
  * https://bugzilla.suse.com/show_bug.cgi?id=1225104
  * https://bugzilla.suse.com/show_bug.cgi?id=1225105
  * https://bugzilla.suse.com/show_bug.cgi?id=1225106
  * https://bugzilla.suse.com/show_bug.cgi?id=1225108
  * https://bugzilla.suse.com/show_bug.cgi?id=1225120
  * https://bugzilla.suse.com/show_bug.cgi?id=1225132
  * https://bugzilla.suse.com/show_bug.cgi?id=1225180
  * https://bugzilla.suse.com/show_bug.cgi?id=1225300
  * https://bugzilla.suse.com/show_bug.cgi?id=1225391
  * https://bugzilla.suse.com/show_bug.cgi?id=1225472
  * https://bugzilla.suse.com/show_bug.cgi?id=1225475
  * https://bugzilla.suse.com/show_bug.cgi?id=1225476
  * https://bugzilla.suse.com/show_bug.cgi?id=1225477
  * https://bugzilla.suse.com/show_bug.cgi?id=1225478
  * https://bugzilla.suse.com/show_bug.cgi?id=1225485
  * https://bugzilla.suse.com/show_bug.cgi?id=1225490
  * https://bugzilla.suse.com/show_bug.cgi?id=1225527
  * https://bugzilla.suse.com/show_bug.cgi?id=1225529
  * https://bugzilla.suse.com/show_bug.cgi?id=1225530
  * https://bugzilla.suse.com/show_bug.cgi?id=1225532
  * https://bugzilla.suse.com/show_bug.cgi?id=1225534
  * https://bugzilla.suse.com/show_bug.cgi?id=1225548
  * https://bugzilla.suse.com/show_bug.cgi?id=1225550
  * https://bugzilla.suse.com/show_bug.cgi?id=1225553
  * https://bugzilla.suse.com/show_bug.cgi?id=1225554
  * https://bugzilla.suse.com/show_bug.cgi?id=1225555
  * https://bugzilla.suse.com/show_bug.cgi?id=1225556
  * https://bugzilla.suse.com/show_bug.cgi?id=1225557
  * https://bugzilla.suse.com/show_bug.cgi?id=1225559
  * https://bugzilla.suse.com/show_bug.cgi?id=1225560
  * https://bugzilla.suse.com/show_bug.cgi?id=1225564
  * https://bugzilla.suse.com/show_bug.cgi?id=1225565
  * https://bugzilla.suse.com/show_bug.cgi?id=1225566
  * https://bugzilla.suse.com/show_bug.cgi?id=1225568
  * https://bugzilla.suse.com/show_bug.cgi?id=1225569
  * https://bugzilla.suse.com/show_bug.cgi?id=1225570
  * https://bugzilla.suse.com/show_bug.cgi?id=1225571
  * https://bugzilla.suse.com/show_bug.cgi?id=1225572
  * https://bugzilla.suse.com/show_bug.cgi?id=1225573
  * https://bugzilla.suse.com/show_bug.cgi?id=1225577
  * https://bugzilla.suse.com/show_bug.cgi?id=1225581
  * https://bugzilla.suse.com/show_bug.cgi?id=1225583
  * https://bugzilla.suse.com/show_bug.cgi?id=1225584
  * https://bugzilla.suse.com/show_bug.cgi?id=1225585
  * https://bugzilla.suse.com/show_bug.cgi?id=1225586
  * https://bugzilla.suse.com/show_bug.cgi?id=1225587
  * https://bugzilla.suse.com/show_bug.cgi?id=1225588
  * https://bugzilla.suse.com/show_bug.cgi?id=1225589
  * https://bugzilla.suse.com/show_bug.cgi?id=1225590
  * https://bugzilla.suse.com/show_bug.cgi?id=1225591
  * https://bugzilla.suse.com/show_bug.cgi?id=1225592
  * https://bugzilla.suse.com/show_bug.cgi?id=1225594
  * https://bugzilla.suse.com/show_bug.cgi?id=1225595
  * https://bugzilla.suse.com/show_bug.cgi?id=1225599
  * https://bugzilla.suse.com/show_bug.cgi?id=1225602
  * https://bugzilla.suse.com/show_bug.cgi?id=1225605
  * https://bugzilla.suse.com/show_bug.cgi?id=1225609
  * https://bugzilla.suse.com/show_bug.cgi?id=1225611
  * https://bugzilla.suse.com/show_bug.cgi?id=1225681
  * https://bugzilla.suse.com/show_bug.cgi?id=1225702
  * https://bugzilla.suse.com/show_bug.cgi?id=1225723
  * https://bugzilla.suse.com/show_bug.cgi?id=1225726
  * https://bugzilla.suse.com/show_bug.cgi?id=1225731
  * https://bugzilla.suse.com/show_bug.cgi?id=1225732
  * https://bugzilla.suse.com/show_bug.cgi?id=1225737
  * https://bugzilla.suse.com/show_bug.cgi?id=1225741
  * https://bugzilla.suse.com/show_bug.cgi?id=1225758
  * https://bugzilla.suse.com/show_bug.cgi?id=1225759
  * https://bugzilla.suse.com/show_bug.cgi?id=1225760
  * https://bugzilla.suse.com/show_bug.cgi?id=1225761
  * https://bugzilla.suse.com/show_bug.cgi?id=1225762
  * https://bugzilla.suse.com/show_bug.cgi?id=1225763
  * https://bugzilla.suse.com/show_bug.cgi?id=1225767
  * https://bugzilla.suse.com/show_bug.cgi?id=1225770
  * https://bugzilla.suse.com/show_bug.cgi?id=1225815
  * https://bugzilla.suse.com/show_bug.cgi?id=1225820
  * https://bugzilla.suse.com/show_bug.cgi?id=1225823
  * https://bugzilla.suse.com/show_bug.cgi?id=1225827
  * https://bugzilla.suse.com/show_bug.cgi?id=1225834
  * https://bugzilla.suse.com/show_bug.cgi?id=1225866
  * https://bugzilla.suse.com/show_bug.cgi?id=1225872
  * https://bugzilla.suse.com/show_bug.cgi?id=1225898
  * https://bugzilla.suse.com/show_bug.cgi?id=1225903
  * https://bugzilla.suse.com/show_bug.cgi?id=1226022
  * https://bugzilla.suse.com/show_bug.cgi?id=1226131
  * https://bugzilla.suse.com/show_bug.cgi?id=1226145
  * https://bugzilla.suse.com/show_bug.cgi?id=1226149
  * https://bugzilla.suse.com/show_bug.cgi?id=1226155
  * https://bugzilla.suse.com/show_bug.cgi?id=1226158
  * https://bugzilla.suse.com/show_bug.cgi?id=1226163
  * https://bugzilla.suse.com/show_bug.cgi?id=1226211
  * https://bugzilla.suse.com/show_bug.cgi?id=1226212
  * https://bugzilla.suse.com/show_bug.cgi?id=1226226
  * https://bugzilla.suse.com/show_bug.cgi?id=1226457
  * https://bugzilla.suse.com/show_bug.cgi?id=1226503
  * https://bugzilla.suse.com/show_bug.cgi?id=1226513
  * https://bugzilla.suse.com/show_bug.cgi?id=1226514
  * https://bugzilla.suse.com/show_bug.cgi?id=1226520
  * https://bugzilla.suse.com/show_bug.cgi?id=1226582
  * https://bugzilla.suse.com/show_bug.cgi?id=1226587
  * https://bugzilla.suse.com/show_bug.cgi?id=1226588
  * https://bugzilla.suse.com/show_bug.cgi?id=1226592
  * https://bugzilla.suse.com/show_bug.cgi?id=1226593
  * https://bugzilla.suse.com/show_bug.cgi?id=1226594
  * https://bugzilla.suse.com/show_bug.cgi?id=1226595
  * https://bugzilla.suse.com/show_bug.cgi?id=1226597
  * https://bugzilla.suse.com/show_bug.cgi?id=1226607
  * https://bugzilla.suse.com/show_bug.cgi?id=1226608
  * https://bugzilla.suse.com/show_bug.cgi?id=1226610
  * https://bugzilla.suse.com/show_bug.cgi?id=1226612
  * https://bugzilla.suse.com/show_bug.cgi?id=1226613
  * https://bugzilla.suse.com/show_bug.cgi?id=1226630
  * https://bugzilla.suse.com/show_bug.cgi?id=1226632
  * https://bugzilla.suse.com/show_bug.cgi?id=1226633
  * https://bugzilla.suse.com/show_bug.cgi?id=1226634
  * https://bugzilla.suse.com/show_bug.cgi?id=1226637
  * https://bugzilla.suse.com/show_bug.cgi?id=1226657
  * https://bugzilla.suse.com/show_bug.cgi?id=1226658
  * https://bugzilla.suse.com/show_bug.cgi?id=1226734
  * https://bugzilla.suse.com/show_bug.cgi?id=1226735
  * https://bugzilla.suse.com/show_bug.cgi?id=1226737
  * https://bugzilla.suse.com/show_bug.cgi?id=1226738
  * https://bugzilla.suse.com/show_bug.cgi?id=1226739
  * https://bugzilla.suse.com/show_bug.cgi?id=1226740
  * https://bugzilla.suse.com/show_bug.cgi?id=1226741
  * https://bugzilla.suse.com/show_bug.cgi?id=1226742
  * https://bugzilla.suse.com/show_bug.cgi?id=1226744
  * https://bugzilla.suse.com/show_bug.cgi?id=1226746
  * https://bugzilla.suse.com/show_bug.cgi?id=1226747
  * https://bugzilla.suse.com/show_bug.cgi?id=1226749
  * https://bugzilla.suse.com/show_bug.cgi?id=1226754
  * https://bugzilla.suse.com/show_bug.cgi?id=1226758
  * https://bugzilla.suse.com/show_bug.cgi?id=1226760
  * https://bugzilla.suse.com/show_bug.cgi?id=1226761
  * https://bugzilla.suse.com/show_bug.cgi?id=1226764
  * https://bugzilla.suse.com/show_bug.cgi?id=1226767
  * https://bugzilla.suse.com/show_bug.cgi?id=1226768
  * https://bugzilla.suse.com/show_bug.cgi?id=1226769
  * https://bugzilla.suse.com/show_bug.cgi?id=1226771
  * https://bugzilla.suse.com/show_bug.cgi?id=1226772
  * https://bugzilla.suse.com/show_bug.cgi?id=1226774
  * https://bugzilla.suse.com/show_bug.cgi?id=1226775
  * https://bugzilla.suse.com/show_bug.cgi?id=1226776
  * https://bugzilla.suse.com/show_bug.cgi?id=1226777
  * https://bugzilla.suse.com/show_bug.cgi?id=1226780
  * https://bugzilla.suse.com/show_bug.cgi?id=1226781
  * https://bugzilla.suse.com/show_bug.cgi?id=1226786
  * https://bugzilla.suse.com/show_bug.cgi?id=1226788
  * https://bugzilla.suse.com/show_bug.cgi?id=1226789
  * https://bugzilla.suse.com/show_bug.cgi?id=1226790
  * https://bugzilla.suse.com/show_bug.cgi?id=1226791
  * https://bugzilla.suse.com/show_bug.cgi?id=1226796
  * https://bugzilla.suse.com/show_bug.cgi?id=1226799
  * https://bugzilla.suse.com/show_bug.cgi?id=1226837
  * https://bugzilla.suse.com/show_bug.cgi?id=1226839
  * https://bugzilla.suse.com/show_bug.cgi?id=1226840
  * https://bugzilla.suse.com/show_bug.cgi?id=1226841
  * https://bugzilla.suse.com/show_bug.cgi?id=1226842
  * https://bugzilla.suse.com/show_bug.cgi?id=1226844
  * https://bugzilla.suse.com/show_bug.cgi?id=1226848
  * https://bugzilla.suse.com/show_bug.cgi?id=1226852
  * https://bugzilla.suse.com/show_bug.cgi?id=1226856
  * https://bugzilla.suse.com/show_bug.cgi?id=1226857
  * https://bugzilla.suse.com/show_bug.cgi?id=1226859
  * https://bugzilla.suse.com/show_bug.cgi?id=1226861
  * https://bugzilla.suse.com/show_bug.cgi?id=1226863
  * https://bugzilla.suse.com/show_bug.cgi?id=1226864
  * https://bugzilla.suse.com/show_bug.cgi?id=1226867
  * https://bugzilla.suse.com/show_bug.cgi?id=1226868
  * https://bugzilla.suse.com/show_bug.cgi?id=1226875
  * https://bugzilla.suse.com/show_bug.cgi?id=1226876
  * https://bugzilla.suse.com/show_bug.cgi?id=1226878
  * https://bugzilla.suse.com/show_bug.cgi?id=1226879
  * https://bugzilla.suse.com/show_bug.cgi?id=1226886
  * https://bugzilla.suse.com/show_bug.cgi?id=1226890
  * https://bugzilla.suse.com/show_bug.cgi?id=1226891
  * https://bugzilla.suse.com/show_bug.cgi?id=1226894
  * https://bugzilla.suse.com/show_bug.cgi?id=1226895
  * https://bugzilla.suse.com/show_bug.cgi?id=1226905
  * https://bugzilla.suse.com/show_bug.cgi?id=1226908
  * https://bugzilla.suse.com/show_bug.cgi?id=1226909
  * https://bugzilla.suse.com/show_bug.cgi?id=1226911
  * https://bugzilla.suse.com/show_bug.cgi?id=1226928
  * https://bugzilla.suse.com/show_bug.cgi?id=1226934
  * https://bugzilla.suse.com/show_bug.cgi?id=1226938
  * https://bugzilla.suse.com/show_bug.cgi?id=1226939
  * https://bugzilla.suse.com/show_bug.cgi?id=1226941
  * https://bugzilla.suse.com/show_bug.cgi?id=1226948
  * https://bugzilla.suse.com/show_bug.cgi?id=1226949
  * https://bugzilla.suse.com/show_bug.cgi?id=1226950
  * https://bugzilla.suse.com/show_bug.cgi?id=1226962
  * https://bugzilla.suse.com/show_bug.cgi?id=1226976
  * https://bugzilla.suse.com/show_bug.cgi?id=1226989
  * https://bugzilla.suse.com/show_bug.cgi?id=1226990
  * https://bugzilla.suse.com/show_bug.cgi?id=1226992
  * https://bugzilla.suse.com/show_bug.cgi?id=1226994
  * https://bugzilla.suse.com/show_bug.cgi?id=1226995
  * https://bugzilla.suse.com/show_bug.cgi?id=1226996
  * https://bugzilla.suse.com/show_bug.cgi?id=1227066
  * https://bugzilla.suse.com/show_bug.cgi?id=1227072
  * https://bugzilla.suse.com/show_bug.cgi?id=1227085
  * https://bugzilla.suse.com/show_bug.cgi?id=1227089
  * https://bugzilla.suse.com/show_bug.cgi?id=1227090
  * https://bugzilla.suse.com/show_bug.cgi?id=1227096
  * https://bugzilla.suse.com/show_bug.cgi?id=1227101
  * https://bugzilla.suse.com/show_bug.cgi?id=1227190
  * https://jira.suse.com/browse/PED-8491
  * https://jira.suse.com/browse/PED-8570
  * https://jira.suse.com/browse/PED-8688

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20240722/cca96bf7/attachment.htm>


More information about the sle-updates mailing list