Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: SUSE-SU-2024:1644-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Server for SAP Applications 15 SP5, SUSE Linux Enterprise Server 15 SP5, SUSE Linux Enterprise High Performance Computing 15 SP5, SUSE Public Cloud Module 15-SP5, SUSE openSUSE Leap 15.5
Datum: Di, 14. Mai 2024, 19:53
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52590
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48697
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48699
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48658
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26876
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48671
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47191
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26948
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48673
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52593
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48662
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48632
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26783
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47187
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26972
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48672
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23848
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47214
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26915
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52585
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26792
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48659
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48688
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48638
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26836
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47195
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47197
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26896
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26866
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23307
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48703
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48634
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48700
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26700
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47206
Applikationen: Linux

Originalnachricht

--===============1844116317650960904==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:1644-1
Rating: important
References:

* bsc#1141539
* bsc#1190576
* bsc#1192145
* bsc#1192837
* bsc#1193629
* bsc#1196869
* bsc#1200313
* bsc#1201308
* bsc#1201489
* bsc#1203906
* bsc#1203935
* bsc#1204614
* bsc#1207361
* bsc#1211592
* bsc#1213573
* bsc#1217339
* bsc#1217408
* bsc#1218562
* bsc#1218917
* bsc#1219104
* bsc#1219126
* bsc#1219141
* bsc#1219169
* bsc#1219170
* bsc#1219264
* bsc#1220342
* bsc#1220569
* bsc#1220761
* bsc#1221042
* bsc#1221044
* bsc#1221080
* bsc#1221084
* bsc#1221088
* bsc#1221299
* bsc#1221612
* bsc#1221617
* bsc#1221645
* bsc#1221825
* bsc#1222294
* bsc#1222307
* bsc#1222357
* bsc#1222368
* bsc#1222379
* bsc#1222385
* bsc#1222424
* bsc#1222430
* bsc#1222435
* bsc#1222482
* bsc#1222559
* bsc#1222585
* bsc#1222613
* bsc#1222615
* bsc#1222618
* bsc#1222624
* bsc#1222666
* bsc#1222669
* bsc#1222671
* bsc#1222703
* bsc#1222704
* bsc#1222709
* bsc#1222710
* bsc#1222721
* bsc#1222726
* bsc#1222773
* bsc#1222776
* bsc#1222785
* bsc#1222787
* bsc#1222790
* bsc#1222791
* bsc#1222792
* bsc#1222793
* bsc#1222796
* bsc#1222812
* bsc#1222824
* bsc#1222829
* bsc#1222832
* bsc#1222836
* bsc#1222838
* bsc#1222866
* bsc#1222867
* bsc#1222869
* bsc#1222870
* bsc#1222876
* bsc#1222878
* bsc#1222879
* bsc#1222881
* bsc#1222883
* bsc#1222888
* bsc#1222894
* bsc#1222901
* bsc#1222968
* bsc#1222976
* bsc#1223012
* bsc#1223014
* bsc#1223016
* bsc#1223024
* bsc#1223033
* bsc#1223034
* bsc#1223035
* bsc#1223036
* bsc#1223037
* bsc#1223041
* bsc#1223042
* bsc#1223051
* bsc#1223052
* bsc#1223056
* bsc#1223057
* bsc#1223058
* bsc#1223060
* bsc#1223061
* bsc#1223065
* bsc#1223066
* bsc#1223076
* bsc#1223078
* bsc#1223111
* bsc#1223115
* bsc#1223118
* bsc#1223119
* bsc#1223140
* bsc#1223187
* bsc#1223189
* bsc#1223190
* bsc#1223191
* bsc#1223196
* bsc#1223197
* bsc#1223198
* bsc#1223207
* bsc#1223275
* bsc#1223323
* bsc#1223360
* bsc#1223369
* bsc#1223380
* bsc#1223432
* bsc#1223473
* bsc#1223474
* bsc#1223475
* bsc#1223477
* bsc#1223478
* bsc#1223479
* bsc#1223481
* bsc#1223482
* bsc#1223484
* bsc#1223487
* bsc#1223490
* bsc#1223496
* bsc#1223498
* bsc#1223499
* bsc#1223501
* bsc#1223502
* bsc#1223503
* bsc#1223505
* bsc#1223509
* bsc#1223511
* bsc#1223512
* bsc#1223513
* bsc#1223516
* bsc#1223517
* bsc#1223518
* bsc#1223519
* bsc#1223520
* bsc#1223522
* bsc#1223523
* bsc#1223525
* bsc#1223536
* bsc#1223539
* bsc#1223574
* bsc#1223595
* bsc#1223598
* bsc#1223628
* bsc#1223634
* bsc#1223640
* bsc#1223643
* bsc#1223644
* bsc#1223645
* bsc#1223646
* bsc#1223648
* bsc#1223655
* bsc#1223657
* bsc#1223660
* bsc#1223661
* bsc#1223663
* bsc#1223664
* bsc#1223668
* bsc#1223670
* bsc#1223679
* bsc#1223686
* bsc#1223693
* bsc#1223705
* bsc#1223714
* bsc#1223735
* bsc#1223738
* bsc#1223745
* bsc#1223784
* bsc#1223785
* bsc#1223790
* bsc#1223816
* bsc#1223821
* bsc#1223822
* bsc#1223823
* bsc#1223824
* bsc#1223827
* bsc#1223834
* bsc#1223858
* bsc#1223875
* bsc#1223876
* bsc#1223877
* bsc#1223878
* bsc#1223879
* bsc#1223894
* bsc#1223921
* bsc#1223922
* bsc#1223923
* bsc#1223924
* bsc#1223929
* bsc#1223931
* bsc#1223932
* bsc#1223934
* bsc#1223941
* bsc#1223948
* bsc#1223949
* bsc#1223950
* bsc#1223951
* bsc#1223952
* bsc#1223953
* bsc#1223956
* bsc#1223957
* bsc#1223960
* bsc#1223962
* bsc#1223963
* bsc#1223964
* bsc#1223996
* jsc#PED-7167


Cross-References:

* CVE-2021-47047
* CVE-2021-47184
* CVE-2021-47185
* CVE-2021-47187
* CVE-2021-47188
* CVE-2021-47191
* CVE-2021-47192
* CVE-2021-47193
* CVE-2021-47194
* CVE-2021-47195
* CVE-2021-47196
* CVE-2021-47197
* CVE-2021-47198
* CVE-2021-47199
* CVE-2021-47200
* CVE-2021-47201
* CVE-2021-47202
* CVE-2021-47203
* CVE-2021-47204
* CVE-2021-47205
* CVE-2021-47206
* CVE-2021-47207
* CVE-2021-47209
* CVE-2021-47210
* CVE-2021-47211
* CVE-2021-47212
* CVE-2021-47214
* CVE-2021-47215
* CVE-2021-47216
* CVE-2021-47217
* CVE-2021-47218
* CVE-2021-47219
* CVE-2022-48631
* CVE-2022-48632
* CVE-2022-48634
* CVE-2022-48636
* CVE-2022-48637
* CVE-2022-48638
* CVE-2022-48639
* CVE-2022-48640
* CVE-2022-48642
* CVE-2022-48644
* CVE-2022-48646
* CVE-2022-48647
* CVE-2022-48648
* CVE-2022-48650
* CVE-2022-48651
* CVE-2022-48652
* CVE-2022-48653
* CVE-2022-48654
* CVE-2022-48655
* CVE-2022-48656
* CVE-2022-48657
* CVE-2022-48658
* CVE-2022-48659
* CVE-2022-48660
* CVE-2022-48662
* CVE-2022-48663
* CVE-2022-48667
* CVE-2022-48668
* CVE-2022-48671
* CVE-2022-48672
* CVE-2022-48673
* CVE-2022-48675
* CVE-2022-48686
* CVE-2022-48687
* CVE-2022-48688
* CVE-2022-48690
* CVE-2022-48692
* CVE-2022-48693
* CVE-2022-48694
* CVE-2022-48695
* CVE-2022-48697
* CVE-2022-48698
* CVE-2022-48699
* CVE-2022-48700
* CVE-2022-48701
* CVE-2022-48702
* CVE-2022-48703
* CVE-2022-48704
* CVE-2023-2860
* CVE-2023-52585
* CVE-2023-52589
* CVE-2023-52590
* CVE-2023-52591
* CVE-2023-52593
* CVE-2023-52614
* CVE-2023-52616
* CVE-2023-52620
* CVE-2023-52635
* CVE-2023-52645
* CVE-2023-52646
* CVE-2023-52652
* CVE-2023-6270
* CVE-2024-0639
* CVE-2024-0841
* CVE-2024-2201
* CVE-2024-22099
* CVE-2024-23307
* CVE-2024-23848
* CVE-2024-23850
* CVE-2024-26601
* CVE-2024-26610
* CVE-2024-26656
* CVE-2024-26671
* CVE-2024-26673
* CVE-2024-26675
* CVE-2024-26679
* CVE-2024-26687
* CVE-2024-26688
* CVE-2024-26700
* CVE-2024-26702
* CVE-2024-26733
* CVE-2024-26739
* CVE-2024-26764
* CVE-2024-26766
* CVE-2024-26772
* CVE-2024-26773
* CVE-2024-26783
* CVE-2024-26791
* CVE-2024-26792
* CVE-2024-26816
* CVE-2024-26817
* CVE-2024-26820
* CVE-2024-26825
* CVE-2024-26830
* CVE-2024-26833
* CVE-2024-26836
* CVE-2024-26840
* CVE-2024-26843
* CVE-2024-26852
* CVE-2024-26853
* CVE-2024-26855
* CVE-2024-26856
* CVE-2024-26857
* CVE-2024-26861
* CVE-2024-26862
* CVE-2024-26866
* CVE-2024-26872
* CVE-2024-26875
* CVE-2024-26876
* CVE-2024-26877
* CVE-2024-26878
* CVE-2024-26879
* CVE-2024-26881
* CVE-2024-26882
* CVE-2024-26883
* CVE-2024-26884
* CVE-2024-26885
* CVE-2024-26891
* CVE-2024-26893
* CVE-2024-26895
* CVE-2024-26896
* CVE-2024-26897
* CVE-2024-26898
* CVE-2024-26901
* CVE-2024-26903
* CVE-2024-26915
* CVE-2024-26917
* CVE-2024-26927
* CVE-2024-26933
* CVE-2024-26939
* CVE-2024-26948
* CVE-2024-26950
* CVE-2024-26951
* CVE-2024-26955
* CVE-2024-26956
* CVE-2024-26960
* CVE-2024-26965
* CVE-2024-26966
* CVE-2024-26969
* CVE-2024-26970
* CVE-2024-26972
* CVE-2024-26979
* CVE-2024-26981
* CVE-2024-26982
* CVE-2024-26993
* CVE-2024-27013
* CVE-2024-27014
* CVE-2024-27030
* CVE-2024-27038
* CVE-2024-27039
* CVE-2024-27041
* CVE-2024-27042
* CVE-2024-27043
* CVE-2024-27046
* CVE-2024-27056
* CVE-2024-27059
* CVE-2024-27062
* CVE-2024-27389


CVSS scores:

* CVE-2021-47184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47191 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47193 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47194 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47198 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47203 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47212 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47214 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47216 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47219 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48639 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48642 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48644 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48654 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48655 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48655 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48656 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48657 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48659 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48659 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48660 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48660 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48668 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48672 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-48673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48675 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48686 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48687 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48697 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2022-48698 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48700 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48701 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48702 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-2860 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-2860 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52585 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52589 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52590 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52593 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-52614 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52620 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52645 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52652 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-0639 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-2201 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23848 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-23848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23850 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26601 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26700 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26820 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26836 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26840 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26875 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26877 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26885 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26898 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26901 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-26901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26939 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26956 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27030 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-27038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27389 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H


Affected Products:

* openSUSE Leap 15.5
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5



An update that solves 190 vulnerabilities, contains one feature and has 41
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

* CVE-2024-27389: Fixed pstore inode handling with d_invalidate()
(bsc#1223705).
* CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).
* CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue
exists
(bsc#1223822).
* CVE-2024-27046: Fixed nfp/flower handling acti_netdevs allocation failure
(bsc#1223827).
* CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places
(bsc#1223824).
* CVE-2024-27042: Fixed drm/amdgpu for potential out-of-bounds access in
amdgpu_discovery_reg_base_init() (bsc#1223823).
* CVE-2024-27041: Fixed drm/amd/display NULL checks for adev->dm.dc in
amdgpu_dm_fini() (bsc#1223714).
* CVE-2024-27039: Fixed clk/hisilicon/hi3559a an erroneous devm_kfree()
(bsc#1223821).
* CVE-2024-27038: Fixed clk_core_get NULL pointer dereference (bsc#1223816).
* CVE-2024-27030: Fixed octeontx2-af to use separate handlers for interrupts
(bsc#1223790).
* CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS
(bsc#1223735).
* CVE-2024-27013: Fixed tun limit printing rate when illegal packet received
by tun device (bsc#1223745).
* CVE-2024-26993: Fixed fs/sysfs reference leak in
sysfs_break_active_protection() (bsc#1223693).
* CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid
value
of zero (bsc#1223634).
* CVE-2024-26970: Fixed clk/qcom/gcc-ipq6018 termination of frequency table
arrays (bsc#1223644).
* CVE-2024-26969: Fixed clk/qcom/gcc-ipq8074 termination of frequency table
arrays (bsc#1223645).
* CVE-2024-26966: Fixed clk/qcom/mmcc-apq8084 termination of frequency table
arrays (bsc#1223646).
* CVE-2024-26965: Fixed clk/qcom/mmcc-msm8974 termination of frequency table
arrays (bsc#1223648).
* CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and
swapoff() (bsc#1223655).
* CVE-2024-26951: Fixed wireguard/netlink check for dangling peer via is_dead
instead of empty list (bsc#1223660).
* CVE-2024-26950: Fixed wireguard/netlink to access device through ctx
instead
of peer (bsc#1223661).
* CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in
dc_state_release (bsc#1223664).
* CVE-2024-26939: Fixed drm/i915/vma UAF on destroy against retire race
(bsc#1223679).
* CVE-2024-26927: Fixed ASoC/SOF bounds checking to firmware data Smatch
(bsc#1223525).
* CVE-2024-26915: Fixed drm/amdgpu reset IH OVERFLOW_CLEAR bit (bsc#1223207).
* CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent
kernel-infoleak (bsc#1223198).
* CVE-2024-26898: Fixed aoe potential use-after-free problem in
aoecmd_cfg_pkts (bsc#1223016).
* CVE-2024-26896: Fixed wifi/wfx memory leak when starting AP (bsc#1223042).
* CVE-2024-26893: Fixed firmware/arm_scmi for possible double free in SMC
transport cleanup path (bsc#1223196).
* CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches
(bsc#1223190).
* CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches
(bsc#1223189).
* CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches
(bsc#1223035).
* CVE-2024-26882: Fixed net/ip_tunnel to make sure to pull inner header in
ip_tunnel_rcv() (bsc#1223034).
* CVE-2024-26881: Fixed net/hns3 kernel crash when 1588 is received on HIP08
devices (bsc#1223041).
* CVE-2024-26879: Fixed clk/meson by adding missing clocks to axg_clk_regmaps
(bsc#1223066).
* CVE-2024-26878: Fixed quota for potential NULL pointer dereference
(bsc#1223060).
* CVE-2024-26876: Fixed drm/bridge/adv7511 crash on irq during probe
(bsc#1223119).
* CVE-2024-26866: Fixed spi/spi-fsl-lpspi by removing redundant
spi_controller_put call (bsc#1223024).
* CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing
(bsc#1223111).
* CVE-2024-26861: Fixed wireguard/receive annotate data-race around
receiving_counter.counter (bsc#1223076).
* CVE-2024-26857: Fixed geneve to make sure to pull inner header in
geneve_rx() (bsc#1223058).
* CVE-2024-26856: Fixed use-after-free inside sparx5_del_mact_entry
(bsc#1223052).
* CVE-2024-26855: Fixed net/ice potential NULL pointer dereference in
ice_bridge_setlink() (bsc#1223051).
* CVE-2024-26853: Fixed igc returning frame twice in XDP_REDIRECT
(bsc#1223061).
* CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in
ip6_route_mpath_notify() (bsc#1223057).
* CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache()
(bsc#1222976).
* CVE-2024-26836: Fixed platform/x86/think-lmi password opcode ordering for
workstations (bsc#1222968).
* CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove
administratively set MAC (bsc#1223012).
* CVE-2024-26817: Fixed amdkfd to use calloc instead of kzalloc to avoid
integer overflow (bsc#1222812).
* CVE-2024-26816: Fixed relocations in .notes section when building with
CONFIG_XEN_PV=y by ignoring them (bsc#1222624).
* CVE-2024-26791: Fixed btrfs/dev-replace properly validate device names
(bsc#1222793).
* CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a
wrong zone index (bsc#1222615).
* CVE-2024-26773: Fixed ext4 block allocation from corrupted group in
ext4_mb_try_best_found() (bsc#1222618).
* CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group
in ext4_mb_find_by_goal() (bsc#1222613).
* CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs()
(bsc#1222726).
* CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct
aio_kiocb conversion (bsc#1222721).
* CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
* CVE-2024-26700: Fixed drm/amd/display MST Null pointer dereference for RV
(bsc#1222870).
* CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup
(bsc#1222435).
* CVE-2024-26679: Fixed inet read sk->sk_family once in inet_recv_error()
(bsc#1222385).
* CVE-2024-26675: Fixed ppp_async to limit MRU to 64K (bsc#1222379).
* CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization
(bsc#1222368).
* CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race
(bsc#1222357).
* CVE-2024-26656: Fixed drm/amdgpu use-after-free bug (bsc#1222307).
* CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).
* CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay
(bsc#1220342).
* CVE-2024-23850: Fixed double free of anonymous device after snapshot
creation failure (bsc#1219126).
* CVE-2024-23848: Fixed media/cec for possible use-after-free in
cec_queue_msg_fh (bsc#1219104).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1219169).
* CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security
(bsc#1219170).
* CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
* CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super
function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).
* CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock
found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
* CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts
(bsc#1218562).
* CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device()
(bsc#1223686).
* CVE-2023-52645: Fixed pmdomain/mediatek race conditions with genpd
(bsc#1223033).
* CVE-2023-52635: Fixed PM/devfreq to synchronize
devfreq_monitor_[start/stop]
(bsc#1222294).
* CVE-2023-52620: Fixed netfilter/nf_tables to disallow timeout for anonymous
sets never used from userspace (bsc#1221825).
* CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in
mpi_ec_init (bsc#1221612).
* CVE-2023-52614: Fixed PM/devfreq buffer overflow in trans_stat_show
(bsc#1221617).
* CVE-2023-52593: Fixed wifi/wfx possible NULL pointer dereference in
wfx_set_mfp_ap() (bsc#1221042).
* CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via
directory renaming (bsc#1221044).
* CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory
renaming (bsc#1221088).
* CVE-2023-52589: Fixed media/rkisp1 IRQ disable race issue (bsc#1221084).
* CVE-2023-52585: Fixed drm/amdgpu for possible NULL pointer dereference in
amdgpu_ras_query_error_status_helper() (bsc#1221080).
* CVE-2022-48662: Fixed a general protection fault (GPF) in
i915_perf_open_ioctl (bsc#1223505).
* CVE-2022-48659: Fixed mm/slub to return errno if kmalloc() fails
(bsc#1223498).
* CVE-2022-48658: Fixed mm/slub to avoid a problem in
flush_cpu_slab()/__free_slab() task context (bsc#1223496).
* CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb->mac_header (bsc#1223513).
* CVE-2022-48642: Fixed netfilter/nf_tables percpu memory leak at
nf_tables_addchain() (bsc#1223478).
* CVE-2022-48640: Fixed bonding for possible NULL pointer dereference in
bond_rr_gen_slave_id (bsc#1223499).
* CVE-2022-48631: Fixed a bug in ext4, when parsing extents where eh_entries
== 0 and eh_depth > 0 (bsc#1223475).
* CVE-2021-47214: Fixed hugetlb/userfaultfd during restore reservation in
hugetlb_mcopy_atomic_pte() (bsc#1222710).
* CVE-2021-47211: Fixed a null pointer dereference on pointer cs_desc in usb-
audio (bsc#1222869).
* CVE-2021-47207: Fixed a null pointer dereference on pointer block in gus
(bsc#1222790).
* CVE-2021-47205: Unregistered clocks/resets when unbinding in sunxi-ng
(bsc#1222888).
* CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions
(bsc#1222878)
* CVE-2021-47200: Fixed drm/prime for possible use-after-free in mmap within
drm_gem_ttm_mmap() and drm_gem_ttm_mmap() (bsc#1222838).
* CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex
(bsc#1222832).
* CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty
tty_buffer
(bsc#1222669).
* CVE-2021-47184: Fixed NULL pointer dereference on VSI filter sync
(bsc#1222666).

The following non-security bugs were fixed:

* ALSA: firewire-lib: handle quirk to calculate payload quadlets as data
block
counter (stable-fixes).
* ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC
(stable-fixes).
* ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes).
* ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes).
* ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes).
* ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git-
fixes).
* ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable-
fixes).
* ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable-
fixes).
* ALSA: scarlett2: Add correct product series name to messages
(stable-fixes).
* ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes).
* ALSA: scarlett2: Default mixer driver to enabled (stable-fixes).
* ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes).
* ASoC: meson: axg-card: make links nonatomic (git-fixes).
* ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes).
* ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes).
* ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes).
* ASoC: tegra: Fix DSPK 16-bit playback (git-fixes).
* ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes).
* Bluetooth: Add new quirk for broken read key length on ATS2851 (git-fixes).
* Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes).
* Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes).
* Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable-
fixes).
* Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes).
* Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes).
* Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes).
* Bluetooth: add quirk for broken address properties (git-fixes).
* Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable-
fixes).
* Bluetooth: btintel: Fixe build regression (git-fixes).
* Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable-
fixes).
* Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes).
* Bluetooth: hci_event: set the conn encrypted before conn establishes
(stable-fixes).
* Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes).
* Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes).
* Documentation: Add missing documentation for EXPORT_OP flags
(stable-fixes).
* HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev->devc
(git-fixes).
* HID: logitech-dj: allow mice to use all types of reports (git-fixes).
* HID: uhid: Use READ_ONCE()/WRITE_ONCE() for ->running (stable-fixes).
* Input: allocate keycode for Display refresh rate toggle (stable-fixes).
* Input: synaptics-rmi4 - fail probing if memory allocation for
"phys" fails
(stable-fixes).
* NFC: trf7970a: disable all regulators on removal (git-fixes).
* PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369
ltc#205888).
* RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes).
* Reapply "drm/qxl: simplify qxl_fence_wait" (stable-fixes).
* Revert "ACPI: PM: Block ASUS B1400CEAE from suspend to idle by
default"
(stable-fixes).
* Revert "drm/qxl: simplify qxl_fence_wait" (git-fixes).
* Revert "ice: Fix ice VF reset during iavf initialization
(jsc#PED-376)."
(bsc#1223275)
* Revert "usb: cdc-wdm: close race between read and workqueue"
(git-fixes).
* Revert "usb: phy: generic: Get the vbus supply" (git-fixes).
* USB: UAS: return ENODEV when submit urbs fail with device not attached
(stable-fixes).
* USB: core: Add hub_get() and hub_put() routines (git-fixes).
* USB: core: Fix access violation during port device removal (git-fixes).
* USB: core: Fix deadlock in port "disable" sysfs attribute
(git-fixes).
* USB: serial: add device ID for VeriFone adapter (stable-fixes).
* USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes).
* USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable-
fixes).
* USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable-
fixes).
* USB: serial: option: add Fibocom FM135-GL variants (stable-fixes).
* USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes).
* USB: serial: option: add MeiG Smart SLM320 product (stable-fixes).
* USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable-
fixes).
* USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes).
* USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes).
* USB: serial: option: support Quectel EM060K sub-models (stable-fixes).
* nfsd: Fixed mount kerberized nfs4 share issue (git-fixes bsc#1223858).
* s390: Fixed kernel backtrack (bsc#1141539 git-fixes).
* nfsd: Fixed mount issue with KOTD (bsc#1223380 bsc#1217408 bsc#1223640).
* s390: Fixed LPM of lpar failure with error HSCLA2CF in 19th loops
(jsc#PED-542 git-fixes bsc#1213573 ltc#203238).
* ahci: asm1064: asm1166: do not limit reported ports (git-fixes).
* ahci: asm1064: correct count of reported ports (stable-fixes).
* arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes)
* arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git-
fixes)
* arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git-
fixes)
* arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes)
* arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git-
fixes)
* arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes)
* arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes)
* arm64: hibernate: Fix level3 translation fault in swsusp_save()
(git-fixes).
* ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes).
* batman-adv: Avoid infinite loop trying to resize local TT (git-fixes).
* clk: Get runtime PM before walking tree during disable_unused (git-fixes).
* clk: Initialize struct clk_core kref earlier (stable-fixes).
* clk: Mark 'all_lists' as const (stable-fixes).
* clk: Print an info line before disabling unused clocks (stable-fixes).
* clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes).
* clk: remove extra empty line (stable-fixes).
* comedi: vmk80xx: fix incomplete endpoint checking (git-fixes).
* dma: xilinx_dpdma: Fix locking (git-fixes).
* dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes).
* dmaengine: owl: fix register access functions (git-fixes).
* dmaengine: tegra186: Fix residual calculation (git-fixes).
* docs: Document the FAN_FS_ERROR event (stable-fixes).
* drm-print: add drm_dbg_driver to improve namespace symmetry (stable-fixes).
* drm/amd/display: Do not recursively call manual trigger programming
(stable-
fixes).
* drm/amd/display: Fix nanosec stat overflow (stable-fixes).
* drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes).
* drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes).
* drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes).
* drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes).
* drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes).
* drm/amdgpu: always force full reset for SOC21 (stable-fixes).
* drm/amdgpu: fix incorrect active rb bitmap for gfx11 (stable-fixes).
* drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes).
* drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2
(git-fixes).
* drm/amdgpu: validate the parameters of bo mapping operations more clearly
(git-fixes).
* drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes).
* drm/ast: Fix soft lockup (git-fixes).
* drm/client: Fully protect modes[] with dev->mode_config.mutex (stable-
fixes).
* drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git-
fixes).
* drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes).
* drm/i915: Disable port sync when bigjoiner is used (stable-fixes).
* drm/msm/dp: fix typo in dp_display_handle_port_status_changed()
(git-fixes).
* drm/nouveau/nvkm: add a replacement for nvkm_notify (bsc#1223834)
* drm/panel: ili9341: Respect deferred probe (git-fixes).
* drm/panel: ili9341: Use predefined error codes (git-fixes).
* drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes).
* drm/vc4: do not check if plane->state->fb == state->fb
(stable-fixes).
* drm/vmwgfx: Enable DMA mappings with SEV (git-fixes).
* drm/vmwgfx: Fix crtc's atomic check conditional (git-fixes).
* drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes).
* drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes).
* drm: nv04: Fix out of bounds access (git-fixes).
* drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes).
* drm: panel-orientation-quirks: Add quirk for Lenovo Legion Go (stable-
fixes).
* dump_stack: Do not get cpu_sync for panic CPU (bsc#1223574).
* fbdev: fix incorrect address computation in deferred IO (git-fixes).
* fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes).
* fbmon: prevent division by zero in fb_videomode_from_videomode() (stable-
fixes).
* fuse: do not unhash root (bsc#1223951).
* fuse: fix root lookup with nonzero generation (bsc#1223950).
* hwmon: (amc6821) add of_match table (stable-fixes).
* i2c: pxa: hide unused icr_bits[] variable (git-fixes).
* i2c: smbus: fix NULL function pointer dereference (git-fixes).
* i40e: Fix VF MAC filter removal (git-fixes).
* idma64: Do not try to serve interrupts when device is powered off (git-
fixes).
* iio: accel: mxc4005: Interrupt handling fixes (git-fixes).
* iio:imu: adis16475: Fix sync mode setting (git-fixes).
* init/main.c: Fix potential static_command_line memory overflow (git-fixes).
* ipv6/addrconf: fix a potential refcount underflow for idev (git-fixes).
* irqchip/gic-v3-its: Prevent double free on error (git-fixes).
* kprobes: Fix possible use-after-free issue on kprobe registration (git-
fixes).
* livepatch: Fix missing newline character in klp_resolve_symbols()
(bsc#1223539).
* media: cec: core: remove length check of Timer Status (stable-fixes).
* media: sta2x11: fix irq handler cast (stable-fixes).
* mei: me: add arrow lake point H DID (stable-fixes).
* mei: me: add arrow lake point S DID (stable-fixes).
* mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes).
* mm/vmscan: make sure wakeup_kswapd with managed zone (bsc#1223473).
* mmc: sdhci-msm: pervent access to suspended controller (git-fixes).
* mtd: diskonchip: work around ubsan link failure (stable-fixes).
* net: bridge: vlan: fix memory leak in __allowed_ingress (git-fixes).
* net: fix a memleak when uncloning an skb dst and its metadata (git-fixes).
* net: fix skb leak in __skb_tstamp_tx() (git-fixes).
* net: ipv6: ensure we call ipv6_mc_down() at most once (git-fixes).
* net: mld: fix reference count leak in mld_{query | report}_work() (git-
fixes).
* net: stream: purge sk_error_queue in sk_stream_kill_queues() (git-fixes).
* net: usb: ax88179_178a: avoid writing the mac address before first reading
(git-fixes).
* net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).
* net: vlan: fix underflow for the real_dev refcnt (git-fixes).
* net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete()
(bsc#1223360).
* netfilter: br_netfilter: Drop dst references before setting (git-fixes).
* netfilter: ipt_CLUSTERIP: fix refcount leak in clusterip_tg_check() (git-
fixes).
* netfilter: nft_ct: fix l3num expectations with inet pseudo family (git-
fixes).
* nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380
bsc#1217408).
* nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
* nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
* nouveau: fix function cast warning (git-fixes).
* nouveau: fix instmem race condition around ptr stores (git-fixes).
* phy: tegra: xusb: Add API to retrieve the port number of phy
(stable-fixes).
* pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs
(stable-fixes).
* platform/x86: intel-vbtn: Update tablet mode switch at end of probe (git-
fixes).
* platform/x86: touchscreen_dmi: Add an extra entry for a variant of the
Chuwi
Vi8 tablet (stable-fixes).
* powerpc/kasan: Do not instrument non-maskable or raw interrupts
(bsc#1223191).
* powerpc/rtas: define pr_fmt and convert printk call sites (bsc#1223369
ltc#205888).
* powerpc/rtas: export rtas_error_rc() for reuse (bsc#1223369 ltc#205888).
* powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645
ltc#205739 bsc#1223191).
* powerpc: Refactor verification of MSR_RI (bsc#1223191).
* printk: Add this_cpu_in_panic() (bsc#1223574).
* printk: Adjust mapping for 32bit seq macros (bsc#1223574).
* printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1223574).
* printk: Disable passing console lock owner completely during panic()
(bsc#1223574).
* printk: Drop console_sem during panic (bsc#1223574).
* printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic()
(bsc#1223574).
* printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1223574).
* printk: Wait for all reserved records with pr_flush() (bsc#1223574).
* printk: nbcon: Relocate 32bit seq macros (bsc#1223574).
* printk: ringbuffer: Clarify special lpos values (bsc#1223574).
* printk: ringbuffer: Cleanup reader terminology (bsc#1223574).
* printk: ringbuffer: Do not skip non-finalized records with prb_next_seq()
(bsc#1223574).
* printk: ringbuffer: Improve prb_next_seq() performance (bsc#1223574).
* printk: ringbuffer: Skip non-finalized records in panic (bsc#1223574).
* pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes).
* ring-buffer: Only update pages_touched when a new page is touched (git-
fixes).
* ring-buffer: use READ_ONCE() to read cpu_buffer->commit_page in
concurrent
environment (git-fixes).
* s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223875).
* s390/decompressor: fix misaligned symbol build error (git-fixes
bsc#1223785).
* s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223877).
* s390/mm: Fix storage key clearing for guest huge pages (git-fixes
bsc#1223878).
* s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223879).
* s390/scm: fix virtual vs physical address confusion (git-fixes
bsc#1223784).
* s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes
bsc#1223876).
* s390/vdso: drop '-fPIC' from LDFLAGS (git-fixes bsc#1223598).
* s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes
bsc#1223595).
* serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes).
* serial: core: Provide port lock wrappers (stable-fixes).
* serial: core: fix kernel-doc for uart_port_unlock_irqrestore() (git-fixes).
* serial: mxs-auart: add spinlock around changing cts state (git-fixes).
* slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes).
* speakup: Avoid crash on very long word (git-fixes).
* speakup: Fix 8bit characters from direct synth (git-fixes).
* spi: hisi-kunpeng: Delete the dump interface of data registers in debugfs
(git-fixes).
* tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp
(git-fixes).
* thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes).
* thunderbolt: Fix wake configurations after device unplug (stable-fixes).
* tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git-
fixes).
* tracing: Show size of requested perf buffer (git-fixes).
* usb: Disable USB3 LPM at shutdown (stable-fixes).
* usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed
device (git-fixes).
* usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes).
* usb: dwc3: core: Prevent phy suspend during init (Git-fixes).
* usb: gadget: composite: fix OS descriptors w_value logic (git-fixes).
* usb: gadget: f_fs: Fix a race condition when processing setup packets (git-
fixes).
* usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport
error (stable-fixes).
* usb: gadget: tegra-xudc: Fix USB3 PHY retrieval logic (git-fixes).
* usb: ohci: Prevent missed ohci interrupts (git-fixes).
* usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined
(stable-fixes).
* usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes).
* usb: typec: tcpm: Check for port partner validity before consuming it (git-
fixes).
* usb: typec: tcpm: unregister existing source caps before re-registration
(bsc#1220569).
* usb: typec: ucsi: Ack unsupported commands (stable-fixes).
* usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset
(stable-fixes).
* usb: typec: ucsi: Fix connector check on init (git-fixes).
* usb: udc: remove warning when queue disabled ep (stable-fixes).
* virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223949).
* wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes).
* wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git-
fixes).
* wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes).
* wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable-
fixes).
* wifi: nl80211: do not free NULL coalescing rule (git-fixes).
* x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes).
* x86/bugs: Fix BHI documentation (git-fixes).
* x86/bugs: Fix BHI handling of RRSBA (git-fixes).
* x86/bugs: Fix BHI retpoline check (git-fixes).
* x86/bugs: Fix return type of spectre_bhi_state() (git-fixes).
* x86/bugs: Rename various 'ia32_cap' variables to
'x86_arch_cap_msr' (git-
fixes).
* x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git-
fixes).
* x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type
(jsc#PED-7167 git-fixes).
* x86/sev: Skip ROM range scans and validation for SEV-SNP guests
(jsc#PED-7167 git-fixes).
* xfrm6: fix inet6_dev refcount underflow problem (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1644=1 SUSE-2024-1644=1

* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1644=1

## Package List:

* openSUSE Leap 15.5 (aarch64 x86_64)
* cluster-md-kmp-azure-debuginfo-5.14.21-150500.33.51.1
* ocfs2-kmp-azure-debuginfo-5.14.21-150500.33.51.1
* reiserfs-kmp-azure-5.14.21-150500.33.51.1
* kernel-azure-extra-debuginfo-5.14.21-150500.33.51.1
* kernel-azure-debuginfo-5.14.21-150500.33.51.1
* gfs2-kmp-azure-debuginfo-5.14.21-150500.33.51.1
* dlm-kmp-azure-5.14.21-150500.33.51.1
* kernel-azure-debugsource-5.14.21-150500.33.51.1
* kselftests-kmp-azure-5.14.21-150500.33.51.1
* kernel-azure-devel-5.14.21-150500.33.51.1
* dlm-kmp-azure-debuginfo-5.14.21-150500.33.51.1
* kernel-azure-livepatch-devel-5.14.21-150500.33.51.1
* cluster-md-kmp-azure-5.14.21-150500.33.51.1
* kernel-azure-extra-5.14.21-150500.33.51.1
* kernel-azure-optional-debuginfo-5.14.21-150500.33.51.1
* kernel-azure-optional-5.14.21-150500.33.51.1
* reiserfs-kmp-azure-debuginfo-5.14.21-150500.33.51.1
* kselftests-kmp-azure-debuginfo-5.14.21-150500.33.51.1
* ocfs2-kmp-azure-5.14.21-150500.33.51.1
* kernel-azure-devel-debuginfo-5.14.21-150500.33.51.1
* kernel-syms-azure-5.14.21-150500.33.51.1
* gfs2-kmp-azure-5.14.21-150500.33.51.1
* openSUSE Leap 15.5 (aarch64 nosrc x86_64)
* kernel-azure-5.14.21-150500.33.51.1
* openSUSE Leap 15.5 (x86_64)
* kernel-azure-vdso-debuginfo-5.14.21-150500.33.51.1
* kernel-azure-vdso-5.14.21-150500.33.51.1
* openSUSE Leap 15.5 (noarch)
* kernel-source-azure-5.14.21-150500.33.51.1
* kernel-devel-azure-5.14.21-150500.33.51.1
* Public Cloud Module 15-SP5 (aarch64 nosrc x86_64)
* kernel-azure-5.14.21-150500.33.51.1
* Public Cloud Module 15-SP5 (aarch64 x86_64)
* kernel-azure-devel-5.14.21-150500.33.51.1
* kernel-azure-debugsource-5.14.21-150500.33.51.1
* kernel-azure-debuginfo-5.14.21-150500.33.51.1
* kernel-azure-devel-debuginfo-5.14.21-150500.33.51.1
* kernel-syms-azure-5.14.21-150500.33.51.1
* Public Cloud Module 15-SP5 (noarch)
* kernel-source-azure-5.14.21-150500.33.51.1
* kernel-devel-azure-5.14.21-150500.33.51.1

## References:

* https://www.suse.com/security/cve/CVE-2021-47047.html
* https://www.suse.com/security/cve/CVE-2021-47184.html
* https://www.suse.com/security/cve/CVE-2021-47185.html
* https://www.suse.com/security/cve/CVE-2021-47187.html
* https://www.suse.com/security/cve/CVE-2021-47188.html
* https://www.suse.com/security/cve/CVE-2021-47191.html
* https://www.suse.com/security/cve/CVE-2021-47192.html
* https://www.suse.com/security/cve/CVE-2021-47193.html
* https://www.suse.com/security/cve/CVE-2021-47194.html
* https://www.suse.com/security/cve/CVE-2021-47195.html
* https://www.suse.com/security/cve/CVE-2021-47196.html
* https://www.suse.com/security/cve/CVE-2021-47197.html
* https://www.suse.com/security/cve/CVE-2021-47198.html
* https://www.suse.com/security/cve/CVE-2021-47199.html
* https://www.suse.com/security/cve/CVE-2021-47200.html
* https://www.suse.com/security/cve/CVE-2021-47201.html
* https://www.suse.com/security/cve/CVE-2021-47202.html
* https://www.suse.com/security/cve/CVE-2021-47203.html
* https://www.suse.com/security/cve/CVE-2021-47204.html
* https://www.suse.com/security/cve/CVE-2021-47205.html
* https://www.suse.com/security/cve/CVE-2021-47206.html
* https://www.suse.com/security/cve/CVE-2021-47207.html
* https://www.suse.com/security/cve/CVE-2021-47209.html
* https://www.suse.com/security/cve/CVE-2021-47210.html
* https://www.suse.com/security/cve/CVE-2021-47211.html
* https://www.suse.com/security/cve/CVE-2021-47212.html
* https://www.suse.com/security/cve/CVE-2021-47214.html
* https://www.suse.com/security/cve/CVE-2021-47215.html
* https://www.suse.com/security/cve/CVE-2021-47216.html
* https://www.suse.com/security/cve/CVE-2021-47217.html
* https://www.suse.com/security/cve/CVE-2021-47218.html
* https://www.suse.com/security/cve/CVE-2021-47219.html
* https://www.suse.com/security/cve/CVE-2022-48631.html
* https://www.suse.com/security/cve/CVE-2022-48632.html
* https://www.suse.com/security/cve/CVE-2022-48634.html
* https://www.suse.com/security/cve/CVE-2022-48636.html
* https://www.suse.com/security/cve/CVE-2022-48637.html
* https://www.suse.com/security/cve/CVE-2022-48638.html
* https://www.suse.com/security/cve/CVE-2022-48639.html
* https://www.suse.com/security/cve/CVE-2022-48640.html
* https://www.suse.com/security/cve/CVE-2022-48642.html
* https://www.suse.com/security/cve/CVE-2022-48644.html
* https://www.suse.com/security/cve/CVE-2022-48646.html
* https://www.suse.com/security/cve/CVE-2022-48647.html
* https://www.suse.com/security/cve/CVE-2022-48648.html
* https://www.suse.com/security/cve/CVE-2022-48650.html
* https://www.suse.com/security/cve/CVE-2022-48651.html
* https://www.suse.com/security/cve/CVE-2022-48652.html
* https://www.suse.com/security/cve/CVE-2022-48653.html
* https://www.suse.com/security/cve/CVE-2022-48654.html
* https://www.suse.com/security/cve/CVE-2022-48655.html
* https://www.suse.com/security/cve/CVE-2022-48656.html
* https://www.suse.com/security/cve/CVE-2022-48657.html
* https://www.suse.com/security/cve/CVE-2022-48658.html
* https://www.suse.com/security/cve/CVE-2022-48659.html
* https://www.suse.com/security/cve/CVE-2022-48660.html
* https://www.suse.com/security/cve/CVE-2022-48662.html
* https://www.suse.com/security/cve/CVE-2022-48663.html
* https://www.suse.com/security/cve/CVE-2022-48667.html
* https://www.suse.com/security/cve/CVE-2022-48668.html
* https://www.suse.com/security/cve/CVE-2022-48671.html
* https://www.suse.com/security/cve/CVE-2022-48672.html
* https://www.suse.com/security/cve/CVE-2022-48673.html
* https://www.suse.com/security/cve/CVE-2022-48675.html
* https://www.suse.com/security/cve/CVE-2022-48686.html
* https://www.suse.com/security/cve/CVE-2022-48687.html
* https://www.suse.com/security/cve/CVE-2022-48688.html
* https://www.suse.com/security/cve/CVE-2022-48690.html
* https://www.suse.com/security/cve/CVE-2022-48692.html
* https://www.suse.com/security/cve/CVE-2022-48693.html
* https://www.suse.com/security/cve/CVE-2022-48694.html
* https://www.suse.com/security/cve/CVE-2022-48695.html
* https://www.suse.com/security/cve/CVE-2022-48697.html
* https://www.suse.com/security/cve/CVE-2022-48698.html
* https://www.suse.com/security/cve/CVE-2022-48699.html
* https://www.suse.com/security/cve/CVE-2022-48700.html
* https://www.suse.com/security/cve/CVE-2022-48701.html
* https://www.suse.com/security/cve/CVE-2022-48702.html
* https://www.suse.com/security/cve/CVE-2022-48703.html
* https://www.suse.com/security/cve/CVE-2022-48704.html
* https://www.suse.com/security/cve/CVE-2023-2860.html
* https://www.suse.com/security/cve/CVE-2023-52585.html
* https://www.suse.com/security/cve/CVE-2023-52589.html
* https://www.suse.com/security/cve/CVE-2023-52590.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52593.html
* https://www.suse.com/security/cve/CVE-2023-52614.html
* https://www.suse.com/security/cve/CVE-2023-52616.html
* https://www.suse.com/security/cve/CVE-2023-52620.html
* https://www.suse.com/security/cve/CVE-2023-52635.html
* https://www.suse.com/security/cve/CVE-2023-52645.html
* https://www.suse.com/security/cve/CVE-2023-52646.html
* https://www.suse.com/security/cve/CVE-2023-52652.html
* https://www.suse.com/security/cve/CVE-2023-6270.html
* https://www.suse.com/security/cve/CVE-2024-0639.html
* https://www.suse.com/security/cve/CVE-2024-0841.html
* https://www.suse.com/security/cve/CVE-2024-2201.html
* https://www.suse.com/security/cve/CVE-2024-22099.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-23848.html
* https://www.suse.com/security/cve/CVE-2024-23850.html
* https://www.suse.com/security/cve/CVE-2024-26601.html
* https://www.suse.com/security/cve/CVE-2024-26610.html
* https://www.suse.com/security/cve/CVE-2024-26656.html
* https://www.suse.com/security/cve/CVE-2024-26671.html
* https://www.suse.com/security/cve/CVE-2024-26673.html
* https://www.suse.com/security/cve/CVE-2024-26675.html
* https://www.suse.com/security/cve/CVE-2024-26679.html
* https://www.suse.com/security/cve/CVE-2024-26687.html
* https://www.suse.com/security/cve/CVE-2024-26688.html
* https://www.suse.com/security/cve/CVE-2024-26700.html
* https://www.suse.com/security/cve/CVE-2024-26702.html
* https://www.suse.com/security/cve/CVE-2024-26733.html
* https://www.suse.com/security/cve/CVE-2024-26739.html
* https://www.suse.com/security/cve/CVE-2024-26764.html
* https://www.suse.com/security/cve/CVE-2024-26766.html
* https://www.suse.com/security/cve/CVE-2024-26772.html
* https://www.suse.com/security/cve/CVE-2024-26773.html
* https://www.suse.com/security/cve/CVE-2024-26783.html
* https://www.suse.com/security/cve/CVE-2024-26791.html
* https://www.suse.com/security/cve/CVE-2024-26792.html
* https://www.suse.com/security/cve/CVE-2024-26816.html
* https://www.suse.com/security/cve/CVE-2024-26817.html
* https://www.suse.com/security/cve/CVE-2024-26820.html
* https://www.suse.com/security/cve/CVE-2024-26825.html
* https://www.suse.com/security/cve/CVE-2024-26830.html
* https://www.suse.com/security/cve/CVE-2024-26833.html
* https://www.suse.com/security/cve/CVE-2024-26836.html
* https://www.suse.com/security/cve/CVE-2024-26840.html
* https://www.suse.com/security/cve/CVE-2024-26843.html
* https://www.suse.com/security/cve/CVE-2024-26852.html
* https://www.suse.com/security/cve/CVE-2024-26853.html
* https://www.suse.com/security/cve/CVE-2024-26855.html
* https://www.suse.com/security/cve/CVE-2024-26856.html
* https://www.suse.com/security/cve/CVE-2024-26857.html
* https://www.suse.com/security/cve/CVE-2024-26861.html
* https://www.suse.com/security/cve/CVE-2024-26862.html
* https://www.suse.com/security/cve/CVE-2024-26866.html
* https://www.suse.com/security/cve/CVE-2024-26872.html
* https://www.suse.com/security/cve/CVE-2024-26875.html
* https://www.suse.com/security/cve/CVE-2024-26876.html
* https://www.suse.com/security/cve/CVE-2024-26877.html
* https://www.suse.com/security/cve/CVE-2024-26878.html
* https://www.suse.com/security/cve/CVE-2024-26879.html
* https://www.suse.com/security/cve/CVE-2024-26881.html
* https://www.suse.com/security/cve/CVE-2024-26882.html
* https://www.suse.com/security/cve/CVE-2024-26883.html
* https://www.suse.com/security/cve/CVE-2024-26884.html
* https://www.suse.com/security/cve/CVE-2024-26885.html
* https://www.suse.com/security/cve/CVE-2024-26891.html
* https://www.suse.com/security/cve/CVE-2024-26893.html
* https://www.suse.com/security/cve/CVE-2024-26895.html
* https://www.suse.com/security/cve/CVE-2024-26896.html
* https://www.suse.com/security/cve/CVE-2024-26897.html
* https://www.suse.com/security/cve/CVE-2024-26898.html
* https://www.suse.com/security/cve/CVE-2024-26901.html
* https://www.suse.com/security/cve/CVE-2024-26903.html
* https://www.suse.com/security/cve/CVE-2024-26915.html
* https://www.suse.com/security/cve/CVE-2024-26917.html
* https://www.suse.com/security/cve/CVE-2024-26927.html
* https://www.suse.com/security/cve/CVE-2024-26933.html
* https://www.suse.com/security/cve/CVE-2024-26939.html
* https://www.suse.com/security/cve/CVE-2024-26948.html
* https://www.suse.com/security/cve/CVE-2024-26950.html
* https://www.suse.com/security/cve/CVE-2024-26951.html
* https://www.suse.com/security/cve/CVE-2024-26955.html
* https://www.suse.com/security/cve/CVE-2024-26956.html
* https://www.suse.com/security/cve/CVE-2024-26960.html
* https://www.suse.com/security/cve/CVE-2024-26965.html
* https://www.suse.com/security/cve/CVE-2024-26966.html
* https://www.suse.com/security/cve/CVE-2024-26969.html
* https://www.suse.com/security/cve/CVE-2024-26970.html
* https://www.suse.com/security/cve/CVE-2024-26972.html
* https://www.suse.com/security/cve/CVE-2024-26979.html
* https://www.suse.com/security/cve/CVE-2024-26981.html
* https://www.suse.com/security/cve/CVE-2024-26982.html
* https://www.suse.com/security/cve/CVE-2024-26993.html
* https://www.suse.com/security/cve/CVE-2024-27013.html
* https://www.suse.com/security/cve/CVE-2024-27014.html
* https://www.suse.com/security/cve/CVE-2024-27030.html
* https://www.suse.com/security/cve/CVE-2024-27038.html
* https://www.suse.com/security/cve/CVE-2024-27039.html
* https://www.suse.com/security/cve/CVE-2024-27041.html
* https://www.suse.com/security/cve/CVE-2024-27042.html
* https://www.suse.com/security/cve/CVE-2024-27043.html
* https://www.suse.com/security/cve/CVE-2024-27046.html
* https://www.suse.com/security/cve/CVE-2024-27056.html
* https://www.suse.com/security/cve/CVE-2024-27059.html
* https://www.suse.com/security/cve/CVE-2024-27062.html
* https://www.suse.com/security/cve/CVE-2024-27389.html
* https://bugzilla.suse.com/show_bug.cgi?id=1141539
* https://bugzilla.suse.com/show_bug.cgi?id=1190576
* https://bugzilla.suse.com/show_bug.cgi?id=1192145
* https://bugzilla.suse.com/show_bug.cgi?id=1192837
* https://bugzilla.suse.com/show_bug.cgi?id=1193629
* https://bugzilla.suse.com/show_bug.cgi?id=1196869
* https://bugzilla.suse.com/show_bug.cgi?id=1200313
* https://bugzilla.suse.com/show_bug.cgi?id=1201308
* https://bugzilla.suse.com/show_bug.cgi?id=1201489
* https://bugzilla.suse.com/show_bug.cgi?id=1203906
* https://bugzilla.suse.com/show_bug.cgi?id=1203935
* https://bugzilla.suse.com/show_bug.cgi?id=1204614
* https://bugzilla.suse.com/show_bug.cgi?id=1207361
* https://bugzilla.suse.com/show_bug.cgi?id=1211592
* https://bugzilla.suse.com/show_bug.cgi?id=1213573
* https://bugzilla.suse.com/show_bug.cgi?id=1217339
* https://bugzilla.suse.com/show_bug.cgi?id=1217408
* https://bugzilla.suse.com/show_bug.cgi?id=1218562
* https://bugzilla.suse.com/show_bug.cgi?id=1218917
* https://bugzilla.suse.com/show_bug.cgi?id=1219104
* https://bugzilla.suse.com/show_bug.cgi?id=1219126
* https://bugzilla.suse.com/show_bug.cgi?id=1219141
* https://bugzilla.suse.com/show_bug.cgi?id=1219169
* https://bugzilla.suse.com/show_bug.cgi?id=1219170
* https://bugzilla.suse.com/show_bug.cgi?id=1219264
* https://bugzilla.suse.com/show_bug.cgi?id=1220342
* https://bugzilla.suse.com/show_bug.cgi?id=1220569
* https://bugzilla.suse.com/show_bug.cgi?id=1220761
* https://bugzilla.suse.com/show_bug.cgi?id=1221042
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221080
* https://bugzilla.suse.com/show_bug.cgi?id=1221084
* https://bugzilla.suse.com/show_bug.cgi?id=1221088
* https://bugzilla.suse.com/show_bug.cgi?id=1221299
* https://bugzilla.suse.com/show_bug.cgi?id=1221612
* https://bugzilla.suse.com/show_bug.cgi?id=1221617
* https://bugzilla.suse.com/show_bug.cgi?id=1221645
* https://bugzilla.suse.com/show_bug.cgi?id=1221825
* https://bugzilla.suse.com/show_bug.cgi?id=1222294
* https://bugzilla.suse.com/show_bug.cgi?id=1222307
* https://bugzilla.suse.com/show_bug.cgi?id=1222357
* https://bugzilla.suse.com/show_bug.cgi?id=1222368
* https://bugzilla.suse.com/show_bug.cgi?id=1222379
* https://bugzilla.suse.com/show_bug.cgi?id=1222385
* https://bugzilla.suse.com/show_bug.cgi?id=1222424
* https://bugzilla.suse.com/show_bug.cgi?id=1222430
* https://bugzilla.suse.com/show_bug.cgi?id=1222435
* https://bugzilla.suse.com/show_bug.cgi?id=1222482
* https://bugzilla.suse.com/show_bug.cgi?id=1222559
* https://bugzilla.suse.com/show_bug.cgi?id=1222585
* https://bugzilla.suse.com/show_bug.cgi?id=1222613
* https://bugzilla.suse.com/show_bug.cgi?id=1222615
* https://bugzilla.suse.com/show_bug.cgi?id=1222618
* https://bugzilla.suse.com/show_bug.cgi?id=1222624
* https://bugzilla.suse.com/show_bug.cgi?id=1222666
* https://bugzilla.suse.com/show_bug.cgi?id=1222669
* https://bugzilla.suse.com/show_bug.cgi?id=1222671
* https://bugzilla.suse.com/show_bug.cgi?id=1222703
* https://bugzilla.suse.com/show_bug.cgi?id=1222704
* https://bugzilla.suse.com/show_bug.cgi?id=1222709
* https://bugzilla.suse.com/show_bug.cgi?id=1222710
* https://bugzilla.suse.com/show_bug.cgi?id=1222721
* https://bugzilla.suse.com/show_bug.cgi?id=1222726
* https://bugzilla.suse.com/show_bug.cgi?id=1222773
* https://bugzilla.suse.com/show_bug.cgi?id=1222776
* https://bugzilla.suse.com/show_bug.cgi?id=1222785
* https://bugzilla.suse.com/show_bug.cgi?id=1222787
* https://bugzilla.suse.com/show_bug.cgi?id=1222790
* https://bugzilla.suse.com/show_bug.cgi?id=1222791
* https://bugzilla.suse.com/show_bug.cgi?id=1222792
* https://bugzilla.suse.com/show_bug.cgi?id=1222793
* https://bugzilla.suse.com/show_bug.cgi?id=1222796
* https://bugzilla.suse.com/show_bug.cgi?id=1222812
* https://bugzilla.suse.com/show_bug.cgi?id=1222824
* https://bugzilla.suse.com/show_bug.cgi?id=1222829
* https://bugzilla.suse.com/show_bug.cgi?id=1222832
* https://bugzilla.suse.com/show_bug.cgi?id=1222836
* https://bugzilla.suse.com/show_bug.cgi?id=1222838
* https://bugzilla.suse.com/show_bug.cgi?id=1222866
* https://bugzilla.suse.com/show_bug.cgi?id=1222867
* https://bugzilla.suse.com/show_bug.cgi?id=1222869
* https://bugzilla.suse.com/show_bug.cgi?id=1222870
* https://bugzilla.suse.com/show_bug.cgi?id=1222876
* https://bugzilla.suse.com/show_bug.cgi?id=1222878
* https://bugzilla.suse.com/show_bug.cgi?id=1222879
* https://bugzilla.suse.com/show_bug.cgi?id=1222881
* https://bugzilla.suse.com/show_bug.cgi?id=1222883
* https://bugzilla.suse.com/show_bug.cgi?id=1222888
* https://bugzilla.suse.com/show_bug.cgi?id=1222894
* https://bugzilla.suse.com/show_bug.cgi?id=1222901
* https://bugzilla.suse.com/show_bug.cgi?id=1222968
* https://bugzilla.suse.com/show_bug.cgi?id=1222976
* https://bugzilla.suse.com/show_bug.cgi?id=1223012
* https://bugzilla.suse.com/show_bug.cgi?id=1223014
* https://bugzilla.suse.com/show_bug.cgi?id=1223016
* https://bugzilla.suse.com/show_bug.cgi?id=1223024
* https://bugzilla.suse.com/show_bug.cgi?id=1223033
* https://bugzilla.suse.com/show_bug.cgi?id=1223034
* https://bugzilla.suse.com/show_bug.cgi?id=1223035
* https://bugzilla.suse.com/show_bug.cgi?id=1223036
* https://bugzilla.suse.com/show_bug.cgi?id=1223037
* https://bugzilla.suse.com/show_bug.cgi?id=1223041
* https://bugzilla.suse.com/show_bug.cgi?id=1223042
* https://bugzilla.suse.com/show_bug.cgi?id=1223051
* https://bugzilla.suse.com/show_bug.cgi?id=1223052
* https://bugzilla.suse.com/show_bug.cgi?id=1223056
* https://bugzilla.suse.com/show_bug.cgi?id=1223057
* https://bugzilla.suse.com/show_bug.cgi?id=1223058
* https://bugzilla.suse.com/show_bug.cgi?id=1223060
* https://bugzilla.suse.com/show_bug.cgi?id=1223061
* https://bugzilla.suse.com/show_bug.cgi?id=1223065
* https://bugzilla.suse.com/show_bug.cgi?id=1223066
* https://bugzilla.suse.com/show_bug.cgi?id=1223076
* https://bugzilla.suse.com/show_bug.cgi?id=1223078
* https://bugzilla.suse.com/show_bug.cgi?id=1223111
* https://bugzilla.suse.com/show_bug.cgi?id=1223115
* https://bugzilla.suse.com/show_bug.cgi?id=1223118
* https://bugzilla.suse.com/show_bug.cgi?id=1223119
* https://bugzilla.suse.com/show_bug.cgi?id=1223140
* https://bugzilla.suse.com/show_bug.cgi?id=1223187
* https://bugzilla.suse.com/show_bug.cgi?id=1223189
* https://bugzilla.suse.com/show_bug.cgi?id=1223190
* https://bugzilla.suse.com/show_bug.cgi?id=1223191
* https://bugzilla.suse.com/show_bug.cgi?id=1223196
* https://bugzilla.suse.com/show_bug.cgi?id=1223197
* https://bugzilla.suse.com/show_bug.cgi?id=1223198
* https://bugzilla.suse.com/show_bug.cgi?id=1223207
* https://bugzilla.suse.com/show_bug.cgi?id=1223275
* https://bugzilla.suse.com/show_bug.cgi?id=1223323
* https://bugzilla.suse.com/show_bug.cgi?id=1223360
* https://bugzilla.suse.com/show_bug.cgi?id=1223369
* https://bugzilla.suse.com/show_bug.cgi?id=1223380
* https://bugzilla.suse.com/show_bug.cgi?id=1223432
* https://bugzilla.suse.com/show_bug.cgi?id=1223473
* https://bugzilla.suse.com/show_bug.cgi?id=1223474
* https://bugzilla.suse.com/show_bug.cgi?id=1223475
* https://bugzilla.suse.com/show_bug.cgi?id=1223477
* https://bugzilla.suse.com/show_bug.cgi?id=1223478
* https://bugzilla.suse.com/show_bug.cgi?id=1223479
* https://bugzilla.suse.com/show_bug.cgi?id=1223481
* https://bugzilla.suse.com/show_bug.cgi?id=1223482
* https://bugzilla.suse.com/show_bug.cgi?id=1223484
* https://bugzilla.suse.com/show_bug.cgi?id=1223487
* https://bugzilla.suse.com/show_bug.cgi?id=1223490
* https://bugzilla.suse.com/show_bug.cgi?id=1223496
* https://bugzilla.suse.com/show_bug.cgi?id=1223498
* https://bugzilla.suse.com/show_bug.cgi?id=1223499
* https://bugzilla.suse.com/show_bug.cgi?id=1223501
* https://bugzilla.suse.com/show_bug.cgi?id=1223502
* https://bugzilla.suse.com/show_bug.cgi?id=1223503
* https://bugzilla.suse.com/show_bug.cgi?id=1223505
* https://bugzilla.suse.com/show_bug.cgi?id=1223509
* https://bugzilla.suse.com/show_bug.cgi?id=1223511
* https://bugzilla.suse.com/show_bug.cgi?id=1223512
* https://bugzilla.suse.com/show_bug.cgi?id=1223513
* https://bugzilla.suse.com/show_bug.cgi?id=1223516
* https://bugzilla.suse.com/show_bug.cgi?id=1223517
* https://bugzilla.suse.com/show_bug.cgi?id=1223518
* https://bugzilla.suse.com/show_bug.cgi?id=1223519
* https://bugzilla.suse.com/show_bug.cgi?id=1223520
* https://bugzilla.suse.com/show_bug.cgi?id=1223522
* https://bugzilla.suse.com/show_bug.cgi?id=1223523
* https://bugzilla.suse.com/show_bug.cgi?id=1223525
* https://bugzilla.suse.com/show_bug.cgi?id=1223536
* https://bugzilla.suse.com/show_bug.cgi?id=1223539
* https://bugzilla.suse.com/show_bug.cgi?id=1223574
* https://bugzilla.suse.com/show_bug.cgi?id=1223595
* https://bugzilla.suse.com/show_bug.cgi?id=1223598
* https://bugzilla.suse.com/show_bug.cgi?id=1223628
* https://bugzilla.suse.com/show_bug.cgi?id=1223634
* https://bugzilla.suse.com/show_bug.cgi?id=1223640
* https://bugzilla.suse.com/show_bug.cgi?id=1223643
* https://bugzilla.suse.com/show_bug.cgi?id=1223644
* https://bugzilla.suse.com/show_bug.cgi?id=1223645
* https://bugzilla.suse.com/show_bug.cgi?id=1223646
* https://bugzilla.suse.com/show_bug.cgi?id=1223648
* https://bugzilla.suse.com/show_bug.cgi?id=1223655
* https://bugzilla.suse.com/show_bug.cgi?id=1223657
* https://bugzilla.suse.com/show_bug.cgi?id=1223660
* https://bugzilla.suse.com/show_bug.cgi?id=1223661
* https://bugzilla.suse.com/show_bug.cgi?id=1223663
* https://bugzilla.suse.com/show_bug.cgi?id=1223664
* https://bugzilla.suse.com/show_bug.cgi?id=1223668
* https://bugzilla.suse.com/show_bug.cgi?id=1223670
* https://bugzilla.suse.com/show_bug.cgi?id=1223679
* https://bugzilla.suse.com/show_bug.cgi?id=1223686
* https://bugzilla.suse.com/show_bug.cgi?id=1223693
* https://bugzilla.suse.com/show_bug.cgi?id=1223705
* https://bugzilla.suse.com/show_bug.cgi?id=1223714
* https://bugzilla.suse.com/show_bug.cgi?id=1223735
* https://bugzilla.suse.com/show_bug.cgi?id=1223738
* https://bugzilla.suse.com/show_bug.cgi?id=1223745
* https://bugzilla.suse.com/show_bug.cgi?id=1223784
* https://bugzilla.suse.com/show_bug.cgi?id=1223785
* https://bugzilla.suse.com/show_bug.cgi?id=1223790
* https://bugzilla.suse.com/show_bug.cgi?id=1223816
* https://bugzilla.suse.com/show_bug.cgi?id=1223821
* https://bugzilla.suse.com/show_bug.cgi?id=1223822
* https://bugzilla.suse.com/show_bug.cgi?id=1223823
* https://bugzilla.suse.com/show_bug.cgi?id=1223824
* https://bugzilla.suse.com/show_bug.cgi?id=1223827
* https://bugzilla.suse.com/show_bug.cgi?id=1223834
* https://bugzilla.suse.com/show_bug.cgi?id=1223858
* https://bugzilla.suse.com/show_bug.cgi?id=1223875
* https://bugzilla.suse.com/show_bug.cgi?id=1223876
* https://bugzilla.suse.com/show_bug.cgi?id=1223877
* https://bugzilla.suse.com/show_bug.cgi?id=1223878
* https://bugzilla.suse.com/show_bug.cgi?id=1223879
* https://bugzilla.suse.com/show_bug.cgi?id=1223894
* https://bugzilla.suse.com/show_bug.cgi?id=1223921
* https://bugzilla.suse.com/show_bug.cgi?id=1223922
* https://bugzilla.suse.com/show_bug.cgi?id=1223923
* https://bugzilla.suse.com/show_bug.cgi?id=1223924
* https://bugzilla.suse.com/show_bug.cgi?id=1223929
* https://bugzilla.suse.com/show_bug.cgi?id=1223931
* https://bugzilla.suse.com/show_bug.cgi?id=1223932
* https://bugzilla.suse.com/show_bug.cgi?id=1223934
* https://bugzilla.suse.com/show_bug.cgi?id=1223941
* https://bugzilla.suse.com/show_bug.cgi?id=1223948
* https://bugzilla.suse.com/show_bug.cgi?id=1223949
* https://bugzilla.suse.com/show_bug.cgi?id=1223950
* https://bugzilla.suse.com/show_bug.cgi?id=1223951
* https://bugzilla.suse.com/show_bug.cgi?id=1223952
* https://bugzilla.suse.com/show_bug.cgi?id=1223953
* https://bugzilla.suse.com/show_bug.cgi?id=1223956
* https://bugzilla.suse.com/show_bug.cgi?id=1223957
* https://bugzilla.suse.com/show_bug.cgi?id=1223960
* https://bugzilla.suse.com/show_bug.cgi?id=1223962
* https://bugzilla.suse.com/show_bug.cgi?id=1223963
* https://bugzilla.suse.com/show_bug.cgi?id=1223964
* https://bugzilla.suse.com/show_bug.cgi?id=1223996
* https://jira.suse.com/browse/PED-7167


--===============1844116317650960904==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for the Linux Kernel</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:1644-1</td>
</tr>

<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1141539">bsc#1141539</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1190576">bsc#1190576</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1192145">bsc#1192145</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1192837">bsc#1192837</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1193629">bsc#1193629</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1196869">bsc#1196869</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1200313">bsc#1200313</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1201308">bsc#1201308</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1201489">bsc#1201489</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1203906">bsc#1203906</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1203935">bsc#1203935</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1204614">bsc#1204614</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207361">bsc#1207361</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1211592">bsc#1211592</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213573">bsc#1213573</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217339">bsc#1217339</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217408">bsc#1217408</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218562">bsc#1218562</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218917">bsc#1218917</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219104">bsc#1219104</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219126">bsc#1219126</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219141">bsc#1219141</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219169">bsc#1219169</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219170">bsc#1219170</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219264">bsc#1219264</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220342">bsc#1220342</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220569">bsc#1220569</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220761">bsc#1220761</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221042">bsc#1221042</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221044">bsc#1221044</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221080">bsc#1221080</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221084">bsc#1221084</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221088">bsc#1221088</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221299">bsc#1221299</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221612">bsc#1221612</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221617">bsc#1221617</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221645">bsc#1221645</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221825">bsc#1221825</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222294">bsc#1222294</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222307">bsc#1222307</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222357">bsc#1222357</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222368">bsc#1222368</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222379">bsc#1222379</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222385">bsc#1222385</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222424">bsc#1222424</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222430">bsc#1222430</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222435">bsc#1222435</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222482">bsc#1222482</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222559">bsc#1222559</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222585">bsc#1222585</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222613">bsc#1222613</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222615">bsc#1222615</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222618">bsc#1222618</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222624">bsc#1222624</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222666">bsc#1222666</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222669">bsc#1222669</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222671">bsc#1222671</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222703">bsc#1222703</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222704">bsc#1222704</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222709">bsc#1222709</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222710">bsc#1222710</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222721">bsc#1222721</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222726">bsc#1222726</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222773">bsc#1222773</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222776">bsc#1222776</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222785">bsc#1222785</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222787">bsc#1222787</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222790">bsc#1222790</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222791">bsc#1222791</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222792">bsc#1222792</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222793">bsc#1222793</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222796">bsc#1222796</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222812">bsc#1222812</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222824">bsc#1222824</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222829">bsc#1222829</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222832">bsc#1222832</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222836">bsc#1222836</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222838">bsc#1222838</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222866">bsc#1222866</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222867">bsc#1222867</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222869">bsc#1222869</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222870">bsc#1222870</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222876">bsc#1222876</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222878">bsc#1222878</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222879">bsc#1222879</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222881">bsc#1222881</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222883">bsc#1222883</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222888">bsc#1222888</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222894">bsc#1222894</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222901">bsc#1222901</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222968">bsc#1222968</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222976">bsc#1222976</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223012">bsc#1223012</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223014">bsc#1223014</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223016">bsc#1223016</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223024">bsc#1223024</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223033">bsc#1223033</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223034">bsc#1223034</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223035">bsc#1223035</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223036">bsc#1223036</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223037">bsc#1223037</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223041">bsc#1223041</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223042">bsc#1223042</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223051">bsc#1223051</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223052">bsc#1223052</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223056">bsc#1223056</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223057">bsc#1223057</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223058">bsc#1223058</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223060">bsc#1223060</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223061">bsc#1223061</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223065">bsc#1223065</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223066">bsc#1223066</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223076">bsc#1223076</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223078">bsc#1223078</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223111">bsc#1223111</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223115">bsc#1223115</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223118">bsc#1223118</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223119">bsc#1223119</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223140">bsc#1223140</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223187">bsc#1223187</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223189">bsc#1223189</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223190">bsc#1223190</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223191">bsc#1223191</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223196">bsc#1223196</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223197">bsc#1223197</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223198">bsc#1223198</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223207">bsc#1223207</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223275">bsc#1223275</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223323">bsc#1223323</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223360">bsc#1223360</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223369">bsc#1223369</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223380">bsc#1223380</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223432">bsc#1223432</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223473">bsc#1223473</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223474">bsc#1223474</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223475">bsc#1223475</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223477">bsc#1223477</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223478">bsc#1223478</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223479">bsc#1223479</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223481">bsc#1223481</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223482">bsc#1223482</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223484">bsc#1223484</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223487">bsc#1223487</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223490">bsc#1223490</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223496">bsc#1223496</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223498">bsc#1223498</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223499">bsc#1223499</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223501">bsc#1223501</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223502">bsc#1223502</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223503">bsc#1223503</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223505">bsc#1223505</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223509">bsc#1223509</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223511">bsc#1223511</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223512">bsc#1223512</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223513">bsc#1223513</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223516">bsc#1223516</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223517">bsc#1223517</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223518">bsc#1223518</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223519">bsc#1223519</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223520">bsc#1223520</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223522">bsc#1223522</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223523">bsc#1223523</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223525">bsc#1223525</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223536">bsc#1223536</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223539">bsc#1223539</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223574">bsc#1223574</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223595">bsc#1223595</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223598">bsc#1223598</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223628">bsc#1223628</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223634">bsc#1223634</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223640">bsc#1223640</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223643">bsc#1223643</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223644">bsc#1223644</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223645">bsc#1223645</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223646">bsc#1223646</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223648">bsc#1223648</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223655">bsc#1223655</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223657">bsc#1223657</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223660">bsc#1223660</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223661">bsc#1223661</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223663">bsc#1223663</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223664">bsc#1223664</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223668">bsc#1223668</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223670">bsc#1223670</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223679">bsc#1223679</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223686">bsc#1223686</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223693">bsc#1223693</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223705">bsc#1223705</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223714">bsc#1223714</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223735">bsc#1223735</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223738">bsc#1223738</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223745">bsc#1223745</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223784">bsc#1223784</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223785">bsc#1223785</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223790">bsc#1223790</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223816">bsc#1223816</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223821">bsc#1223821</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223822">bsc#1223822</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223823">bsc#1223823</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223824">bsc#1223824</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223827">bsc#1223827</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223834">bsc#1223834</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223858">bsc#1223858</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223875">bsc#1223875</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223876">bsc#1223876</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223877">bsc#1223877</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223878">bsc#1223878</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223879">bsc#1223879</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223894">bsc#1223894</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223921">bsc#1223921</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223922">bsc#1223922</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223923">bsc#1223923</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223924">bsc#1223924</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223929">bsc#1223929</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223931">bsc#1223931</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223932">bsc#1223932</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223934">bsc#1223934</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223941">bsc#1223941</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223948">bsc#1223948</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223949">bsc#1223949</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223950">bsc#1223950</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223951">bsc#1223951</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223952">bsc#1223952</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223953">bsc#1223953</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223956">bsc#1223956</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223957">bsc#1223957</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223960">bsc#1223960</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223962">bsc#1223962</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223963">bsc#1223963</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223964">bsc#1223964</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223996">bsc#1223996</a>
</li>


<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-7167">jsc#PED-7167</a>
</li>

</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47047.html">CVE-2021-47047</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47184.html">CVE-2021-47184</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47185.html">CVE-2021-47185</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47187.html">CVE-2021-47187</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47188.html">CVE-2021-47188</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47191.html">CVE-2021-47191</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47192.html">CVE-2021-47192</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47193.html">CVE-2021-47193</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47194.html">CVE-2021-47194</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47195.html">CVE-2021-47195</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47196.html">CVE-2021-47196</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47197.html">CVE-2021-47197</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47198.html">CVE-2021-47198</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47199.html">CVE-2021-47199</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47200.html">CVE-2021-47200</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47201.html">CVE-2021-47201</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47202.html">CVE-2021-47202</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47203.html">CVE-2021-47203</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47204.html">CVE-2021-47204</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47205.html">CVE-2021-47205</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47206.html">CVE-2021-47206</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47207.html">CVE-2021-47207</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47209.html">CVE-2021-47209</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47210.html">CVE-2021-47210</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47211.html">CVE-2021-47211</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47212.html">CVE-2021-47212</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47214.html">CVE-2021-47214</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47215.html">CVE-2021-47215</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47216.html">CVE-2021-47216</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47217.html">CVE-2021-47217</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47218.html">CVE-2021-47218</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47219.html">CVE-2021-47219</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48631.html">CVE-2022-48631</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48632.html">CVE-2022-48632</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48634.html">CVE-2022-48634</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48636.html">CVE-2022-48636</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48637.html">CVE-2022-48637</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48638.html">CVE-2022-48638</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48639.html">CVE-2022-48639</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48640.html">CVE-2022-48640</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48642.html">CVE-2022-48642</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48644.html">CVE-2022-48644</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48646.html">CVE-2022-48646</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48647.html">CVE-2022-48647</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48648.html">CVE-2022-48648</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48650.html">CVE-2022-48650</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48651.html">CVE-2022-48651</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48652.html">CVE-2022-48652</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48653.html">CVE-2022-48653</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48654.html">CVE-2022-48654</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48655.html">CVE-2022-48655</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48656.html">CVE-2022-48656</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48657.html">CVE-2022-48657</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48658.html">CVE-2022-48658</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48659.html">CVE-2022-48659</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48660.html">CVE-2022-48660</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48662.html">CVE-2022-48662</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48663.html">CVE-2022-48663</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48667.html">CVE-2022-48667</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48668.html">CVE-2022-48668</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48671.html">CVE-2022-48671</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48672.html">CVE-2022-48672</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48673.html">CVE-2022-48673</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48675.html">CVE-2022-48675</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48686.html">CVE-2022-48686</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48687.html">CVE-2022-48687</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48688.html">CVE-2022-48688</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48690.html">CVE-2022-48690</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48692.html">CVE-2022-48692</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48693.html">CVE-2022-48693</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48694.html">CVE-2022-48694</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48695.html">CVE-2022-48695</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48697.html">CVE-2022-48697</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48698.html">CVE-2022-48698</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48699.html">CVE-2022-48699</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48700.html">CVE-2022-48700</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48701.html">CVE-2022-48701</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48702.html">CVE-2022-48702</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48703.html">CVE-2022-48703</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48704.html">CVE-2022-48704</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-2860.html">CVE-2023-2860</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52585.html">CVE-2023-52585</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52589.html">CVE-2023-52589</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52590.html">CVE-2023-52590</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52591.html">CVE-2023-52591</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52593.html">CVE-2023-52593</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52614.html">CVE-2023-52614</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52616.html">CVE-2023-52616</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52620.html">CVE-2023-52620</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52635.html">CVE-2023-52635</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52645.html">CVE-2023-52645</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52646.html">CVE-2023-52646</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52652.html">CVE-2023-52652</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-6270.html">CVE-2023-6270</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-0639.html">CVE-2024-0639</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-0841.html">CVE-2024-0841</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-2201.html">CVE-2024-2201</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-22099.html">CVE-2024-22099</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-23307.html">CVE-2024-23307</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-23848.html">CVE-2024-23848</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-23850.html">CVE-2024-23850</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26601.html">CVE-2024-26601</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26610.html">CVE-2024-26610</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26656.html">CVE-2024-26656</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26671.html">CVE-2024-26671</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26673.html">CVE-2024-26673</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26675.html">CVE-2024-26675</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26679.html">CVE-2024-26679</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26687.html">CVE-2024-26687</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26688.html">CVE-2024-26688</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26700.html">CVE-2024-26700</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26702.html">CVE-2024-26702</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26733.html">CVE-2024-26733</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26739.html">CVE-2024-26739</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26764.html">CVE-2024-26764</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26766.html">CVE-2024-26766</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26772.html">CVE-2024-26772</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26773.html">CVE-2024-26773</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26783.html">CVE-2024-26783</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26791.html">CVE-2024-26791</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26792.html">CVE-2024-26792</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26816.html">CVE-2024-26816</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26817.html">CVE-2024-26817</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26820.html">CVE-2024-26820</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26825.html">CVE-2024-26825</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26830.html">CVE-2024-26830</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26833.html">CVE-2024-26833</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26836.html">CVE-2024-26836</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26840.html">CVE-2024-26840</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26843.html">CVE-2024-26843</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26852.html">CVE-2024-26852</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26853.html">CVE-2024-26853</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26855.html">CVE-2024-26855</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26856.html">CVE-2024-26856</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26857.html">CVE-2024-26857</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26861.html">CVE-2024-26861</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26862.html">CVE-2024-26862</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26866.html">CVE-2024-26866</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26872.html">CVE-2024-26872</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26875.html">CVE-2024-26875</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26876.html">CVE-2024-26876</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26877.html">CVE-2024-26877</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26878.html">CVE-2024-26878</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26879.html">CVE-2024-26879</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26881.html">CVE-2024-26881</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26882.html">CVE-2024-26882</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26883.html">CVE-2024-26883</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26884.html">CVE-2024-26884</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26885.html">CVE-2024-26885</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26891.html">CVE-2024-26891</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26893.html">CVE-2024-26893</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26895.html">CVE-2024-26895</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26896.html">CVE-2024-26896</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26897.html">CVE-2024-26897</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26898.html">CVE-2024-26898</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26901.html">CVE-2024-26901</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26903.html">CVE-2024-26903</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26915.html">CVE-2024-26915</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26917.html">CVE-2024-26917</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26927.html">CVE-2024-26927</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26933.html">CVE-2024-26933</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26939.html">CVE-2024-26939</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26948.html">CVE-2024-26948</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26950.html">CVE-2024-26950</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26951.html">CVE-2024-26951</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26955.html">CVE-2024-26955</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26956.html">CVE-2024-26956</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26960.html">CVE-2024-26960</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26965.html">CVE-2024-26965</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26966.html">CVE-2024-26966</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26969.html">CVE-2024-26969</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26970.html">CVE-2024-26970</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26972.html">CVE-2024-26972</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26979.html">CVE-2024-26979</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26981.html">CVE-2024-26981</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26982.html">CVE-2024-26982</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26993.html">CVE-2024-26993</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27013.html">CVE-2024-27013</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27014.html">CVE-2024-27014</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27030.html">CVE-2024-27030</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27038.html">CVE-2024-27038</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27039.html">CVE-2024-27039</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27041.html">CVE-2024-27041</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27042.html">CVE-2024-27042</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27043.html">CVE-2024-27043</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27046.html">CVE-2024-27046</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27056.html">CVE-2024-27056</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27059.html">CVE-2024-27059</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27062.html">CVE-2024-27062</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27389.html">CVE-2024-27389</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47184</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47185</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47187</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47188</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47191</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47193</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47193</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47194</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47194</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47195</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47195</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47196</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47197</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47198</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47198</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47199</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47200</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47201</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47202</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47203</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47204</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47205</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47206</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47207</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47209</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47210</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47211</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47212</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47214</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47215</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47216</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47217</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47218</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47219</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48631</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48632</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48634</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48636</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48637</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48638</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48639</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48640</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48642</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48644</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48646</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48647</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48648</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48650</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48651</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48652</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48653</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48654</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48655</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48655</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48656</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48657</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48658</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48658</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48659</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48659</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48660</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48660</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48662</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48662</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48663</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48667</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48668</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48671</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48672</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48673</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48675</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48686</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48687</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48688</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48690</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48692</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48693</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48694</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48695</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48697</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48698</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48699</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48700</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48701</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48702</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48703</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48704</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-2860</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-2860</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52585</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52589</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52590</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52591</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52593</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52614</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52616</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52620</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52635</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52645</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52645</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52646</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52652</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-6270</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-6270</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-0639</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-0639</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-0841</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-0841</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-2201</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-22099</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-22099</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23307</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23307</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23848</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23848</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23850</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23850</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26601</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26601</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26610</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26656</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26671</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26673</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26675</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26679</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26687</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26688</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26700</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26702</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26733</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26739</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26764</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26766</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26772</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26773</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26783</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26791</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26792</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26816</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26817</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26820</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26825</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26830</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26833</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26836</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26840</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26843</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26852</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26853</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26855</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26856</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26857</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26861</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26862</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26866</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26872</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26875</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26876</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26877</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26878</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26879</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26881</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26881</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26882</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26882</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26883</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26883</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26884</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26884</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26885</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26885</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26891</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26893</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26895</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26896</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26897</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26898</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26898</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26901</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26901</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26903</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26903</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26915</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26917</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26927</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26933</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26939</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26948</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26950</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26951</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26955</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26956</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26960</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26965</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26966</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26969</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26970</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26972</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26979</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26981</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26982</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26993</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27013</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27014</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27030</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27038</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27039</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27041</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27042</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27043</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27046</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27056</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27059</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27062</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27389</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">openSUSE Leap
15.5</li>

<li class="list-group-item">Public Cloud
Module 15-SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP5</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves 190 vulnerabilities, contains one feature
and has 41 security fixes can now be installed.</p>





<h2>Description:</h2>

<p>The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to
receive various security bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2024-27389: Fixed pstore inode handling with d_invalidate()
(bsc#1223705).</li>
<li>CVE-2024-27062: Fixed nouveau lock inside client object tree
(bsc#1223834).</li>
<li>CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue
exists (bsc#1223822).</li>
<li>CVE-2024-27046: Fixed nfp/flower handling acti_netdevs allocation
failure (bsc#1223827).</li>
<li>CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different
places (bsc#1223824).</li>
<li>CVE-2024-27042: Fixed drm/amdgpu for potential out-of-bounds access
in amdgpu_discovery_reg_base_init() (bsc#1223823).</li>
<li>CVE-2024-27041: Fixed drm/amd/display NULL checks for
adev-&gt;dm.dc in amdgpu_dm_fini() (bsc#1223714).</li>
<li>CVE-2024-27039: Fixed clk/hisilicon/hi3559a an erroneous devm_kfree()
(bsc#1223821).</li>
<li>CVE-2024-27038: Fixed clk_core_get NULL pointer dereference
(bsc#1223816).</li>
<li>CVE-2024-27030: Fixed octeontx2-af to use separate handlers for
interrupts (bsc#1223790).</li>
<li>CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling
aRFS (bsc#1223735).</li>
<li>CVE-2024-27013: Fixed tun limit printing rate when illegal packet
received by tun device (bsc#1223745).</li>
<li>CVE-2024-26993: Fixed fs/sysfs reference leak in
sysfs_break_active_protection() (bsc#1223693).</li>
<li>CVE-2024-26982: Fixed Squashfs inode number check not to be an
invalid value of zero (bsc#1223634).</li>
<li>CVE-2024-26970: Fixed clk/qcom/gcc-ipq6018 termination of frequency
table arrays (bsc#1223644).</li>
<li>CVE-2024-26969: Fixed clk/qcom/gcc-ipq8074 termination of frequency
table arrays (bsc#1223645).</li>
<li>CVE-2024-26966: Fixed clk/qcom/mmcc-apq8084 termination of frequency
table arrays (bsc#1223646).</li>
<li>CVE-2024-26965: Fixed clk/qcom/mmcc-msm8974 termination of frequency
table arrays (bsc#1223648).</li>
<li>CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and
swapoff() (bsc#1223655).</li>
<li>CVE-2024-26951: Fixed wireguard/netlink check for dangling peer via
is_dead instead of empty list (bsc#1223660).</li>
<li>CVE-2024-26950: Fixed wireguard/netlink to access device through ctx
instead of peer (bsc#1223661).</li>
<li>CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check
in dc_state_release (bsc#1223664).</li>
<li>CVE-2024-26939: Fixed drm/i915/vma UAF on destroy against retire race
(bsc#1223679).</li>
<li>CVE-2024-26927: Fixed ASoC/SOF bounds checking to firmware data
Smatch (bsc#1223525).</li>
<li>CVE-2024-26915: Fixed drm/amdgpu reset IH OVERFLOW_CLEAR bit
(bsc#1223207).</li>
<li>CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to
prevent kernel-infoleak (bsc#1223198).</li>
<li>CVE-2024-26898: Fixed aoe potential use-after-free problem in
aoecmd_cfg_pkts (bsc#1223016).</li>
<li>CVE-2024-26896: Fixed wifi/wfx memory leak when starting AP
(bsc#1223042).</li>
<li>CVE-2024-26893: Fixed firmware/arm_scmi for possible double free in
SMC transport cleanup path (bsc#1223196).</li>
<li>CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches
(bsc#1223190).</li>
<li>CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches
(bsc#1223189).</li>
<li>CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches
(bsc#1223035).</li>
<li>CVE-2024-26882: Fixed net/ip_tunnel to make sure to pull inner header
in ip_tunnel_rcv() (bsc#1223034).</li>
<li>CVE-2024-26881: Fixed net/hns3 kernel crash when 1588 is received on
HIP08 devices (bsc#1223041).</li>
<li>CVE-2024-26879: Fixed clk/meson by adding missing clocks to
axg_clk_regmaps (bsc#1223066).</li>
<li>CVE-2024-26878: Fixed quota for potential NULL pointer dereference
(bsc#1223060).</li>
<li>CVE-2024-26876: Fixed drm/bridge/adv7511 crash on irq during probe
(bsc#1223119).</li>
<li>CVE-2024-26866: Fixed spi/spi-fsl-lpspi by removing redundant
spi_controller_put call (bsc#1223024).</li>
<li>CVE-2024-26862: Fixed packet annotate data-races around
ignore_outgoing (bsc#1223111).</li>
<li>CVE-2024-26861: Fixed wireguard/receive annotate data-race around
receiving_counter.counter (bsc#1223076).</li>
<li>CVE-2024-26857: Fixed geneve to make sure to pull inner header in
geneve_rx() (bsc#1223058).</li>
<li>CVE-2024-26856: Fixed use-after-free inside sparx5_del_mact_entry
(bsc#1223052).</li>
<li>CVE-2024-26855: Fixed net/ice potential NULL pointer dereference in
ice_bridge_setlink() (bsc#1223051).</li>
<li>CVE-2024-26853: Fixed igc returning frame twice in XDP_REDIRECT
(bsc#1223061).</li>
<li>CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in
ip6_route_mpath_notify() (bsc#1223057).</li>
<li>CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache()
(bsc#1222976).</li>
<li>CVE-2024-26836: Fixed platform/x86/think-lmi password opcode ordering
for workstations (bsc#1222968).</li>
<li>CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove
administratively set MAC (bsc#1223012).</li>
<li>CVE-2024-26817: Fixed amdkfd to use calloc instead of kzalloc to
avoid integer overflow (bsc#1222812).</li>
<li>CVE-2024-26816: Fixed relocations in .notes section when building
with CONFIG_XEN_PV=y by ignoring them (bsc#1222624).</li>
<li>CVE-2024-26791: Fixed btrfs/dev-replace properly validate device
names (bsc#1222793).</li>
<li>CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with
a wrong zone index (bsc#1222615).</li>
<li>CVE-2024-26773: Fixed ext4 block allocation from corrupted group in
ext4_mb_try_best_found() (bsc#1222618).</li>
<li>CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted
group in ext4_mb_find_by_goal() (bsc#1222613).</li>
<li>CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs()
(bsc#1222726).</li>
<li>CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct
aio_kiocb conversion (bsc#1222721).</li>
<li>CVE-2024-26733: Fixed an overflow in arp_req_get() in arp
(bsc#1222585).</li>
<li>CVE-2024-26700: Fixed drm/amd/display MST Null pointer dereference
for RV (bsc#1222870).</li>
<li>CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup
(bsc#1222435).</li>
<li>CVE-2024-26679: Fixed inet read sk-&gt;sk_family once in
inet_recv_error() (bsc#1222385).</li>
<li>CVE-2024-26675: Fixed ppp_async to limit MRU to 64K
(bsc#1222379).</li>
<li>CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol
sanitization (bsc#1222368).</li>
<li>CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race
(bsc#1222357).</li>
<li>CVE-2024-26656: Fixed drm/amdgpu use-after-free bug
(bsc#1222307).</li>
<li>CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi
(bsc#1221299).</li>
<li>CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit
replay (bsc#1220342).</li>
<li>CVE-2024-23850: Fixed double free of anonymous device after snapshot
creation failure (bsc#1219126).</li>
<li>CVE-2024-23848: Fixed media/cec for possible use-after-free in
cec_queue_msg_fh (bsc#1219104).</li>
<li>CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in
x86 and ARM md, raid, raid5 modules (bsc#1219169).</li>
<li>CVE-2024-22099: Fixed a null-pointer-dereference in
rfcomm_check_security (bsc#1219170).</li>
<li>CVE-2024-2201: Fixed information leak in x86/BHI
(bsc#1217339).</li>
<li>CVE-2024-0841: Fixed a null pointer dereference in the
hugetlbfs_fill_super function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).</li>
<li>CVE-2024-0639: Fixed a denial-of-service vulnerability due to a
deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).</li>
<li>CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts
(bsc#1218562).</li>
<li>CVE-2023-52652: Fixed NTB for possible name leak in
ntb_register_device() (bsc#1223686).</li>
<li>CVE-2023-52645: Fixed pmdomain/mediatek race conditions with genpd
(bsc#1223033).</li>
<li>CVE-2023-52635: Fixed PM/devfreq to synchronize
devfreq_monitor_[start/stop] (bsc#1222294).</li>
<li>CVE-2023-52620: Fixed netfilter/nf_tables to disallow timeout for
anonymous sets never used from userspace (bsc#1221825).</li>
<li>CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in
mpi_ec_init (bsc#1221612).</li>
<li>CVE-2023-52614: Fixed PM/devfreq buffer overflow in trans_stat_show
(bsc#1221617).</li>
<li>CVE-2023-52593: Fixed wifi/wfx possible NULL pointer dereference in
wfx_set_mfp_ap() (bsc#1221042).</li>
<li>CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via
directory renaming (bsc#1221044).</li>
<li>CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via
directory renaming (bsc#1221088).</li>
<li>CVE-2023-52589: Fixed media/rkisp1 IRQ disable race issue
(bsc#1221084).</li>
<li>CVE-2023-52585: Fixed drm/amdgpu for possible NULL pointer
dereference in amdgpu_ras_query_error_status_helper() (bsc#1221080).</li>
<li>CVE-2022-48662: Fixed a general protection fault (GPF) in
i915_perf_open_ioctl (bsc#1223505).</li>
<li>CVE-2022-48659: Fixed mm/slub to return errno if kmalloc() fails
(bsc#1223498).</li>
<li>CVE-2022-48658: Fixed mm/slub to avoid a problem in
flush_cpu_slab()/__free_slab() task context (bsc#1223496).</li>
<li>CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb-&gt;mac_header (bsc#1223513).</li>
<li>CVE-2022-48642: Fixed netfilter/nf_tables percpu memory leak at
nf_tables_addchain() (bsc#1223478).</li>
<li>CVE-2022-48640: Fixed bonding for possible NULL pointer dereference
in bond_rr_gen_slave_id (bsc#1223499).</li>
<li>CVE-2022-48631: Fixed a bug in ext4, when parsing extents where
eh_entries == 0 and eh_depth &gt; 0 (bsc#1223475).</li>
<li>CVE-2021-47214: Fixed hugetlb/userfaultfd during restore reservation
in hugetlb_mcopy_atomic_pte() (bsc#1222710).</li>
<li>CVE-2021-47211: Fixed a null pointer dereference on pointer cs_desc
in usb-audio (bsc#1222869).</li>
<li>CVE-2021-47207: Fixed a null pointer dereference on pointer block in
gus (bsc#1222790).</li>
<li>CVE-2021-47205: Unregistered clocks/resets when unbinding in sunxi-ng
(bsc#1222888).</li>
<li>CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_
functions (bsc#1222878)</li>
<li>CVE-2021-47200: Fixed drm/prime for possible use-after-free in mmap
within drm_gem_ttm_mmap() and drm_gem_ttm_mmap() (bsc#1222838).</li>
<li>CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex
(bsc#1222832).</li>
<li>CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty
tty_buffer (bsc#1222669).</li>
<li>CVE-2021-47184: Fixed NULL pointer dereference on VSI filter sync
(bsc#1222666).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>ALSA: firewire-lib: handle quirk to calculate payload quadlets as
data block counter (stable-fixes).</li>
<li>ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with
ALC269VC (stable-fixes).</li>
<li>ALSA: hda/realtek - Fix inactive headset mic jack
(stable-fixes).</li>
<li>ALSA: hda/realtek: Add quirk for HP SnowWhite laptops
(stable-fixes).</li>
<li>ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU
(stable-fixes).</li>
<li>ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node()
(git-fixes).</li>
<li>ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support
(stable-fixes).</li>
<li>ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support
(stable-fixes).</li>
<li>ALSA: scarlett2: Add correct product series name to messages
(stable-fixes).</li>
<li>ALSA: scarlett2: Add support for Clarett 8Pre USB
(stable-fixes).</li>
<li>ALSA: scarlett2: Default mixer driver to enabled
(stable-fixes).</li>
<li>ALSA: scarlett2: Move USB IDs out from device_info struct
(stable-fixes).</li>
<li>ASoC: meson: axg-card: make links nonatomic (git-fixes).</li>
<li>ASoC: meson: axg-tdm-interface: manage formatters in trigger
(git-fixes).</li>
<li>ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes).</li>
<li>ASoC: soc-core.c: Skip dummy codec when adding platforms
(stable-fixes).</li>
<li>ASoC: tegra: Fix DSPK 16-bit playback (git-fixes).</li>
<li>ASoC: ti: davinci-mcasp: Fix race condition during probe
(git-fixes).</li>
<li>Bluetooth: Add new quirk for broken read key length on ATS2851
(git-fixes).</li>
<li>Bluetooth: Fix TOCTOU in HCI debugfs implementation
(git-fixes).</li>
<li>Bluetooth: Fix memory leak in hci_req_sync_complete()
(git-fixes).</li>
<li>Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old()
(stable-fixes).</li>
<li>Bluetooth: L2CAP: Fix not validating setsockopt user input
(git-fixes).</li>
<li>Bluetooth: RFCOMM: Fix not validating setsockopt user input
(git-fixes).</li>
<li>Bluetooth: SCO: Fix not validating setsockopt user input
(git-fixes).</li>
<li>Bluetooth: add quirk for broken address properties
(git-fixes).</li>
<li>Bluetooth: btintel: Fix null ptr deref in btintel_read_version
(stable-fixes).</li>
<li>Bluetooth: btintel: Fixe build regression (git-fixes).</li>
<li>Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853
(stable-fixes).</li>
<li>Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE
(git-fixes).</li>
<li>Bluetooth: hci_event: set the conn encrypted before conn establishes
(stable-fixes).</li>
<li>Bluetooth: hci_sock: Fix not validating setsockopt user input
(git-fixes).</li>
<li>Bluetooth: qca: fix NULL-deref on non-serdev suspend
(git-fixes).</li>
<li>Documentation: Add missing documentation for EXPORT_OP flags
(stable-fixes).</li>
<li>HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized
dev-&gt;devc (git-fixes).</li>
<li>HID: logitech-dj: allow mice to use all types of reports
(git-fixes).</li>
<li>HID: uhid: Use READ_ONCE()/WRITE_ONCE() for -&gt;running
(stable-fixes).</li>
<li>Input: allocate keycode for Display refresh rate toggle
(stable-fixes).</li>
<li>Input: synaptics-rmi4 - fail probing if memory allocation for
&quot;phys&quot; fails (stable-fixes).</li>
<li>NFC: trf7970a: disable all regulators on removal
(git-fixes).</li>
<li>PCI: rpaphp: Error out on busy status from get-sensor-state
(bsc#1223369 ltc#205888).</li>
<li>RDMA/cm: Print the old state when cm_destroy_id gets timeout
(git-fixes).</li>
<li>Reapply &quot;drm/qxl: simplify qxl_fence_wait&quot;
(stable-fixes).</li>
<li>Revert &quot;ACPI: PM: Block ASUS B1400CEAE from suspend to idle
by default&quot; (stable-fixes).</li>
<li>Revert &quot;drm/qxl: simplify qxl_fence_wait&quot;
(git-fixes).</li>
<li>Revert &quot;ice: Fix ice VF reset during iavf initialization
(jsc#PED-376).&quot; (bsc#1223275)</li>
<li>Revert &quot;usb: cdc-wdm: close race between read and
workqueue&quot; (git-fixes).</li>
<li>Revert &quot;usb: phy: generic: Get the vbus supply&quot;
(git-fixes).</li>
<li>USB: UAS: return ENODEV when submit urbs fail with device not
attached (stable-fixes).</li>
<li>USB: core: Add hub_get() and hub_put() routines
(git-fixes).</li>
<li>USB: core: Fix access violation during port device removal
(git-fixes).</li>
<li>USB: core: Fix deadlock in port &quot;disable&quot; sysfs
attribute (git-fixes).</li>
<li>USB: serial: add device ID for VeriFone adapter
(stable-fixes).</li>
<li>USB: serial: cp210x: add ID for MGP Instruments PDS100
(stable-fixes).</li>
<li>USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M
(stable-fixes).</li>
<li>USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB
(stable-fixes).</li>
<li>USB: serial: option: add Fibocom FM135-GL variants
(stable-fixes).</li>
<li>USB: serial: option: add Lonsung U8300/U9300 product
(stable-fixes).</li>
<li>USB: serial: option: add MeiG Smart SLM320 product
(stable-fixes).</li>
<li>USB: serial: option: add Rolling RW101-GL and RW135-GL support
(stable-fixes).</li>
<li>USB: serial: option: add Telit FN920C04 rmnet compositions
(stable-fixes).</li>
<li>USB: serial: option: add support for Fibocom FM650/FG650
(stable-fixes).</li>
<li>USB: serial: option: support Quectel EM060K sub-models
(stable-fixes).</li>
<li>nfsd: Fixed mount kerberized nfs4 share issue (git-fixes
bsc#1223858).</li>
<li>s390: Fixed kernel backtrack (bsc#1141539 git-fixes).</li>
<li>nfsd: Fixed mount issue with KOTD (bsc#1223380 bsc#1217408
bsc#1223640).</li>
<li>s390: Fixed LPM of lpar failure with error HSCLA2CF in 19th loops
(jsc#PED-542 git-fixes bsc#1213573 ltc#203238).</li>
<li>ahci: asm1064: asm1166: do not limit reported ports
(git-fixes).</li>
<li>ahci: asm1064: correct count of reported ports
(stable-fixes).</li>
<li>arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order
(git-fixes)</li>
<li>arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro
(git-fixes)</li>
<li>arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399
(git-fixes)</li>
<li>arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for
(git-fixes)</li>
<li>arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399
(git-fixes)</li>
<li>arm64: dts: rockchip: fix rk3328 hdmi ports node
(git-fixes)</li>
<li>arm64: dts: rockchip: fix rk3399 hdmi ports node
(git-fixes)</li>
<li>arm64: hibernate: Fix level3 translation fault in swsusp_save()
(git-fixes).</li>
<li>ax25: fix use-after-free bugs caused by ax25_ds_del_timer
(git-fixes).</li>
<li>batman-adv: Avoid infinite loop trying to resize local TT
(git-fixes).</li>
<li>clk: Get runtime PM before walking tree during disable_unused
(git-fixes).</li>
<li>clk: Initialize struct clk_core kref earlier
(stable-fixes).</li>
<li>clk: Mark &#x27;all_lists&#x27; as const
(stable-fixes).</li>
<li>clk: Print an info line before disabling unused clocks
(stable-fixes).</li>
<li>clk: Remove prepare_lock hold assertion in __clk_release()
(git-fixes).</li>
<li>clk: remove extra empty line (stable-fixes).</li>
<li>comedi: vmk80xx: fix incomplete endpoint checking
(git-fixes).</li>
<li>dma: xilinx_dpdma: Fix locking (git-fixes).</li>
<li>dmaengine: idxd: Fix oops during rmmod on single-CPU platforms
(git-fixes).</li>
<li>dmaengine: owl: fix register access functions (git-fixes).</li>
<li>dmaengine: tegra186: Fix residual calculation (git-fixes).</li>
<li>docs: Document the FAN_FS_ERROR event (stable-fixes).</li>
<li>drm-print: add drm_dbg_driver to improve namespace symmetry
(stable-fixes).</li>
<li>drm/amd/display: Do not recursively call manual trigger programming
(stable-fixes).</li>
<li>drm/amd/display: Fix nanosec stat overflow (stable-fixes).</li>
<li>drm/amd/display: fix disable otg wa logic in DCN316
(stable-fixes).</li>
<li>drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11
(stable-fixes).</li>
<li>drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3
(stable-fixes).</li>
<li>drm/amdgpu: Fix leak when GPU memory allocation fails
(stable-fixes).</li>
<li>drm/amdgpu: Reset dGPU if suspend got aborted
(stable-fixes).</li>
<li>drm/amdgpu: always force full reset for SOC21
(stable-fixes).</li>
<li>drm/amdgpu: fix incorrect active rb bitmap for gfx11
(stable-fixes).</li>
<li>drm/amdgpu: fix incorrect number of active RBs for gfx11
(stable-fixes).</li>
<li>drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2
(git-fixes).</li>
<li>drm/amdgpu: validate the parameters of bo mapping operations more
clearly (git-fixes).</li>
<li>drm/amdkfd: Reset GPU on queue preemption failure
(stable-fixes).</li>
<li>drm/ast: Fix soft lockup (git-fixes).</li>
<li>drm/client: Fully protect modes[] with dev-&gt;mode_config.mutex
(stable-fixes).</li>
<li>drm/i915/cdclk: Fix CDCLK programming order when pipes are active
(git-fixes).</li>
<li>drm/i915/vrr: Disable VRR when using bigjoiner
(stable-fixes).</li>
<li>drm/i915: Disable port sync when bigjoiner is used
(stable-fixes).</li>
<li>drm/msm/dp: fix typo in dp_display_handle_port_status_changed()
(git-fixes).</li>
<li>drm/nouveau/nvkm: add a replacement for nvkm_notify
(bsc#1223834)</li>
<li>drm/panel: ili9341: Respect deferred probe (git-fixes).</li>
<li>drm/panel: ili9341: Use predefined error codes
(git-fixes).</li>
<li>drm/panel: visionox-rm69299: do not unregister DSI device
(git-fixes).</li>
<li>drm/vc4: do not check if plane-&gt;state-&gt;fb ==
state-&gt;fb (stable-fixes).</li>
<li>drm/vmwgfx: Enable DMA mappings with SEV (git-fixes).</li>
<li>drm/vmwgfx: Fix crtc&#x27;s atomic check conditional
(git-fixes).</li>
<li>drm/vmwgfx: Fix invalid reads in fence signaled events
(git-fixes).</li>
<li>drm/vmwgfx: Sort primary plane formats by order of preference
(git-fixes).</li>
<li>drm: nv04: Fix out of bounds access (git-fixes).</li>
<li>drm: panel-orientation-quirks: Add quirk for GPD Win Mini
(stable-fixes).</li>
<li>drm: panel-orientation-quirks: Add quirk for Lenovo Legion Go
(stable-fixes).</li>
<li>dump_stack: Do not get cpu_sync for panic CPU
(bsc#1223574).</li>
<li>fbdev: fix incorrect address computation in deferred IO
(git-fixes).</li>
<li>fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2
(stable-fixes).</li>
<li>fbmon: prevent division by zero in fb_videomode_from_videomode()
(stable-fixes).</li>
<li>fuse: do not unhash root (bsc#1223951).</li>
<li>fuse: fix root lookup with nonzero generation
(bsc#1223950).</li>
<li>hwmon: (amc6821) add of_match table (stable-fixes).</li>
<li>i2c: pxa: hide unused icr_bits[] variable (git-fixes).</li>
<li>i2c: smbus: fix NULL function pointer dereference
(git-fixes).</li>
<li>i40e: Fix VF MAC filter removal (git-fixes).</li>
<li>idma64: Do not try to serve interrupts when device is powered off
(git-fixes).</li>
<li>iio: accel: mxc4005: Interrupt handling fixes (git-fixes).</li>
<li>iio:imu: adis16475: Fix sync mode setting (git-fixes).</li>
<li>init/main.c: Fix potential static_command_line memory overflow
(git-fixes).</li>
<li>ipv6/addrconf: fix a potential refcount underflow for idev
(git-fixes).</li>
<li>irqchip/gic-v3-its: Prevent double free on error
(git-fixes).</li>
<li>kprobes: Fix possible use-after-free issue on kprobe registration
(git-fixes).</li>
<li>livepatch: Fix missing newline character in klp_resolve_symbols()
(bsc#1223539).</li>
<li>media: cec: core: remove length check of Timer Status
(stable-fixes).</li>
<li>media: sta2x11: fix irq handler cast (stable-fixes).</li>
<li>mei: me: add arrow lake point H DID (stable-fixes).</li>
<li>mei: me: add arrow lake point S DID (stable-fixes).</li>
<li>mei: me: disable RPL-S on SPS and IGN firmwares
(git-fixes).</li>
<li>mm/vmscan: make sure wakeup_kswapd with managed zone
(bsc#1223473).</li>
<li>mmc: sdhci-msm: pervent access to suspended controller
(git-fixes).</li>
<li>mtd: diskonchip: work around ubsan link failure
(stable-fixes).</li>
<li>net: bridge: vlan: fix memory leak in __allowed_ingress
(git-fixes).</li>
<li>net: fix a memleak when uncloning an skb dst and its metadata
(git-fixes).</li>
<li>net: fix skb leak in __skb_tstamp_tx() (git-fixes).</li>
<li>net: ipv6: ensure we call ipv6_mc_down() at most once
(git-fixes).</li>
<li>net: mld: fix reference count leak in mld_{query | report}_work()
(git-fixes).</li>
<li>net: stream: purge sk_error_queue in sk_stream_kill_queues()
(git-fixes).</li>
<li>net: usb: ax88179_178a: avoid writing the mac address before first
reading (git-fixes).</li>
<li>net: usb: ax88179_178a: stop lying about skb-&gt;truesize
(git-fixes).</li>
<li>net: vlan: fix underflow for the real_dev refcnt
(git-fixes).</li>
<li>net: vmxnet3: Fix NULL pointer dereference in
vmxnet3_rq_rx_complete() (bsc#1223360).</li>
<li>netfilter: br_netfilter: Drop dst references before setting
(git-fixes).</li>
<li>netfilter: ipt_CLUSTERIP: fix refcount leak in clusterip_tg_check()
(git-fixes).</li>
<li>netfilter: nft_ct: fix l3num expectations with inet pseudo family
(git-fixes).</li>
<li>nfsd: use __fput_sync() to avoid delayed closing of files
(bsc#1223380 bsc#1217408).</li>
<li>nilfs2: fix OOB in nilfs_set_de_type (git-fixes).</li>
<li>nilfs2: fix OOB in nilfs_set_de_type (git-fixes).</li>
<li>nouveau: fix function cast warning (git-fixes).</li>
<li>nouveau: fix instmem race condition around ptr stores
(git-fixes).</li>
<li>phy: tegra: xusb: Add API to retrieve the port number of phy
(stable-fixes).</li>
<li>pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs
(stable-fixes).</li>
<li>platform/x86: intel-vbtn: Update tablet mode switch at end of probe
(git-fixes).</li>
<li>platform/x86: touchscreen_dmi: Add an extra entry for a variant of
the Chuwi Vi8 tablet (stable-fixes).</li>
<li>powerpc/kasan: Do not instrument non-maskable or raw interrupts
(bsc#1223191).</li>
<li>powerpc/rtas: define pr_fmt and convert printk call sites
(bsc#1223369 ltc#205888).</li>
<li>powerpc/rtas: export rtas_error_rc() for reuse (bsc#1223369
ltc#205888).</li>
<li>powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645
ltc#205739 bsc#1223191).</li>
<li>powerpc: Refactor verification of MSR_RI (bsc#1223191).</li>
<li>printk: Add this_cpu_in_panic() (bsc#1223574).</li>
<li>printk: Adjust mapping for 32bit seq macros (bsc#1223574).</li>
<li>printk: Avoid non-panic CPUs writing to ringbuffer
(bsc#1223574).</li>
<li>printk: Disable passing console lock owner completely during panic()
(bsc#1223574).</li>
<li>printk: Drop console_sem during panic (bsc#1223574).</li>
<li>printk: Rename abandon_console_lock_in_panic() to
other_cpu_in_panic() (bsc#1223574).</li>
<li>printk: Use prb_first_seq() as base for 32bit seq macros
(bsc#1223574).</li>
<li>printk: Wait for all reserved records with pr_flush()
(bsc#1223574).</li>
<li>printk: nbcon: Relocate 32bit seq macros (bsc#1223574).</li>
<li>printk: ringbuffer: Clarify special lpos values
(bsc#1223574).</li>
<li>printk: ringbuffer: Cleanup reader terminology
(bsc#1223574).</li>
<li>printk: ringbuffer: Do not skip non-finalized records with
prb_next_seq() (bsc#1223574).</li>
<li>printk: ringbuffer: Improve prb_next_seq() performance
(bsc#1223574).</li>
<li>printk: ringbuffer: Skip non-finalized records in panic
(bsc#1223574).</li>
<li>pstore/zone: Add a null pointer check to the psz_kmsg_read
(stable-fixes).</li>
<li>ring-buffer: Only update pages_touched when a new page is touched
(git-fixes).</li>
<li>ring-buffer: use READ_ONCE() to read cpu_buffer-&gt;commit_page
in concurrent environment (git-fixes).</li>
<li>s390/cio: Ensure the copied buf is NUL terminated (git-fixes
bsc#1223875).</li>
<li>s390/decompressor: fix misaligned symbol build error (git-fixes
bsc#1223785).</li>
<li>s390/mm: Fix clearing storage keys for huge pages (git-fixes
bsc#1223877).</li>
<li>s390/mm: Fix storage key clearing for guest huge pages (git-fixes
bsc#1223878).</li>
<li>s390/qeth: Fix kernel panic after setting hsuid (git-fixes
bsc#1223879).</li>
<li>s390/scm: fix virtual vs physical address confusion (git-fixes
bsc#1223784).</li>
<li>s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes
bsc#1223876).</li>
<li>s390/vdso: drop &#x27;-fPIC&#x27; from LDFLAGS (git-fixes
bsc#1223598).</li>
<li>s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes
bsc#1223595).</li>
<li>serial/pmac_zilog: Remove flawed mitigation for rx irq flood
(git-fixes).</li>
<li>serial: core: Provide port lock wrappers (stable-fixes).</li>
<li>serial: core: fix kernel-doc for uart_port_unlock_irqrestore()
(git-fixes).</li>
<li>serial: mxs-auart: add spinlock around changing cts state
(git-fixes).</li>
<li>slimbus: qcom-ngd-ctrl: Add timeout for wait operation
(git-fixes).</li>
<li>speakup: Avoid crash on very long word (git-fixes).</li>
<li>speakup: Fix 8bit characters from direct synth
(git-fixes).</li>
<li>spi: hisi-kunpeng: Delete the dump interface of data registers in
debugfs (git-fixes).</li>
<li>tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp
(git-fixes).</li>
<li>thunderbolt: Avoid notify PM core about runtime PM resume
(stable-fixes).</li>
<li>thunderbolt: Fix wake configurations after device unplug
(stable-fixes).</li>
<li>tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string
(git-fixes).</li>
<li>tracing: Show size of requested perf buffer (git-fixes).</li>
<li>usb: Disable USB3 LPM at shutdown (stable-fixes).</li>
<li>usb: Fix regression caused by invalid ep0 maxpacket in virtual
SuperSpeed device (git-fixes).</li>
<li>usb: dwc2: host: Fix dereference issue in DDMA completion flow
(git-fixes).</li>
<li>usb: dwc3: core: Prevent phy suspend during init
(Git-fixes).</li>
<li>usb: gadget: composite: fix OS descriptors w_value logic
(git-fixes).</li>
<li>usb: gadget: f_fs: Fix a race condition when processing setup packets
(git-fixes).</li>
<li>usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep
transport error (stable-fixes).</li>
<li>usb: gadget: tegra-xudc: Fix USB3 PHY retrieval logic
(git-fixes).</li>
<li>usb: ohci: Prevent missed ohci interrupts (git-fixes).</li>
<li>usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined
(stable-fixes).</li>
<li>usb: typec: tcpci: add generic tcpci fallback compatible
(stable-fixes).</li>
<li>usb: typec: tcpm: Check for port partner validity before consuming it
(git-fixes).</li>
<li>usb: typec: tcpm: unregister existing source caps before
re-registration (bsc#1220569).</li>
<li>usb: typec: ucsi: Ack unsupported commands (stable-fixes).</li>
<li>usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset
(stable-fixes).</li>
<li>usb: typec: ucsi: Fix connector check on init (git-fixes).</li>
<li>usb: udc: remove warning when queue disabled ep
(stable-fixes).</li>
<li>virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal
(bsc#1223949).</li>
<li>wifi: ath9k: fix LNA selection in ath_ant_try_scan()
(stable-fixes).</li>
<li>wifi: iwlwifi: mvm: remove old PASN station when adding a new one
(git-fixes).</li>
<li>wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd
(git-fixes).</li>
<li>wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes
(stable-fixes).</li>
<li>wifi: nl80211: do not free NULL coalescing rule
(git-fixes).</li>
<li>x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES
(git-fixes).</li>
<li>x86/bugs: Fix BHI documentation (git-fixes).</li>
<li>x86/bugs: Fix BHI handling of RRSBA (git-fixes).</li>
<li>x86/bugs: Fix BHI retpoline check (git-fixes).</li>
<li>x86/bugs: Fix return type of spectre_bhi_state()
(git-fixes).</li>
<li>x86/bugs: Rename various &#x27;ia32_cap&#x27; variables to
&#x27;x86_arch_cap_msr&#x27; (git-fixes).</li>
<li>x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ
(git-fixes).</li>
<li>x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type
(jsc#PED-7167 git-fixes).</li>
<li>x86/sev: Skip ROM range scans and validation for SEV-SNP guests
(jsc#PED-7167 git-fixes).</li>
<li>xfrm6: fix inet6_dev refcount underflow problem
(git-fixes).</li>
</ul>




<h2>Special Instructions and Notes:</h2>
<ul>


<li>Please reboot the system after installing this
update.</li>


</ul>


<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
openSUSE Leap 15.5


<br/>
<code>zypper in -t patch
openSUSE-SLE-15.5-2024-1644=1 SUSE-2024-1644=1</code>



</li>

<li class="list-group-item">
Public Cloud Module 15-SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1644=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
openSUSE Leap 15.5 (aarch64 x86_64)
<ul>


<li>cluster-md-kmp-azure-debuginfo-5.14.21-150500.33.51.1</li>


<li>ocfs2-kmp-azure-debuginfo-5.14.21-150500.33.51.1</li>


<li>reiserfs-kmp-azure-5.14.21-150500.33.51.1</li>


<li>kernel-azure-extra-debuginfo-5.14.21-150500.33.51.1</li>


<li>kernel-azure-debuginfo-5.14.21-150500.33.51.1</li>


<li>gfs2-kmp-azure-debuginfo-5.14.21-150500.33.51.1</li>


<li>dlm-kmp-azure-5.14.21-150500.33.51.1</li>


<li>kernel-azure-debugsource-5.14.21-150500.33.51.1</li>


<li>kselftests-kmp-azure-5.14.21-150500.33.51.1</li>


<li>kernel-azure-devel-5.14.21-150500.33.51.1</li>


<li>dlm-kmp-azure-debuginfo-5.14.21-150500.33.51.1</li>


<li>kernel-azure-livepatch-devel-5.14.21-150500.33.51.1</li>


<li>cluster-md-kmp-azure-5.14.21-150500.33.51.1</li>


<li>kernel-azure-extra-5.14.21-150500.33.51.1</li>


<li>kernel-azure-optional-debuginfo-5.14.21-150500.33.51.1</li>


<li>kernel-azure-optional-5.14.21-150500.33.51.1</li>


<li>reiserfs-kmp-azure-debuginfo-5.14.21-150500.33.51.1</li>


<li>kselftests-kmp-azure-debuginfo-5.14.21-150500.33.51.1</li>


<li>ocfs2-kmp-azure-5.14.21-150500.33.51.1</li>


<li>kernel-azure-devel-debuginfo-5.14.21-150500.33.51.1</li>


<li>kernel-syms-azure-5.14.21-150500.33.51.1</li>


<li>gfs2-kmp-azure-5.14.21-150500.33.51.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.5 (aarch64 nosrc x86_64)
<ul>


<li>kernel-azure-5.14.21-150500.33.51.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.5 (x86_64)
<ul>


<li>kernel-azure-vdso-debuginfo-5.14.21-150500.33.51.1</li>


<li>kernel-azure-vdso-5.14.21-150500.33.51.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.5 (noarch)
<ul>


<li>kernel-source-azure-5.14.21-150500.33.51.1</li>


<li>kernel-devel-azure-5.14.21-150500.33.51.1</li>

</ul>
</li>



<li>
Public Cloud Module 15-SP5 (aarch64 nosrc x86_64)
<ul>


<li>kernel-azure-5.14.21-150500.33.51.1</li>

</ul>
</li>

<li>
Public Cloud Module 15-SP5 (aarch64 x86_64)
<ul>


<li>kernel-azure-devel-5.14.21-150500.33.51.1</li>


<li>kernel-azure-debugsource-5.14.21-150500.33.51.1</li>


<li>kernel-azure-debuginfo-5.14.21-150500.33.51.1</li>


<li>kernel-azure-devel-debuginfo-5.14.21-150500.33.51.1</li>


<li>kernel-syms-azure-5.14.21-150500.33.51.1</li>

</ul>
</li>

<li>
Public Cloud Module 15-SP5 (noarch)
<ul>


<li>kernel-source-azure-5.14.21-150500.33.51.1</li>


<li>kernel-devel-azure-5.14.21-150500.33.51.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47047.html">https://www.suse.com/security/cve/CVE-2021-47047.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47184.html">https://www.suse.com/security/cve/CVE-2021-47184.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47185.html">https://www.suse.com/security/cve/CVE-2021-47185.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47187.html">https://www.suse.com/security/cve/CVE-2021-47187.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47188.html">https://www.suse.com/security/cve/CVE-2021-47188.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47191.html">https://www.suse.com/security/cve/CVE-2021-47191.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47192.html">https://www.suse.com/security/cve/CVE-2021-47192.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47193.html">https://www.suse.com/security/cve/CVE-2021-47193.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47194.html">https://www.suse.com/security/cve/CVE-2021-47194.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47195.html">https://www.suse.com/security/cve/CVE-2021-47195.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47196.html">https://www.suse.com/security/cve/CVE-2021-47196.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47197.html">https://www.suse.com/security/cve/CVE-2021-47197.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47198.html">https://www.suse.com/security/cve/CVE-2021-47198.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47199.html">https://www.suse.com/security/cve/CVE-2021-47199.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47200.html">https://www.suse.com/security/cve/CVE-2021-47200.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47201.html">https://www.suse.com/security/cve/CVE-2021-47201.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47202.html">https://www.suse.com/security/cve/CVE-2021-47202.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47203.html">https://www.suse.com/security/cve/CVE-2021-47203.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47204.html">https://www.suse.com/security/cve/CVE-2021-47204.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47205.html">https://www.suse.com/security/cve/CVE-2021-47205.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47206.html">https://www.suse.com/security/cve/CVE-2021-47206.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47207.html">https://www.suse.com/security/cve/CVE-2021-47207.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47209.html">https://www.suse.com/security/cve/CVE-2021-47209.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47210.html">https://www.suse.com/security/cve/CVE-2021-47210.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47211.html">https://www.suse.com/security/cve/CVE-2021-47211.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47212.html">https://www.suse.com/security/cve/CVE-2021-47212.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47214.html">https://www.suse.com/security/cve/CVE-2021-47214.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47215.html">https://www.suse.com/security/cve/CVE-2021-47215.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47216.html">https://www.suse.com/security/cve/CVE-2021-47216.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47217.html">https://www.suse.com/security/cve/CVE-2021-47217.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47218.html">https://www.suse.com/security/cve/CVE-2021-47218.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47219.html">https://www.suse.com/security/cve/CVE-2021-47219.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48631.html">https://www.suse.com/security/cve/CVE-2022-48631.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48632.html">https://www.suse.com/security/cve/CVE-2022-48632.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48634.html">https://www.suse.com/security/cve/CVE-2022-48634.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48636.html">https://www.suse.com/security/cve/CVE-2022-48636.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48637.html">https://www.suse.com/security/cve/CVE-2022-48637.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48638.html">https://www.suse.com/security/cve/CVE-2022-48638.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48639.html">https://www.suse.com/security/cve/CVE-2022-48639.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48640.html">https://www.suse.com/security/cve/CVE-2022-48640.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48642.html">https://www.suse.com/security/cve/CVE-2022-48642.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48644.html">https://www.suse.com/security/cve/CVE-2022-48644.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48646.html">https://www.suse.com/security/cve/CVE-2022-48646.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48647.html">https://www.suse.com/security/cve/CVE-2022-48647.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48648.html">https://www.suse.com/security/cve/CVE-2022-48648.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48650.html">https://www.suse.com/security/cve/CVE-2022-48650.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48651.html">https://www.suse.com/security/cve/CVE-2022-48651.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48652.html">https://www.suse.com/security/cve/CVE-2022-48652.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48653.html">https://www.suse.com/security/cve/CVE-2022-48653.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48654.html">https://www.suse.com/security/cve/CVE-2022-48654.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48655.html">https://www.suse.com/security/cve/CVE-2022-48655.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48656.html">https://www.suse.com/security/cve/CVE-2022-48656.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48657.html">https://www.suse.com/security/cve/CVE-2022-48657.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48658.html">https://www.suse.com/security/cve/CVE-2022-48658.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48659.html">https://www.suse.com/security/cve/CVE-2022-48659.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48660.html">https://www.suse.com/security/cve/CVE-2022-48660.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48662.html">https://www.suse.com/security/cve/CVE-2022-48662.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48663.html">https://www.suse.com/security/cve/CVE-2022-48663.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48667.html">https://www.suse.com/security/cve/CVE-2022-48667.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48668.html">https://www.suse.com/security/cve/CVE-2022-48668.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48671.html">https://www.suse.com/security/cve/CVE-2022-48671.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48672.html">https://www.suse.com/security/cve/CVE-2022-48672.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48673.html">https://www.suse.com/security/cve/CVE-2022-48673.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48675.html">https://www.suse.com/security/cve/CVE-2022-48675.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48686.html">https://www.suse.com/security/cve/CVE-2022-48686.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48687.html">https://www.suse.com/security/cve/CVE-2022-48687.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48688.html">https://www.suse.com/security/cve/CVE-2022-48688.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48690.html">https://www.suse.com/security/cve/CVE-2022-48690.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48692.html">https://www.suse.com/security/cve/CVE-2022-48692.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48693.html">https://www.suse.com/security/cve/CVE-2022-48693.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48694.html">https://www.suse.com/security/cve/CVE-2022-48694.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48695.html">https://www.suse.com/security/cve/CVE-2022-48695.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48697.html">https://www.suse.com/security/cve/CVE-2022-48697.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48698.html">https://www.suse.com/security/cve/CVE-2022-48698.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48699.html">https://www.suse.com/security/cve/CVE-2022-48699.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48700.html">https://www.suse.com/security/cve/CVE-2022-48700.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48701.html">https://www.suse.com/security/cve/CVE-2022-48701.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48702.html">https://www.suse.com/security/cve/CVE-2022-48702.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48703.html">https://www.suse.com/security/cve/CVE-2022-48703.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48704.html">https://www.suse.com/security/cve/CVE-2022-48704.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-2860.html">https://www.suse.com/security/cve/CVE-2023-2860.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52585.html">https://www.suse.com/security/cve/CVE-2023-52585.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52589.html">https://www.suse.com/security/cve/CVE-2023-52589.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52590.html">https://www.suse.com/security/cve/CVE-2023-52590.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52591.html">https://www.suse.com/security/cve/CVE-2023-52591.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52593.html">https://www.suse.com/security/cve/CVE-2023-52593.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52614.html">https://www.suse.com/security/cve/CVE-2023-52614.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52616.html">https://www.suse.com/security/cve/CVE-2023-52616.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52620.html">https://www.suse.com/security/cve/CVE-2023-52620.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52635.html">https://www.suse.com/security/cve/CVE-2023-52635.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52645.html">https://www.suse.com/security/cve/CVE-2023-52645.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52646.html">https://www.suse.com/security/cve/CVE-2023-52646.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52652.html">https://www.suse.com/security/cve/CVE-2023-52652.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-6270.html">https://www.suse.com/security/cve/CVE-2023-6270.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-0639.html">https://www.suse.com/security/cve/CVE-2024-0639.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-0841.html">https://www.suse.com/security/cve/CVE-2024-0841.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-2201.html">https://www.suse.com/security/cve/CVE-2024-2201.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-22099.html">https://www.suse.com/security/cve/CVE-2024-22099.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-23307.html">https://www.suse.com/security/cve/CVE-2024-23307.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-23848.html">https://www.suse.com/security/cve/CVE-2024-23848.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-23850.html">https://www.suse.com/security/cve/CVE-2024-23850.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26601.html">https://www.suse.com/security/cve/CVE-2024-26601.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26610.html">https://www.suse.com/security/cve/CVE-2024-26610.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26656.html">https://www.suse.com/security/cve/CVE-2024-26656.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26671.html">https://www.suse.com/security/cve/CVE-2024-26671.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26673.html">https://www.suse.com/security/cve/CVE-2024-26673.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26675.html">https://www.suse.com/security/cve/CVE-2024-26675.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26679.html">https://www.suse.com/security/cve/CVE-2024-26679.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26687.html">https://www.suse.com/security/cve/CVE-2024-26687.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26688.html">https://www.suse.com/security/cve/CVE-2024-26688.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26700.html">https://www.suse.com/security/cve/CVE-2024-26700.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26702.html">https://www.suse.com/security/cve/CVE-2024-26702.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26733.html">https://www.suse.com/security/cve/CVE-2024-26733.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26739.html">https://www.suse.com/security/cve/CVE-2024-26739.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26764.html">https://www.suse.com/security/cve/CVE-2024-26764.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26766.html">https://www.suse.com/security/cve/CVE-2024-26766.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26772.html">https://www.suse.com/security/cve/CVE-2024-26772.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26773.html">https://www.suse.com/security/cve/CVE-2024-26773.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26783.html">https://www.suse.com/security/cve/CVE-2024-26783.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26791.html">https://www.suse.com/security/cve/CVE-2024-26791.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26792.html">https://www.suse.com/security/cve/CVE-2024-26792.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26816.html">https://www.suse.com/security/cve/CVE-2024-26816.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26817.html">https://www.suse.com/security/cve/CVE-2024-26817.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26820.html">https://www.suse.com/security/cve/CVE-2024-26820.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26825.html">https://www.suse.com/security/cve/CVE-2024-26825.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26830.html">https://www.suse.com/security/cve/CVE-2024-26830.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26833.html">https://www.suse.com/security/cve/CVE-2024-26833.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26836.html">https://www.suse.com/security/cve/CVE-2024-26836.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26840.html">https://www.suse.com/security/cve/CVE-2024-26840.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26843.html">https://www.suse.com/security/cve/CVE-2024-26843.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26852.html">https://www.suse.com/security/cve/CVE-2024-26852.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26853.html">https://www.suse.com/security/cve/CVE-2024-26853.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26855.html">https://www.suse.com/security/cve/CVE-2024-26855.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26856.html">https://www.suse.com/security/cve/CVE-2024-26856.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26857.html">https://www.suse.com/security/cve/CVE-2024-26857.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26861.html">https://www.suse.com/security/cve/CVE-2024-26861.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26862.html">https://www.suse.com/security/cve/CVE-2024-26862.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26866.html">https://www.suse.com/security/cve/CVE-2024-26866.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26872.html">https://www.suse.com/security/cve/CVE-2024-26872.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26875.html">https://www.suse.com/security/cve/CVE-2024-26875.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26876.html">https://www.suse.com/security/cve/CVE-2024-26876.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26877.html">https://www.suse.com/security/cve/CVE-2024-26877.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26878.html">https://www.suse.com/security/cve/CVE-2024-26878.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26879.html">https://www.suse.com/security/cve/CVE-2024-26879.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26881.html">https://www.suse.com/security/cve/CVE-2024-26881.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26882.html">https://www.suse.com/security/cve/CVE-2024-26882.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26883.html">https://www.suse.com/security/cve/CVE-2024-26883.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26884.html">https://www.suse.com/security/cve/CVE-2024-26884.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26885.html">https://www.suse.com/security/cve/CVE-2024-26885.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26891.html">https://www.suse.com/security/cve/CVE-2024-26891.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26893.html">https://www.suse.com/security/cve/CVE-2024-26893.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26895.html">https://www.suse.com/security/cve/CVE-2024-26895.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26896.html">https://www.suse.com/security/cve/CVE-2024-26896.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26897.html">https://www.suse.com/security/cve/CVE-2024-26897.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26898.html">https://www.suse.com/security/cve/CVE-2024-26898.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26901.html">https://www.suse.com/security/cve/CVE-2024-26901.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26903.html">https://www.suse.com/security/cve/CVE-2024-26903.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26915.html">https://www.suse.com/security/cve/CVE-2024-26915.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26917.html">https://www.suse.com/security/cve/CVE-2024-26917.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26927.html">https://www.suse.com/security/cve/CVE-2024-26927.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26933.html">https://www.suse.com/security/cve/CVE-2024-26933.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26939.html">https://www.suse.com/security/cve/CVE-2024-26939.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26948.html">https://www.suse.com/security/cve/CVE-2024-26948.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26950.html">https://www.suse.com/security/cve/CVE-2024-26950.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26951.html">https://www.suse.com/security/cve/CVE-2024-26951.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26955.html">https://www.suse.com/security/cve/CVE-2024-26955.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26956.html">https://www.suse.com/security/cve/CVE-2024-26956.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26960.html">https://www.suse.com/security/cve/CVE-2024-26960.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26965.html">https://www.suse.com/security/cve/CVE-2024-26965.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26966.html">https://www.suse.com/security/cve/CVE-2024-26966.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26969.html">https://www.suse.com/security/cve/CVE-2024-26969.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26970.html">https://www.suse.com/security/cve/CVE-2024-26970.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26972.html">https://www.suse.com/security/cve/CVE-2024-26972.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26979.html">https://www.suse.com/security/cve/CVE-2024-26979.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26981.html">https://www.suse.com/security/cve/CVE-2024-26981.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26982.html">https://www.suse.com/security/cve/CVE-2024-26982.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26993.html">https://www.suse.com/security/cve/CVE-2024-26993.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27013.html">https://www.suse.com/security/cve/CVE-2024-27013.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27014.html">https://www.suse.com/security/cve/CVE-2024-27014.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27030.html">https://www.suse.com/security/cve/CVE-2024-27030.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27038.html">https://www.suse.com/security/cve/CVE-2024-27038.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27039.html">https://www.suse.com/security/cve/CVE-2024-27039.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27041.html">https://www.suse.com/security/cve/CVE-2024-27041.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27042.html">https://www.suse.com/security/cve/CVE-2024-27042.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27043.html">https://www.suse.com/security/cve/CVE-2024-27043.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27046.html">https://www.suse.com/security/cve/CVE-2024-27046.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27056.html">https://www.suse.com/security/cve/CVE-2024-27056.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27059.html">https://www.suse.com/security/cve/CVE-2024-27059.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27062.html">https://www.suse.com/security/cve/CVE-2024-27062.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27389.html">https://www.suse.com/security/cve/CVE-2024-27389.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1141539">https://bugzilla.suse.com/show_bug.cgi?id=1141539</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1190576">https://bugzilla.suse.com/show_bug.cgi?id=1190576</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1192145">https://bugzilla.suse.com/show_bug.cgi?id=1192145</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1192837">https://bugzilla.suse.com/show_bug.cgi?id=1192837</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1193629">https://bugzilla.suse.com/show_bug.cgi?id=1193629</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1196869">https://bugzilla.suse.com/show_bug.cgi?id=1196869</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1200313">https://bugzilla.suse.com/show_bug.cgi?id=1200313</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1201308">https://bugzilla.suse.com/show_bug.cgi?id=1201308</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1201489">https://bugzilla.suse.com/show_bug.cgi?id=1201489</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1203906">https://bugzilla.suse.com/show_bug.cgi?id=1203906</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1203935">https://bugzilla.suse.com/show_bug.cgi?id=1203935</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1204614">https://bugzilla.suse.com/show_bug.cgi?id=1204614</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207361">https://bugzilla.suse.com/show_bug.cgi?id=1207361</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1211592">https://bugzilla.suse.com/show_bug.cgi?id=1211592</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213573">https://bugzilla.suse.com/show_bug.cgi?id=1213573</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217339">https://bugzilla.suse.com/show_bug.cgi?id=1217339</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217408">https://bugzilla.suse.com/show_bug.cgi?id=1217408</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218562">https://bugzilla.suse.com/show_bug.cgi?id=1218562</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218917">https://bugzilla.suse.com/show_bug.cgi?id=1218917</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219104">https://bugzilla.suse.com/show_bug.cgi?id=1219104</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219126">https://bugzilla.suse.com/show_bug.cgi?id=1219126</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219141">https://bugzilla.suse.com/show_bug.cgi?id=1219141</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219169">https://bugzilla.suse.com/show_bug.cgi?id=1219169</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219170">https://bugzilla.suse.com/show_bug.cgi?id=1219170</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219264">https://bugzilla.suse.com/show_bug.cgi?id=1219264</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220342">https://bugzilla.suse.com/show_bug.cgi?id=1220342</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220569">https://bugzilla.suse.com/show_bug.cgi?id=1220569</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220761">https://bugzilla.suse.com/show_bug.cgi?id=1220761</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221042">https://bugzilla.suse.com/show_bug.cgi?id=1221042</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221044">https://bugzilla.suse.com/show_bug.cgi?id=1221044</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221080">https://bugzilla.suse.com/show_bug.cgi?id=1221080</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221084">https://bugzilla.suse.com/show_bug.cgi?id=1221084</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221088">https://bugzilla.suse.com/show_bug.cgi?id=1221088</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221299">https://bugzilla.suse.com/show_bug.cgi?id=1221299</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221612">https://bugzilla.suse.com/show_bug.cgi?id=1221612</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221617">https://bugzilla.suse.com/show_bug.cgi?id=1221617</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221645">https://bugzilla.suse.com/show_bug.cgi?id=1221645</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221825">https://bugzilla.suse.com/show_bug.cgi?id=1221825</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222294">https://bugzilla.suse.com/show_bug.cgi?id=1222294</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222307">https://bugzilla.suse.com/show_bug.cgi?id=1222307</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222357">https://bugzilla.suse.com/show_bug.cgi?id=1222357</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222368">https://bugzilla.suse.com/show_bug.cgi?id=1222368</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222379">https://bugzilla.suse.com/show_bug.cgi?id=1222379</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222385">https://bugzilla.suse.com/show_bug.cgi?id=1222385</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222424">https://bugzilla.suse.com/show_bug.cgi?id=1222424</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222430">https://bugzilla.suse.com/show_bug.cgi?id=1222430</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222435">https://bugzilla.suse.com/show_bug.cgi?id=1222435</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222482">https://bugzilla.suse.com/show_bug.cgi?id=1222482</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222559">https://bugzilla.suse.com/show_bug.cgi?id=1222559</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222585">https://bugzilla.suse.com/show_bug.cgi?id=1222585</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222613">https://bugzilla.suse.com/show_bug.cgi?id=1222613</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222615">https://bugzilla.suse.com/show_bug.cgi?id=1222615</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222618">https://bugzilla.suse.com/show_bug.cgi?id=1222618</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222624">https://bugzilla.suse.com/show_bug.cgi?id=1222624</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222666">https://bugzilla.suse.com/show_bug.cgi?id=1222666</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222669">https://bugzilla.suse.com/show_bug.cgi?id=1222669</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222671">https://bugzilla.suse.com/show_bug.cgi?id=1222671</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222703">https://bugzilla.suse.com/show_bug.cgi?id=1222703</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222704">https://bugzilla.suse.com/show_bug.cgi?id=1222704</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222709">https://bugzilla.suse.com/show_bug.cgi?id=1222709</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222710">https://bugzilla.suse.com/show_bug.cgi?id=1222710</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222721">https://bugzilla.suse.com/show_bug.cgi?id=1222721</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222726">https://bugzilla.suse.com/show_bug.cgi?id=1222726</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222773">https://bugzilla.suse.com/show_bug.cgi?id=1222773</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222776">https://bugzilla.suse.com/show_bug.cgi?id=1222776</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222785">https://bugzilla.suse.com/show_bug.cgi?id=1222785</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222787">https://bugzilla.suse.com/show_bug.cgi?id=1222787</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222790">https://bugzilla.suse.com/show_bug.cgi?id=1222790</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222791">https://bugzilla.suse.com/show_bug.cgi?id=1222791</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222792">https://bugzilla.suse.com/show_bug.cgi?id=1222792</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222793">https://bugzilla.suse.com/show_bug.cgi?id=1222793</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222796">https://bugzilla.suse.com/show_bug.cgi?id=1222796</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222812">https://bugzilla.suse.com/show_bug.cgi?id=1222812</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222824">https://bugzilla.suse.com/show_bug.cgi?id=1222824</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222829">https://bugzilla.suse.com/show_bug.cgi?id=1222829</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222832">https://bugzilla.suse.com/show_bug.cgi?id=1222832</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222836">https://bugzilla.suse.com/show_bug.cgi?id=1222836</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222838">https://bugzilla.suse.com/show_bug.cgi?id=1222838</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222866">https://bugzilla.suse.com/show_bug.cgi?id=1222866</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222867">https://bugzilla.suse.com/show_bug.cgi?id=1222867</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222869">https://bugzilla.suse.com/show_bug.cgi?id=1222869</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222870">https://bugzilla.suse.com/show_bug.cgi?id=1222870</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222876">https://bugzilla.suse.com/show_bug.cgi?id=1222876</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222878">https://bugzilla.suse.com/show_bug.cgi?id=1222878</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222879">https://bugzilla.suse.com/show_bug.cgi?id=1222879</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222881">https://bugzilla.suse.com/show_bug.cgi?id=1222881</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222883">https://bugzilla.suse.com/show_bug.cgi?id=1222883</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222888">https://bugzilla.suse.com/show_bug.cgi?id=1222888</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222894">https://bugzilla.suse.com/show_bug.cgi?id=1222894</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222901">https://bugzilla.suse.com/show_bug.cgi?id=1222901</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222968">https://bugzilla.suse.com/show_bug.cgi?id=1222968</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222976">https://bugzilla.suse.com/show_bug.cgi?id=1222976</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223012">https://bugzilla.suse.com/show_bug.cgi?id=1223012</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223014">https://bugzilla.suse.com/show_bug.cgi?id=1223014</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223016">https://bugzilla.suse.com/show_bug.cgi?id=1223016</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223024">https://bugzilla.suse.com/show_bug.cgi?id=1223024</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223033">https://bugzilla.suse.com/show_bug.cgi?id=1223033</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223034">https://bugzilla.suse.com/show_bug.cgi?id=1223034</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223035">https://bugzilla.suse.com/show_bug.cgi?id=1223035</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223036">https://bugzilla.suse.com/show_bug.cgi?id=1223036</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223037">https://bugzilla.suse.com/show_bug.cgi?id=1223037</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223041">https://bugzilla.suse.com/show_bug.cgi?id=1223041</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223042">https://bugzilla.suse.com/show_bug.cgi?id=1223042</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223051">https://bugzilla.suse.com/show_bug.cgi?id=1223051</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223052">https://bugzilla.suse.com/show_bug.cgi?id=1223052</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223056">https://bugzilla.suse.com/show_bug.cgi?id=1223056</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223057">https://bugzilla.suse.com/show_bug.cgi?id=1223057</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223058">https://bugzilla.suse.com/show_bug.cgi?id=1223058</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223060">https://bugzilla.suse.com/show_bug.cgi?id=1223060</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223061">https://bugzilla.suse.com/show_bug.cgi?id=1223061</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223065">https://bugzilla.suse.com/show_bug.cgi?id=1223065</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223066">https://bugzilla.suse.com/show_bug.cgi?id=1223066</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223076">https://bugzilla.suse.com/show_bug.cgi?id=1223076</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223078">https://bugzilla.suse.com/show_bug.cgi?id=1223078</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223111">https://bugzilla.suse.com/show_bug.cgi?id=1223111</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223115">https://bugzilla.suse.com/show_bug.cgi?id=1223115</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223118">https://bugzilla.suse.com/show_bug.cgi?id=1223118</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223119">https://bugzilla.suse.com/show_bug.cgi?id=1223119</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223140">https://bugzilla.suse.com/show_bug.cgi?id=1223140</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223187">https://bugzilla.suse.com/show_bug.cgi?id=1223187</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223189">https://bugzilla.suse.com/show_bug.cgi?id=1223189</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223190">https://bugzilla.suse.com/show_bug.cgi?id=1223190</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223191">https://bugzilla.suse.com/show_bug.cgi?id=1223191</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223196">https://bugzilla.suse.com/show_bug.cgi?id=1223196</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223197">https://bugzilla.suse.com/show_bug.cgi?id=1223197</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223198">https://bugzilla.suse.com/show_bug.cgi?id=1223198</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223207">https://bugzilla.suse.com/show_bug.cgi?id=1223207</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223275">https://bugzilla.suse.com/show_bug.cgi?id=1223275</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223323">https://bugzilla.suse.com/show_bug.cgi?id=1223323</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223360">https://bugzilla.suse.com/show_bug.cgi?id=1223360</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223369">https://bugzilla.suse.com/show_bug.cgi?id=1223369</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223380">https://bugzilla.suse.com/show_bug.cgi?id=1223380</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223432">https://bugzilla.suse.com/show_bug.cgi?id=1223432</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223473">https://bugzilla.suse.com/show_bug.cgi?id=1223473</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223474">https://bugzilla.suse.com/show_bug.cgi?id=1223474</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223475">https://bugzilla.suse.com/show_bug.cgi?id=1223475</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223477">https://bugzilla.suse.com/show_bug.cgi?id=1223477</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223478">https://bugzilla.suse.com/show_bug.cgi?id=1223478</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223479">https://bugzilla.suse.com/show_bug.cgi?id=1223479</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223481">https://bugzilla.suse.com/show_bug.cgi?id=1223481</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223482">https://bugzilla.suse.com/show_bug.cgi?id=1223482</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223484">https://bugzilla.suse.com/show_bug.cgi?id=1223484</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223487">https://bugzilla.suse.com/show_bug.cgi?id=1223487</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223490">https://bugzilla.suse.com/show_bug.cgi?id=1223490</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223496">https://bugzilla.suse.com/show_bug.cgi?id=1223496</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223498">https://bugzilla.suse.com/show_bug.cgi?id=1223498</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223499">https://bugzilla.suse.com/show_bug.cgi?id=1223499</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223501">https://bugzilla.suse.com/show_bug.cgi?id=1223501</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223502">https://bugzilla.suse.com/show_bug.cgi?id=1223502</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223503">https://bugzilla.suse.com/show_bug.cgi?id=1223503</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223505">https://bugzilla.suse.com/show_bug.cgi?id=1223505</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223509">https://bugzilla.suse.com/show_bug.cgi?id=1223509</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223511">https://bugzilla.suse.com/show_bug.cgi?id=1223511</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223512">https://bugzilla.suse.com/show_bug.cgi?id=1223512</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223513">https://bugzilla.suse.com/show_bug.cgi?id=1223513</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223516">https://bugzilla.suse.com/show_bug.cgi?id=1223516</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223517">https://bugzilla.suse.com/show_bug.cgi?id=1223517</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223518">https://bugzilla.suse.com/show_bug.cgi?id=1223518</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223519">https://bugzilla.suse.com/show_bug.cgi?id=1223519</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223520">https://bugzilla.suse.com/show_bug.cgi?id=1223520</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223522">https://bugzilla.suse.com/show_bug.cgi?id=1223522</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223523">https://bugzilla.suse.com/show_bug.cgi?id=1223523</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223525">https://bugzilla.suse.com/show_bug.cgi?id=1223525</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223536">https://bugzilla.suse.com/show_bug.cgi?id=1223536</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223539">https://bugzilla.suse.com/show_bug.cgi?id=1223539</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223574">https://bugzilla.suse.com/show_bug.cgi?id=1223574</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223595">https://bugzilla.suse.com/show_bug.cgi?id=1223595</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223598">https://bugzilla.suse.com/show_bug.cgi?id=1223598</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223628">https://bugzilla.suse.com/show_bug.cgi?id=1223628</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223634">https://bugzilla.suse.com/show_bug.cgi?id=1223634</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223640">https://bugzilla.suse.com/show_bug.cgi?id=1223640</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223643">https://bugzilla.suse.com/show_bug.cgi?id=1223643</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223644">https://bugzilla.suse.com/show_bug.cgi?id=1223644</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223645">https://bugzilla.suse.com/show_bug.cgi?id=1223645</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223646">https://bugzilla.suse.com/show_bug.cgi?id=1223646</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223648">https://bugzilla.suse.com/show_bug.cgi?id=1223648</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223655">https://bugzilla.suse.com/show_bug.cgi?id=1223655</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223657">https://bugzilla.suse.com/show_bug.cgi?id=1223657</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223660">https://bugzilla.suse.com/show_bug.cgi?id=1223660</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223661">https://bugzilla.suse.com/show_bug.cgi?id=1223661</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223663">https://bugzilla.suse.com/show_bug.cgi?id=1223663</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223664">https://bugzilla.suse.com/show_bug.cgi?id=1223664</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223668">https://bugzilla.suse.com/show_bug.cgi?id=1223668</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223670">https://bugzilla.suse.com/show_bug.cgi?id=1223670</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223679">https://bugzilla.suse.com/show_bug.cgi?id=1223679</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223686">https://bugzilla.suse.com/show_bug.cgi?id=1223686</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223693">https://bugzilla.suse.com/show_bug.cgi?id=1223693</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223705">https://bugzilla.suse.com/show_bug.cgi?id=1223705</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223714">https://bugzilla.suse.com/show_bug.cgi?id=1223714</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223735">https://bugzilla.suse.com/show_bug.cgi?id=1223735</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223738">https://bugzilla.suse.com/show_bug.cgi?id=1223738</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223745">https://bugzilla.suse.com/show_bug.cgi?id=1223745</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223784">https://bugzilla.suse.com/show_bug.cgi?id=1223784</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223785">https://bugzilla.suse.com/show_bug.cgi?id=1223785</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223790">https://bugzilla.suse.com/show_bug.cgi?id=1223790</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223816">https://bugzilla.suse.com/show_bug.cgi?id=1223816</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223821">https://bugzilla.suse.com/show_bug.cgi?id=1223821</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223822">https://bugzilla.suse.com/show_bug.cgi?id=1223822</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223823">https://bugzilla.suse.com/show_bug.cgi?id=1223823</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223824">https://bugzilla.suse.com/show_bug.cgi?id=1223824</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223827">https://bugzilla.suse.com/show_bug.cgi?id=1223827</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223834">https://bugzilla.suse.com/show_bug.cgi?id=1223834</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223858">https://bugzilla.suse.com/show_bug.cgi?id=1223858</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223875">https://bugzilla.suse.com/show_bug.cgi?id=1223875</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223876">https://bugzilla.suse.com/show_bug.cgi?id=1223876</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223877">https://bugzilla.suse.com/show_bug.cgi?id=1223877</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223878">https://bugzilla.suse.com/show_bug.cgi?id=1223878</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223879">https://bugzilla.suse.com/show_bug.cgi?id=1223879</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223894">https://bugzilla.suse.com/show_bug.cgi?id=1223894</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223921">https://bugzilla.suse.com/show_bug.cgi?id=1223921</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223922">https://bugzilla.suse.com/show_bug.cgi?id=1223922</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223923">https://bugzilla.suse.com/show_bug.cgi?id=1223923</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223924">https://bugzilla.suse.com/show_bug.cgi?id=1223924</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223929">https://bugzilla.suse.com/show_bug.cgi?id=1223929</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223931">https://bugzilla.suse.com/show_bug.cgi?id=1223931</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223932">https://bugzilla.suse.com/show_bug.cgi?id=1223932</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223934">https://bugzilla.suse.com/show_bug.cgi?id=1223934</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223941">https://bugzilla.suse.com/show_bug.cgi?id=1223941</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223948">https://bugzilla.suse.com/show_bug.cgi?id=1223948</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223949">https://bugzilla.suse.com/show_bug.cgi?id=1223949</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223950">https://bugzilla.suse.com/show_bug.cgi?id=1223950</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223951">https://bugzilla.suse.com/show_bug.cgi?id=1223951</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223952">https://bugzilla.suse.com/show_bug.cgi?id=1223952</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223953">https://bugzilla.suse.com/show_bug.cgi?id=1223953</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223956">https://bugzilla.suse.com/show_bug.cgi?id=1223956</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223957">https://bugzilla.suse.com/show_bug.cgi?id=1223957</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223960">https://bugzilla.suse.com/show_bug.cgi?id=1223960</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223962">https://bugzilla.suse.com/show_bug.cgi?id=1223962</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223963">https://bugzilla.suse.com/show_bug.cgi?id=1223963</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223964">https://bugzilla.suse.com/show_bug.cgi?id=1223964</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223996">https://bugzilla.suse.com/show_bug.cgi?id=1223996</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-7167">https://jira.suse.com/browse/PED-7167</a>
</li>


</ul>

</div>

--===============1844116317650960904==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung