SUSE-SU-2024:2189-1: important: Security update for the Linux Kernel
SLE-UPDATES
null at suse.de
Tue Jun 25 08:31:08 UTC 2024
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:2189-1
Rating: important
References:
* bsc#1065729
* bsc#1174585
* bsc#1190569
* bsc#1191949
* bsc#1192107
* bsc#1193983
* bsc#1194288
* bsc#1194869
* bsc#1196869
* bsc#1196956
* bsc#1197915
* bsc#1200313
* bsc#1201308
* bsc#1201489
* bsc#1208149
* bsc#1209657
* bsc#1209799
* bsc#1209834
* bsc#1210335
* bsc#1211592
* bsc#1213863
* bsc#1216702
* bsc#1217169
* bsc#1217515
* bsc#1218447
* bsc#1218917
* bsc#1220492
* bsc#1220783
* bsc#1221044
* bsc#1221645
* bsc#1221958
* bsc#1222011
* bsc#1222559
* bsc#1222619
* bsc#1222721
* bsc#1222976
* bsc#1223057
* bsc#1223084
* bsc#1223111
* bsc#1223138
* bsc#1223191
* bsc#1223384
* bsc#1223390
* bsc#1223481
* bsc#1223501
* bsc#1223505
* bsc#1223512
* bsc#1223520
* bsc#1223532
* bsc#1223626
* bsc#1223715
* bsc#1223894
* bsc#1223921
* bsc#1223922
* bsc#1223923
* bsc#1223924
* bsc#1223929
* bsc#1223931
* bsc#1223932
* bsc#1223934
* bsc#1223941
* bsc#1223948
* bsc#1223952
* bsc#1223953
* bsc#1223957
* bsc#1223962
* bsc#1223963
* bsc#1223964
* bsc#1223996
* bsc#1224085
* bsc#1224099
* bsc#1224137
* bsc#1224174
* bsc#1224438
* bsc#1224482
* bsc#1224488
* bsc#1224494
* bsc#1224511
* bsc#1224592
* bsc#1224611
* bsc#1224664
* bsc#1224678
* bsc#1224682
* bsc#1224685
* bsc#1224730
* bsc#1224736
* bsc#1224763
* bsc#1224816
* bsc#1224895
* bsc#1224898
* bsc#1224900
* bsc#1224901
* bsc#1224902
* bsc#1224903
* bsc#1224904
* bsc#1224905
* bsc#1224907
* bsc#1224909
* bsc#1224910
* bsc#1224911
* bsc#1224912
* bsc#1224913
* bsc#1224914
* bsc#1224915
* bsc#1224920
* bsc#1224928
* bsc#1224931
* bsc#1224932
* bsc#1224937
* bsc#1224942
* bsc#1224944
* bsc#1224945
* bsc#1224947
* bsc#1224956
* bsc#1224988
* bsc#1225000
* bsc#1225003
* bsc#1225005
* bsc#1225009
* bsc#1225022
* bsc#1225031
* bsc#1225032
* bsc#1225036
* bsc#1225044
* bsc#1225076
* bsc#1225077
* bsc#1225082
* bsc#1225086
* bsc#1225092
* bsc#1225095
* bsc#1225096
* bsc#1225106
* bsc#1225108
* bsc#1225109
* bsc#1225118
* bsc#1225121
* bsc#1225122
* bsc#1225123
* bsc#1225125
* bsc#1225126
* bsc#1225127
* bsc#1225129
* bsc#1225131
* bsc#1225132
* bsc#1225145
* bsc#1225151
* bsc#1225153
* bsc#1225156
* bsc#1225158
* bsc#1225160
* bsc#1225161
* bsc#1225164
* bsc#1225167
* bsc#1225180
* bsc#1225183
* bsc#1225184
* bsc#1225186
* bsc#1225187
* bsc#1225189
* bsc#1225190
* bsc#1225191
* bsc#1225192
* bsc#1225193
* bsc#1225195
* bsc#1225198
* bsc#1225201
* bsc#1225203
* bsc#1225205
* bsc#1225206
* bsc#1225207
* bsc#1225208
* bsc#1225209
* bsc#1225210
* bsc#1225214
* bsc#1225223
* bsc#1225224
* bsc#1225225
* bsc#1225227
* bsc#1225228
* bsc#1225229
* bsc#1225230
* bsc#1225232
* bsc#1225233
* bsc#1225235
* bsc#1225236
* bsc#1225237
* bsc#1225238
* bsc#1225239
* bsc#1225240
* bsc#1225241
* bsc#1225242
* bsc#1225243
* bsc#1225244
* bsc#1225245
* bsc#1225246
* bsc#1225247
* bsc#1225248
* bsc#1225249
* bsc#1225250
* bsc#1225251
* bsc#1225252
* bsc#1225253
* bsc#1225254
* bsc#1225255
* bsc#1225256
* bsc#1225257
* bsc#1225258
* bsc#1225259
* bsc#1225260
* bsc#1225261
* bsc#1225262
* bsc#1225263
* bsc#1225268
* bsc#1225301
* bsc#1225303
* bsc#1225304
* bsc#1225306
* bsc#1225316
* bsc#1225318
* bsc#1225320
* bsc#1225321
* bsc#1225322
* bsc#1225323
* bsc#1225326
* bsc#1225327
* bsc#1225328
* bsc#1225329
* bsc#1225330
* bsc#1225331
* bsc#1225332
* bsc#1225333
* bsc#1225334
* bsc#1225335
* bsc#1225336
* bsc#1225337
* bsc#1225338
* bsc#1225339
* bsc#1225341
* bsc#1225342
* bsc#1225344
* bsc#1225346
* bsc#1225347
* bsc#1225351
* bsc#1225353
* bsc#1225354
* bsc#1225355
* bsc#1225357
* bsc#1225358
* bsc#1225360
* bsc#1225361
* bsc#1225366
* bsc#1225367
* bsc#1225368
* bsc#1225369
* bsc#1225370
* bsc#1225372
* bsc#1225373
* bsc#1225374
* bsc#1225375
* bsc#1225376
* bsc#1225377
* bsc#1225379
* bsc#1225380
* bsc#1225383
* bsc#1225384
* bsc#1225386
* bsc#1225387
* bsc#1225388
* bsc#1225390
* bsc#1225392
* bsc#1225393
* bsc#1225396
* bsc#1225400
* bsc#1225404
* bsc#1225405
* bsc#1225409
* bsc#1225410
* bsc#1225411
* bsc#1225425
* bsc#1225427
* bsc#1225431
* bsc#1225435
* bsc#1225436
* bsc#1225437
* bsc#1225438
* bsc#1225439
* bsc#1225441
* bsc#1225445
* bsc#1225446
* bsc#1225447
* bsc#1225450
* bsc#1225453
* bsc#1225455
* bsc#1225461
* bsc#1225463
* bsc#1225464
* bsc#1225466
* bsc#1225471
* bsc#1225472
* bsc#1225478
* bsc#1225479
* bsc#1225482
* bsc#1225483
* bsc#1225486
* bsc#1225488
* bsc#1225490
* bsc#1225492
* bsc#1225495
* bsc#1225499
* bsc#1225500
* bsc#1225501
* bsc#1225508
* bsc#1225510
* bsc#1225529
* bsc#1225530
* bsc#1225532
* bsc#1225534
* bsc#1225549
* bsc#1225550
* bsc#1225553
* bsc#1225554
* bsc#1225557
* bsc#1225559
* bsc#1225560
* bsc#1225565
* bsc#1225566
* bsc#1225569
* bsc#1225570
* bsc#1225571
* bsc#1225572
* bsc#1225577
* bsc#1225583
* bsc#1225584
* bsc#1225588
* bsc#1225589
* bsc#1225590
* bsc#1225591
* bsc#1225592
* bsc#1225595
* bsc#1225599
* jsc#PED-8111
Cross-References:
* CVE-2020-36788
* CVE-2021-39698
* CVE-2021-4148
* CVE-2021-43056
* CVE-2021-47358
* CVE-2021-47359
* CVE-2021-47360
* CVE-2021-47361
* CVE-2021-47362
* CVE-2021-47363
* CVE-2021-47364
* CVE-2021-47365
* CVE-2021-47366
* CVE-2021-47367
* CVE-2021-47368
* CVE-2021-47369
* CVE-2021-47370
* CVE-2021-47371
* CVE-2021-47372
* CVE-2021-47373
* CVE-2021-47374
* CVE-2021-47375
* CVE-2021-47376
* CVE-2021-47378
* CVE-2021-47379
* CVE-2021-47380
* CVE-2021-47381
* CVE-2021-47382
* CVE-2021-47383
* CVE-2021-47384
* CVE-2021-47385
* CVE-2021-47386
* CVE-2021-47387
* CVE-2021-47388
* CVE-2021-47389
* CVE-2021-47390
* CVE-2021-47391
* CVE-2021-47392
* CVE-2021-47393
* CVE-2021-47394
* CVE-2021-47395
* CVE-2021-47396
* CVE-2021-47397
* CVE-2021-47398
* CVE-2021-47399
* CVE-2021-47400
* CVE-2021-47401
* CVE-2021-47402
* CVE-2021-47403
* CVE-2021-47404
* CVE-2021-47405
* CVE-2021-47406
* CVE-2021-47407
* CVE-2021-47408
* CVE-2021-47409
* CVE-2021-47410
* CVE-2021-47412
* CVE-2021-47413
* CVE-2021-47414
* CVE-2021-47415
* CVE-2021-47416
* CVE-2021-47417
* CVE-2021-47418
* CVE-2021-47419
* CVE-2021-47420
* CVE-2021-47421
* CVE-2021-47422
* CVE-2021-47423
* CVE-2021-47424
* CVE-2021-47425
* CVE-2021-47426
* CVE-2021-47427
* CVE-2021-47428
* CVE-2021-47429
* CVE-2021-47430
* CVE-2021-47431
* CVE-2021-47433
* CVE-2021-47434
* CVE-2021-47435
* CVE-2021-47436
* CVE-2021-47437
* CVE-2021-47438
* CVE-2021-47439
* CVE-2021-47440
* CVE-2021-47441
* CVE-2021-47442
* CVE-2021-47443
* CVE-2021-47444
* CVE-2021-47445
* CVE-2021-47446
* CVE-2021-47447
* CVE-2021-47448
* CVE-2021-47449
* CVE-2021-47450
* CVE-2021-47451
* CVE-2021-47452
* CVE-2021-47453
* CVE-2021-47454
* CVE-2021-47455
* CVE-2021-47456
* CVE-2021-47457
* CVE-2021-47458
* CVE-2021-47459
* CVE-2021-47460
* CVE-2021-47461
* CVE-2021-47462
* CVE-2021-47463
* CVE-2021-47464
* CVE-2021-47465
* CVE-2021-47466
* CVE-2021-47467
* CVE-2021-47468
* CVE-2021-47469
* CVE-2021-47470
* CVE-2021-47471
* CVE-2021-47472
* CVE-2021-47473
* CVE-2021-47474
* CVE-2021-47475
* CVE-2021-47476
* CVE-2021-47477
* CVE-2021-47478
* CVE-2021-47479
* CVE-2021-47480
* CVE-2021-47481
* CVE-2021-47482
* CVE-2021-47483
* CVE-2021-47484
* CVE-2021-47485
* CVE-2021-47486
* CVE-2021-47488
* CVE-2021-47489
* CVE-2021-47490
* CVE-2021-47491
* CVE-2021-47492
* CVE-2021-47493
* CVE-2021-47494
* CVE-2021-47495
* CVE-2021-47496
* CVE-2021-47497
* CVE-2021-47498
* CVE-2021-47499
* CVE-2021-47500
* CVE-2021-47501
* CVE-2021-47502
* CVE-2021-47503
* CVE-2021-47505
* CVE-2021-47506
* CVE-2021-47507
* CVE-2021-47509
* CVE-2021-47510
* CVE-2021-47511
* CVE-2021-47513
* CVE-2021-47514
* CVE-2021-47516
* CVE-2021-47518
* CVE-2021-47520
* CVE-2021-47521
* CVE-2021-47522
* CVE-2021-47523
* CVE-2021-47524
* CVE-2021-47525
* CVE-2021-47526
* CVE-2021-47527
* CVE-2021-47528
* CVE-2021-47529
* CVE-2021-47533
* CVE-2021-47534
* CVE-2021-47535
* CVE-2021-47536
* CVE-2021-47537
* CVE-2021-47540
* CVE-2021-47541
* CVE-2021-47542
* CVE-2021-47544
* CVE-2021-47549
* CVE-2021-47550
* CVE-2021-47551
* CVE-2021-47553
* CVE-2021-47554
* CVE-2021-47556
* CVE-2021-47558
* CVE-2021-47559
* CVE-2021-47560
* CVE-2021-47562
* CVE-2021-47563
* CVE-2021-47564
* CVE-2021-47565
* CVE-2022-48632
* CVE-2022-48634
* CVE-2022-48636
* CVE-2022-48652
* CVE-2022-48662
* CVE-2022-48671
* CVE-2022-48672
* CVE-2022-48673
* CVE-2022-48675
* CVE-2022-48686
* CVE-2022-48687
* CVE-2022-48688
* CVE-2022-48692
* CVE-2022-48693
* CVE-2022-48694
* CVE-2022-48695
* CVE-2022-48697
* CVE-2022-48699
* CVE-2022-48700
* CVE-2022-48701
* CVE-2022-48702
* CVE-2022-48703
* CVE-2022-48704
* CVE-2022-48708
* CVE-2022-48709
* CVE-2022-48710
* CVE-2023-0160
* CVE-2023-1829
* CVE-2023-2860
* CVE-2023-47233
* CVE-2023-52591
* CVE-2023-52654
* CVE-2023-52655
* CVE-2023-52676
* CVE-2023-52686
* CVE-2023-52690
* CVE-2023-52702
* CVE-2023-52703
* CVE-2023-52707
* CVE-2023-52708
* CVE-2023-52730
* CVE-2023-52733
* CVE-2023-52736
* CVE-2023-52738
* CVE-2023-52739
* CVE-2023-52740
* CVE-2023-52741
* CVE-2023-52742
* CVE-2023-52743
* CVE-2023-52744
* CVE-2023-52745
* CVE-2023-52747
* CVE-2023-52753
* CVE-2023-52754
* CVE-2023-52756
* CVE-2023-52759
* CVE-2023-52763
* CVE-2023-52764
* CVE-2023-52766
* CVE-2023-52774
* CVE-2023-52781
* CVE-2023-52788
* CVE-2023-52789
* CVE-2023-52791
* CVE-2023-52798
* CVE-2023-52799
* CVE-2023-52800
* CVE-2023-52804
* CVE-2023-52805
* CVE-2023-52806
* CVE-2023-52810
* CVE-2023-52811
* CVE-2023-52814
* CVE-2023-52816
* CVE-2023-52817
* CVE-2023-52818
* CVE-2023-52819
* CVE-2023-52821
* CVE-2023-52825
* CVE-2023-52826
* CVE-2023-52832
* CVE-2023-52833
* CVE-2023-52834
* CVE-2023-52838
* CVE-2023-52840
* CVE-2023-52841
* CVE-2023-52844
* CVE-2023-52847
* CVE-2023-52853
* CVE-2023-52854
* CVE-2023-52855
* CVE-2023-52856
* CVE-2023-52858
* CVE-2023-52864
* CVE-2023-52865
* CVE-2023-52867
* CVE-2023-52868
* CVE-2023-52870
* CVE-2023-52871
* CVE-2023-52872
* CVE-2023-52873
* CVE-2023-52875
* CVE-2023-52876
* CVE-2023-52877
* CVE-2023-52878
* CVE-2023-52880
* CVE-2023-6531
* CVE-2024-0639
* CVE-2024-26739
* CVE-2024-26764
* CVE-2024-26828
* CVE-2024-26840
* CVE-2024-26852
* CVE-2024-26862
* CVE-2024-26921
* CVE-2024-26925
* CVE-2024-26928
* CVE-2024-26929
* CVE-2024-26930
* CVE-2024-27398
* CVE-2024-27413
* CVE-2024-35811
* CVE-2024-35815
* CVE-2024-35817
* CVE-2024-35863
* CVE-2024-35867
* CVE-2024-35868
* CVE-2024-35895
* CVE-2024-35904
* CVE-2024-35905
* CVE-2024-35914
* CVE-2024-36926
CVSS scores:
* CVE-2020-36788 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-39698 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-39698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-4148 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-4148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-43056 ( SUSE ): 6.8 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2021-43056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47358 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47359 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47361 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-47362 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47363 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47364 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47365 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47366 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2021-47367 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47368 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-47369 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47370 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47371 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47372 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47373 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47374 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47375 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47379 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47380 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47382 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47387 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47388 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47389 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2021-47390 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47392 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47394 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47398 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47401 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47404 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47405 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47407 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47408 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47413 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47414 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47415 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47418 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47420 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47421 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47423 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47426 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47427 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47428 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47429 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47430 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2021-47434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47439 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47440 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47447 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47448 ( SUSE ): 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2021-47449 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47450 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47452 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47453 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47454 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47455 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47461 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47462 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47465 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47466 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47467 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2021-47468 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47469 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47470 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47471 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47472 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47473 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47474 ( SUSE ): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47475 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47476 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47477 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2021-47478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47479 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47480 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47481 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47482 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47488 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47489 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47490 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47491 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47492 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47496 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47497 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47499 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47502 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2021-47503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47505 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47506 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47510 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47513 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47513 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47514 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47516 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47518 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47518 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47520 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47520 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47521 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47521 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47522 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47523 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47524 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47525 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47525 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47526 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47526 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47528 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47528 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47529 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47529 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47533 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47534 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47535 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2021-47536 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2021-47537 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47537 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47540 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47540 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47541 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47544 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2021-47549 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47550 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47550 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47553 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47554 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47556 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47559 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47565 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48672 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-48672 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48675 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48686 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48686 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48687 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48692 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48693 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48694 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48697 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2022-48699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48700 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48701 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48702 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48708 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48709 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-2860 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-2860 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52702 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52703 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-52707 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52730 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52738 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52739 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52743 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52744 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52745 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52747 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52756 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-52759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52781 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52798 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52804 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52805 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52818 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52819 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52825 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52834 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52838 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52840 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52847 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52853 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52856 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52865 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52867 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52868 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52870 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52871 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-52872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52875 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52876 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-0639 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26840 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Availability Extension 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves 320 vulnerabilities, contains one feature and has 20
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2024-35905: Fixed int overflow for stack access size (bsc#1224488).
* CVE-2024-26828: Fix underflow in parse_server_interfaces() (bsc#1223084).
* CVE-2024-35863: Fix potential UAF in is_valid_oplock_break() (bsc#1224763).
* CVE-2024-35867: Fix potential UAF in cifs_stats_proc_show() (bsc#1224664).
* CVE-2024-35868: Fix potential UAF in cifs_stats_proc_write() (bsc#1224678).
* CVE-2024-26928: Fix potential UAF in cifs_debug_files_proc_show()
(bsc#1223532).
* CVE-2024-36926: Fixed LPAR panics during boot up with a frozen PE
(bsc#1222011).
* CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path
(bsc#1223390).
* CVE-2024-27413: Fix incorrect allocation size (bsc#1224438).
* CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1224736).
* CVE-2024-35904: Avoid dereference of garbage after mount failure
(bsc#1224494).
* CVE-2024-26929: Fixed double free of fcport (bsc#1223715).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1224174).
* CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223626).
* CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache() (bsc#1222976).
* CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing
(bsc#1223111).
* CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock
found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
* CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
* CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify()
(bsc#1223057).
* CVE-2023-1829: Fixed a use-after-free vulnerability in the control index
filter (tcindex) (bsc#1210335).
The following non-security bugs were fixed:
* af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
* af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
* af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress
(bsc#1223384).
* filemap: remove use of wait bookmarks (bsc#1224085).
* idpf: extend tx watchdog timeout (bsc#1224137).
* ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958)
* powerpc/kasan: Do not instrument non-maskable or raw interrupts
(bsc#1223191).
* powerpc/powernv: Add a null pointer check in opal_event_init()
(bsc#1065729).
* powerpc/powernv: Add a null pointer check to scom_debug_init_one()
(bsc#1194869).
* powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV
(bsc#1220492 ltc#205270).
* powerpc/pseries/vio: Do not return ENODEV if node or compatible missing
(bsc#1220783).
* powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645
ltc#205739 bsc#1223191).
* powerpc: Refactor verification of MSR_RI (bsc#1223191).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2189=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2189=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2189=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2189=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2189=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2189=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2189=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-2189=1
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.
* SUSE Linux Enterprise High Availability Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-2189=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2189=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2189=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2189=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2189=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2189=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2189=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-2189=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2189=1
## Package List:
* openSUSE Leap 15.4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-docs-html-5.14.21-150400.24.122.2
* kernel-source-vanilla-5.14.21-150400.24.122.1
* kernel-source-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* openSUSE Leap 15.4 (nosrc ppc64le x86_64)
* kernel-debug-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (ppc64le x86_64)
* kernel-debug-livepatch-devel-5.14.21-150400.24.122.2
* kernel-debug-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-debug-debugsource-5.14.21-150400.24.122.2
* kernel-debug-devel-5.14.21-150400.24.122.2
* kernel-debug-debuginfo-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.122.2
* kernel-kvmsmall-debuginfo-5.14.21-150400.24.122.2
* kernel-kvmsmall-devel-5.14.21-150400.24.122.2
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-default-base-rebuild-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-kvmsmall-debugsource-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* reiserfs-kmp-default-5.14.21-150400.24.122.2
* kernel-obs-build-5.14.21-150400.24.122.2
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.122.2
* dlm-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kselftests-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-syms-5.14.21-150400.24.122.1
* dlm-kmp-default-5.14.21-150400.24.122.2
* kernel-default-optional-5.14.21-150400.24.122.2
* kernel-obs-qa-5.14.21-150400.24.122.1
* cluster-md-kmp-default-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-optional-debuginfo-5.14.21-150400.24.122.2
* kernel-default-devel-5.14.21-150400.24.122.2
* gfs2-kmp-default-5.14.21-150400.24.122.2
* kernel-default-livepatch-devel-5.14.21-150400.24.122.2
* kselftests-kmp-default-5.14.21-150400.24.122.2
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-extra-5.14.21-150400.24.122.2
* kernel-obs-build-debugsource-5.14.21-150400.24.122.2
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.122.2
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-livepatch-5.14.21-150400.24.122.2
* kernel-default-extra-debuginfo-5.14.21-150400.24.122.2
* ocfs2-kmp-default-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_122-default-1-150400.9.3.2
* kernel-livepatch-5_14_21-150400_24_122-default-debuginfo-1-150400.9.3.2
* kernel-livepatch-SLE15-SP4_Update_27-debugsource-1-150400.9.3.2
* openSUSE Leap 15.4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.122.2
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (nosrc)
* dtb-aarch64-5.14.21-150400.24.122.1
* openSUSE Leap 15.4 (aarch64)
* dtb-socionext-5.14.21-150400.24.122.1
* dtb-allwinner-5.14.21-150400.24.122.1
* kernel-64kb-devel-5.14.21-150400.24.122.2
* gfs2-kmp-64kb-5.14.21-150400.24.122.2
* cluster-md-kmp-64kb-5.14.21-150400.24.122.2
* dtb-rockchip-5.14.21-150400.24.122.1
* dtb-hisilicon-5.14.21-150400.24.122.1
* dtb-qcom-5.14.21-150400.24.122.1
* dtb-apple-5.14.21-150400.24.122.1
* dtb-sprd-5.14.21-150400.24.122.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.122.2
* kselftests-kmp-64kb-5.14.21-150400.24.122.2
* dtb-nvidia-5.14.21-150400.24.122.1
* kernel-64kb-optional-debuginfo-5.14.21-150400.24.122.2
* reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.122.2
* dtb-exynos-5.14.21-150400.24.122.1
* kernel-64kb-livepatch-devel-5.14.21-150400.24.122.2
* dtb-amazon-5.14.21-150400.24.122.1
* kernel-64kb-extra-5.14.21-150400.24.122.2
* kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-optional-5.14.21-150400.24.122.2
* ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-debuginfo-5.14.21-150400.24.122.2
* dtb-broadcom-5.14.21-150400.24.122.1
* dtb-freescale-5.14.21-150400.24.122.1
* dtb-cavium-5.14.21-150400.24.122.1
* dtb-altera-5.14.21-150400.24.122.1
* dtb-xilinx-5.14.21-150400.24.122.1
* dtb-amd-5.14.21-150400.24.122.1
* dlm-kmp-64kb-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-extra-debuginfo-5.14.21-150400.24.122.2
* gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.122.2
* reiserfs-kmp-64kb-5.14.21-150400.24.122.2
* cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.122.2
* dtb-mediatek-5.14.21-150400.24.122.1
* dtb-amlogic-5.14.21-150400.24.122.1
* dtb-apm-5.14.21-150400.24.122.1
* dlm-kmp-64kb-5.14.21-150400.24.122.2
* dtb-arm-5.14.21-150400.24.122.1
* ocfs2-kmp-64kb-5.14.21-150400.24.122.2
* dtb-lg-5.14.21-150400.24.122.1
* dtb-renesas-5.14.21-150400.24.122.1
* kernel-64kb-debugsource-5.14.21-150400.24.122.2
* dtb-marvell-5.14.21-150400.24.122.1
* openSUSE Leap 15.4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.122.2
* openSUSE Leap Micro 5.3 (aarch64 nosrc x86_64)
* kernel-default-5.14.21-150400.24.122.2
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* openSUSE Leap Micro 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.122.2
* openSUSE Leap Micro 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Live Patching 15-SP4 (nosrc)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_122-default-1-150400.9.3.2
* kernel-livepatch-5_14_21-150400_24_122-default-debuginfo-1-150400.9.3.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-livepatch-devel-5.14.21-150400.24.122.2
* kernel-default-livepatch-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-livepatch-SLE15-SP4_Update_27-debugsource-1-150400.9.3.2
* SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le
s390x x86_64)
* dlm-kmp-default-5.14.21-150400.24.122.2
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* dlm-kmp-default-debuginfo-5.14.21-150400.24.122.2
* cluster-md-kmp-default-5.14.21-150400.24.122.2
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* gfs2-kmp-default-5.14.21-150400.24.122.2
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.122.2
* ocfs2-kmp-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
nosrc)
* kernel-64kb-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* kernel-64kb-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-debugsource-5.14.21-150400.24.122.2
* kernel-64kb-devel-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* reiserfs-kmp-default-5.14.21-150400.24.122.2
* kernel-obs-build-5.14.21-150400.24.122.2
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-syms-5.14.21-150400.24.122.1
* kernel-default-devel-5.14.21-150400.24.122.2
* kernel-obs-build-debugsource-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-source-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* kernel-64kb-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-debugsource-5.14.21-150400.24.122.2
* kernel-64kb-devel-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* reiserfs-kmp-default-5.14.21-150400.24.122.2
* kernel-obs-build-5.14.21-150400.24.122.2
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-syms-5.14.21-150400.24.122.1
* kernel-default-devel-5.14.21-150400.24.122.2
* kernel-obs-build-debugsource-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-source-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* kernel-obs-build-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-default-extra-5.14.21-150400.24.122.2
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-syms-5.14.21-150400.24.122.1
* kernel-default-devel-5.14.21-150400.24.122.2
* kernel-obs-build-debugsource-5.14.21-150400.24.122.2
* kernel-default-extra-debuginfo-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-source-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64)
* kernel-64kb-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-debugsource-5.14.21-150400.24.122.2
* kernel-64kb-devel-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64 nosrc)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* reiserfs-kmp-default-5.14.21-150400.24.122.2
* kernel-obs-build-5.14.21-150400.24.122.2
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-syms-5.14.21-150400.24.122.1
* kernel-default-devel-5.14.21-150400.24.122.2
* kernel-obs-build-debugsource-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-source-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.122.2
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le
x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* reiserfs-kmp-default-5.14.21-150400.24.122.2
* kernel-obs-build-5.14.21-150400.24.122.2
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-syms-5.14.21-150400.24.122.1
* kernel-default-devel-5.14.21-150400.24.122.2
* kernel-obs-build-debugsource-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-source-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.122.2
* SUSE Manager Proxy 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Manager Proxy 4.3 (x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-syms-5.14.21-150400.24.122.1
* kernel-default-devel-5.14.21-150400.24.122.2
* SUSE Manager Proxy 4.3 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-source-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* SUSE Manager Retail Branch Server 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-default-devel-5.14.21-150400.24.122.2
* SUSE Manager Retail Branch Server 4.3 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Manager Server 4.3 (ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-syms-5.14.21-150400.24.122.1
* kernel-default-devel-5.14.21-150400.24.122.2
* SUSE Manager Server 4.3 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-source-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* SUSE Manager Server 4.3 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.122.2
* SUSE Manager Server 4.3 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.122.2
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.122.2
## References:
* https://www.suse.com/security/cve/CVE-2020-36788.html
* https://www.suse.com/security/cve/CVE-2021-39698.html
* https://www.suse.com/security/cve/CVE-2021-4148.html
* https://www.suse.com/security/cve/CVE-2021-43056.html
* https://www.suse.com/security/cve/CVE-2021-47358.html
* https://www.suse.com/security/cve/CVE-2021-47359.html
* https://www.suse.com/security/cve/CVE-2021-47360.html
* https://www.suse.com/security/cve/CVE-2021-47361.html
* https://www.suse.com/security/cve/CVE-2021-47362.html
* https://www.suse.com/security/cve/CVE-2021-47363.html
* https://www.suse.com/security/cve/CVE-2021-47364.html
* https://www.suse.com/security/cve/CVE-2021-47365.html
* https://www.suse.com/security/cve/CVE-2021-47366.html
* https://www.suse.com/security/cve/CVE-2021-47367.html
* https://www.suse.com/security/cve/CVE-2021-47368.html
* https://www.suse.com/security/cve/CVE-2021-47369.html
* https://www.suse.com/security/cve/CVE-2021-47370.html
* https://www.suse.com/security/cve/CVE-2021-47371.html
* https://www.suse.com/security/cve/CVE-2021-47372.html
* https://www.suse.com/security/cve/CVE-2021-47373.html
* https://www.suse.com/security/cve/CVE-2021-47374.html
* https://www.suse.com/security/cve/CVE-2021-47375.html
* https://www.suse.com/security/cve/CVE-2021-47376.html
* https://www.suse.com/security/cve/CVE-2021-47378.html
* https://www.suse.com/security/cve/CVE-2021-47379.html
* https://www.suse.com/security/cve/CVE-2021-47380.html
* https://www.suse.com/security/cve/CVE-2021-47381.html
* https://www.suse.com/security/cve/CVE-2021-47382.html
* https://www.suse.com/security/cve/CVE-2021-47383.html
* https://www.suse.com/security/cve/CVE-2021-47384.html
* https://www.suse.com/security/cve/CVE-2021-47385.html
* https://www.suse.com/security/cve/CVE-2021-47386.html
* https://www.suse.com/security/cve/CVE-2021-47387.html
* https://www.suse.com/security/cve/CVE-2021-47388.html
* https://www.suse.com/security/cve/CVE-2021-47389.html
* https://www.suse.com/security/cve/CVE-2021-47390.html
* https://www.suse.com/security/cve/CVE-2021-47391.html
* https://www.suse.com/security/cve/CVE-2021-47392.html
* https://www.suse.com/security/cve/CVE-2021-47393.html
* https://www.suse.com/security/cve/CVE-2021-47394.html
* https://www.suse.com/security/cve/CVE-2021-47395.html
* https://www.suse.com/security/cve/CVE-2021-47396.html
* https://www.suse.com/security/cve/CVE-2021-47397.html
* https://www.suse.com/security/cve/CVE-2021-47398.html
* https://www.suse.com/security/cve/CVE-2021-47399.html
* https://www.suse.com/security/cve/CVE-2021-47400.html
* https://www.suse.com/security/cve/CVE-2021-47401.html
* https://www.suse.com/security/cve/CVE-2021-47402.html
* https://www.suse.com/security/cve/CVE-2021-47403.html
* https://www.suse.com/security/cve/CVE-2021-47404.html
* https://www.suse.com/security/cve/CVE-2021-47405.html
* https://www.suse.com/security/cve/CVE-2021-47406.html
* https://www.suse.com/security/cve/CVE-2021-47407.html
* https://www.suse.com/security/cve/CVE-2021-47408.html
* https://www.suse.com/security/cve/CVE-2021-47409.html
* https://www.suse.com/security/cve/CVE-2021-47410.html
* https://www.suse.com/security/cve/CVE-2021-47412.html
* https://www.suse.com/security/cve/CVE-2021-47413.html
* https://www.suse.com/security/cve/CVE-2021-47414.html
* https://www.suse.com/security/cve/CVE-2021-47415.html
* https://www.suse.com/security/cve/CVE-2021-47416.html
* https://www.suse.com/security/cve/CVE-2021-47417.html
* https://www.suse.com/security/cve/CVE-2021-47418.html
* https://www.suse.com/security/cve/CVE-2021-47419.html
* https://www.suse.com/security/cve/CVE-2021-47420.html
* https://www.suse.com/security/cve/CVE-2021-47421.html
* https://www.suse.com/security/cve/CVE-2021-47422.html
* https://www.suse.com/security/cve/CVE-2021-47423.html
* https://www.suse.com/security/cve/CVE-2021-47424.html
* https://www.suse.com/security/cve/CVE-2021-47425.html
* https://www.suse.com/security/cve/CVE-2021-47426.html
* https://www.suse.com/security/cve/CVE-2021-47427.html
* https://www.suse.com/security/cve/CVE-2021-47428.html
* https://www.suse.com/security/cve/CVE-2021-47429.html
* https://www.suse.com/security/cve/CVE-2021-47430.html
* https://www.suse.com/security/cve/CVE-2021-47431.html
* https://www.suse.com/security/cve/CVE-2021-47433.html
* https://www.suse.com/security/cve/CVE-2021-47434.html
* https://www.suse.com/security/cve/CVE-2021-47435.html
* https://www.suse.com/security/cve/CVE-2021-47436.html
* https://www.suse.com/security/cve/CVE-2021-47437.html
* https://www.suse.com/security/cve/CVE-2021-47438.html
* https://www.suse.com/security/cve/CVE-2021-47439.html
* https://www.suse.com/security/cve/CVE-2021-47440.html
* https://www.suse.com/security/cve/CVE-2021-47441.html
* https://www.suse.com/security/cve/CVE-2021-47442.html
* https://www.suse.com/security/cve/CVE-2021-47443.html
* https://www.suse.com/security/cve/CVE-2021-47444.html
* https://www.suse.com/security/cve/CVE-2021-47445.html
* https://www.suse.com/security/cve/CVE-2021-47446.html
* https://www.suse.com/security/cve/CVE-2021-47447.html
* https://www.suse.com/security/cve/CVE-2021-47448.html
* https://www.suse.com/security/cve/CVE-2021-47449.html
* https://www.suse.com/security/cve/CVE-2021-47450.html
* https://www.suse.com/security/cve/CVE-2021-47451.html
* https://www.suse.com/security/cve/CVE-2021-47452.html
* https://www.suse.com/security/cve/CVE-2021-47453.html
* https://www.suse.com/security/cve/CVE-2021-47454.html
* https://www.suse.com/security/cve/CVE-2021-47455.html
* https://www.suse.com/security/cve/CVE-2021-47456.html
* https://www.suse.com/security/cve/CVE-2021-47457.html
* https://www.suse.com/security/cve/CVE-2021-47458.html
* https://www.suse.com/security/cve/CVE-2021-47459.html
* https://www.suse.com/security/cve/CVE-2021-47460.html
* https://www.suse.com/security/cve/CVE-2021-47461.html
* https://www.suse.com/security/cve/CVE-2021-47462.html
* https://www.suse.com/security/cve/CVE-2021-47463.html
* https://www.suse.com/security/cve/CVE-2021-47464.html
* https://www.suse.com/security/cve/CVE-2021-47465.html
* https://www.suse.com/security/cve/CVE-2021-47466.html
* https://www.suse.com/security/cve/CVE-2021-47467.html
* https://www.suse.com/security/cve/CVE-2021-47468.html
* https://www.suse.com/security/cve/CVE-2021-47469.html
* https://www.suse.com/security/cve/CVE-2021-47470.html
* https://www.suse.com/security/cve/CVE-2021-47471.html
* https://www.suse.com/security/cve/CVE-2021-47472.html
* https://www.suse.com/security/cve/CVE-2021-47473.html
* https://www.suse.com/security/cve/CVE-2021-47474.html
* https://www.suse.com/security/cve/CVE-2021-47475.html
* https://www.suse.com/security/cve/CVE-2021-47476.html
* https://www.suse.com/security/cve/CVE-2021-47477.html
* https://www.suse.com/security/cve/CVE-2021-47478.html
* https://www.suse.com/security/cve/CVE-2021-47479.html
* https://www.suse.com/security/cve/CVE-2021-47480.html
* https://www.suse.com/security/cve/CVE-2021-47481.html
* https://www.suse.com/security/cve/CVE-2021-47482.html
* https://www.suse.com/security/cve/CVE-2021-47483.html
* https://www.suse.com/security/cve/CVE-2021-47484.html
* https://www.suse.com/security/cve/CVE-2021-47485.html
* https://www.suse.com/security/cve/CVE-2021-47486.html
* https://www.suse.com/security/cve/CVE-2021-47488.html
* https://www.suse.com/security/cve/CVE-2021-47489.html
* https://www.suse.com/security/cve/CVE-2021-47490.html
* https://www.suse.com/security/cve/CVE-2021-47491.html
* https://www.suse.com/security/cve/CVE-2021-47492.html
* https://www.suse.com/security/cve/CVE-2021-47493.html
* https://www.suse.com/security/cve/CVE-2021-47494.html
* https://www.suse.com/security/cve/CVE-2021-47495.html
* https://www.suse.com/security/cve/CVE-2021-47496.html
* https://www.suse.com/security/cve/CVE-2021-47497.html
* https://www.suse.com/security/cve/CVE-2021-47498.html
* https://www.suse.com/security/cve/CVE-2021-47499.html
* https://www.suse.com/security/cve/CVE-2021-47500.html
* https://www.suse.com/security/cve/CVE-2021-47501.html
* https://www.suse.com/security/cve/CVE-2021-47502.html
* https://www.suse.com/security/cve/CVE-2021-47503.html
* https://www.suse.com/security/cve/CVE-2021-47505.html
* https://www.suse.com/security/cve/CVE-2021-47506.html
* https://www.suse.com/security/cve/CVE-2021-47507.html
* https://www.suse.com/security/cve/CVE-2021-47509.html
* https://www.suse.com/security/cve/CVE-2021-47510.html
* https://www.suse.com/security/cve/CVE-2021-47511.html
* https://www.suse.com/security/cve/CVE-2021-47513.html
* https://www.suse.com/security/cve/CVE-2021-47514.html
* https://www.suse.com/security/cve/CVE-2021-47516.html
* https://www.suse.com/security/cve/CVE-2021-47518.html
* https://www.suse.com/security/cve/CVE-2021-47520.html
* https://www.suse.com/security/cve/CVE-2021-47521.html
* https://www.suse.com/security/cve/CVE-2021-47522.html
* https://www.suse.com/security/cve/CVE-2021-47523.html
* https://www.suse.com/security/cve/CVE-2021-47524.html
* https://www.suse.com/security/cve/CVE-2021-47525.html
* https://www.suse.com/security/cve/CVE-2021-47526.html
* https://www.suse.com/security/cve/CVE-2021-47527.html
* https://www.suse.com/security/cve/CVE-2021-47528.html
* https://www.suse.com/security/cve/CVE-2021-47529.html
* https://www.suse.com/security/cve/CVE-2021-47533.html
* https://www.suse.com/security/cve/CVE-2021-47534.html
* https://www.suse.com/security/cve/CVE-2021-47535.html
* https://www.suse.com/security/cve/CVE-2021-47536.html
* https://www.suse.com/security/cve/CVE-2021-47537.html
* https://www.suse.com/security/cve/CVE-2021-47540.html
* https://www.suse.com/security/cve/CVE-2021-47541.html
* https://www.suse.com/security/cve/CVE-2021-47542.html
* https://www.suse.com/security/cve/CVE-2021-47544.html
* https://www.suse.com/security/cve/CVE-2021-47549.html
* https://www.suse.com/security/cve/CVE-2021-47550.html
* https://www.suse.com/security/cve/CVE-2021-47551.html
* https://www.suse.com/security/cve/CVE-2021-47553.html
* https://www.suse.com/security/cve/CVE-2021-47554.html
* https://www.suse.com/security/cve/CVE-2021-47556.html
* https://www.suse.com/security/cve/CVE-2021-47558.html
* https://www.suse.com/security/cve/CVE-2021-47559.html
* https://www.suse.com/security/cve/CVE-2021-47560.html
* https://www.suse.com/security/cve/CVE-2021-47562.html
* https://www.suse.com/security/cve/CVE-2021-47563.html
* https://www.suse.com/security/cve/CVE-2021-47564.html
* https://www.suse.com/security/cve/CVE-2021-47565.html
* https://www.suse.com/security/cve/CVE-2022-48632.html
* https://www.suse.com/security/cve/CVE-2022-48634.html
* https://www.suse.com/security/cve/CVE-2022-48636.html
* https://www.suse.com/security/cve/CVE-2022-48652.html
* https://www.suse.com/security/cve/CVE-2022-48662.html
* https://www.suse.com/security/cve/CVE-2022-48671.html
* https://www.suse.com/security/cve/CVE-2022-48672.html
* https://www.suse.com/security/cve/CVE-2022-48673.html
* https://www.suse.com/security/cve/CVE-2022-48675.html
* https://www.suse.com/security/cve/CVE-2022-48686.html
* https://www.suse.com/security/cve/CVE-2022-48687.html
* https://www.suse.com/security/cve/CVE-2022-48688.html
* https://www.suse.com/security/cve/CVE-2022-48692.html
* https://www.suse.com/security/cve/CVE-2022-48693.html
* https://www.suse.com/security/cve/CVE-2022-48694.html
* https://www.suse.com/security/cve/CVE-2022-48695.html
* https://www.suse.com/security/cve/CVE-2022-48697.html
* https://www.suse.com/security/cve/CVE-2022-48699.html
* https://www.suse.com/security/cve/CVE-2022-48700.html
* https://www.suse.com/security/cve/CVE-2022-48701.html
* https://www.suse.com/security/cve/CVE-2022-48702.html
* https://www.suse.com/security/cve/CVE-2022-48703.html
* https://www.suse.com/security/cve/CVE-2022-48704.html
* https://www.suse.com/security/cve/CVE-2022-48708.html
* https://www.suse.com/security/cve/CVE-2022-48709.html
* https://www.suse.com/security/cve/CVE-2022-48710.html
* https://www.suse.com/security/cve/CVE-2023-0160.html
* https://www.suse.com/security/cve/CVE-2023-1829.html
* https://www.suse.com/security/cve/CVE-2023-2860.html
* https://www.suse.com/security/cve/CVE-2023-47233.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52654.html
* https://www.suse.com/security/cve/CVE-2023-52655.html
* https://www.suse.com/security/cve/CVE-2023-52676.html
* https://www.suse.com/security/cve/CVE-2023-52686.html
* https://www.suse.com/security/cve/CVE-2023-52690.html
* https://www.suse.com/security/cve/CVE-2023-52702.html
* https://www.suse.com/security/cve/CVE-2023-52703.html
* https://www.suse.com/security/cve/CVE-2023-52707.html
* https://www.suse.com/security/cve/CVE-2023-52708.html
* https://www.suse.com/security/cve/CVE-2023-52730.html
* https://www.suse.com/security/cve/CVE-2023-52733.html
* https://www.suse.com/security/cve/CVE-2023-52736.html
* https://www.suse.com/security/cve/CVE-2023-52738.html
* https://www.suse.com/security/cve/CVE-2023-52739.html
* https://www.suse.com/security/cve/CVE-2023-52740.html
* https://www.suse.com/security/cve/CVE-2023-52741.html
* https://www.suse.com/security/cve/CVE-2023-52742.html
* https://www.suse.com/security/cve/CVE-2023-52743.html
* https://www.suse.com/security/cve/CVE-2023-52744.html
* https://www.suse.com/security/cve/CVE-2023-52745.html
* https://www.suse.com/security/cve/CVE-2023-52747.html
* https://www.suse.com/security/cve/CVE-2023-52753.html
* https://www.suse.com/security/cve/CVE-2023-52754.html
* https://www.suse.com/security/cve/CVE-2023-52756.html
* https://www.suse.com/security/cve/CVE-2023-52759.html
* https://www.suse.com/security/cve/CVE-2023-52763.html
* https://www.suse.com/security/cve/CVE-2023-52764.html
* https://www.suse.com/security/cve/CVE-2023-52766.html
* https://www.suse.com/security/cve/CVE-2023-52774.html
* https://www.suse.com/security/cve/CVE-2023-52781.html
* https://www.suse.com/security/cve/CVE-2023-52788.html
* https://www.suse.com/security/cve/CVE-2023-52789.html
* https://www.suse.com/security/cve/CVE-2023-52791.html
* https://www.suse.com/security/cve/CVE-2023-52798.html
* https://www.suse.com/security/cve/CVE-2023-52799.html
* https://www.suse.com/security/cve/CVE-2023-52800.html
* https://www.suse.com/security/cve/CVE-2023-52804.html
* https://www.suse.com/security/cve/CVE-2023-52805.html
* https://www.suse.com/security/cve/CVE-2023-52806.html
* https://www.suse.com/security/cve/CVE-2023-52810.html
* https://www.suse.com/security/cve/CVE-2023-52811.html
* https://www.suse.com/security/cve/CVE-2023-52814.html
* https://www.suse.com/security/cve/CVE-2023-52816.html
* https://www.suse.com/security/cve/CVE-2023-52817.html
* https://www.suse.com/security/cve/CVE-2023-52818.html
* https://www.suse.com/security/cve/CVE-2023-52819.html
* https://www.suse.com/security/cve/CVE-2023-52821.html
* https://www.suse.com/security/cve/CVE-2023-52825.html
* https://www.suse.com/security/cve/CVE-2023-52826.html
* https://www.suse.com/security/cve/CVE-2023-52832.html
* https://www.suse.com/security/cve/CVE-2023-52833.html
* https://www.suse.com/security/cve/CVE-2023-52834.html
* https://www.suse.com/security/cve/CVE-2023-52838.html
* https://www.suse.com/security/cve/CVE-2023-52840.html
* https://www.suse.com/security/cve/CVE-2023-52841.html
* https://www.suse.com/security/cve/CVE-2023-52844.html
* https://www.suse.com/security/cve/CVE-2023-52847.html
* https://www.suse.com/security/cve/CVE-2023-52853.html
* https://www.suse.com/security/cve/CVE-2023-52854.html
* https://www.suse.com/security/cve/CVE-2023-52855.html
* https://www.suse.com/security/cve/CVE-2023-52856.html
* https://www.suse.com/security/cve/CVE-2023-52858.html
* https://www.suse.com/security/cve/CVE-2023-52864.html
* https://www.suse.com/security/cve/CVE-2023-52865.html
* https://www.suse.com/security/cve/CVE-2023-52867.html
* https://www.suse.com/security/cve/CVE-2023-52868.html
* https://www.suse.com/security/cve/CVE-2023-52870.html
* https://www.suse.com/security/cve/CVE-2023-52871.html
* https://www.suse.com/security/cve/CVE-2023-52872.html
* https://www.suse.com/security/cve/CVE-2023-52873.html
* https://www.suse.com/security/cve/CVE-2023-52875.html
* https://www.suse.com/security/cve/CVE-2023-52876.html
* https://www.suse.com/security/cve/CVE-2023-52877.html
* https://www.suse.com/security/cve/CVE-2023-52878.html
* https://www.suse.com/security/cve/CVE-2023-52880.html
* https://www.suse.com/security/cve/CVE-2023-6531.html
* https://www.suse.com/security/cve/CVE-2024-0639.html
* https://www.suse.com/security/cve/CVE-2024-26739.html
* https://www.suse.com/security/cve/CVE-2024-26764.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26840.html
* https://www.suse.com/security/cve/CVE-2024-26852.html
* https://www.suse.com/security/cve/CVE-2024-26862.html
* https://www.suse.com/security/cve/CVE-2024-26921.html
* https://www.suse.com/security/cve/CVE-2024-26925.html
* https://www.suse.com/security/cve/CVE-2024-26928.html
* https://www.suse.com/security/cve/CVE-2024-26929.html
* https://www.suse.com/security/cve/CVE-2024-26930.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-27413.html
* https://www.suse.com/security/cve/CVE-2024-35811.html
* https://www.suse.com/security/cve/CVE-2024-35815.html
* https://www.suse.com/security/cve/CVE-2024-35817.html
* https://www.suse.com/security/cve/CVE-2024-35863.html
* https://www.suse.com/security/cve/CVE-2024-35867.html
* https://www.suse.com/security/cve/CVE-2024-35868.html
* https://www.suse.com/security/cve/CVE-2024-35895.html
* https://www.suse.com/security/cve/CVE-2024-35904.html
* https://www.suse.com/security/cve/CVE-2024-35905.html
* https://www.suse.com/security/cve/CVE-2024-35914.html
* https://www.suse.com/security/cve/CVE-2024-36926.html
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1174585
* https://bugzilla.suse.com/show_bug.cgi?id=1190569
* https://bugzilla.suse.com/show_bug.cgi?id=1191949
* https://bugzilla.suse.com/show_bug.cgi?id=1192107
* https://bugzilla.suse.com/show_bug.cgi?id=1193983
* https://bugzilla.suse.com/show_bug.cgi?id=1194288
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1196869
* https://bugzilla.suse.com/show_bug.cgi?id=1196956
* https://bugzilla.suse.com/show_bug.cgi?id=1197915
* https://bugzilla.suse.com/show_bug.cgi?id=1200313
* https://bugzilla.suse.com/show_bug.cgi?id=1201308
* https://bugzilla.suse.com/show_bug.cgi?id=1201489
* https://bugzilla.suse.com/show_bug.cgi?id=1208149
* https://bugzilla.suse.com/show_bug.cgi?id=1209657
* https://bugzilla.suse.com/show_bug.cgi?id=1209799
* https://bugzilla.suse.com/show_bug.cgi?id=1209834
* https://bugzilla.suse.com/show_bug.cgi?id=1210335
* https://bugzilla.suse.com/show_bug.cgi?id=1211592
* https://bugzilla.suse.com/show_bug.cgi?id=1213863
* https://bugzilla.suse.com/show_bug.cgi?id=1216702
* https://bugzilla.suse.com/show_bug.cgi?id=1217169
* https://bugzilla.suse.com/show_bug.cgi?id=1217515
* https://bugzilla.suse.com/show_bug.cgi?id=1218447
* https://bugzilla.suse.com/show_bug.cgi?id=1218917
* https://bugzilla.suse.com/show_bug.cgi?id=1220492
* https://bugzilla.suse.com/show_bug.cgi?id=1220783
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221645
* https://bugzilla.suse.com/show_bug.cgi?id=1221958
* https://bugzilla.suse.com/show_bug.cgi?id=1222011
* https://bugzilla.suse.com/show_bug.cgi?id=1222559
* https://bugzilla.suse.com/show_bug.cgi?id=1222619
* https://bugzilla.suse.com/show_bug.cgi?id=1222721
* https://bugzilla.suse.com/show_bug.cgi?id=1222976
* https://bugzilla.suse.com/show_bug.cgi?id=1223057
* https://bugzilla.suse.com/show_bug.cgi?id=1223084
* https://bugzilla.suse.com/show_bug.cgi?id=1223111
* https://bugzilla.suse.com/show_bug.cgi?id=1223138
* https://bugzilla.suse.com/show_bug.cgi?id=1223191
* https://bugzilla.suse.com/show_bug.cgi?id=1223384
* https://bugzilla.suse.com/show_bug.cgi?id=1223390
* https://bugzilla.suse.com/show_bug.cgi?id=1223481
* https://bugzilla.suse.com/show_bug.cgi?id=1223501
* https://bugzilla.suse.com/show_bug.cgi?id=1223505
* https://bugzilla.suse.com/show_bug.cgi?id=1223512
* https://bugzilla.suse.com/show_bug.cgi?id=1223520
* https://bugzilla.suse.com/show_bug.cgi?id=1223532
* https://bugzilla.suse.com/show_bug.cgi?id=1223626
* https://bugzilla.suse.com/show_bug.cgi?id=1223715
* https://bugzilla.suse.com/show_bug.cgi?id=1223894
* https://bugzilla.suse.com/show_bug.cgi?id=1223921
* https://bugzilla.suse.com/show_bug.cgi?id=1223922
* https://bugzilla.suse.com/show_bug.cgi?id=1223923
* https://bugzilla.suse.com/show_bug.cgi?id=1223924
* https://bugzilla.suse.com/show_bug.cgi?id=1223929
* https://bugzilla.suse.com/show_bug.cgi?id=1223931
* https://bugzilla.suse.com/show_bug.cgi?id=1223932
* https://bugzilla.suse.com/show_bug.cgi?id=1223934
* https://bugzilla.suse.com/show_bug.cgi?id=1223941
* https://bugzilla.suse.com/show_bug.cgi?id=1223948
* https://bugzilla.suse.com/show_bug.cgi?id=1223952
* https://bugzilla.suse.com/show_bug.cgi?id=1223953
* https://bugzilla.suse.com/show_bug.cgi?id=1223957
* https://bugzilla.suse.com/show_bug.cgi?id=1223962
* https://bugzilla.suse.com/show_bug.cgi?id=1223963
* https://bugzilla.suse.com/show_bug.cgi?id=1223964
* https://bugzilla.suse.com/show_bug.cgi?id=1223996
* https://bugzilla.suse.com/show_bug.cgi?id=1224085
* https://bugzilla.suse.com/show_bug.cgi?id=1224099
* https://bugzilla.suse.com/show_bug.cgi?id=1224137
* https://bugzilla.suse.com/show_bug.cgi?id=1224174
* https://bugzilla.suse.com/show_bug.cgi?id=1224438
* https://bugzilla.suse.com/show_bug.cgi?id=1224482
* https://bugzilla.suse.com/show_bug.cgi?id=1224488
* https://bugzilla.suse.com/show_bug.cgi?id=1224494
* https://bugzilla.suse.com/show_bug.cgi?id=1224511
* https://bugzilla.suse.com/show_bug.cgi?id=1224592
* https://bugzilla.suse.com/show_bug.cgi?id=1224611
* https://bugzilla.suse.com/show_bug.cgi?id=1224664
* https://bugzilla.suse.com/show_bug.cgi?id=1224678
* https://bugzilla.suse.com/show_bug.cgi?id=1224682
* https://bugzilla.suse.com/show_bug.cgi?id=1224685
* https://bugzilla.suse.com/show_bug.cgi?id=1224730
* https://bugzilla.suse.com/show_bug.cgi?id=1224736
* https://bugzilla.suse.com/show_bug.cgi?id=1224763
* https://bugzilla.suse.com/show_bug.cgi?id=1224816
* https://bugzilla.suse.com/show_bug.cgi?id=1224895
* https://bugzilla.suse.com/show_bug.cgi?id=1224898
* https://bugzilla.suse.com/show_bug.cgi?id=1224900
* https://bugzilla.suse.com/show_bug.cgi?id=1224901
* https://bugzilla.suse.com/show_bug.cgi?id=1224902
* https://bugzilla.suse.com/show_bug.cgi?id=1224903
* https://bugzilla.suse.com/show_bug.cgi?id=1224904
* https://bugzilla.suse.com/show_bug.cgi?id=1224905
* https://bugzilla.suse.com/show_bug.cgi?id=1224907
* https://bugzilla.suse.com/show_bug.cgi?id=1224909
* https://bugzilla.suse.com/show_bug.cgi?id=1224910
* https://bugzilla.suse.com/show_bug.cgi?id=1224911
* https://bugzilla.suse.com/show_bug.cgi?id=1224912
* https://bugzilla.suse.com/show_bug.cgi?id=1224913
* https://bugzilla.suse.com/show_bug.cgi?id=1224914
* https://bugzilla.suse.com/show_bug.cgi?id=1224915
* https://bugzilla.suse.com/show_bug.cgi?id=1224920
* https://bugzilla.suse.com/show_bug.cgi?id=1224928
* https://bugzilla.suse.com/show_bug.cgi?id=1224931
* https://bugzilla.suse.com/show_bug.cgi?id=1224932
* https://bugzilla.suse.com/show_bug.cgi?id=1224937
* https://bugzilla.suse.com/show_bug.cgi?id=1224942
* https://bugzilla.suse.com/show_bug.cgi?id=1224944
* https://bugzilla.suse.com/show_bug.cgi?id=1224945
* https://bugzilla.suse.com/show_bug.cgi?id=1224947
* https://bugzilla.suse.com/show_bug.cgi?id=1224956
* https://bugzilla.suse.com/show_bug.cgi?id=1224988
* https://bugzilla.suse.com/show_bug.cgi?id=1225000
* https://bugzilla.suse.com/show_bug.cgi?id=1225003
* https://bugzilla.suse.com/show_bug.cgi?id=1225005
* https://bugzilla.suse.com/show_bug.cgi?id=1225009
* https://bugzilla.suse.com/show_bug.cgi?id=1225022
* https://bugzilla.suse.com/show_bug.cgi?id=1225031
* https://bugzilla.suse.com/show_bug.cgi?id=1225032
* https://bugzilla.suse.com/show_bug.cgi?id=1225036
* https://bugzilla.suse.com/show_bug.cgi?id=1225044
* https://bugzilla.suse.com/show_bug.cgi?id=1225076
* https://bugzilla.suse.com/show_bug.cgi?id=1225077
* https://bugzilla.suse.com/show_bug.cgi?id=1225082
* https://bugzilla.suse.com/show_bug.cgi?id=1225086
* https://bugzilla.suse.com/show_bug.cgi?id=1225092
* https://bugzilla.suse.com/show_bug.cgi?id=1225095
* https://bugzilla.suse.com/show_bug.cgi?id=1225096
* https://bugzilla.suse.com/show_bug.cgi?id=1225106
* https://bugzilla.suse.com/show_bug.cgi?id=1225108
* https://bugzilla.suse.com/show_bug.cgi?id=1225109
* https://bugzilla.suse.com/show_bug.cgi?id=1225118
* https://bugzilla.suse.com/show_bug.cgi?id=1225121
* https://bugzilla.suse.com/show_bug.cgi?id=1225122
* https://bugzilla.suse.com/show_bug.cgi?id=1225123
* https://bugzilla.suse.com/show_bug.cgi?id=1225125
* https://bugzilla.suse.com/show_bug.cgi?id=1225126
* https://bugzilla.suse.com/show_bug.cgi?id=1225127
* https://bugzilla.suse.com/show_bug.cgi?id=1225129
* https://bugzilla.suse.com/show_bug.cgi?id=1225131
* https://bugzilla.suse.com/show_bug.cgi?id=1225132
* https://bugzilla.suse.com/show_bug.cgi?id=1225145
* https://bugzilla.suse.com/show_bug.cgi?id=1225151
* https://bugzilla.suse.com/show_bug.cgi?id=1225153
* https://bugzilla.suse.com/show_bug.cgi?id=1225156
* https://bugzilla.suse.com/show_bug.cgi?id=1225158
* https://bugzilla.suse.com/show_bug.cgi?id=1225160
* https://bugzilla.suse.com/show_bug.cgi?id=1225161
* https://bugzilla.suse.com/show_bug.cgi?id=1225164
* https://bugzilla.suse.com/show_bug.cgi?id=1225167
* https://bugzilla.suse.com/show_bug.cgi?id=1225180
* https://bugzilla.suse.com/show_bug.cgi?id=1225183
* https://bugzilla.suse.com/show_bug.cgi?id=1225184
* https://bugzilla.suse.com/show_bug.cgi?id=1225186
* https://bugzilla.suse.com/show_bug.cgi?id=1225187
* https://bugzilla.suse.com/show_bug.cgi?id=1225189
* https://bugzilla.suse.com/show_bug.cgi?id=1225190
* https://bugzilla.suse.com/show_bug.cgi?id=1225191
* https://bugzilla.suse.com/show_bug.cgi?id=1225192
* https://bugzilla.suse.com/show_bug.cgi?id=1225193
* https://bugzilla.suse.com/show_bug.cgi?id=1225195
* https://bugzilla.suse.com/show_bug.cgi?id=1225198
* https://bugzilla.suse.com/show_bug.cgi?id=1225201
* https://bugzilla.suse.com/show_bug.cgi?id=1225203
* https://bugzilla.suse.com/show_bug.cgi?id=1225205
* https://bugzilla.suse.com/show_bug.cgi?id=1225206
* https://bugzilla.suse.com/show_bug.cgi?id=1225207
* https://bugzilla.suse.com/show_bug.cgi?id=1225208
* https://bugzilla.suse.com/show_bug.cgi?id=1225209
* https://bugzilla.suse.com/show_bug.cgi?id=1225210
* https://bugzilla.suse.com/show_bug.cgi?id=1225214
* https://bugzilla.suse.com/show_bug.cgi?id=1225223
* https://bugzilla.suse.com/show_bug.cgi?id=1225224
* https://bugzilla.suse.com/show_bug.cgi?id=1225225
* https://bugzilla.suse.com/show_bug.cgi?id=1225227
* https://bugzilla.suse.com/show_bug.cgi?id=1225228
* https://bugzilla.suse.com/show_bug.cgi?id=1225229
* https://bugzilla.suse.com/show_bug.cgi?id=1225230
* https://bugzilla.suse.com/show_bug.cgi?id=1225232
* https://bugzilla.suse.com/show_bug.cgi?id=1225233
* https://bugzilla.suse.com/show_bug.cgi?id=1225235
* https://bugzilla.suse.com/show_bug.cgi?id=1225236
* https://bugzilla.suse.com/show_bug.cgi?id=1225237
* https://bugzilla.suse.com/show_bug.cgi?id=1225238
* https://bugzilla.suse.com/show_bug.cgi?id=1225239
* https://bugzilla.suse.com/show_bug.cgi?id=1225240
* https://bugzilla.suse.com/show_bug.cgi?id=1225241
* https://bugzilla.suse.com/show_bug.cgi?id=1225242
* https://bugzilla.suse.com/show_bug.cgi?id=1225243
* https://bugzilla.suse.com/show_bug.cgi?id=1225244
* https://bugzilla.suse.com/show_bug.cgi?id=1225245
* https://bugzilla.suse.com/show_bug.cgi?id=1225246
* https://bugzilla.suse.com/show_bug.cgi?id=1225247
* https://bugzilla.suse.com/show_bug.cgi?id=1225248
* https://bugzilla.suse.com/show_bug.cgi?id=1225249
* https://bugzilla.suse.com/show_bug.cgi?id=1225250
* https://bugzilla.suse.com/show_bug.cgi?id=1225251
* https://bugzilla.suse.com/show_bug.cgi?id=1225252
* https://bugzilla.suse.com/show_bug.cgi?id=1225253
* https://bugzilla.suse.com/show_bug.cgi?id=1225254
* https://bugzilla.suse.com/show_bug.cgi?id=1225255
* https://bugzilla.suse.com/show_bug.cgi?id=1225256
* https://bugzilla.suse.com/show_bug.cgi?id=1225257
* https://bugzilla.suse.com/show_bug.cgi?id=1225258
* https://bugzilla.suse.com/show_bug.cgi?id=1225259
* https://bugzilla.suse.com/show_bug.cgi?id=1225260
* https://bugzilla.suse.com/show_bug.cgi?id=1225261
* https://bugzilla.suse.com/show_bug.cgi?id=1225262
* https://bugzilla.suse.com/show_bug.cgi?id=1225263
* https://bugzilla.suse.com/show_bug.cgi?id=1225268
* https://bugzilla.suse.com/show_bug.cgi?id=1225301
* https://bugzilla.suse.com/show_bug.cgi?id=1225303
* https://bugzilla.suse.com/show_bug.cgi?id=1225304
* https://bugzilla.suse.com/show_bug.cgi?id=1225306
* https://bugzilla.suse.com/show_bug.cgi?id=1225316
* https://bugzilla.suse.com/show_bug.cgi?id=1225318
* https://bugzilla.suse.com/show_bug.cgi?id=1225320
* https://bugzilla.suse.com/show_bug.cgi?id=1225321
* https://bugzilla.suse.com/show_bug.cgi?id=1225322
* https://bugzilla.suse.com/show_bug.cgi?id=1225323
* https://bugzilla.suse.com/show_bug.cgi?id=1225326
* https://bugzilla.suse.com/show_bug.cgi?id=1225327
* https://bugzilla.suse.com/show_bug.cgi?id=1225328
* https://bugzilla.suse.com/show_bug.cgi?id=1225329
* https://bugzilla.suse.com/show_bug.cgi?id=1225330
* https://bugzilla.suse.com/show_bug.cgi?id=1225331
* https://bugzilla.suse.com/show_bug.cgi?id=1225332
* https://bugzilla.suse.com/show_bug.cgi?id=1225333
* https://bugzilla.suse.com/show_bug.cgi?id=1225334
* https://bugzilla.suse.com/show_bug.cgi?id=1225335
* https://bugzilla.suse.com/show_bug.cgi?id=1225336
* https://bugzilla.suse.com/show_bug.cgi?id=1225337
* https://bugzilla.suse.com/show_bug.cgi?id=1225338
* https://bugzilla.suse.com/show_bug.cgi?id=1225339
* https://bugzilla.suse.com/show_bug.cgi?id=1225341
* https://bugzilla.suse.com/show_bug.cgi?id=1225342
* https://bugzilla.suse.com/show_bug.cgi?id=1225344
* https://bugzilla.suse.com/show_bug.cgi?id=1225346
* https://bugzilla.suse.com/show_bug.cgi?id=1225347
* https://bugzilla.suse.com/show_bug.cgi?id=1225351
* https://bugzilla.suse.com/show_bug.cgi?id=1225353
* https://bugzilla.suse.com/show_bug.cgi?id=1225354
* https://bugzilla.suse.com/show_bug.cgi?id=1225355
* https://bugzilla.suse.com/show_bug.cgi?id=1225357
* https://bugzilla.suse.com/show_bug.cgi?id=1225358
* https://bugzilla.suse.com/show_bug.cgi?id=1225360
* https://bugzilla.suse.com/show_bug.cgi?id=1225361
* https://bugzilla.suse.com/show_bug.cgi?id=1225366
* https://bugzilla.suse.com/show_bug.cgi?id=1225367
* https://bugzilla.suse.com/show_bug.cgi?id=1225368
* https://bugzilla.suse.com/show_bug.cgi?id=1225369
* https://bugzilla.suse.com/show_bug.cgi?id=1225370
* https://bugzilla.suse.com/show_bug.cgi?id=1225372
* https://bugzilla.suse.com/show_bug.cgi?id=1225373
* https://bugzilla.suse.com/show_bug.cgi?id=1225374
* https://bugzilla.suse.com/show_bug.cgi?id=1225375
* https://bugzilla.suse.com/show_bug.cgi?id=1225376
* https://bugzilla.suse.com/show_bug.cgi?id=1225377
* https://bugzilla.suse.com/show_bug.cgi?id=1225379
* https://bugzilla.suse.com/show_bug.cgi?id=1225380
* https://bugzilla.suse.com/show_bug.cgi?id=1225383
* https://bugzilla.suse.com/show_bug.cgi?id=1225384
* https://bugzilla.suse.com/show_bug.cgi?id=1225386
* https://bugzilla.suse.com/show_bug.cgi?id=1225387
* https://bugzilla.suse.com/show_bug.cgi?id=1225388
* https://bugzilla.suse.com/show_bug.cgi?id=1225390
* https://bugzilla.suse.com/show_bug.cgi?id=1225392
* https://bugzilla.suse.com/show_bug.cgi?id=1225393
* https://bugzilla.suse.com/show_bug.cgi?id=1225396
* https://bugzilla.suse.com/show_bug.cgi?id=1225400
* https://bugzilla.suse.com/show_bug.cgi?id=1225404
* https://bugzilla.suse.com/show_bug.cgi?id=1225405
* https://bugzilla.suse.com/show_bug.cgi?id=1225409
* https://bugzilla.suse.com/show_bug.cgi?id=1225410
* https://bugzilla.suse.com/show_bug.cgi?id=1225411
* https://bugzilla.suse.com/show_bug.cgi?id=1225425
* https://bugzilla.suse.com/show_bug.cgi?id=1225427
* https://bugzilla.suse.com/show_bug.cgi?id=1225431
* https://bugzilla.suse.com/show_bug.cgi?id=1225435
* https://bugzilla.suse.com/show_bug.cgi?id=1225436
* https://bugzilla.suse.com/show_bug.cgi?id=1225437
* https://bugzilla.suse.com/show_bug.cgi?id=1225438
* https://bugzilla.suse.com/show_bug.cgi?id=1225439
* https://bugzilla.suse.com/show_bug.cgi?id=1225441
* https://bugzilla.suse.com/show_bug.cgi?id=1225445
* https://bugzilla.suse.com/show_bug.cgi?id=1225446
* https://bugzilla.suse.com/show_bug.cgi?id=1225447
* https://bugzilla.suse.com/show_bug.cgi?id=1225450
* https://bugzilla.suse.com/show_bug.cgi?id=1225453
* https://bugzilla.suse.com/show_bug.cgi?id=1225455
* https://bugzilla.suse.com/show_bug.cgi?id=1225461
* https://bugzilla.suse.com/show_bug.cgi?id=1225463
* https://bugzilla.suse.com/show_bug.cgi?id=1225464
* https://bugzilla.suse.com/show_bug.cgi?id=1225466
* https://bugzilla.suse.com/show_bug.cgi?id=1225471
* https://bugzilla.suse.com/show_bug.cgi?id=1225472
* https://bugzilla.suse.com/show_bug.cgi?id=1225478
* https://bugzilla.suse.com/show_bug.cgi?id=1225479
* https://bugzilla.suse.com/show_bug.cgi?id=1225482
* https://bugzilla.suse.com/show_bug.cgi?id=1225483
* https://bugzilla.suse.com/show_bug.cgi?id=1225486
* https://bugzilla.suse.com/show_bug.cgi?id=1225488
* https://bugzilla.suse.com/show_bug.cgi?id=1225490
* https://bugzilla.suse.com/show_bug.cgi?id=1225492
* https://bugzilla.suse.com/show_bug.cgi?id=1225495
* https://bugzilla.suse.com/show_bug.cgi?id=1225499
* https://bugzilla.suse.com/show_bug.cgi?id=1225500
* https://bugzilla.suse.com/show_bug.cgi?id=1225501
* https://bugzilla.suse.com/show_bug.cgi?id=1225508
* https://bugzilla.suse.com/show_bug.cgi?id=1225510
* https://bugzilla.suse.com/show_bug.cgi?id=1225529
* https://bugzilla.suse.com/show_bug.cgi?id=1225530
* https://bugzilla.suse.com/show_bug.cgi?id=1225532
* https://bugzilla.suse.com/show_bug.cgi?id=1225534
* https://bugzilla.suse.com/show_bug.cgi?id=1225549
* https://bugzilla.suse.com/show_bug.cgi?id=1225550
* https://bugzilla.suse.com/show_bug.cgi?id=1225553
* https://bugzilla.suse.com/show_bug.cgi?id=1225554
* https://bugzilla.suse.com/show_bug.cgi?id=1225557
* https://bugzilla.suse.com/show_bug.cgi?id=1225559
* https://bugzilla.suse.com/show_bug.cgi?id=1225560
* https://bugzilla.suse.com/show_bug.cgi?id=1225565
* https://bugzilla.suse.com/show_bug.cgi?id=1225566
* https://bugzilla.suse.com/show_bug.cgi?id=1225569
* https://bugzilla.suse.com/show_bug.cgi?id=1225570
* https://bugzilla.suse.com/show_bug.cgi?id=1225571
* https://bugzilla.suse.com/show_bug.cgi?id=1225572
* https://bugzilla.suse.com/show_bug.cgi?id=1225577
* https://bugzilla.suse.com/show_bug.cgi?id=1225583
* https://bugzilla.suse.com/show_bug.cgi?id=1225584
* https://bugzilla.suse.com/show_bug.cgi?id=1225588
* https://bugzilla.suse.com/show_bug.cgi?id=1225589
* https://bugzilla.suse.com/show_bug.cgi?id=1225590
* https://bugzilla.suse.com/show_bug.cgi?id=1225591
* https://bugzilla.suse.com/show_bug.cgi?id=1225592
* https://bugzilla.suse.com/show_bug.cgi?id=1225595
* https://bugzilla.suse.com/show_bug.cgi?id=1225599
* https://jira.suse.com/browse/PED-8111
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20240625/b126f86c/attachment.htm>
More information about the sle-updates
mailing list