<div class="container">
    <h1>Security update for the Linux Kernel</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2024:2495-1</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>important</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1195775">bsc#1195775</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216124">bsc#1216124</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218148">bsc#1218148</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219224">bsc#1219224</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220492">bsc#1220492</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222015">bsc#1222015</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222254">bsc#1222254</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222678">bsc#1222678</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223384">bsc#1223384</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224020">bsc#1224020</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224679">bsc#1224679</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224696">bsc#1224696</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224703">bsc#1224703</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224749">bsc#1224749</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224764">bsc#1224764</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224765">bsc#1224765</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224766">bsc#1224766</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224935">bsc#1224935</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225098">bsc#1225098</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225467">bsc#1225467</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225487">bsc#1225487</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225518">bsc#1225518</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225611">bsc#1225611</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225732">bsc#1225732</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225737">bsc#1225737</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225749">bsc#1225749</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225840">bsc#1225840</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225866">bsc#1225866</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226145">bsc#1226145</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226211">bsc#1226211</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226212">bsc#1226212</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226270">bsc#1226270</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226587">bsc#1226587</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226595">bsc#1226595</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226634">bsc#1226634</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226758">bsc#1226758</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226785">bsc#1226785</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226786">bsc#1226786</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226789">bsc#1226789</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226953">bsc#1226953</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226962">bsc#1226962</a>
                        </li>
                    
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2021-47555.html">CVE-2021-47555</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2021-47571.html">CVE-2021-47571</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-24023.html">CVE-2023-24023</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52670.html">CVE-2023-52670</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52752.html">CVE-2023-52752</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52837.html">CVE-2023-52837</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52846.html">CVE-2023-52846</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52881.html">CVE-2023-52881</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26745.html">CVE-2024-26745</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-26923.html">CVE-2024-26923</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35789.html">CVE-2024-35789</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35861.html">CVE-2024-35861</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35862.html">CVE-2024-35862</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35864.html">CVE-2024-35864</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35869.html">CVE-2024-35869</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-35950.html">CVE-2024-35950</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36894.html">CVE-2024-36894</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36899.html">CVE-2024-36899</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36904.html">CVE-2024-36904</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36940.html">CVE-2024-36940</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36964.html">CVE-2024-36964</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-36971.html">CVE-2024-36971</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-38541.html">CVE-2024-38541</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-38545.html">CVE-2024-38545</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-38559.html">CVE-2024-38559</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-38560.html">CVE-2024-38560</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-38564.html">CVE-2024-38564</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-38578.html">CVE-2024-38578</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-47555</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-47571</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2021-47571</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-24023</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-24023</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52670</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52752</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52752</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52837</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52846</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52881</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26745</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-26923</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35789</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35861</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35862</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35864</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35869</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-35950</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36894</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36899</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36904</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36940</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36964</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.2</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36971</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-36971</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-38541</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-38545</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-38559</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-38560</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-38564</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-38578</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">openSUSE Leap 15.4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Availability Extension 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing LTSS 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Live Patching 15-SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro for Rancher 5.3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro for Rancher 5.4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Manager Proxy 4.3</li>
                    
                        <li class="list-group-item">SUSE Manager Retail Branch Server 4.3</li>
                    
                        <li class="list-group-item">SUSE Manager Server 4.3</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves 28 vulnerabilities and has 13 security fixes can now be installed.</p>

    


    
        <h2>Description:</h2>
    
    <p>The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225098).</li>
<li>CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225732).</li>
<li>CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).</li>
<li>CVE-2024-35869: smb: client: guarantee refcounted children from parent session (bsc#1224679).</li>
<li>CVE-2024-38564: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (bsc#1226789).</li>
<li>CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785).</li>
<li>CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).</li>
<li>CVE-2024-38578: ecryptfs: Fix buffer size for tag 66 packet (bsc#1226634,).</li>
<li>CVE-2024-38545: RDMA/hns: Fix UAF for cq async event (bsc#1226595)</li>
<li>CVE-2023-52837: nbd: fix uaf in nbd_open (bsc#1224935).</li>
<li>CVE-2024-38541: of: module: add buffer overflow check in of_modalias() (bsc#1226587).</li>
<li>CVE-2024-36971: net: fix __dst_negative_advice() race (bsc#1226145).</li>
<li>CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765).</li>
<li>CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764).</li>
<li>CVE-2024-38610: drivers/virt/acrn: fix PFNMAP PTE checks in acrn_vm_ram_map() (bsc#1226758).</li>
<li>CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()(bsc#1224766).</li>
<li>CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487).</li>
<li>CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225737).</li>
<li>CVE-2023-52670: rpmsg: virtio: Free driver_override when rpmsg_remove() (bsc#1224696).</li>
<li>CVE-2024-35789: Check fast rx for non-4addr sta VLAN changes (bsc#1224749).</li>
<li>CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866).</li>
<li>CVE-2024-36940: pinctrl: core: delete incorrect free in pinctrl_enable() (bsc#1225840).</li>
<li>CVE-2021-47571: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() (bsc#1225518).</li>
<li>CVE-2021-47555: net: vlan: fix underflow for the real_dev refcnt (bsc#1225467).</li>
<li>CVE-2023-24023: Bluetooth: Add more enc key size check (bsc#1218148).</li>
<li>CVE-2024-36894: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (bsc#1225749).</li>
<li>CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1224703).</li>
<li>CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>Revert "build initrd without systemd" (bsc#1195775)"</li>
<li>cgroup: Add annotation for holding namespace_sem in current_cgns_cgroup_from_root() (bsc#1222254).</li>
<li>cgroup: Eliminate the need for cgroup_mutex in proc_cgroup_show() (bsc#1222254).</li>
<li>cgroup: Make operations on the cgroup root_list RCU safe (bsc#1222254).</li>
<li>cgroup: Remove unnecessary list_empty() (bsc#1222254).</li>
<li>cgroup: preserve KABI of cgroup_root (bsc#1222254).</li>
<li>ocfs2: adjust enabling place for la window (bsc#1219224).</li>
<li>ocfs2: fix sparse warnings (bsc#1219224).</li>
<li>ocfs2: improve write IO performance when fragmentation is high (bsc#1219224).</li>
<li>ocfs2: speed up chain-list searching (bsc#1219224).</li>
<li>random: treat bootloader trust toggle the same way as cpu trust toggle (bsc#1226953).</li>
<li>rpm/kernel-obs-build.spec.in: Add iso9660 (bsc#1226212).</li>
<li>rpm/kernel-obs-build.spec.in: Add networking modules for docker (bsc#1226211).</li>
<li>scsi: lpfc: Remove IRQF_ONESHOT flag from threaded IRQ handling (bsc#1216124).</li>
<li>smb: client: ensure to try all targets when finding nested links (bsc#1224020).</li>
<li>x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015 bsc#1226962).</li>
<li>xfs: do not include bnobt blocks when reserving free block pool (bsc#1226270).</li>
</ul>



    
        <h2>Special Instructions and Notes:</h2>
        <ul>
            
            
                <li>Please reboot the system after installing this update.</li>
            
            
        </ul>
    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                SUSE Manager Retail Branch Server 4.3
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.3-2024-2495=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Manager Server 4.3
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2495=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                openSUSE Leap 15.4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-2024-2495=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Micro for Rancher 5.3
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-5.3-2024-2495=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Micro 5.3
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-5.3-2024-2495=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Micro for Rancher 5.4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-5.4-2024-2495=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Micro 5.4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-5.4-2024-2495=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Live Patching 15-SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-2495=1</code>
                    
                    
                        <br/>
                        Please note that this is the initial kernel livepatch without fixes itself,
                        this package is later updated by separate standalone kernel livepatch
                        updates.
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise High Availability Extension 15 SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-2495=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2495=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2495=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2495=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2495=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Server for SAP Applications 15 SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2495=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Manager Proxy 4.3
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2495=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    SUSE Manager Retail Branch Server 4.3 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Manager Retail Branch Server 4.3 (x86_64)
                    <ul>
                        
                            <li>kernel-default-devel-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-base-5.14.21-150400.24.125.1.150400.24.60.1</li>
                        
                            <li>kernel-default-devel-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Manager Retail Branch Server 4.3 (noarch)
                    <ul>
                        
                            <li>kernel-macros-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-devel-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Manager Server 4.3 (ppc64le x86_64)
                    <ul>
                        
                            <li>kernel-default-base-5.14.21-150400.24.125.1.150400.24.60.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Manager Server 4.3 (ppc64le s390x x86_64)
                    <ul>
                        
                            <li>kernel-default-devel-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-devel-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-syms-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Manager Server 4.3 (noarch)
                    <ul>
                        
                            <li>kernel-source-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-macros-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-devel-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Manager Server 4.3 (nosrc s390x)
                    <ul>
                        
                            <li>kernel-zfcpdump-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Manager Server 4.3 (s390x)
                    <ul>
                        
                            <li>kernel-zfcpdump-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-zfcpdump-debugsource-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    openSUSE Leap 15.4 (noarch nosrc)
                    <ul>
                        
                            <li>kernel-docs-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (noarch)
                    <ul>
                        
                            <li>kernel-source-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-macros-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-source-vanilla-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-docs-html-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-devel-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (nosrc ppc64le x86_64)
                    <ul>
                        
                            <li>kernel-debug-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (ppc64le x86_64)
                    <ul>
                        
                            <li>kernel-debug-livepatch-devel-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-debug-devel-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-debug-devel-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-debug-debugsource-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-debug-debuginfo-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (aarch64 ppc64le x86_64)
                    <ul>
                        
                            <li>kernel-kvmsmall-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-base-5.14.21-150400.24.125.1.150400.24.60.1</li>
                        
                            <li>kernel-default-base-rebuild-5.14.21-150400.24.125.1.150400.24.60.1</li>
                        
                            <li>kernel-kvmsmall-devel-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-kvmsmall-debugsource-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>kernel-default-optional-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>dlm-kmp-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>cluster-md-kmp-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kselftests-kmp-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>ocfs2-kmp-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-livepatch-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-obs-build-debugsource-5.14.21-150400.24.125.1</li>
                        
                            <li>kselftests-kmp-default-5.14.21-150400.24.125.1</li>
                        
                            <li>dlm-kmp-default-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-livepatch-devel-5.14.21-150400.24.125.1</li>
                        
                            <li>cluster-md-kmp-default-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-devel-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-extra-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-syms-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-optional-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-obs-qa-5.14.21-150400.24.125.1</li>
                        
                            <li>gfs2-kmp-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>gfs2-kmp-default-5.14.21-150400.24.125.1</li>
                        
                            <li>reiserfs-kmp-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-obs-build-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-devel-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>reiserfs-kmp-default-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-extra-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>ocfs2-kmp-default-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64)
                    <ul>
                        
                            <li>kernel-kvmsmall-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (ppc64le s390x x86_64)
                    <ul>
                        
                            <li>kernel-livepatch-5_14_21-150400_24_125-default-debuginfo-1-150400.9.3.1</li>
                        
                            <li>kernel-livepatch-5_14_21-150400_24_125-default-1-150400.9.3.1</li>
                        
                            <li>kernel-livepatch-SLE15-SP4_Update_28-debugsource-1-150400.9.3.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (nosrc s390x)
                    <ul>
                        
                            <li>kernel-zfcpdump-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (s390x)
                    <ul>
                        
                            <li>kernel-zfcpdump-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-zfcpdump-debugsource-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (nosrc)
                    <ul>
                        
                            <li>dtb-aarch64-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (aarch64)
                    <ul>
                        
                            <li>kernel-64kb-optional-5.14.21-150400.24.125.1</li>
                        
                            <li>ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>dtb-freescale-5.14.21-150400.24.125.1</li>
                        
                            <li>dtb-mediatek-5.14.21-150400.24.125.1</li>
                        
                            <li>dtb-socionext-5.14.21-150400.24.125.1</li>
                        
                            <li>dlm-kmp-64kb-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-64kb-devel-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>dtb-nvidia-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-64kb-optional-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>dtb-marvell-5.14.21-150400.24.125.1</li>
                        
                            <li>kselftests-kmp-64kb-5.14.21-150400.24.125.1</li>
                        
                            <li>ocfs2-kmp-64kb-5.14.21-150400.24.125.1</li>
                        
                            <li>dtb-xilinx-5.14.21-150400.24.125.1</li>
                        
                            <li>dtb-renesas-5.14.21-150400.24.125.1</li>
                        
                            <li>dtb-cavium-5.14.21-150400.24.125.1</li>
                        
                            <li>dtb-qcom-5.14.21-150400.24.125.1</li>
                        
                            <li>gfs2-kmp-64kb-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-64kb-livepatch-devel-5.14.21-150400.24.125.1</li>
                        
                            <li>cluster-md-kmp-64kb-5.14.21-150400.24.125.1</li>
                        
                            <li>dtb-lg-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-64kb-extra-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>reiserfs-kmp-64kb-5.14.21-150400.24.125.1</li>
                        
                            <li>dtb-rockchip-5.14.21-150400.24.125.1</li>
                        
                            <li>dtb-arm-5.14.21-150400.24.125.1</li>
                        
                            <li>dtb-sprd-5.14.21-150400.24.125.1</li>
                        
                            <li>dtb-amd-5.14.21-150400.24.125.1</li>
                        
                            <li>dtb-amazon-5.14.21-150400.24.125.1</li>
                        
                            <li>dtb-exynos-5.14.21-150400.24.125.1</li>
                        
                            <li>dtb-altera-5.14.21-150400.24.125.1</li>
                        
                            <li>kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>dlm-kmp-64kb-5.14.21-150400.24.125.1</li>
                        
                            <li>dtb-apple-5.14.21-150400.24.125.1</li>
                        
                            <li>dtb-allwinner-5.14.21-150400.24.125.1</li>
                        
                            <li>dtb-apm-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-64kb-debugsource-5.14.21-150400.24.125.1</li>
                        
                            <li>reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>dtb-amlogic-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-64kb-devel-5.14.21-150400.24.125.1</li>
                        
                            <li>dtb-hisilicon-5.14.21-150400.24.125.1</li>
                        
                            <li>gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-64kb-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-64kb-extra-5.14.21-150400.24.125.1</li>
                        
                            <li>dtb-broadcom-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (aarch64 nosrc)
                    <ul>
                        
                            <li>kernel-64kb-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
                    <ul>
                        
                            <li>kernel-default-base-5.14.21-150400.24.125.1.150400.24.60.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
                    <ul>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
                    <ul>
                        
                            <li>kernel-default-base-5.14.21-150400.24.125.1.150400.24.60.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
                    <ul>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
                    <ul>
                        
                            <li>kernel-default-base-5.14.21-150400.24.125.1.150400.24.60.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
                    <ul>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
                    <ul>
                        
                            <li>kernel-default-base-5.14.21-150400.24.125.1.150400.24.60.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
                    <ul>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Live Patching 15-SP4 (nosrc)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
                    <ul>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-livepatch-5_14_21-150400_24_125-default-1-150400.9.3.1</li>
                        
                            <li>kernel-default-livepatch-devel-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-livepatch-SLE15-SP4_Update_28-debugsource-1-150400.9.3.1</li>
                        
                            <li>kernel-default-livepatch-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-livepatch-5_14_21-150400_24_125-default-debuginfo-1-150400.9.3.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>dlm-kmp-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>dlm-kmp-default-5.14.21-150400.24.125.1</li>
                        
                            <li>gfs2-kmp-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>cluster-md-kmp-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>ocfs2-kmp-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>gfs2-kmp-default-5.14.21-150400.24.125.1</li>
                        
                            <li>cluster-md-kmp-default-5.14.21-150400.24.125.1</li>
                        
                            <li>ocfs2-kmp-default-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc)
                    <ul>
                        
                            <li>kernel-64kb-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
                    <ul>
                        
                            <li>kernel-64kb-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-64kb-devel-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-64kb-debugsource-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-64kb-devel-debuginfo-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64)
                    <ul>
                        
                            <li>kernel-default-devel-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-obs-build-debugsource-5.14.21-150400.24.125.1</li>
                        
                            <li>reiserfs-kmp-default-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-base-5.14.21-150400.24.125.1.150400.24.60.1</li>
                        
                            <li>reiserfs-kmp-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-devel-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-obs-build-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-syms-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
                    <ul>
                        
                            <li>kernel-source-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-macros-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-devel-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc)
                    <ul>
                        
                            <li>kernel-docs-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc)
                    <ul>
                        
                            <li>kernel-64kb-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
                    <ul>
                        
                            <li>kernel-64kb-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-64kb-devel-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-64kb-debugsource-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-64kb-devel-debuginfo-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64)
                    <ul>
                        
                            <li>kernel-default-devel-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-obs-build-debugsource-5.14.21-150400.24.125.1</li>
                        
                            <li>reiserfs-kmp-default-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-base-5.14.21-150400.24.125.1.150400.24.60.1</li>
                        
                            <li>reiserfs-kmp-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-devel-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-obs-build-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-syms-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
                    <ul>
                        
                            <li>kernel-source-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-macros-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-devel-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc)
                    <ul>
                        
                            <li>kernel-docs-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
                    <ul>
                        
                            <li>kernel-default-devel-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-obs-build-debugsource-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-extra-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-base-5.14.21-150400.24.125.1.150400.24.60.1</li>
                        
                            <li>kernel-default-devel-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-extra-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-obs-build-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-syms-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
                    <ul>
                        
                            <li>kernel-source-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-macros-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-devel-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch nosrc)
                    <ul>
                        
                            <li>kernel-docs-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc)
                    <ul>
                        
                            <li>kernel-64kb-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64)
                    <ul>
                        
                            <li>kernel-64kb-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-64kb-devel-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-64kb-debugsource-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-64kb-devel-debuginfo-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64 nosrc)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64)
                    <ul>
                        
                            <li>kernel-default-base-5.14.21-150400.24.125.1.150400.24.60.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>kernel-default-devel-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-obs-build-debugsource-5.14.21-150400.24.125.1</li>
                        
                            <li>reiserfs-kmp-default-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>reiserfs-kmp-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-devel-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-obs-build-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-syms-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
                    <ul>
                        
                            <li>kernel-source-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-macros-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-devel-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch nosrc)
                    <ul>
                        
                            <li>kernel-docs-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc s390x)
                    <ul>
                        
                            <li>kernel-zfcpdump-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x)
                    <ul>
                        
                            <li>kernel-zfcpdump-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-zfcpdump-debugsource-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
                    <ul>
                        
                            <li>kernel-default-devel-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-obs-build-debugsource-5.14.21-150400.24.125.1</li>
                        
                            <li>reiserfs-kmp-default-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-base-5.14.21-150400.24.125.1.150400.24.60.1</li>
                        
                            <li>reiserfs-kmp-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-devel-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-obs-build-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-syms-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
                    <ul>
                        
                            <li>kernel-source-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-macros-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-devel-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc)
                    <ul>
                        
                            <li>kernel-docs-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Manager Proxy 4.3 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Manager Proxy 4.3 (x86_64)
                    <ul>
                        
                            <li>kernel-default-devel-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-default-base-5.14.21-150400.24.125.1.150400.24.60.1</li>
                        
                            <li>kernel-default-devel-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-syms-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Manager Proxy 4.3 (noarch)
                    <ul>
                        
                            <li>kernel-source-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-macros-5.14.21-150400.24.125.1</li>
                        
                            <li>kernel-devel-5.14.21-150400.24.125.1</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2021-47555.html">https://www.suse.com/security/cve/CVE-2021-47555.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2021-47571.html">https://www.suse.com/security/cve/CVE-2021-47571.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-24023.html">https://www.suse.com/security/cve/CVE-2023-24023.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52670.html">https://www.suse.com/security/cve/CVE-2023-52670.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52752.html">https://www.suse.com/security/cve/CVE-2023-52752.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52837.html">https://www.suse.com/security/cve/CVE-2023-52837.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52846.html">https://www.suse.com/security/cve/CVE-2023-52846.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52881.html">https://www.suse.com/security/cve/CVE-2023-52881.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26745.html">https://www.suse.com/security/cve/CVE-2024-26745.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-26923.html">https://www.suse.com/security/cve/CVE-2024-26923.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35789.html">https://www.suse.com/security/cve/CVE-2024-35789.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35861.html">https://www.suse.com/security/cve/CVE-2024-35861.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35862.html">https://www.suse.com/security/cve/CVE-2024-35862.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35864.html">https://www.suse.com/security/cve/CVE-2024-35864.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35869.html">https://www.suse.com/security/cve/CVE-2024-35869.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-35950.html">https://www.suse.com/security/cve/CVE-2024-35950.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36894.html">https://www.suse.com/security/cve/CVE-2024-36894.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36899.html">https://www.suse.com/security/cve/CVE-2024-36899.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36904.html">https://www.suse.com/security/cve/CVE-2024-36904.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36940.html">https://www.suse.com/security/cve/CVE-2024-36940.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36964.html">https://www.suse.com/security/cve/CVE-2024-36964.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-36971.html">https://www.suse.com/security/cve/CVE-2024-36971.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-38541.html">https://www.suse.com/security/cve/CVE-2024-38541.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-38545.html">https://www.suse.com/security/cve/CVE-2024-38545.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-38559.html">https://www.suse.com/security/cve/CVE-2024-38559.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-38560.html">https://www.suse.com/security/cve/CVE-2024-38560.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-38564.html">https://www.suse.com/security/cve/CVE-2024-38564.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-38578.html">https://www.suse.com/security/cve/CVE-2024-38578.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1195775">https://bugzilla.suse.com/show_bug.cgi?id=1195775</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216124">https://bugzilla.suse.com/show_bug.cgi?id=1216124</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218148">https://bugzilla.suse.com/show_bug.cgi?id=1218148</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219224">https://bugzilla.suse.com/show_bug.cgi?id=1219224</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220492">https://bugzilla.suse.com/show_bug.cgi?id=1220492</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222015">https://bugzilla.suse.com/show_bug.cgi?id=1222015</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222254">https://bugzilla.suse.com/show_bug.cgi?id=1222254</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222678">https://bugzilla.suse.com/show_bug.cgi?id=1222678</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223384">https://bugzilla.suse.com/show_bug.cgi?id=1223384</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224020">https://bugzilla.suse.com/show_bug.cgi?id=1224020</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224679">https://bugzilla.suse.com/show_bug.cgi?id=1224679</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224696">https://bugzilla.suse.com/show_bug.cgi?id=1224696</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224703">https://bugzilla.suse.com/show_bug.cgi?id=1224703</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224749">https://bugzilla.suse.com/show_bug.cgi?id=1224749</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224764">https://bugzilla.suse.com/show_bug.cgi?id=1224764</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224765">https://bugzilla.suse.com/show_bug.cgi?id=1224765</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224766">https://bugzilla.suse.com/show_bug.cgi?id=1224766</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224935">https://bugzilla.suse.com/show_bug.cgi?id=1224935</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225098">https://bugzilla.suse.com/show_bug.cgi?id=1225098</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225467">https://bugzilla.suse.com/show_bug.cgi?id=1225467</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225487">https://bugzilla.suse.com/show_bug.cgi?id=1225487</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225518">https://bugzilla.suse.com/show_bug.cgi?id=1225518</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225611">https://bugzilla.suse.com/show_bug.cgi?id=1225611</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225732">https://bugzilla.suse.com/show_bug.cgi?id=1225732</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225737">https://bugzilla.suse.com/show_bug.cgi?id=1225737</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225749">https://bugzilla.suse.com/show_bug.cgi?id=1225749</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225840">https://bugzilla.suse.com/show_bug.cgi?id=1225840</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225866">https://bugzilla.suse.com/show_bug.cgi?id=1225866</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226145">https://bugzilla.suse.com/show_bug.cgi?id=1226145</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226211">https://bugzilla.suse.com/show_bug.cgi?id=1226211</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226212">https://bugzilla.suse.com/show_bug.cgi?id=1226212</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226270">https://bugzilla.suse.com/show_bug.cgi?id=1226270</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226587">https://bugzilla.suse.com/show_bug.cgi?id=1226587</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226595">https://bugzilla.suse.com/show_bug.cgi?id=1226595</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226634">https://bugzilla.suse.com/show_bug.cgi?id=1226634</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226758">https://bugzilla.suse.com/show_bug.cgi?id=1226758</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226785">https://bugzilla.suse.com/show_bug.cgi?id=1226785</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226786">https://bugzilla.suse.com/show_bug.cgi?id=1226786</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226789">https://bugzilla.suse.com/show_bug.cgi?id=1226789</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226953">https://bugzilla.suse.com/show_bug.cgi?id=1226953</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226962">https://bugzilla.suse.com/show_bug.cgi?id=1226962</a>
                    </li>
                
            
        </ul>
    
</div>