Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: SUSE-SU-2024:1648-2
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Live Patching 12-SP5, SUSE Linux Enterprise Server 12 SP5, SUSE Linux Enterprise High Performance Computing 12 SP5, SUSE Linux Enterprise Server for SAP Applications 12 SP5, SUSE Linux Enterprise High Availability Extension 12 SP5, SUSE Linux Enterprise Software Development Kit 12 SP5, SUSE Linux Enterprise Workstation Extension 12 12-SP5
Datum: Mi, 22. Mai 2024, 06:44
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6536
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47180
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23134
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47167
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47100
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52528
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47173
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26948
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23848
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46907
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52590
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47165
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6356
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47181
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26929
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47182
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52474
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48688
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46963
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46909
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52524
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23307
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47149
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47104
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
Applikationen: Linux

Originalnachricht

--===============0473165190877057127==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:1648-2
Rating: important
References:

* bsc#1084332
* bsc#1141539
* bsc#1184509
* bsc#1186060
* bsc#1190317
* bsc#1190576
* bsc#1192145
* bsc#1194516
* bsc#1203935
* bsc#1209657
* bsc#1211592
* bsc#1212514
* bsc#1213456
* bsc#1217339
* bsc#1217987
* bsc#1217988
* bsc#1217989
* bsc#1218220
* bsc#1218336
* bsc#1218479
* bsc#1218562
* bsc#1219104
* bsc#1219169
* bsc#1219170
* bsc#1219618
* bsc#1219623
* bsc#1219847
* bsc#1220320
* bsc#1220366
* bsc#1220394
* bsc#1220411
* bsc#1220416
* bsc#1220418
* bsc#1220422
* bsc#1220442
* bsc#1220445
* bsc#1220505
* bsc#1220521
* bsc#1220528
* bsc#1220536
* bsc#1220538
* bsc#1220554
* bsc#1220572
* bsc#1220580
* bsc#1220611
* bsc#1220625
* bsc#1220628
* bsc#1220637
* bsc#1220640
* bsc#1220662
* bsc#1220687
* bsc#1220692
* bsc#1220703
* bsc#1220706
* bsc#1220739
* bsc#1220742
* bsc#1220743
* bsc#1220745
* bsc#1220751
* bsc#1220768
* bsc#1220769
* bsc#1220777
* bsc#1220790
* bsc#1220794
* bsc#1220829
* bsc#1220836
* bsc#1220843
* bsc#1220846
* bsc#1220850
* bsc#1220871
* bsc#1220927
* bsc#1220960
* bsc#1220985
* bsc#1220987
* bsc#1221044
* bsc#1221046
* bsc#1221048
* bsc#1221058
* bsc#1221060
* bsc#1221061
* bsc#1221077
* bsc#1221082
* bsc#1221088
* bsc#1221162
* bsc#1221277
* bsc#1221293
* bsc#1221337
* bsc#1221532
* bsc#1221541
* bsc#1221548
* bsc#1221575
* bsc#1221605
* bsc#1221608
* bsc#1221617
* bsc#1221791
* bsc#1221816
* bsc#1221825
* bsc#1221830
* bsc#1221862
* bsc#1221934
* bsc#1221949
* bsc#1221952
* bsc#1221953
* bsc#1221965
* bsc#1221966
* bsc#1221967
* bsc#1221969
* bsc#1221972
* bsc#1221973
* bsc#1221977
* bsc#1221979
* bsc#1221988
* bsc#1221991
* bsc#1221993
* bsc#1221994
* bsc#1221997
* bsc#1221998
* bsc#1221999
* bsc#1222000
* bsc#1222001
* bsc#1222002
* bsc#1222117
* bsc#1222294
* bsc#1222300
* bsc#1222357
* bsc#1222379
* bsc#1222422
* bsc#1222428
* bsc#1222449
* bsc#1222503
* bsc#1222559
* bsc#1222585
* bsc#1222609
* bsc#1222610
* bsc#1222613
* bsc#1222618
* bsc#1222619
* bsc#1222624
* bsc#1222630
* bsc#1222632
* bsc#1222660
* bsc#1222662
* bsc#1222664
* bsc#1222666
* bsc#1222669
* bsc#1222671
* bsc#1222677
* bsc#1222706
* bsc#1222720
* bsc#1222765
* bsc#1222770
* bsc#1222772
* bsc#1222787
* bsc#1222790
* bsc#1222812
* bsc#1222836
* bsc#1222869
* bsc#1222876
* bsc#1222878
* bsc#1222881
* bsc#1222883
* bsc#1222888
* bsc#1222952
* bsc#1222961
* bsc#1222975
* bsc#1222976
* bsc#1223016
* bsc#1223035
* bsc#1223049
* bsc#1223051
* bsc#1223057
* bsc#1223058
* bsc#1223060
* bsc#1223187
* bsc#1223189
* bsc#1223198
* bsc#1223203
* bsc#1223315
* bsc#1223432
* bsc#1223509
* bsc#1223512
* bsc#1223513
* bsc#1223516
* bsc#1223518
* bsc#1223626
* bsc#1223627
* bsc#1223664
* bsc#1223686
* bsc#1223693
* bsc#1223712
* bsc#1223715
* bsc#1223735
* bsc#1223744
* bsc#1223745
* bsc#1223770
* bsc#1223781
* bsc#1223819
* bsc#1223824
* bsc#1223827
* bsc#1223837
* bsc#1223842
* bsc#1223843
* bsc#1223844
* bsc#1223883
* bsc#1223885
* bsc#1223921
* bsc#1223941
* bsc#1223952
* bsc#1223953
* bsc#1223954
* jsc#PED-5759


Cross-References:

* CVE-2019-25160
* CVE-2020-36312
* CVE-2021-23134
* CVE-2021-46904
* CVE-2021-46905
* CVE-2021-46907
* CVE-2021-46909
* CVE-2021-46938
* CVE-2021-46939
* CVE-2021-46941
* CVE-2021-46950
* CVE-2021-46958
* CVE-2021-46960
* CVE-2021-46963
* CVE-2021-46964
* CVE-2021-46966
* CVE-2021-46975
* CVE-2021-46981
* CVE-2021-46988
* CVE-2021-46990
* CVE-2021-46998
* CVE-2021-47006
* CVE-2021-47015
* CVE-2021-47024
* CVE-2021-47034
* CVE-2021-47045
* CVE-2021-47049
* CVE-2021-47055
* CVE-2021-47056
* CVE-2021-47060
* CVE-2021-47061
* CVE-2021-47063
* CVE-2021-47068
* CVE-2021-47070
* CVE-2021-47071
* CVE-2021-47073
* CVE-2021-47100
* CVE-2021-47101
* CVE-2021-47104
* CVE-2021-47110
* CVE-2021-47112
* CVE-2021-47114
* CVE-2021-47117
* CVE-2021-47118
* CVE-2021-47119
* CVE-2021-47138
* CVE-2021-47141
* CVE-2021-47142
* CVE-2021-47143
* CVE-2021-47146
* CVE-2021-47149
* CVE-2021-47150
* CVE-2021-47153
* CVE-2021-47159
* CVE-2021-47161
* CVE-2021-47162
* CVE-2021-47165
* CVE-2021-47166
* CVE-2021-47167
* CVE-2021-47168
* CVE-2021-47169
* CVE-2021-47171
* CVE-2021-47173
* CVE-2021-47177
* CVE-2021-47179
* CVE-2021-47180
* CVE-2021-47181
* CVE-2021-47182
* CVE-2021-47183
* CVE-2021-47184
* CVE-2021-47185
* CVE-2021-47188
* CVE-2021-47189
* CVE-2021-47198
* CVE-2021-47202
* CVE-2021-47203
* CVE-2021-47204
* CVE-2021-47205
* CVE-2021-47207
* CVE-2021-47211
* CVE-2021-47216
* CVE-2021-47217
* CVE-2022-0487
* CVE-2022-48619
* CVE-2022-48626
* CVE-2022-48636
* CVE-2022-48650
* CVE-2022-48651
* CVE-2022-48667
* CVE-2022-48668
* CVE-2022-48687
* CVE-2022-48688
* CVE-2022-48695
* CVE-2022-48701
* CVE-2023-0160
* CVE-2023-28746
* CVE-2023-35827
* CVE-2023-52454
* CVE-2023-52469
* CVE-2023-52470
* CVE-2023-52474
* CVE-2023-52476
* CVE-2023-52477
* CVE-2023-52486
* CVE-2023-52488
* CVE-2023-52509
* CVE-2023-52515
* CVE-2023-52524
* CVE-2023-52528
* CVE-2023-52575
* CVE-2023-52583
* CVE-2023-52587
* CVE-2023-52590
* CVE-2023-52591
* CVE-2023-52595
* CVE-2023-52598
* CVE-2023-52607
* CVE-2023-52614
* CVE-2023-52620
* CVE-2023-52628
* CVE-2023-52635
* CVE-2023-52639
* CVE-2023-52644
* CVE-2023-52646
* CVE-2023-52650
* CVE-2023-52652
* CVE-2023-52653
* CVE-2023-6270
* CVE-2023-6356
* CVE-2023-6535
* CVE-2023-6536
* CVE-2023-7042
* CVE-2023-7192
* CVE-2024-2201
* CVE-2024-22099
* CVE-2024-23307
* CVE-2024-23848
* CVE-2024-24855
* CVE-2024-24861
* CVE-2024-26614
* CVE-2024-26642
* CVE-2024-26651
* CVE-2024-26671
* CVE-2024-26675
* CVE-2024-26689
* CVE-2024-26704
* CVE-2024-26733
* CVE-2024-26739
* CVE-2024-26743
* CVE-2024-26744
* CVE-2024-26747
* CVE-2024-26754
* CVE-2024-26763
* CVE-2024-26771
* CVE-2024-26772
* CVE-2024-26773
* CVE-2024-26777
* CVE-2024-26778
* CVE-2024-26779
* CVE-2024-26793
* CVE-2024-26805
* CVE-2024-26816
* CVE-2024-26817
* CVE-2024-26839
* CVE-2024-26840
* CVE-2024-26852
* CVE-2024-26855
* CVE-2024-26857
* CVE-2024-26859
* CVE-2024-26878
* CVE-2024-26883
* CVE-2024-26884
* CVE-2024-26898
* CVE-2024-26901
* CVE-2024-26903
* CVE-2024-26907
* CVE-2024-26922
* CVE-2024-26929
* CVE-2024-26930
* CVE-2024-26931
* CVE-2024-26948
* CVE-2024-26993
* CVE-2024-27013
* CVE-2024-27014
* CVE-2024-27043
* CVE-2024-27046
* CVE-2024-27054
* CVE-2024-27072
* CVE-2024-27073
* CVE-2024-27074
* CVE-2024-27075
* CVE-2024-27078
* CVE-2024-27388


CVSS scores:

* CVE-2019-25160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2019-25160 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2020-36312 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2020-36312 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-23134 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-23134 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-46904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46905 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-46905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46907 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2021-46909 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46938 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-46939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46939 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46950 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2021-46950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-46958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46960 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-46963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46964 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46966 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-46975 ( SUSE ): 3.2 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N
* CVE-2021-46981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46998 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47024 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47034 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47055 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47060 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47061 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47063 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47100 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47101 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47112 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47117 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47138 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-47141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47143 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47146 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47150 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47161 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47165 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47168 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47169 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47173 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47173 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47177 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47183 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47198 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47203 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47216 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-0487 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-0487 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48619 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48619 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48626 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-48626 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48668 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48687 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48701 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-28746 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2023-35827 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52454 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52454 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52469 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52469 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52470 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52470 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52474 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2023-52474 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52476 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52477 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52509 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52515 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52528 ( SUSE ): 3.5 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-52575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52587 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52590 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52595 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52598 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52614 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52620 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52628 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52639 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52644 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52652 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6356 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6356 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6535 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6535 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6536 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6536 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7192 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7192 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-2201 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23848 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-23848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-24855 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-24855 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-24861 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-24861 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26614 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26642 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26651 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26743 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26747 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-26771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26839 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26840 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26898 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26901 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-26901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26907 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-26907 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H


Affected Products:

* SUSE Linux Enterprise High Availability Extension 12 SP5
* SUSE Linux Enterprise High Performance Computing 12 SP5
* SUSE Linux Enterprise Live Patching 12-SP5
* SUSE Linux Enterprise Server 12 SP5
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
* SUSE Linux Enterprise Software Development Kit 12 SP5
* SUSE Linux Enterprise Workstation Extension 12 12-SP5



An update that solves 193 vulnerabilities, contains one feature and has 17
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security
bugfixes.

NOTE: This update was retracted due to data corruptions on NFS filesystems.

The following security bugs were fixed:

* CVE-2019-25160: Fixed out-of-bounds memory accesses in netlabel
(bsc#1220394).
* CVE-2020-36312: Fixed an issue in virt/kvm/kvm_main.c that had a
kvm_io_bus_unregister_dev memory leak upon a kmalloc failure (bsc#1184509).
* CVE-2021-23134: Fixed a use-after-free issue in nfc sockets (bsc#1186060).
* CVE-2021-46904: Fixed NULL pointer dereference during tty device
unregistration (bsc#1220416).
* CVE-2021-46905: Fixed NULL pointer dereference on disconnect regression
(bsc#1220418).
* CVE-2021-46909: Fixed PCI interrupt mapping in ARM footbridge
(bsc#1220442).
* CVE-2021-46938: Fixed double free of blk_mq_tag_set in dev remove after
table load fails (bsc#1220554).
* CVE-2021-46939: Fixed possible hung in trace_clock_global() (bsc#1220580).
* CVE-2021-46941: Fixed core softreset when switch mode in usb dwc3
(bsc#1220628).
* CVE-2021-46950: Fixed possible data corruption in md/raid1 when ending a
failed write request (bsc#1220662).
* CVE-2021-46958: Fixed race between transaction aborts and fsyncs that could
lead to use-after-free in btrfs (bsc#1220521).
* CVE-2021-46960: Fixed wrong error code from smb2_get_enc_key()
(bsc#1220528).
* CVE-2021-46963: Fixed crash in qla2xxx_mqueuecommand() (bsc#1220536).
* CVE-2021-46964: Fixed unreserved extra IRQ vectors in qla2xxx
(bsc#1220538).
* CVE-2021-46966: Fixed potential use-after-free issue in cm_write()
(bsc#1220572).
* CVE-2021-46981: Fixed NULL pointer in flush_workqueue (bsc#1220611).
* CVE-2021-46988: Fixed possible crash in userfaultfd due to unreleased page
(bsc#1220706).
* CVE-2021-46990: Fixed crashes when toggling entry flush barrier in
powerpc/64s (bsc#1220743).
* CVE-2021-46998: Fixed a use after free bug in enic_hard_start_xmit()
(bsc#1220625).
* CVE-2021-47006: Fixed wrong check in overflow_handler hook in ARM 9064/1
hw_breakpoint (bsc#1220751).
* CVE-2021-47015: Fixed RX consumer index logic in the error path in bnxt_en
(bsc#1220794).
* CVE-2021-47024: Fixed possible memory leak in vsock/virtio when closing
socket (bsc#1220637).
* CVE-2021-47034: Fixed resolved pte update for kernel memory on radix in
powerpc/64s (bsc#1220687).
* CVE-2021-47045: Fixed null pointer dereference in lpfc_prep_els_iocb()
(bsc#1220640).
* CVE-2021-47049: Fixed Use after free in __vmbus_open() (bsc#1220692).
* CVE-2021-47055: Fixed missing permissions for locking and badblock ioctls
in
mtd (bsc#1220768).
* CVE-2021-47056: Fixed uninitialized lock in adf_vf2pf_shutdown()
(bsc#1220769).
* CVE-2021-47060: Fixed a bug in KVM by stop looking for coalesced MMIO zones
if the bus is destroyed (bsc#1220742).
* CVE-2021-47061: Fixed a bug in KVM by destroy I/O bus devices on unregister
failure _after_ sync'ing SRCU (bsc#1220745).
* CVE-2021-47063: Fixed possible use-after-free in panel_bridge_detach()
(bsc#1220777).
* CVE-2021-47068: Fixed a use-after-free issue in llcp_sock_bind/connect
(bsc#1220739).
* CVE-2021-47070: Fixed memory leak in error handling paths in uio_hv_generic
(bsc#1220829).
* CVE-2021-47071: Fixed memory leak in error handling paths in uio_hv_generic
(bsc#1220846).
* CVE-2021-47073: Fixed oops on rmmod dell_smbios init_dell_smbios_wmi()
(bsc#1220850).
* CVE-2021-47100: Fixed UAF when uninstall in ipmi (bsc#1220985).
* CVE-2021-47101: Fixed uninit-value in asix_mdio_read() (bsc#1220987).
* CVE-2021-47104: Fixed memory leak in qib_user_sdma_queue_pkts()
(bsc#1220960).
* CVE-2021-47110: Fixed possible memory corruption when restoring from
hibernation in x86/kvm (bsc#1221532).
* CVE-2021-47112: Fixed possible memory corruption when restoring from
hibernation in x86/kvm (bsc#1221541).
* CVE-2021-47114: Fixed data corruption by fallocate in ocfs2 (bsc#1221548).
* CVE-2021-47117: Fixed bug on in ext4_es_cache_extent() as
ext4_split_extent_at() failed (bsc#1221575).
* CVE-2021-47118: Fixed possible use-after-free when initializing `cad_pid`
(bsc#1221605).
* CVE-2021-47119: Fixed memory leak in ext4_fill_super() (bsc#1221608).
* CVE-2021-47138: Fixed possible out-of-bound memory access in cxgb4 when
clearing filters (bsc#1221934).
* CVE-2021-47141: Fixed possible NULL pointer dereference when freeing irqs
(bsc#1221949).
* CVE-2021-47142: Fixed a use-after-free in drm/amdgpu (bsc#1221952).
* CVE-2021-47143: Fixed possible corruption in net/smc after failed
device_add() (bsc#1221988).
* CVE-2021-47150: Fixed the potential memory leak in fec_enet_init()
(bsc#1221973).
* CVE-2021-47153: Fixed wrongly generated interrupt on bus reset in i2c/i801
(bsc#1221969).
* CVE-2021-47165: Fixed shutdown crash when component not probed in drm/meson
(bsc#1221965).
* CVE-2021-47166: Fixed possible corruptionb in nfs_do_recoalesce()
(bsc#1221998).
* CVE-2021-47167: Fixed an Oopsable condition in __nfs_pageio_add_request()
(bsc#1221991).
* CVE-2021-47168: Fixed an incorrect limit in filelayout_decode_layout()
(bsc#1222002).
* CVE-2021-47169: Fixed possible NULL pointer dereference in serial/rp2
(bsc#1222000).
* CVE-2021-47171: Fixed memory leak in smsc75xx_bind() (bsc#1221994).
* CVE-2021-47173: Fixed memory leak in uss720_probe() (bsc#1221993).
* CVE-2021-47177: Fixed sysfs leak in alloc_iommu() (bsc#1221997).
* CVE-2021-47179: Fixed a NULL pointer dereference in
pnfs_mark_matching_lsegs_return() (bsc#1222001).
* CVE-2021-47180: Fixed memory leak in nci_allocate_device() (bsc#1221999).
* CVE-2021-47181: Fixed a null pointer dereference caused by calling
platform_get_resource() (bsc#1222660).
* CVE-2021-47183: Fixed a null pointer dereference during link down
processing
in scsi lpfc (bsc#1192145, bsc#1222664).
* CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty
tty_buffer
(bsc#1222669).
* CVE-2021-47189: Fixed denial of service due to memory ordering issues
between normal and ordered work functions in btrfs (bsc#1222706).
* CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions
(bsc#1222878)
* CVE-2022-0487: A use-after-free vulnerability was found in
rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c
(bsc#1194516).
* CVE-2022-48619: Fixed a denial-of-service issue in drivers/input/input.c
(bsc#1218220).
* CVE-2022-48626: Fixed a potential use-after-free on remove path moxart
(bsc#1220366).
* CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to
potentially crash the system (bsc#1209657).
* CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
* CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work()
(bsc#1212514).
* CVE-2023-52454: Fixed a kernel panic when host sends an invalid H2C PDU
length (bsc#1220320).
* CVE-2023-52469: Fixed use-after-free in kv_parse_power_table()
(bsc#1220411).
* CVE-2023-52470: Fixed null-ptr-deref in radeon_crtc_init() (bsc#122041).
* CVE-2023-52474: Fixed bugs with non-PAGE_SIZE-end multi-iovec user SDMA
requests in hfi1 (bsc#1220445).
* CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI
during vsyscall (bsc#1220703).
* CVE-2023-52477: Fixed USB Hub accesses to uninitialized BOS descriptors
(bsc#1220790).
* CVE-2023-52486: Fixed possible use-after-free in drm (bsc#1221277).
* CVE-2023-52509: Fixed a use-after-free issue in ravb_tx_timeout_work()
(bsc#1220836).
* CVE-2023-52515: Fixed possible use-after-free in RDMA/srp (bsc#1221048).
* CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927).
* CVE-2023-52528: Fixed uninit-value access in __smsc75xx_read_reg()
(bsc#1220843).
* CVE-2023-52575: Fixed SBPB enablement for spec_rstack_overflow=off
(bsc#1220871).
* CVE-2023-52583: Fixed deadlock or deadcode of misusing dget() inside ceph
(bsc#1221058).
* CVE-2023-52587: Fixed mcast list locking in IB/ipoib (bsc#1221082).
* CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory
renaming (bsc#1221088).
* CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via
directory renaming (bsc#1221044).
* CVE-2023-52598: Fixed wrong setting of fpc register in s390/ptrace
(bsc#1221060).
* CVE-2023-52607: Fixed NULL pointer dereference in pgtable_cache_add
kasprintf() (bsc#1221061).
* CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222117).
* CVE-2023-52639: Fixed race during shadow creation in KVM/s390/vsie
(bsc#1222300).
* CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts
(bsc#1218562).
* CVE-2023-6356: Fixed a NULL pointer dereference in
nvmet_tcp_build_pdu_iovec
(bsc#1217987).
* CVE-2023-6535: Fixed a NULL pointer dereference in
nvmet_tcp_execute_request
(bsc#1217988).
* CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete
(bsc#1217989).
* CVE-2023-7042: Fixed a NULL pointer dereference vulnerability in
ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).
* CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in
net/netfilter/nf_conntrack_netlink.c (bsc#1218479).
* CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
* CVE-2024-22099: Fixed NULL Pointer Dereference vulnerability in
/net/bluetooth/rfcomm/core.c (bsc#1219170).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1219169).
* CVE-2024-24855: Fixed a null pointer dereference due to race condition in
scsi device driver in lpfc_unregister_fcf_rescan() function (bsc#1219618).
* CVE-2024-24861: Fixed an overflow due to race condition in media/xc4000
device driver in xc4000 xc4000_get_frequency() function (bsc#1219623).
* CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks
(bsc#1221293).
* CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter
nf_tables (bsc#1221830).
* CVE-2024-26704: Fixed a double-free of blocks due to wrong extents
moved_len
in ext4 (bsc#1222422).
* CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
* CVE-2024-26743: Fixed memory leak in qedr_create_user_qp error flow in
rdma/qedr (bsc#1222677)
* CVE-2024-26744: Fixed null pointer dereference in srpt_service_guid
parameter in rdma/srpt (bsc#1222449)
* CVE-2024-26754: Fixed an use-after-free and null-ptr-deref in
gtp_genl_dump_pdp() in gtp (bsc#1222632).
* CVE-2024-26763: Fixed user corruption via by writing data with O_DIRECT on
device in dm-crypt (bsc#1222720).
* CVE-2024-26771: Fixed a null pointer dereference on edma_probe in dmaengine
ti edma (bsc#1222610)
* CVE-2024-26793: Fixed an use-after-free and null-ptr-deref in gtp_newlink()
in gtp (bsc#1222428).
* CVE-2024-26805: Fixed a kernel-infoleak-after-free in __skb_datagram_iter
in
netlink (bsc#1222630).
* CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places
(bsc#1223824).
* CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache()
(bsc#1222976).
* CVE-2021-47161: Fixed a resource leak in an error handling path in the
error
handling path of the probe function in spi spi-fsl-dspi (bsc#1221966).
* CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb->mac_header (bsc#1223513).
* CVE-2024-26816: Ignore relocations in .notes section when building with
CONFIG_XEN_PV=y (bsc#1222624).
* CVE-2023-52595: Fixed possible deadlock in wifi/rt2x00 (bsc#1221046).
* CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).
* CVE-2024-26773: Fixed ext4 block allocation from corrupted group in
ext4_mb_try_best_found() (bsc#1222618).
* CVE-2021-47182: Fixed scsi_mode_sense() buffer length handling
(bsc#1222662).
* CVE-2022-48701: Fixed an out-of-bounds bug in
__snd_usb_parse_audio_interface() (bsc#1223921).
* CVE-2024-26993: Fixed a reference leak in sysfs_break_active_protection()
(bsc#1223693)
* CVE-2023-52650: Added missing check for of_find_device_by_node()
(bsc#1223770)
* CVE-2024-26948: Added a dc_state NULL check in dc_state_release
(bsc#1223664)
* CVE-2024-27013: Limited printing rate when illegal packet received by tun
dev (bsc#1223745).
* CVE-2024-27014: Prevented deadlock while disabling aRFS (bsc#1223735).
* CVE-2024-27046: Handled acti_netdevs allocation failure (bsc#1223827).
* CVE-2021-47162: Fixed a possible memory leak in tipc_buf_append
(bsc#1221977).
* CVE-2024-27072: Removed useless locks in usbtv_video_free() (bsc#1223837).
* CVE-2024-27075: Avoided stack overflow warnings with clang (bsc#1223842).
* CVE-2024-27073: Fixed a memory leak in budget_av_attach() (bsc#1223843).
* CVE-2024-27074: Fixed a memory leak in go7007_load_encoder() (bsc#1223844).
* CVE-2024-27078: Fixed a memory leak in tpg_alloc() (bsc#1223781).
* CVE-2023-52652: Fixed a possible name leak in ntb_register_device()
(bsc#1223686).
* CVE-2024-23848: Fixed a use-after-free in cec_queue_msg_fh, related to
drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c
(bsc#1219104).
* CVE-2024-26859: Prevent access to a freed page in page_pool in bnx2x
(bsc#1223049).
* CVE-2024-26817: Used calloc instead of kzalloc to avoid integer overflow
(bsc#1222812)
* CVE-2021-47149: Fixed a potential null pointer deref in
fmvj18x_get_hwinfo()
(bsc#1221972).
* CVE-2023-52620: Disallowed timeout for anonymous sets in nf_tables
(bsc#1221825).
* CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify()
(bsc#1223057).
* CVE-2024-26878: Fixed potential NULL pointer dereference, related to dquots
(bsc#1223060).
* CVE-2024-26901: Used kzalloc() to fix information leak in
do_sys_name_to_handle() (bsc#1223198).
* CVE-2024-26671: Fixed an IO hang from sbitmap wakeup race in
blk_mq_mark_tag_wait() (bsc#1222357).
* CVE-2024-26772: Avoided allocating blocks from corrupted group in
ext4_mb_find_by_goal() (bsc#1222613).
* CVE-2023-52614: Fixed a buffer overflow in trans_stat_show() (bsc#1221617).
* CVE-2024-26855: Fixed a potential NULL pointer dereference in
ice_bridge_setlink() (bsc#1223051).
* CVE-2024-26857: Made sure to pull inner header in geneve_rx()
(bsc#1223058).
* CVE-2024-26675: Limited MRU to 64K in ppp_async_ioctl() (bsc#1222379).
* CVE-2024-26907: Fixed a fortify source warning while accessing Eth segment
in mlx5 (bsc#1223203).
* CVE-2023-52488: Converted from _raw_ to _noinc_ regmap functions for FIFO
in
sc16is7xx (bsc#1221162).
* CVE-2024-26922: Validated the parameters of bo mapping operations more
clearly (bsc#1223315).
* CVE-2021-47184: Fixed NULL pointer dereference on VSI filter sync
(bsc#1222666).
* CVE-2023-52635: Synchronized devfreq_monitor_[start/stop] for devfreq
(bsc#1222294).
* CVE-2024-26883: Checked for integer overflow when using
roundup_pow_of_two()
(bsc#1223035).
* CVE-2024-26884: Fixed a bpf hashtab overflow check on 32-bit architectures
(bsc#1223189).
* CVE-2024-26839: Fixed a memleak in init_credit_return() (bsc#1222975)
* CVE-2023-52644: Stop/wake correct queue in DMA Tx path when QoS is disabled
in b43 (bsc#1222961).
* CVE-2021-47205: Unregistered clocks/resets when unbinding in sunxi-ng
(bsc#1222888).
* CVE-2021-47211: Fixed a null pointer dereference on pointer cs_desc in usb-
audio (bsc#1222869).
* CVE-2021-47207: Fixed a null pointer dereference on pointer block in gus
(bsc#1222790).
* CVE-2024-26779: Fixed a race condition on enabling fast-xmit in mac80211
(bsc#1222772).
* CVE-2024-26777: Error out if pixclock equals zero in fbdev/sis
(bsc#1222765)
* CVE-2024-26778: Error out if pixclock equals zero in fbdev/savage
(bsc#1222770)
* CVE-2024-26747: Fixed a NULL pointer issue with USB parent module's
reference (bsc#1222609).

The following non-security bugs were fixed:

* Input: adxl34x - do not hardcode interrupt trigger type (git-fixes).
* Input: drv260x - sleep between polling GO bit (git-fixes).
* Input: ipaq-micro-keys - add error handling for devm_kmemdup.
* Input: xpad - add PXN V900 support.
* USB: core: Fix deadlock in usb_deauthorize_interface().
* USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command (git-
fixes).
* atl1c: fix error return code in atl1c_probe() (git-fixes).
* atl1e: fix error return code in atl1e_probe() (git-fixes).
* bluetooth: btqca: Fixed a coding style error (git-fixes).
* bluetooth: btqca: Introduce HCI_EV_VENDOR and use it (git-fixes).
* bluetooth: btqcomsmd: Fix command timeout after setting BD address (git-
fixes).
* bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).
* bnx2x: Fix enabling network interfaces without VFs (git-fixes).
* bnx2x: Fix missing error code in bnx2x_iov_init_one() (git-fixes).
* bpf, sockmap: Fix preempt_rt splat when using raw_spin_lock_t (git-fixes).
* drivers: usb: host: Fix deadlock in oxu_bus_suspend() (git-fixes).
* ethernet: myri10ge: Fix missing error code in myri10ge_probe() (git-fixes).
* ethernet: ucc_geth: fix definition and size of ucc_geth_tx_global_pram
(git-
fixes).
* fuse: do not unhash root (bsc#1223954).
* iommu/amd: Increase interrupt remapping table limit to 512 entries (git-
fixes).
* iommu/amd: Mark interrupt as managed (git-fixes).
* iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (git-fixes).
* iommu/amd: Silence warnings under memory pressure (git-fixes).
* iommu: Check if group is NULL before remove device (git-fixes).
* kabi fix for pNFS: Fix the pnfs block driver's calculation of layoutget
size
(git-fixes).
* kabi: pci: Add locking to RMW PCI Express Capability Register accessors
(kabi).
* lan78xx: Add missing return code checks (git-fixes).
* lan78xx: Add support to dump lan78xx registers (git-fixes).
* lan78xx: Do not access skb_queue_head list pointers directly (git-fixes).
* lan78xx: Fix exception on link speed change (git-fixes).
* lan78xx: Fix partial packet errors on suspend/resume (git-fixes).
* lan78xx: Fix race conditions in suspend/resume handling (git-fixes).
* lan78xx: Fix white space and style issues (git-fixes).
* lan78xx: Modify error messages (git-fixes).
* lan78xx: enable auto speed configuration for LAN7850 if no EEPROM is
detected (git-fixes).
* net/mlx5: Properly convey driver version to firmware (git-fixes).
* net/qla3xxx: fix schedule while atomic in ql_sem_spinlock (git-fixes).
* net: Fix features skip in for_each_netdev_feature() (git-fixes).
* net: allwinner: Fix some resources leak in the error handling path of the
probe and in the remove function (git-fixes).
* net: atheros: switch from 'pci_' to 'dma_' API (git-fixes).
* net: lan78xx: Allow for VLAN headers in timeout calcs (git-fixes).
* net: lan78xx: Make declaration style consistent (git-fixes).
* net: lan78xx: Merge memcpy + lexx_to_cpus to get_unaligned_lexx
(git-fixes).
* net: lan78xx: fix runtime PM count underflow on link stop (git-fixes).
* net: lan78xx: remove set but not used variable 'event' (git-fixes).
* net: macb: ensure the device is available before accessing GEMGXL control
registers (git-fixes).
* net: stmmac: free tx skb buffer in stmmac_resume() (git-fixes).
* net: sunrpc: Fix an off by one in rpc_sockaddr2uaddr() (git-fixes).
* net: usb: lan78xx: Remove lots of set but unused 'ret' variables
(git-
fixes).
* net:usb: Use ARRAY_SIZE instead of calculating the array size (git-fixes).
* nfs: Fix O_DIRECT commit verifier handling (git-fixes).
* nfs: Fix O_DIRECT locking issues (git-fixes).
* nfs: Fix a request reference leak in nfs_direct_write_clear_reqs() (git-
fixes).
* nfs: Fix an off by one in root_nfs_cat() (git-fixes).
* nfs: Fix direct WRITE throughput regression (git-fixes).
* nfs: Fix error handling for O_DIRECT write scheduling (git-fixes).
* nfs: More O_DIRECT accounting fixes for error paths (git-fixes).
* nfs: add atomic_open for NFSv3 to handle O_TRUNC correctly (bsc#1219847).
* nfs: avoid spurious warning of lost lock that is being unlocked
(bsc#1221791).
* nfs: commit errors should be fatal (git-fixes).
* nfs: only issue commit in DIO codepath if we have uncommitted data (git-
fixes).
* nfsd: Fix error cleanup path in nfsd_rename() (git-fixes).
* nfsd: Reset cb_seq_status after NFS4ERR_DELAY (git-fixes).
* nfsd: Retransmit callbacks after client reconnects (git-fixes).
* nfsd: lock_rename() needs both directories to live on the same fs (git-
fixes).
* nfsv4.1/pnfs: Ensure we handle the error NFS4ERR_RETURNCONFLICT
(git-fixes).
* pci/aer: Clear MULTI_ERR_COR/UNCOR_RCV bits (git-fixes).
* pci/aspm: Avoid link retraining race (git-fixes).
* pci/aspm: Disable ASPM on MFD function removal to avoid use-after-free
(git-
fixes).
* pci/aspm: Do not warn if already in common clock mode (git-fixes).
* pci/aspm: Factor out pcie_wait_for_retrain() (git-fixes).
* pci/aspm: Reduce severity of common clock config message (git-fixes).
* pci/aspm: Return 0 or -ETIMEDOUT from pcie_retrain_link() (git-fixes).
* pci/aspm: Use RMW accessors for changing LNKCTL (git-fixes).
* pci/dpc: Print all TLP Prefixes, not just the first (git-fixes).
* pci/iov: Enlarge virtfn sysfs name buffer (git-fixes).
* pci/msi: Prevent MSI hardware interrupt number truncation (git-fixes).
* pci/pm: Power up all devices during runtime resume (git-fixes).
* pci/sysfs: Protect driver's D3cold preference from user space
(git-fixes).
* pci: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).
* pci: Add function 1 DMA alias quirk for Marvell 88SE9235 (git-fixes).
* pci: Add locking to RMW PCI Express Capability Register accessors (git-
fixes).
* pci: Avoid FLR for AMD FCH AHCI adapters (git-fixes).
* pci: Avoid pci_dev_lock() AB/BA deadlock with sriov_numvfs_store() (git-
fixes).
* pci: Make link retraining use RMW accessors for changing LNKCTL
(git-fixes).
* pci: Mark 3ware-9650SE Root Port Extended Tags as broken (git-fixes).
* pci: Rework pcie_retrain_link() wait loop (git-fixes).
* pci: aardvark: Fix setting MSI address (git-fixes).
* pci: aardvark: Fix support for MSI interrupts (git-fixes).
* pci: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-
fixes).
* pci: endpoint: Do not stop controller when unbinding endpoint function
(git-
fixes).
* pci: hotplug: Allow marking devices as disconnected during bind/unbind
(git-
fixes).
* pci: pciehp: Add pciehp_set_indicators() to set both indicators
(git-fixes).
* pci: pciehp: Cancel bringup sequence if card is not present (git-fixes).
* pci: pciehp: Fix AB-BA deadlock between reset_lock and device_lock (git-
fixes).
* pci: pciehp: Use RMW accessors for changing LNKCTL (git-fixes).
* pci: qcom: Disable write access to read only registers for IP v2.3.3 (git-
fixes).
* pci: qcom: Fix unbalanced PHY init on probe errors (git-fixes).
* pci: qcom: Use DWC helpers for modifying the read-only DBI registers (git-
fixes).
* pci: switchtec: Return -EFAULT for copy_to_user() errors (git-fixes).
* pnfs/flexfiles: Check the layout validity in ff_layout_mirror_prepare_stats
(git-fixes).
* pnfs: Fix the pnfs block driver's calculation of layoutget size
(git-fixes).
* rdma/ipoib: Fix error code return in ipoib_mcast_join (bsc#1221082)
* s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223883).
* s390/mm: Fix storage key clearing for guest huge pages (git-fixes
bsc#1223885).
* s390/vtime: fix average steal time calculation (git-fixes bsc#1221953).
* scsi: qla2xxx: Change debug message during driver unload (bsc1221816).
* scsi: qla2xxx: Delay I/O Abort on PCI error (bsc1221816).
* scsi: qla2xxx: Fix N2N stuck connection (bsc1221816).
* scsi: qla2xxx: Fix command flush on cable pull (bsc1221816).
* scsi: qla2xxx: Fix double free of fcport (bsc1221816).
* scsi: qla2xxx: Fix double free of the ha->vp_map pointer (bsc1221816).
* scsi: qla2xxx: NVME|FCP prefer flag not being honored (bsc1221816).
* scsi: qla2xxx: Prevent command send on chip reset (bsc1221816).
* scsi: qla2xxx: Split FCE|EFT trace control (bsc1221816).
* scsi: qla2xxx: Update manufacturer detail (bsc1221816).
* scsi: qla2xxx: Update version to 10.02.09.200-k (bsc1221816).
* sr9800: Add check for usbnet_get_endpoints (git-fixes).
* sunrpc: Fix RPC client cleaned up the freed pipefs dentries (git-fixes).
* sunrpc: fix a memleak in gss_import_v2_context (git-fixes).
* sunrpc: fix some memleaks in gssx_dec_option_array (git-fixes).
* tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619).
* tun: honor IOCB_NOWAIT flag (git-fixes).
* usb: dwc2: Fix memory leak in dwc2_hcd_init.
* usb: dwc2: check return value after calling platform_get_resource() (git-
fixes).
* usb: dwc3: gadget: Ignore EP queue requests during bus reset (git-fixes).
* usb: gadget: Fix issue with config_ep_by_speed function (git-fixes).
* usb: mon: Fix atomicity violation in mon_bin_vma_fault (git-fixes).
* usb: musb: Modify the "HWVers" register address (git-fixes).
* usb: roles: do not get/set_role() when usb_role_switch is unregistered.
* usb: serial: option: add Fibocom L7xx modules (git-fixes).
* usb: serial: option: do not claim interface 4 for ZTE MF290 (git-fixes).
* usb: storage: set 1.50 as the lower bcdDevice for older "Super Top"
compatibility (git-fixes).
* usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes).
* usb: usbfs: Do not WARN about excessively large memory allocations.
* x86/CPU/AMD: Update the Zenbleed microcode revisions (git-fixes).
* x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Server for SAP Applications 12 SP5
zypper in -t patch SUSE-SLE-HA-12-SP5-2024-1648=1 SUSE-SLE-
SERVER-12-SP5-2024-1648=1

* SUSE Linux Enterprise High Availability Extension 12 SP5
zypper in -t patch SUSE-SLE-HA-12-SP5-2024-1648=1

* SUSE Linux Enterprise Live Patching 12-SP5
zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-1648=1

* SUSE Linux Enterprise Software Development Kit 12 SP5
zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-1648=1

* SUSE Linux Enterprise High Performance Computing 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1648=1

* SUSE Linux Enterprise Server 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1648=1

* SUSE Linux Enterprise Workstation Extension 12 12-SP5
zypper in -t patch SUSE-SLE-WE-12-SP5-2024-1648=1

## Package List:

* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
* kernel-default-debuginfo-4.12.14-122.212.1
* kernel-default-base-debuginfo-4.12.14-122.212.1
* dlm-kmp-default-debuginfo-4.12.14-122.212.1
* gfs2-kmp-default-4.12.14-122.212.1
* gfs2-kmp-default-debuginfo-4.12.14-122.212.1
* kernel-default-debugsource-4.12.14-122.212.1
* ocfs2-kmp-default-debuginfo-4.12.14-122.212.1
* dlm-kmp-default-4.12.14-122.212.1
* kernel-default-devel-4.12.14-122.212.1
* kernel-default-base-4.12.14-122.212.1
* kernel-syms-4.12.14-122.212.1
* ocfs2-kmp-default-4.12.14-122.212.1
* cluster-md-kmp-default-debuginfo-4.12.14-122.212.1
* cluster-md-kmp-default-4.12.14-122.212.1
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc ppc64le
x86_64)
* kernel-default-4.12.14-122.212.1
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch)
* kernel-source-4.12.14-122.212.1
* kernel-macros-4.12.14-122.212.1
* kernel-devel-4.12.14-122.212.1
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64)
* kernel-default-devel-debuginfo-4.12.14-122.212.1
* SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x
x86_64)
* kernel-default-debuginfo-4.12.14-122.212.1
* dlm-kmp-default-debuginfo-4.12.14-122.212.1
* gfs2-kmp-default-4.12.14-122.212.1
* gfs2-kmp-default-debuginfo-4.12.14-122.212.1
* kernel-default-debugsource-4.12.14-122.212.1
* ocfs2-kmp-default-debuginfo-4.12.14-122.212.1
* dlm-kmp-default-4.12.14-122.212.1
* ocfs2-kmp-default-4.12.14-122.212.1
* cluster-md-kmp-default-debuginfo-4.12.14-122.212.1
* cluster-md-kmp-default-4.12.14-122.212.1
* SUSE Linux Enterprise High Availability Extension 12 SP5 (nosrc)
* kernel-default-4.12.14-122.212.1
* SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
* kernel-default-4.12.14-122.212.1
* SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
* kernel-default-debuginfo-4.12.14-122.212.1
* kernel-default-debugsource-4.12.14-122.212.1
* kgraft-patch-4_12_14-122_212-default-1-8.11.1
* kernel-default-kgraft-devel-4.12.14-122.212.1
* kernel-default-kgraft-4.12.14-122.212.1
* SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch nosrc)
* kernel-docs-4.12.14-122.212.1
* SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le
s390x
x86_64)
* kernel-obs-build-4.12.14-122.212.1
* kernel-obs-build-debugsource-4.12.14-122.212.1
* SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 nosrc
x86_64)
* kernel-default-4.12.14-122.212.1
* SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64)
* kernel-default-debuginfo-4.12.14-122.212.1
* kernel-default-base-debuginfo-4.12.14-122.212.1
* kernel-default-debugsource-4.12.14-122.212.1
* kernel-default-devel-4.12.14-122.212.1
* kernel-syms-4.12.14-122.212.1
* kernel-default-base-4.12.14-122.212.1
* SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch)
* kernel-source-4.12.14-122.212.1
* kernel-macros-4.12.14-122.212.1
* kernel-devel-4.12.14-122.212.1
* SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64)
* kernel-default-devel-debuginfo-4.12.14-122.212.1
* SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-4.12.14-122.212.1
* SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64)
* kernel-default-debuginfo-4.12.14-122.212.1
* kernel-default-base-debuginfo-4.12.14-122.212.1
* kernel-default-debugsource-4.12.14-122.212.1
* kernel-default-devel-4.12.14-122.212.1
* kernel-syms-4.12.14-122.212.1
* kernel-default-base-4.12.14-122.212.1
* SUSE Linux Enterprise Server 12 SP5 (noarch)
* kernel-source-4.12.14-122.212.1
* kernel-macros-4.12.14-122.212.1
* kernel-devel-4.12.14-122.212.1
* SUSE Linux Enterprise Server 12 SP5 (s390x)
* kernel-default-man-4.12.14-122.212.1
* SUSE Linux Enterprise Server 12 SP5 (x86_64)
* kernel-default-devel-debuginfo-4.12.14-122.212.1
* SUSE Linux Enterprise Workstation Extension 12 12-SP5 (nosrc)
* kernel-default-4.12.14-122.212.1
* SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64)
* kernel-default-debuginfo-4.12.14-122.212.1
* kernel-default-extra-4.12.14-122.212.1
* kernel-default-extra-debuginfo-4.12.14-122.212.1
* kernel-default-debugsource-4.12.14-122.212.1

## References:

* https://www.suse.com/security/cve/CVE-2019-25160.html
* https://www.suse.com/security/cve/CVE-2020-36312.html
* https://www.suse.com/security/cve/CVE-2021-23134.html
* https://www.suse.com/security/cve/CVE-2021-46904.html
* https://www.suse.com/security/cve/CVE-2021-46905.html
* https://www.suse.com/security/cve/CVE-2021-46907.html
* https://www.suse.com/security/cve/CVE-2021-46909.html
* https://www.suse.com/security/cve/CVE-2021-46938.html
* https://www.suse.com/security/cve/CVE-2021-46939.html
* https://www.suse.com/security/cve/CVE-2021-46941.html
* https://www.suse.com/security/cve/CVE-2021-46950.html
* https://www.suse.com/security/cve/CVE-2021-46958.html
* https://www.suse.com/security/cve/CVE-2021-46960.html
* https://www.suse.com/security/cve/CVE-2021-46963.html
* https://www.suse.com/security/cve/CVE-2021-46964.html
* https://www.suse.com/security/cve/CVE-2021-46966.html
* https://www.suse.com/security/cve/CVE-2021-46975.html
* https://www.suse.com/security/cve/CVE-2021-46981.html
* https://www.suse.com/security/cve/CVE-2021-46988.html
* https://www.suse.com/security/cve/CVE-2021-46990.html
* https://www.suse.com/security/cve/CVE-2021-46998.html
* https://www.suse.com/security/cve/CVE-2021-47006.html
* https://www.suse.com/security/cve/CVE-2021-47015.html
* https://www.suse.com/security/cve/CVE-2021-47024.html
* https://www.suse.com/security/cve/CVE-2021-47034.html
* https://www.suse.com/security/cve/CVE-2021-47045.html
* https://www.suse.com/security/cve/CVE-2021-47049.html
* https://www.suse.com/security/cve/CVE-2021-47055.html
* https://www.suse.com/security/cve/CVE-2021-47056.html
* https://www.suse.com/security/cve/CVE-2021-47060.html
* https://www.suse.com/security/cve/CVE-2021-47061.html
* https://www.suse.com/security/cve/CVE-2021-47063.html
* https://www.suse.com/security/cve/CVE-2021-47068.html
* https://www.suse.com/security/cve/CVE-2021-47070.html
* https://www.suse.com/security/cve/CVE-2021-47071.html
* https://www.suse.com/security/cve/CVE-2021-47073.html
* https://www.suse.com/security/cve/CVE-2021-47100.html
* https://www.suse.com/security/cve/CVE-2021-47101.html
* https://www.suse.com/security/cve/CVE-2021-47104.html
* https://www.suse.com/security/cve/CVE-2021-47110.html
* https://www.suse.com/security/cve/CVE-2021-47112.html
* https://www.suse.com/security/cve/CVE-2021-47114.html
* https://www.suse.com/security/cve/CVE-2021-47117.html
* https://www.suse.com/security/cve/CVE-2021-47118.html
* https://www.suse.com/security/cve/CVE-2021-47119.html
* https://www.suse.com/security/cve/CVE-2021-47138.html
* https://www.suse.com/security/cve/CVE-2021-47141.html
* https://www.suse.com/security/cve/CVE-2021-47142.html
* https://www.suse.com/security/cve/CVE-2021-47143.html
* https://www.suse.com/security/cve/CVE-2021-47146.html
* https://www.suse.com/security/cve/CVE-2021-47149.html
* https://www.suse.com/security/cve/CVE-2021-47150.html
* https://www.suse.com/security/cve/CVE-2021-47153.html
* https://www.suse.com/security/cve/CVE-2021-47159.html
* https://www.suse.com/security/cve/CVE-2021-47161.html
* https://www.suse.com/security/cve/CVE-2021-47162.html
* https://www.suse.com/security/cve/CVE-2021-47165.html
* https://www.suse.com/security/cve/CVE-2021-47166.html
* https://www.suse.com/security/cve/CVE-2021-47167.html
* https://www.suse.com/security/cve/CVE-2021-47168.html
* https://www.suse.com/security/cve/CVE-2021-47169.html
* https://www.suse.com/security/cve/CVE-2021-47171.html
* https://www.suse.com/security/cve/CVE-2021-47173.html
* https://www.suse.com/security/cve/CVE-2021-47177.html
* https://www.suse.com/security/cve/CVE-2021-47179.html
* https://www.suse.com/security/cve/CVE-2021-47180.html
* https://www.suse.com/security/cve/CVE-2021-47181.html
* https://www.suse.com/security/cve/CVE-2021-47182.html
* https://www.suse.com/security/cve/CVE-2021-47183.html
* https://www.suse.com/security/cve/CVE-2021-47184.html
* https://www.suse.com/security/cve/CVE-2021-47185.html
* https://www.suse.com/security/cve/CVE-2021-47188.html
* https://www.suse.com/security/cve/CVE-2021-47189.html
* https://www.suse.com/security/cve/CVE-2021-47198.html
* https://www.suse.com/security/cve/CVE-2021-47202.html
* https://www.suse.com/security/cve/CVE-2021-47203.html
* https://www.suse.com/security/cve/CVE-2021-47204.html
* https://www.suse.com/security/cve/CVE-2021-47205.html
* https://www.suse.com/security/cve/CVE-2021-47207.html
* https://www.suse.com/security/cve/CVE-2021-47211.html
* https://www.suse.com/security/cve/CVE-2021-47216.html
* https://www.suse.com/security/cve/CVE-2021-47217.html
* https://www.suse.com/security/cve/CVE-2022-0487.html
* https://www.suse.com/security/cve/CVE-2022-48619.html
* https://www.suse.com/security/cve/CVE-2022-48626.html
* https://www.suse.com/security/cve/CVE-2022-48636.html
* https://www.suse.com/security/cve/CVE-2022-48650.html
* https://www.suse.com/security/cve/CVE-2022-48651.html
* https://www.suse.com/security/cve/CVE-2022-48667.html
* https://www.suse.com/security/cve/CVE-2022-48668.html
* https://www.suse.com/security/cve/CVE-2022-48687.html
* https://www.suse.com/security/cve/CVE-2022-48688.html
* https://www.suse.com/security/cve/CVE-2022-48695.html
* https://www.suse.com/security/cve/CVE-2022-48701.html
* https://www.suse.com/security/cve/CVE-2023-0160.html
* https://www.suse.com/security/cve/CVE-2023-28746.html
* https://www.suse.com/security/cve/CVE-2023-35827.html
* https://www.suse.com/security/cve/CVE-2023-52454.html
* https://www.suse.com/security/cve/CVE-2023-52469.html
* https://www.suse.com/security/cve/CVE-2023-52470.html
* https://www.suse.com/security/cve/CVE-2023-52474.html
* https://www.suse.com/security/cve/CVE-2023-52476.html
* https://www.suse.com/security/cve/CVE-2023-52477.html
* https://www.suse.com/security/cve/CVE-2023-52486.html
* https://www.suse.com/security/cve/CVE-2023-52488.html
* https://www.suse.com/security/cve/CVE-2023-52509.html
* https://www.suse.com/security/cve/CVE-2023-52515.html
* https://www.suse.com/security/cve/CVE-2023-52524.html
* https://www.suse.com/security/cve/CVE-2023-52528.html
* https://www.suse.com/security/cve/CVE-2023-52575.html
* https://www.suse.com/security/cve/CVE-2023-52583.html
* https://www.suse.com/security/cve/CVE-2023-52587.html
* https://www.suse.com/security/cve/CVE-2023-52590.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52595.html
* https://www.suse.com/security/cve/CVE-2023-52598.html
* https://www.suse.com/security/cve/CVE-2023-52607.html
* https://www.suse.com/security/cve/CVE-2023-52614.html
* https://www.suse.com/security/cve/CVE-2023-52620.html
* https://www.suse.com/security/cve/CVE-2023-52628.html
* https://www.suse.com/security/cve/CVE-2023-52635.html
* https://www.suse.com/security/cve/CVE-2023-52639.html
* https://www.suse.com/security/cve/CVE-2023-52644.html
* https://www.suse.com/security/cve/CVE-2023-52646.html
* https://www.suse.com/security/cve/CVE-2023-52650.html
* https://www.suse.com/security/cve/CVE-2023-52652.html
* https://www.suse.com/security/cve/CVE-2023-52653.html
* https://www.suse.com/security/cve/CVE-2023-6270.html
* https://www.suse.com/security/cve/CVE-2023-6356.html
* https://www.suse.com/security/cve/CVE-2023-6535.html
* https://www.suse.com/security/cve/CVE-2023-6536.html
* https://www.suse.com/security/cve/CVE-2023-7042.html
* https://www.suse.com/security/cve/CVE-2023-7192.html
* https://www.suse.com/security/cve/CVE-2024-2201.html
* https://www.suse.com/security/cve/CVE-2024-22099.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-23848.html
* https://www.suse.com/security/cve/CVE-2024-24855.html
* https://www.suse.com/security/cve/CVE-2024-24861.html
* https://www.suse.com/security/cve/CVE-2024-26614.html
* https://www.suse.com/security/cve/CVE-2024-26642.html
* https://www.suse.com/security/cve/CVE-2024-26651.html
* https://www.suse.com/security/cve/CVE-2024-26671.html
* https://www.suse.com/security/cve/CVE-2024-26675.html
* https://www.suse.com/security/cve/CVE-2024-26689.html
* https://www.suse.com/security/cve/CVE-2024-26704.html
* https://www.suse.com/security/cve/CVE-2024-26733.html
* https://www.suse.com/security/cve/CVE-2024-26739.html
* https://www.suse.com/security/cve/CVE-2024-26743.html
* https://www.suse.com/security/cve/CVE-2024-26744.html
* https://www.suse.com/security/cve/CVE-2024-26747.html
* https://www.suse.com/security/cve/CVE-2024-26754.html
* https://www.suse.com/security/cve/CVE-2024-26763.html
* https://www.suse.com/security/cve/CVE-2024-26771.html
* https://www.suse.com/security/cve/CVE-2024-26772.html
* https://www.suse.com/security/cve/CVE-2024-26773.html
* https://www.suse.com/security/cve/CVE-2024-26777.html
* https://www.suse.com/security/cve/CVE-2024-26778.html
* https://www.suse.com/security/cve/CVE-2024-26779.html
* https://www.suse.com/security/cve/CVE-2024-26793.html
* https://www.suse.com/security/cve/CVE-2024-26805.html
* https://www.suse.com/security/cve/CVE-2024-26816.html
* https://www.suse.com/security/cve/CVE-2024-26817.html
* https://www.suse.com/security/cve/CVE-2024-26839.html
* https://www.suse.com/security/cve/CVE-2024-26840.html
* https://www.suse.com/security/cve/CVE-2024-26852.html
* https://www.suse.com/security/cve/CVE-2024-26855.html
* https://www.suse.com/security/cve/CVE-2024-26857.html
* https://www.suse.com/security/cve/CVE-2024-26859.html
* https://www.suse.com/security/cve/CVE-2024-26878.html
* https://www.suse.com/security/cve/CVE-2024-26883.html
* https://www.suse.com/security/cve/CVE-2024-26884.html
* https://www.suse.com/security/cve/CVE-2024-26898.html
* https://www.suse.com/security/cve/CVE-2024-26901.html
* https://www.suse.com/security/cve/CVE-2024-26903.html
* https://www.suse.com/security/cve/CVE-2024-26907.html
* https://www.suse.com/security/cve/CVE-2024-26922.html
* https://www.suse.com/security/cve/CVE-2024-26929.html
* https://www.suse.com/security/cve/CVE-2024-26930.html
* https://www.suse.com/security/cve/CVE-2024-26931.html
* https://www.suse.com/security/cve/CVE-2024-26948.html
* https://www.suse.com/security/cve/CVE-2024-26993.html
* https://www.suse.com/security/cve/CVE-2024-27013.html
* https://www.suse.com/security/cve/CVE-2024-27014.html
* https://www.suse.com/security/cve/CVE-2024-27043.html
* https://www.suse.com/security/cve/CVE-2024-27046.html
* https://www.suse.com/security/cve/CVE-2024-27054.html
* https://www.suse.com/security/cve/CVE-2024-27072.html
* https://www.suse.com/security/cve/CVE-2024-27073.html
* https://www.suse.com/security/cve/CVE-2024-27074.html
* https://www.suse.com/security/cve/CVE-2024-27075.html
* https://www.suse.com/security/cve/CVE-2024-27078.html
* https://www.suse.com/security/cve/CVE-2024-27388.html
* https://bugzilla.suse.com/show_bug.cgi?id=1084332
* https://bugzilla.suse.com/show_bug.cgi?id=1141539
* https://bugzilla.suse.com/show_bug.cgi?id=1184509
* https://bugzilla.suse.com/show_bug.cgi?id=1186060
* https://bugzilla.suse.com/show_bug.cgi?id=1190317
* https://bugzilla.suse.com/show_bug.cgi?id=1190576
* https://bugzilla.suse.com/show_bug.cgi?id=1192145
* https://bugzilla.suse.com/show_bug.cgi?id=1194516
* https://bugzilla.suse.com/show_bug.cgi?id=1203935
* https://bugzilla.suse.com/show_bug.cgi?id=1209657
* https://bugzilla.suse.com/show_bug.cgi?id=1211592
* https://bugzilla.suse.com/show_bug.cgi?id=1212514
* https://bugzilla.suse.com/show_bug.cgi?id=1213456
* https://bugzilla.suse.com/show_bug.cgi?id=1217339
* https://bugzilla.suse.com/show_bug.cgi?id=1217987
* https://bugzilla.suse.com/show_bug.cgi?id=1217988
* https://bugzilla.suse.com/show_bug.cgi?id=1217989
* https://bugzilla.suse.com/show_bug.cgi?id=1218220
* https://bugzilla.suse.com/show_bug.cgi?id=1218336
* https://bugzilla.suse.com/show_bug.cgi?id=1218479
* https://bugzilla.suse.com/show_bug.cgi?id=1218562
* https://bugzilla.suse.com/show_bug.cgi?id=1219104
* https://bugzilla.suse.com/show_bug.cgi?id=1219169
* https://bugzilla.suse.com/show_bug.cgi?id=1219170
* https://bugzilla.suse.com/show_bug.cgi?id=1219618
* https://bugzilla.suse.com/show_bug.cgi?id=1219623
* https://bugzilla.suse.com/show_bug.cgi?id=1219847
* https://bugzilla.suse.com/show_bug.cgi?id=1220320
* https://bugzilla.suse.com/show_bug.cgi?id=1220366
* https://bugzilla.suse.com/show_bug.cgi?id=1220394
* https://bugzilla.suse.com/show_bug.cgi?id=1220411
* https://bugzilla.suse.com/show_bug.cgi?id=1220416
* https://bugzilla.suse.com/show_bug.cgi?id=1220418
* https://bugzilla.suse.com/show_bug.cgi?id=1220422
* https://bugzilla.suse.com/show_bug.cgi?id=1220442
* https://bugzilla.suse.com/show_bug.cgi?id=1220445
* https://bugzilla.suse.com/show_bug.cgi?id=1220505
* https://bugzilla.suse.com/show_bug.cgi?id=1220521
* https://bugzilla.suse.com/show_bug.cgi?id=1220528
* https://bugzilla.suse.com/show_bug.cgi?id=1220536
* https://bugzilla.suse.com/show_bug.cgi?id=1220538
* https://bugzilla.suse.com/show_bug.cgi?id=1220554
* https://bugzilla.suse.com/show_bug.cgi?id=1220572
* https://bugzilla.suse.com/show_bug.cgi?id=1220580
* https://bugzilla.suse.com/show_bug.cgi?id=1220611
* https://bugzilla.suse.com/show_bug.cgi?id=1220625
* https://bugzilla.suse.com/show_bug.cgi?id=1220628
* https://bugzilla.suse.com/show_bug.cgi?id=1220637
* https://bugzilla.suse.com/show_bug.cgi?id=1220640
* https://bugzilla.suse.com/show_bug.cgi?id=1220662
* https://bugzilla.suse.com/show_bug.cgi?id=1220687
* https://bugzilla.suse.com/show_bug.cgi?id=1220692
* https://bugzilla.suse.com/show_bug.cgi?id=1220703
* https://bugzilla.suse.com/show_bug.cgi?id=1220706
* https://bugzilla.suse.com/show_bug.cgi?id=1220739
* https://bugzilla.suse.com/show_bug.cgi?id=1220742
* https://bugzilla.suse.com/show_bug.cgi?id=1220743
* https://bugzilla.suse.com/show_bug.cgi?id=1220745
* https://bugzilla.suse.com/show_bug.cgi?id=1220751
* https://bugzilla.suse.com/show_bug.cgi?id=1220768
* https://bugzilla.suse.com/show_bug.cgi?id=1220769
* https://bugzilla.suse.com/show_bug.cgi?id=1220777
* https://bugzilla.suse.com/show_bug.cgi?id=1220790
* https://bugzilla.suse.com/show_bug.cgi?id=1220794
* https://bugzilla.suse.com/show_bug.cgi?id=1220829
* https://bugzilla.suse.com/show_bug.cgi?id=1220836
* https://bugzilla.suse.com/show_bug.cgi?id=1220843
* https://bugzilla.suse.com/show_bug.cgi?id=1220846
* https://bugzilla.suse.com/show_bug.cgi?id=1220850
* https://bugzilla.suse.com/show_bug.cgi?id=1220871
* https://bugzilla.suse.com/show_bug.cgi?id=1220927
* https://bugzilla.suse.com/show_bug.cgi?id=1220960
* https://bugzilla.suse.com/show_bug.cgi?id=1220985
* https://bugzilla.suse.com/show_bug.cgi?id=1220987
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221046
* https://bugzilla.suse.com/show_bug.cgi?id=1221048
* https://bugzilla.suse.com/show_bug.cgi?id=1221058
* https://bugzilla.suse.com/show_bug.cgi?id=1221060
* https://bugzilla.suse.com/show_bug.cgi?id=1221061
* https://bugzilla.suse.com/show_bug.cgi?id=1221077
* https://bugzilla.suse.com/show_bug.cgi?id=1221082
* https://bugzilla.suse.com/show_bug.cgi?id=1221088
* https://bugzilla.suse.com/show_bug.cgi?id=1221162
* https://bugzilla.suse.com/show_bug.cgi?id=1221277
* https://bugzilla.suse.com/show_bug.cgi?id=1221293
* https://bugzilla.suse.com/show_bug.cgi?id=1221337
* https://bugzilla.suse.com/show_bug.cgi?id=1221532
* https://bugzilla.suse.com/show_bug.cgi?id=1221541
* https://bugzilla.suse.com/show_bug.cgi?id=1221548
* https://bugzilla.suse.com/show_bug.cgi?id=1221575
* https://bugzilla.suse.com/show_bug.cgi?id=1221605
* https://bugzilla.suse.com/show_bug.cgi?id=1221608
* https://bugzilla.suse.com/show_bug.cgi?id=1221617
* https://bugzilla.suse.com/show_bug.cgi?id=1221791
* https://bugzilla.suse.com/show_bug.cgi?id=1221816
* https://bugzilla.suse.com/show_bug.cgi?id=1221825
* https://bugzilla.suse.com/show_bug.cgi?id=1221830
* https://bugzilla.suse.com/show_bug.cgi?id=1221862
* https://bugzilla.suse.com/show_bug.cgi?id=1221934
* https://bugzilla.suse.com/show_bug.cgi?id=1221949
* https://bugzilla.suse.com/show_bug.cgi?id=1221952
* https://bugzilla.suse.com/show_bug.cgi?id=1221953
* https://bugzilla.suse.com/show_bug.cgi?id=1221965
* https://bugzilla.suse.com/show_bug.cgi?id=1221966
* https://bugzilla.suse.com/show_bug.cgi?id=1221967
* https://bugzilla.suse.com/show_bug.cgi?id=1221969
* https://bugzilla.suse.com/show_bug.cgi?id=1221972
* https://bugzilla.suse.com/show_bug.cgi?id=1221973
* https://bugzilla.suse.com/show_bug.cgi?id=1221977
* https://bugzilla.suse.com/show_bug.cgi?id=1221979
* https://bugzilla.suse.com/show_bug.cgi?id=1221988
* https://bugzilla.suse.com/show_bug.cgi?id=1221991
* https://bugzilla.suse.com/show_bug.cgi?id=1221993
* https://bugzilla.suse.com/show_bug.cgi?id=1221994
* https://bugzilla.suse.com/show_bug.cgi?id=1221997
* https://bugzilla.suse.com/show_bug.cgi?id=1221998
* https://bugzilla.suse.com/show_bug.cgi?id=1221999
* https://bugzilla.suse.com/show_bug.cgi?id=1222000
* https://bugzilla.suse.com/show_bug.cgi?id=1222001
* https://bugzilla.suse.com/show_bug.cgi?id=1222002
* https://bugzilla.suse.com/show_bug.cgi?id=1222117
* https://bugzilla.suse.com/show_bug.cgi?id=1222294
* https://bugzilla.suse.com/show_bug.cgi?id=1222300
* https://bugzilla.suse.com/show_bug.cgi?id=1222357
* https://bugzilla.suse.com/show_bug.cgi?id=1222379
* https://bugzilla.suse.com/show_bug.cgi?id=1222422
* https://bugzilla.suse.com/show_bug.cgi?id=1222428
* https://bugzilla.suse.com/show_bug.cgi?id=1222449
* https://bugzilla.suse.com/show_bug.cgi?id=1222503
* https://bugzilla.suse.com/show_bug.cgi?id=1222559
* https://bugzilla.suse.com/show_bug.cgi?id=1222585
* https://bugzilla.suse.com/show_bug.cgi?id=1222609
* https://bugzilla.suse.com/show_bug.cgi?id=1222610
* https://bugzilla.suse.com/show_bug.cgi?id=1222613
* https://bugzilla.suse.com/show_bug.cgi?id=1222618
* https://bugzilla.suse.com/show_bug.cgi?id=1222619
* https://bugzilla.suse.com/show_bug.cgi?id=1222624
* https://bugzilla.suse.com/show_bug.cgi?id=1222630
* https://bugzilla.suse.com/show_bug.cgi?id=1222632
* https://bugzilla.suse.com/show_bug.cgi?id=1222660
* https://bugzilla.suse.com/show_bug.cgi?id=1222662
* https://bugzilla.suse.com/show_bug.cgi?id=1222664
* https://bugzilla.suse.com/show_bug.cgi?id=1222666
* https://bugzilla.suse.com/show_bug.cgi?id=1222669
* https://bugzilla.suse.com/show_bug.cgi?id=1222671
* https://bugzilla.suse.com/show_bug.cgi?id=1222677
* https://bugzilla.suse.com/show_bug.cgi?id=1222706
* https://bugzilla.suse.com/show_bug.cgi?id=1222720
* https://bugzilla.suse.com/show_bug.cgi?id=1222765
* https://bugzilla.suse.com/show_bug.cgi?id=1222770
* https://bugzilla.suse.com/show_bug.cgi?id=1222772
* https://bugzilla.suse.com/show_bug.cgi?id=1222787
* https://bugzilla.suse.com/show_bug.cgi?id=1222790
* https://bugzilla.suse.com/show_bug.cgi?id=1222812
* https://bugzilla.suse.com/show_bug.cgi?id=1222836
* https://bugzilla.suse.com/show_bug.cgi?id=1222869
* https://bugzilla.suse.com/show_bug.cgi?id=1222876
* https://bugzilla.suse.com/show_bug.cgi?id=1222878
* https://bugzilla.suse.com/show_bug.cgi?id=1222881
* https://bugzilla.suse.com/show_bug.cgi?id=1222883
* https://bugzilla.suse.com/show_bug.cgi?id=1222888
* https://bugzilla.suse.com/show_bug.cgi?id=1222952
* https://bugzilla.suse.com/show_bug.cgi?id=1222961
* https://bugzilla.suse.com/show_bug.cgi?id=1222975
* https://bugzilla.suse.com/show_bug.cgi?id=1222976
* https://bugzilla.suse.com/show_bug.cgi?id=1223016
* https://bugzilla.suse.com/show_bug.cgi?id=1223035
* https://bugzilla.suse.com/show_bug.cgi?id=1223049
* https://bugzilla.suse.com/show_bug.cgi?id=1223051
* https://bugzilla.suse.com/show_bug.cgi?id=1223057
* https://bugzilla.suse.com/show_bug.cgi?id=1223058
* https://bugzilla.suse.com/show_bug.cgi?id=1223060
* https://bugzilla.suse.com/show_bug.cgi?id=1223187
* https://bugzilla.suse.com/show_bug.cgi?id=1223189
* https://bugzilla.suse.com/show_bug.cgi?id=1223198
* https://bugzilla.suse.com/show_bug.cgi?id=1223203
* https://bugzilla.suse.com/show_bug.cgi?id=1223315
* https://bugzilla.suse.com/show_bug.cgi?id=1223432
* https://bugzilla.suse.com/show_bug.cgi?id=1223509
* https://bugzilla.suse.com/show_bug.cgi?id=1223512
* https://bugzilla.suse.com/show_bug.cgi?id=1223513
* https://bugzilla.suse.com/show_bug.cgi?id=1223516
* https://bugzilla.suse.com/show_bug.cgi?id=1223518
* https://bugzilla.suse.com/show_bug.cgi?id=1223626
* https://bugzilla.suse.com/show_bug.cgi?id=1223627
* https://bugzilla.suse.com/show_bug.cgi?id=1223664
* https://bugzilla.suse.com/show_bug.cgi?id=1223686
* https://bugzilla.suse.com/show_bug.cgi?id=1223693
* https://bugzilla.suse.com/show_bug.cgi?id=1223712
* https://bugzilla.suse.com/show_bug.cgi?id=1223715
* https://bugzilla.suse.com/show_bug.cgi?id=1223735
* https://bugzilla.suse.com/show_bug.cgi?id=1223744
* https://bugzilla.suse.com/show_bug.cgi?id=1223745
* https://bugzilla.suse.com/show_bug.cgi?id=1223770
* https://bugzilla.suse.com/show_bug.cgi?id=1223781
* https://bugzilla.suse.com/show_bug.cgi?id=1223819
* https://bugzilla.suse.com/show_bug.cgi?id=1223824
* https://bugzilla.suse.com/show_bug.cgi?id=1223827
* https://bugzilla.suse.com/show_bug.cgi?id=1223837
* https://bugzilla.suse.com/show_bug.cgi?id=1223842
* https://bugzilla.suse.com/show_bug.cgi?id=1223843
* https://bugzilla.suse.com/show_bug.cgi?id=1223844
* https://bugzilla.suse.com/show_bug.cgi?id=1223883
* https://bugzilla.suse.com/show_bug.cgi?id=1223885
* https://bugzilla.suse.com/show_bug.cgi?id=1223921
* https://bugzilla.suse.com/show_bug.cgi?id=1223941
* https://bugzilla.suse.com/show_bug.cgi?id=1223952
* https://bugzilla.suse.com/show_bug.cgi?id=1223953
* https://bugzilla.suse.com/show_bug.cgi?id=1223954
* https://jira.suse.com/browse/PED-5759


--===============0473165190877057127==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for the Linux Kernel</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:1648-2</td>
</tr>

<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1084332">bsc#1084332</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1141539">bsc#1141539</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1184509">bsc#1184509</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1186060">bsc#1186060</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1190317">bsc#1190317</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1190576">bsc#1190576</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1192145">bsc#1192145</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194516">bsc#1194516</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1203935">bsc#1203935</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209657">bsc#1209657</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1211592">bsc#1211592</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1212514">bsc#1212514</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213456">bsc#1213456</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217339">bsc#1217339</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217987">bsc#1217987</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217988">bsc#1217988</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217989">bsc#1217989</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218220">bsc#1218220</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218336">bsc#1218336</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218479">bsc#1218479</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218562">bsc#1218562</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219104">bsc#1219104</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219169">bsc#1219169</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219170">bsc#1219170</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219618">bsc#1219618</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219623">bsc#1219623</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219847">bsc#1219847</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220320">bsc#1220320</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220366">bsc#1220366</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220394">bsc#1220394</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220411">bsc#1220411</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220416">bsc#1220416</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220418">bsc#1220418</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220422">bsc#1220422</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220442">bsc#1220442</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220445">bsc#1220445</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220505">bsc#1220505</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220521">bsc#1220521</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220528">bsc#1220528</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220536">bsc#1220536</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220538">bsc#1220538</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220554">bsc#1220554</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220572">bsc#1220572</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220580">bsc#1220580</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220611">bsc#1220611</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220625">bsc#1220625</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220628">bsc#1220628</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220637">bsc#1220637</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220640">bsc#1220640</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220662">bsc#1220662</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220687">bsc#1220687</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220692">bsc#1220692</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220703">bsc#1220703</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220706">bsc#1220706</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220739">bsc#1220739</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220742">bsc#1220742</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220743">bsc#1220743</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220745">bsc#1220745</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220751">bsc#1220751</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220768">bsc#1220768</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220769">bsc#1220769</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220777">bsc#1220777</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220790">bsc#1220790</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220794">bsc#1220794</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220829">bsc#1220829</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220836">bsc#1220836</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220843">bsc#1220843</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220846">bsc#1220846</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220850">bsc#1220850</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220871">bsc#1220871</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220927">bsc#1220927</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220960">bsc#1220960</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220985">bsc#1220985</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220987">bsc#1220987</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221044">bsc#1221044</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221046">bsc#1221046</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221048">bsc#1221048</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221058">bsc#1221058</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221060">bsc#1221060</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221061">bsc#1221061</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221077">bsc#1221077</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221082">bsc#1221082</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221088">bsc#1221088</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221162">bsc#1221162</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221277">bsc#1221277</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221293">bsc#1221293</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221337">bsc#1221337</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221532">bsc#1221532</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221541">bsc#1221541</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221548">bsc#1221548</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221575">bsc#1221575</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221605">bsc#1221605</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221608">bsc#1221608</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221617">bsc#1221617</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221791">bsc#1221791</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221816">bsc#1221816</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221825">bsc#1221825</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221830">bsc#1221830</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221862">bsc#1221862</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221934">bsc#1221934</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221949">bsc#1221949</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221952">bsc#1221952</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221953">bsc#1221953</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221965">bsc#1221965</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221966">bsc#1221966</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221967">bsc#1221967</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221969">bsc#1221969</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221972">bsc#1221972</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221973">bsc#1221973</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221977">bsc#1221977</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221979">bsc#1221979</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221988">bsc#1221988</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221991">bsc#1221991</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221993">bsc#1221993</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221994">bsc#1221994</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221997">bsc#1221997</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221998">bsc#1221998</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221999">bsc#1221999</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222000">bsc#1222000</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222001">bsc#1222001</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222002">bsc#1222002</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222117">bsc#1222117</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222294">bsc#1222294</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222300">bsc#1222300</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222357">bsc#1222357</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222379">bsc#1222379</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222422">bsc#1222422</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222428">bsc#1222428</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222449">bsc#1222449</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222503">bsc#1222503</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222559">bsc#1222559</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222585">bsc#1222585</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222609">bsc#1222609</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222610">bsc#1222610</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222613">bsc#1222613</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222618">bsc#1222618</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222619">bsc#1222619</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222624">bsc#1222624</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222630">bsc#1222630</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222632">bsc#1222632</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222660">bsc#1222660</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222662">bsc#1222662</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222664">bsc#1222664</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222666">bsc#1222666</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222669">bsc#1222669</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222671">bsc#1222671</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222677">bsc#1222677</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222706">bsc#1222706</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222720">bsc#1222720</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222765">bsc#1222765</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222770">bsc#1222770</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222772">bsc#1222772</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222787">bsc#1222787</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222790">bsc#1222790</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222812">bsc#1222812</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222836">bsc#1222836</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222869">bsc#1222869</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222876">bsc#1222876</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222878">bsc#1222878</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222881">bsc#1222881</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222883">bsc#1222883</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222888">bsc#1222888</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222952">bsc#1222952</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222961">bsc#1222961</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222975">bsc#1222975</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222976">bsc#1222976</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223016">bsc#1223016</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223035">bsc#1223035</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223049">bsc#1223049</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223051">bsc#1223051</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223057">bsc#1223057</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223058">bsc#1223058</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223060">bsc#1223060</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223187">bsc#1223187</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223189">bsc#1223189</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223198">bsc#1223198</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223203">bsc#1223203</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223315">bsc#1223315</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223432">bsc#1223432</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223509">bsc#1223509</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223512">bsc#1223512</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223513">bsc#1223513</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223516">bsc#1223516</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223518">bsc#1223518</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223626">bsc#1223626</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223627">bsc#1223627</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223664">bsc#1223664</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223686">bsc#1223686</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223693">bsc#1223693</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223712">bsc#1223712</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223715">bsc#1223715</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223735">bsc#1223735</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223744">bsc#1223744</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223745">bsc#1223745</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223770">bsc#1223770</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223781">bsc#1223781</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223819">bsc#1223819</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223824">bsc#1223824</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223827">bsc#1223827</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223837">bsc#1223837</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223842">bsc#1223842</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223843">bsc#1223843</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223844">bsc#1223844</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223883">bsc#1223883</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223885">bsc#1223885</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223921">bsc#1223921</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223941">bsc#1223941</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223952">bsc#1223952</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223953">bsc#1223953</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223954">bsc#1223954</a>
</li>


<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-5759">jsc#PED-5759</a>
</li>

</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2019-25160.html">CVE-2019-25160</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2020-36312.html">CVE-2020-36312</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-23134.html">CVE-2021-23134</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46904.html">CVE-2021-46904</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46905.html">CVE-2021-46905</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46907.html">CVE-2021-46907</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46909.html">CVE-2021-46909</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46938.html">CVE-2021-46938</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46939.html">CVE-2021-46939</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46941.html">CVE-2021-46941</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46950.html">CVE-2021-46950</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46958.html">CVE-2021-46958</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46960.html">CVE-2021-46960</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46963.html">CVE-2021-46963</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46964.html">CVE-2021-46964</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46966.html">CVE-2021-46966</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46975.html">CVE-2021-46975</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46981.html">CVE-2021-46981</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46988.html">CVE-2021-46988</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46990.html">CVE-2021-46990</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46998.html">CVE-2021-46998</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47006.html">CVE-2021-47006</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47015.html">CVE-2021-47015</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47024.html">CVE-2021-47024</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47034.html">CVE-2021-47034</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47045.html">CVE-2021-47045</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47049.html">CVE-2021-47049</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47055.html">CVE-2021-47055</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47056.html">CVE-2021-47056</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47060.html">CVE-2021-47060</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47061.html">CVE-2021-47061</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47063.html">CVE-2021-47063</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47068.html">CVE-2021-47068</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47070.html">CVE-2021-47070</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47071.html">CVE-2021-47071</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47073.html">CVE-2021-47073</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47100.html">CVE-2021-47100</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47101.html">CVE-2021-47101</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47104.html">CVE-2021-47104</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47110.html">CVE-2021-47110</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47112.html">CVE-2021-47112</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47114.html">CVE-2021-47114</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47117.html">CVE-2021-47117</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47118.html">CVE-2021-47118</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47119.html">CVE-2021-47119</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47138.html">CVE-2021-47138</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47141.html">CVE-2021-47141</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47142.html">CVE-2021-47142</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47143.html">CVE-2021-47143</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47146.html">CVE-2021-47146</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47149.html">CVE-2021-47149</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47150.html">CVE-2021-47150</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47153.html">CVE-2021-47153</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47159.html">CVE-2021-47159</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47161.html">CVE-2021-47161</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47162.html">CVE-2021-47162</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47165.html">CVE-2021-47165</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47166.html">CVE-2021-47166</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47167.html">CVE-2021-47167</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47168.html">CVE-2021-47168</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47169.html">CVE-2021-47169</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47171.html">CVE-2021-47171</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47173.html">CVE-2021-47173</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47177.html">CVE-2021-47177</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47179.html">CVE-2021-47179</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47180.html">CVE-2021-47180</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47181.html">CVE-2021-47181</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47182.html">CVE-2021-47182</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47183.html">CVE-2021-47183</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47184.html">CVE-2021-47184</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47185.html">CVE-2021-47185</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47188.html">CVE-2021-47188</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47189.html">CVE-2021-47189</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47198.html">CVE-2021-47198</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47202.html">CVE-2021-47202</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47203.html">CVE-2021-47203</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47204.html">CVE-2021-47204</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47205.html">CVE-2021-47205</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47207.html">CVE-2021-47207</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47211.html">CVE-2021-47211</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47216.html">CVE-2021-47216</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47217.html">CVE-2021-47217</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-0487.html">CVE-2022-0487</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48619.html">CVE-2022-48619</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48626.html">CVE-2022-48626</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48636.html">CVE-2022-48636</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48650.html">CVE-2022-48650</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48651.html">CVE-2022-48651</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48667.html">CVE-2022-48667</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48668.html">CVE-2022-48668</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48687.html">CVE-2022-48687</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48688.html">CVE-2022-48688</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48695.html">CVE-2022-48695</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48701.html">CVE-2022-48701</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-0160.html">CVE-2023-0160</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-28746.html">CVE-2023-28746</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-35827.html">CVE-2023-35827</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52454.html">CVE-2023-52454</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52469.html">CVE-2023-52469</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52470.html">CVE-2023-52470</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52474.html">CVE-2023-52474</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52476.html">CVE-2023-52476</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52477.html">CVE-2023-52477</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52486.html">CVE-2023-52486</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52488.html">CVE-2023-52488</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52509.html">CVE-2023-52509</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52515.html">CVE-2023-52515</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52524.html">CVE-2023-52524</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52528.html">CVE-2023-52528</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52575.html">CVE-2023-52575</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52583.html">CVE-2023-52583</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52587.html">CVE-2023-52587</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52590.html">CVE-2023-52590</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52591.html">CVE-2023-52591</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52595.html">CVE-2023-52595</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52598.html">CVE-2023-52598</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52607.html">CVE-2023-52607</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52614.html">CVE-2023-52614</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52620.html">CVE-2023-52620</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52628.html">CVE-2023-52628</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52635.html">CVE-2023-52635</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52639.html">CVE-2023-52639</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52644.html">CVE-2023-52644</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52646.html">CVE-2023-52646</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52650.html">CVE-2023-52650</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52652.html">CVE-2023-52652</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52653.html">CVE-2023-52653</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-6270.html">CVE-2023-6270</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-6356.html">CVE-2023-6356</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-6535.html">CVE-2023-6535</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-6536.html">CVE-2023-6536</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-7042.html">CVE-2023-7042</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-7192.html">CVE-2023-7192</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-2201.html">CVE-2024-2201</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-22099.html">CVE-2024-22099</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-23307.html">CVE-2024-23307</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-23848.html">CVE-2024-23848</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-24855.html">CVE-2024-24855</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-24861.html">CVE-2024-24861</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26614.html">CVE-2024-26614</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26642.html">CVE-2024-26642</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26651.html">CVE-2024-26651</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26671.html">CVE-2024-26671</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26675.html">CVE-2024-26675</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26689.html">CVE-2024-26689</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26704.html">CVE-2024-26704</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26733.html">CVE-2024-26733</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26739.html">CVE-2024-26739</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26743.html">CVE-2024-26743</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26744.html">CVE-2024-26744</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26747.html">CVE-2024-26747</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26754.html">CVE-2024-26754</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26763.html">CVE-2024-26763</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26771.html">CVE-2024-26771</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26772.html">CVE-2024-26772</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26773.html">CVE-2024-26773</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26777.html">CVE-2024-26777</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26778.html">CVE-2024-26778</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26779.html">CVE-2024-26779</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26793.html">CVE-2024-26793</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26805.html">CVE-2024-26805</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26816.html">CVE-2024-26816</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26817.html">CVE-2024-26817</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26839.html">CVE-2024-26839</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26840.html">CVE-2024-26840</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26852.html">CVE-2024-26852</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26855.html">CVE-2024-26855</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26857.html">CVE-2024-26857</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26859.html">CVE-2024-26859</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26878.html">CVE-2024-26878</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26883.html">CVE-2024-26883</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26884.html">CVE-2024-26884</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26898.html">CVE-2024-26898</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26901.html">CVE-2024-26901</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26903.html">CVE-2024-26903</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26907.html">CVE-2024-26907</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26922.html">CVE-2024-26922</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26929.html">CVE-2024-26929</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26930.html">CVE-2024-26930</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26931.html">CVE-2024-26931</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26948.html">CVE-2024-26948</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26993.html">CVE-2024-26993</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27013.html">CVE-2024-27013</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27014.html">CVE-2024-27014</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27043.html">CVE-2024-27043</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27046.html">CVE-2024-27046</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27054.html">CVE-2024-27054</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27072.html">CVE-2024-27072</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27073.html">CVE-2024-27073</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27074.html">CVE-2024-27074</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27075.html">CVE-2024-27075</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27078.html">CVE-2024-27078</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27388.html">CVE-2024-27388</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2019-25160</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2019-25160</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2020-36312</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2020-36312</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-23134</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-23134</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46904</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46904</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46905</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46905</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46907</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46909</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46909</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46938</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46939</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46939</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46941</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46941</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46950</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46950</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46958</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46960</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46963</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46964</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46966</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46975</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.2</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46981</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46988</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46990</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46998</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47006</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47015</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47024</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47034</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47045</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47049</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47055</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47056</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47060</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47061</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47063</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47068</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47070</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47071</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47073</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47100</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47101</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47104</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47110</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47112</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47114</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47117</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47118</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47119</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47138</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47141</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47142</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47143</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47146</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47149</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47150</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47153</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47159</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47161</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47162</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47165</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47166</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47167</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47168</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47169</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47171</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47171</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47173</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47173</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47177</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47179</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47179</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47180</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47181</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47182</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47183</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47184</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47185</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47188</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47189</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47198</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47198</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47202</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47203</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47204</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47205</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47207</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47211</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47216</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47217</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-0487</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-0487</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48619</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.2</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48619</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48626</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48626</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48636</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48650</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48651</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48667</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48668</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48687</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48688</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48695</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48701</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-0160</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-0160</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-28746</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-35827</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52454</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52454</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52469</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52469</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52470</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52470</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52474</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52474</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52476</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52477</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52486</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52488</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52509</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52515</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52524</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52528</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52575</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52583</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52587</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52590</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52591</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52595</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52598</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52607</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52614</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52620</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52628</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52635</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52639</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52644</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52646</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52650</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52652</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52653</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-6270</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-6270</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-6356</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-6356</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-6535</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-6535</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-6536</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-6536</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-7042</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-7042</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-7192</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-7192</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-2201</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-22099</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-22099</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23307</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23307</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23848</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23848</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-24855</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-24855</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-24861</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-24861</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26614</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.9</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26642</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26651</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.2</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26671</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26675</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26689</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26704</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26733</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26739</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26743</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26744</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26747</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26754</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26763</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26771</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26772</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26773</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26777</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26778</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26779</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26793</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26805</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26816</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26817</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26839</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26840</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26852</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26855</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26857</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26859</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26878</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26883</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26883</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26884</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26884</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26898</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26898</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26901</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26901</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26903</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26903</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26907</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26907</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26922</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26929</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26930</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26931</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26948</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26993</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27013</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27014</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27043</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27046</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27054</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27072</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27073</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27074</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27075</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27078</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27388</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">SUSE Linux
Enterprise High Availability Extension 12 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 12 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Live Patching 12-SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 12 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 12 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Software Development Kit 12 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Workstation Extension 12 12-SP5</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves 193 vulnerabilities, contains one feature
and has 17 security fixes can now be installed.</p>





<h2>Description:</h2>

<p>The SUSE Linux Enterprise 12 SP5 kernel was updated to receive
various security bugfixes.</p>
<p>NOTE: This update was retracted due to data corruptions on NFS
filesystems.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2019-25160: Fixed out-of-bounds memory accesses in netlabel
(bsc#1220394).</li>
<li>CVE-2020-36312: Fixed an issue in virt/kvm/kvm_main.c that had a
kvm_io_bus_unregister_dev memory leak upon a kmalloc failure (bsc#1184509).</li>
<li>CVE-2021-23134: Fixed a use-after-free issue in nfc sockets
(bsc#1186060).</li>
<li>CVE-2021-46904: Fixed NULL pointer dereference during tty device
unregistration (bsc#1220416).</li>
<li>CVE-2021-46905: Fixed NULL pointer dereference on disconnect
regression (bsc#1220418).</li>
<li>CVE-2021-46909: Fixed PCI interrupt mapping in ARM footbridge
(bsc#1220442).</li>
<li>CVE-2021-46938: Fixed double free of blk_mq_tag_set in dev remove
after table load fails (bsc#1220554).</li>
<li>CVE-2021-46939: Fixed possible hung in trace_clock_global()
(bsc#1220580).</li>
<li>CVE-2021-46941: Fixed core softreset when switch mode in usb dwc3
(bsc#1220628).</li>
<li>CVE-2021-46950: Fixed possible data corruption in md/raid1 when
ending a failed write request (bsc#1220662).</li>
<li>CVE-2021-46958: Fixed race between transaction aborts and fsyncs that
could lead to use-after-free in btrfs (bsc#1220521).</li>
<li>CVE-2021-46960: Fixed wrong error code from smb2_get_enc_key()
(bsc#1220528).</li>
<li>CVE-2021-46963: Fixed crash in qla2xxx_mqueuecommand()
(bsc#1220536).</li>
<li>CVE-2021-46964: Fixed unreserved extra IRQ vectors in qla2xxx
(bsc#1220538).</li>
<li>CVE-2021-46966: Fixed potential use-after-free issue in cm_write()
(bsc#1220572).</li>
<li>CVE-2021-46981: Fixed NULL pointer in flush_workqueue
(bsc#1220611).</li>
<li>CVE-2021-46988: Fixed possible crash in userfaultfd due to unreleased
page (bsc#1220706).</li>
<li>CVE-2021-46990: Fixed crashes when toggling entry flush barrier in
powerpc/64s (bsc#1220743).</li>
<li>CVE-2021-46998: Fixed a use after free bug in enic_hard_start_xmit()
(bsc#1220625).</li>
<li>CVE-2021-47006: Fixed wrong check in overflow_handler hook in ARM
9064/1 hw_breakpoint (bsc#1220751).</li>
<li>CVE-2021-47015: Fixed RX consumer index logic in the error path in
bnxt_en (bsc#1220794).</li>
<li>CVE-2021-47024: Fixed possible memory leak in vsock/virtio when
closing socket (bsc#1220637).</li>
<li>CVE-2021-47034: Fixed resolved pte update for kernel memory on radix
in powerpc/64s (bsc#1220687).</li>
<li>CVE-2021-47045: Fixed null pointer dereference in
lpfc_prep_els_iocb() (bsc#1220640).</li>
<li>CVE-2021-47049: Fixed Use after free in __vmbus_open()
(bsc#1220692).</li>
<li>CVE-2021-47055: Fixed missing permissions for locking and badblock
ioctls in mtd (bsc#1220768).</li>
<li>CVE-2021-47056: Fixed uninitialized lock in adf_vf2pf_shutdown()
(bsc#1220769).</li>
<li>CVE-2021-47060: Fixed a bug in KVM by stop looking for coalesced MMIO
zones if the bus is destroyed (bsc#1220742).</li>
<li>CVE-2021-47061: Fixed a bug in KVM by destroy I/O bus devices on
unregister failure <em>after</em> sync&#x27;ing SRCU (bsc#1220745).</li>
<li>CVE-2021-47063: Fixed possible use-after-free in
panel_bridge_detach() (bsc#1220777).</li>
<li>CVE-2021-47068: Fixed a use-after-free issue in
llcp_sock_bind/connect (bsc#1220739).</li>
<li>CVE-2021-47070: Fixed memory leak in error handling paths in
uio_hv_generic (bsc#1220829).</li>
<li>CVE-2021-47071: Fixed memory leak in error handling paths in
uio_hv_generic (bsc#1220846).</li>
<li>CVE-2021-47073: Fixed oops on rmmod dell_smbios
init_dell_smbios_wmi() (bsc#1220850).</li>
<li>CVE-2021-47100: Fixed UAF when uninstall in ipmi
(bsc#1220985).</li>
<li>CVE-2021-47101: Fixed uninit-value in asix_mdio_read()
(bsc#1220987).</li>
<li>CVE-2021-47104: Fixed memory leak in qib_user_sdma_queue_pkts()
(bsc#1220960).</li>
<li>CVE-2021-47110: Fixed possible memory corruption when restoring from
hibernation in x86/kvm (bsc#1221532).</li>
<li>CVE-2021-47112: Fixed possible memory corruption when restoring from
hibernation in x86/kvm (bsc#1221541).</li>
<li>CVE-2021-47114: Fixed data corruption by fallocate in ocfs2
(bsc#1221548).</li>
<li>CVE-2021-47117: Fixed bug on in ext4_es_cache_extent() as
ext4_split_extent_at() failed (bsc#1221575).</li>
<li>CVE-2021-47118: Fixed possible use-after-free when initializing
<code>cad_pid</code> (bsc#1221605).</li>
<li>CVE-2021-47119: Fixed memory leak in ext4_fill_super()
(bsc#1221608).</li>
<li>CVE-2021-47138: Fixed possible out-of-bound memory access in cxgb4
when clearing filters (bsc#1221934).</li>
<li>CVE-2021-47141: Fixed possible NULL pointer dereference when freeing
irqs (bsc#1221949).</li>
<li>CVE-2021-47142: Fixed a use-after-free in drm/amdgpu
(bsc#1221952).</li>
<li>CVE-2021-47143: Fixed possible corruption in net/smc after failed
device_add() (bsc#1221988).</li>
<li>CVE-2021-47150: Fixed the potential memory leak in fec_enet_init()
(bsc#1221973).</li>
<li>CVE-2021-47153: Fixed wrongly generated interrupt on bus reset in
i2c/i801 (bsc#1221969).</li>
<li>CVE-2021-47165: Fixed shutdown crash when component not probed in
drm/meson (bsc#1221965).</li>
<li>CVE-2021-47166: Fixed possible corruptionb in nfs_do_recoalesce()
(bsc#1221998).</li>
<li>CVE-2021-47167: Fixed an Oopsable condition in
__nfs_pageio_add_request() (bsc#1221991).</li>
<li>CVE-2021-47168: Fixed an incorrect limit in
filelayout_decode_layout() (bsc#1222002).</li>
<li>CVE-2021-47169: Fixed possible NULL pointer dereference in serial/rp2
(bsc#1222000).</li>
<li>CVE-2021-47171: Fixed memory leak in smsc75xx_bind()
(bsc#1221994).</li>
<li>CVE-2021-47173: Fixed memory leak in uss720_probe()
(bsc#1221993).</li>
<li>CVE-2021-47177: Fixed sysfs leak in alloc_iommu()
(bsc#1221997).</li>
<li>CVE-2021-47179: Fixed a NULL pointer dereference in
pnfs_mark_matching_lsegs_return() (bsc#1222001).</li>
<li>CVE-2021-47180: Fixed memory leak in nci_allocate_device()
(bsc#1221999).</li>
<li>CVE-2021-47181: Fixed a null pointer dereference caused by calling
platform_get_resource() (bsc#1222660).</li>
<li>CVE-2021-47183: Fixed a null pointer dereference during link down
processing in scsi lpfc (bsc#1192145, bsc#1222664).</li>
<li>CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty
tty_buffer (bsc#1222669).</li>
<li>CVE-2021-47189: Fixed denial of service due to memory ordering issues
between normal and ordered work functions in btrfs (bsc#1222706).</li>
<li>CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_
functions (bsc#1222878)</li>
<li>CVE-2022-0487: A use-after-free vulnerability was found in
rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).</li>
<li>CVE-2022-48619: Fixed a denial-of-service issue in
drivers/input/input.c (bsc#1218220).</li>
<li>CVE-2022-48626: Fixed a potential use-after-free on remove path
moxart (bsc#1220366).</li>
<li>CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local
user to potentially crash the system (bsc#1209657).</li>
<li>CVE-2023-28746: Fixed Register File Data Sampling
(bsc#1213456).</li>
<li>CVE-2023-35827: Fixed a use-after-free issue in
ravb_tx_timeout_work() (bsc#1212514).</li>
<li>CVE-2023-52454: Fixed a kernel panic when host sends an invalid H2C
PDU length (bsc#1220320).</li>
<li>CVE-2023-52469: Fixed use-after-free in kv_parse_power_table()
(bsc#1220411).</li>
<li>CVE-2023-52470: Fixed null-ptr-deref in radeon_crtc_init()
(bsc#122041).</li>
<li>CVE-2023-52474: Fixed bugs with non-PAGE_SIZE-end multi-iovec user
SDMA requests in hfi1 (bsc#1220445).</li>
<li>CVE-2023-52476: Fixed possible unhandled page fault via perf sampling
NMI during vsyscall (bsc#1220703).</li>
<li>CVE-2023-52477: Fixed USB Hub accesses to uninitialized BOS
descriptors (bsc#1220790).</li>
<li>CVE-2023-52486: Fixed possible use-after-free in drm
(bsc#1221277).</li>
<li>CVE-2023-52509: Fixed a use-after-free issue in
ravb_tx_timeout_work() (bsc#1220836).</li>
<li>CVE-2023-52515: Fixed possible use-after-free in RDMA/srp
(bsc#1221048).</li>
<li>CVE-2023-52524: Fixed possible corruption in nfc/llcp
(bsc#1220927).</li>
<li>CVE-2023-52528: Fixed uninit-value access in __smsc75xx_read_reg()
(bsc#1220843).</li>
<li>CVE-2023-52575: Fixed SBPB enablement for spec_rstack_overflow=off
(bsc#1220871).</li>
<li>CVE-2023-52583: Fixed deadlock or deadcode of misusing dget() inside
ceph (bsc#1221058).</li>
<li>CVE-2023-52587: Fixed mcast list locking in IB/ipoib
(bsc#1221082).</li>
<li>CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via
directory renaming (bsc#1221088).</li>
<li>CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via
directory renaming (bsc#1221044).</li>
<li>CVE-2023-52598: Fixed wrong setting of fpc register in s390/ptrace
(bsc#1221060).</li>
<li>CVE-2023-52607: Fixed NULL pointer dereference in pgtable_cache_add
kasprintf() (bsc#1221061).</li>
<li>CVE-2023-52628: Fixed 4-byte stack OOB write in nftables
(bsc#1222117).</li>
<li>CVE-2023-52639: Fixed race during shadow creation in KVM/s390/vsie
(bsc#1222300).</li>
<li>CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts
(bsc#1218562).</li>
<li>CVE-2023-6356: Fixed a NULL pointer dereference in
nvmet_tcp_build_pdu_iovec (bsc#1217987).</li>
<li>CVE-2023-6535: Fixed a NULL pointer dereference in
nvmet_tcp_execute_request (bsc#1217988).</li>
<li>CVE-2023-6536: Fixed a NULL pointer dereference in
__nvmet_req_complete (bsc#1217989).</li>
<li>CVE-2023-7042: Fixed a NULL pointer dereference vulnerability in
ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).</li>
<li>CVE-2023-7192: Fixed a memory leak problem in
ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c (bsc#1218479).</li>
<li>CVE-2024-2201: Fixed information leak in x86/BHI
(bsc#1217339).</li>
<li>CVE-2024-22099: Fixed NULL Pointer Dereference vulnerability in
/net/bluetooth/rfcomm/core.c (bsc#1219170).</li>
<li>CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in
x86 and ARM md, raid, raid5 modules (bsc#1219169).</li>
<li>CVE-2024-24855: Fixed a null pointer dereference due to race
condition in scsi device driver in lpfc_unregister_fcf_rescan() function (bsc#1219618).</li>
<li>CVE-2024-24861: Fixed an overflow due to race condition in
media/xc4000 device driver in xc4000 xc4000_get_frequency() function (bsc#1219623).</li>
<li>CVE-2024-26614: Fixed the initialization of accept_queue&#x27;s
spinlocks (bsc#1221293).</li>
<li>CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter
nf_tables (bsc#1221830).</li>
<li>CVE-2024-26704: Fixed a double-free of blocks due to wrong extents
moved_len in ext4 (bsc#1222422).</li>
<li>CVE-2024-26733: Fixed an overflow in arp_req_get() in arp
(bsc#1222585).</li>
<li>CVE-2024-26743: Fixed memory leak in qedr_create_user_qp error flow
in rdma/qedr (bsc#1222677)</li>
<li>CVE-2024-26744: Fixed null pointer dereference in srpt_service_guid
parameter in rdma/srpt (bsc#1222449)</li>
<li>CVE-2024-26754: Fixed an use-after-free and null-ptr-deref in
gtp_genl_dump_pdp() in gtp (bsc#1222632).</li>
<li>CVE-2024-26763: Fixed user corruption via by writing data with
O_DIRECT on device in dm-crypt (bsc#1222720).</li>
<li>CVE-2024-26771: Fixed a null pointer dereference on edma_probe in
dmaengine ti edma (bsc#1222610)</li>
<li>CVE-2024-26793: Fixed an use-after-free and null-ptr-deref in
gtp_newlink() in gtp (bsc#1222428).</li>
<li>CVE-2024-26805: Fixed a kernel-infoleak-after-free in
__skb_datagram_iter in netlink (bsc#1222630).</li>
<li>CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different
places (bsc#1223824).</li>
<li>CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache()
(bsc#1222976).</li>
<li>CVE-2021-47161: Fixed a resource leak in an error handling path in
the error handling path of the probe function in spi spi-fsl-dspi (bsc#1221966).</li>
<li>CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb-&gt;mac_header (bsc#1223513).</li>
<li>CVE-2024-26816: Ignore relocations in .notes section when building
with CONFIG_XEN_PV=y (bsc#1222624).</li>
<li>CVE-2023-52595: Fixed possible deadlock in wifi/rt2x00
(bsc#1221046).</li>
<li>CVE-2024-26689: Fixed a use-after-free in encode_cap_msg()
(bsc#1222503).</li>
<li>CVE-2024-26773: Fixed ext4 block allocation from corrupted group in
ext4_mb_try_best_found() (bsc#1222618).</li>
<li>CVE-2021-47182: Fixed scsi_mode_sense() buffer length handling
(bsc#1222662).</li>
<li>CVE-2022-48701: Fixed an out-of-bounds bug in
__snd_usb_parse_audio_interface() (bsc#1223921).</li>
<li>CVE-2024-26993: Fixed a reference leak in
sysfs_break_active_protection() (bsc#1223693)</li>
<li>CVE-2023-52650: Added missing check for of_find_device_by_node()
(bsc#1223770)</li>
<li>CVE-2024-26948: Added a dc_state NULL check in dc_state_release
(bsc#1223664)</li>
<li>CVE-2024-27013: Limited printing rate when illegal packet received by
tun dev (bsc#1223745).</li>
<li>CVE-2024-27014: Prevented deadlock while disabling aRFS
(bsc#1223735).</li>
<li>CVE-2024-27046: Handled acti_netdevs allocation failure
(bsc#1223827).</li>
<li>CVE-2021-47162: Fixed a possible memory leak in tipc_buf_append
(bsc#1221977).</li>
<li>CVE-2024-27072: Removed useless locks in usbtv_video_free()
(bsc#1223837).</li>
<li>CVE-2024-27075: Avoided stack overflow warnings with clang
(bsc#1223842).</li>
<li>CVE-2024-27073: Fixed a memory leak in budget_av_attach()
(bsc#1223843).</li>
<li>CVE-2024-27074: Fixed a memory leak in go7007_load_encoder()
(bsc#1223844).</li>
<li>CVE-2024-27078: Fixed a memory leak in tpg_alloc()
(bsc#1223781).</li>
<li>CVE-2023-52652: Fixed a possible name leak in ntb_register_device()
(bsc#1223686).</li>
<li>CVE-2024-23848: Fixed a use-after-free in cec_queue_msg_fh, related
to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c (bsc#1219104).</li>
<li>CVE-2024-26859: Prevent access to a freed page in page_pool in bnx2x
(bsc#1223049).</li>
<li>CVE-2024-26817: Used calloc instead of kzalloc to avoid integer
overflow (bsc#1222812)</li>
<li>CVE-2021-47149: Fixed a potential null pointer deref in
fmvj18x_get_hwinfo() (bsc#1221972).</li>
<li>CVE-2023-52620: Disallowed timeout for anonymous sets in nf_tables
(bsc#1221825).</li>
<li>CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify()
(bsc#1223057).</li>
<li>CVE-2024-26878: Fixed potential NULL pointer dereference, related to
dquots (bsc#1223060).</li>
<li>CVE-2024-26901: Used kzalloc() to fix information leak in
do_sys_name_to_handle() (bsc#1223198).</li>
<li>CVE-2024-26671: Fixed an IO hang from sbitmap wakeup race in
blk_mq_mark_tag_wait() (bsc#1222357).</li>
<li>CVE-2024-26772: Avoided allocating blocks from corrupted group in
ext4_mb_find_by_goal() (bsc#1222613).</li>
<li>CVE-2023-52614: Fixed a buffer overflow in trans_stat_show()
(bsc#1221617).</li>
<li>CVE-2024-26855: Fixed a potential NULL pointer dereference in
ice_bridge_setlink() (bsc#1223051).</li>
<li>CVE-2024-26857: Made sure to pull inner header in geneve_rx()
(bsc#1223058).</li>
<li>CVE-2024-26675: Limited MRU to 64K in ppp_async_ioctl()
(bsc#1222379).</li>
<li>CVE-2024-26907: Fixed a fortify source warning while accessing Eth
segment in mlx5 (bsc#1223203).</li>
<li>CVE-2023-52488: Converted from <em>raw</em> to
<em>noinc</em> regmap functions for FIFO in sc16is7xx (bsc#1221162).</li>
<li>CVE-2024-26922: Validated the parameters of bo mapping operations
more clearly (bsc#1223315).</li>
<li>CVE-2021-47184: Fixed NULL pointer dereference on VSI filter sync
(bsc#1222666).</li>
<li>CVE-2023-52635: Synchronized devfreq_monitor_[start/stop] for devfreq
(bsc#1222294).</li>
<li>CVE-2024-26883: Checked for integer overflow when using
roundup_pow_of_two() (bsc#1223035).</li>
<li>CVE-2024-26884: Fixed a bpf hashtab overflow check on 32-bit
architectures (bsc#1223189).</li>
<li>CVE-2024-26839: Fixed a memleak in init_credit_return()
(bsc#1222975)</li>
<li>CVE-2023-52644: Stop/wake correct queue in DMA Tx path when QoS is
disabled in b43 (bsc#1222961).</li>
<li>CVE-2021-47205: Unregistered clocks/resets when unbinding in sunxi-ng
(bsc#1222888).</li>
<li>CVE-2021-47211: Fixed a null pointer dereference on pointer cs_desc
in usb-audio (bsc#1222869).</li>
<li>CVE-2021-47207: Fixed a null pointer dereference on pointer block in
gus (bsc#1222790).</li>
<li>CVE-2024-26779: Fixed a race condition on enabling fast-xmit in
mac80211 (bsc#1222772).</li>
<li>CVE-2024-26777: Error out if pixclock equals zero in fbdev/sis
(bsc#1222765)</li>
<li>CVE-2024-26778: Error out if pixclock equals zero in fbdev/savage
(bsc#1222770)</li>
<li>CVE-2024-26747: Fixed a NULL pointer issue with USB parent
module&#x27;s reference (bsc#1222609).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>Input: adxl34x - do not hardcode interrupt trigger type
(git-fixes).</li>
<li>Input: drv260x - sleep between polling GO bit (git-fixes).</li>
<li>Input: ipaq-micro-keys - add error handling for
devm_kmemdup.</li>
<li>Input: xpad - add PXN V900 support.</li>
<li>USB: core: Fix deadlock in usb_deauthorize_interface().</li>
<li>USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command
(git-fixes).</li>
<li>atl1c: fix error return code in atl1c_probe() (git-fixes).</li>
<li>atl1e: fix error return code in atl1e_probe() (git-fixes).</li>
<li>bluetooth: btqca: Fixed a coding style error (git-fixes).</li>
<li>bluetooth: btqca: Introduce HCI_EV_VENDOR and use it
(git-fixes).</li>
<li>bluetooth: btqcomsmd: Fix command timeout after setting BD address
(git-fixes).</li>
<li>bluetooth: hci_intel: Add check for platform_driver_register
(git-fixes).</li>
<li>bnx2x: Fix enabling network interfaces without VFs
(git-fixes).</li>
<li>bnx2x: Fix missing error code in bnx2x_iov_init_one()
(git-fixes).</li>
<li>bpf, sockmap: Fix preempt_rt splat when using raw_spin_lock_t
(git-fixes).</li>
<li>drivers: usb: host: Fix deadlock in oxu_bus_suspend()
(git-fixes).</li>
<li>ethernet: myri10ge: Fix missing error code in myri10ge_probe()
(git-fixes).</li>
<li>ethernet: ucc_geth: fix definition and size of
ucc_geth_tx_global_pram (git-fixes).</li>
<li>fuse: do not unhash root (bsc#1223954).</li>
<li>iommu/amd: Increase interrupt remapping table limit to 512 entries
(git-fixes).</li>
<li>iommu/amd: Mark interrupt as managed (git-fixes).</li>
<li>iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs
(git-fixes).</li>
<li>iommu/amd: Silence warnings under memory pressure
(git-fixes).</li>
<li>iommu: Check if group is NULL before remove device
(git-fixes).</li>
<li>kabi fix for pNFS: Fix the pnfs block driver&#x27;s calculation
of layoutget size (git-fixes).</li>
<li>kabi: pci: Add locking to RMW PCI Express Capability Register
accessors (kabi).</li>
<li>lan78xx: Add missing return code checks (git-fixes).</li>
<li>lan78xx: Add support to dump lan78xx registers
(git-fixes).</li>
<li>lan78xx: Do not access skb_queue_head list pointers directly
(git-fixes).</li>
<li>lan78xx: Fix exception on link speed change (git-fixes).</li>
<li>lan78xx: Fix partial packet errors on suspend/resume
(git-fixes).</li>
<li>lan78xx: Fix race conditions in suspend/resume handling
(git-fixes).</li>
<li>lan78xx: Fix white space and style issues (git-fixes).</li>
<li>lan78xx: Modify error messages (git-fixes).</li>
<li>lan78xx: enable auto speed configuration for LAN7850 if no EEPROM is
detected (git-fixes).</li>
<li>net/mlx5: Properly convey driver version to firmware
(git-fixes).</li>
<li>net/qla3xxx: fix schedule while atomic in ql_sem_spinlock
(git-fixes).</li>
<li>net: Fix features skip in for_each_netdev_feature()
(git-fixes).</li>
<li>net: allwinner: Fix some resources leak in the error handling path of
the probe and in the remove function (git-fixes).</li>
<li>net: atheros: switch from &#x27;pci_&#x27; to
&#x27;dma_&#x27; API (git-fixes).</li>
<li>net: lan78xx: Allow for VLAN headers in timeout calcs
(git-fixes).</li>
<li>net: lan78xx: Make declaration style consistent
(git-fixes).</li>
<li>net: lan78xx: Merge memcpy + lexx_to_cpus to get_unaligned_lexx
(git-fixes).</li>
<li>net: lan78xx: fix runtime PM count underflow on link stop
(git-fixes).</li>
<li>net: lan78xx: remove set but not used variable
&#x27;event&#x27; (git-fixes).</li>
<li>net: macb: ensure the device is available before accessing GEMGXL
control registers (git-fixes).</li>
<li>net: stmmac: free tx skb buffer in stmmac_resume()
(git-fixes).</li>
<li>net: sunrpc: Fix an off by one in rpc_sockaddr2uaddr()
(git-fixes).</li>
<li>net: usb: lan78xx: Remove lots of set but unused
&#x27;ret&#x27; variables (git-fixes).</li>
<li>net:usb: Use ARRAY_SIZE instead of calculating the array size
(git-fixes).</li>
<li>nfs: Fix O_DIRECT commit verifier handling (git-fixes).</li>
<li>nfs: Fix O_DIRECT locking issues (git-fixes).</li>
<li>nfs: Fix a request reference leak in nfs_direct_write_clear_reqs()
(git-fixes).</li>
<li>nfs: Fix an off by one in root_nfs_cat() (git-fixes).</li>
<li>nfs: Fix direct WRITE throughput regression (git-fixes).</li>
<li>nfs: Fix error handling for O_DIRECT write scheduling
(git-fixes).</li>
<li>nfs: More O_DIRECT accounting fixes for error paths
(git-fixes).</li>
<li>nfs: add atomic_open for NFSv3 to handle O_TRUNC correctly
(bsc#1219847).</li>
<li>nfs: avoid spurious warning of lost lock that is being unlocked
(bsc#1221791).</li>
<li>nfs: commit errors should be fatal (git-fixes).</li>
<li>nfs: only issue commit in DIO codepath if we have uncommitted data
(git-fixes).</li>
<li>nfsd: Fix error cleanup path in nfsd_rename() (git-fixes).</li>
<li>nfsd: Reset cb_seq_status after NFS4ERR_DELAY (git-fixes).</li>
<li>nfsd: Retransmit callbacks after client reconnects
(git-fixes).</li>
<li>nfsd: lock_rename() needs both directories to live on the same fs
(git-fixes).</li>
<li>nfsv4.1/pnfs: Ensure we handle the error NFS4ERR_RETURNCONFLICT
(git-fixes).</li>
<li>pci/aer: Clear MULTI_ERR_COR/UNCOR_RCV bits (git-fixes).</li>
<li>pci/aspm: Avoid link retraining race (git-fixes).</li>
<li>pci/aspm: Disable ASPM on MFD function removal to avoid
use-after-free (git-fixes).</li>
<li>pci/aspm: Do not warn if already in common clock mode
(git-fixes).</li>
<li>pci/aspm: Factor out pcie_wait_for_retrain() (git-fixes).</li>
<li>pci/aspm: Reduce severity of common clock config message
(git-fixes).</li>
<li>pci/aspm: Return 0 or -ETIMEDOUT from pcie_retrain_link()
(git-fixes).</li>
<li>pci/aspm: Use RMW accessors for changing LNKCTL
(git-fixes).</li>
<li>pci/dpc: Print all TLP Prefixes, not just the first
(git-fixes).</li>
<li>pci/iov: Enlarge virtfn sysfs name buffer (git-fixes).</li>
<li>pci/msi: Prevent MSI hardware interrupt number truncation
(git-fixes).</li>
<li>pci/pm: Power up all devices during runtime resume
(git-fixes).</li>
<li>pci/sysfs: Protect driver&#x27;s D3cold preference from user
space (git-fixes).</li>
<li>pci: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).</li>
<li>pci: Add function 1 DMA alias quirk for Marvell 88SE9235
(git-fixes).</li>
<li>pci: Add locking to RMW PCI Express Capability Register accessors
(git-fixes).</li>
<li>pci: Avoid FLR for AMD FCH AHCI adapters (git-fixes).</li>
<li>pci: Avoid pci_dev_lock() AB/BA deadlock with sriov_numvfs_store()
(git-fixes).</li>
<li>pci: Make link retraining use RMW accessors for changing LNKCTL
(git-fixes).</li>
<li>pci: Mark 3ware-9650SE Root Port Extended Tags as broken
(git-fixes).</li>
<li>pci: Rework pcie_retrain_link() wait loop (git-fixes).</li>
<li>pci: aardvark: Fix setting MSI address (git-fixes).</li>
<li>pci: aardvark: Fix support for MSI interrupts (git-fixes).</li>
<li>pci: dwc: Add unroll iATU space support to dw_pcie_disable_atu()
(git-fixes).</li>
<li>pci: endpoint: Do not stop controller when unbinding endpoint
function (git-fixes).</li>
<li>pci: hotplug: Allow marking devices as disconnected during
bind/unbind (git-fixes).</li>
<li>pci: pciehp: Add pciehp_set_indicators() to set both indicators
(git-fixes).</li>
<li>pci: pciehp: Cancel bringup sequence if card is not present
(git-fixes).</li>
<li>pci: pciehp: Fix AB-BA deadlock between reset_lock and device_lock
(git-fixes).</li>
<li>pci: pciehp: Use RMW accessors for changing LNKCTL
(git-fixes).</li>
<li>pci: qcom: Disable write access to read only registers for IP v2.3.3
(git-fixes).</li>
<li>pci: qcom: Fix unbalanced PHY init on probe errors
(git-fixes).</li>
<li>pci: qcom: Use DWC helpers for modifying the read-only DBI registers
(git-fixes).</li>
<li>pci: switchtec: Return -EFAULT for copy_to_user() errors
(git-fixes).</li>
<li>pnfs/flexfiles: Check the layout validity in
ff_layout_mirror_prepare_stats (git-fixes).</li>
<li>pnfs: Fix the pnfs block driver&#x27;s calculation of layoutget
size (git-fixes).</li>
<li>rdma/ipoib: Fix error code return in ipoib_mcast_join
(bsc#1221082)</li>
<li>s390/mm: Fix clearing storage keys for huge pages (git-fixes
bsc#1223883).</li>
<li>s390/mm: Fix storage key clearing for guest huge pages (git-fixes
bsc#1223885).</li>
<li>s390/vtime: fix average steal time calculation (git-fixes
bsc#1221953).</li>
<li>scsi: qla2xxx: Change debug message during driver unload
(bsc1221816).</li>
<li>scsi: qla2xxx: Delay I/O Abort on PCI error (bsc1221816).</li>
<li>scsi: qla2xxx: Fix N2N stuck connection (bsc1221816).</li>
<li>scsi: qla2xxx: Fix command flush on cable pull
(bsc1221816).</li>
<li>scsi: qla2xxx: Fix double free of fcport (bsc1221816).</li>
<li>scsi: qla2xxx: Fix double free of the ha-&gt;vp_map pointer
(bsc1221816).</li>
<li>scsi: qla2xxx: NVME|FCP prefer flag not being honored
(bsc1221816).</li>
<li>scsi: qla2xxx: Prevent command send on chip reset
(bsc1221816).</li>
<li>scsi: qla2xxx: Split FCE|EFT trace control (bsc1221816).</li>
<li>scsi: qla2xxx: Update manufacturer detail (bsc1221816).</li>
<li>scsi: qla2xxx: Update version to 10.02.09.200-k
(bsc1221816).</li>
<li>sr9800: Add check for usbnet_get_endpoints (git-fixes).</li>
<li>sunrpc: Fix RPC client cleaned up the freed pipefs dentries
(git-fixes).</li>
<li>sunrpc: fix a memleak in gss_import_v2_context
(git-fixes).</li>
<li>sunrpc: fix some memleaks in gssx_dec_option_array
(git-fixes).</li>
<li>tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc
(bsc#1222619).</li>
<li>tun: honor IOCB_NOWAIT flag (git-fixes).</li>
<li>usb: dwc2: Fix memory leak in dwc2_hcd_init.</li>
<li>usb: dwc2: check return value after calling platform_get_resource()
(git-fixes).</li>
<li>usb: dwc3: gadget: Ignore EP queue requests during bus reset
(git-fixes).</li>
<li>usb: gadget: Fix issue with config_ep_by_speed function
(git-fixes).</li>
<li>usb: mon: Fix atomicity violation in mon_bin_vma_fault
(git-fixes).</li>
<li>usb: musb: Modify the &quot;HWVers&quot; register address
(git-fixes).</li>
<li>usb: roles: do not get/set_role() when usb_role_switch is
unregistered.</li>
<li>usb: serial: option: add Fibocom L7xx modules (git-fixes).</li>
<li>usb: serial: option: do not claim interface 4 for ZTE MF290
(git-fixes).</li>
<li>usb: storage: set 1.50 as the lower bcdDevice for older
&quot;Super Top&quot; compatibility (git-fixes).</li>
<li>usb: typec: class: fix typec_altmode_put_partner to put plugs
(git-fixes).</li>
<li>usb: usbfs: Do not WARN about excessively large memory
allocations.</li>
<li>x86/CPU/AMD: Update the Zenbleed microcode revisions
(git-fixes).</li>
<li>x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes).</li>
</ul>




<h2>Special Instructions and Notes:</h2>
<ul>


<li>Please reboot the system after installing this
update.</li>


</ul>


<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
SUSE Linux Enterprise Server for SAP Applications 12 SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-HA-12-SP5-2024-1648=1 SUSE-SLE-SERVER-12-SP5-2024-1648=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise High Availability Extension 12 SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-HA-12-SP5-2024-1648=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Live Patching 12-SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-Live-Patching-12-SP5-2024-1648=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Software Development Kit 12 SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-SDK-12-SP5-2024-1648=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing 12 SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-SERVER-12-SP5-2024-1648=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server 12 SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-SERVER-12-SP5-2024-1648=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Workstation Extension 12 12-SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-WE-12-SP5-2024-1648=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
SUSE Linux Enterprise Server for SAP Applications 12 SP5
(ppc64le x86_64)
<ul>


<li>kernel-default-debuginfo-4.12.14-122.212.1</li>


<li>kernel-default-base-debuginfo-4.12.14-122.212.1</li>


<li>dlm-kmp-default-debuginfo-4.12.14-122.212.1</li>


<li>gfs2-kmp-default-4.12.14-122.212.1</li>


<li>gfs2-kmp-default-debuginfo-4.12.14-122.212.1</li>


<li>kernel-default-debugsource-4.12.14-122.212.1</li>


<li>ocfs2-kmp-default-debuginfo-4.12.14-122.212.1</li>


<li>dlm-kmp-default-4.12.14-122.212.1</li>


<li>kernel-default-devel-4.12.14-122.212.1</li>


<li>kernel-default-base-4.12.14-122.212.1</li>

<li>kernel-syms-4.12.14-122.212.1</li>


<li>ocfs2-kmp-default-4.12.14-122.212.1</li>


<li>cluster-md-kmp-default-debuginfo-4.12.14-122.212.1</li>


<li>cluster-md-kmp-default-4.12.14-122.212.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server for SAP Applications 12 SP5
(nosrc ppc64le x86_64)
<ul>


<li>kernel-default-4.12.14-122.212.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server for SAP Applications 12 SP5
(noarch)
<ul>


<li>kernel-source-4.12.14-122.212.1</li>


<li>kernel-macros-4.12.14-122.212.1</li>

<li>kernel-devel-4.12.14-122.212.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server for SAP Applications 12 SP5
(x86_64)
<ul>


<li>kernel-default-devel-debuginfo-4.12.14-122.212.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Availability Extension 12 SP5
(ppc64le s390x x86_64)
<ul>


<li>kernel-default-debuginfo-4.12.14-122.212.1</li>


<li>dlm-kmp-default-debuginfo-4.12.14-122.212.1</li>


<li>gfs2-kmp-default-4.12.14-122.212.1</li>


<li>gfs2-kmp-default-debuginfo-4.12.14-122.212.1</li>


<li>kernel-default-debugsource-4.12.14-122.212.1</li>


<li>ocfs2-kmp-default-debuginfo-4.12.14-122.212.1</li>


<li>dlm-kmp-default-4.12.14-122.212.1</li>


<li>ocfs2-kmp-default-4.12.14-122.212.1</li>


<li>cluster-md-kmp-default-debuginfo-4.12.14-122.212.1</li>


<li>cluster-md-kmp-default-4.12.14-122.212.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Availability Extension 12 SP5
(nosrc)
<ul>


<li>kernel-default-4.12.14-122.212.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
<ul>


<li>kernel-default-4.12.14-122.212.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x
x86_64)
<ul>


<li>kernel-default-debuginfo-4.12.14-122.212.1</li>


<li>kernel-default-debugsource-4.12.14-122.212.1</li>


<li>kgraft-patch-4_12_14-122_212-default-1-8.11.1</li>


<li>kernel-default-kgraft-devel-4.12.14-122.212.1</li>


<li>kernel-default-kgraft-4.12.14-122.212.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Software Development Kit 12 SP5
(noarch nosrc)
<ul>

<li>kernel-docs-4.12.14-122.212.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Software Development Kit 12 SP5
(aarch64 ppc64le s390x x86_64)
<ul>


<li>kernel-obs-build-4.12.14-122.212.1</li>


<li>kernel-obs-build-debugsource-4.12.14-122.212.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Performance Computing 12 SP5
(aarch64 nosrc x86_64)
<ul>


<li>kernel-default-4.12.14-122.212.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing 12 SP5
(aarch64 x86_64)
<ul>


<li>kernel-default-debuginfo-4.12.14-122.212.1</li>


<li>kernel-default-base-debuginfo-4.12.14-122.212.1</li>


<li>kernel-default-debugsource-4.12.14-122.212.1</li>


<li>kernel-default-devel-4.12.14-122.212.1</li>

<li>kernel-syms-4.12.14-122.212.1</li>


<li>kernel-default-base-4.12.14-122.212.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing 12 SP5
(noarch)
<ul>


<li>kernel-source-4.12.14-122.212.1</li>


<li>kernel-macros-4.12.14-122.212.1</li>

<li>kernel-devel-4.12.14-122.212.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing 12 SP5
(x86_64)
<ul>


<li>kernel-default-devel-debuginfo-4.12.14-122.212.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x
x86_64 nosrc)
<ul>


<li>kernel-default-4.12.14-122.212.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x
x86_64)
<ul>


<li>kernel-default-debuginfo-4.12.14-122.212.1</li>


<li>kernel-default-base-debuginfo-4.12.14-122.212.1</li>


<li>kernel-default-debugsource-4.12.14-122.212.1</li>


<li>kernel-default-devel-4.12.14-122.212.1</li>

<li>kernel-syms-4.12.14-122.212.1</li>


<li>kernel-default-base-4.12.14-122.212.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 12 SP5 (noarch)
<ul>


<li>kernel-source-4.12.14-122.212.1</li>


<li>kernel-macros-4.12.14-122.212.1</li>

<li>kernel-devel-4.12.14-122.212.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 12 SP5 (s390x)
<ul>


<li>kernel-default-man-4.12.14-122.212.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 12 SP5 (x86_64)
<ul>


<li>kernel-default-devel-debuginfo-4.12.14-122.212.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Workstation Extension 12 12-SP5
(nosrc)
<ul>


<li>kernel-default-4.12.14-122.212.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Workstation Extension 12 12-SP5
(x86_64)
<ul>


<li>kernel-default-debuginfo-4.12.14-122.212.1</li>


<li>kernel-default-extra-4.12.14-122.212.1</li>


<li>kernel-default-extra-debuginfo-4.12.14-122.212.1</li>


<li>kernel-default-debugsource-4.12.14-122.212.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2019-25160.html">https://www.suse.com/security/cve/CVE-2019-25160.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2020-36312.html">https://www.suse.com/security/cve/CVE-2020-36312.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-23134.html">https://www.suse.com/security/cve/CVE-2021-23134.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46904.html">https://www.suse.com/security/cve/CVE-2021-46904.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46905.html">https://www.suse.com/security/cve/CVE-2021-46905.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46907.html">https://www.suse.com/security/cve/CVE-2021-46907.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46909.html">https://www.suse.com/security/cve/CVE-2021-46909.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46938.html">https://www.suse.com/security/cve/CVE-2021-46938.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46939.html">https://www.suse.com/security/cve/CVE-2021-46939.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46941.html">https://www.suse.com/security/cve/CVE-2021-46941.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46950.html">https://www.suse.com/security/cve/CVE-2021-46950.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46958.html">https://www.suse.com/security/cve/CVE-2021-46958.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46960.html">https://www.suse.com/security/cve/CVE-2021-46960.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46963.html">https://www.suse.com/security/cve/CVE-2021-46963.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46964.html">https://www.suse.com/security/cve/CVE-2021-46964.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46966.html">https://www.suse.com/security/cve/CVE-2021-46966.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46975.html">https://www.suse.com/security/cve/CVE-2021-46975.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46981.html">https://www.suse.com/security/cve/CVE-2021-46981.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46988.html">https://www.suse.com/security/cve/CVE-2021-46988.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46990.html">https://www.suse.com/security/cve/CVE-2021-46990.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46998.html">https://www.suse.com/security/cve/CVE-2021-46998.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47006.html">https://www.suse.com/security/cve/CVE-2021-47006.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47015.html">https://www.suse.com/security/cve/CVE-2021-47015.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47024.html">https://www.suse.com/security/cve/CVE-2021-47024.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47034.html">https://www.suse.com/security/cve/CVE-2021-47034.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47045.html">https://www.suse.com/security/cve/CVE-2021-47045.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47049.html">https://www.suse.com/security/cve/CVE-2021-47049.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47055.html">https://www.suse.com/security/cve/CVE-2021-47055.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47056.html">https://www.suse.com/security/cve/CVE-2021-47056.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47060.html">https://www.suse.com/security/cve/CVE-2021-47060.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47061.html">https://www.suse.com/security/cve/CVE-2021-47061.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47063.html">https://www.suse.com/security/cve/CVE-2021-47063.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47068.html">https://www.suse.com/security/cve/CVE-2021-47068.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47070.html">https://www.suse.com/security/cve/CVE-2021-47070.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47071.html">https://www.suse.com/security/cve/CVE-2021-47071.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47073.html">https://www.suse.com/security/cve/CVE-2021-47073.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47100.html">https://www.suse.com/security/cve/CVE-2021-47100.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47101.html">https://www.suse.com/security/cve/CVE-2021-47101.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47104.html">https://www.suse.com/security/cve/CVE-2021-47104.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47110.html">https://www.suse.com/security/cve/CVE-2021-47110.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47112.html">https://www.suse.com/security/cve/CVE-2021-47112.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47114.html">https://www.suse.com/security/cve/CVE-2021-47114.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47117.html">https://www.suse.com/security/cve/CVE-2021-47117.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47118.html">https://www.suse.com/security/cve/CVE-2021-47118.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47119.html">https://www.suse.com/security/cve/CVE-2021-47119.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47138.html">https://www.suse.com/security/cve/CVE-2021-47138.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47141.html">https://www.suse.com/security/cve/CVE-2021-47141.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47142.html">https://www.suse.com/security/cve/CVE-2021-47142.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47143.html">https://www.suse.com/security/cve/CVE-2021-47143.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47146.html">https://www.suse.com/security/cve/CVE-2021-47146.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47149.html">https://www.suse.com/security/cve/CVE-2021-47149.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47150.html">https://www.suse.com/security/cve/CVE-2021-47150.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47153.html">https://www.suse.com/security/cve/CVE-2021-47153.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47159.html">https://www.suse.com/security/cve/CVE-2021-47159.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47161.html">https://www.suse.com/security/cve/CVE-2021-47161.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47162.html">https://www.suse.com/security/cve/CVE-2021-47162.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47165.html">https://www.suse.com/security/cve/CVE-2021-47165.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47166.html">https://www.suse.com/security/cve/CVE-2021-47166.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47167.html">https://www.suse.com/security/cve/CVE-2021-47167.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47168.html">https://www.suse.com/security/cve/CVE-2021-47168.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47169.html">https://www.suse.com/security/cve/CVE-2021-47169.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47171.html">https://www.suse.com/security/cve/CVE-2021-47171.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47173.html">https://www.suse.com/security/cve/CVE-2021-47173.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47177.html">https://www.suse.com/security/cve/CVE-2021-47177.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47179.html">https://www.suse.com/security/cve/CVE-2021-47179.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47180.html">https://www.suse.com/security/cve/CVE-2021-47180.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47181.html">https://www.suse.com/security/cve/CVE-2021-47181.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47182.html">https://www.suse.com/security/cve/CVE-2021-47182.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47183.html">https://www.suse.com/security/cve/CVE-2021-47183.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47184.html">https://www.suse.com/security/cve/CVE-2021-47184.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47185.html">https://www.suse.com/security/cve/CVE-2021-47185.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47188.html">https://www.suse.com/security/cve/CVE-2021-47188.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47189.html">https://www.suse.com/security/cve/CVE-2021-47189.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47198.html">https://www.suse.com/security/cve/CVE-2021-47198.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47202.html">https://www.suse.com/security/cve/CVE-2021-47202.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47203.html">https://www.suse.com/security/cve/CVE-2021-47203.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47204.html">https://www.suse.com/security/cve/CVE-2021-47204.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47205.html">https://www.suse.com/security/cve/CVE-2021-47205.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47207.html">https://www.suse.com/security/cve/CVE-2021-47207.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47211.html">https://www.suse.com/security/cve/CVE-2021-47211.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47216.html">https://www.suse.com/security/cve/CVE-2021-47216.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47217.html">https://www.suse.com/security/cve/CVE-2021-47217.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-0487.html">https://www.suse.com/security/cve/CVE-2022-0487.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48619.html">https://www.suse.com/security/cve/CVE-2022-48619.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48626.html">https://www.suse.com/security/cve/CVE-2022-48626.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48636.html">https://www.suse.com/security/cve/CVE-2022-48636.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48650.html">https://www.suse.com/security/cve/CVE-2022-48650.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48651.html">https://www.suse.com/security/cve/CVE-2022-48651.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48667.html">https://www.suse.com/security/cve/CVE-2022-48667.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48668.html">https://www.suse.com/security/cve/CVE-2022-48668.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48687.html">https://www.suse.com/security/cve/CVE-2022-48687.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48688.html">https://www.suse.com/security/cve/CVE-2022-48688.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48695.html">https://www.suse.com/security/cve/CVE-2022-48695.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48701.html">https://www.suse.com/security/cve/CVE-2022-48701.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-0160.html">https://www.suse.com/security/cve/CVE-2023-0160.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-28746.html">https://www.suse.com/security/cve/CVE-2023-28746.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-35827.html">https://www.suse.com/security/cve/CVE-2023-35827.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52454.html">https://www.suse.com/security/cve/CVE-2023-52454.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52469.html">https://www.suse.com/security/cve/CVE-2023-52469.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52470.html">https://www.suse.com/security/cve/CVE-2023-52470.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52474.html">https://www.suse.com/security/cve/CVE-2023-52474.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52476.html">https://www.suse.com/security/cve/CVE-2023-52476.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52477.html">https://www.suse.com/security/cve/CVE-2023-52477.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52486.html">https://www.suse.com/security/cve/CVE-2023-52486.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52488.html">https://www.suse.com/security/cve/CVE-2023-52488.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52509.html">https://www.suse.com/security/cve/CVE-2023-52509.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52515.html">https://www.suse.com/security/cve/CVE-2023-52515.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52524.html">https://www.suse.com/security/cve/CVE-2023-52524.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52528.html">https://www.suse.com/security/cve/CVE-2023-52528.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52575.html">https://www.suse.com/security/cve/CVE-2023-52575.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52583.html">https://www.suse.com/security/cve/CVE-2023-52583.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52587.html">https://www.suse.com/security/cve/CVE-2023-52587.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52590.html">https://www.suse.com/security/cve/CVE-2023-52590.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52591.html">https://www.suse.com/security/cve/CVE-2023-52591.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52595.html">https://www.suse.com/security/cve/CVE-2023-52595.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52598.html">https://www.suse.com/security/cve/CVE-2023-52598.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52607.html">https://www.suse.com/security/cve/CVE-2023-52607.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52614.html">https://www.suse.com/security/cve/CVE-2023-52614.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52620.html">https://www.suse.com/security/cve/CVE-2023-52620.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52628.html">https://www.suse.com/security/cve/CVE-2023-52628.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52635.html">https://www.suse.com/security/cve/CVE-2023-52635.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52639.html">https://www.suse.com/security/cve/CVE-2023-52639.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52644.html">https://www.suse.com/security/cve/CVE-2023-52644.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52646.html">https://www.suse.com/security/cve/CVE-2023-52646.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52650.html">https://www.suse.com/security/cve/CVE-2023-52650.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52652.html">https://www.suse.com/security/cve/CVE-2023-52652.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52653.html">https://www.suse.com/security/cve/CVE-2023-52653.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-6270.html">https://www.suse.com/security/cve/CVE-2023-6270.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-6356.html">https://www.suse.com/security/cve/CVE-2023-6356.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-6535.html">https://www.suse.com/security/cve/CVE-2023-6535.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-6536.html">https://www.suse.com/security/cve/CVE-2023-6536.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-7042.html">https://www.suse.com/security/cve/CVE-2023-7042.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-7192.html">https://www.suse.com/security/cve/CVE-2023-7192.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-2201.html">https://www.suse.com/security/cve/CVE-2024-2201.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-22099.html">https://www.suse.com/security/cve/CVE-2024-22099.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-23307.html">https://www.suse.com/security/cve/CVE-2024-23307.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-23848.html">https://www.suse.com/security/cve/CVE-2024-23848.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-24855.html">https://www.suse.com/security/cve/CVE-2024-24855.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-24861.html">https://www.suse.com/security/cve/CVE-2024-24861.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26614.html">https://www.suse.com/security/cve/CVE-2024-26614.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26642.html">https://www.suse.com/security/cve/CVE-2024-26642.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26651.html">https://www.suse.com/security/cve/CVE-2024-26651.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26671.html">https://www.suse.com/security/cve/CVE-2024-26671.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26675.html">https://www.suse.com/security/cve/CVE-2024-26675.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26689.html">https://www.suse.com/security/cve/CVE-2024-26689.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26704.html">https://www.suse.com/security/cve/CVE-2024-26704.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26733.html">https://www.suse.com/security/cve/CVE-2024-26733.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26739.html">https://www.suse.com/security/cve/CVE-2024-26739.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26743.html">https://www.suse.com/security/cve/CVE-2024-26743.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26744.html">https://www.suse.com/security/cve/CVE-2024-26744.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26747.html">https://www.suse.com/security/cve/CVE-2024-26747.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26754.html">https://www.suse.com/security/cve/CVE-2024-26754.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26763.html">https://www.suse.com/security/cve/CVE-2024-26763.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26771.html">https://www.suse.com/security/cve/CVE-2024-26771.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26772.html">https://www.suse.com/security/cve/CVE-2024-26772.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26773.html">https://www.suse.com/security/cve/CVE-2024-26773.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26777.html">https://www.suse.com/security/cve/CVE-2024-26777.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26778.html">https://www.suse.com/security/cve/CVE-2024-26778.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26779.html">https://www.suse.com/security/cve/CVE-2024-26779.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26793.html">https://www.suse.com/security/cve/CVE-2024-26793.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26805.html">https://www.suse.com/security/cve/CVE-2024-26805.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26816.html">https://www.suse.com/security/cve/CVE-2024-26816.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26817.html">https://www.suse.com/security/cve/CVE-2024-26817.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26839.html">https://www.suse.com/security/cve/CVE-2024-26839.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26840.html">https://www.suse.com/security/cve/CVE-2024-26840.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26852.html">https://www.suse.com/security/cve/CVE-2024-26852.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26855.html">https://www.suse.com/security/cve/CVE-2024-26855.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26857.html">https://www.suse.com/security/cve/CVE-2024-26857.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26859.html">https://www.suse.com/security/cve/CVE-2024-26859.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26878.html">https://www.suse.com/security/cve/CVE-2024-26878.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26883.html">https://www.suse.com/security/cve/CVE-2024-26883.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26884.html">https://www.suse.com/security/cve/CVE-2024-26884.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26898.html">https://www.suse.com/security/cve/CVE-2024-26898.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26901.html">https://www.suse.com/security/cve/CVE-2024-26901.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26903.html">https://www.suse.com/security/cve/CVE-2024-26903.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26907.html">https://www.suse.com/security/cve/CVE-2024-26907.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26922.html">https://www.suse.com/security/cve/CVE-2024-26922.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26929.html">https://www.suse.com/security/cve/CVE-2024-26929.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26930.html">https://www.suse.com/security/cve/CVE-2024-26930.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26931.html">https://www.suse.com/security/cve/CVE-2024-26931.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26948.html">https://www.suse.com/security/cve/CVE-2024-26948.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26993.html">https://www.suse.com/security/cve/CVE-2024-26993.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27013.html">https://www.suse.com/security/cve/CVE-2024-27013.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27014.html">https://www.suse.com/security/cve/CVE-2024-27014.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27043.html">https://www.suse.com/security/cve/CVE-2024-27043.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27046.html">https://www.suse.com/security/cve/CVE-2024-27046.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27054.html">https://www.suse.com/security/cve/CVE-2024-27054.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27072.html">https://www.suse.com/security/cve/CVE-2024-27072.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27073.html">https://www.suse.com/security/cve/CVE-2024-27073.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27074.html">https://www.suse.com/security/cve/CVE-2024-27074.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27075.html">https://www.suse.com/security/cve/CVE-2024-27075.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27078.html">https://www.suse.com/security/cve/CVE-2024-27078.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27388.html">https://www.suse.com/security/cve/CVE-2024-27388.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1084332">https://bugzilla.suse.com/show_bug.cgi?id=1084332</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1141539">https://bugzilla.suse.com/show_bug.cgi?id=1141539</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1184509">https://bugzilla.suse.com/show_bug.cgi?id=1184509</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1186060">https://bugzilla.suse.com/show_bug.cgi?id=1186060</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1190317">https://bugzilla.suse.com/show_bug.cgi?id=1190317</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1190576">https://bugzilla.suse.com/show_bug.cgi?id=1190576</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1192145">https://bugzilla.suse.com/show_bug.cgi?id=1192145</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194516">https://bugzilla.suse.com/show_bug.cgi?id=1194516</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1203935">https://bugzilla.suse.com/show_bug.cgi?id=1203935</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209657">https://bugzilla.suse.com/show_bug.cgi?id=1209657</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1211592">https://bugzilla.suse.com/show_bug.cgi?id=1211592</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1212514">https://bugzilla.suse.com/show_bug.cgi?id=1212514</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213456">https://bugzilla.suse.com/show_bug.cgi?id=1213456</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217339">https://bugzilla.suse.com/show_bug.cgi?id=1217339</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217987">https://bugzilla.suse.com/show_bug.cgi?id=1217987</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217988">https://bugzilla.suse.com/show_bug.cgi?id=1217988</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1217989">https://bugzilla.suse.com/show_bug.cgi?id=1217989</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218220">https://bugzilla.suse.com/show_bug.cgi?id=1218220</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218336">https://bugzilla.suse.com/show_bug.cgi?id=1218336</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218479">https://bugzilla.suse.com/show_bug.cgi?id=1218479</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218562">https://bugzilla.suse.com/show_bug.cgi?id=1218562</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219104">https://bugzilla.suse.com/show_bug.cgi?id=1219104</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219169">https://bugzilla.suse.com/show_bug.cgi?id=1219169</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219170">https://bugzilla.suse.com/show_bug.cgi?id=1219170</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219618">https://bugzilla.suse.com/show_bug.cgi?id=1219618</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219623">https://bugzilla.suse.com/show_bug.cgi?id=1219623</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219847">https://bugzilla.suse.com/show_bug.cgi?id=1219847</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220320">https://bugzilla.suse.com/show_bug.cgi?id=1220320</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220366">https://bugzilla.suse.com/show_bug.cgi?id=1220366</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220394">https://bugzilla.suse.com/show_bug.cgi?id=1220394</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220411">https://bugzilla.suse.com/show_bug.cgi?id=1220411</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220416">https://bugzilla.suse.com/show_bug.cgi?id=1220416</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220418">https://bugzilla.suse.com/show_bug.cgi?id=1220418</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220422">https://bugzilla.suse.com/show_bug.cgi?id=1220422</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220442">https://bugzilla.suse.com/show_bug.cgi?id=1220442</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220445">https://bugzilla.suse.com/show_bug.cgi?id=1220445</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220505">https://bugzilla.suse.com/show_bug.cgi?id=1220505</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220521">https://bugzilla.suse.com/show_bug.cgi?id=1220521</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220528">https://bugzilla.suse.com/show_bug.cgi?id=1220528</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220536">https://bugzilla.suse.com/show_bug.cgi?id=1220536</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220538">https://bugzilla.suse.com/show_bug.cgi?id=1220538</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220554">https://bugzilla.suse.com/show_bug.cgi?id=1220554</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220572">https://bugzilla.suse.com/show_bug.cgi?id=1220572</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220580">https://bugzilla.suse.com/show_bug.cgi?id=1220580</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220611">https://bugzilla.suse.com/show_bug.cgi?id=1220611</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220625">https://bugzilla.suse.com/show_bug.cgi?id=1220625</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220628">https://bugzilla.suse.com/show_bug.cgi?id=1220628</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220637">https://bugzilla.suse.com/show_bug.cgi?id=1220637</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220640">https://bugzilla.suse.com/show_bug.cgi?id=1220640</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220662">https://bugzilla.suse.com/show_bug.cgi?id=1220662</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220687">https://bugzilla.suse.com/show_bug.cgi?id=1220687</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220692">https://bugzilla.suse.com/show_bug.cgi?id=1220692</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220703">https://bugzilla.suse.com/show_bug.cgi?id=1220703</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220706">https://bugzilla.suse.com/show_bug.cgi?id=1220706</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220739">https://bugzilla.suse.com/show_bug.cgi?id=1220739</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220742">https://bugzilla.suse.com/show_bug.cgi?id=1220742</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220743">https://bugzilla.suse.com/show_bug.cgi?id=1220743</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220745">https://bugzilla.suse.com/show_bug.cgi?id=1220745</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220751">https://bugzilla.suse.com/show_bug.cgi?id=1220751</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220768">https://bugzilla.suse.com/show_bug.cgi?id=1220768</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220769">https://bugzilla.suse.com/show_bug.cgi?id=1220769</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220777">https://bugzilla.suse.com/show_bug.cgi?id=1220777</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220790">https://bugzilla.suse.com/show_bug.cgi?id=1220790</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220794">https://bugzilla.suse.com/show_bug.cgi?id=1220794</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220829">https://bugzilla.suse.com/show_bug.cgi?id=1220829</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220836">https://bugzilla.suse.com/show_bug.cgi?id=1220836</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220843">https://bugzilla.suse.com/show_bug.cgi?id=1220843</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220846">https://bugzilla.suse.com/show_bug.cgi?id=1220846</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220850">https://bugzilla.suse.com/show_bug.cgi?id=1220850</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220871">https://bugzilla.suse.com/show_bug.cgi?id=1220871</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220927">https://bugzilla.suse.com/show_bug.cgi?id=1220927</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220960">https://bugzilla.suse.com/show_bug.cgi?id=1220960</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220985">https://bugzilla.suse.com/show_bug.cgi?id=1220985</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220987">https://bugzilla.suse.com/show_bug.cgi?id=1220987</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221044">https://bugzilla.suse.com/show_bug.cgi?id=1221044</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221046">https://bugzilla.suse.com/show_bug.cgi?id=1221046</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221048">https://bugzilla.suse.com/show_bug.cgi?id=1221048</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221058">https://bugzilla.suse.com/show_bug.cgi?id=1221058</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221060">https://bugzilla.suse.com/show_bug.cgi?id=1221060</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221061">https://bugzilla.suse.com/show_bug.cgi?id=1221061</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221077">https://bugzilla.suse.com/show_bug.cgi?id=1221077</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221082">https://bugzilla.suse.com/show_bug.cgi?id=1221082</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221088">https://bugzilla.suse.com/show_bug.cgi?id=1221088</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221162">https://bugzilla.suse.com/show_bug.cgi?id=1221162</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221277">https://bugzilla.suse.com/show_bug.cgi?id=1221277</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221293">https://bugzilla.suse.com/show_bug.cgi?id=1221293</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221337">https://bugzilla.suse.com/show_bug.cgi?id=1221337</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221532">https://bugzilla.suse.com/show_bug.cgi?id=1221532</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221541">https://bugzilla.suse.com/show_bug.cgi?id=1221541</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221548">https://bugzilla.suse.com/show_bug.cgi?id=1221548</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221575">https://bugzilla.suse.com/show_bug.cgi?id=1221575</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221605">https://bugzilla.suse.com/show_bug.cgi?id=1221605</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221608">https://bugzilla.suse.com/show_bug.cgi?id=1221608</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221617">https://bugzilla.suse.com/show_bug.cgi?id=1221617</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221791">https://bugzilla.suse.com/show_bug.cgi?id=1221791</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221816">https://bugzilla.suse.com/show_bug.cgi?id=1221816</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221825">https://bugzilla.suse.com/show_bug.cgi?id=1221825</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221830">https://bugzilla.suse.com/show_bug.cgi?id=1221830</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221862">https://bugzilla.suse.com/show_bug.cgi?id=1221862</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221934">https://bugzilla.suse.com/show_bug.cgi?id=1221934</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221949">https://bugzilla.suse.com/show_bug.cgi?id=1221949</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221952">https://bugzilla.suse.com/show_bug.cgi?id=1221952</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221953">https://bugzilla.suse.com/show_bug.cgi?id=1221953</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221965">https://bugzilla.suse.com/show_bug.cgi?id=1221965</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221966">https://bugzilla.suse.com/show_bug.cgi?id=1221966</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221967">https://bugzilla.suse.com/show_bug.cgi?id=1221967</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221969">https://bugzilla.suse.com/show_bug.cgi?id=1221969</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221972">https://bugzilla.suse.com/show_bug.cgi?id=1221972</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221973">https://bugzilla.suse.com/show_bug.cgi?id=1221973</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221977">https://bugzilla.suse.com/show_bug.cgi?id=1221977</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221979">https://bugzilla.suse.com/show_bug.cgi?id=1221979</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221988">https://bugzilla.suse.com/show_bug.cgi?id=1221988</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221991">https://bugzilla.suse.com/show_bug.cgi?id=1221991</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221993">https://bugzilla.suse.com/show_bug.cgi?id=1221993</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221994">https://bugzilla.suse.com/show_bug.cgi?id=1221994</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221997">https://bugzilla.suse.com/show_bug.cgi?id=1221997</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221998">https://bugzilla.suse.com/show_bug.cgi?id=1221998</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221999">https://bugzilla.suse.com/show_bug.cgi?id=1221999</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222000">https://bugzilla.suse.com/show_bug.cgi?id=1222000</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222001">https://bugzilla.suse.com/show_bug.cgi?id=1222001</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222002">https://bugzilla.suse.com/show_bug.cgi?id=1222002</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222117">https://bugzilla.suse.com/show_bug.cgi?id=1222117</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222294">https://bugzilla.suse.com/show_bug.cgi?id=1222294</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222300">https://bugzilla.suse.com/show_bug.cgi?id=1222300</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222357">https://bugzilla.suse.com/show_bug.cgi?id=1222357</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222379">https://bugzilla.suse.com/show_bug.cgi?id=1222379</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222422">https://bugzilla.suse.com/show_bug.cgi?id=1222422</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222428">https://bugzilla.suse.com/show_bug.cgi?id=1222428</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222449">https://bugzilla.suse.com/show_bug.cgi?id=1222449</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222503">https://bugzilla.suse.com/show_bug.cgi?id=1222503</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222559">https://bugzilla.suse.com/show_bug.cgi?id=1222559</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222585">https://bugzilla.suse.com/show_bug.cgi?id=1222585</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222609">https://bugzilla.suse.com/show_bug.cgi?id=1222609</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222610">https://bugzilla.suse.com/show_bug.cgi?id=1222610</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222613">https://bugzilla.suse.com/show_bug.cgi?id=1222613</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222618">https://bugzilla.suse.com/show_bug.cgi?id=1222618</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222619">https://bugzilla.suse.com/show_bug.cgi?id=1222619</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222624">https://bugzilla.suse.com/show_bug.cgi?id=1222624</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222630">https://bugzilla.suse.com/show_bug.cgi?id=1222630</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222632">https://bugzilla.suse.com/show_bug.cgi?id=1222632</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222660">https://bugzilla.suse.com/show_bug.cgi?id=1222660</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222662">https://bugzilla.suse.com/show_bug.cgi?id=1222662</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222664">https://bugzilla.suse.com/show_bug.cgi?id=1222664</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222666">https://bugzilla.suse.com/show_bug.cgi?id=1222666</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222669">https://bugzilla.suse.com/show_bug.cgi?id=1222669</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222671">https://bugzilla.suse.com/show_bug.cgi?id=1222671</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222677">https://bugzilla.suse.com/show_bug.cgi?id=1222677</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222706">https://bugzilla.suse.com/show_bug.cgi?id=1222706</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222720">https://bugzilla.suse.com/show_bug.cgi?id=1222720</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222765">https://bugzilla.suse.com/show_bug.cgi?id=1222765</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222770">https://bugzilla.suse.com/show_bug.cgi?id=1222770</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222772">https://bugzilla.suse.com/show_bug.cgi?id=1222772</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222787">https://bugzilla.suse.com/show_bug.cgi?id=1222787</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222790">https://bugzilla.suse.com/show_bug.cgi?id=1222790</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222812">https://bugzilla.suse.com/show_bug.cgi?id=1222812</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222836">https://bugzilla.suse.com/show_bug.cgi?id=1222836</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222869">https://bugzilla.suse.com/show_bug.cgi?id=1222869</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222876">https://bugzilla.suse.com/show_bug.cgi?id=1222876</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222878">https://bugzilla.suse.com/show_bug.cgi?id=1222878</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222881">https://bugzilla.suse.com/show_bug.cgi?id=1222881</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222883">https://bugzilla.suse.com/show_bug.cgi?id=1222883</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222888">https://bugzilla.suse.com/show_bug.cgi?id=1222888</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222952">https://bugzilla.suse.com/show_bug.cgi?id=1222952</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222961">https://bugzilla.suse.com/show_bug.cgi?id=1222961</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222975">https://bugzilla.suse.com/show_bug.cgi?id=1222975</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222976">https://bugzilla.suse.com/show_bug.cgi?id=1222976</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223016">https://bugzilla.suse.com/show_bug.cgi?id=1223016</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223035">https://bugzilla.suse.com/show_bug.cgi?id=1223035</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223049">https://bugzilla.suse.com/show_bug.cgi?id=1223049</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223051">https://bugzilla.suse.com/show_bug.cgi?id=1223051</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223057">https://bugzilla.suse.com/show_bug.cgi?id=1223057</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223058">https://bugzilla.suse.com/show_bug.cgi?id=1223058</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223060">https://bugzilla.suse.com/show_bug.cgi?id=1223060</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223187">https://bugzilla.suse.com/show_bug.cgi?id=1223187</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223189">https://bugzilla.suse.com/show_bug.cgi?id=1223189</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223198">https://bugzilla.suse.com/show_bug.cgi?id=1223198</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223203">https://bugzilla.suse.com/show_bug.cgi?id=1223203</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223315">https://bugzilla.suse.com/show_bug.cgi?id=1223315</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223432">https://bugzilla.suse.com/show_bug.cgi?id=1223432</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223509">https://bugzilla.suse.com/show_bug.cgi?id=1223509</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223512">https://bugzilla.suse.com/show_bug.cgi?id=1223512</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223513">https://bugzilla.suse.com/show_bug.cgi?id=1223513</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223516">https://bugzilla.suse.com/show_bug.cgi?id=1223516</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223518">https://bugzilla.suse.com/show_bug.cgi?id=1223518</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223626">https://bugzilla.suse.com/show_bug.cgi?id=1223626</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223627">https://bugzilla.suse.com/show_bug.cgi?id=1223627</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223664">https://bugzilla.suse.com/show_bug.cgi?id=1223664</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223686">https://bugzilla.suse.com/show_bug.cgi?id=1223686</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223693">https://bugzilla.suse.com/show_bug.cgi?id=1223693</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223712">https://bugzilla.suse.com/show_bug.cgi?id=1223712</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223715">https://bugzilla.suse.com/show_bug.cgi?id=1223715</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223735">https://bugzilla.suse.com/show_bug.cgi?id=1223735</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223744">https://bugzilla.suse.com/show_bug.cgi?id=1223744</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223745">https://bugzilla.suse.com/show_bug.cgi?id=1223745</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223770">https://bugzilla.suse.com/show_bug.cgi?id=1223770</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223781">https://bugzilla.suse.com/show_bug.cgi?id=1223781</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223819">https://bugzilla.suse.com/show_bug.cgi?id=1223819</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223824">https://bugzilla.suse.com/show_bug.cgi?id=1223824</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223827">https://bugzilla.suse.com/show_bug.cgi?id=1223827</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223837">https://bugzilla.suse.com/show_bug.cgi?id=1223837</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223842">https://bugzilla.suse.com/show_bug.cgi?id=1223842</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223843">https://bugzilla.suse.com/show_bug.cgi?id=1223843</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223844">https://bugzilla.suse.com/show_bug.cgi?id=1223844</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223883">https://bugzilla.suse.com/show_bug.cgi?id=1223883</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223885">https://bugzilla.suse.com/show_bug.cgi?id=1223885</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223921">https://bugzilla.suse.com/show_bug.cgi?id=1223921</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223941">https://bugzilla.suse.com/show_bug.cgi?id=1223941</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223952">https://bugzilla.suse.com/show_bug.cgi?id=1223952</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223953">https://bugzilla.suse.com/show_bug.cgi?id=1223953</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223954">https://bugzilla.suse.com/show_bug.cgi?id=1223954</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-5759">https://jira.suse.com/browse/PED-5759</a>
</li>


</ul>

</div>

--===============0473165190877057127==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung