drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Linux
Name: |
Mehrere Probleme in Linux |
|
ID: |
SUSE-SU-2024:1643-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE Linux Enterprise Server 12 SP5, SUSE Linux Enterprise High Performance Computing 12 SP5, SUSE Linux Enterprise Server for SAP Applications 12 SP5 |
|
Datum: |
Di, 14. Mai 2024, 19:53 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47182
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6356
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6536
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26948
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26876
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52528
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47149
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48688
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47104
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52474
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47180
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52524
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23134
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26929
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47167
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47173
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47165
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47100
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47181
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23307
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46909
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48672
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23848
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46963
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52590
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47049 |
|
Applikationen: |
Linux |
|
Originalnachricht |
--===============0224584118373276301== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:1643-1 Rating: important References:
* bsc#1084332 * bsc#1141539 * bsc#1184509 * bsc#1186060 * bsc#1190317 * bsc#1190576 * bsc#1192145 * bsc#1194516 * bsc#1197894 * bsc#1203935 * bsc#1209657 * bsc#1211592 * bsc#1212514 * bsc#1213456 * bsc#1215221 * bsc#1217339 * bsc#1217987 * bsc#1217988 * bsc#1217989 * bsc#1218220 * bsc#1218336 * bsc#1218479 * bsc#1218562 * bsc#1218917 * bsc#1219104 * bsc#1219169 * bsc#1219170 * bsc#1219618 * bsc#1219623 * bsc#1219847 * bsc#1220320 * bsc#1220366 * bsc#1220394 * bsc#1220411 * bsc#1220413 * bsc#1220416 * bsc#1220418 * bsc#1220442 * bsc#1220445 * bsc#1220513 * bsc#1220521 * bsc#1220528 * bsc#1220536 * bsc#1220538 * bsc#1220554 * bsc#1220572 * bsc#1220580 * bsc#1220611 * bsc#1220625 * bsc#1220628 * bsc#1220637 * bsc#1220640 * bsc#1220662 * bsc#1220687 * bsc#1220692 * bsc#1220703 * bsc#1220706 * bsc#1220739 * bsc#1220742 * bsc#1220743 * bsc#1220745 * bsc#1220751 * bsc#1220768 * bsc#1220769 * bsc#1220777 * bsc#1220790 * bsc#1220794 * bsc#1220829 * bsc#1220836 * bsc#1220843 * bsc#1220846 * bsc#1220850 * bsc#1220871 * bsc#1220927 * bsc#1220960 * bsc#1220985 * bsc#1220987 * bsc#1221044 * bsc#1221046 * bsc#1221048 * bsc#1221058 * bsc#1221060 * bsc#1221061 * bsc#1221077 * bsc#1221082 * bsc#1221088 * bsc#1221162 * bsc#1221277 * bsc#1221293 * bsc#1221337 * bsc#1221532 * bsc#1221541 * bsc#1221543 * bsc#1221545 * bsc#1221548 * bsc#1221575 * bsc#1221605 * bsc#1221608 * bsc#1221617 * bsc#1221791 * bsc#1221816 * bsc#1221825 * bsc#1221830 * bsc#1221862 * bsc#1221934 * bsc#1221949 * bsc#1221952 * bsc#1221953 * bsc#1221965 * bsc#1221966 * bsc#1221967 * bsc#1221969 * bsc#1221972 * bsc#1221973 * bsc#1221977 * bsc#1221979 * bsc#1221988 * bsc#1221991 * bsc#1221993 * bsc#1221994 * bsc#1221997 * bsc#1221998 * bsc#1221999 * bsc#1222000 * bsc#1222001 * bsc#1222002 * bsc#1222117 * bsc#1222294 * bsc#1222300 * bsc#1222357 * bsc#1222379 * bsc#1222422 * bsc#1222428 * bsc#1222449 * bsc#1222503 * bsc#1222559 * bsc#1222585 * bsc#1222609 * bsc#1222610 * bsc#1222613 * bsc#1222618 * bsc#1222619 * bsc#1222624 * bsc#1222630 * bsc#1222632 * bsc#1222660 * bsc#1222662 * bsc#1222664 * bsc#1222666 * bsc#1222669 * bsc#1222671 * bsc#1222677 * bsc#1222706 * bsc#1222720 * bsc#1222765 * bsc#1222770 * bsc#1222772 * bsc#1222787 * bsc#1222790 * bsc#1222793 * bsc#1222812 * bsc#1222836 * bsc#1222869 * bsc#1222876 * bsc#1222878 * bsc#1222881 * bsc#1222883 * bsc#1222888 * bsc#1222952 * bsc#1222961 * bsc#1222975 * bsc#1222976 * bsc#1223016 * bsc#1223035 * bsc#1223049 * bsc#1223051 * bsc#1223057 * bsc#1223058 * bsc#1223060 * bsc#1223119 * bsc#1223187 * bsc#1223189 * bsc#1223198 * bsc#1223203 * bsc#1223315 * bsc#1223432 * bsc#1223509 * bsc#1223512 * bsc#1223513 * bsc#1223516 * bsc#1223518 * bsc#1223539 * bsc#1223540 * bsc#1223626 * bsc#1223627 * bsc#1223664 * bsc#1223686 * bsc#1223693 * bsc#1223712 * bsc#1223715 * bsc#1223735 * bsc#1223744 * bsc#1223745 * bsc#1223770 * bsc#1223781 * bsc#1223802 * bsc#1223819 * bsc#1223824 * bsc#1223827 * bsc#1223837 * bsc#1223842 * bsc#1223843 * bsc#1223844 * bsc#1223883 * bsc#1223885 * bsc#1223921 * bsc#1223923 * bsc#1223931 * bsc#1223941 * bsc#1223952 * bsc#1223953 * bsc#1223954 * bsc#1223969 * jsc#PED-5759
Cross-References:
* CVE-2019-25160 * CVE-2020-36312 * CVE-2021-23134 * CVE-2021-46904 * CVE-2021-46905 * CVE-2021-46909 * CVE-2021-46938 * CVE-2021-46939 * CVE-2021-46941 * CVE-2021-46950 * CVE-2021-46955 * CVE-2021-46958 * CVE-2021-46960 * CVE-2021-46963 * CVE-2021-46964 * CVE-2021-46966 * CVE-2021-46981 * CVE-2021-46988 * CVE-2021-46990 * CVE-2021-46998 * CVE-2021-47006 * CVE-2021-47015 * CVE-2021-47024 * CVE-2021-47034 * CVE-2021-47045 * CVE-2021-47049 * CVE-2021-47055 * CVE-2021-47056 * CVE-2021-47060 * CVE-2021-47061 * CVE-2021-47063 * CVE-2021-47068 * CVE-2021-47070 * CVE-2021-47071 * CVE-2021-47073 * CVE-2021-47100 * CVE-2021-47101 * CVE-2021-47104 * CVE-2021-47110 * CVE-2021-47112 * CVE-2021-47113 * CVE-2021-47114 * CVE-2021-47117 * CVE-2021-47118 * CVE-2021-47119 * CVE-2021-47131 * CVE-2021-47138 * CVE-2021-47141 * CVE-2021-47142 * CVE-2021-47143 * CVE-2021-47146 * CVE-2021-47149 * CVE-2021-47150 * CVE-2021-47153 * CVE-2021-47159 * CVE-2021-47161 * CVE-2021-47162 * CVE-2021-47165 * CVE-2021-47166 * CVE-2021-47167 * CVE-2021-47168 * CVE-2021-47169 * CVE-2021-47171 * CVE-2021-47173 * CVE-2021-47177 * CVE-2021-47179 * CVE-2021-47180 * CVE-2021-47181 * CVE-2021-47182 * CVE-2021-47183 * CVE-2021-47184 * CVE-2021-47185 * CVE-2021-47188 * CVE-2021-47189 * CVE-2021-47198 * CVE-2021-47202 * CVE-2021-47203 * CVE-2021-47204 * CVE-2021-47205 * CVE-2021-47207 * CVE-2021-47211 * CVE-2021-47216 * CVE-2021-47217 * CVE-2022-0487 * CVE-2022-48619 * CVE-2022-48626 * CVE-2022-48636 * CVE-2022-48650 * CVE-2022-48651 * CVE-2022-48667 * CVE-2022-48668 * CVE-2022-48672 * CVE-2022-48687 * CVE-2022-48688 * CVE-2022-48695 * CVE-2022-48701 * CVE-2022-48702 * CVE-2023-0160 * CVE-2023-28746 * CVE-2023-35827 * CVE-2023-4881 * CVE-2023-52454 * CVE-2023-52469 * CVE-2023-52470 * CVE-2023-52474 * CVE-2023-52476 * CVE-2023-52477 * CVE-2023-52486 * CVE-2023-52488 * CVE-2023-52509 * CVE-2023-52515 * CVE-2023-52524 * CVE-2023-52528 * CVE-2023-52575 * CVE-2023-52583 * CVE-2023-52587 * CVE-2023-52590 * CVE-2023-52591 * CVE-2023-52595 * CVE-2023-52598 * CVE-2023-52607 * CVE-2023-52614 * CVE-2023-52620 * CVE-2023-52628 * CVE-2023-52635 * CVE-2023-52639 * CVE-2023-52644 * CVE-2023-52646 * CVE-2023-52650 * CVE-2023-52652 * CVE-2023-52653 * CVE-2023-6270 * CVE-2023-6356 * CVE-2023-6535 * CVE-2023-6536 * CVE-2023-7042 * CVE-2023-7192 * CVE-2024-0639 * CVE-2024-2201 * CVE-2024-22099 * CVE-2024-23307 * CVE-2024-23848 * CVE-2024-24855 * CVE-2024-24861 * CVE-2024-26614 * CVE-2024-26642 * CVE-2024-26651 * CVE-2024-26671 * CVE-2024-26675 * CVE-2024-26689 * CVE-2024-26704 * CVE-2024-26733 * CVE-2024-26739 * CVE-2024-26743 * CVE-2024-26744 * CVE-2024-26747 * CVE-2024-26754 * CVE-2024-26763 * CVE-2024-26771 * CVE-2024-26772 * CVE-2024-26773 * CVE-2024-26777 * CVE-2024-26778 * CVE-2024-26779 * CVE-2024-26791 * CVE-2024-26793 * CVE-2024-26805 * CVE-2024-26816 * CVE-2024-26817 * CVE-2024-26839 * CVE-2024-26840 * CVE-2024-26852 * CVE-2024-26855 * CVE-2024-26857 * CVE-2024-26859 * CVE-2024-26876 * CVE-2024-26878 * CVE-2024-26883 * CVE-2024-26884 * CVE-2024-26898 * CVE-2024-26901 * CVE-2024-26903 * CVE-2024-26907 * CVE-2024-26922 * CVE-2024-26929 * CVE-2024-26930 * CVE-2024-26931 * CVE-2024-26948 * CVE-2024-26993 * CVE-2024-27008 * CVE-2024-27013 * CVE-2024-27014 * CVE-2024-27043 * CVE-2024-27046 * CVE-2024-27054 * CVE-2024-27072 * CVE-2024-27073 * CVE-2024-27074 * CVE-2024-27075 * CVE-2024-27078 * CVE-2024-27388
CVSS scores:
* CVE-2019-25160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2019-25160 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2020-36312 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2020-36312 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-23134 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-23134 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-46904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46905 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2021-46905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46909 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46938 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-46939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46939 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46950 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2021-46950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-46958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46960 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2021-46963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46964 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46998 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47024 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47060 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47061 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47063 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47100 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47101 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2021-47104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47112 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47117 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47131 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47138 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2021-47141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47143 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47146 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47150 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47161 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47165 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47168 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47169 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47173 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47177 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47183 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47198 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47203 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47216 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2021-47217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-0487 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-0487 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48619 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48619 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48626 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-48626 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-48668 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-48672 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-48687 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-48688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48701 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2022-48702 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28746 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2023-35827 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4881 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L * CVE-2023-4881 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52454 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52454 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52469 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-52469 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52470 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52470 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52474 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2023-52474 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52476 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52477 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52509 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52515 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52528 ( SUSE ): 3.5 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2023-52575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52587 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52590 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52595 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52598 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52614 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52620 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52628 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52639 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52644 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52652 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6356 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6356 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6535 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6535 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6536 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6536 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7192 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7192 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0639 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-2201 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23848 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-23848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-24855 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-24855 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-24861 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-24861 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26614 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26642 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26651 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26743 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26747 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-26771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26839 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26840 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26898 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26901 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-26901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26907 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27008 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-27013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5
An update that solves 201 vulnerabilities, contains one feature and has 22 security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
* CVE-2019-25160: Fixed out-of-bounds memory accesses in netlabel (bsc#1220394). * CVE-2020-36312: Fixed an issue in virt/kvm/kvm_main.c that had a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure (bsc#1184509). * CVE-2021-23134: Fixed a use-after-free issue in nfc sockets (bsc#1186060). * CVE-2021-46904: Fixed NULL pointer dereference during tty device unregistration (bsc#1220416). * CVE-2021-46905: Fixed NULL pointer dereference on disconnect regression (bsc#1220418). * CVE-2021-46909: Fixed a PCI interrupt mapping in ARM footbridge (bsc#1220442). * CVE-2021-46938: Fixed a double free of blk_mq_tag_set in dev remove after table load fails in dm rq (bsc#1220554). * CVE-2021-46939: Fixed a denial of service in trace_clock_global() in tracing (bsc#1220580). * CVE-2021-46941: Fixed core softreset when switch mode in usb dwc3 (bsc#1220628). * CVE-2021-46950: Fixed a data corruption bug in raid1 arrays using bitmaps in md/raid1 (bsc#1220662). * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220513). * CVE-2021-46958: Fixed a race between transaction aborts and fsyncs leading to use-after-free in btrfs (bsc#1220521). * CVE-2021-46960: Fixed a warning on smb2_get_enc_key in cifs (bsc#1220528). * CVE-2021-46963: Fixed crash in qla2xxx_mqueuecommand() (bsc#1220536). * CVE-2021-46964: Fixed unreserved extra IRQ vectors in qla2xxx (bsc#1220538). * CVE-2021-46966: Fixed potential use-after-free issue in cm_write() (bsc#1220572). * CVE-2021-46981: Fixed a NULL pointer in flush_workqueue in nbd (bsc#1220611). * CVE-2021-46988: Fixed release page in error path to avoid BUG_ON (bsc#1220706). * CVE-2021-46990: Fixed a denial of service when toggling entry flush barrier in powerpc/64s (bsc#1220743). * CVE-2021-46998: Fixed an use after free bug in enic_hard_start_xmit in ethernet/enic (bsc#1220625). * CVE-2021-47006: Fixed wrong check in overflow_handler hook in ARM 9064/1 hw_breakpoint (bsc#1220751). * CVE-2021-47015: Fixed a RX consumer index logic in the error path in bnxt_rx_pkt() in bnxt_en (bsc#1220794). * CVE-2021-47024: Fixed possible memory leak in vsock/virtio when closing socket (bsc#1220637). * CVE-2021-47034: Fixed a kernel memory fault for pte update on radix in powerpc/64s (bsc#1220687). * CVE-2021-47045: Fixed a null pointer dereference in lpfc_prep_els_iocb() in scsi lpfc (bsc#1220640). * CVE-2021-47049: Fixed an after free in __vmbus_open() in hv vmbus (bsc#1220692). * CVE-2021-47055: Fixed missing permissions for locking and badblock ioctls in mtd (bsc#1220768). * CVE-2021-47056: Fixed a user-memory-access error on vf2pf_lock in crypto (bsc#1220769). * CVE-2021-47060: Fixed a bug in KVM by stop looking for coalesced MMIO zones if the bus is destroyed (bsc#1220742). * CVE-2021-47061: Fixed a bug in KVM by destroy I/O bus devices on unregister failure _after_ sync'ing SRCU (bsc#1220745). * CVE-2021-47063: Fixed a potential use-after-free during bridge detach in drm bridge/panel (bsc#1220777). * CVE-2021-47068: Fixed a use-after-free issue in llcp_sock_bind/connect (bsc#1220739). * CVE-2021-47070: Fixed memory leak in error handling paths in uio_hv_generic (bsc#1220829). * CVE-2021-47071: Fixed a memory leak in error handling paths in hv_uio_cleanup() in uio_hv_generic (bsc#1220846). * CVE-2021-47073: Fixed oops on rmmod dell_smbios init_dell_smbios_wmi() (bsc#1220850). * CVE-2021-47100: Fixed UAF when uninstall in ipmi (bsc#1220985). * CVE-2021-47101: Fixed uninit-value in asix_mdio_read() (bsc#1220987). * CVE-2021-47104: Fixed memory leak in qib_user_sdma_queue_pkts() (bsc#1220960). * CVE-2021-47110: Fixed possible memory corruption when restoring from hibernation in x86/kvm (bsc#1221532). * CVE-2021-47112: Fixed possible memory corruption when restoring from hibernation in x86/kvm (bsc#1221541). * CVE-2021-47113: Abort btrfs rename_exchange if we fail to insert the second ref (bsc#1221543). * CVE-2021-47114: Fixed a data corruption by fallocate in ocfs2 (bsc#1221548). * CVE-2021-47117: Fixed a crash in ext4_es_cache_extent as ext4_split_extent_at failed in ext4 (bsc#1221575). * CVE-2021-47118: Fixed an use-after-free in init task's struct pid in pid (bsc#1221605). * CVE-2021-47119: Fixed a memory leak in ext4_fill_super in ext4 (bsc#1221608). * CVE-2021-47131: Fixed a use-after-free after the TLS device goes down and up (bsc#1221545). * CVE-2021-47138: Fixed an out-of-bound memory access during clearing filters in cxgb4 (bsc#1221934). * CVE-2021-47141: Fixed a null pointer dereference on priv->msix_vectors when driver is unloaded in gve (bsc#1221949). * CVE-2021-47142: Fixed an use-after-free on ttm->sg in drm/amdgpu (bsc#1221952). * CVE-2021-47143: Fixed possible corruption in net/smc after failed device_add() (bsc#1221988). * CVE-2021-47149: Fixed a potential null pointer deref in fmvj18x_get_hwinfo() (bsc#1221972). * CVE-2021-47150: Fixed the potential memory leak in fec_enet_init() (bsc#1221973). * CVE-2021-47153: Fixed wrongly generated interrupt on bus reset in i2c/i801 (bsc#1221969). * CVE-2021-47161: Fixed a resource leak in an error handling path in the error handling path of the probe function in spi spi-fsl-dspi (bsc#1221966). * CVE-2021-47162: Fixed a possible memory leak in tipc_buf_append (bsc#1221977). * CVE-2021-47165: Fixed shutdown crash when component not probed in drm/meson (bsc#1221965). * CVE-2021-47166: Fixed a data corruption of pg_bytes_written in nfs_do_recoalesce() in nfs (bsc#1221998). * CVE-2021-47167: Fixed an oopsable condition in __nfs_pageio_add_request() in nfs (bsc#1221991). * CVE-2021-47168: Fixed an incorrect limit in filelayout_decode_layout() in nfs (bsc#1222002). * CVE-2021-47169: Fixed a NULL pointer dereference in rp2_probe in serial rp2 (bsc#1222000). * CVE-2021-47171: Fixed a memory leak in smsc75xx_bind in net usb (bsc#1221994). * CVE-2021-47173: Fixed a memory leak in uss720_probe in misc/uss720 (bsc#1221993). * CVE-2021-47177: Fixed a sysfs leak in alloc_iommu() in iommu/vt-d (bsc#1221997). * CVE-2021-47179: Fixed a NULL pointer dereference in pnfs_mark_matching_lsegs_return() in nfsv4 (bsc#1222001). * CVE-2021-47180: Fixed a memory leak in nci_allocate_device nfcmrvl_disconnect in nfc nci (bsc#1221999). * CVE-2021-47181: Fixed a null pointer dereference caused by calling platform_get_resource() (bsc#1222660). * CVE-2021-47182: Fixed scsi_mode_sense() buffer length handling (bsc#1222662). * CVE-2021-47183: Fixed a null pointer dereference during link down processing in scsi lpfc (bsc#1192145, bsc#1222664). * CVE-2021-47184: Fixed NULL pointer dereference on VSI filter sync (bsc#1222666). * CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669). * CVE-2021-47189: Fixed denial of service due to memory ordering issues between normal and ordered work functions in btrfs (bsc#1222706). * CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions in thermal (bsc#1222878) * CVE-2021-47205: Unregistered clocks/resets when unbinding in sunxi-ng (bsc#1222888). * CVE-2021-47207: Fixed a null pointer dereference on pointer block in gus (bsc#1222790). * CVE-2021-47211: Fixed a null pointer dereference on pointer cs_desc in usb- audio (bsc#1222869). * CVE-2022-0487: Fixed an use-after-free vulnerability in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516). * CVE-2022-48619: Fixed a denial-of-service issue in drivers/input/input.c (bsc#1218220). * CVE-2022-48626: Fixed a potential use-after-free on remove path moxart (bsc#1220366). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223513). * CVE-2022-48672: Fixed off-by-one error in unflatten_dt_nodes() (bsc#1223931). * CVE-2022-48701: Fixed an out-of-bounds bug in __snd_usb_parse_audio_interface() (bsc#1223921). * CVE-2022-48702: Fixed out of bounds access in snd_emu10k1_pcm_channel_alloc() (bsc#1223923). * CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system (bsc#1209657). * CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456). * CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1212514). * CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221). * CVE-2023-52454: Fixed a kernel panic when host sends an invalid H2C PDU length (bsc#1220320). * CVE-2023-52469: Fixed a use-after-free in kv_parse_power_table (bsc#1220411). * CVE-2023-52470: Fixed null-ptr-deref in radeon_crtc_init() (bsc#1220413). * CVE-2023-52474: Fixed a vulnerability with non-PAGE_SIZE-end multi-iovec user SDMA requests (bsc#1220445). * CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI during vsyscall (bsc#1220703). * CVE-2023-52477: Fixed USB Hub accesses to uninitialized BOS descriptors (bsc#1220790). * CVE-2023-52486: Fixed possible use-after-free in drm (bsc#1221277). * CVE-2023-52488: Fixed serial/sc16is7xx convert from _raw_ to _noinc_ regmap functions for FIFO (bsc#1221162). * CVE-2023-52509: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1220836). * CVE-2023-52515: Fixed possible use-after-free in RDMA/srp (bsc#1221048). * CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927). * CVE-2023-52528: Fixed uninit-value access in __smsc75xx_read_reg() (bsc#1220843). * CVE-2023-52575: Fixed SBPB enablement for spec_rstack_overflow=off (bsc#1220871). * CVE-2023-52583: Fixed deadlock or deadcode of misusing dget() inside ceph (bsc#1221058). * CVE-2023-52587: Fixed mcast list locking in IB/ipoib (bsc#1221082). * CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory renaming (bsc#1221088). * CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044). * CVE-2023-52595: Fixed possible deadlock in wifi/rt2x00 (bsc#1221046). * CVE-2023-52598: Fixed wrong setting of fpc register in s390/ptrace (bsc#1221060). * CVE-2023-52607: Fixed a null-pointer-dereference in pgtable_cache_add kasprintf() (bsc#1221061). * CVE-2023-52614: Fixed PM/devfreq buffer overflow in trans_stat_show (bsc#1221617). * CVE-2023-52620: Fixed netfilter/nf_tables to disallow timeout for anonymous sets never used from userspace (bsc#1221825). * CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222117). * CVE-2023-52635: Fixed PM/devfreq to synchronize devfreq_monitor_[start/stop] (bsc#1222294). * CVE-2023-52639: Fixed race during shadow creation in KVM/s390/vsie Fixed (bsc#1222300). * CVE-2023-52644: Stop/wake correct queue in DMA Tx path when QoS is disabled in b43 (bsc#1222961). * CVE-2023-52650: Added missing check for of_find_device_by_node() (bsc#1223770) * CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device() (bsc#1223686). * CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562). * CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987). * CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988). * CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989). * CVE-2023-7042: Fixed a null-pointer-dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336). * CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c (bsc#1218479). * CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917). * CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339). * CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169). * CVE-2024-23848: Fixed media/cec for possible use-after-free in cec_queue_msg_fh (bsc#1219104). * CVE-2024-24855: Fixed race condition in lpfc_unregister_fcf_rescan() that could lead to a kernel panic or denial of service issue (bsc#1219618). * CVE-2024-24861: Fixed race condition in xc4000_get_frequency() that could lead to malfunction or denial of service issue (bsc#1219623). * CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks (bsc#1221293). * CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter nf_tables (bsc#1221830). * CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357). * CVE-2024-26675: Fixed ppp_async to limit MRU to 64K (bsc#1222379). * CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503). * CVE-2024-26704: fixed double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422). * CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585). * CVE-2024-26743: Fixed memory leak in qedr_create_user_qp error flow in rdma/qedr (bsc#1222677) * CVE-2024-26744: Fixed null pointer dereference in srpt_service_guid parameter in rdma/srpt (bsc#1222449) * CVE-2024-26747: Fixed a NULL pointer issue with USB parent module's reference (bsc#1222609). * CVE-2024-26754: Fixed ab use-after-free and null-ptr-deref in gtp_genl_dump_pdp() in gtp (bsc#1222632). * CVE-2024-26763: Fixed user corruption via by writing data with O_DIRECT on device in dm-crypt (bsc#1222720). * CVE-2024-26771: Fixed a null pointer dereference on edma_probe in dmaengine ti edma (bsc#1222610) * CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (bsc#1222613). * CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618). * CVE-2024-26777: Error out if pixclock equals zero in fbdev/sis (bsc#1222765) * CVE-2024-26778: Error out if pixclock equals zero in fbdev/savage (bsc#1222770) * CVE-2024-26779: Fixed a race condition on enabling fast-xmit in mac80211 (bsc#1222772). * CVE-2024-26791: Properly validated device names in btrfs dev-replace (bsc#1222793) * CVE-2024-26793: fixed use-after-free and null-ptr-deref in gtp_newlink() (bsc#1222428). * CVE-2024-26805: Fixed a kernel-infoleak-after-free in __skb_datagram_iter in netlink (bsc#1222630). * CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y by ignoring them (bsc#1222624). * CVE-2024-26817: Fixed amdkfd to use calloc instead of kzalloc to avoid integer overflow (bsc#1222812). * CVE-2024-26839: Fixed a memory leak in init_credit_return() (bsc#1222975) * CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache() (bsc#1222976). * CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in ip6_route_mpath_notify() (bsc#1223057). * CVE-2024-26855: Fixed net/ice potential NULL pointer dereference in ice_bridge_setlink() (bsc#1223051). * CVE-2024-26857: Fixed geneve to make sure to pull inner header in geneve_rx() (bsc#1223058). * CVE-2024-26859: Prevent access to a freed page in page_pool in bnx2x (bsc#1223049). * CVE-2024-26876: Fixed crash on irq during probe, related to adv7511_probe() (bsc#1223119). * CVE-2024-26878: Fixed quota for potential NULL pointer dereference (bsc#1223060). * CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches (bsc#1223035). * CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches (bsc#1223189). * CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent kernel-infoleak (bsc#1223198). * CVE-2024-26907: Fixed a fortify source warning while accessing Eth segment in mlx5 (bsc#1223203). * CVE-2024-26922: Validated the parameters of bo mapping operations more clearly (bsc#1223315). * CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in dc_state_release (bsc#1223664). * CVE-2024-26993: Fixed fs/sysfs reference leak in sysfs_break_active_protection() (bsc#1223693). * CVE-2024-27008: Fixed out of bounds access in nv04 (CVE-2024-27008 bsc#1223802). * CVE-2024-27013: Fixed tun limit printing rate when illegal packet received by tun device (bsc#1223745). * CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS (bsc#1223735). * CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824). * CVE-2024-27046: Fixed nfp/flower handling acti_netdevs allocation failure (bsc#1223827). * CVE-2024-27072: Removed useless locks in usbtv_video_free() (bsc#1223837). * CVE-2024-27073: Fixed a memory leak in budget_av_attach() (bsc#1223843). * CVE-2024-27074: Fixed a memory leak in go7007_load_encoder() (bsc#1223844). * CVE-2024-27075: Avoided stack overflow warnings with clang (bsc#1223842). * CVE-2024-27078: Fixed a memory leak in tpg_alloc() (bsc#1223781).
The following non-security bugs were fixed:
* Input: adxl34x - do not hardcode interrupt trigger type (git-fixes). * Input: drv260x - sleep between polling GO bit (git-fixes). * Input: ipaq-micro-keys - add error handling for devm_kmemdup. * Input: xpad - add PXN V900 support. * USB: core: Fix deadlock in usb_deauthorize_interface(). * USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command (git- fixes). * atl1c: fix error return code in atl1c_probe() (git-fixes). * atl1e: fix error return code in atl1e_probe() (git-fixes). * bluetooth: btqca: Fixed a coding style error (git-fixes). * bluetooth: btqca: Introduce HCI_EV_VENDOR and use it (git-fixes). * bluetooth: btqcomsmd: Fix command timeout after setting BD address (git- fixes). * bluetooth: hci_intel: Add check for platform_driver_register (git-fixes). * bnx2x: Fix enabling network interfaces without VFs (git-fixes). * bnx2x: Fix missing error code in bnx2x_iov_init_one() (git-fixes). * bpf, sockmap: Fix preempt_rt splat when using raw_spin_lock_t (git-fixes). * drivers: usb: host: Fix deadlock in oxu_bus_suspend() (git-fixes). * ethernet: myri10ge: Fix missing error code in myri10ge_probe() (git-fixes). * ethernet: ucc_geth: fix definition and size of ucc_geth_tx_global_pram (git- fixes). * fuse: do not unhash root (bsc#1223954). * iommu/amd: Increase interrupt remapping table limit to 512 entries (git- fixes). * iommu/amd: Mark interrupt as managed (git-fixes). * iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (git-fixes). * iommu/amd: Silence warnings under memory pressure (git-fixes). * iommu: Check if group is NULL before remove device (git-fixes). * kabi fix for pNFS: Fix the pnfs block driver's calculation of layoutget size (git-fixes). * kabi: PCI: Add locking to RMW PCI Express Capability Register accessors (kabi). * lan78xx: Add missing return code checks (git-fixes). * lan78xx: Add support to dump lan78xx registers (git-fixes). * lan78xx: Do not access skb_queue_head list pointers directly (git-fixes). * lan78xx: Fix exception on link speed change (git-fixes). * lan78xx: Fix partial packet errors on suspend/resume (git-fixes). * lan78xx: Fix race conditions in suspend/resume handling (git-fixes). * lan78xx: Fix white space and style issues (git-fixes). * lan78xx: Modify error messages (git-fixes). * lan78xx: enable auto speed configuration for LAN7850 if no EEPROM is detected (git-fixes). * livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539). * net/mlx5: Properly convey driver version to firmware (git-fixes). * net/qla3xxx: fix schedule while atomic in ql_sem_spinlock (git-fixes). * net/tls: Remove the context from the list in tls_device_down (bsc#1221545). * net: Fix features skip in for_each_netdev_feature() (git-fixes). * net: allwinner: Fix some resources leak in the error handling path of the probe and in the remove function (git-fixes). * net: atheros: switch from 'pci_' to 'dma_' API (git-fixes). * net: lan78xx: Allow for VLAN headers in timeout calcs (git-fixes). * net: lan78xx: Make declaration style consistent (git-fixes). * net: lan78xx: Merge memcpy + lexx_to_cpus to get_unaligned_lexx (git-fixes). * net: lan78xx: fix runtime PM count underflow on link stop (git-fixes). * net: lan78xx: remove set but not used variable 'event' (git-fixes). * net: macb: ensure the device is available before accessing GEMGXL control registers (git-fixes). * net: stmmac: free tx skb buffer in stmmac_resume() (git-fixes). * net: sunrpc: Fix an off by one in rpc_sockaddr2uaddr() (git-fixes). * net: usb: lan78xx: Remove lots of set but unused 'ret' variables (git- fixes). * net:usb: Use ARRAY_SIZE instead of calculating the array size (git-fixes). * nfs: add atomic_open for NFSv3 to handle O_TRUNC correctly (bsc#1219847). * nfs: avoid spurious warning of lost lock that is being unlocked (bsc#1221791). * nfs: commit errors should be fatal (git-fixes). * nfs: fix O_DIRECT commit verifier handling (git-fixes). * nfs: fix O_DIRECT locking issues (git-fixes). * nfs: fix a request reference leak in nfs_direct_write_clear_reqs() (git- fixes). * nfs: fix an off by one in root_nfs_cat() (git-fixes). * nfs: fix direct WRITE throughput regression (git-fixes). * nfs: fix error handling for O_DIRECT write scheduling (git-fixes). * nfs: more O_DIRECT accounting fixes for error paths (git-fixes). * nfs: only issue commit in DIO codepath if we have uncommitted data (git- fixes). * nfsd: Fix error cleanup path in nfsd_rename() (git-fixes). * nfsd: Reset cb_seq_status after NFS4ERR_DELAY (git-fixes). * nfsd: Retransmit callbacks after client reconnects (git-fixes). * nfsd: lock_rename() needs both directories to live on the same fs (git- fixes). * nfsv4.1/pnfs: Ensure we handle the error NFS4ERR_RETURNCONFLICT (git-fixes). * pNFS/flexfiles: Check the layout validity in ff_layout_mirror_prepare_stats (git-fixes). * pNFS: Fix the pnfs block driver's calculation of layoutget size (git-fixes). * pci/aer: Clear MULTI_ERR_COR/UNCOR_RCV bits (git-fixes). * pci/aspm: Avoid link retraining race (git-fixes). * pci/aspm: Disable ASPM on MFD function removal to avoid use-after-free (git- fixes). * pci/aspm: Do not warn if already in common clock mode (git-fixes). * pci/aspm: Factor out pcie_wait_for_retrain() (git-fixes). * pci/aspm: Reduce severity of common clock config message (git-fixes). * pci/aspm: Return 0 or -ETIMEDOUT from pcie_retrain_link() (git-fixes). * pci/aspm: Use RMW accessors for changing LNKCTL (git-fixes). * pci/dpc: Print all TLP Prefixes, not just the first (git-fixes). * pci/iov: Enlarge virtfn sysfs name buffer (git-fixes). * pci/msi: Prevent MSI hardware interrupt number truncation (git-fixes). * pci/pm: Power up all devices during runtime resume (git-fixes). * pci/sysfs: Protect driver's D3cold preference from user space (git-fixes). * pci: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes). * pci: Add function 1 DMA alias quirk for Marvell 88SE9235 (git-fixes). * pci: Add locking to RMW PCI Express Capability Register accessors (git- fixes). * pci: Avoid FLR for AMD FCH AHCI adapters (git-fixes). * pci: Avoid pci_dev_lock() AB/BA deadlock with sriov_numvfs_store() (git- fixes). * pci: Make link retraining use RMW accessors for changing LNKCTL (git-fixes). * pci: Mark 3ware-9650SE Root Port Extended Tags as broken (git-fixes). * pci: Rework pcie_retrain_link() wait loop (git-fixes). * pci: aardvark: Fix setting MSI address (git-fixes). * pci: aardvark: Fix support for MSI interrupts (git-fixes). * pci: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git- fixes). * pci: endpoint: Do not stop controller when unbinding endpoint function (git- fixes). * pci: hotplug: Allow marking devices as disconnected during bind/unbind (git- fixes). * pci: pciehp: Add pciehp_set_indicators() to set both indicators (git-fixes). * pci: pciehp: Cancel bringup sequence if card is not present (git-fixes). * pci: pciehp: Fix AB-BA deadlock between reset_lock and device_lock (git- fixes). * pci: pciehp: Use RMW accessors for changing LNKCTL (git-fixes). * pci: qcom: Disable write access to read only registers for IP v2.3.3 (git- fixes). * pci: qcom: Fix unbalanced PHY init on probe errors (git-fixes). * pci: qcom: Use DWC helpers for modifying the read-only DBI registers (git- fixes). * pci: switchtec: Return -EFAULT for copy_to_user() errors (git-fixes). * printk: Disable passing console lock owner completely during panic() (bsc#1197894). * printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1223969). * rdma/ipoib: Fix error code return in ipoib_mcast_join (bsc#1221082) * s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223883). * s390/mm: Fix storage key clearing for guest huge pages (git-fixes bsc#1223885). * s390/vtime: fix average steal time calculation (git-fixes bsc#1221953). * scsi: qla2xxx: Change debug message during driver unload (bsc1221816). * scsi: qla2xxx: Delay I/O Abort on PCI error (bsc1221816). * scsi: qla2xxx: Fix N2N stuck connection (bsc1221816). * scsi: qla2xxx: Fix command flush on cable pull (bsc1221816). * scsi: qla2xxx: Fix double free of fcport (bsc1221816). * scsi: qla2xxx: Fix double free of the ha->vp_map pointer (bsc1221816). * scsi: qla2xxx: NVME|FCP prefer flag not being honored (bsc1221816). * scsi: qla2xxx: Prevent command send on chip reset (bsc1221816). * scsi: qla2xxx: Split FCE|EFT trace control (bsc1221816). * scsi: qla2xxx: Update manufacturer detail (bsc1221816). * scsi: qla2xxx: Update version to 10.02.09.200-k (bsc1221816). * sr9800: Add check for usbnet_get_endpoints (git-fixes). * sunrpc: Fix RPC client cleaned up the freed pipefs dentries (git-fixes). * sunrpc: fix a memleak in gss_import_v2_context (git-fixes). * sunrpc: fix some memleaks in gssx_dec_option_array (git-fixes). * tls: Fix context leak on tls_device_down (bsc#1221545). * tty/sysrq: replace smp_processor_id() with get_cpu() (bsc#1223540). * tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619). * tun: honor IOCB_NOWAIT flag (git-fixes). * usb: dwc2: Fix memory leak in dwc2_hcd_init. * usb: dwc2: check return value after calling platform_get_resource() (git- fixes). * usb: dwc3: gadget: Ignore EP queue requests during bus reset (git-fixes). * usb: gadget: Fix issue with config_ep_by_speed function (git-fixes). * usb: mon: Fix atomicity violation in mon_bin_vma_fault (git-fixes). * usb: musb: Modify the "HWVers" register address (git-fixes). * usb: roles: do not get/set_role() when usb_role_switch is unregistered. * usb: serial: option: add Fibocom L7xx modules (git-fixes). * usb: serial: option: do not claim interface 4 for ZTE MF290 (git-fixes). * usb: storage: set 1.50 as the lower bcdDevice for older "Super Top" compatibility (git-fixes). * usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes). * usb: usbfs: Do not WARN about excessively large memory allocations. * x86/CPU/AMD: Update the Zenbleed microcode revisions (git-fixes). * x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1643=1
* SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1643=1
* SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1643=1
## Package List:
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc x86_64) * kernel-azure-4.12.14-16.182.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * kernel-azure-base-debuginfo-4.12.14-16.182.1 * kernel-syms-azure-4.12.14-16.182.1 * kernel-azure-debuginfo-4.12.14-16.182.1 * kernel-azure-debugsource-4.12.14-16.182.1 * kernel-azure-devel-4.12.14-16.182.1 * kernel-azure-base-4.12.14-16.182.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * kernel-devel-azure-4.12.14-16.182.1 * kernel-source-azure-4.12.14-16.182.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (nosrc x86_64) * kernel-azure-4.12.14-16.182.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * kernel-azure-base-debuginfo-4.12.14-16.182.1 * kernel-syms-azure-4.12.14-16.182.1 * kernel-azure-debuginfo-4.12.14-16.182.1 * kernel-azure-debugsource-4.12.14-16.182.1 * kernel-azure-devel-4.12.14-16.182.1 * kernel-azure-base-4.12.14-16.182.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * kernel-devel-azure-4.12.14-16.182.1 * kernel-source-azure-4.12.14-16.182.1 * SUSE Linux Enterprise Server 12 SP5 (nosrc x86_64) * kernel-azure-4.12.14-16.182.1 * SUSE Linux Enterprise Server 12 SP5 (x86_64) * kernel-azure-base-debuginfo-4.12.14-16.182.1 * kernel-syms-azure-4.12.14-16.182.1 * kernel-azure-debuginfo-4.12.14-16.182.1 * kernel-azure-debugsource-4.12.14-16.182.1 * kernel-azure-devel-4.12.14-16.182.1 * kernel-azure-base-4.12.14-16.182.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * kernel-devel-azure-4.12.14-16.182.1 * kernel-source-azure-4.12.14-16.182.1
## References:
* https://www.suse.com/security/cve/CVE-2019-25160.html * https://www.suse.com/security/cve/CVE-2020-36312.html * https://www.suse.com/security/cve/CVE-2021-23134.html * https://www.suse.com/security/cve/CVE-2021-46904.html * https://www.suse.com/security/cve/CVE-2021-46905.html * https://www.suse.com/security/cve/CVE-2021-46909.html * https://www.suse.com/security/cve/CVE-2021-46938.html * https://www.suse.com/security/cve/CVE-2021-46939.html * https://www.suse.com/security/cve/CVE-2021-46941.html * https://www.suse.com/security/cve/CVE-2021-46950.html * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2021-46958.html * https://www.suse.com/security/cve/CVE-2021-46960.html * https://www.suse.com/security/cve/CVE-2021-46963.html * https://www.suse.com/security/cve/CVE-2021-46964.html * https://www.suse.com/security/cve/CVE-2021-46966.html * https://www.suse.com/security/cve/CVE-2021-46981.html * https://www.suse.com/security/cve/CVE-2021-46988.html * https://www.suse.com/security/cve/CVE-2021-46990.html * https://www.suse.com/security/cve/CVE-2021-46998.html * https://www.suse.com/security/cve/CVE-2021-47006.html * https://www.suse.com/security/cve/CVE-2021-47015.html * https://www.suse.com/security/cve/CVE-2021-47024.html * https://www.suse.com/security/cve/CVE-2021-47034.html * https://www.suse.com/security/cve/CVE-2021-47045.html * https://www.suse.com/security/cve/CVE-2021-47049.html * https://www.suse.com/security/cve/CVE-2021-47055.html * https://www.suse.com/security/cve/CVE-2021-47056.html * https://www.suse.com/security/cve/CVE-2021-47060.html * https://www.suse.com/security/cve/CVE-2021-47061.html * https://www.suse.com/security/cve/CVE-2021-47063.html * https://www.suse.com/security/cve/CVE-2021-47068.html * https://www.suse.com/security/cve/CVE-2021-47070.html * https://www.suse.com/security/cve/CVE-2021-47071.html * https://www.suse.com/security/cve/CVE-2021-47073.html * https://www.suse.com/security/cve/CVE-2021-47100.html * https://www.suse.com/security/cve/CVE-2021-47101.html * https://www.suse.com/security/cve/CVE-2021-47104.html * https://www.suse.com/security/cve/CVE-2021-47110.html * https://www.suse.com/security/cve/CVE-2021-47112.html * https://www.suse.com/security/cve/CVE-2021-47113.html * https://www.suse.com/security/cve/CVE-2021-47114.html * https://www.suse.com/security/cve/CVE-2021-47117.html * https://www.suse.com/security/cve/CVE-2021-47118.html * https://www.suse.com/security/cve/CVE-2021-47119.html * https://www.suse.com/security/cve/CVE-2021-47131.html * https://www.suse.com/security/cve/CVE-2021-47138.html * https://www.suse.com/security/cve/CVE-2021-47141.html * https://www.suse.com/security/cve/CVE-2021-47142.html * https://www.suse.com/security/cve/CVE-2021-47143.html * https://www.suse.com/security/cve/CVE-2021-47146.html * https://www.suse.com/security/cve/CVE-2021-47149.html * https://www.suse.com/security/cve/CVE-2021-47150.html * https://www.suse.com/security/cve/CVE-2021-47153.html * https://www.suse.com/security/cve/CVE-2021-47159.html * https://www.suse.com/security/cve/CVE-2021-47161.html * https://www.suse.com/security/cve/CVE-2021-47162.html * https://www.suse.com/security/cve/CVE-2021-47165.html * https://www.suse.com/security/cve/CVE-2021-47166.html * https://www.suse.com/security/cve/CVE-2021-47167.html * https://www.suse.com/security/cve/CVE-2021-47168.html * https://www.suse.com/security/cve/CVE-2021-47169.html * https://www.suse.com/security/cve/CVE-2021-47171.html * https://www.suse.com/security/cve/CVE-2021-47173.html * https://www.suse.com/security/cve/CVE-2021-47177.html * https://www.suse.com/security/cve/CVE-2021-47179.html * https://www.suse.com/security/cve/CVE-2021-47180.html * https://www.suse.com/security/cve/CVE-2021-47181.html * https://www.suse.com/security/cve/CVE-2021-47182.html * https://www.suse.com/security/cve/CVE-2021-47183.html * https://www.suse.com/security/cve/CVE-2021-47184.html * https://www.suse.com/security/cve/CVE-2021-47185.html * https://www.suse.com/security/cve/CVE-2021-47188.html * https://www.suse.com/security/cve/CVE-2021-47189.html * https://www.suse.com/security/cve/CVE-2021-47198.html * https://www.suse.com/security/cve/CVE-2021-47202.html * https://www.suse.com/security/cve/CVE-2021-47203.html * https://www.suse.com/security/cve/CVE-2021-47204.html * https://www.suse.com/security/cve/CVE-2021-47205.html * https://www.suse.com/security/cve/CVE-2021-47207.html * https://www.suse.com/security/cve/CVE-2021-47211.html * https://www.suse.com/security/cve/CVE-2021-47216.html * https://www.suse.com/security/cve/CVE-2021-47217.html * https://www.suse.com/security/cve/CVE-2022-0487.html * https://www.suse.com/security/cve/CVE-2022-48619.html * https://www.suse.com/security/cve/CVE-2022-48626.html * https://www.suse.com/security/cve/CVE-2022-48636.html * https://www.suse.com/security/cve/CVE-2022-48650.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2022-48667.html * https://www.suse.com/security/cve/CVE-2022-48668.html * https://www.suse.com/security/cve/CVE-2022-48672.html * https://www.suse.com/security/cve/CVE-2022-48687.html * https://www.suse.com/security/cve/CVE-2022-48688.html * https://www.suse.com/security/cve/CVE-2022-48695.html * https://www.suse.com/security/cve/CVE-2022-48701.html * https://www.suse.com/security/cve/CVE-2022-48702.html * https://www.suse.com/security/cve/CVE-2023-0160.html * https://www.suse.com/security/cve/CVE-2023-28746.html * https://www.suse.com/security/cve/CVE-2023-35827.html * https://www.suse.com/security/cve/CVE-2023-4881.html * https://www.suse.com/security/cve/CVE-2023-52454.html * https://www.suse.com/security/cve/CVE-2023-52469.html * https://www.suse.com/security/cve/CVE-2023-52470.html * https://www.suse.com/security/cve/CVE-2023-52474.html * https://www.suse.com/security/cve/CVE-2023-52476.html * https://www.suse.com/security/cve/CVE-2023-52477.html * https://www.suse.com/security/cve/CVE-2023-52486.html * https://www.suse.com/security/cve/CVE-2023-52488.html * https://www.suse.com/security/cve/CVE-2023-52509.html * https://www.suse.com/security/cve/CVE-2023-52515.html * https://www.suse.com/security/cve/CVE-2023-52524.html * https://www.suse.com/security/cve/CVE-2023-52528.html * https://www.suse.com/security/cve/CVE-2023-52575.html * https://www.suse.com/security/cve/CVE-2023-52583.html * https://www.suse.com/security/cve/CVE-2023-52587.html * https://www.suse.com/security/cve/CVE-2023-52590.html * https://www.suse.com/security/cve/CVE-2023-52591.html * https://www.suse.com/security/cve/CVE-2023-52595.html * https://www.suse.com/security/cve/CVE-2023-52598.html * https://www.suse.com/security/cve/CVE-2023-52607.html * https://www.suse.com/security/cve/CVE-2023-52614.html * https://www.suse.com/security/cve/CVE-2023-52620.html * https://www.suse.com/security/cve/CVE-2023-52628.html * https://www.suse.com/security/cve/CVE-2023-52635.html * https://www.suse.com/security/cve/CVE-2023-52639.html * https://www.suse.com/security/cve/CVE-2023-52644.html * https://www.suse.com/security/cve/CVE-2023-52646.html * https://www.suse.com/security/cve/CVE-2023-52650.html * https://www.suse.com/security/cve/CVE-2023-52652.html * https://www.suse.com/security/cve/CVE-2023-52653.html * https://www.suse.com/security/cve/CVE-2023-6270.html * https://www.suse.com/security/cve/CVE-2023-6356.html * https://www.suse.com/security/cve/CVE-2023-6535.html * https://www.suse.com/security/cve/CVE-2023-6536.html * https://www.suse.com/security/cve/CVE-2023-7042.html * https://www.suse.com/security/cve/CVE-2023-7192.html * https://www.suse.com/security/cve/CVE-2024-0639.html * https://www.suse.com/security/cve/CVE-2024-2201.html * https://www.suse.com/security/cve/CVE-2024-22099.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-23848.html * https://www.suse.com/security/cve/CVE-2024-24855.html * https://www.suse.com/security/cve/CVE-2024-24861.html * https://www.suse.com/security/cve/CVE-2024-26614.html * https://www.suse.com/security/cve/CVE-2024-26642.html * https://www.suse.com/security/cve/CVE-2024-26651.html * https://www.suse.com/security/cve/CVE-2024-26671.html * https://www.suse.com/security/cve/CVE-2024-26675.html * https://www.suse.com/security/cve/CVE-2024-26689.html * https://www.suse.com/security/cve/CVE-2024-26704.html * https://www.suse.com/security/cve/CVE-2024-26733.html * https://www.suse.com/security/cve/CVE-2024-26739.html * https://www.suse.com/security/cve/CVE-2024-26743.html * https://www.suse.com/security/cve/CVE-2024-26744.html * https://www.suse.com/security/cve/CVE-2024-26747.html * https://www.suse.com/security/cve/CVE-2024-26754.html * https://www.suse.com/security/cve/CVE-2024-26763.html * https://www.suse.com/security/cve/CVE-2024-26771.html * https://www.suse.com/security/cve/CVE-2024-26772.html * https://www.suse.com/security/cve/CVE-2024-26773.html * https://www.suse.com/security/cve/CVE-2024-26777.html * https://www.suse.com/security/cve/CVE-2024-26778.html * https://www.suse.com/security/cve/CVE-2024-26779.html * https://www.suse.com/security/cve/CVE-2024-26791.html * https://www.suse.com/security/cve/CVE-2024-26793.html * https://www.suse.com/security/cve/CVE-2024-26805.html * https://www.suse.com/security/cve/CVE-2024-26816.html * https://www.suse.com/security/cve/CVE-2024-26817.html * https://www.suse.com/security/cve/CVE-2024-26839.html * https://www.suse.com/security/cve/CVE-2024-26840.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26855.html * https://www.suse.com/security/cve/CVE-2024-26857.html * https://www.suse.com/security/cve/CVE-2024-26859.html * https://www.suse.com/security/cve/CVE-2024-26876.html * https://www.suse.com/security/cve/CVE-2024-26878.html * https://www.suse.com/security/cve/CVE-2024-26883.html * https://www.suse.com/security/cve/CVE-2024-26884.html * https://www.suse.com/security/cve/CVE-2024-26898.html * https://www.suse.com/security/cve/CVE-2024-26901.html * https://www.suse.com/security/cve/CVE-2024-26903.html * https://www.suse.com/security/cve/CVE-2024-26907.html * https://www.suse.com/security/cve/CVE-2024-26922.html * https://www.suse.com/security/cve/CVE-2024-26929.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-26931.html * https://www.suse.com/security/cve/CVE-2024-26948.html * https://www.suse.com/security/cve/CVE-2024-26993.html * https://www.suse.com/security/cve/CVE-2024-27008.html * https://www.suse.com/security/cve/CVE-2024-27013.html * https://www.suse.com/security/cve/CVE-2024-27014.html * https://www.suse.com/security/cve/CVE-2024-27043.html * https://www.suse.com/security/cve/CVE-2024-27046.html * https://www.suse.com/security/cve/CVE-2024-27054.html * https://www.suse.com/security/cve/CVE-2024-27072.html * https://www.suse.com/security/cve/CVE-2024-27073.html * https://www.suse.com/security/cve/CVE-2024-27074.html * https://www.suse.com/security/cve/CVE-2024-27075.html * https://www.suse.com/security/cve/CVE-2024-27078.html * https://www.suse.com/security/cve/CVE-2024-27388.html * https://bugzilla.suse.com/show_bug.cgi?id=1084332 * https://bugzilla.suse.com/show_bug.cgi?id=1141539 * https://bugzilla.suse.com/show_bug.cgi?id=1184509 * https://bugzilla.suse.com/show_bug.cgi?id=1186060 * https://bugzilla.suse.com/show_bug.cgi?id=1190317 * https://bugzilla.suse.com/show_bug.cgi?id=1190576 * https://bugzilla.suse.com/show_bug.cgi?id=1192145 * https://bugzilla.suse.com/show_bug.cgi?id=1194516 * https://bugzilla.suse.com/show_bug.cgi?id=1197894 * https://bugzilla.suse.com/show_bug.cgi?id=1203935 * https://bugzilla.suse.com/show_bug.cgi?id=1209657 * https://bugzilla.suse.com/show_bug.cgi?id=1211592 * https://bugzilla.suse.com/show_bug.cgi?id=1212514 * https://bugzilla.suse.com/show_bug.cgi?id=1213456 * https://bugzilla.suse.com/show_bug.cgi?id=1215221 * https://bugzilla.suse.com/show_bug.cgi?id=1217339 * https://bugzilla.suse.com/show_bug.cgi?id=1217987 * https://bugzilla.suse.com/show_bug.cgi?id=1217988 * https://bugzilla.suse.com/show_bug.cgi?id=1217989 * https://bugzilla.suse.com/show_bug.cgi?id=1218220 * https://bugzilla.suse.com/show_bug.cgi?id=1218336 * https://bugzilla.suse.com/show_bug.cgi?id=1218479 * https://bugzilla.suse.com/show_bug.cgi?id=1218562 * https://bugzilla.suse.com/show_bug.cgi?id=1218917 * https://bugzilla.suse.com/show_bug.cgi?id=1219104 * https://bugzilla.suse.com/show_bug.cgi?id=1219169 * https://bugzilla.suse.com/show_bug.cgi?id=1219170 * https://bugzilla.suse.com/show_bug.cgi?id=1219618 * https://bugzilla.suse.com/show_bug.cgi?id=1219623 * https://bugzilla.suse.com/show_bug.cgi?id=1219847 * https://bugzilla.suse.com/show_bug.cgi?id=1220320 * https://bugzilla.suse.com/show_bug.cgi?id=1220366 * https://bugzilla.suse.com/show_bug.cgi?id=1220394 * https://bugzilla.suse.com/show_bug.cgi?id=1220411 * https://bugzilla.suse.com/show_bug.cgi?id=1220413 * https://bugzilla.suse.com/show_bug.cgi?id=1220416 * https://bugzilla.suse.com/show_bug.cgi?id=1220418 * https://bugzilla.suse.com/show_bug.cgi?id=1220442 * https://bugzilla.suse.com/show_bug.cgi?id=1220445 * https://bugzilla.suse.com/show_bug.cgi?id=1220513 * https://bugzilla.suse.com/show_bug.cgi?id=1220521 * https://bugzilla.suse.com/show_bug.cgi?id=1220528 * https://bugzilla.suse.com/show_bug.cgi?id=1220536 * https://bugzilla.suse.com/show_bug.cgi?id=1220538 * https://bugzilla.suse.com/show_bug.cgi?id=1220554 * https://bugzilla.suse.com/show_bug.cgi?id=1220572 * https://bugzilla.suse.com/show_bug.cgi?id=1220580 * https://bugzilla.suse.com/show_bug.cgi?id=1220611 * https://bugzilla.suse.com/show_bug.cgi?id=1220625 * https://bugzilla.suse.com/show_bug.cgi?id=1220628 * https://bugzilla.suse.com/show_bug.cgi?id=1220637 * https://bugzilla.suse.com/show_bug.cgi?id=1220640 * https://bugzilla.suse.com/show_bug.cgi?id=1220662 * https://bugzilla.suse.com/show_bug.cgi?id=1220687 * https://bugzilla.suse.com/show_bug.cgi?id=1220692 * https://bugzilla.suse.com/show_bug.cgi?id=1220703 * https://bugzilla.suse.com/show_bug.cgi?id=1220706 * https://bugzilla.suse.com/show_bug.cgi?id=1220739 * https://bugzilla.suse.com/show_bug.cgi?id=1220742 * https://bugzilla.suse.com/show_bug.cgi?id=1220743 * https://bugzilla.suse.com/show_bug.cgi?id=1220745 * https://bugzilla.suse.com/show_bug.cgi?id=1220751 * https://bugzilla.suse.com/show_bug.cgi?id=1220768 * https://bugzilla.suse.com/show_bug.cgi?id=1220769 * https://bugzilla.suse.com/show_bug.cgi?id=1220777 * https://bugzilla.suse.com/show_bug.cgi?id=1220790 * https://bugzilla.suse.com/show_bug.cgi?id=1220794 * https://bugzilla.suse.com/show_bug.cgi?id=1220829 * https://bugzilla.suse.com/show_bug.cgi?id=1220836 * https://bugzilla.suse.com/show_bug.cgi?id=1220843 * https://bugzilla.suse.com/show_bug.cgi?id=1220846 * https://bugzilla.suse.com/show_bug.cgi?id=1220850 * https://bugzilla.suse.com/show_bug.cgi?id=1220871 * https://bugzilla.suse.com/show_bug.cgi?id=1220927 * https://bugzilla.suse.com/show_bug.cgi?id=1220960 * https://bugzilla.suse.com/show_bug.cgi?id=1220985 * https://bugzilla.suse.com/show_bug.cgi?id=1220987 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221046 * https://bugzilla.suse.com/show_bug.cgi?id=1221048 * https://bugzilla.suse.com/show_bug.cgi?id=1221058 * https://bugzilla.suse.com/show_bug.cgi?id=1221060 * https://bugzilla.suse.com/show_bug.cgi?id=1221061 * https://bugzilla.suse.com/show_bug.cgi?id=1221077 * https://bugzilla.suse.com/show_bug.cgi?id=1221082 * https://bugzilla.suse.com/show_bug.cgi?id=1221088 * https://bugzilla.suse.com/show_bug.cgi?id=1221162 * https://bugzilla.suse.com/show_bug.cgi?id=1221277 * https://bugzilla.suse.com/show_bug.cgi?id=1221293 * https://bugzilla.suse.com/show_bug.cgi?id=1221337 * https://bugzilla.suse.com/show_bug.cgi?id=1221532 * https://bugzilla.suse.com/show_bug.cgi?id=1221541 * https://bugzilla.suse.com/show_bug.cgi?id=1221543 * https://bugzilla.suse.com/show_bug.cgi?id=1221545 * https://bugzilla.suse.com/show_bug.cgi?id=1221548 * https://bugzilla.suse.com/show_bug.cgi?id=1221575 * https://bugzilla.suse.com/show_bug.cgi?id=1221605 * https://bugzilla.suse.com/show_bug.cgi?id=1221608 * https://bugzilla.suse.com/show_bug.cgi?id=1221617 * https://bugzilla.suse.com/show_bug.cgi?id=1221791 * https://bugzilla.suse.com/show_bug.cgi?id=1221816 * https://bugzilla.suse.com/show_bug.cgi?id=1221825 * https://bugzilla.suse.com/show_bug.cgi?id=1221830 * https://bugzilla.suse.com/show_bug.cgi?id=1221862 * https://bugzilla.suse.com/show_bug.cgi?id=1221934 * https://bugzilla.suse.com/show_bug.cgi?id=1221949 * https://bugzilla.suse.com/show_bug.cgi?id=1221952 * https://bugzilla.suse.com/show_bug.cgi?id=1221953 * https://bugzilla.suse.com/show_bug.cgi?id=1221965 * https://bugzilla.suse.com/show_bug.cgi?id=1221966 * https://bugzilla.suse.com/show_bug.cgi?id=1221967 * https://bugzilla.suse.com/show_bug.cgi?id=1221969 * https://bugzilla.suse.com/show_bug.cgi?id=1221972 * https://bugzilla.suse.com/show_bug.cgi?id=1221973 * https://bugzilla.suse.com/show_bug.cgi?id=1221977 * https://bugzilla.suse.com/show_bug.cgi?id=1221979 * https://bugzilla.suse.com/show_bug.cgi?id=1221988 * https://bugzilla.suse.com/show_bug.cgi?id=1221991 * https://bugzilla.suse.com/show_bug.cgi?id=1221993 * https://bugzilla.suse.com/show_bug.cgi?id=1221994 * https://bugzilla.suse.com/show_bug.cgi?id=1221997 * https://bugzilla.suse.com/show_bug.cgi?id=1221998 * https://bugzilla.suse.com/show_bug.cgi?id=1221999 * https://bugzilla.suse.com/show_bug.cgi?id=1222000 * https://bugzilla.suse.com/show_bug.cgi?id=1222001 * https://bugzilla.suse.com/show_bug.cgi?id=1222002 * https://bugzilla.suse.com/show_bug.cgi?id=1222117 * https://bugzilla.suse.com/show_bug.cgi?id=1222294 * https://bugzilla.suse.com/show_bug.cgi?id=1222300 * https://bugzilla.suse.com/show_bug.cgi?id=1222357 * https://bugzilla.suse.com/show_bug.cgi?id=1222379 * https://bugzilla.suse.com/show_bug.cgi?id=1222422 * https://bugzilla.suse.com/show_bug.cgi?id=1222428 * https://bugzilla.suse.com/show_bug.cgi?id=1222449 * https://bugzilla.suse.com/show_bug.cgi?id=1222503 * https://bugzilla.suse.com/show_bug.cgi?id=1222559 * https://bugzilla.suse.com/show_bug.cgi?id=1222585 * https://bugzilla.suse.com/show_bug.cgi?id=1222609 * https://bugzilla.suse.com/show_bug.cgi?id=1222610 * https://bugzilla.suse.com/show_bug.cgi?id=1222613 * https://bugzilla.suse.com/show_bug.cgi?id=1222618 * https://bugzilla.suse.com/show_bug.cgi?id=1222619 * https://bugzilla.suse.com/show_bug.cgi?id=1222624 * https://bugzilla.suse.com/show_bug.cgi?id=1222630 * https://bugzilla.suse.com/show_bug.cgi?id=1222632 * https://bugzilla.suse.com/show_bug.cgi?id=1222660 * https://bugzilla.suse.com/show_bug.cgi?id=1222662 * https://bugzilla.suse.com/show_bug.cgi?id=1222664 * https://bugzilla.suse.com/show_bug.cgi?id=1222666 * https://bugzilla.suse.com/show_bug.cgi?id=1222669 * https://bugzilla.suse.com/show_bug.cgi?id=1222671 * https://bugzilla.suse.com/show_bug.cgi?id=1222677 * https://bugzilla.suse.com/show_bug.cgi?id=1222706 * https://bugzilla.suse.com/show_bug.cgi?id=1222720 * https://bugzilla.suse.com/show_bug.cgi?id=1222765 * https://bugzilla.suse.com/show_bug.cgi?id=1222770 * https://bugzilla.suse.com/show_bug.cgi?id=1222772 * https://bugzilla.suse.com/show_bug.cgi?id=1222787 * https://bugzilla.suse.com/show_bug.cgi?id=1222790 * https://bugzilla.suse.com/show_bug.cgi?id=1222793 * https://bugzilla.suse.com/show_bug.cgi?id=1222812 * https://bugzilla.suse.com/show_bug.cgi?id=1222836 * https://bugzilla.suse.com/show_bug.cgi?id=1222869 * https://bugzilla.suse.com/show_bug.cgi?id=1222876 * https://bugzilla.suse.com/show_bug.cgi?id=1222878 * https://bugzilla.suse.com/show_bug.cgi?id=1222881 * https://bugzilla.suse.com/show_bug.cgi?id=1222883 * https://bugzilla.suse.com/show_bug.cgi?id=1222888 * https://bugzilla.suse.com/show_bug.cgi?id=1222952 * https://bugzilla.suse.com/show_bug.cgi?id=1222961 * https://bugzilla.suse.com/show_bug.cgi?id=1222975 * https://bugzilla.suse.com/show_bug.cgi?id=1222976 * https://bugzilla.suse.com/show_bug.cgi?id=1223016 * https://bugzilla.suse.com/show_bug.cgi?id=1223035 * https://bugzilla.suse.com/show_bug.cgi?id=1223049 * https://bugzilla.suse.com/show_bug.cgi?id=1223051 * https://bugzilla.suse.com/show_bug.cgi?id=1223057 * https://bugzilla.suse.com/show_bug.cgi?id=1223058 * https://bugzilla.suse.com/show_bug.cgi?id=1223060 * https://bugzilla.suse.com/show_bug.cgi?id=1223119 * https://bugzilla.suse.com/show_bug.cgi?id=1223187 * https://bugzilla.suse.com/show_bug.cgi?id=1223189 * https://bugzilla.suse.com/show_bug.cgi?id=1223198 * https://bugzilla.suse.com/show_bug.cgi?id=1223203 * https://bugzilla.suse.com/show_bug.cgi?id=1223315 * https://bugzilla.suse.com/show_bug.cgi?id=1223432 * https://bugzilla.suse.com/show_bug.cgi?id=1223509 * https://bugzilla.suse.com/show_bug.cgi?id=1223512 * https://bugzilla.suse.com/show_bug.cgi?id=1223513 * https://bugzilla.suse.com/show_bug.cgi?id=1223516 * https://bugzilla.suse.com/show_bug.cgi?id=1223518 * https://bugzilla.suse.com/show_bug.cgi?id=1223539 * https://bugzilla.suse.com/show_bug.cgi?id=1223540 * https://bugzilla.suse.com/show_bug.cgi?id=1223626 * https://bugzilla.suse.com/show_bug.cgi?id=1223627 * https://bugzilla.suse.com/show_bug.cgi?id=1223664 * https://bugzilla.suse.com/show_bug.cgi?id=1223686 * https://bugzilla.suse.com/show_bug.cgi?id=1223693 * https://bugzilla.suse.com/show_bug.cgi?id=1223712 * https://bugzilla.suse.com/show_bug.cgi?id=1223715 * https://bugzilla.suse.com/show_bug.cgi?id=1223735 * https://bugzilla.suse.com/show_bug.cgi?id=1223744 * https://bugzilla.suse.com/show_bug.cgi?id=1223745 * https://bugzilla.suse.com/show_bug.cgi?id=1223770 * https://bugzilla.suse.com/show_bug.cgi?id=1223781 * https://bugzilla.suse.com/show_bug.cgi?id=1223802 * https://bugzilla.suse.com/show_bug.cgi?id=1223819 * https://bugzilla.suse.com/show_bug.cgi?id=1223824 * https://bugzilla.suse.com/show_bug.cgi?id=1223827 * https://bugzilla.suse.com/show_bug.cgi?id=1223837 * https://bugzilla.suse.com/show_bug.cgi?id=1223842 * https://bugzilla.suse.com/show_bug.cgi?id=1223843 * https://bugzilla.suse.com/show_bug.cgi?id=1223844 * https://bugzilla.suse.com/show_bug.cgi?id=1223883 * https://bugzilla.suse.com/show_bug.cgi?id=1223885 * https://bugzilla.suse.com/show_bug.cgi?id=1223921 * https://bugzilla.suse.com/show_bug.cgi?id=1223923 * https://bugzilla.suse.com/show_bug.cgi?id=1223931 * https://bugzilla.suse.com/show_bug.cgi?id=1223941 * https://bugzilla.suse.com/show_bug.cgi?id=1223952 * https://bugzilla.suse.com/show_bug.cgi?id=1223953 * https://bugzilla.suse.com/show_bug.cgi?id=1223954 * https://bugzilla.suse.com/show_bug.cgi?id=1223969 * https://jira.suse.com/browse/PED-5759
--===============0224584118373276301== Content-Type: text/html; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
<div class="container"> <h1>Security update for the Linux Kernel</h1>
<table class="table table-striped table-bordered"> <tbody> <tr> <th>Announcement ID:</th> <td>SUSE-SU-2024:1643-1</td> </tr> <tr> <th>Rating:</th> <td>important</td> </tr> <tr> <th>References:</th> <td> <ul> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1084332">bsc#1084332</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1141539">bsc#1141539</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1184509">bsc#1184509</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1186060">bsc#1186060</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1190317">bsc#1190317</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1190576">bsc#1190576</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1192145">bsc#1192145</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1194516">bsc#1194516</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1197894">bsc#1197894</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1203935">bsc#1203935</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209657">bsc#1209657</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211592">bsc#1211592</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212514">bsc#1212514</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213456">bsc#1213456</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215221">bsc#1215221</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217339">bsc#1217339</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217987">bsc#1217987</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217988">bsc#1217988</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217989">bsc#1217989</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218220">bsc#1218220</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218336">bsc#1218336</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218479">bsc#1218479</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218562">bsc#1218562</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218917">bsc#1218917</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219104">bsc#1219104</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219169">bsc#1219169</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219170">bsc#1219170</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219618">bsc#1219618</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219623">bsc#1219623</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219847">bsc#1219847</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220320">bsc#1220320</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220366">bsc#1220366</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220394">bsc#1220394</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220411">bsc#1220411</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220413">bsc#1220413</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220416">bsc#1220416</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220418">bsc#1220418</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220442">bsc#1220442</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220445">bsc#1220445</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220513">bsc#1220513</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220521">bsc#1220521</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220528">bsc#1220528</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220536">bsc#1220536</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220538">bsc#1220538</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220554">bsc#1220554</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220572">bsc#1220572</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220580">bsc#1220580</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220611">bsc#1220611</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220625">bsc#1220625</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220628">bsc#1220628</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220637">bsc#1220637</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220640">bsc#1220640</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220662">bsc#1220662</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220687">bsc#1220687</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220692">bsc#1220692</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220703">bsc#1220703</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220706">bsc#1220706</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220739">bsc#1220739</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220742">bsc#1220742</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220743">bsc#1220743</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220745">bsc#1220745</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220751">bsc#1220751</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220768">bsc#1220768</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220769">bsc#1220769</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220777">bsc#1220777</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220790">bsc#1220790</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220794">bsc#1220794</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220829">bsc#1220829</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220836">bsc#1220836</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220843">bsc#1220843</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220846">bsc#1220846</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220850">bsc#1220850</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220871">bsc#1220871</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220927">bsc#1220927</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220960">bsc#1220960</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220985">bsc#1220985</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220987">bsc#1220987</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221044">bsc#1221044</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221046">bsc#1221046</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221048">bsc#1221048</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221058">bsc#1221058</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221060">bsc#1221060</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221061">bsc#1221061</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221077">bsc#1221077</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221082">bsc#1221082</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221088">bsc#1221088</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221162">bsc#1221162</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221277">bsc#1221277</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221293">bsc#1221293</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221337">bsc#1221337</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221532">bsc#1221532</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221541">bsc#1221541</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221543">bsc#1221543</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221545">bsc#1221545</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221548">bsc#1221548</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221575">bsc#1221575</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221605">bsc#1221605</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221608">bsc#1221608</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221617">bsc#1221617</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221791">bsc#1221791</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221816">bsc#1221816</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221825">bsc#1221825</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221830">bsc#1221830</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221862">bsc#1221862</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221934">bsc#1221934</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221949">bsc#1221949</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221952">bsc#1221952</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221953">bsc#1221953</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221965">bsc#1221965</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221966">bsc#1221966</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221967">bsc#1221967</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221969">bsc#1221969</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221972">bsc#1221972</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221973">bsc#1221973</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221977">bsc#1221977</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221979">bsc#1221979</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221988">bsc#1221988</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221991">bsc#1221991</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221993">bsc#1221993</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221994">bsc#1221994</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221997">bsc#1221997</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221998">bsc#1221998</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221999">bsc#1221999</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222000">bsc#1222000</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222001">bsc#1222001</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222002">bsc#1222002</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222117">bsc#1222117</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222294">bsc#1222294</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222300">bsc#1222300</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222357">bsc#1222357</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222379">bsc#1222379</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222422">bsc#1222422</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222428">bsc#1222428</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222449">bsc#1222449</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222503">bsc#1222503</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222559">bsc#1222559</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222585">bsc#1222585</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222609">bsc#1222609</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222610">bsc#1222610</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222613">bsc#1222613</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222618">bsc#1222618</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222619">bsc#1222619</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222624">bsc#1222624</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222630">bsc#1222630</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222632">bsc#1222632</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222660">bsc#1222660</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222662">bsc#1222662</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222664">bsc#1222664</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222666">bsc#1222666</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222669">bsc#1222669</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222671">bsc#1222671</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222677">bsc#1222677</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222706">bsc#1222706</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222720">bsc#1222720</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222765">bsc#1222765</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222770">bsc#1222770</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222772">bsc#1222772</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222787">bsc#1222787</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222790">bsc#1222790</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222793">bsc#1222793</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222812">bsc#1222812</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222836">bsc#1222836</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222869">bsc#1222869</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222876">bsc#1222876</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222878">bsc#1222878</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222881">bsc#1222881</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222883">bsc#1222883</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222888">bsc#1222888</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222952">bsc#1222952</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222961">bsc#1222961</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222975">bsc#1222975</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222976">bsc#1222976</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223016">bsc#1223016</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223035">bsc#1223035</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223049">bsc#1223049</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223051">bsc#1223051</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223057">bsc#1223057</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223058">bsc#1223058</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223060">bsc#1223060</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223119">bsc#1223119</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223187">bsc#1223187</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223189">bsc#1223189</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223198">bsc#1223198</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223203">bsc#1223203</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223315">bsc#1223315</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223432">bsc#1223432</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223509">bsc#1223509</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223512">bsc#1223512</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223513">bsc#1223513</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223516">bsc#1223516</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223518">bsc#1223518</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223539">bsc#1223539</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223540">bsc#1223540</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223626">bsc#1223626</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223627">bsc#1223627</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223664">bsc#1223664</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223686">bsc#1223686</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223693">bsc#1223693</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223712">bsc#1223712</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223715">bsc#1223715</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223735">bsc#1223735</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223744">bsc#1223744</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223745">bsc#1223745</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223770">bsc#1223770</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223781">bsc#1223781</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223802">bsc#1223802</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223819">bsc#1223819</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223824">bsc#1223824</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223827">bsc#1223827</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223837">bsc#1223837</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223842">bsc#1223842</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223843">bsc#1223843</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223844">bsc#1223844</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223883">bsc#1223883</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223885">bsc#1223885</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223921">bsc#1223921</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223923">bsc#1223923</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223931">bsc#1223931</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223941">bsc#1223941</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223952">bsc#1223952</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223953">bsc#1223953</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223954">bsc#1223954</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223969">bsc#1223969</a> </li> <li style="display: inline;"> <a href="https://jira.suse.com/browse/PED-5759">jsc#PED-5759</a> </li> </ul> </td> </tr> <tr> <th> Cross-References: </th> <td> <ul> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2019-25160.html">CVE-2019-25160</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2020-36312.html">CVE-2020-36312</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-23134.html">CVE-2021-23134</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46904.html">CVE-2021-46904</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46905.html">CVE-2021-46905</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46909.html">CVE-2021-46909</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46938.html">CVE-2021-46938</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46939.html">CVE-2021-46939</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46941.html">CVE-2021-46941</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46950.html">CVE-2021-46950</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46955.html">CVE-2021-46955</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46958.html">CVE-2021-46958</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46960.html">CVE-2021-46960</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46963.html">CVE-2021-46963</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46964.html">CVE-2021-46964</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46966.html">CVE-2021-46966</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46981.html">CVE-2021-46981</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46988.html">CVE-2021-46988</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46990.html">CVE-2021-46990</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46998.html">CVE-2021-46998</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47006.html">CVE-2021-47006</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47015.html">CVE-2021-47015</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47024.html">CVE-2021-47024</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47034.html">CVE-2021-47034</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47045.html">CVE-2021-47045</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47049.html">CVE-2021-47049</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47055.html">CVE-2021-47055</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47056.html">CVE-2021-47056</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47060.html">CVE-2021-47060</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47061.html">CVE-2021-47061</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47063.html">CVE-2021-47063</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47068.html">CVE-2021-47068</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47070.html">CVE-2021-47070</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47071.html">CVE-2021-47071</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47073.html">CVE-2021-47073</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47100.html">CVE-2021-47100</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47101.html">CVE-2021-47101</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47104.html">CVE-2021-47104</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47110.html">CVE-2021-47110</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47112.html">CVE-2021-47112</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47113.html">CVE-2021-47113</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47114.html">CVE-2021-47114</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47117.html">CVE-2021-47117</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47118.html">CVE-2021-47118</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47119.html">CVE-2021-47119</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47131.html">CVE-2021-47131</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47138.html">CVE-2021-47138</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47141.html">CVE-2021-47141</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47142.html">CVE-2021-47142</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47143.html">CVE-2021-47143</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47146.html">CVE-2021-47146</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47149.html">CVE-2021-47149</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47150.html">CVE-2021-47150</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47153.html">CVE-2021-47153</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47159.html">CVE-2021-47159</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47161.html">CVE-2021-47161</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47162.html">CVE-2021-47162</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47165.html">CVE-2021-47165</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47166.html">CVE-2021-47166</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47167.html">CVE-2021-47167</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47168.html">CVE-2021-47168</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47169.html">CVE-2021-47169</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47171.html">CVE-2021-47171</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47173.html">CVE-2021-47173</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47177.html">CVE-2021-47177</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47179.html">CVE-2021-47179</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47180.html">CVE-2021-47180</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47181.html">CVE-2021-47181</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47182.html">CVE-2021-47182</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47183.html">CVE-2021-47183</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47184.html">CVE-2021-47184</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47185.html">CVE-2021-47185</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47188.html">CVE-2021-47188</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47189.html">CVE-2021-47189</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47198.html">CVE-2021-47198</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47202.html">CVE-2021-47202</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47203.html">CVE-2021-47203</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47204.html">CVE-2021-47204</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47205.html">CVE-2021-47205</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47207.html">CVE-2021-47207</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47211.html">CVE-2021-47211</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47216.html">CVE-2021-47216</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47217.html">CVE-2021-47217</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-0487.html">CVE-2022-0487</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48619.html">CVE-2022-48619</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48626.html">CVE-2022-48626</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48636.html">CVE-2022-48636</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48650.html">CVE-2022-48650</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48651.html">CVE-2022-48651</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48667.html">CVE-2022-48667</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48668.html">CVE-2022-48668</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48672.html">CVE-2022-48672</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48687.html">CVE-2022-48687</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48688.html">CVE-2022-48688</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48695.html">CVE-2022-48695</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48701.html">CVE-2022-48701</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48702.html">CVE-2022-48702</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-0160.html">CVE-2023-0160</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-28746.html">CVE-2023-28746</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-35827.html">CVE-2023-35827</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-4881.html">CVE-2023-4881</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52454.html">CVE-2023-52454</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52469.html">CVE-2023-52469</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52470.html">CVE-2023-52470</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52474.html">CVE-2023-52474</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52476.html">CVE-2023-52476</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52477.html">CVE-2023-52477</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52486.html">CVE-2023-52486</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52488.html">CVE-2023-52488</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52509.html">CVE-2023-52509</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52515.html">CVE-2023-52515</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52524.html">CVE-2023-52524</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52528.html">CVE-2023-52528</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52575.html">CVE-2023-52575</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52583.html">CVE-2023-52583</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52587.html">CVE-2023-52587</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52590.html">CVE-2023-52590</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52591.html">CVE-2023-52591</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52595.html">CVE-2023-52595</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52598.html">CVE-2023-52598</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52607.html">CVE-2023-52607</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52614.html">CVE-2023-52614</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52620.html">CVE-2023-52620</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52628.html">CVE-2023-52628</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52635.html">CVE-2023-52635</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52639.html">CVE-2023-52639</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52644.html">CVE-2023-52644</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52646.html">CVE-2023-52646</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52650.html">CVE-2023-52650</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52652.html">CVE-2023-52652</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52653.html">CVE-2023-52653</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-6270.html">CVE-2023-6270</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-6356.html">CVE-2023-6356</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-6535.html">CVE-2023-6535</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-6536.html">CVE-2023-6536</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-7042.html">CVE-2023-7042</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-7192.html">CVE-2023-7192</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-0639.html">CVE-2024-0639</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-2201.html">CVE-2024-2201</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-22099.html">CVE-2024-22099</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-23307.html">CVE-2024-23307</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-23848.html">CVE-2024-23848</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-24855.html">CVE-2024-24855</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-24861.html">CVE-2024-24861</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26614.html">CVE-2024-26614</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26642.html">CVE-2024-26642</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26651.html">CVE-2024-26651</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26671.html">CVE-2024-26671</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26675.html">CVE-2024-26675</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26689.html">CVE-2024-26689</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26704.html">CVE-2024-26704</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26733.html">CVE-2024-26733</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26739.html">CVE-2024-26739</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26743.html">CVE-2024-26743</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26744.html">CVE-2024-26744</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26747.html">CVE-2024-26747</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26754.html">CVE-2024-26754</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26763.html">CVE-2024-26763</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26771.html">CVE-2024-26771</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26772.html">CVE-2024-26772</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26773.html">CVE-2024-26773</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26777.html">CVE-2024-26777</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26778.html">CVE-2024-26778</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26779.html">CVE-2024-26779</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26791.html">CVE-2024-26791</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26793.html">CVE-2024-26793</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26805.html">CVE-2024-26805</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26816.html">CVE-2024-26816</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26817.html">CVE-2024-26817</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26839.html">CVE-2024-26839</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26840.html">CVE-2024-26840</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26852.html">CVE-2024-26852</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26855.html">CVE-2024-26855</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26857.html">CVE-2024-26857</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26859.html">CVE-2024-26859</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26876.html">CVE-2024-26876</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26878.html">CVE-2024-26878</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26883.html">CVE-2024-26883</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26884.html">CVE-2024-26884</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26898.html">CVE-2024-26898</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26901.html">CVE-2024-26901</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26903.html">CVE-2024-26903</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26907.html">CVE-2024-26907</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26922.html">CVE-2024-26922</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26929.html">CVE-2024-26929</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26930.html">CVE-2024-26930</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26931.html">CVE-2024-26931</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26948.html">CVE-2024-26948</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26993.html">CVE-2024-26993</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27008.html">CVE-2024-27008</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27013.html">CVE-2024-27013</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27014.html">CVE-2024-27014</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27043.html">CVE-2024-27043</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27046.html">CVE-2024-27046</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27054.html">CVE-2024-27054</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27072.html">CVE-2024-27072</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27073.html">CVE-2024-27073</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27074.html">CVE-2024-27074</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27075.html">CVE-2024-27075</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27078.html">CVE-2024-27078</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27388.html">CVE-2024-27388</a> </li> </ul> </td> </tr> <tr> <th>CVSS scores:</th> <td> <ul class="list-group"> <li class="list-group-item"> <span class="cvss-reference">CVE-2019-25160</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2019-25160</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2020-36312</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2020-36312</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-23134</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-23134</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46904</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46904</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46905</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46905</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46909</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46909</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46938</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46939</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46939</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46941</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46941</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46950</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46950</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46955</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46958</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46960</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">2.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46963</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46964</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46981</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46988</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46990</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46998</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47006</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47024</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47045</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47049</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47056</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47060</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47061</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47063</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47068</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47070</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47071</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47073</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47100</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47101</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47104</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47110</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47112</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47113</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47114</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47117</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47118</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47119</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47131</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47138</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47141</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47142</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47143</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47146</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47149</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47150</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47153</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47159</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47161</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47162</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47165</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47166</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47167</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47168</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47169</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47171</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47173</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47177</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47179</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47180</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47181</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47182</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47183</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47184</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47185</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47188</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47189</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47198</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47198</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47202</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47203</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47204</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47205</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47207</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47211</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47216</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47217</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-0487</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-0487</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48619</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.2</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48619</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48626</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48626</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48636</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48650</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48651</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48667</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48668</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48672</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48687</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48688</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48695</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48701</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48702</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.4</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-0160</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-0160</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-28746</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-35827</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-4881</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-4881</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">6.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52454</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52454</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52469</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52469</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52470</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52470</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52474</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52474</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52476</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52477</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52486</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52488</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52509</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52515</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52524</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52528</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.5</span> <span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52575</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52583</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52587</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52590</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52591</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52595</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52598</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52607</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52614</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52620</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52628</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52635</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52639</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52644</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52646</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52650</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52652</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52653</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-6270</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-6270</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-6356</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-6356</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-6535</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-6535</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-6536</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-6536</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-7042</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-7042</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-7192</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-7192</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-0639</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-0639</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-2201</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-22099</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-22099</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-23307</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-23307</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-23848</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-23848</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-24855</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-24855</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-24861</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-24861</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">6.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26614</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.9</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26642</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26651</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.2</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26671</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26675</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26689</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26704</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26733</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26739</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26743</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26744</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26747</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.3</span> <span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26754</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26763</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26771</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26772</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26773</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26777</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26778</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26779</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26791</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26793</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26805</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26816</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26817</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26839</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26840</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26852</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26855</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26857</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26859</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26876</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26878</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26883</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26883</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26884</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26884</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26898</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26898</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26901</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26901</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26903</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26903</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26907</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26907</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26922</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26929</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26930</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26931</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26948</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26993</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27008</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27013</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27014</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27043</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27046</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27054</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27072</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27073</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27074</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27075</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27078</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27388</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> </ul> </td> </tr> <tr> <th>Affected Products:</th> <td> <ul class="list-group"> <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 12 SP5</li> <li class="list-group-item">SUSE Linux Enterprise Server 12 SP5</li> <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 12 SP5</li> </ul> </td> </tr> </tbody> </table>
<p>An update that solves 201 vulnerabilities, contains one feature and has 22 security fixes can now be installed.</p>
<h2>Description:</h2> <p>The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security bugfixes.</p> <p>The following security bugs were fixed:</p> <ul> <li>CVE-2019-25160: Fixed out-of-bounds memory accesses in netlabel (bsc#1220394).</li> <li>CVE-2020-36312: Fixed an issue in virt/kvm/kvm_main.c that had a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure (bsc#1184509).</li> <li>CVE-2021-23134: Fixed a use-after-free issue in nfc sockets (bsc#1186060).</li> <li>CVE-2021-46904: Fixed NULL pointer dereference during tty device unregistration (bsc#1220416).</li> <li>CVE-2021-46905: Fixed NULL pointer dereference on disconnect regression (bsc#1220418).</li> <li>CVE-2021-46909: Fixed a PCI interrupt mapping in ARM footbridge (bsc#1220442).</li> <li>CVE-2021-46938: Fixed a double free of blk_mq_tag_set in dev remove after table load fails in dm rq (bsc#1220554).</li> <li>CVE-2021-46939: Fixed a denial of service in trace_clock_global() in tracing (bsc#1220580).</li> <li>CVE-2021-46941: Fixed core softreset when switch mode in usb dwc3 (bsc#1220628).</li> <li>CVE-2021-46950: Fixed a data corruption bug in raid1 arrays using bitmaps in md/raid1 (bsc#1220662).</li> <li>CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220513).</li> <li>CVE-2021-46958: Fixed a race between transaction aborts and fsyncs leading to use-after-free in btrfs (bsc#1220521).</li> <li>CVE-2021-46960: Fixed a warning on smb2_get_enc_key in cifs (bsc#1220528).</li> <li>CVE-2021-46963: Fixed crash in qla2xxx_mqueuecommand() (bsc#1220536).</li> <li>CVE-2021-46964: Fixed unreserved extra IRQ vectors in qla2xxx (bsc#1220538).</li> <li>CVE-2021-46966: Fixed potential use-after-free issue in cm_write() (bsc#1220572).</li> <li>CVE-2021-46981: Fixed a NULL pointer in flush_workqueue in nbd (bsc#1220611).</li> <li>CVE-2021-46988: Fixed release page in error path to avoid BUG_ON (bsc#1220706).</li> <li>CVE-2021-46990: Fixed a denial of service when toggling entry flush barrier in powerpc/64s (bsc#1220743).</li> <li>CVE-2021-46998: Fixed an use after free bug in enic_hard_start_xmit in ethernet/enic (bsc#1220625).</li> <li>CVE-2021-47006: Fixed wrong check in overflow_handler hook in ARM 9064/1 hw_breakpoint (bsc#1220751).</li> <li>CVE-2021-47015: Fixed a RX consumer index logic in the error path in bnxt_rx_pkt() in bnxt_en (bsc#1220794).</li> <li>CVE-2021-47024: Fixed possible memory leak in vsock/virtio when closing socket (bsc#1220637).</li> <li>CVE-2021-47034: Fixed a kernel memory fault for pte update on radix in powerpc/64s (bsc#1220687).</li> <li>CVE-2021-47045: Fixed a null pointer dereference in lpfc_prep_els_iocb() in scsi lpfc (bsc#1220640).</li> <li>CVE-2021-47049: Fixed an after free in __vmbus_open() in hv vmbus (bsc#1220692).</li> <li>CVE-2021-47055: Fixed missing permissions for locking and badblock ioctls in mtd (bsc#1220768).</li> <li>CVE-2021-47056: Fixed a user-memory-access error on vf2pf_lock in crypto (bsc#1220769).</li> <li>CVE-2021-47060: Fixed a bug in KVM by stop looking for coalesced MMIO zones if the bus is destroyed (bsc#1220742).</li> <li>CVE-2021-47061: Fixed a bug in KVM by destroy I/O bus devices on unregister failure <em>after</em> sync'ing SRCU (bsc#1220745).</li> <li>CVE-2021-47063: Fixed a potential use-after-free during bridge detach in drm bridge/panel (bsc#1220777).</li> <li>CVE-2021-47068: Fixed a use-after-free issue in llcp_sock_bind/connect (bsc#1220739).</li> <li>CVE-2021-47070: Fixed memory leak in error handling paths in uio_hv_generic (bsc#1220829).</li> <li>CVE-2021-47071: Fixed a memory leak in error handling paths in hv_uio_cleanup() in uio_hv_generic (bsc#1220846).</li> <li>CVE-2021-47073: Fixed oops on rmmod dell_smbios init_dell_smbios_wmi() (bsc#1220850).</li> <li>CVE-2021-47100: Fixed UAF when uninstall in ipmi (bsc#1220985).</li> <li>CVE-2021-47101: Fixed uninit-value in asix_mdio_read() (bsc#1220987).</li> <li>CVE-2021-47104: Fixed memory leak in qib_user_sdma_queue_pkts() (bsc#1220960).</li> <li>CVE-2021-47110: Fixed possible memory corruption when restoring from hibernation in x86/kvm (bsc#1221532).</li> <li>CVE-2021-47112: Fixed possible memory corruption when restoring from hibernation in x86/kvm (bsc#1221541).</li> <li>CVE-2021-47113: Abort btrfs rename_exchange if we fail to insert the second ref (bsc#1221543).</li> <li>CVE-2021-47114: Fixed a data corruption by fallocate in ocfs2 (bsc#1221548).</li> <li>CVE-2021-47117: Fixed a crash in ext4_es_cache_extent as ext4_split_extent_at failed in ext4 (bsc#1221575).</li> <li>CVE-2021-47118: Fixed an use-after-free in init task's struct pid in pid (bsc#1221605).</li> <li>CVE-2021-47119: Fixed a memory leak in ext4_fill_super in ext4 (bsc#1221608).</li> <li>CVE-2021-47131: Fixed a use-after-free after the TLS device goes down and up (bsc#1221545).</li> <li>CVE-2021-47138: Fixed an out-of-bound memory access during clearing filters in cxgb4 (bsc#1221934).</li> <li>CVE-2021-47141: Fixed a null pointer dereference on priv->msix_vectors when driver is unloaded in gve (bsc#1221949).</li> <li>CVE-2021-47142: Fixed an use-after-free on ttm->sg in drm/amdgpu (bsc#1221952).</li> <li>CVE-2021-47143: Fixed possible corruption in net/smc after failed device_add() (bsc#1221988).</li> <li>CVE-2021-47149: Fixed a potential null pointer deref in fmvj18x_get_hwinfo() (bsc#1221972).</li> <li>CVE-2021-47150: Fixed the potential memory leak in fec_enet_init() (bsc#1221973).</li> <li>CVE-2021-47153: Fixed wrongly generated interrupt on bus reset in i2c/i801 (bsc#1221969).</li> <li>CVE-2021-47161: Fixed a resource leak in an error handling path in the error handling path of the probe function in spi spi-fsl-dspi (bsc#1221966).</li> <li>CVE-2021-47162: Fixed a possible memory leak in tipc_buf_append (bsc#1221977).</li> <li>CVE-2021-47165: Fixed shutdown crash when component not probed in drm/meson (bsc#1221965).</li> <li>CVE-2021-47166: Fixed a data corruption of pg_bytes_written in nfs_do_recoalesce() in nfs (bsc#1221998).</li> <li>CVE-2021-47167: Fixed an oopsable condition in __nfs_pageio_add_request() in nfs (bsc#1221991).</li> <li>CVE-2021-47168: Fixed an incorrect limit in filelayout_decode_layout() in nfs (bsc#1222002).</li> <li>CVE-2021-47169: Fixed a NULL pointer dereference in rp2_probe in serial rp2 (bsc#1222000).</li> <li>CVE-2021-47171: Fixed a memory leak in smsc75xx_bind in net usb (bsc#1221994).</li> <li>CVE-2021-47173: Fixed a memory leak in uss720_probe in misc/uss720 (bsc#1221993).</li> <li>CVE-2021-47177: Fixed a sysfs leak in alloc_iommu() in iommu/vt-d (bsc#1221997).</li> <li>CVE-2021-47179: Fixed a NULL pointer dereference in pnfs_mark_matching_lsegs_return() in nfsv4 (bsc#1222001).</li> <li>CVE-2021-47180: Fixed a memory leak in nci_allocate_device nfcmrvl_disconnect in nfc nci (bsc#1221999).</li> <li>CVE-2021-47181: Fixed a null pointer dereference caused by calling platform_get_resource() (bsc#1222660).</li> <li>CVE-2021-47182: Fixed scsi_mode_sense() buffer length handling (bsc#1222662).</li> <li>CVE-2021-47183: Fixed a null pointer dereference during link down processing in scsi lpfc (bsc#1192145, bsc#1222664).</li> <li>CVE-2021-47184: Fixed NULL pointer dereference on VSI filter sync (bsc#1222666).</li> <li>CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669).</li> <li>CVE-2021-47189: Fixed denial of service due to memory ordering issues between normal and ordered work functions in btrfs (bsc#1222706).</li> <li>CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions in thermal (bsc#1222878)</li> <li>CVE-2021-47205: Unregistered clocks/resets when unbinding in sunxi-ng (bsc#1222888).</li> <li>CVE-2021-47207: Fixed a null pointer dereference on pointer block in gus (bsc#1222790).</li> <li>CVE-2021-47211: Fixed a null pointer dereference on pointer cs_desc in usb-audio (bsc#1222869).</li> <li>CVE-2022-0487: Fixed an use-after-free vulnerability in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).</li> <li>CVE-2022-48619: Fixed a denial-of-service issue in drivers/input/input.c (bsc#1218220).</li> <li>CVE-2022-48626: Fixed a potential use-after-free on remove path moxart (bsc#1220366).</li> <li>CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223513).</li> <li>CVE-2022-48672: Fixed off-by-one error in unflatten_dt_nodes() (bsc#1223931).</li> <li>CVE-2022-48701: Fixed an out-of-bounds bug in __snd_usb_parse_audio_interface() (bsc#1223921).</li> <li>CVE-2022-48702: Fixed out of bounds access in snd_emu10k1_pcm_channel_alloc() (bsc#1223923).</li> <li>CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system (bsc#1209657).</li> <li>CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).</li> <li>CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1212514).</li> <li>CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221).</li> <li>CVE-2023-52454: Fixed a kernel panic when host sends an invalid H2C PDU length (bsc#1220320).</li> <li>CVE-2023-52469: Fixed a use-after-free in kv_parse_power_table (bsc#1220411).</li> <li>CVE-2023-52470: Fixed null-ptr-deref in radeon_crtc_init() (bsc#1220413).</li> <li>CVE-2023-52474: Fixed a vulnerability with non-PAGE_SIZE-end multi-iovec user SDMA requests (bsc#1220445).</li> <li>CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI during vsyscall (bsc#1220703).</li> <li>CVE-2023-52477: Fixed USB Hub accesses to uninitialized BOS descriptors (bsc#1220790).</li> <li>CVE-2023-52486: Fixed possible use-after-free in drm (bsc#1221277).</li> <li>CVE-2023-52488: Fixed serial/sc16is7xx convert from <em>raw</em> to <em>noinc</em> regmap functions for FIFO (bsc#1221162).</li> <li>CVE-2023-52509: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1220836).</li> <li>CVE-2023-52515: Fixed possible use-after-free in RDMA/srp (bsc#1221048).</li> <li>CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927).</li> <li>CVE-2023-52528: Fixed uninit-value access in __smsc75xx_read_reg() (bsc#1220843).</li> <li>CVE-2023-52575: Fixed SBPB enablement for spec_rstack_overflow=off (bsc#1220871).</li> <li>CVE-2023-52583: Fixed deadlock or deadcode of misusing dget() inside ceph (bsc#1221058).</li> <li>CVE-2023-52587: Fixed mcast list locking in IB/ipoib (bsc#1221082).</li> <li>CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory renaming (bsc#1221088).</li> <li>CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).</li> <li>CVE-2023-52595: Fixed possible deadlock in wifi/rt2x00 (bsc#1221046).</li> <li>CVE-2023-52598: Fixed wrong setting of fpc register in s390/ptrace (bsc#1221060).</li> <li>CVE-2023-52607: Fixed a null-pointer-dereference in pgtable_cache_add kasprintf() (bsc#1221061).</li> <li>CVE-2023-52614: Fixed PM/devfreq buffer overflow in trans_stat_show (bsc#1221617).</li> <li>CVE-2023-52620: Fixed netfilter/nf_tables to disallow timeout for anonymous sets never used from userspace (bsc#1221825).</li> <li>CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222117).</li> <li>CVE-2023-52635: Fixed PM/devfreq to synchronize devfreq_monitor_[start/stop] (bsc#1222294).</li> <li>CVE-2023-52639: Fixed race during shadow creation in KVM/s390/vsie Fixed (bsc#1222300).</li> <li>CVE-2023-52644: Stop/wake correct queue in DMA Tx path when QoS is disabled in b43 (bsc#1222961).</li> <li>CVE-2023-52650: Added missing check for of_find_device_by_node() (bsc#1223770)</li> <li>CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device() (bsc#1223686).</li> <li>CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).</li> <li>CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).</li> <li>CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).</li> <li>CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).</li> <li>CVE-2023-7042: Fixed a null-pointer-dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).</li> <li>CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c (bsc#1218479).</li> <li>CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).</li> <li>CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).</li> <li>CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170).</li> <li>CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).</li> <li>CVE-2024-23848: Fixed media/cec for possible use-after-free in cec_queue_msg_fh (bsc#1219104).</li> <li>CVE-2024-24855: Fixed race condition in lpfc_unregister_fcf_rescan() that could lead to a kernel panic or denial of service issue (bsc#1219618).</li> <li>CVE-2024-24861: Fixed race condition in xc4000_get_frequency() that could lead to malfunction or denial of service issue (bsc#1219623).</li> <li>CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks (bsc#1221293).</li> <li>CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter nf_tables (bsc#1221830).</li> <li>CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357).</li> <li>CVE-2024-26675: Fixed ppp_async to limit MRU to 64K (bsc#1222379).</li> <li>CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).</li> <li>CVE-2024-26704: fixed double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422).</li> <li>CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).</li> <li>CVE-2024-26743: Fixed memory leak in qedr_create_user_qp error flow in rdma/qedr (bsc#1222677)</li> <li>CVE-2024-26744: Fixed null pointer dereference in srpt_service_guid parameter in rdma/srpt (bsc#1222449)</li> <li>CVE-2024-26747: Fixed a NULL pointer issue with USB parent module's reference (bsc#1222609).</li> <li>CVE-2024-26754: Fixed ab use-after-free and null-ptr-deref in gtp_genl_dump_pdp() in gtp (bsc#1222632).</li> <li>CVE-2024-26763: Fixed user corruption via by writing data with O_DIRECT on device in dm-crypt (bsc#1222720).</li> <li>CVE-2024-26771: Fixed a null pointer dereference on edma_probe in dmaengine ti edma (bsc#1222610)</li> <li>CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (bsc#1222613).</li> <li>CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618).</li> <li>CVE-2024-26777: Error out if pixclock equals zero in fbdev/sis (bsc#1222765)</li> <li>CVE-2024-26778: Error out if pixclock equals zero in fbdev/savage (bsc#1222770)</li> <li>CVE-2024-26779: Fixed a race condition on enabling fast-xmit in mac80211 (bsc#1222772).</li> <li>CVE-2024-26791: Properly validated device names in btrfs dev-replace (bsc#1222793)</li> <li>CVE-2024-26793: fixed use-after-free and null-ptr-deref in gtp_newlink() (bsc#1222428).</li> <li>CVE-2024-26805: Fixed a kernel-infoleak-after-free in __skb_datagram_iter in netlink (bsc#1222630).</li> <li>CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y by ignoring them (bsc#1222624).</li> <li>CVE-2024-26817: Fixed amdkfd to use calloc instead of kzalloc to avoid integer overflow (bsc#1222812).</li> <li>CVE-2024-26839: Fixed a memory leak in init_credit_return() (bsc#1222975)</li> <li>CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache() (bsc#1222976).</li> <li>CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in ip6_route_mpath_notify() (bsc#1223057).</li> <li>CVE-2024-26855: Fixed net/ice potential NULL pointer dereference in ice_bridge_setlink() (bsc#1223051).</li> <li>CVE-2024-26857: Fixed geneve to make sure to pull inner header in geneve_rx() (bsc#1223058).</li> <li>CVE-2024-26859: Prevent access to a freed page in page_pool in bnx2x (bsc#1223049).</li> <li>CVE-2024-26876: Fixed crash on irq during probe, related to adv7511_probe() (bsc#1223119).</li> <li>CVE-2024-26878: Fixed quota for potential NULL pointer dereference (bsc#1223060).</li> <li>CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches (bsc#1223035).</li> <li>CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches (bsc#1223189).</li> <li>CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent kernel-infoleak (bsc#1223198).</li> <li>CVE-2024-26907: Fixed a fortify source warning while accessing Eth segment in mlx5 (bsc#1223203).</li> <li>CVE-2024-26922: Validated the parameters of bo mapping operations more clearly (bsc#1223315).</li> <li>CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in dc_state_release (bsc#1223664).</li> <li>CVE-2024-26993: Fixed fs/sysfs reference leak in sysfs_break_active_protection() (bsc#1223693).</li> <li>CVE-2024-27008: Fixed out of bounds access in nv04 (CVE-2024-27008 bsc#1223802).</li> <li>CVE-2024-27013: Fixed tun limit printing rate when illegal packet received by tun device (bsc#1223745).</li> <li>CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS (bsc#1223735).</li> <li>CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).</li> <li>CVE-2024-27046: Fixed nfp/flower handling acti_netdevs allocation failure (bsc#1223827).</li> <li>CVE-2024-27072: Removed useless locks in usbtv_video_free() (bsc#1223837).</li> <li>CVE-2024-27073: Fixed a memory leak in budget_av_attach() (bsc#1223843).</li> <li>CVE-2024-27074: Fixed a memory leak in go7007_load_encoder() (bsc#1223844).</li> <li>CVE-2024-27075: Avoided stack overflow warnings with clang (bsc#1223842).</li> <li>CVE-2024-27078: Fixed a memory leak in tpg_alloc() (bsc#1223781).</li> </ul> <p>The following non-security bugs were fixed:</p> <ul> <li>Input: adxl34x - do not hardcode interrupt trigger type (git-fixes).</li> <li>Input: drv260x - sleep between polling GO bit (git-fixes).</li> <li>Input: ipaq-micro-keys - add error handling for devm_kmemdup.</li> <li>Input: xpad - add PXN V900 support.</li> <li>USB: core: Fix deadlock in usb_deauthorize_interface().</li> <li>USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command (git-fixes).</li> <li>atl1c: fix error return code in atl1c_probe() (git-fixes).</li> <li>atl1e: fix error return code in atl1e_probe() (git-fixes).</li> <li>bluetooth: btqca: Fixed a coding style error (git-fixes).</li> <li>bluetooth: btqca: Introduce HCI_EV_VENDOR and use it (git-fixes).</li> <li>bluetooth: btqcomsmd: Fix command timeout after setting BD address (git-fixes).</li> <li>bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).</li> <li>bnx2x: Fix enabling network interfaces without VFs (git-fixes).</li> <li>bnx2x: Fix missing error code in bnx2x_iov_init_one() (git-fixes).</li> <li>bpf, sockmap: Fix preempt_rt splat when using raw_spin_lock_t (git-fixes).</li> <li>drivers: usb: host: Fix deadlock in oxu_bus_suspend() (git-fixes).</li> <li>ethernet: myri10ge: Fix missing error code in myri10ge_probe() (git-fixes).</li> <li>ethernet: ucc_geth: fix definition and size of ucc_geth_tx_global_pram (git-fixes).</li> <li>fuse: do not unhash root (bsc#1223954).</li> <li>iommu/amd: Increase interrupt remapping table limit to 512 entries (git-fixes).</li> <li>iommu/amd: Mark interrupt as managed (git-fixes).</li> <li>iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (git-fixes).</li> <li>iommu/amd: Silence warnings under memory pressure (git-fixes).</li> <li>iommu: Check if group is NULL before remove device (git-fixes).</li> <li>kabi fix for pNFS: Fix the pnfs block driver's calculation of layoutget size (git-fixes).</li> <li>kabi: PCI: Add locking to RMW PCI Express Capability Register accessors (kabi).</li> <li>lan78xx: Add missing return code checks (git-fixes).</li> <li>lan78xx: Add support to dump lan78xx registers (git-fixes).</li> <li>lan78xx: Do not access skb_queue_head list pointers directly (git-fixes).</li> <li>lan78xx: Fix exception on link speed change (git-fixes).</li> <li>lan78xx: Fix partial packet errors on suspend/resume (git-fixes).</li> <li>lan78xx: Fix race conditions in suspend/resume handling (git-fixes).</li> <li>lan78xx: Fix white space and style issues (git-fixes).</li> <li>lan78xx: Modify error messages (git-fixes).</li> <li>lan78xx: enable auto speed configuration for LAN7850 if no EEPROM is detected (git-fixes).</li> <li>livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539).</li> <li>net/mlx5: Properly convey driver version to firmware (git-fixes).</li> <li>net/qla3xxx: fix schedule while atomic in ql_sem_spinlock (git-fixes).</li> <li>net/tls: Remove the context from the list in tls_device_down (bsc#1221545).</li> <li>net: Fix features skip in for_each_netdev_feature() (git-fixes).</li> <li>net: allwinner: Fix some resources leak in the error handling path of the probe and in the remove function (git-fixes).</li> <li>net: atheros: switch from 'pci_' to 'dma_' API (git-fixes).</li> <li>net: lan78xx: Allow for VLAN headers in timeout calcs (git-fixes).</li> <li>net: lan78xx: Make declaration style consistent (git-fixes).</li> <li>net: lan78xx: Merge memcpy + lexx_to_cpus to get_unaligned_lexx (git-fixes).</li> <li>net: lan78xx: fix runtime PM count underflow on link stop (git-fixes).</li> <li>net: lan78xx: remove set but not used variable 'event' (git-fixes).</li> <li>net: macb: ensure the device is available before accessing GEMGXL control registers (git-fixes).</li> <li>net: stmmac: free tx skb buffer in stmmac_resume() (git-fixes).</li> <li>net: sunrpc: Fix an off by one in rpc_sockaddr2uaddr() (git-fixes).</li> <li>net: usb: lan78xx: Remove lots of set but unused 'ret' variables (git-fixes).</li> <li>net:usb: Use ARRAY_SIZE instead of calculating the array size (git-fixes).</li> <li>nfs: add atomic_open for NFSv3 to handle O_TRUNC correctly (bsc#1219847).</li> <li>nfs: avoid spurious warning of lost lock that is being unlocked (bsc#1221791).</li> <li>nfs: commit errors should be fatal (git-fixes).</li> <li>nfs: fix O_DIRECT commit verifier handling (git-fixes).</li> <li>nfs: fix O_DIRECT locking issues (git-fixes).</li> <li>nfs: fix a request reference leak in nfs_direct_write_clear_reqs() (git-fixes).</li> <li>nfs: fix an off by one in root_nfs_cat() (git-fixes).</li> <li>nfs: fix direct WRITE throughput regression (git-fixes).</li> <li>nfs: fix error handling for O_DIRECT write scheduling (git-fixes).</li> <li>nfs: more O_DIRECT accounting fixes for error paths (git-fixes).</li> <li>nfs: only issue commit in DIO codepath if we have uncommitted data (git-fixes).</li> <li>nfsd: Fix error cleanup path in nfsd_rename() (git-fixes).</li> <li>nfsd: Reset cb_seq_status after NFS4ERR_DELAY (git-fixes).</li> <li>nfsd: Retransmit callbacks after client reconnects (git-fixes).</li> <li>nfsd: lock_rename() needs both directories to live on the same fs (git-fixes).</li> <li>nfsv4.1/pnfs: Ensure we handle the error NFS4ERR_RETURNCONFLICT (git-fixes).</li> <li>pNFS/flexfiles: Check the layout validity in ff_layout_mirror_prepare_stats (git-fixes).</li> <li>pNFS: Fix the pnfs block driver's calculation of layoutget size (git-fixes).</li> <li>pci/aer: Clear MULTI_ERR_COR/UNCOR_RCV bits (git-fixes).</li> <li>pci/aspm: Avoid link retraining race (git-fixes).</li> <li>pci/aspm: Disable ASPM on MFD function removal to avoid use-after-free (git-fixes).</li> <li>pci/aspm: Do not warn if already in common clock mode (git-fixes).</li> <li>pci/aspm: Factor out pcie_wait_for_retrain() (git-fixes).</li> <li>pci/aspm: Reduce severity of common clock config message (git-fixes).</li> <li>pci/aspm: Return 0 or -ETIMEDOUT from pcie_retrain_link() (git-fixes).</li> <li>pci/aspm: Use RMW accessors for changing LNKCTL (git-fixes).</li> <li>pci/dpc: Print all TLP Prefixes, not just the first (git-fixes).</li> <li>pci/iov: Enlarge virtfn sysfs name buffer (git-fixes).</li> <li>pci/msi: Prevent MSI hardware interrupt number truncation (git-fixes).</li> <li>pci/pm: Power up all devices during runtime resume (git-fixes).</li> <li>pci/sysfs: Protect driver's D3cold preference from user space (git-fixes).</li> <li>pci: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).</li> <li>pci: Add function 1 DMA alias quirk for Marvell 88SE9235 (git-fixes).</li> <li>pci: Add locking to RMW PCI Express Capability Register accessors (git-fixes).</li> <li>pci: Avoid FLR for AMD FCH AHCI adapters (git-fixes).</li> <li>pci: Avoid pci_dev_lock() AB/BA deadlock with sriov_numvfs_store() (git-fixes).</li> <li>pci: Make link retraining use RMW accessors for changing LNKCTL (git-fixes).</li> <li>pci: Mark 3ware-9650SE Root Port Extended Tags as broken (git-fixes).</li> <li>pci: Rework pcie_retrain_link() wait loop (git-fixes).</li> <li>pci: aardvark: Fix setting MSI address (git-fixes).</li> <li>pci: aardvark: Fix support for MSI interrupts (git-fixes).</li> <li>pci: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-fixes).</li> <li>pci: endpoint: Do not stop controller when unbinding endpoint function (git-fixes).</li> <li>pci: hotplug: Allow marking devices as disconnected during bind/unbind (git-fixes).</li> <li>pci: pciehp: Add pciehp_set_indicators() to set both indicators (git-fixes).</li> <li>pci: pciehp: Cancel bringup sequence if card is not present (git-fixes).</li> <li>pci: pciehp: Fix AB-BA deadlock between reset_lock and device_lock (git-fixes).</li> <li>pci: pciehp: Use RMW accessors for changing LNKCTL (git-fixes).</li> <li>pci: qcom: Disable write access to read only registers for IP v2.3.3 (git-fixes).</li> <li>pci: qcom: Fix unbalanced PHY init on probe errors (git-fixes).</li> <li>pci: qcom: Use DWC helpers for modifying the read-only DBI registers (git-fixes).</li> <li>pci: switchtec: Return -EFAULT for copy_to_user() errors (git-fixes).</li> <li>printk: Disable passing console lock owner completely during panic() (bsc#1197894).</li> <li>printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1223969).</li> <li>rdma/ipoib: Fix error code return in ipoib_mcast_join (bsc#1221082)</li> <li>s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223883).</li> <li>s390/mm: Fix storage key clearing for guest huge pages (git-fixes bsc#1223885).</li> <li>s390/vtime: fix average steal time calculation (git-fixes bsc#1221953).</li> <li>scsi: qla2xxx: Change debug message during driver unload (bsc1221816).</li> <li>scsi: qla2xxx: Delay I/O Abort on PCI error (bsc1221816).</li> <li>scsi: qla2xxx: Fix N2N stuck connection (bsc1221816).</li> <li>scsi: qla2xxx: Fix command flush on cable pull (bsc1221816).</li> <li>scsi: qla2xxx: Fix double free of fcport (bsc1221816).</li> <li>scsi: qla2xxx: Fix double free of the ha->vp_map pointer (bsc1221816).</li> <li>scsi: qla2xxx: NVME|FCP prefer flag not being honored (bsc1221816).</li> <li>scsi: qla2xxx: Prevent command send on chip reset (bsc1221816).</li> <li>scsi: qla2xxx: Split FCE|EFT trace control (bsc1221816).</li> <li>scsi: qla2xxx: Update manufacturer detail (bsc1221816).</li> <li>scsi: qla2xxx: Update version to 10.02.09.200-k (bsc1221816).</li> <li>sr9800: Add check for usbnet_get_endpoints (git-fixes).</li> <li>sunrpc: Fix RPC client cleaned up the freed pipefs dentries (git-fixes).</li> <li>sunrpc: fix a memleak in gss_import_v2_context (git-fixes).</li> <li>sunrpc: fix some memleaks in gssx_dec_option_array (git-fixes).</li> <li>tls: Fix context leak on tls_device_down (bsc#1221545).</li> <li>tty/sysrq: replace smp_processor_id() with get_cpu() (bsc#1223540).</li> <li>tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619).</li> <li>tun: honor IOCB_NOWAIT flag (git-fixes).</li> <li>usb: dwc2: Fix memory leak in dwc2_hcd_init.</li> <li>usb: dwc2: check return value after calling platform_get_resource() (git-fixes).</li> <li>usb: dwc3: gadget: Ignore EP queue requests during bus reset (git-fixes).</li> <li>usb: gadget: Fix issue with config_ep_by_speed function (git-fixes).</li> <li>usb: mon: Fix atomicity violation in mon_bin_vma_fault (git-fixes).</li> <li>usb: musb: Modify the "HWVers" register address (git-fixes).</li> <li>usb: roles: do not get/set_role() when usb_role_switch is unregistered.</li> <li>usb: serial: option: add Fibocom L7xx modules (git-fixes).</li> <li>usb: serial: option: do not claim interface 4 for ZTE MF290 (git-fixes).</li> <li>usb: storage: set 1.50 as the lower bcdDevice for older "Super Top" compatibility (git-fixes).</li> <li>usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes).</li> <li>usb: usbfs: Do not WARN about excessively large memory allocations.</li> <li>x86/CPU/AMD: Update the Zenbleed microcode revisions (git-fixes).</li> <li>x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes).</li> </ul>
<h2>Special Instructions and Notes:</h2> <ul> <li>Please reboot the system after installing this update.</li> </ul>
<h2>Patch Instructions:</h2> <p> To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product: </p> <ul class="list-group"> <li class="list-group-item"> SUSE Linux Enterprise Server for SAP Applications 12 SP5 <br/> <code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1643=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise High Performance Computing 12 SP5 <br/> <code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1643=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Server 12 SP5 <br/> <code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1643=1</code> </li> </ul>
<h2>Package List:</h2> <ul> <li> SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc x86_64) <ul> <li>kernel-azure-4.12.14-16.182.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) <ul> <li>kernel-azure-base-debuginfo-4.12.14-16.182.1</li> <li>kernel-syms-azure-4.12.14-16.182.1</li> <li>kernel-azure-debuginfo-4.12.14-16.182.1</li> <li>kernel-azure-debugsource-4.12.14-16.182.1</li> <li>kernel-azure-devel-4.12.14-16.182.1</li> <li>kernel-azure-base-4.12.14-16.182.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) <ul> <li>kernel-devel-azure-4.12.14-16.182.1</li> <li>kernel-source-azure-4.12.14-16.182.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing 12 SP5 (nosrc x86_64) <ul> <li>kernel-azure-4.12.14-16.182.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) <ul> <li>kernel-azure-base-debuginfo-4.12.14-16.182.1</li> <li>kernel-syms-azure-4.12.14-16.182.1</li> <li>kernel-azure-debuginfo-4.12.14-16.182.1</li> <li>kernel-azure-debugsource-4.12.14-16.182.1</li> <li>kernel-azure-devel-4.12.14-16.182.1</li> <li>kernel-azure-base-4.12.14-16.182.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) <ul> <li>kernel-devel-azure-4.12.14-16.182.1</li> <li>kernel-source-azure-4.12.14-16.182.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 12 SP5 (nosrc x86_64) <ul> <li>kernel-azure-4.12.14-16.182.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 12 SP5 (x86_64) <ul> <li>kernel-azure-base-debuginfo-4.12.14-16.182.1</li> <li>kernel-syms-azure-4.12.14-16.182.1</li> <li>kernel-azure-debuginfo-4.12.14-16.182.1</li> <li>kernel-azure-debugsource-4.12.14-16.182.1</li> <li>kernel-azure-devel-4.12.14-16.182.1</li> <li>kernel-azure-base-4.12.14-16.182.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 12 SP5 (noarch) <ul> <li>kernel-devel-azure-4.12.14-16.182.1</li> <li>kernel-source-azure-4.12.14-16.182.1</li> </ul> </li> </ul>
<h2>References:</h2> <ul> <li> <a href="https://www.suse.com/security/cve/CVE-2019-25160.html">https://www.suse.com/security/cve/CVE-2019-25160.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2020-36312.html">https://www.suse.com/security/cve/CVE-2020-36312.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-23134.html">https://www.suse.com/security/cve/CVE-2021-23134.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46904.html">https://www.suse.com/security/cve/CVE-2021-46904.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46905.html">https://www.suse.com/security/cve/CVE-2021-46905.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46909.html">https://www.suse.com/security/cve/CVE-2021-46909.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46938.html">https://www.suse.com/security/cve/CVE-2021-46938.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46939.html">https://www.suse.com/security/cve/CVE-2021-46939.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46941.html">https://www.suse.com/security/cve/CVE-2021-46941.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46950.html">https://www.suse.com/security/cve/CVE-2021-46950.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46955.html">https://www.suse.com/security/cve/CVE-2021-46955.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46958.html">https://www.suse.com/security/cve/CVE-2021-46958.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46960.html">https://www.suse.com/security/cve/CVE-2021-46960.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46963.html">https://www.suse.com/security/cve/CVE-2021-46963.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46964.html">https://www.suse.com/security/cve/CVE-2021-46964.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46966.html">https://www.suse.com/security/cve/CVE-2021-46966.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46981.html">https://www.suse.com/security/cve/CVE-2021-46981.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46988.html">https://www.suse.com/security/cve/CVE-2021-46988.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46990.html">https://www.suse.com/security/cve/CVE-2021-46990.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46998.html">https://www.suse.com/security/cve/CVE-2021-46998.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47006.html">https://www.suse.com/security/cve/CVE-2021-47006.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47015.html">https://www.suse.com/security/cve/CVE-2021-47015.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47024.html">https://www.suse.com/security/cve/CVE-2021-47024.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47034.html">https://www.suse.com/security/cve/CVE-2021-47034.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47045.html">https://www.suse.com/security/cve/CVE-2021-47045.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47049.html">https://www.suse.com/security/cve/CVE-2021-47049.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47055.html">https://www.suse.com/security/cve/CVE-2021-47055.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47056.html">https://www.suse.com/security/cve/CVE-2021-47056.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47060.html">https://www.suse.com/security/cve/CVE-2021-47060.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47061.html">https://www.suse.com/security/cve/CVE-2021-47061.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47063.html">https://www.suse.com/security/cve/CVE-2021-47063.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47068.html">https://www.suse.com/security/cve/CVE-2021-47068.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47070.html">https://www.suse.com/security/cve/CVE-2021-47070.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47071.html">https://www.suse.com/security/cve/CVE-2021-47071.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47073.html">https://www.suse.com/security/cve/CVE-2021-47073.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47100.html">https://www.suse.com/security/cve/CVE-2021-47100.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47101.html">https://www.suse.com/security/cve/CVE-2021-47101.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47104.html">https://www.suse.com/security/cve/CVE-2021-47104.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47110.html">https://www.suse.com/security/cve/CVE-2021-47110.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47112.html">https://www.suse.com/security/cve/CVE-2021-47112.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47113.html">https://www.suse.com/security/cve/CVE-2021-47113.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47114.html">https://www.suse.com/security/cve/CVE-2021-47114.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47117.html">https://www.suse.com/security/cve/CVE-2021-47117.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47118.html">https://www.suse.com/security/cve/CVE-2021-47118.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47119.html">https://www.suse.com/security/cve/CVE-2021-47119.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47131.html">https://www.suse.com/security/cve/CVE-2021-47131.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47138.html">https://www.suse.com/security/cve/CVE-2021-47138.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47141.html">https://www.suse.com/security/cve/CVE-2021-47141.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47142.html">https://www.suse.com/security/cve/CVE-2021-47142.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47143.html">https://www.suse.com/security/cve/CVE-2021-47143.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47146.html">https://www.suse.com/security/cve/CVE-2021-47146.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47149.html">https://www.suse.com/security/cve/CVE-2021-47149.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47150.html">https://www.suse.com/security/cve/CVE-2021-47150.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47153.html">https://www.suse.com/security/cve/CVE-2021-47153.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47159.html">https://www.suse.com/security/cve/CVE-2021-47159.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47161.html">https://www.suse.com/security/cve/CVE-2021-47161.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47162.html">https://www.suse.com/security/cve/CVE-2021-47162.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47165.html">https://www.suse.com/security/cve/CVE-2021-47165.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47166.html">https://www.suse.com/security/cve/CVE-2021-47166.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47167.html">https://www.suse.com/security/cve/CVE-2021-47167.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47168.html">https://www.suse.com/security/cve/CVE-2021-47168.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47169.html">https://www.suse.com/security/cve/CVE-2021-47169.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47171.html">https://www.suse.com/security/cve/CVE-2021-47171.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47173.html">https://www.suse.com/security/cve/CVE-2021-47173.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47177.html">https://www.suse.com/security/cve/CVE-2021-47177.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47179.html">https://www.suse.com/security/cve/CVE-2021-47179.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47180.html">https://www.suse.com/security/cve/CVE-2021-47180.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47181.html">https://www.suse.com/security/cve/CVE-2021-47181.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47182.html">https://www.suse.com/security/cve/CVE-2021-47182.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47183.html">https://www.suse.com/security/cve/CVE-2021-47183.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47184.html">https://www.suse.com/security/cve/CVE-2021-47184.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47185.html">https://www.suse.com/security/cve/CVE-2021-47185.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47188.html">https://www.suse.com/security/cve/CVE-2021-47188.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47189.html">https://www.suse.com/security/cve/CVE-2021-47189.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47198.html">https://www.suse.com/security/cve/CVE-2021-47198.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47202.html">https://www.suse.com/security/cve/CVE-2021-47202.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47203.html">https://www.suse.com/security/cve/CVE-2021-47203.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47204.html">https://www.suse.com/security/cve/CVE-2021-47204.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47205.html">https://www.suse.com/security/cve/CVE-2021-47205.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47207.html">https://www.suse.com/security/cve/CVE-2021-47207.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47211.html">https://www.suse.com/security/cve/CVE-2021-47211.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47216.html">https://www.suse.com/security/cve/CVE-2021-47216.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47217.html">https://www.suse.com/security/cve/CVE-2021-47217.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-0487.html">https://www.suse.com/security/cve/CVE-2022-0487.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48619.html">https://www.suse.com/security/cve/CVE-2022-48619.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48626.html">https://www.suse.com/security/cve/CVE-2022-48626.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48636.html">https://www.suse.com/security/cve/CVE-2022-48636.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48650.html">https://www.suse.com/security/cve/CVE-2022-48650.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48651.html">https://www.suse.com/security/cve/CVE-2022-48651.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48667.html">https://www.suse.com/security/cve/CVE-2022-48667.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48668.html">https://www.suse.com/security/cve/CVE-2022-48668.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48672.html">https://www.suse.com/security/cve/CVE-2022-48672.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48687.html">https://www.suse.com/security/cve/CVE-2022-48687.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48688.html">https://www.suse.com/security/cve/CVE-2022-48688.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48695.html">https://www.suse.com/security/cve/CVE-2022-48695.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48701.html">https://www.suse.com/security/cve/CVE-2022-48701.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48702.html">https://www.suse.com/security/cve/CVE-2022-48702.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-0160.html">https://www.suse.com/security/cve/CVE-2023-0160.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-28746.html">https://www.suse.com/security/cve/CVE-2023-28746.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-35827.html">https://www.suse.com/security/cve/CVE-2023-35827.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-4881.html">https://www.suse.com/security/cve/CVE-2023-4881.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52454.html">https://www.suse.com/security/cve/CVE-2023-52454.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52469.html">https://www.suse.com/security/cve/CVE-2023-52469.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52470.html">https://www.suse.com/security/cve/CVE-2023-52470.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52474.html">https://www.suse.com/security/cve/CVE-2023-52474.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52476.html">https://www.suse.com/security/cve/CVE-2023-52476.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52477.html">https://www.suse.com/security/cve/CVE-2023-52477.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52486.html">https://www.suse.com/security/cve/CVE-2023-52486.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52488.html">https://www.suse.com/security/cve/CVE-2023-52488.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52509.html">https://www.suse.com/security/cve/CVE-2023-52509.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52515.html">https://www.suse.com/security/cve/CVE-2023-52515.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52524.html">https://www.suse.com/security/cve/CVE-2023-52524.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52528.html">https://www.suse.com/security/cve/CVE-2023-52528.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52575.html">https://www.suse.com/security/cve/CVE-2023-52575.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52583.html">https://www.suse.com/security/cve/CVE-2023-52583.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52587.html">https://www.suse.com/security/cve/CVE-2023-52587.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52590.html">https://www.suse.com/security/cve/CVE-2023-52590.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52591.html">https://www.suse.com/security/cve/CVE-2023-52591.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52595.html">https://www.suse.com/security/cve/CVE-2023-52595.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52598.html">https://www.suse.com/security/cve/CVE-2023-52598.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52607.html">https://www.suse.com/security/cve/CVE-2023-52607.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52614.html">https://www.suse.com/security/cve/CVE-2023-52614.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52620.html">https://www.suse.com/security/cve/CVE-2023-52620.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52628.html">https://www.suse.com/security/cve/CVE-2023-52628.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52635.html">https://www.suse.com/security/cve/CVE-2023-52635.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52639.html">https://www.suse.com/security/cve/CVE-2023-52639.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52644.html">https://www.suse.com/security/cve/CVE-2023-52644.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52646.html">https://www.suse.com/security/cve/CVE-2023-52646.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52650.html">https://www.suse.com/security/cve/CVE-2023-52650.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52652.html">https://www.suse.com/security/cve/CVE-2023-52652.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52653.html">https://www.suse.com/security/cve/CVE-2023-52653.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-6270.html">https://www.suse.com/security/cve/CVE-2023-6270.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-6356.html">https://www.suse.com/security/cve/CVE-2023-6356.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-6535.html">https://www.suse.com/security/cve/CVE-2023-6535.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-6536.html">https://www.suse.com/security/cve/CVE-2023-6536.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-7042.html">https://www.suse.com/security/cve/CVE-2023-7042.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-7192.html">https://www.suse.com/security/cve/CVE-2023-7192.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-0639.html">https://www.suse.com/security/cve/CVE-2024-0639.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-2201.html">https://www.suse.com/security/cve/CVE-2024-2201.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-22099.html">https://www.suse.com/security/cve/CVE-2024-22099.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-23307.html">https://www.suse.com/security/cve/CVE-2024-23307.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-23848.html">https://www.suse.com/security/cve/CVE-2024-23848.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-24855.html">https://www.suse.com/security/cve/CVE-2024-24855.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-24861.html">https://www.suse.com/security/cve/CVE-2024-24861.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26614.html">https://www.suse.com/security/cve/CVE-2024-26614.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26642.html">https://www.suse.com/security/cve/CVE-2024-26642.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26651.html">https://www.suse.com/security/cve/CVE-2024-26651.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26671.html">https://www.suse.com/security/cve/CVE-2024-26671.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26675.html">https://www.suse.com/security/cve/CVE-2024-26675.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26689.html">https://www.suse.com/security/cve/CVE-2024-26689.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26704.html">https://www.suse.com/security/cve/CVE-2024-26704.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26733.html">https://www.suse.com/security/cve/CVE-2024-26733.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26739.html">https://www.suse.com/security/cve/CVE-2024-26739.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26743.html">https://www.suse.com/security/cve/CVE-2024-26743.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26744.html">https://www.suse.com/security/cve/CVE-2024-26744.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26747.html">https://www.suse.com/security/cve/CVE-2024-26747.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26754.html">https://www.suse.com/security/cve/CVE-2024-26754.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26763.html">https://www.suse.com/security/cve/CVE-2024-26763.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26771.html">https://www.suse.com/security/cve/CVE-2024-26771.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26772.html">https://www.suse.com/security/cve/CVE-2024-26772.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26773.html">https://www.suse.com/security/cve/CVE-2024-26773.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26777.html">https://www.suse.com/security/cve/CVE-2024-26777.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26778.html">https://www.suse.com/security/cve/CVE-2024-26778.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26779.html">https://www.suse.com/security/cve/CVE-2024-26779.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26791.html">https://www.suse.com/security/cve/CVE-2024-26791.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26793.html">https://www.suse.com/security/cve/CVE-2024-26793.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26805.html">https://www.suse.com/security/cve/CVE-2024-26805.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26816.html">https://www.suse.com/security/cve/CVE-2024-26816.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26817.html">https://www.suse.com/security/cve/CVE-2024-26817.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26839.html">https://www.suse.com/security/cve/CVE-2024-26839.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26840.html">https://www.suse.com/security/cve/CVE-2024-26840.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26852.html">https://www.suse.com/security/cve/CVE-2024-26852.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26855.html">https://www.suse.com/security/cve/CVE-2024-26855.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26857.html">https://www.suse.com/security/cve/CVE-2024-26857.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26859.html">https://www.suse.com/security/cve/CVE-2024-26859.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26876.html">https://www.suse.com/security/cve/CVE-2024-26876.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26878.html">https://www.suse.com/security/cve/CVE-2024-26878.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26883.html">https://www.suse.com/security/cve/CVE-2024-26883.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26884.html">https://www.suse.com/security/cve/CVE-2024-26884.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26898.html">https://www.suse.com/security/cve/CVE-2024-26898.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26901.html">https://www.suse.com/security/cve/CVE-2024-26901.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26903.html">https://www.suse.com/security/cve/CVE-2024-26903.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26907.html">https://www.suse.com/security/cve/CVE-2024-26907.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26922.html">https://www.suse.com/security/cve/CVE-2024-26922.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26929.html">https://www.suse.com/security/cve/CVE-2024-26929.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26930.html">https://www.suse.com/security/cve/CVE-2024-26930.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26931.html">https://www.suse.com/security/cve/CVE-2024-26931.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26948.html">https://www.suse.com/security/cve/CVE-2024-26948.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26993.html">https://www.suse.com/security/cve/CVE-2024-26993.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27008.html">https://www.suse.com/security/cve/CVE-2024-27008.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27013.html">https://www.suse.com/security/cve/CVE-2024-27013.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27014.html">https://www.suse.com/security/cve/CVE-2024-27014.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27043.html">https://www.suse.com/security/cve/CVE-2024-27043.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27046.html">https://www.suse.com/security/cve/CVE-2024-27046.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27054.html">https://www.suse.com/security/cve/CVE-2024-27054.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27072.html">https://www.suse.com/security/cve/CVE-2024-27072.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27073.html">https://www.suse.com/security/cve/CVE-2024-27073.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27074.html">https://www.suse.com/security/cve/CVE-2024-27074.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27075.html">https://www.suse.com/security/cve/CVE-2024-27075.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27078.html">https://www.suse.com/security/cve/CVE-2024-27078.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27388.html">https://www.suse.com/security/cve/CVE-2024-27388.html</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1084332">https://bugzilla.suse.com/show_bug.cgi?id=1084332</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1141539">https://bugzilla.suse.com/show_bug.cgi?id=1141539</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1184509">https://bugzilla.suse.com/show_bug.cgi?id=1184509</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1186060">https://bugzilla.suse.com/show_bug.cgi?id=1186060</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1190317">https://bugzilla.suse.com/show_bug.cgi?id=1190317</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1190576">https://bugzilla.suse.com/show_bug.cgi?id=1190576</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1192145">https://bugzilla.suse.com/show_bug.cgi?id=1192145</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1194516">https://bugzilla.suse.com/show_bug.cgi?id=1194516</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1197894">https://bugzilla.suse.com/show_bug.cgi?id=1197894</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1203935">https://bugzilla.suse.com/show_bug.cgi?id=1203935</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209657">https://bugzilla.suse.com/show_bug.cgi?id=1209657</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211592">https://bugzilla.suse.com/show_bug.cgi?id=1211592</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212514">https://bugzilla.suse.com/show_bug.cgi?id=1212514</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213456">https://bugzilla.suse.com/show_bug.cgi?id=1213456</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215221">https://bugzilla.suse.com/show_bug.cgi?id=1215221</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217339">https://bugzilla.suse.com/show_bug.cgi?id=1217339</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217987">https://bugzilla.suse.com/show_bug.cgi?id=1217987</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217988">https://bugzilla.suse.com/show_bug.cgi?id=1217988</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217989">https://bugzilla.suse.com/show_bug.cgi?id=1217989</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218220">https://bugzilla.suse.com/show_bug.cgi?id=1218220</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218336">https://bugzilla.suse.com/show_bug.cgi?id=1218336</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218479">https://bugzilla.suse.com/show_bug.cgi?id=1218479</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218562">https://bugzilla.suse.com/show_bug.cgi?id=1218562</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218917">https://bugzilla.suse.com/show_bug.cgi?id=1218917</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219104">https://bugzilla.suse.com/show_bug.cgi?id=1219104</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219169">https://bugzilla.suse.com/show_bug.cgi?id=1219169</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219170">https://bugzilla.suse.com/show_bug.cgi?id=1219170</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219618">https://bugzilla.suse.com/show_bug.cgi?id=1219618</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219623">https://bugzilla.suse.com/show_bug.cgi?id=1219623</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219847">https://bugzilla.suse.com/show_bug.cgi?id=1219847</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220320">https://bugzilla.suse.com/show_bug.cgi?id=1220320</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220366">https://bugzilla.suse.com/show_bug.cgi?id=1220366</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220394">https://bugzilla.suse.com/show_bug.cgi?id=1220394</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220411">https://bugzilla.suse.com/show_bug.cgi?id=1220411</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220413">https://bugzilla.suse.com/show_bug.cgi?id=1220413</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220416">https://bugzilla.suse.com/show_bug.cgi?id=1220416</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220418">https://bugzilla.suse.com/show_bug.cgi?id=1220418</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220442">https://bugzilla.suse.com/show_bug.cgi?id=1220442</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220445">https://bugzilla.suse.com/show_bug.cgi?id=1220445</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220513">https://bugzilla.suse.com/show_bug.cgi?id=1220513</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220521">https://bugzilla.suse.com/show_bug.cgi?id=1220521</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220528">https://bugzilla.suse.com/show_bug.cgi?id=1220528</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220536">https://bugzilla.suse.com/show_bug.cgi?id=1220536</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220538">https://bugzilla.suse.com/show_bug.cgi?id=1220538</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220554">https://bugzilla.suse.com/show_bug.cgi?id=1220554</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220572">https://bugzilla.suse.com/show_bug.cgi?id=1220572</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220580">https://bugzilla.suse.com/show_bug.cgi?id=1220580</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220611">https://bugzilla.suse.com/show_bug.cgi?id=1220611</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220625">https://bugzilla.suse.com/show_bug.cgi?id=1220625</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220628">https://bugzilla.suse.com/show_bug.cgi?id=1220628</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220637">https://bugzilla.suse.com/show_bug.cgi?id=1220637</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220640">https://bugzilla.suse.com/show_bug.cgi?id=1220640</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220662">https://bugzilla.suse.com/show_bug.cgi?id=1220662</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220687">https://bugzilla.suse.com/show_bug.cgi?id=1220687</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220692">https://bugzilla.suse.com/show_bug.cgi?id=1220692</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220703">https://bugzilla.suse.com/show_bug.cgi?id=1220703</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220706">https://bugzilla.suse.com/show_bug.cgi?id=1220706</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220739">https://bugzilla.suse.com/show_bug.cgi?id=1220739</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220742">https://bugzilla.suse.com/show_bug.cgi?id=1220742</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220743">https://bugzilla.suse.com/show_bug.cgi?id=1220743</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220745">https://bugzilla.suse.com/show_bug.cgi?id=1220745</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220751">https://bugzilla.suse.com/show_bug.cgi?id=1220751</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220768">https://bugzilla.suse.com/show_bug.cgi?id=1220768</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220769">https://bugzilla.suse.com/show_bug.cgi?id=1220769</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220777">https://bugzilla.suse.com/show_bug.cgi?id=1220777</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220790">https://bugzilla.suse.com/show_bug.cgi?id=1220790</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220794">https://bugzilla.suse.com/show_bug.cgi?id=1220794</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220829">https://bugzilla.suse.com/show_bug.cgi?id=1220829</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220836">https://bugzilla.suse.com/show_bug.cgi?id=1220836</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220843">https://bugzilla.suse.com/show_bug.cgi?id=1220843</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220846">https://bugzilla.suse.com/show_bug.cgi?id=1220846</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220850">https://bugzilla.suse.com/show_bug.cgi?id=1220850</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220871">https://bugzilla.suse.com/show_bug.cgi?id=1220871</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220927">https://bugzilla.suse.com/show_bug.cgi?id=1220927</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220960">https://bugzilla.suse.com/show_bug.cgi?id=1220960</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220985">https://bugzilla.suse.com/show_bug.cgi?id=1220985</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220987">https://bugzilla.suse.com/show_bug.cgi?id=1220987</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221044">https://bugzilla.suse.com/show_bug.cgi?id=1221044</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221046">https://bugzilla.suse.com/show_bug.cgi?id=1221046</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221048">https://bugzilla.suse.com/show_bug.cgi?id=1221048</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221058">https://bugzilla.suse.com/show_bug.cgi?id=1221058</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221060">https://bugzilla.suse.com/show_bug.cgi?id=1221060</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221061">https://bugzilla.suse.com/show_bug.cgi?id=1221061</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221077">https://bugzilla.suse.com/show_bug.cgi?id=1221077</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221082">https://bugzilla.suse.com/show_bug.cgi?id=1221082</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221088">https://bugzilla.suse.com/show_bug.cgi?id=1221088</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221162">https://bugzilla.suse.com/show_bug.cgi?id=1221162</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221277">https://bugzilla.suse.com/show_bug.cgi?id=1221277</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221293">https://bugzilla.suse.com/show_bug.cgi?id=1221293</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221337">https://bugzilla.suse.com/show_bug.cgi?id=1221337</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221532">https://bugzilla.suse.com/show_bug.cgi?id=1221532</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221541">https://bugzilla.suse.com/show_bug.cgi?id=1221541</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221543">https://bugzilla.suse.com/show_bug.cgi?id=1221543</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221545">https://bugzilla.suse.com/show_bug.cgi?id=1221545</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221548">https://bugzilla.suse.com/show_bug.cgi?id=1221548</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221575">https://bugzilla.suse.com/show_bug.cgi?id=1221575</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221605">https://bugzilla.suse.com/show_bug.cgi?id=1221605</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221608">https://bugzilla.suse.com/show_bug.cgi?id=1221608</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221617">https://bugzilla.suse.com/show_bug.cgi?id=1221617</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221791">https://bugzilla.suse.com/show_bug.cgi?id=1221791</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221816">https://bugzilla.suse.com/show_bug.cgi?id=1221816</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221825">https://bugzilla.suse.com/show_bug.cgi?id=1221825</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221830">https://bugzilla.suse.com/show_bug.cgi?id=1221830</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221862">https://bugzilla.suse.com/show_bug.cgi?id=1221862</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221934">https://bugzilla.suse.com/show_bug.cgi?id=1221934</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221949">https://bugzilla.suse.com/show_bug.cgi?id=1221949</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221952">https://bugzilla.suse.com/show_bug.cgi?id=1221952</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221953">https://bugzilla.suse.com/show_bug.cgi?id=1221953</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221965">https://bugzilla.suse.com/show_bug.cgi?id=1221965</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221966">https://bugzilla.suse.com/show_bug.cgi?id=1221966</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221967">https://bugzilla.suse.com/show_bug.cgi?id=1221967</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221969">https://bugzilla.suse.com/show_bug.cgi?id=1221969</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221972">https://bugzilla.suse.com/show_bug.cgi?id=1221972</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221973">https://bugzilla.suse.com/show_bug.cgi?id=1221973</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221977">https://bugzilla.suse.com/show_bug.cgi?id=1221977</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221979">https://bugzilla.suse.com/show_bug.cgi?id=1221979</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221988">https://bugzilla.suse.com/show_bug.cgi?id=1221988</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221991">https://bugzilla.suse.com/show_bug.cgi?id=1221991</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221993">https://bugzilla.suse.com/show_bug.cgi?id=1221993</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221994">https://bugzilla.suse.com/show_bug.cgi?id=1221994</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221997">https://bugzilla.suse.com/show_bug.cgi?id=1221997</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221998">https://bugzilla.suse.com/show_bug.cgi?id=1221998</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221999">https://bugzilla.suse.com/show_bug.cgi?id=1221999</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222000">https://bugzilla.suse.com/show_bug.cgi?id=1222000</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222001">https://bugzilla.suse.com/show_bug.cgi?id=1222001</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222002">https://bugzilla.suse.com/show_bug.cgi?id=1222002</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222117">https://bugzilla.suse.com/show_bug.cgi?id=1222117</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222294">https://bugzilla.suse.com/show_bug.cgi?id=1222294</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222300">https://bugzilla.suse.com/show_bug.cgi?id=1222300</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222357">https://bugzilla.suse.com/show_bug.cgi?id=1222357</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222379">https://bugzilla.suse.com/show_bug.cgi?id=1222379</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222422">https://bugzilla.suse.com/show_bug.cgi?id=1222422</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222428">https://bugzilla.suse.com/show_bug.cgi?id=1222428</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222449">https://bugzilla.suse.com/show_bug.cgi?id=1222449</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222503">https://bugzilla.suse.com/show_bug.cgi?id=1222503</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222559">https://bugzilla.suse.com/show_bug.cgi?id=1222559</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222585">https://bugzilla.suse.com/show_bug.cgi?id=1222585</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222609">https://bugzilla.suse.com/show_bug.cgi?id=1222609</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222610">https://bugzilla.suse.com/show_bug.cgi?id=1222610</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222613">https://bugzilla.suse.com/show_bug.cgi?id=1222613</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222618">https://bugzilla.suse.com/show_bug.cgi?id=1222618</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222619">https://bugzilla.suse.com/show_bug.cgi?id=1222619</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222624">https://bugzilla.suse.com/show_bug.cgi?id=1222624</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222630">https://bugzilla.suse.com/show_bug.cgi?id=1222630</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222632">https://bugzilla.suse.com/show_bug.cgi?id=1222632</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222660">https://bugzilla.suse.com/show_bug.cgi?id=1222660</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222662">https://bugzilla.suse.com/show_bug.cgi?id=1222662</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222664">https://bugzilla.suse.com/show_bug.cgi?id=1222664</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222666">https://bugzilla.suse.com/show_bug.cgi?id=1222666</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222669">https://bugzilla.suse.com/show_bug.cgi?id=1222669</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222671">https://bugzilla.suse.com/show_bug.cgi?id=1222671</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222677">https://bugzilla.suse.com/show_bug.cgi?id=1222677</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222706">https://bugzilla.suse.com/show_bug.cgi?id=1222706</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222720">https://bugzilla.suse.com/show_bug.cgi?id=1222720</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222765">https://bugzilla.suse.com/show_bug.cgi?id=1222765</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222770">https://bugzilla.suse.com/show_bug.cgi?id=1222770</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222772">https://bugzilla.suse.com/show_bug.cgi?id=1222772</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222787">https://bugzilla.suse.com/show_bug.cgi?id=1222787</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222790">https://bugzilla.suse.com/show_bug.cgi?id=1222790</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222793">https://bugzilla.suse.com/show_bug.cgi?id=1222793</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222812">https://bugzilla.suse.com/show_bug.cgi?id=1222812</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222836">https://bugzilla.suse.com/show_bug.cgi?id=1222836</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222869">https://bugzilla.suse.com/show_bug.cgi?id=1222869</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222876">https://bugzilla.suse.com/show_bug.cgi?id=1222876</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222878">https://bugzilla.suse.com/show_bug.cgi?id=1222878</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222881">https://bugzilla.suse.com/show_bug.cgi?id=1222881</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222883">https://bugzilla.suse.com/show_bug.cgi?id=1222883</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222888">https://bugzilla.suse.com/show_bug.cgi?id=1222888</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222952">https://bugzilla.suse.com/show_bug.cgi?id=1222952</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222961">https://bugzilla.suse.com/show_bug.cgi?id=1222961</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222975">https://bugzilla.suse.com/show_bug.cgi?id=1222975</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222976">https://bugzilla.suse.com/show_bug.cgi?id=1222976</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223016">https://bugzilla.suse.com/show_bug.cgi?id=1223016</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223035">https://bugzilla.suse.com/show_bug.cgi?id=1223035</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223049">https://bugzilla.suse.com/show_bug.cgi?id=1223049</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223051">https://bugzilla.suse.com/show_bug.cgi?id=1223051</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223057">https://bugzilla.suse.com/show_bug.cgi?id=1223057</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223058">https://bugzilla.suse.com/show_bug.cgi?id=1223058</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223060">https://bugzilla.suse.com/show_bug.cgi?id=1223060</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223119">https://bugzilla.suse.com/show_bug.cgi?id=1223119</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223187">https://bugzilla.suse.com/show_bug.cgi?id=1223187</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223189">https://bugzilla.suse.com/show_bug.cgi?id=1223189</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223198">https://bugzilla.suse.com/show_bug.cgi?id=1223198</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223203">https://bugzilla.suse.com/show_bug.cgi?id=1223203</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223315">https://bugzilla.suse.com/show_bug.cgi?id=1223315</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223432">https://bugzilla.suse.com/show_bug.cgi?id=1223432</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223509">https://bugzilla.suse.com/show_bug.cgi?id=1223509</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223512">https://bugzilla.suse.com/show_bug.cgi?id=1223512</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223513">https://bugzilla.suse.com/show_bug.cgi?id=1223513</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223516">https://bugzilla.suse.com/show_bug.cgi?id=1223516</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223518">https://bugzilla.suse.com/show_bug.cgi?id=1223518</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223539">https://bugzilla.suse.com/show_bug.cgi?id=1223539</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223540">https://bugzilla.suse.com/show_bug.cgi?id=1223540</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223626">https://bugzilla.suse.com/show_bug.cgi?id=1223626</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223627">https://bugzilla.suse.com/show_bug.cgi?id=1223627</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223664">https://bugzilla.suse.com/show_bug.cgi?id=1223664</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223686">https://bugzilla.suse.com/show_bug.cgi?id=1223686</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223693">https://bugzilla.suse.com/show_bug.cgi?id=1223693</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223712">https://bugzilla.suse.com/show_bug.cgi?id=1223712</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223715">https://bugzilla.suse.com/show_bug.cgi?id=1223715</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223735">https://bugzilla.suse.com/show_bug.cgi?id=1223735</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223744">https://bugzilla.suse.com/show_bug.cgi?id=1223744</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223745">https://bugzilla.suse.com/show_bug.cgi?id=1223745</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223770">https://bugzilla.suse.com/show_bug.cgi?id=1223770</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223781">https://bugzilla.suse.com/show_bug.cgi?id=1223781</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223802">https://bugzilla.suse.com/show_bug.cgi?id=1223802</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223819">https://bugzilla.suse.com/show_bug.cgi?id=1223819</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223824">https://bugzilla.suse.com/show_bug.cgi?id=1223824</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223827">https://bugzilla.suse.com/show_bug.cgi?id=1223827</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223837">https://bugzilla.suse.com/show_bug.cgi?id=1223837</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223842">https://bugzilla.suse.com/show_bug.cgi?id=1223842</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223843">https://bugzilla.suse.com/show_bug.cgi?id=1223843</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223844">https://bugzilla.suse.com/show_bug.cgi?id=1223844</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223883">https://bugzilla.suse.com/show_bug.cgi?id=1223883</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223885">https://bugzilla.suse.com/show_bug.cgi?id=1223885</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223921">https://bugzilla.suse.com/show_bug.cgi?id=1223921</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223923">https://bugzilla.suse.com/show_bug.cgi?id=1223923</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223931">https://bugzilla.suse.com/show_bug.cgi?id=1223931</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223941">https://bugzilla.suse.com/show_bug.cgi?id=1223941</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223952">https://bugzilla.suse.com/show_bug.cgi?id=1223952</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223953">https://bugzilla.suse.com/show_bug.cgi?id=1223953</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223954">https://bugzilla.suse.com/show_bug.cgi?id=1223954</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223969">https://bugzilla.suse.com/show_bug.cgi?id=1223969</a> </li> <li> <a href="https://jira.suse.com/browse/PED-5759">https://jira.suse.com/browse/PED-5759</a> </li> </ul> </div>
--===============0224584118373276301==--
|
|
|
|