drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Linux
Name: |
Mehrere Probleme in Linux |
|
ID: |
SUSE-SU-2024:2184-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE Linux Enterprise Live Patching 12-SP5, SUSE Linux Enterprise Server 12 SP5, SUSE Linux Enterprise High Performance Computing 12 SP5, SUSE Linux Enterprise Server for SAP Applications 12 SP5, SUSE Linux Enterprise High Availability Extension 12 SP5, SUSE Linux Enterprise Software Development Kit 12 SP5, SUSE Linux Enterprise Workstation Extension 12 12-SP5 |
|
Datum: |
Mo, 24. Juni 2024, 23:15 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26915
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52759
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47424
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47314
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47548
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47473
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47496
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26929
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47281
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47356
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52875
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27419
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47431
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47460
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47400
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47355
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35936
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47320
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52732
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47277
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47409
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47307
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52865
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47353
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35969
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47334
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35877
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47416
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47345
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35811
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48697
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35791
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47239
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47321
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47237
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47382
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47495
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47523
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47280
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26775
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52867
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48708
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35895
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47401
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47324
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47315
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47337
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52774
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47383
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47369
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52703
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47347
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47252
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27401
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47511
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47260
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48672
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47375
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26876
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48704 |
|
Applikationen: |
Linux |
|
Originalnachricht |
--===============2255928255857657655== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:2184-1 Rating: important References:
* bsc#1065729 * bsc#1101816 * bsc#1141539 * bsc#1181674 * bsc#1185902 * bsc#1187716 * bsc#1188616 * bsc#1190317 * bsc#1190795 * bsc#1191452 * bsc#1194591 * bsc#1197760 * bsc#1197894 * bsc#1203935 * bsc#1206213 * bsc#1206646 * bsc#1207186 * bsc#1209657 * bsc#1210335 * bsc#1215702 * bsc#1216702 * bsc#1217169 * bsc#1217519 * bsc#1218917 * bsc#1220487 * bsc#1220513 * bsc#1220854 * bsc#1220928 * bsc#1221044 * bsc#1221081 * bsc#1221086 * bsc#1221543 * bsc#1221545 * bsc#1221816 * bsc#1221977 * bsc#1221994 * bsc#1222559 * bsc#1222619 * bsc#1222627 * bsc#1222667 * bsc#1222671 * bsc#1222793 * bsc#1222893 * bsc#1222894 * bsc#1223023 * bsc#1223046 * bsc#1223048 * bsc#1223062 * bsc#1223084 * bsc#1223119 * bsc#1223138 * bsc#1223207 * bsc#1223360 * bsc#1223384 * bsc#1223432 * bsc#1223509 * bsc#1223512 * bsc#1223539 * bsc#1223540 * bsc#1223626 * bsc#1223627 * bsc#1223633 * bsc#1223653 * bsc#1223666 * bsc#1223671 * bsc#1223712 * bsc#1223715 * bsc#1223738 * bsc#1223744 * bsc#1223752 * bsc#1223802 * bsc#1223819 * bsc#1223834 * bsc#1223922 * bsc#1223923 * bsc#1223931 * bsc#1223932 * bsc#1223948 * bsc#1223969 * bsc#1224096 * bsc#1224174 * bsc#1224181 * bsc#1224347 * bsc#1224482 * bsc#1224511 * bsc#1224525 * bsc#1224566 * bsc#1224580 * bsc#1224592 * bsc#1224601 * bsc#1224607 * bsc#1224621 * bsc#1224644 * bsc#1224645 * bsc#1224648 * bsc#1224650 * bsc#1224663 * bsc#1224671 * bsc#1224676 * bsc#1224680 * bsc#1224682 * bsc#1224725 * bsc#1224728 * bsc#1224733 * bsc#1224738 * bsc#1224747 * bsc#1224749 * bsc#1224759 * bsc#1224803 * bsc#1224827 * bsc#1224830 * bsc#1224831 * bsc#1224834 * bsc#1224838 * bsc#1224841 * bsc#1224844 * bsc#1224846 * bsc#1224847 * bsc#1224849 * bsc#1224854 * bsc#1224859 * bsc#1224867 * bsc#1224880 * bsc#1224882 * bsc#1224888 * bsc#1224889 * bsc#1224892 * bsc#1224893 * bsc#1224899 * bsc#1224904 * bsc#1224907 * bsc#1224916 * bsc#1224917 * bsc#1224922 * bsc#1224926 * bsc#1224930 * bsc#1224931 * bsc#1224942 * bsc#1224954 * bsc#1224956 * bsc#1224957 * bsc#1224959 * bsc#1224960 * bsc#1224961 * bsc#1224963 * bsc#1224966 * bsc#1224968 * bsc#1224981 * bsc#1224982 * bsc#1224983 * bsc#1224987 * bsc#1224990 * bsc#1224996 * bsc#1225008 * bsc#1225009 * bsc#1225010 * bsc#1225022 * bsc#1225026 * bsc#1225030 * bsc#1225054 * bsc#1225058 * bsc#1225059 * bsc#1225060 * bsc#1225062 * bsc#1225082 * bsc#1225084 * bsc#1225086 * bsc#1225092 * bsc#1225096 * bsc#1225112 * bsc#1225124 * bsc#1225128 * bsc#1225132 * bsc#1225141 * bsc#1225143 * bsc#1225144 * bsc#1225151 * bsc#1225153 * bsc#1225155 * bsc#1225157 * bsc#1225164 * bsc#1225177 * bsc#1225189 * bsc#1225192 * bsc#1225193 * bsc#1225198 * bsc#1225201 * bsc#1225207 * bsc#1225208 * bsc#1225222 * bsc#1225230 * bsc#1225242 * bsc#1225244 * bsc#1225247 * bsc#1225251 * bsc#1225252 * bsc#1225256 * bsc#1225303 * bsc#1225318 * bsc#1225322 * bsc#1225329 * bsc#1225330 * bsc#1225336 * bsc#1225347 * bsc#1225351 * bsc#1225354 * bsc#1225355 * bsc#1225360 * bsc#1225366 * bsc#1225367 * bsc#1225384 * bsc#1225390 * bsc#1225404 * bsc#1225409 * bsc#1225411 * bsc#1225438 * bsc#1225453 * bsc#1225479 * bsc#1225482 * bsc#1225506 * bsc#1225549 * bsc#1225560 * bsc#1225572 * bsc#1225640 * bsc#1225708 * bsc#1225764
Cross-References:
* CVE-2021-46933 * CVE-2021-46955 * CVE-2021-47074 * CVE-2021-47113 * CVE-2021-47131 * CVE-2021-47162 * CVE-2021-47171 * CVE-2021-47188 * CVE-2021-47206 * CVE-2021-47220 * CVE-2021-47229 * CVE-2021-47231 * CVE-2021-47235 * CVE-2021-47236 * CVE-2021-47237 * CVE-2021-47238 * CVE-2021-47239 * CVE-2021-47245 * CVE-2021-47246 * CVE-2021-47248 * CVE-2021-47249 * CVE-2021-47250 * CVE-2021-47252 * CVE-2021-47254 * CVE-2021-47258 * CVE-2021-47260 * CVE-2021-47261 * CVE-2021-47265 * CVE-2021-47269 * CVE-2021-47274 * CVE-2021-47276 * CVE-2021-47277 * CVE-2021-47280 * CVE-2021-47281 * CVE-2021-47284 * CVE-2021-47285 * CVE-2021-47288 * CVE-2021-47301 * CVE-2021-47302 * CVE-2021-47305 * CVE-2021-47307 * CVE-2021-47308 * CVE-2021-47310 * CVE-2021-47311 * CVE-2021-47314 * CVE-2021-47315 * CVE-2021-47319 * CVE-2021-47320 * CVE-2021-47321 * CVE-2021-47323 * CVE-2021-47324 * CVE-2021-47330 * CVE-2021-47334 * CVE-2021-47337 * CVE-2021-47343 * CVE-2021-47344 * CVE-2021-47345 * CVE-2021-47347 * CVE-2021-47352 * CVE-2021-47353 * CVE-2021-47355 * CVE-2021-47356 * CVE-2021-47357 * CVE-2021-47361 * CVE-2021-47362 * CVE-2021-47369 * CVE-2021-47375 * CVE-2021-47378 * CVE-2021-47382 * CVE-2021-47383 * CVE-2021-47391 * CVE-2021-47397 * CVE-2021-47400 * CVE-2021-47401 * CVE-2021-47404 * CVE-2021-47409 * CVE-2021-47416 * CVE-2021-47423 * CVE-2021-47424 * CVE-2021-47431 * CVE-2021-47435 * CVE-2021-47436 * CVE-2021-47456 * CVE-2021-47458 * CVE-2021-47460 * CVE-2021-47469 * CVE-2021-47472 * CVE-2021-47473 * CVE-2021-47478 * CVE-2021-47480 * CVE-2021-47483 * CVE-2021-47485 * CVE-2021-47495 * CVE-2021-47496 * CVE-2021-47497 * CVE-2021-47500 * CVE-2021-47506 * CVE-2021-47509 * CVE-2021-47511 * CVE-2021-47523 * CVE-2021-47541 * CVE-2021-47548 * CVE-2021-47565 * CVE-2022-48636 * CVE-2022-48650 * CVE-2022-48672 * CVE-2022-48686 * CVE-2022-48697 * CVE-2022-48702 * CVE-2022-48704 * CVE-2022-48708 * CVE-2022-48710 * CVE-2023-0160 * CVE-2023-1829 * CVE-2023-42755 * CVE-2023-47233 * CVE-2023-52527 * CVE-2023-52586 * CVE-2023-52591 * CVE-2023-52646 * CVE-2023-52653 * CVE-2023-52655 * CVE-2023-52664 * CVE-2023-52685 * CVE-2023-52686 * CVE-2023-52691 * CVE-2023-52696 * CVE-2023-52698 * CVE-2023-52703 * CVE-2023-52730 * CVE-2023-52732 * CVE-2023-52741 * CVE-2023-52742 * CVE-2023-52747 * CVE-2023-52759 * CVE-2023-52774 * CVE-2023-52781 * CVE-2023-52796 * CVE-2023-52803 * CVE-2023-52821 * CVE-2023-52864 * CVE-2023-52865 * CVE-2023-52867 * CVE-2023-52875 * CVE-2023-52880 * CVE-2024-0639 * CVE-2024-26625 * CVE-2024-26739 * CVE-2024-26752 * CVE-2024-26775 * CVE-2024-26791 * CVE-2024-26828 * CVE-2024-26846 * CVE-2024-26874 * CVE-2024-26876 * CVE-2024-26900 * CVE-2024-26915 * CVE-2024-26920 * CVE-2024-26921 * CVE-2024-26929 * CVE-2024-26930 * CVE-2024-26931 * CVE-2024-26934 * CVE-2024-26957 * CVE-2024-26958 * CVE-2024-26984 * CVE-2024-26996 * CVE-2024-27008 * CVE-2024-27054 * CVE-2024-27059 * CVE-2024-27062 * CVE-2024-27388 * CVE-2024-27396 * CVE-2024-27398 * CVE-2024-27401 * CVE-2024-27419 * CVE-2024-27436 * CVE-2024-35789 * CVE-2024-35791 * CVE-2024-35809 * CVE-2024-35811 * CVE-2024-35830 * CVE-2024-35849 * CVE-2024-35877 * CVE-2024-35878 * CVE-2024-35887 * CVE-2024-35895 * CVE-2024-35914 * CVE-2024-35932 * CVE-2024-35935 * CVE-2024-35936 * CVE-2024-35944 * CVE-2024-35955 * CVE-2024-35969 * CVE-2024-35982 * CVE-2024-36015 * CVE-2024-36029 * CVE-2024-36954
CVSS scores:
* CVE-2021-46933 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2021-46933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47074 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47131 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47220 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47236 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47237 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47246 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47248 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47249 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47250 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47252 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2021-47254 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47258 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47260 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47261 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47288 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2021-47301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47302 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47311 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47314 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47315 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47319 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47320 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47321 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47323 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47324 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47330 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47334 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47337 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47343 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2021-47344 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47345 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47347 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47352 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2021-47353 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47355 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47356 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47357 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47361 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47362 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47369 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47375 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47382 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47401 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47404 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47423 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47469 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47472 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47473 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47480 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47496 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47497 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47506 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47523 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47541 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47548 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2021-47565 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48672 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-48672 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48686 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48686 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48697 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2022-48702 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2022-48704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48708 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42755 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2023-42755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52527 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52586 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52703 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-52730 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52747 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52781 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52803 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52865 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52867 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52875 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0639 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26752 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-26775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26846 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26996 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27008 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-27054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27401 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27419 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-27436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35789 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35809 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35944 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-35955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* SUSE Linux Enterprise High Availability Extension 12 SP5 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 * SUSE Linux Enterprise Workstation Extension 12 12-SP5
An update that solves 198 vulnerabilities and has 28 security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
* CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487). * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220513). * CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854). * CVE-2021-47113: Abort btrfs rename_exchange if we fail to insert the second ref (bsc#1221543). * CVE-2021-47131: Fixed a use-after-free after the TLS device goes down and up (bsc#1221545). * CVE-2021-47206: Check return value after calling platform_get_resource() (bsc#1222894). * CVE-2021-47238: Fixed memory leak in ip_mc_add1_src (bsc#1224847) * CVE-2021-47245: Fixed out of bounds when parsing TCP options (bsc#1224838) * CVE-2021-47246: Fixed page reclaim for dead peer hairpin (CVE-2021-47246 bsc#1224831). * CVE-2021-47249: Fixed memory leak in rds_recvmsg (bsc#1224880) * CVE-2021-47250: Fixed memory leak in netlbl_cipsov4_add_std (bsc#1224827) * CVE-2021-47265: Verify port when creating flow rule (bsc#1224957) * CVE-2021-47277: Avoid speculation-based attacks from out-of-range memslot accesses (bsc#1224960). * CVE-2021-47281: Fixed race of snd_seq_timer_open() (bsc#1224983). * CVE-2021-47334: Fixed two use after free in ibmasm_init_one (bsc#1225112). * CVE-2021-47352: Add validation for used length (bsc#1225124). * CVE-2021-47355: Fixed possible use-after-free in nicstar_cleanup() (bsc#1225141). * CVE-2021-47357: Fixed possible use-after-free in ia_module_exit() (bsc#1225144). * CVE-2021-47361: Fixed error handling in mcb_alloc_bus() (bsc#1225151). * CVE-2021-47362: Update intermediate power state for SI (bsc#1225153). * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201). * CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225208). * CVE-2021-47397: Break out if skb_header_pointer returns NULL in sctp_rcv_ootb (bsc#1225082) * CVE-2021-47401: Fixed stack information leak (bsc#1225242). * CVE-2021-47423: Fixed file release memory leak (bsc#1225366). * CVE-2021-47431: Fixed gart.bo pin_count leak (bsc#1225390). * CVE-2021-47469: Add SPI fix commit to be ignored (bsc#1225347) * CVE-2021-47483: Fixed possible double-free in regcache_rbtree_exit() (bsc#1224907). * CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354) * CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355). * CVE-2021-47500: Fixed trigger reference couting (bsc#1225360). * CVE-2021-47509: Limit the period size to 16MB (bsc#1225409). * CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411). * CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506) * CVE-2022-48672: Fixed off-by-one error in unflatten_dt_nodes() (CVE-2022-48672 bsc#1223931). * CVE-2022-48686: Fixed UAF when detecting digest errors (bsc#1223948). * CVE-2022-48697: Fixed a use-after-free (bsc#1223922). * CVE-2022-48702: Fixed out of bounds access in snd_emu10k1_pcm_channel_alloc() (bsc#1223923). * CVE-2022-48704: Add a force flush to delay work when radeon (bsc#1223932) * CVE-2022-48708: Fixed potential NULL dereference (bsc#1224942). * CVE-2022-48710: Fixed a possible null pointer dereference (bsc#1225230). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335). * CVE-2023-42755: Check user supplied offsets (bsc#1215702). * CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081). * CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169). * CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747). * CVE-2023-52691: Fixed a double-free in si_dpm_init (bsc#1224607). * CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621) * CVE-2023-52730: Fixed possible resource leaks in some error paths (bsc#1224956). * CVE-2023-52732: Blocklist the kclient when receiving corrupted snap trace (bsc#1225222). * CVE-2023-52747: Restore allocated resources on failed copyout (bsc#1224931) * CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930). * CVE-2023-52821: Fixed a possible null pointer dereference (bsc#1225022). * CVE-2023-52864: Fixed opening of char device (bsc#1225132). * CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086). * CVE-2023-52867: Fixed possible buffer overflow (bsc#1225009). * CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096). * CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917). * CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086) * CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627). * CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793) * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084). * CVE-2024-26846: Do not wait in vain when unloading module (bsc#1223023). * CVE-2024-26874: Fixed a null pointer crash in (bsc#1223048) * CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119). * CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046). * CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207) * CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138). * CVE-2024-26957: Fixed reference counting on zcrypt card objects (bsc#1223666). * CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653). * CVE-2024-26984: Fixed instmem race condition around ptr stores (bsc#1223633) * CVE-2024-26996: Fixed UAF ncm object at re-bind after usb ep transport error (bsc#1223752). * CVE-2024-27008: Fixed out of bounds access (CVE-2024-27008 bsc#1223802). * CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834). * CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174). * CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181). * CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759) * CVE-2024-27436: Stop parsing channels bits when all channels are found (bsc#1224803). * CVE-2024-35789: Check fast rx for non-4addr sta VLAN changes (bsc#1224749). * CVE-2024-35791: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (bsc#1224725). * CVE-2024-35809: Drain runtime-idle callbacks before driver removal (bsc#1224738). * CVE-2024-35830: Register v4l2 async device only after successful setup (bsc#1224680). * CVE-2024-35849: Fixed information leak in btrfs_ioctl_logical_to_ino() (bsc#1224733). * CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525). * CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671). * CVE-2024-35887: Fixed use-after-free bugs caused by ax25_ds_del_timer (bsc#1224663) * CVE-2024-35932: Do not check if plane->state->fb == state->fb (bsc#1224650). * CVE-2024-35935: Handle path ref underflow in header iterate_inode_ref() (bsc#1224645) * CVE-2024-35936: Add missing mutex_unlock in btrfs_relocate_sys_chunks() (bsc#1224644) * CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648). * CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580). * CVE-2024-35982: Avoid infinite loop trying to resize local TT (bsc#1224566) * CVE-2024-36029: Prevent access to suspended controller (bsc#1225708)
The following non-security bugs were fixed:
* af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384). * af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384). * af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384). * ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes). * assoc_array: Fix BUG_ON during garbage collect. * autofs: fix a leak in autofs_expire_indirect() (git-fixes) * Bluetooth: btusb: Some Qualcomm Bluetooth adapters stop working (git-fixes). * btrfs: avoid null pointer dereference on fs_info when calling btrfs_crit (git-fixes) * btrfs: check if root is readonly while setting security xattr (git-fixes) * btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (git-fixes) * btrfs: do not get an EINTR during drop_snapshot for reloc (git-fixes) * btrfs: do not stop integrity writeback too early (git-fixes) * btrfs: Explicitly handle btrfs_update_root failure (git-fixes) * btrfs: fail mount when sb flag is not in BTRFS_SUPER_FLAG_SUPP (git-fixes) * btrfs: fix btrfs_prev_leaf() to not return the same key twice (git-fixes) * btrfs: fix deadlock when writing out space cache (git-fixes) * Btrfs: fix incorrect {node,sector}size endianness from BTRFS_IOC_FS_INFO (git-fixes) * btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes) * btrfs: fix lost error handling when looking up extended ref on log replay (git-fixes) * btrfs: Fix NULL pointer exception in find_bio_stripe (git-fixes) * btrfs: Fix out of bounds access in btrfs_search_slot (git-fixes) * btrfs: fix race when deleting quota root from the dirty cow roots list (git- fixes) * btrfs: fix range_end calculation in extent_write_locked_range (git-fixes) * btrfs: fix return value mixup in btrfs_get_extent (git-fixes) * btrfs: fix unaligned access in readdir (git-fixes) * btrfs: limit device extents to the device size (git-fixes) * btrfs: prevent to set invalid default subvolid (git-fixes) * btrfs: record delayed inode root in transaction (git-fixes) * btrfs: scrub: reject unsupported scrub flags (git-fixes) * btrfs: send: ensure send_fd is writable (git-fixes) * btrfs: send: in case of IO error log it (git-fixes) * btrfs: send: limit number of clones and allocated memory size (git-fixes) * btrfs: sysfs: use NOFS for device creation (git-fixes) Adjustment: add #include * btrfs: tree-checker: add missing return after error in root_item (git-fixes) * btrfs: tree-checker: add missing returns after data_ref alignment checks (git-fixes) * btrfs: tree-checker: do not error out if extent ref hash does not match (git-fixes) * btrfs: tree-checker: fix inline ref size in error messages (git-fixes) * btrfs: tree-checker: Fix misleading group system information (git-fixes) * btrfs: undo writable superblocke when sprouting fails (git-fixes) * btrfs: validate qgroup inherit for SNAP_CREATE_V2 ioctl (git-fixes) * ecryptfs: fix a memory leak bug in ecryptfs_init_messaging() (git-fixes) * ecryptfs: fix a memory leak bug in parse_tag_1_packet() (git-fixes) * ecryptfs: fix kernel panic with null dev_name (git-fixes) * ecryptfs: Fix typo in message (git-fixes) * ep_create_wakeup_source(): dentry name can change under you (git-fixes) * exportfs_decode_fh(): negative pinned may become positive without the parent locked (git-fixes) * fscrypt: clean up some BUG_ON()s in block encryption/decryption (git-fixes) * fs/proc/proc_sysctl.c: fix the default values of i_uid/i_gid on /proc/sys inodes (git-fixes) * ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() (git- fixes). * ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() (git- fixes). * kprobes: Fix possible use-after-free issue on kprobe registration (git- fixes). * KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1225059). * l2tp: pass correct message length to ip6_append_data (git-fixes). * lib/mpi: use kcalloc in mpi_resize (git-fixes). * list: fix a data-race around ep->rdllist (git-fixes). * livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539). * mass-cve: Add convenience KBUILD_USER environment variable * mass-cve: Always use bash in Makefile Some constrcts are just too convenient to leave them in favor of POSIX'd /bin/sh. Switch to explicit bash. * mass-cve: Fail early without data files curl >$@ would create/update the file even if download fails. Use explicit argument to prevent continuation with empty cve2bugzilla file. * mass-cve: Fix update detection with packed-refs Per-branch files are thing of the past, git may non-deterministically pack the ref files. Therefore use the timestamp of the whole packed-ref file (better false positive detection of update than breakage or false negative). Add unified approach to read packed-refs regardless of KSOURCE_GIT worktree or not. * mass-cve: Make BRANCH mandatory * mass-cve: Use dedicated worktree for reference updates So that any checkout in KSOURCE_GIT is not changed. * net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes). * netfilter: nf_queue: augment nfqa_cfg_policy (git-fixes). * netfilter: nft_compat: explicitly reject ERROR and standard target (git- fixes). * netfilter: x_tables: set module owner for icmp(6) matches (git-fixes). * net/smc: fix fallback failed while sendmsg with fastopen (git-fixes). * net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes). * net/tls: Remove the context from the list in tls_device_down (bsc#1221545). * net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes). * net: usb: smsc95xx: stop lying about skb->truesize (git-fixes). * net: usb: sr9700: stop lying about skb->truesize (git-fixes). * net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360). * nfc: change order inside nfc_se_io error path (git-fixes). * powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes). * ppdev: Add an error check in register_device (git-fixes). * printk: Disable passing console lock owner completely during panic() (bsc#1197894). * printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1223969). * rds: avoid unenecessary cong_update in loop transport (git-fixes). * rds: ib: Fix missing call to rds_ib_dev_put in rds_ib_setup_qp (git-fixes). * ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes). * ring-buffer: Fix a race between readers and resize checks (bsc#1222893). * rxrpc: Do not put crypto buffers on the stack (git-fixes). * rxrpc: Fix a memory leak in rxkad_verify_response() (git-fixes). * rxrpc: Provide a different lockdep key for call->user_mutex for kernel calls (git-fixes). * rxrpc: The mutex lock returned by rxrpc_accept_call() needs releasing (git- fixes). * rxrpc: Work around usercopy check (git-fixes). * s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224347). * s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1225062). * scripts/check-kernel-fix: add -F parameter * scripts/check-kernel-fix: avoid rechecking child branches when parents are OK Topological sorted dependency tree allows to optimize check-kernel-fixe in cases where parent already has the fix. There is not reason to check branches which merge from that branch as they will get the fix eventually. * scripts/check-kernel-fix: print a message when no action is needed. Script exits without printing anything about the actions necessary in non-verbose mode. This can be confusing to a beginner user. * scripts/common-functions: for_each_build_branch traverse branches in dependency topo sorted list * scripts/common-functions: There are cases where Fixes tag is incorrect. Example would be bsc1223062 comment 3. * scripts/cve_tools: Update README Issue was fixed in ad3235427c3 * scripts/git_sort/git_sort.py: add rafael/linux-pm.git#linux-next to remotes * scripts/log2: Fix References: update detection The following change -REferences: git-fixes +REferences: git-fixes bsc#123456 (note the typo in E) will not be detected as a reference update and generates a commit message like * scripts/PMU: Always use 12 digits for abbreviated hash references Kernel developers tend to use 12 digits for abbreviated hash references as this is mandatory for upstream work. Enforce this count in PMU for consistency. * tcp: tcp_make_synack() can be called from process context (git-fixes). * tls: Fix context leak on tls_device_down (bsc#1221545). * tracing: Fix blocked reader of snapshot buffer (git-fixes). * tracing: hide unused ftrace_event_id_fops (git-fixes). * tracing: Use .flush() call to wake up readers (git-fixes). * tracing: Use strncpy instead of memcpy when copying comm in trace.c (git- fixes). * tty/sysrq: replace smp_processor_id() with get_cpu() (bsc#1223540). * usb: aqc111: stop lying about skb->truesize (git-fixes). * wifi: cfg80211: avoid leaking stack data into trace (git-fixes). * wifi: radiotap: fix kernel-doc notation warnings (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-2184=1 SUSE-SLE- SERVER-12-SP5-2024-2184=1
* SUSE Linux Enterprise High Availability Extension 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-2184=1
* SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-2184=1
* SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-2184=1
* SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2184=1
* SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2184=1
* SUSE Linux Enterprise Workstation Extension 12 12-SP5 zypper in -t patch SUSE-SLE-WE-12-SP5-2024-2184=1
## Package List:
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * kernel-default-base-debuginfo-4.12.14-122.219.1 * kernel-default-base-4.12.14-122.219.1 * ocfs2-kmp-default-4.12.14-122.219.1 * gfs2-kmp-default-debuginfo-4.12.14-122.219.1 * dlm-kmp-default-debuginfo-4.12.14-122.219.1 * kernel-syms-4.12.14-122.219.1 * cluster-md-kmp-default-4.12.14-122.219.1 * kernel-default-debugsource-4.12.14-122.219.1 * dlm-kmp-default-4.12.14-122.219.1 * kernel-default-devel-4.12.14-122.219.1 * cluster-md-kmp-default-debuginfo-4.12.14-122.219.1 * ocfs2-kmp-default-debuginfo-4.12.14-122.219.1 * kernel-default-debuginfo-4.12.14-122.219.1 * gfs2-kmp-default-4.12.14-122.219.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc ppc64le x86_64) * kernel-default-4.12.14-122.219.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * kernel-macros-4.12.14-122.219.1 * kernel-source-4.12.14-122.219.1 * kernel-devel-4.12.14-122.219.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * kernel-default-devel-debuginfo-4.12.14-122.219.1 * SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x x86_64) * ocfs2-kmp-default-4.12.14-122.219.1 * gfs2-kmp-default-debuginfo-4.12.14-122.219.1 * dlm-kmp-default-debuginfo-4.12.14-122.219.1 * cluster-md-kmp-default-4.12.14-122.219.1 * kernel-default-debugsource-4.12.14-122.219.1 * dlm-kmp-default-4.12.14-122.219.1 * cluster-md-kmp-default-debuginfo-4.12.14-122.219.1 * ocfs2-kmp-default-debuginfo-4.12.14-122.219.1 * kernel-default-debuginfo-4.12.14-122.219.1 * gfs2-kmp-default-4.12.14-122.219.1 * SUSE Linux Enterprise High Availability Extension 12 SP5 (nosrc) * kernel-default-4.12.14-122.219.1 * SUSE Linux Enterprise Live Patching 12-SP5 (nosrc) * kernel-default-4.12.14-122.219.1 * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kernel-default-kgraft-4.12.14-122.219.1 * kernel-default-debugsource-4.12.14-122.219.1 * kernel-default-kgraft-devel-4.12.14-122.219.1 * kgraft-patch-4_12_14-122_219-default-1-8.3.1 * kernel-default-debuginfo-4.12.14-122.219.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch nosrc) * kernel-docs-4.12.14-122.219.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-4.12.14-122.219.1 * kernel-obs-build-debugsource-4.12.14-122.219.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 nosrc x86_64) * kernel-default-4.12.14-122.219.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * kernel-default-base-debuginfo-4.12.14-122.219.1 * kernel-default-base-4.12.14-122.219.1 * kernel-syms-4.12.14-122.219.1 * kernel-default-debugsource-4.12.14-122.219.1 * kernel-default-devel-4.12.14-122.219.1 * kernel-default-debuginfo-4.12.14-122.219.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * kernel-macros-4.12.14-122.219.1 * kernel-source-4.12.14-122.219.1 * kernel-devel-4.12.14-122.219.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * kernel-default-devel-debuginfo-4.12.14-122.219.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-4.12.14-122.219.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * kernel-default-base-debuginfo-4.12.14-122.219.1 * kernel-default-base-4.12.14-122.219.1 * kernel-syms-4.12.14-122.219.1 * kernel-default-debugsource-4.12.14-122.219.1 * kernel-default-devel-4.12.14-122.219.1 * kernel-default-debuginfo-4.12.14-122.219.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * kernel-macros-4.12.14-122.219.1 * kernel-source-4.12.14-122.219.1 * kernel-devel-4.12.14-122.219.1 * SUSE Linux Enterprise Server 12 SP5 (s390x) * kernel-default-man-4.12.14-122.219.1 * SUSE Linux Enterprise Server 12 SP5 (x86_64) * kernel-default-devel-debuginfo-4.12.14-122.219.1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (nosrc) * kernel-default-4.12.14-122.219.1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64) * kernel-default-extra-debuginfo-4.12.14-122.219.1 * kernel-default-extra-4.12.14-122.219.1 * kernel-default-debuginfo-4.12.14-122.219.1 * kernel-default-debugsource-4.12.14-122.219.1
## References:
* https://www.suse.com/security/cve/CVE-2021-46933.html * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2021-47074.html * https://www.suse.com/security/cve/CVE-2021-47113.html * https://www.suse.com/security/cve/CVE-2021-47131.html * https://www.suse.com/security/cve/CVE-2021-47162.html * https://www.suse.com/security/cve/CVE-2021-47171.html * https://www.suse.com/security/cve/CVE-2021-47188.html * https://www.suse.com/security/cve/CVE-2021-47206.html * https://www.suse.com/security/cve/CVE-2021-47220.html * https://www.suse.com/security/cve/CVE-2021-47229.html * https://www.suse.com/security/cve/CVE-2021-47231.html * https://www.suse.com/security/cve/CVE-2021-47235.html * https://www.suse.com/security/cve/CVE-2021-47236.html * https://www.suse.com/security/cve/CVE-2021-47237.html * https://www.suse.com/security/cve/CVE-2021-47238.html * https://www.suse.com/security/cve/CVE-2021-47239.html * https://www.suse.com/security/cve/CVE-2021-47245.html * https://www.suse.com/security/cve/CVE-2021-47246.html * https://www.suse.com/security/cve/CVE-2021-47248.html * https://www.suse.com/security/cve/CVE-2021-47249.html * https://www.suse.com/security/cve/CVE-2021-47250.html * https://www.suse.com/security/cve/CVE-2021-47252.html * https://www.suse.com/security/cve/CVE-2021-47254.html * https://www.suse.com/security/cve/CVE-2021-47258.html * https://www.suse.com/security/cve/CVE-2021-47260.html * https://www.suse.com/security/cve/CVE-2021-47261.html * https://www.suse.com/security/cve/CVE-2021-47265.html * https://www.suse.com/security/cve/CVE-2021-47269.html * https://www.suse.com/security/cve/CVE-2021-47274.html * https://www.suse.com/security/cve/CVE-2021-47276.html * https://www.suse.com/security/cve/CVE-2021-47277.html * https://www.suse.com/security/cve/CVE-2021-47280.html * https://www.suse.com/security/cve/CVE-2021-47281.html * https://www.suse.com/security/cve/CVE-2021-47284.html * https://www.suse.com/security/cve/CVE-2021-47285.html * https://www.suse.com/security/cve/CVE-2021-47288.html * https://www.suse.com/security/cve/CVE-2021-47301.html * https://www.suse.com/security/cve/CVE-2021-47302.html * https://www.suse.com/security/cve/CVE-2021-47305.html * https://www.suse.com/security/cve/CVE-2021-47307.html * https://www.suse.com/security/cve/CVE-2021-47308.html * https://www.suse.com/security/cve/CVE-2021-47310.html * https://www.suse.com/security/cve/CVE-2021-47311.html * https://www.suse.com/security/cve/CVE-2021-47314.html * https://www.suse.com/security/cve/CVE-2021-47315.html * https://www.suse.com/security/cve/CVE-2021-47319.html * https://www.suse.com/security/cve/CVE-2021-47320.html * https://www.suse.com/security/cve/CVE-2021-47321.html * https://www.suse.com/security/cve/CVE-2021-47323.html * https://www.suse.com/security/cve/CVE-2021-47324.html * https://www.suse.com/security/cve/CVE-2021-47330.html * https://www.suse.com/security/cve/CVE-2021-47334.html * https://www.suse.com/security/cve/CVE-2021-47337.html * https://www.suse.com/security/cve/CVE-2021-47343.html * https://www.suse.com/security/cve/CVE-2021-47344.html * https://www.suse.com/security/cve/CVE-2021-47345.html * https://www.suse.com/security/cve/CVE-2021-47347.html * https://www.suse.com/security/cve/CVE-2021-47352.html * https://www.suse.com/security/cve/CVE-2021-47353.html * https://www.suse.com/security/cve/CVE-2021-47355.html * https://www.suse.com/security/cve/CVE-2021-47356.html * https://www.suse.com/security/cve/CVE-2021-47357.html * https://www.suse.com/security/cve/CVE-2021-47361.html * https://www.suse.com/security/cve/CVE-2021-47362.html * https://www.suse.com/security/cve/CVE-2021-47369.html * https://www.suse.com/security/cve/CVE-2021-47375.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47382.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47391.html * https://www.suse.com/security/cve/CVE-2021-47397.html * https://www.suse.com/security/cve/CVE-2021-47400.html * https://www.suse.com/security/cve/CVE-2021-47401.html * https://www.suse.com/security/cve/CVE-2021-47404.html * https://www.suse.com/security/cve/CVE-2021-47409.html * https://www.suse.com/security/cve/CVE-2021-47416.html * https://www.suse.com/security/cve/CVE-2021-47423.html * https://www.suse.com/security/cve/CVE-2021-47424.html * https://www.suse.com/security/cve/CVE-2021-47431.html * https://www.suse.com/security/cve/CVE-2021-47435.html * https://www.suse.com/security/cve/CVE-2021-47436.html * https://www.suse.com/security/cve/CVE-2021-47456.html * https://www.suse.com/security/cve/CVE-2021-47458.html * https://www.suse.com/security/cve/CVE-2021-47460.html * https://www.suse.com/security/cve/CVE-2021-47469.html * https://www.suse.com/security/cve/CVE-2021-47472.html * https://www.suse.com/security/cve/CVE-2021-47473.html * https://www.suse.com/security/cve/CVE-2021-47478.html * https://www.suse.com/security/cve/CVE-2021-47480.html * https://www.suse.com/security/cve/CVE-2021-47483.html * https://www.suse.com/security/cve/CVE-2021-47485.html * https://www.suse.com/security/cve/CVE-2021-47495.html * https://www.suse.com/security/cve/CVE-2021-47496.html * https://www.suse.com/security/cve/CVE-2021-47497.html * https://www.suse.com/security/cve/CVE-2021-47500.html * https://www.suse.com/security/cve/CVE-2021-47506.html * https://www.suse.com/security/cve/CVE-2021-47509.html * https://www.suse.com/security/cve/CVE-2021-47511.html * https://www.suse.com/security/cve/CVE-2021-47523.html * https://www.suse.com/security/cve/CVE-2021-47541.html * https://www.suse.com/security/cve/CVE-2021-47548.html * https://www.suse.com/security/cve/CVE-2021-47565.html * https://www.suse.com/security/cve/CVE-2022-48636.html * https://www.suse.com/security/cve/CVE-2022-48650.html * https://www.suse.com/security/cve/CVE-2022-48672.html * https://www.suse.com/security/cve/CVE-2022-48686.html * https://www.suse.com/security/cve/CVE-2022-48697.html * https://www.suse.com/security/cve/CVE-2022-48702.html * https://www.suse.com/security/cve/CVE-2022-48704.html * https://www.suse.com/security/cve/CVE-2022-48708.html * https://www.suse.com/security/cve/CVE-2022-48710.html * https://www.suse.com/security/cve/CVE-2023-0160.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-42755.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-52527.html * https://www.suse.com/security/cve/CVE-2023-52586.html * https://www.suse.com/security/cve/CVE-2023-52591.html * https://www.suse.com/security/cve/CVE-2023-52646.html * https://www.suse.com/security/cve/CVE-2023-52653.html * https://www.suse.com/security/cve/CVE-2023-52655.html * https://www.suse.com/security/cve/CVE-2023-52664.html * https://www.suse.com/security/cve/CVE-2023-52685.html * https://www.suse.com/security/cve/CVE-2023-52686.html * https://www.suse.com/security/cve/CVE-2023-52691.html * https://www.suse.com/security/cve/CVE-2023-52696.html * https://www.suse.com/security/cve/CVE-2023-52698.html * https://www.suse.com/security/cve/CVE-2023-52703.html * https://www.suse.com/security/cve/CVE-2023-52730.html * https://www.suse.com/security/cve/CVE-2023-52732.html * https://www.suse.com/security/cve/CVE-2023-52741.html * https://www.suse.com/security/cve/CVE-2023-52742.html * https://www.suse.com/security/cve/CVE-2023-52747.html * https://www.suse.com/security/cve/CVE-2023-52759.html * https://www.suse.com/security/cve/CVE-2023-52774.html * https://www.suse.com/security/cve/CVE-2023-52781.html * https://www.suse.com/security/cve/CVE-2023-52796.html * https://www.suse.com/security/cve/CVE-2023-52803.html * https://www.suse.com/security/cve/CVE-2023-52821.html * https://www.suse.com/security/cve/CVE-2023-52864.html * https://www.suse.com/security/cve/CVE-2023-52865.html * https://www.suse.com/security/cve/CVE-2023-52867.html * https://www.suse.com/security/cve/CVE-2023-52875.html * https://www.suse.com/security/cve/CVE-2023-52880.html * https://www.suse.com/security/cve/CVE-2024-0639.html * https://www.suse.com/security/cve/CVE-2024-26625.html * https://www.suse.com/security/cve/CVE-2024-26739.html * https://www.suse.com/security/cve/CVE-2024-26752.html * https://www.suse.com/security/cve/CVE-2024-26775.html * https://www.suse.com/security/cve/CVE-2024-26791.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26846.html * https://www.suse.com/security/cve/CVE-2024-26874.html * https://www.suse.com/security/cve/CVE-2024-26876.html * https://www.suse.com/security/cve/CVE-2024-26900.html * https://www.suse.com/security/cve/CVE-2024-26915.html * https://www.suse.com/security/cve/CVE-2024-26920.html * https://www.suse.com/security/cve/CVE-2024-26921.html * https://www.suse.com/security/cve/CVE-2024-26929.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-26931.html * https://www.suse.com/security/cve/CVE-2024-26934.html * https://www.suse.com/security/cve/CVE-2024-26957.html * https://www.suse.com/security/cve/CVE-2024-26958.html * https://www.suse.com/security/cve/CVE-2024-26984.html * https://www.suse.com/security/cve/CVE-2024-26996.html * https://www.suse.com/security/cve/CVE-2024-27008.html * https://www.suse.com/security/cve/CVE-2024-27054.html * https://www.suse.com/security/cve/CVE-2024-27059.html * https://www.suse.com/security/cve/CVE-2024-27062.html * https://www.suse.com/security/cve/CVE-2024-27388.html * https://www.suse.com/security/cve/CVE-2024-27396.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-27401.html * https://www.suse.com/security/cve/CVE-2024-27419.html * https://www.suse.com/security/cve/CVE-2024-27436.html * https://www.suse.com/security/cve/CVE-2024-35789.html * https://www.suse.com/security/cve/CVE-2024-35791.html * https://www.suse.com/security/cve/CVE-2024-35809.html * https://www.suse.com/security/cve/CVE-2024-35811.html * https://www.suse.com/security/cve/CVE-2024-35830.html * https://www.suse.com/security/cve/CVE-2024-35849.html * https://www.suse.com/security/cve/CVE-2024-35877.html * https://www.suse.com/security/cve/CVE-2024-35878.html * https://www.suse.com/security/cve/CVE-2024-35887.html * https://www.suse.com/security/cve/CVE-2024-35895.html * https://www.suse.com/security/cve/CVE-2024-35914.html * https://www.suse.com/security/cve/CVE-2024-35932.html * https://www.suse.com/security/cve/CVE-2024-35935.html * https://www.suse.com/security/cve/CVE-2024-35936.html * https://www.suse.com/security/cve/CVE-2024-35944.html * https://www.suse.com/security/cve/CVE-2024-35955.html * https://www.suse.com/security/cve/CVE-2024-35969.html * https://www.suse.com/security/cve/CVE-2024-35982.html * https://www.suse.com/security/cve/CVE-2024-36015.html * https://www.suse.com/security/cve/CVE-2024-36029.html * https://www.suse.com/security/cve/CVE-2024-36954.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1101816 * https://bugzilla.suse.com/show_bug.cgi?id=1141539 * https://bugzilla.suse.com/show_bug.cgi?id=1181674 * https://bugzilla.suse.com/show_bug.cgi?id=1185902 * https://bugzilla.suse.com/show_bug.cgi?id=1187716 * https://bugzilla.suse.com/show_bug.cgi?id=1188616 * https://bugzilla.suse.com/show_bug.cgi?id=1190317 * https://bugzilla.suse.com/show_bug.cgi?id=1190795 * https://bugzilla.suse.com/show_bug.cgi?id=1191452 * https://bugzilla.suse.com/show_bug.cgi?id=1194591 * https://bugzilla.suse.com/show_bug.cgi?id=1197760 * https://bugzilla.suse.com/show_bug.cgi?id=1197894 * https://bugzilla.suse.com/show_bug.cgi?id=1203935 * https://bugzilla.suse.com/show_bug.cgi?id=1206213 * https://bugzilla.suse.com/show_bug.cgi?id=1206646 * https://bugzilla.suse.com/show_bug.cgi?id=1207186 * https://bugzilla.suse.com/show_bug.cgi?id=1209657 * https://bugzilla.suse.com/show_bug.cgi?id=1210335 * https://bugzilla.suse.com/show_bug.cgi?id=1215702 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217169 * https://bugzilla.suse.com/show_bug.cgi?id=1217519 * https://bugzilla.suse.com/show_bug.cgi?id=1218917 * https://bugzilla.suse.com/show_bug.cgi?id=1220487 * https://bugzilla.suse.com/show_bug.cgi?id=1220513 * https://bugzilla.suse.com/show_bug.cgi?id=1220854 * https://bugzilla.suse.com/show_bug.cgi?id=1220928 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221081 * https://bugzilla.suse.com/show_bug.cgi?id=1221086 * https://bugzilla.suse.com/show_bug.cgi?id=1221543 * https://bugzilla.suse.com/show_bug.cgi?id=1221545 * https://bugzilla.suse.com/show_bug.cgi?id=1221816 * https://bugzilla.suse.com/show_bug.cgi?id=1221977 * https://bugzilla.suse.com/show_bug.cgi?id=1221994 * https://bugzilla.suse.com/show_bug.cgi?id=1222559 * https://bugzilla.suse.com/show_bug.cgi?id=1222619 * https://bugzilla.suse.com/show_bug.cgi?id=1222627 * https://bugzilla.suse.com/show_bug.cgi?id=1222667 * https://bugzilla.suse.com/show_bug.cgi?id=1222671 * https://bugzilla.suse.com/show_bug.cgi?id=1222793 * https://bugzilla.suse.com/show_bug.cgi?id=1222893 * https://bugzilla.suse.com/show_bug.cgi?id=1222894 * https://bugzilla.suse.com/show_bug.cgi?id=1223023 * https://bugzilla.suse.com/show_bug.cgi?id=1223046 * https://bugzilla.suse.com/show_bug.cgi?id=1223048 * https://bugzilla.suse.com/show_bug.cgi?id=1223062 * https://bugzilla.suse.com/show_bug.cgi?id=1223084 * https://bugzilla.suse.com/show_bug.cgi?id=1223119 * https://bugzilla.suse.com/show_bug.cgi?id=1223138 * https://bugzilla.suse.com/show_bug.cgi?id=1223207 * https://bugzilla.suse.com/show_bug.cgi?id=1223360 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223432 * https://bugzilla.suse.com/show_bug.cgi?id=1223509 * https://bugzilla.suse.com/show_bug.cgi?id=1223512 * https://bugzilla.suse.com/show_bug.cgi?id=1223539 * https://bugzilla.suse.com/show_bug.cgi?id=1223540 * https://bugzilla.suse.com/show_bug.cgi?id=1223626 * https://bugzilla.suse.com/show_bug.cgi?id=1223627 * https://bugzilla.suse.com/show_bug.cgi?id=1223633 * https://bugzilla.suse.com/show_bug.cgi?id=1223653 * https://bugzilla.suse.com/show_bug.cgi?id=1223666 * https://bugzilla.suse.com/show_bug.cgi?id=1223671 * https://bugzilla.suse.com/show_bug.cgi?id=1223712 * https://bugzilla.suse.com/show_bug.cgi?id=1223715 * https://bugzilla.suse.com/show_bug.cgi?id=1223738 * https://bugzilla.suse.com/show_bug.cgi?id=1223744 * https://bugzilla.suse.com/show_bug.cgi?id=1223752 * https://bugzilla.suse.com/show_bug.cgi?id=1223802 * https://bugzilla.suse.com/show_bug.cgi?id=1223819 * https://bugzilla.suse.com/show_bug.cgi?id=1223834 * https://bugzilla.suse.com/show_bug.cgi?id=1223922 * https://bugzilla.suse.com/show_bug.cgi?id=1223923 * https://bugzilla.suse.com/show_bug.cgi?id=1223931 * https://bugzilla.suse.com/show_bug.cgi?id=1223932 * https://bugzilla.suse.com/show_bug.cgi?id=1223948 * https://bugzilla.suse.com/show_bug.cgi?id=1223969 * https://bugzilla.suse.com/show_bug.cgi?id=1224096 * https://bugzilla.suse.com/show_bug.cgi?id=1224174 * https://bugzilla.suse.com/show_bug.cgi?id=1224181 * https://bugzilla.suse.com/show_bug.cgi?id=1224347 * https://bugzilla.suse.com/show_bug.cgi?id=1224482 * https://bugzilla.suse.com/show_bug.cgi?id=1224511 * https://bugzilla.suse.com/show_bug.cgi?id=1224525 * https://bugzilla.suse.com/show_bug.cgi?id=1224566 * https://bugzilla.suse.com/show_bug.cgi?id=1224580 * https://bugzilla.suse.com/show_bug.cgi?id=1224592 * https://bugzilla.suse.com/show_bug.cgi?id=1224601 * https://bugzilla.suse.com/show_bug.cgi?id=1224607 * https://bugzilla.suse.com/show_bug.cgi?id=1224621 * https://bugzilla.suse.com/show_bug.cgi?id=1224644 * https://bugzilla.suse.com/show_bug.cgi?id=1224645 * https://bugzilla.suse.com/show_bug.cgi?id=1224648 * https://bugzilla.suse.com/show_bug.cgi?id=1224650 * https://bugzilla.suse.com/show_bug.cgi?id=1224663 * https://bugzilla.suse.com/show_bug.cgi?id=1224671 * https://bugzilla.suse.com/show_bug.cgi?id=1224676 * https://bugzilla.suse.com/show_bug.cgi?id=1224680 * https://bugzilla.suse.com/show_bug.cgi?id=1224682 * https://bugzilla.suse.com/show_bug.cgi?id=1224725 * https://bugzilla.suse.com/show_bug.cgi?id=1224728 * https://bugzilla.suse.com/show_bug.cgi?id=1224733 * https://bugzilla.suse.com/show_bug.cgi?id=1224738 * https://bugzilla.suse.com/show_bug.cgi?id=1224747 * https://bugzilla.suse.com/show_bug.cgi?id=1224749 * https://bugzilla.suse.com/show_bug.cgi?id=1224759 * https://bugzilla.suse.com/show_bug.cgi?id=1224803 * https://bugzilla.suse.com/show_bug.cgi?id=1224827 * https://bugzilla.suse.com/show_bug.cgi?id=1224830 * https://bugzilla.suse.com/show_bug.cgi?id=1224831 * https://bugzilla.suse.com/show_bug.cgi?id=1224834 * https://bugzilla.suse.com/show_bug.cgi?id=1224838 * https://bugzilla.suse.com/show_bug.cgi?id=1224841 * https://bugzilla.suse.com/show_bug.cgi?id=1224844 * https://bugzilla.suse.com/show_bug.cgi?id=1224846 * https://bugzilla.suse.com/show_bug.cgi?id=1224847 * https://bugzilla.suse.com/show_bug.cgi?id=1224849 * https://bugzilla.suse.com/show_bug.cgi?id=1224854 * https://bugzilla.suse.com/show_bug.cgi?id=1224859 * https://bugzilla.suse.com/show_bug.cgi?id=1224867 * https://bugzilla.suse.com/show_bug.cgi?id=1224880 * https://bugzilla.suse.com/show_bug.cgi?id=1224882 * https://bugzilla.suse.com/show_bug.cgi?id=1224888 * https://bugzilla.suse.com/show_bug.cgi?id=1224889 * https://bugzilla.suse.com/show_bug.cgi?id=1224892 * https://bugzilla.suse.com/show_bug.cgi?id=1224893 * https://bugzilla.suse.com/show_bug.cgi?id=1224899 * https://bugzilla.suse.com/show_bug.cgi?id=1224904 * https://bugzilla.suse.com/show_bug.cgi?id=1224907 * https://bugzilla.suse.com/show_bug.cgi?id=1224916 * https://bugzilla.suse.com/show_bug.cgi?id=1224917 * https://bugzilla.suse.com/show_bug.cgi?id=1224922 * https://bugzilla.suse.com/show_bug.cgi?id=1224926 * https://bugzilla.suse.com/show_bug.cgi?id=1224930 * https://bugzilla.suse.com/show_bug.cgi?id=1224931 * https://bugzilla.suse.com/show_bug.cgi?id=1224942 * https://bugzilla.suse.com/show_bug.cgi?id=1224954 * https://bugzilla.suse.com/show_bug.cgi?id=1224956 * https://bugzilla.suse.com/show_bug.cgi?id=1224957 * https://bugzilla.suse.com/show_bug.cgi?id=1224959 * https://bugzilla.suse.com/show_bug.cgi?id=1224960 * https://bugzilla.suse.com/show_bug.cgi?id=1224961 * https://bugzilla.suse.com/show_bug.cgi?id=1224963 * https://bugzilla.suse.com/show_bug.cgi?id=1224966 * https://bugzilla.suse.com/show_bug.cgi?id=1224968 * https://bugzilla.suse.com/show_bug.cgi?id=1224981 * https://bugzilla.suse.com/show_bug.cgi?id=1224982 * https://bugzilla.suse.com/show_bug.cgi?id=1224983 * https://bugzilla.suse.com/show_bug.cgi?id=1224987 * https://bugzilla.suse.com/show_bug.cgi?id=1224990 * https://bugzilla.suse.com/show_bug.cgi?id=1224996 * https://bugzilla.suse.com/show_bug.cgi?id=1225008 * https://bugzilla.suse.com/show_bug.cgi?id=1225009 * https://bugzilla.suse.com/show_bug.cgi?id=1225010 * https://bugzilla.suse.com/show_bug.cgi?id=1225022 * https://bugzilla.suse.com/show_bug.cgi?id=1225026 * https://bugzilla.suse.com/show_bug.cgi?id=1225030 * https://bugzilla.suse.com/show_bug.cgi?id=1225054 * https://bugzilla.suse.com/show_bug.cgi?id=1225058 * https://bugzilla.suse.com/show_bug.cgi?id=1225059 * https://bugzilla.suse.com/show_bug.cgi?id=1225060 * https://bugzilla.suse.com/show_bug.cgi?id=1225062 * https://bugzilla.suse.com/show_bug.cgi?id=1225082 * https://bugzilla.suse.com/show_bug.cgi?id=1225084 * https://bugzilla.suse.com/show_bug.cgi?id=1225086 * https://bugzilla.suse.com/show_bug.cgi?id=1225092 * https://bugzilla.suse.com/show_bug.cgi?id=1225096 * https://bugzilla.suse.com/show_bug.cgi?id=1225112 * https://bugzilla.suse.com/show_bug.cgi?id=1225124 * https://bugzilla.suse.com/show_bug.cgi?id=1225128 * https://bugzilla.suse.com/show_bug.cgi?id=1225132 * https://bugzilla.suse.com/show_bug.cgi?id=1225141 * https://bugzilla.suse.com/show_bug.cgi?id=1225143 * https://bugzilla.suse.com/show_bug.cgi?id=1225144 * https://bugzilla.suse.com/show_bug.cgi?id=1225151 * https://bugzilla.suse.com/show_bug.cgi?id=1225153 * https://bugzilla.suse.com/show_bug.cgi?id=1225155 * https://bugzilla.suse.com/show_bug.cgi?id=1225157 * https://bugzilla.suse.com/show_bug.cgi?id=1225164 * https://bugzilla.suse.com/show_bug.cgi?id=1225177 * https://bugzilla.suse.com/show_bug.cgi?id=1225189 * https://bugzilla.suse.com/show_bug.cgi?id=1225192 * https://bugzilla.suse.com/show_bug.cgi?id=1225193 * https://bugzilla.suse.com/show_bug.cgi?id=1225198 * https://bugzilla.suse.com/show_bug.cgi?id=1225201 * https://bugzilla.suse.com/show_bug.cgi?id=1225207 * https://bugzilla.suse.com/show_bug.cgi?id=1225208 * https://bugzilla.suse.com/show_bug.cgi?id=1225222 * https://bugzilla.suse.com/show_bug.cgi?id=1225230 * https://bugzilla.suse.com/show_bug.cgi?id=1225242 * https://bugzilla.suse.com/show_bug.cgi?id=1225244 * https://bugzilla.suse.com/show_bug.cgi?id=1225247 * https://bugzilla.suse.com/show_bug.cgi?id=1225251 * https://bugzilla.suse.com/show_bug.cgi?id=1225252 * https://bugzilla.suse.com/show_bug.cgi?id=1225256 * https://bugzilla.suse.com/show_bug.cgi?id=1225303 * https://bugzilla.suse.com/show_bug.cgi?id=1225318 * https://bugzilla.suse.com/show_bug.cgi?id=1225322 * https://bugzilla.suse.com/show_bug.cgi?id=1225329 * https://bugzilla.suse.com/show_bug.cgi?id=1225330 * https://bugzilla.suse.com/show_bug.cgi?id=1225336 * https://bugzilla.suse.com/show_bug.cgi?id=1225347 * https://bugzilla.suse.com/show_bug.cgi?id=1225351 * https://bugzilla.suse.com/show_bug.cgi?id=1225354 * https://bugzilla.suse.com/show_bug.cgi?id=1225355 * https://bugzilla.suse.com/show_bug.cgi?id=1225360 * https://bugzilla.suse.com/show_bug.cgi?id=1225366 * https://bugzilla.suse.com/show_bug.cgi?id=1225367 * https://bugzilla.suse.com/show_bug.cgi?id=1225384 * https://bugzilla.suse.com/show_bug.cgi?id=1225390 * https://bugzilla.suse.com/show_bug.cgi?id=1225404 * https://bugzilla.suse.com/show_bug.cgi?id=1225409 * https://bugzilla.suse.com/show_bug.cgi?id=1225411 * https://bugzilla.suse.com/show_bug.cgi?id=1225438 * https://bugzilla.suse.com/show_bug.cgi?id=1225453 * https://bugzilla.suse.com/show_bug.cgi?id=1225479 * https://bugzilla.suse.com/show_bug.cgi?id=1225482 * https://bugzilla.suse.com/show_bug.cgi?id=1225506 * https://bugzilla.suse.com/show_bug.cgi?id=1225549 * https://bugzilla.suse.com/show_bug.cgi?id=1225560 * https://bugzilla.suse.com/show_bug.cgi?id=1225572 * https://bugzilla.suse.com/show_bug.cgi?id=1225640 * https://bugzilla.suse.com/show_bug.cgi?id=1225708 * https://bugzilla.suse.com/show_bug.cgi?id=1225764
--===============2255928255857657655== Content-Type: text/html; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
<div class="container"> <h1>Security update for the Linux Kernel</h1>
<table class="table table-striped table-bordered"> <tbody> <tr> <th>Announcement ID:</th> <td>SUSE-SU-2024:2184-1</td> </tr> <tr> <th>Rating:</th> <td>important</td> </tr> <tr> <th>References:</th> <td> <ul> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1065729">bsc#1065729</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1101816">bsc#1101816</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1141539">bsc#1141539</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1181674">bsc#1181674</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1185902">bsc#1185902</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1187716">bsc#1187716</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1188616">bsc#1188616</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1190317">bsc#1190317</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1190795">bsc#1190795</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1191452">bsc#1191452</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1194591">bsc#1194591</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1197760">bsc#1197760</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1197894">bsc#1197894</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1203935">bsc#1203935</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1206213">bsc#1206213</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1206646">bsc#1206646</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1207186">bsc#1207186</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209657">bsc#1209657</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210335">bsc#1210335</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215702">bsc#1215702</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216702">bsc#1216702</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217169">bsc#1217169</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217519">bsc#1217519</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218917">bsc#1218917</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220487">bsc#1220487</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220513">bsc#1220513</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220854">bsc#1220854</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220928">bsc#1220928</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221044">bsc#1221044</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221081">bsc#1221081</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221086">bsc#1221086</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221543">bsc#1221543</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221545">bsc#1221545</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221816">bsc#1221816</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221977">bsc#1221977</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221994">bsc#1221994</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222559">bsc#1222559</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222619">bsc#1222619</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222627">bsc#1222627</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222667">bsc#1222667</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222671">bsc#1222671</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222793">bsc#1222793</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222893">bsc#1222893</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222894">bsc#1222894</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223023">bsc#1223023</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223046">bsc#1223046</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223048">bsc#1223048</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223062">bsc#1223062</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223084">bsc#1223084</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223119">bsc#1223119</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223138">bsc#1223138</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223207">bsc#1223207</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223360">bsc#1223360</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223384">bsc#1223384</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223432">bsc#1223432</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223509">bsc#1223509</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223512">bsc#1223512</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223539">bsc#1223539</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223540">bsc#1223540</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223626">bsc#1223626</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223627">bsc#1223627</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223633">bsc#1223633</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223653">bsc#1223653</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223666">bsc#1223666</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223671">bsc#1223671</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223712">bsc#1223712</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223715">bsc#1223715</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223738">bsc#1223738</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223744">bsc#1223744</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223752">bsc#1223752</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223802">bsc#1223802</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223819">bsc#1223819</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223834">bsc#1223834</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223922">bsc#1223922</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223923">bsc#1223923</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223931">bsc#1223931</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223932">bsc#1223932</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223948">bsc#1223948</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223969">bsc#1223969</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224096">bsc#1224096</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224174">bsc#1224174</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224181">bsc#1224181</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224347">bsc#1224347</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224482">bsc#1224482</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224511">bsc#1224511</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224525">bsc#1224525</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224566">bsc#1224566</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224580">bsc#1224580</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224592">bsc#1224592</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224601">bsc#1224601</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224607">bsc#1224607</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224621">bsc#1224621</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224644">bsc#1224644</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224645">bsc#1224645</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224648">bsc#1224648</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224650">bsc#1224650</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224663">bsc#1224663</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224671">bsc#1224671</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224676">bsc#1224676</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224680">bsc#1224680</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224682">bsc#1224682</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224725">bsc#1224725</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224728">bsc#1224728</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224733">bsc#1224733</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224738">bsc#1224738</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224747">bsc#1224747</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224749">bsc#1224749</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224759">bsc#1224759</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224803">bsc#1224803</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224827">bsc#1224827</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224830">bsc#1224830</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224831">bsc#1224831</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224834">bsc#1224834</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224838">bsc#1224838</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224841">bsc#1224841</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224844">bsc#1224844</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224846">bsc#1224846</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224847">bsc#1224847</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224849">bsc#1224849</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224854">bsc#1224854</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224859">bsc#1224859</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224867">bsc#1224867</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224880">bsc#1224880</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224882">bsc#1224882</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224888">bsc#1224888</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224889">bsc#1224889</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224892">bsc#1224892</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224893">bsc#1224893</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224899">bsc#1224899</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224904">bsc#1224904</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224907">bsc#1224907</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224916">bsc#1224916</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224917">bsc#1224917</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224922">bsc#1224922</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224926">bsc#1224926</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224930">bsc#1224930</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224931">bsc#1224931</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224942">bsc#1224942</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224954">bsc#1224954</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224956">bsc#1224956</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224957">bsc#1224957</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224959">bsc#1224959</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224960">bsc#1224960</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224961">bsc#1224961</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224963">bsc#1224963</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224966">bsc#1224966</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224968">bsc#1224968</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224981">bsc#1224981</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224982">bsc#1224982</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224983">bsc#1224983</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224987">bsc#1224987</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224990">bsc#1224990</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224996">bsc#1224996</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225008">bsc#1225008</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225009">bsc#1225009</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225010">bsc#1225010</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225022">bsc#1225022</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225026">bsc#1225026</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225030">bsc#1225030</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225054">bsc#1225054</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225058">bsc#1225058</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225059">bsc#1225059</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225060">bsc#1225060</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225062">bsc#1225062</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225082">bsc#1225082</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225084">bsc#1225084</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225086">bsc#1225086</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225092">bsc#1225092</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225096">bsc#1225096</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225112">bsc#1225112</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225124">bsc#1225124</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225128">bsc#1225128</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225132">bsc#1225132</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225141">bsc#1225141</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225143">bsc#1225143</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225144">bsc#1225144</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225151">bsc#1225151</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225153">bsc#1225153</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225155">bsc#1225155</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225157">bsc#1225157</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225164">bsc#1225164</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225177">bsc#1225177</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225189">bsc#1225189</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225192">bsc#1225192</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225193">bsc#1225193</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225198">bsc#1225198</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225201">bsc#1225201</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225207">bsc#1225207</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225208">bsc#1225208</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225222">bsc#1225222</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225230">bsc#1225230</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225242">bsc#1225242</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225244">bsc#1225244</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225247">bsc#1225247</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225251">bsc#1225251</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225252">bsc#1225252</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225256">bsc#1225256</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225303">bsc#1225303</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225318">bsc#1225318</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225322">bsc#1225322</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225329">bsc#1225329</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225330">bsc#1225330</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225336">bsc#1225336</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225347">bsc#1225347</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225351">bsc#1225351</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225354">bsc#1225354</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225355">bsc#1225355</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225360">bsc#1225360</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225366">bsc#1225366</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225367">bsc#1225367</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225384">bsc#1225384</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225390">bsc#1225390</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225404">bsc#1225404</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225409">bsc#1225409</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225411">bsc#1225411</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225438">bsc#1225438</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225453">bsc#1225453</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225479">bsc#1225479</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225482">bsc#1225482</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225506">bsc#1225506</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225549">bsc#1225549</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225560">bsc#1225560</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225572">bsc#1225572</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225640">bsc#1225640</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225708">bsc#1225708</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225764">bsc#1225764</a> </li> </ul> </td> </tr> <tr> <th> Cross-References: </th> <td> <ul> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46933.html">CVE-2021-46933</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46955.html">CVE-2021-46955</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47074.html">CVE-2021-47074</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47113.html">CVE-2021-47113</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47131.html">CVE-2021-47131</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47162.html">CVE-2021-47162</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47171.html">CVE-2021-47171</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47188.html">CVE-2021-47188</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47206.html">CVE-2021-47206</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47220.html">CVE-2021-47220</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47229.html">CVE-2021-47229</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47231.html">CVE-2021-47231</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47235.html">CVE-2021-47235</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47236.html">CVE-2021-47236</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47237.html">CVE-2021-47237</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47238.html">CVE-2021-47238</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47239.html">CVE-2021-47239</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47245.html">CVE-2021-47245</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47246.html">CVE-2021-47246</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47248.html">CVE-2021-47248</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47249.html">CVE-2021-47249</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47250.html">CVE-2021-47250</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47252.html">CVE-2021-47252</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47254.html">CVE-2021-47254</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47258.html">CVE-2021-47258</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47260.html">CVE-2021-47260</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47261.html">CVE-2021-47261</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47265.html">CVE-2021-47265</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47269.html">CVE-2021-47269</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47274.html">CVE-2021-47274</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47276.html">CVE-2021-47276</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47277.html">CVE-2021-47277</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47280.html">CVE-2021-47280</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47281.html">CVE-2021-47281</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47284.html">CVE-2021-47284</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47285.html">CVE-2021-47285</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47288.html">CVE-2021-47288</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47301.html">CVE-2021-47301</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47302.html">CVE-2021-47302</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47305.html">CVE-2021-47305</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47307.html">CVE-2021-47307</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47308.html">CVE-2021-47308</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47310.html">CVE-2021-47310</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47311.html">CVE-2021-47311</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47314.html">CVE-2021-47314</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47315.html">CVE-2021-47315</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47319.html">CVE-2021-47319</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47320.html">CVE-2021-47320</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47321.html">CVE-2021-47321</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47323.html">CVE-2021-47323</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47324.html">CVE-2021-47324</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47330.html">CVE-2021-47330</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47334.html">CVE-2021-47334</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47337.html">CVE-2021-47337</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47343.html">CVE-2021-47343</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47344.html">CVE-2021-47344</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47345.html">CVE-2021-47345</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47347.html">CVE-2021-47347</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47352.html">CVE-2021-47352</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47353.html">CVE-2021-47353</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47355.html">CVE-2021-47355</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47356.html">CVE-2021-47356</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47357.html">CVE-2021-47357</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47361.html">CVE-2021-47361</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47362.html">CVE-2021-47362</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47369.html">CVE-2021-47369</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47375.html">CVE-2021-47375</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47378.html">CVE-2021-47378</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47382.html">CVE-2021-47382</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47383.html">CVE-2021-47383</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47391.html">CVE-2021-47391</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47397.html">CVE-2021-47397</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47400.html">CVE-2021-47400</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47401.html">CVE-2021-47401</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47404.html">CVE-2021-47404</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47409.html">CVE-2021-47409</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47416.html">CVE-2021-47416</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47423.html">CVE-2021-47423</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47424.html">CVE-2021-47424</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47431.html">CVE-2021-47431</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47435.html">CVE-2021-47435</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47436.html">CVE-2021-47436</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47456.html">CVE-2021-47456</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47458.html">CVE-2021-47458</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47460.html">CVE-2021-47460</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47469.html">CVE-2021-47469</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47472.html">CVE-2021-47472</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47473.html">CVE-2021-47473</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47478.html">CVE-2021-47478</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47480.html">CVE-2021-47480</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47483.html">CVE-2021-47483</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47485.html">CVE-2021-47485</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47495.html">CVE-2021-47495</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47496.html">CVE-2021-47496</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47497.html">CVE-2021-47497</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47500.html">CVE-2021-47500</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47506.html">CVE-2021-47506</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47509.html">CVE-2021-47509</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47511.html">CVE-2021-47511</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47523.html">CVE-2021-47523</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47541.html">CVE-2021-47541</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47548.html">CVE-2021-47548</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47565.html">CVE-2021-47565</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48636.html">CVE-2022-48636</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48650.html">CVE-2022-48650</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48672.html">CVE-2022-48672</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48686.html">CVE-2022-48686</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48697.html">CVE-2022-48697</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48702.html">CVE-2022-48702</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48704.html">CVE-2022-48704</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48708.html">CVE-2022-48708</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48710.html">CVE-2022-48710</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-0160.html">CVE-2023-0160</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-1829.html">CVE-2023-1829</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-42755.html">CVE-2023-42755</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-47233.html">CVE-2023-47233</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52527.html">CVE-2023-52527</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52586.html">CVE-2023-52586</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52591.html">CVE-2023-52591</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52646.html">CVE-2023-52646</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52653.html">CVE-2023-52653</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52655.html">CVE-2023-52655</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52664.html">CVE-2023-52664</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52685.html">CVE-2023-52685</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52686.html">CVE-2023-52686</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52691.html">CVE-2023-52691</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52696.html">CVE-2023-52696</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52698.html">CVE-2023-52698</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52703.html">CVE-2023-52703</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52730.html">CVE-2023-52730</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52732.html">CVE-2023-52732</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52741.html">CVE-2023-52741</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52742.html">CVE-2023-52742</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52747.html">CVE-2023-52747</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52759.html">CVE-2023-52759</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52774.html">CVE-2023-52774</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52781.html">CVE-2023-52781</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52796.html">CVE-2023-52796</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52803.html">CVE-2023-52803</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52821.html">CVE-2023-52821</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52864.html">CVE-2023-52864</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52865.html">CVE-2023-52865</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52867.html">CVE-2023-52867</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52875.html">CVE-2023-52875</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52880.html">CVE-2023-52880</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-0639.html">CVE-2024-0639</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26625.html">CVE-2024-26625</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26739.html">CVE-2024-26739</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26752.html">CVE-2024-26752</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26775.html">CVE-2024-26775</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26791.html">CVE-2024-26791</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26828.html">CVE-2024-26828</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26846.html">CVE-2024-26846</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26874.html">CVE-2024-26874</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26876.html">CVE-2024-26876</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26900.html">CVE-2024-26900</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26915.html">CVE-2024-26915</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26920.html">CVE-2024-26920</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26921.html">CVE-2024-26921</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26929.html">CVE-2024-26929</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26930.html">CVE-2024-26930</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26931.html">CVE-2024-26931</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26934.html">CVE-2024-26934</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26957.html">CVE-2024-26957</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26958.html">CVE-2024-26958</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26984.html">CVE-2024-26984</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26996.html">CVE-2024-26996</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27008.html">CVE-2024-27008</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27054.html">CVE-2024-27054</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27059.html">CVE-2024-27059</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27062.html">CVE-2024-27062</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27388.html">CVE-2024-27388</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27396.html">CVE-2024-27396</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27398.html">CVE-2024-27398</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27401.html">CVE-2024-27401</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27419.html">CVE-2024-27419</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27436.html">CVE-2024-27436</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35789.html">CVE-2024-35789</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35791.html">CVE-2024-35791</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35809.html">CVE-2024-35809</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35811.html">CVE-2024-35811</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35830.html">CVE-2024-35830</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35849.html">CVE-2024-35849</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35877.html">CVE-2024-35877</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35878.html">CVE-2024-35878</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35887.html">CVE-2024-35887</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35895.html">CVE-2024-35895</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35914.html">CVE-2024-35914</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35932.html">CVE-2024-35932</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35935.html">CVE-2024-35935</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35936.html">CVE-2024-35936</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35944.html">CVE-2024-35944</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35955.html">CVE-2024-35955</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35969.html">CVE-2024-35969</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35982.html">CVE-2024-35982</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36015.html">CVE-2024-36015</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36029.html">CVE-2024-36029</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36954.html">CVE-2024-36954</a> </li> </ul> </td> </tr> <tr> <th>CVSS scores:</th> <td> <ul class="list-group"> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46933</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46933</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46955</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47074</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47113</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47131</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47162</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47171</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47171</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47188</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47206</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47220</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47229</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47231</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47235</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47236</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47237</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47238</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47239</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47245</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47246</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47248</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47249</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47250</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47252</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">0.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47254</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47258</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47260</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47261</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47265</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47269</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47274</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47276</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47277</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47280</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47281</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47284</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47285</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47288</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47301</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47302</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47305</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47307</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47308</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47310</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47311</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47314</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47315</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47319</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47320</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47321</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47323</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47324</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47330</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47334</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.6</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47337</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47343</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47344</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47345</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47347</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47352</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47353</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47355</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47356</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47357</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47361</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47362</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47369</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47375</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47378</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47382</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47383</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47391</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47397</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47400</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47401</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47404</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47409</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47416</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47423</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47424</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47431</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47435</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47456</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47458</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47469</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47472</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">2.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47473</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47478</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47480</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47483</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47485</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47495</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47496</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47497</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47500</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47506</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47509</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47511</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47523</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47541</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47541</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47548</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.6</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47565</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48636</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48650</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48672</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48672</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48686</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48686</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48697</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48702</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.4</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48704</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48708</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48710</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-0160</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-0160</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-1829</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-1829</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-42755</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-42755</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-47233</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.3</span> <span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-47233</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.3</span> <span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52527</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52586</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52591</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52646</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52653</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52664</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52685</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52686</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52691</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52696</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52698</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52703</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52730</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52732</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52741</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52742</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52747</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52759</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52774</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52781</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.3</span> <span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52796</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52803</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52821</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52821</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52864</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52865</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52867</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52875</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52880</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-0639</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-0639</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26625</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26739</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26752</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26775</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26791</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26828</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.3</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26846</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26874</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26876</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26900</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26900</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26915</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26921</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26929</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26929</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26930</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26930</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26931</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26934</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26934</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26957</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26958</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26984</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26996</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27008</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27054</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27059</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27062</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27388</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27396</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27398</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27401</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.6</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27419</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">2.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27436</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35789</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35791</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35809</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35811</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35830</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35849</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35877</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35878</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35887</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35895</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35914</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35932</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35935</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35936</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35944</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35955</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35969</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35982</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35982</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36015</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36029</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36954</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> </ul> </td> </tr> <tr> <th>Affected Products:</th> <td> <ul class="list-group"> <li class="list-group-item">SUSE Linux Enterprise High Availability Extension 12 SP5</li> <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 12 SP5</li> <li class="list-group-item">SUSE Linux Enterprise Live Patching 12-SP5</li> <li class="list-group-item">SUSE Linux Enterprise Server 12 SP5</li> <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 12 SP5</li> <li class="list-group-item">SUSE Linux Enterprise Software Development Kit 12 SP5</li> <li class="list-group-item">SUSE Linux Enterprise Workstation Extension 12 12-SP5</li> </ul> </td> </tr> </tbody> </table>
<p>An update that solves 198 vulnerabilities and has 28 security fixes can now be installed.</p>
<h2>Description:</h2> <p>The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.</p> <p>The following security bugs were fixed:</p> <ul> <li>CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).</li> <li>CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220513).</li> <li>CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854).</li> <li>CVE-2021-47113: Abort btrfs rename_exchange if we fail to insert the second ref (bsc#1221543).</li> <li>CVE-2021-47131: Fixed a use-after-free after the TLS device goes down and up (bsc#1221545).</li> <li>CVE-2021-47206: Check return value after calling platform_get_resource() (bsc#1222894).</li> <li>CVE-2021-47238: Fixed memory leak in ip_mc_add1_src (bsc#1224847)</li> <li>CVE-2021-47245: Fixed out of bounds when parsing TCP options (bsc#1224838)</li> <li>CVE-2021-47246: Fixed page reclaim for dead peer hairpin (CVE-2021-47246 bsc#1224831).</li> <li>CVE-2021-47249: Fixed memory leak in rds_recvmsg (bsc#1224880)</li> <li>CVE-2021-47250: Fixed memory leak in netlbl_cipsov4_add_std (bsc#1224827)</li> <li>CVE-2021-47265: Verify port when creating flow rule (bsc#1224957)</li> <li>CVE-2021-47277: Avoid speculation-based attacks from out-of-range memslot accesses (bsc#1224960).</li> <li>CVE-2021-47281: Fixed race of snd_seq_timer_open() (bsc#1224983).</li> <li>CVE-2021-47334: Fixed two use after free in ibmasm_init_one (bsc#1225112).</li> <li>CVE-2021-47352: Add validation for used length (bsc#1225124).</li> <li>CVE-2021-47355: Fixed possible use-after-free in nicstar_cleanup() (bsc#1225141).</li> <li>CVE-2021-47357: Fixed possible use-after-free in ia_module_exit() (bsc#1225144).</li> <li>CVE-2021-47361: Fixed error handling in mcb_alloc_bus() (bsc#1225151).</li> <li>CVE-2021-47362: Update intermediate power state for SI (bsc#1225153).</li> <li>CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201).</li> <li>CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225208).</li> <li>CVE-2021-47397: Break out if skb_header_pointer returns NULL in sctp_rcv_ootb (bsc#1225082)</li> <li>CVE-2021-47401: Fixed stack information leak (bsc#1225242).</li> <li>CVE-2021-47423: Fixed file release memory leak (bsc#1225366).</li> <li>CVE-2021-47431: Fixed gart.bo pin_count leak (bsc#1225390).</li> <li>CVE-2021-47469: Add SPI fix commit to be ignored (bsc#1225347)</li> <li>CVE-2021-47483: Fixed possible double-free in regcache_rbtree_exit() (bsc#1224907).</li> <li>CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)</li> <li>CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355).</li> <li>CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).</li> <li>CVE-2021-47509: Limit the period size to 16MB (bsc#1225409).</li> <li>CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).</li> <li>CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)</li> <li>CVE-2022-48672: Fixed off-by-one error in unflatten_dt_nodes() (CVE-2022-48672 bsc#1223931).</li> <li>CVE-2022-48686: Fixed UAF when detecting digest errors (bsc#1223948).</li> <li>CVE-2022-48697: Fixed a use-after-free (bsc#1223922). </li> <li>CVE-2022-48702: Fixed out of bounds access in snd_emu10k1_pcm_channel_alloc() (bsc#1223923).</li> <li>CVE-2022-48704: Add a force flush to delay work when radeon (bsc#1223932)</li> <li>CVE-2022-48708: Fixed potential NULL dereference (bsc#1224942).</li> <li>CVE-2022-48710: Fixed a possible null pointer dereference (bsc#1225230).</li> <li>CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).</li> <li>CVE-2023-42755: Check user supplied offsets (bsc#1215702).</li> <li>CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081).</li> <li>CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).</li> <li>CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).</li> <li>CVE-2023-52691: Fixed a double-free in si_dpm_init (bsc#1224607).</li> <li>CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621)</li> <li>CVE-2023-52730: Fixed possible resource leaks in some error paths (bsc#1224956).</li> <li>CVE-2023-52732: Blocklist the kclient when receiving corrupted snap trace (bsc#1225222).</li> <li>CVE-2023-52747: Restore allocated resources on failed copyout (bsc#1224931)</li> <li>CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).</li> <li>CVE-2023-52821: Fixed a possible null pointer dereference (bsc#1225022).</li> <li>CVE-2023-52864: Fixed opening of char device (bsc#1225132).</li> <li>CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086).</li> <li>CVE-2023-52867: Fixed possible buffer overflow (bsc#1225009).</li> <li>CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096).</li> <li>CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).</li> <li>CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)</li> <li>CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).</li> <li>CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)</li> <li>CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).</li> <li>CVE-2024-26846: Do not wait in vain when unloading module (bsc#1223023).</li> <li>CVE-2024-26874: Fixed a null pointer crash in (bsc#1223048)</li> <li>CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119).</li> <li>CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046).</li> <li>CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)</li> <li>CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).</li> <li>CVE-2024-26957: Fixed reference counting on zcrypt card objects (bsc#1223666).</li> <li>CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).</li> <li>CVE-2024-26984: Fixed instmem race condition around ptr stores (bsc#1223633)</li> <li>CVE-2024-26996: Fixed UAF ncm object at re-bind after usb ep transport error (bsc#1223752).</li> <li>CVE-2024-27008: Fixed out of bounds access (CVE-2024-27008 bsc#1223802).</li> <li>CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).</li> <li>CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).</li> <li>CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).</li> <li>CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181).</li> <li>CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759)</li> <li>CVE-2024-27436: Stop parsing channels bits when all channels are found (bsc#1224803).</li> <li>CVE-2024-35789: Check fast rx for non-4addr sta VLAN changes (bsc#1224749).</li> <li>CVE-2024-35791: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (bsc#1224725).</li> <li>CVE-2024-35809: Drain runtime-idle callbacks before driver removal (bsc#1224738).</li> <li>CVE-2024-35830: Register v4l2 async device only after successful setup (bsc#1224680).</li> <li>CVE-2024-35849: Fixed information leak in btrfs_ioctl_logical_to_ino() (bsc#1224733).</li> <li>CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).</li> <li>CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671).</li> <li>CVE-2024-35887: Fixed use-after-free bugs caused by ax25_ds_del_timer (bsc#1224663)</li> <li>CVE-2024-35932: Do not check if plane->state->fb == state->fb (bsc#1224650).</li> <li>CVE-2024-35935: Handle path ref underflow in header iterate_inode_ref() (bsc#1224645)</li> <li>CVE-2024-35936: Add missing mutex_unlock in btrfs_relocate_sys_chunks() (bsc#1224644)</li> <li>CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648).</li> <li>CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580).</li> <li>CVE-2024-35982: Avoid infinite loop trying to resize local TT (bsc#1224566)</li> <li>CVE-2024-36029: Prevent access to suspended controller (bsc#1225708)</li> </ul> <p>The following non-security bugs were fixed:</p> <ul> <li>af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384).</li> <li>af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).</li> <li>af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).</li> <li>ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).</li> <li>assoc_array: Fix BUG_ON during garbage collect.</li> <li>autofs: fix a leak in autofs_expire_indirect() (git-fixes)</li> <li>Bluetooth: btusb: Some Qualcomm Bluetooth adapters stop working (git-fixes).</li> <li>btrfs: avoid null pointer dereference on fs_info when calling btrfs_crit (git-fixes)</li> <li>btrfs: check if root is readonly while setting security xattr (git-fixes)</li> <li>btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (git-fixes)</li> <li>btrfs: do not get an EINTR during drop_snapshot for reloc (git-fixes)</li> <li>btrfs: do not stop integrity writeback too early (git-fixes)</li> <li>btrfs: Explicitly handle btrfs_update_root failure (git-fixes)</li> <li>btrfs: fail mount when sb flag is not in BTRFS_SUPER_FLAG_SUPP (git-fixes)</li> <li>btrfs: fix btrfs_prev_leaf() to not return the same key twice (git-fixes)</li> <li>btrfs: fix deadlock when writing out space cache (git-fixes)</li> <li>Btrfs: fix incorrect {node,sector}size endianness from BTRFS_IOC_FS_INFO (git-fixes)</li> <li>btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes)</li> <li>btrfs: fix lost error handling when looking up extended ref on log replay (git-fixes)</li> <li>btrfs: Fix NULL pointer exception in find_bio_stripe (git-fixes)</li> <li>btrfs: Fix out of bounds access in btrfs_search_slot (git-fixes)</li> <li>btrfs: fix race when deleting quota root from the dirty cow roots list (git-fixes)</li> <li>btrfs: fix range_end calculation in extent_write_locked_range (git-fixes)</li> <li>btrfs: fix return value mixup in btrfs_get_extent (git-fixes)</li> <li>btrfs: fix unaligned access in readdir (git-fixes)</li> <li>btrfs: limit device extents to the device size (git-fixes)</li> <li>btrfs: prevent to set invalid default subvolid (git-fixes)</li> <li>btrfs: record delayed inode root in transaction (git-fixes)</li> <li>btrfs: scrub: reject unsupported scrub flags (git-fixes)</li> <li>btrfs: send: ensure send_fd is writable (git-fixes)</li> <li>btrfs: send: in case of IO error log it (git-fixes)</li> <li>btrfs: send: limit number of clones and allocated memory size (git-fixes)</li> <li>btrfs: sysfs: use NOFS for device creation (git-fixes) Adjustment: add #include</li> <li>btrfs: tree-checker: add missing return after error in root_item (git-fixes)</li> <li>btrfs: tree-checker: add missing returns after data_ref alignment checks (git-fixes)</li> <li>btrfs: tree-checker: do not error out if extent ref hash does not match (git-fixes)</li> <li>btrfs: tree-checker: fix inline ref size in error messages (git-fixes)</li> <li>btrfs: tree-checker: Fix misleading group system information (git-fixes)</li> <li>btrfs: undo writable superblocke when sprouting fails (git-fixes)</li> <li>btrfs: validate qgroup inherit for SNAP_CREATE_V2 ioctl (git-fixes)</li> <li>ecryptfs: fix a memory leak bug in ecryptfs_init_messaging() (git-fixes)</li> <li>ecryptfs: fix a memory leak bug in parse_tag_1_packet() (git-fixes)</li> <li>ecryptfs: fix kernel panic with null dev_name (git-fixes)</li> <li>ecryptfs: Fix typo in message (git-fixes)</li> <li>ep_create_wakeup_source(): dentry name can change under you (git-fixes)</li> <li>exportfs_decode_fh(): negative pinned may become positive without the parent locked (git-fixes)</li> <li>fscrypt: clean up some BUG_ON()s in block encryption/decryption (git-fixes)</li> <li>fs/proc/proc_sysctl.c: fix the default values of i_uid/i_gid on /proc/sys inodes (git-fixes)</li> <li>ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() (git-fixes).</li> <li>ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() (git-fixes).</li> <li>kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).</li> <li>KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1225059).</li> <li>l2tp: pass correct message length to ip6_append_data (git-fixes).</li> <li>lib/mpi: use kcalloc in mpi_resize (git-fixes).</li> <li>list: fix a data-race around ep->rdllist (git-fixes).</li> <li>livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539).</li> <li>mass-cve: Add convenience KBUILD_USER environment variable</li> <li>mass-cve: Always use bash in Makefile Some constrcts are just too convenient to leave them in favor of POSIX'd /bin/sh. Switch to explicit bash.</li> <li>mass-cve: Fail early without data files curl >$@ would create/update the file even if download fails. Use explicit argument to prevent continuation with empty cve2bugzilla file.</li> <li>mass-cve: Fix update detection with packed-refs Per-branch files are thing of the past, git may non-deterministically pack the ref files. Therefore use the timestamp of the whole packed-ref file (better false positive detection of update than breakage or false negative). Add unified approach to read packed-refs regardless of KSOURCE_GIT worktree or not.</li> <li>mass-cve: Make BRANCH mandatory</li> <li>mass-cve: Use dedicated worktree for reference updates So that any checkout in KSOURCE_GIT is not changed.</li> <li>net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes).</li> <li>netfilter: nf_queue: augment nfqa_cfg_policy (git-fixes).</li> <li>netfilter: nft_compat: explicitly reject ERROR and standard target (git-fixes).</li> <li>netfilter: x_tables: set module owner for icmp(6) matches (git-fixes).</li> <li>net/smc: fix fallback failed while sendmsg with fastopen (git-fixes).</li> <li>net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes).</li> <li>net/tls: Remove the context from the list in tls_device_down (bsc#1221545).</li> <li>net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).</li> <li>net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).</li> <li>net: usb: sr9700: stop lying about skb->truesize (git-fixes).</li> <li>net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).</li> <li>nfc: change order inside nfc_se_io error path (git-fixes).</li> <li>powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).</li> <li>ppdev: Add an error check in register_device (git-fixes).</li> <li>printk: Disable passing console lock owner completely during panic() (bsc#1197894).</li> <li>printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1223969).</li> <li>rds: avoid unenecessary cong_update in loop transport (git-fixes).</li> <li>rds: ib: Fix missing call to rds_ib_dev_put in rds_ib_setup_qp (git-fixes).</li> <li>ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes).</li> <li>ring-buffer: Fix a race between readers and resize checks (bsc#1222893).</li> <li>rxrpc: Do not put crypto buffers on the stack (git-fixes).</li> <li>rxrpc: Fix a memory leak in rxkad_verify_response() (git-fixes).</li> <li>rxrpc: Provide a different lockdep key for call->user_mutex for kernel calls (git-fixes).</li> <li>rxrpc: The mutex lock returned by rxrpc_accept_call() needs releasing (git-fixes).</li> <li>rxrpc: Work around usercopy check (git-fixes).</li> <li>s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224347).</li> <li>s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1225062).</li> <li>scripts/check-kernel-fix: add -F parameter</li> <li>scripts/check-kernel-fix: avoid rechecking child branches when parents are OK Topological sorted dependency tree allows to optimize check-kernel-fixe in cases where parent already has the fix. There is not reason to check branches which merge from that branch as they will get the fix eventually.</li> <li>scripts/check-kernel-fix: print a message when no action is needed. Script exits without printing anything about the actions necessary in non-verbose mode. This can be confusing to a beginner user.</li> <li>scripts/common-functions: for_each_build_branch traverse branches in dependency topo sorted list</li> <li>scripts/common-functions: There are cases where Fixes tag is incorrect. Example would be bsc1223062 comment 3.</li> <li>scripts/cve_tools: Update README Issue was fixed in ad3235427c3</li> <li>scripts/git_sort/git_sort.py: add rafael/linux-pm.git#linux-next to remotes</li> <li>scripts/log2: Fix References: update detection The following change -REferences: git-fixes +REferences: git-fixes bsc#123456 (note the typo in E) will not be detected as a reference update and generates a commit message like </li> <li>scripts/PMU: Always use 12 digits for abbreviated hash references Kernel developers tend to use 12 digits for abbreviated hash references as this is mandatory for upstream work. Enforce this count in PMU for consistency.</li> <li>tcp: tcp_make_synack() can be called from process context (git-fixes).</li> <li>tls: Fix context leak on tls_device_down (bsc#1221545).</li> <li>tracing: Fix blocked reader of snapshot buffer (git-fixes).</li> <li>tracing: hide unused ftrace_event_id_fops (git-fixes).</li> <li>tracing: Use .flush() call to wake up readers (git-fixes).</li> <li>tracing: Use strncpy instead of memcpy when copying comm in trace.c (git-fixes).</li> <li>tty/sysrq: replace smp_processor_id() with get_cpu() (bsc#1223540).</li> <li>usb: aqc111: stop lying about skb->truesize (git-fixes).</li> <li>wifi: cfg80211: avoid leaking stack data into trace (git-fixes).</li> <li>wifi: radiotap: fix kernel-doc notation warnings (git-fixes).</li> </ul>
<h2>Special Instructions and Notes:</h2> <ul> <li>Please reboot the system after installing this update.</li> </ul>
<h2>Patch Instructions:</h2> <p> To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product: </p> <ul class="list-group"> <li class="list-group-item"> SUSE Linux Enterprise Server for SAP Applications 12 SP5 <br/> <code>zypper in -t patch SUSE-SLE-HA-12-SP5-2024-2184=1 SUSE-SLE-SERVER-12-SP5-2024-2184=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise High Availability Extension 12 SP5 <br/> <code>zypper in -t patch SUSE-SLE-HA-12-SP5-2024-2184=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Live Patching 12-SP5 <br/> <code>zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-2184=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Software Development Kit 12 SP5 <br/> <code>zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-2184=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise High Performance Computing 12 SP5 <br/> <code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2184=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Server 12 SP5 <br/> <code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2184=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Workstation Extension 12 12-SP5 <br/> <code>zypper in -t patch SUSE-SLE-WE-12-SP5-2024-2184=1</code> </li> </ul>
<h2>Package List:</h2> <ul> <li> SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) <ul> <li>kernel-default-base-debuginfo-4.12.14-122.219.1</li> <li>kernel-default-base-4.12.14-122.219.1</li> <li>ocfs2-kmp-default-4.12.14-122.219.1</li> <li>gfs2-kmp-default-debuginfo-4.12.14-122.219.1</li> <li>dlm-kmp-default-debuginfo-4.12.14-122.219.1</li> <li>kernel-syms-4.12.14-122.219.1</li> <li>cluster-md-kmp-default-4.12.14-122.219.1</li> <li>kernel-default-debugsource-4.12.14-122.219.1</li> <li>dlm-kmp-default-4.12.14-122.219.1</li> <li>kernel-default-devel-4.12.14-122.219.1</li> <li>cluster-md-kmp-default-debuginfo-4.12.14-122.219.1</li> <li>ocfs2-kmp-default-debuginfo-4.12.14-122.219.1</li> <li>kernel-default-debuginfo-4.12.14-122.219.1</li> <li>gfs2-kmp-default-4.12.14-122.219.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc ppc64le x86_64) <ul> <li>kernel-default-4.12.14-122.219.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) <ul> <li>kernel-macros-4.12.14-122.219.1</li> <li>kernel-source-4.12.14-122.219.1</li> <li>kernel-devel-4.12.14-122.219.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) <ul> <li>kernel-default-devel-debuginfo-4.12.14-122.219.1</li> </ul> </li> <li> SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x x86_64) <ul> <li>ocfs2-kmp-default-4.12.14-122.219.1</li> <li>gfs2-kmp-default-debuginfo-4.12.14-122.219.1</li> <li>dlm-kmp-default-debuginfo-4.12.14-122.219.1</li> <li>cluster-md-kmp-default-4.12.14-122.219.1</li> <li>kernel-default-debugsource-4.12.14-122.219.1</li> <li>dlm-kmp-default-4.12.14-122.219.1</li> <li>cluster-md-kmp-default-debuginfo-4.12.14-122.219.1</li> <li>ocfs2-kmp-default-debuginfo-4.12.14-122.219.1</li> <li>kernel-default-debuginfo-4.12.14-122.219.1</li> <li>gfs2-kmp-default-4.12.14-122.219.1</li> </ul> </li> <li> SUSE Linux Enterprise High Availability Extension 12 SP5 (nosrc) <ul> <li>kernel-default-4.12.14-122.219.1</li> </ul> </li> <li> SUSE Linux Enterprise Live Patching 12-SP5 (nosrc) <ul> <li>kernel-default-4.12.14-122.219.1</li> </ul> </li> <li> SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) <ul> <li>kernel-default-kgraft-4.12.14-122.219.1</li> <li>kernel-default-debugsource-4.12.14-122.219.1</li> <li>kernel-default-kgraft-devel-4.12.14-122.219.1</li> <li>kgraft-patch-4_12_14-122_219-default-1-8.3.1</li> <li>kernel-default-debuginfo-4.12.14-122.219.1</li> </ul> </li> <li> SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch nosrc) <ul> <li>kernel-docs-4.12.14-122.219.1</li> </ul> </li> <li> SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) <ul> <li>kernel-obs-build-4.12.14-122.219.1</li> <li>kernel-obs-build-debugsource-4.12.14-122.219.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 nosrc x86_64) <ul> <li>kernel-default-4.12.14-122.219.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) <ul> <li>kernel-default-base-debuginfo-4.12.14-122.219.1</li> <li>kernel-default-base-4.12.14-122.219.1</li> <li>kernel-syms-4.12.14-122.219.1</li> <li>kernel-default-debugsource-4.12.14-122.219.1</li> <li>kernel-default-devel-4.12.14-122.219.1</li> <li>kernel-default-debuginfo-4.12.14-122.219.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) <ul> <li>kernel-macros-4.12.14-122.219.1</li> <li>kernel-source-4.12.14-122.219.1</li> <li>kernel-devel-4.12.14-122.219.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) <ul> <li>kernel-default-devel-debuginfo-4.12.14-122.219.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64 nosrc) <ul> <li>kernel-default-4.12.14-122.219.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) <ul> <li>kernel-default-base-debuginfo-4.12.14-122.219.1</li> <li>kernel-default-base-4.12.14-122.219.1</li> <li>kernel-syms-4.12.14-122.219.1</li> <li>kernel-default-debugsource-4.12.14-122.219.1</li> <li>kernel-default-devel-4.12.14-122.219.1</li> <li>kernel-default-debuginfo-4.12.14-122.219.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 12 SP5 (noarch) <ul> <li>kernel-macros-4.12.14-122.219.1</li> <li>kernel-source-4.12.14-122.219.1</li> <li>kernel-devel-4.12.14-122.219.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 12 SP5 (s390x) <ul> <li>kernel-default-man-4.12.14-122.219.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 12 SP5 (x86_64) <ul> <li>kernel-default-devel-debuginfo-4.12.14-122.219.1</li> </ul> </li> <li> SUSE Linux Enterprise Workstation Extension 12 12-SP5 (nosrc) <ul> <li>kernel-default-4.12.14-122.219.1</li> </ul> </li> <li> SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64) <ul> <li>kernel-default-extra-debuginfo-4.12.14-122.219.1</li> <li>kernel-default-extra-4.12.14-122.219.1</li> <li>kernel-default-debuginfo-4.12.14-122.219.1</li> <li>kernel-default-debugsource-4.12.14-122.219.1</li> </ul> </li> </ul>
<h2>References:</h2> <ul> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46933.html">https://www.suse.com/security/cve/CVE-2021-46933.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46955.html">https://www.suse.com/security/cve/CVE-2021-46955.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47074.html">https://www.suse.com/security/cve/CVE-2021-47074.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47113.html">https://www.suse.com/security/cve/CVE-2021-47113.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47131.html">https://www.suse.com/security/cve/CVE-2021-47131.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47162.html">https://www.suse.com/security/cve/CVE-2021-47162.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47171.html">https://www.suse.com/security/cve/CVE-2021-47171.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47188.html">https://www.suse.com/security/cve/CVE-2021-47188.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47206.html">https://www.suse.com/security/cve/CVE-2021-47206.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47220.html">https://www.suse.com/security/cve/CVE-2021-47220.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47229.html">https://www.suse.com/security/cve/CVE-2021-47229.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47231.html">https://www.suse.com/security/cve/CVE-2021-47231.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47235.html">https://www.suse.com/security/cve/CVE-2021-47235.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47236.html">https://www.suse.com/security/cve/CVE-2021-47236.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47237.html">https://www.suse.com/security/cve/CVE-2021-47237.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47238.html">https://www.suse.com/security/cve/CVE-2021-47238.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47239.html">https://www.suse.com/security/cve/CVE-2021-47239.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47245.html">https://www.suse.com/security/cve/CVE-2021-47245.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47246.html">https://www.suse.com/security/cve/CVE-2021-47246.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47248.html">https://www.suse.com/security/cve/CVE-2021-47248.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47249.html">https://www.suse.com/security/cve/CVE-2021-47249.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47250.html">https://www.suse.com/security/cve/CVE-2021-47250.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47252.html">https://www.suse.com/security/cve/CVE-2021-47252.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47254.html">https://www.suse.com/security/cve/CVE-2021-47254.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47258.html">https://www.suse.com/security/cve/CVE-2021-47258.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47260.html">https://www.suse.com/security/cve/CVE-2021-47260.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47261.html">https://www.suse.com/security/cve/CVE-2021-47261.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47265.html">https://www.suse.com/security/cve/CVE-2021-47265.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47269.html">https://www.suse.com/security/cve/CVE-2021-47269.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47274.html">https://www.suse.com/security/cve/CVE-2021-47274.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47276.html">https://www.suse.com/security/cve/CVE-2021-47276.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47277.html">https://www.suse.com/security/cve/CVE-2021-47277.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47280.html">https://www.suse.com/security/cve/CVE-2021-47280.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47281.html">https://www.suse.com/security/cve/CVE-2021-47281.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47284.html">https://www.suse.com/security/cve/CVE-2021-47284.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47285.html">https://www.suse.com/security/cve/CVE-2021-47285.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47288.html">https://www.suse.com/security/cve/CVE-2021-47288.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47301.html">https://www.suse.com/security/cve/CVE-2021-47301.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47302.html">https://www.suse.com/security/cve/CVE-2021-47302.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47305.html">https://www.suse.com/security/cve/CVE-2021-47305.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47307.html">https://www.suse.com/security/cve/CVE-2021-47307.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47308.html">https://www.suse.com/security/cve/CVE-2021-47308.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47310.html">https://www.suse.com/security/cve/CVE-2021-47310.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47311.html">https://www.suse.com/security/cve/CVE-2021-47311.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47314.html">https://www.suse.com/security/cve/CVE-2021-47314.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47315.html">https://www.suse.com/security/cve/CVE-2021-47315.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47319.html">https://www.suse.com/security/cve/CVE-2021-47319.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47320.html">https://www.suse.com/security/cve/CVE-2021-47320.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47321.html">https://www.suse.com/security/cve/CVE-2021-47321.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47323.html">https://www.suse.com/security/cve/CVE-2021-47323.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47324.html">https://www.suse.com/security/cve/CVE-2021-47324.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47330.html">https://www.suse.com/security/cve/CVE-2021-47330.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47334.html">https://www.suse.com/security/cve/CVE-2021-47334.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47337.html">https://www.suse.com/security/cve/CVE-2021-47337.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47343.html">https://www.suse.com/security/cve/CVE-2021-47343.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47344.html">https://www.suse.com/security/cve/CVE-2021-47344.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47345.html">https://www.suse.com/security/cve/CVE-2021-47345.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47347.html">https://www.suse.com/security/cve/CVE-2021-47347.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47352.html">https://www.suse.com/security/cve/CVE-2021-47352.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47353.html">https://www.suse.com/security/cve/CVE-2021-47353.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47355.html">https://www.suse.com/security/cve/CVE-2021-47355.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47356.html">https://www.suse.com/security/cve/CVE-2021-47356.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47357.html">https://www.suse.com/security/cve/CVE-2021-47357.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47361.html">https://www.suse.com/security/cve/CVE-2021-47361.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47362.html">https://www.suse.com/security/cve/CVE-2021-47362.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47369.html">https://www.suse.com/security/cve/CVE-2021-47369.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47375.html">https://www.suse.com/security/cve/CVE-2021-47375.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47378.html">https://www.suse.com/security/cve/CVE-2021-47378.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47382.html">https://www.suse.com/security/cve/CVE-2021-47382.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47383.html">https://www.suse.com/security/cve/CVE-2021-47383.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47391.html">https://www.suse.com/security/cve/CVE-2021-47391.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47397.html">https://www.suse.com/security/cve/CVE-2021-47397.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47400.html">https://www.suse.com/security/cve/CVE-2021-47400.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47401.html">https://www.suse.com/security/cve/CVE-2021-47401.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47404.html">https://www.suse.com/security/cve/CVE-2021-47404.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47409.html">https://www.suse.com/security/cve/CVE-2021-47409.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47416.html">https://www.suse.com/security/cve/CVE-2021-47416.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47423.html">https://www.suse.com/security/cve/CVE-2021-47423.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47424.html">https://www.suse.com/security/cve/CVE-2021-47424.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47431.html">https://www.suse.com/security/cve/CVE-2021-47431.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47435.html">https://www.suse.com/security/cve/CVE-2021-47435.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47436.html">https://www.suse.com/security/cve/CVE-2021-47436.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47456.html">https://www.suse.com/security/cve/CVE-2021-47456.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47458.html">https://www.suse.com/security/cve/CVE-2021-47458.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47460.html">https://www.suse.com/security/cve/CVE-2021-47460.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47469.html">https://www.suse.com/security/cve/CVE-2021-47469.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47472.html">https://www.suse.com/security/cve/CVE-2021-47472.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47473.html">https://www.suse.com/security/cve/CVE-2021-47473.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47478.html">https://www.suse.com/security/cve/CVE-2021-47478.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47480.html">https://www.suse.com/security/cve/CVE-2021-47480.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47483.html">https://www.suse.com/security/cve/CVE-2021-47483.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47485.html">https://www.suse.com/security/cve/CVE-2021-47485.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47495.html">https://www.suse.com/security/cve/CVE-2021-47495.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47496.html">https://www.suse.com/security/cve/CVE-2021-47496.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47497.html">https://www.suse.com/security/cve/CVE-2021-47497.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47500.html">https://www.suse.com/security/cve/CVE-2021-47500.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47506.html">https://www.suse.com/security/cve/CVE-2021-47506.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47509.html">https://www.suse.com/security/cve/CVE-2021-47509.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47511.html">https://www.suse.com/security/cve/CVE-2021-47511.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47523.html">https://www.suse.com/security/cve/CVE-2021-47523.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47541.html">https://www.suse.com/security/cve/CVE-2021-47541.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47548.html">https://www.suse.com/security/cve/CVE-2021-47548.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47565.html">https://www.suse.com/security/cve/CVE-2021-47565.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48636.html">https://www.suse.com/security/cve/CVE-2022-48636.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48650.html">https://www.suse.com/security/cve/CVE-2022-48650.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48672.html">https://www.suse.com/security/cve/CVE-2022-48672.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48686.html">https://www.suse.com/security/cve/CVE-2022-48686.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48697.html">https://www.suse.com/security/cve/CVE-2022-48697.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48702.html">https://www.suse.com/security/cve/CVE-2022-48702.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48704.html">https://www.suse.com/security/cve/CVE-2022-48704.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48708.html">https://www.suse.com/security/cve/CVE-2022-48708.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48710.html">https://www.suse.com/security/cve/CVE-2022-48710.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-0160.html">https://www.suse.com/security/cve/CVE-2023-0160.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-1829.html">https://www.suse.com/security/cve/CVE-2023-1829.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-42755.html">https://www.suse.com/security/cve/CVE-2023-42755.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-47233.html">https://www.suse.com/security/cve/CVE-2023-47233.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52527.html">https://www.suse.com/security/cve/CVE-2023-52527.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52586.html">https://www.suse.com/security/cve/CVE-2023-52586.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52591.html">https://www.suse.com/security/cve/CVE-2023-52591.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52646.html">https://www.suse.com/security/cve/CVE-2023-52646.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52653.html">https://www.suse.com/security/cve/CVE-2023-52653.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52655.html">https://www.suse.com/security/cve/CVE-2023-52655.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52664.html">https://www.suse.com/security/cve/CVE-2023-52664.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52685.html">https://www.suse.com/security/cve/CVE-2023-52685.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52686.html">https://www.suse.com/security/cve/CVE-2023-52686.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52691.html">https://www.suse.com/security/cve/CVE-2023-52691.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52696.html">https://www.suse.com/security/cve/CVE-2023-52696.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52698.html">https://www.suse.com/security/cve/CVE-2023-52698.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52703.html">https://www.suse.com/security/cve/CVE-2023-52703.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52730.html">https://www.suse.com/security/cve/CVE-2023-52730.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52732.html">https://www.suse.com/security/cve/CVE-2023-52732.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52741.html">https://www.suse.com/security/cve/CVE-2023-52741.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52742.html">https://www.suse.com/security/cve/CVE-2023-52742.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52747.html">https://www.suse.com/security/cve/CVE-2023-52747.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52759.html">https://www.suse.com/security/cve/CVE-2023-52759.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52774.html">https://www.suse.com/security/cve/CVE-2023-52774.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52781.html">https://www.suse.com/security/cve/CVE-2023-52781.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52796.html">https://www.suse.com/security/cve/CVE-2023-52796.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52803.html">https://www.suse.com/security/cve/CVE-2023-52803.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52821.html">https://www.suse.com/security/cve/CVE-2023-52821.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52864.html">https://www.suse.com/security/cve/CVE-2023-52864.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52865.html">https://www.suse.com/security/cve/CVE-2023-52865.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52867.html">https://www.suse.com/security/cve/CVE-2023-52867.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52875.html">https://www.suse.com/security/cve/CVE-2023-52875.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52880.html">https://www.suse.com/security/cve/CVE-2023-52880.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-0639.html">https://www.suse.com/security/cve/CVE-2024-0639.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26625.html">https://www.suse.com/security/cve/CVE-2024-26625.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26739.html">https://www.suse.com/security/cve/CVE-2024-26739.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26752.html">https://www.suse.com/security/cve/CVE-2024-26752.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26775.html">https://www.suse.com/security/cve/CVE-2024-26775.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26791.html">https://www.suse.com/security/cve/CVE-2024-26791.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26828.html">https://www.suse.com/security/cve/CVE-2024-26828.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26846.html">https://www.suse.com/security/cve/CVE-2024-26846.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26874.html">https://www.suse.com/security/cve/CVE-2024-26874.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26876.html">https://www.suse.com/security/cve/CVE-2024-26876.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26900.html">https://www.suse.com/security/cve/CVE-2024-26900.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26915.html">https://www.suse.com/security/cve/CVE-2024-26915.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26920.html">https://www.suse.com/security/cve/CVE-2024-26920.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26921.html">https://www.suse.com/security/cve/CVE-2024-26921.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26929.html">https://www.suse.com/security/cve/CVE-2024-26929.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26930.html">https://www.suse.com/security/cve/CVE-2024-26930.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26931.html">https://www.suse.com/security/cve/CVE-2024-26931.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26934.html">https://www.suse.com/security/cve/CVE-2024-26934.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26957.html">https://www.suse.com/security/cve/CVE-2024-26957.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26958.html">https://www.suse.com/security/cve/CVE-2024-26958.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26984.html">https://www.suse.com/security/cve/CVE-2024-26984.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26996.html">https://www.suse.com/security/cve/CVE-2024-26996.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27008.html">https://www.suse.com/security/cve/CVE-2024-27008.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27054.html">https://www.suse.com/security/cve/CVE-2024-27054.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27059.html">https://www.suse.com/security/cve/CVE-2024-27059.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27062.html">https://www.suse.com/security/cve/CVE-2024-27062.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27388.html">https://www.suse.com/security/cve/CVE-2024-27388.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27396.html">https://www.suse.com/security/cve/CVE-2024-27396.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27398.html">https://www.suse.com/security/cve/CVE-2024-27398.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27401.html">https://www.suse.com/security/cve/CVE-2024-27401.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27419.html">https://www.suse.com/security/cve/CVE-2024-27419.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27436.html">https://www.suse.com/security/cve/CVE-2024-27436.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35789.html">https://www.suse.com/security/cve/CVE-2024-35789.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35791.html">https://www.suse.com/security/cve/CVE-2024-35791.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35809.html">https://www.suse.com/security/cve/CVE-2024-35809.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35811.html">https://www.suse.com/security/cve/CVE-2024-35811.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35830.html">https://www.suse.com/security/cve/CVE-2024-35830.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35849.html">https://www.suse.com/security/cve/CVE-2024-35849.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35877.html">https://www.suse.com/security/cve/CVE-2024-35877.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35878.html">https://www.suse.com/security/cve/CVE-2024-35878.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35887.html">https://www.suse.com/security/cve/CVE-2024-35887.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35895.html">https://www.suse.com/security/cve/CVE-2024-35895.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35914.html">https://www.suse.com/security/cve/CVE-2024-35914.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35932.html">https://www.suse.com/security/cve/CVE-2024-35932.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35935.html">https://www.suse.com/security/cve/CVE-2024-35935.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35936.html">https://www.suse.com/security/cve/CVE-2024-35936.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35944.html">https://www.suse.com/security/cve/CVE-2024-35944.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35955.html">https://www.suse.com/security/cve/CVE-2024-35955.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35969.html">https://www.suse.com/security/cve/CVE-2024-35969.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35982.html">https://www.suse.com/security/cve/CVE-2024-35982.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36015.html">https://www.suse.com/security/cve/CVE-2024-36015.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36029.html">https://www.suse.com/security/cve/CVE-2024-36029.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36954.html">https://www.suse.com/security/cve/CVE-2024-36954.html</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1065729">https://bugzilla.suse.com/show_bug.cgi?id=1065729</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1101816">https://bugzilla.suse.com/show_bug.cgi?id=1101816</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1141539">https://bugzilla.suse.com/show_bug.cgi?id=1141539</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1181674">https://bugzilla.suse.com/show_bug.cgi?id=1181674</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1185902">https://bugzilla.suse.com/show_bug.cgi?id=1185902</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1187716">https://bugzilla.suse.com/show_bug.cgi?id=1187716</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1188616">https://bugzilla.suse.com/show_bug.cgi?id=1188616</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1190317">https://bugzilla.suse.com/show_bug.cgi?id=1190317</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1190795">https://bugzilla.suse.com/show_bug.cgi?id=1190795</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1191452">https://bugzilla.suse.com/show_bug.cgi?id=1191452</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1194591">https://bugzilla.suse.com/show_bug.cgi?id=1194591</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1197760">https://bugzilla.suse.com/show_bug.cgi?id=1197760</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1197894">https://bugzilla.suse.com/show_bug.cgi?id=1197894</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1203935">https://bugzilla.suse.com/show_bug.cgi?id=1203935</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1206213">https://bugzilla.suse.com/show_bug.cgi?id=1206213</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1206646">https://bugzilla.suse.com/show_bug.cgi?id=1206646</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1207186">https://bugzilla.suse.com/show_bug.cgi?id=1207186</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209657">https://bugzilla.suse.com/show_bug.cgi?id=1209657</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210335">https://bugzilla.suse.com/show_bug.cgi?id=1210335</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215702">https://bugzilla.suse.com/show_bug.cgi?id=1215702</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216702">https://bugzilla.suse.com/show_bug.cgi?id=1216702</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217169">https://bugzilla.suse.com/show_bug.cgi?id=1217169</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217519">https://bugzilla.suse.com/show_bug.cgi?id=1217519</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218917">https://bugzilla.suse.com/show_bug.cgi?id=1218917</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220487">https://bugzilla.suse.com/show_bug.cgi?id=1220487</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220513">https://bugzilla.suse.com/show_bug.cgi?id=1220513</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220854">https://bugzilla.suse.com/show_bug.cgi?id=1220854</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220928">https://bugzilla.suse.com/show_bug.cgi?id=1220928</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221044">https://bugzilla.suse.com/show_bug.cgi?id=1221044</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221081">https://bugzilla.suse.com/show_bug.cgi?id=1221081</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221086">https://bugzilla.suse.com/show_bug.cgi?id=1221086</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221543">https://bugzilla.suse.com/show_bug.cgi?id=1221543</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221545">https://bugzilla.suse.com/show_bug.cgi?id=1221545</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221816">https://bugzilla.suse.com/show_bug.cgi?id=1221816</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221977">https://bugzilla.suse.com/show_bug.cgi?id=1221977</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221994">https://bugzilla.suse.com/show_bug.cgi?id=1221994</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222559">https://bugzilla.suse.com/show_bug.cgi?id=1222559</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222619">https://bugzilla.suse.com/show_bug.cgi?id=1222619</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222627">https://bugzilla.suse.com/show_bug.cgi?id=1222627</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222667">https://bugzilla.suse.com/show_bug.cgi?id=1222667</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222671">https://bugzilla.suse.com/show_bug.cgi?id=1222671</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222793">https://bugzilla.suse.com/show_bug.cgi?id=1222793</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222893">https://bugzilla.suse.com/show_bug.cgi?id=1222893</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222894">https://bugzilla.suse.com/show_bug.cgi?id=1222894</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223023">https://bugzilla.suse.com/show_bug.cgi?id=1223023</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223046">https://bugzilla.suse.com/show_bug.cgi?id=1223046</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223048">https://bugzilla.suse.com/show_bug.cgi?id=1223048</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223062">https://bugzilla.suse.com/show_bug.cgi?id=1223062</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223084">https://bugzilla.suse.com/show_bug.cgi?id=1223084</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223119">https://bugzilla.suse.com/show_bug.cgi?id=1223119</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223138">https://bugzilla.suse.com/show_bug.cgi?id=1223138</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223207">https://bugzilla.suse.com/show_bug.cgi?id=1223207</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223360">https://bugzilla.suse.com/show_bug.cgi?id=1223360</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223384">https://bugzilla.suse.com/show_bug.cgi?id=1223384</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223432">https://bugzilla.suse.com/show_bug.cgi?id=1223432</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223509">https://bugzilla.suse.com/show_bug.cgi?id=1223509</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223512">https://bugzilla.suse.com/show_bug.cgi?id=1223512</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223539">https://bugzilla.suse.com/show_bug.cgi?id=1223539</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223540">https://bugzilla.suse.com/show_bug.cgi?id=1223540</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223626">https://bugzilla.suse.com/show_bug.cgi?id=1223626</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223627">https://bugzilla.suse.com/show_bug.cgi?id=1223627</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223633">https://bugzilla.suse.com/show_bug.cgi?id=1223633</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223653">https://bugzilla.suse.com/show_bug.cgi?id=1223653</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223666">https://bugzilla.suse.com/show_bug.cgi?id=1223666</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223671">https://bugzilla.suse.com/show_bug.cgi?id=1223671</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223712">https://bugzilla.suse.com/show_bug.cgi?id=1223712</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223715">https://bugzilla.suse.com/show_bug.cgi?id=1223715</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223738">https://bugzilla.suse.com/show_bug.cgi?id=1223738</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223744">https://bugzilla.suse.com/show_bug.cgi?id=1223744</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223752">https://bugzilla.suse.com/show_bug.cgi?id=1223752</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223802">https://bugzilla.suse.com/show_bug.cgi?id=1223802</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223819">https://bugzilla.suse.com/show_bug.cgi?id=1223819</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223834">https://bugzilla.suse.com/show_bug.cgi?id=1223834</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223922">https://bugzilla.suse.com/show_bug.cgi?id=1223922</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223923">https://bugzilla.suse.com/show_bug.cgi?id=1223923</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223931">https://bugzilla.suse.com/show_bug.cgi?id=1223931</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223932">https://bugzilla.suse.com/show_bug.cgi?id=1223932</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223948">https://bugzilla.suse.com/show_bug.cgi?id=1223948</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223969">https://bugzilla.suse.com/show_bug.cgi?id=1223969</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224096">https://bugzilla.suse.com/show_bug.cgi?id=1224096</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224174">https://bugzilla.suse.com/show_bug.cgi?id=1224174</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224181">https://bugzilla.suse.com/show_bug.cgi?id=1224181</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224347">https://bugzilla.suse.com/show_bug.cgi?id=1224347</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224482">https://bugzilla.suse.com/show_bug.cgi?id=1224482</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224511">https://bugzilla.suse.com/show_bug.cgi?id=1224511</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224525">https://bugzilla.suse.com/show_bug.cgi?id=1224525</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224566">https://bugzilla.suse.com/show_bug.cgi?id=1224566</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224580">https://bugzilla.suse.com/show_bug.cgi?id=1224580</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224592">https://bugzilla.suse.com/show_bug.cgi?id=1224592</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224601">https://bugzilla.suse.com/show_bug.cgi?id=1224601</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224607">https://bugzilla.suse.com/show_bug.cgi?id=1224607</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224621">https://bugzilla.suse.com/show_bug.cgi?id=1224621</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224644">https://bugzilla.suse.com/show_bug.cgi?id=1224644</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224645">https://bugzilla.suse.com/show_bug.cgi?id=1224645</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224648">https://bugzilla.suse.com/show_bug.cgi?id=1224648</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224650">https://bugzilla.suse.com/show_bug.cgi?id=1224650</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224663">https://bugzilla.suse.com/show_bug.cgi?id=1224663</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224671">https://bugzilla.suse.com/show_bug.cgi?id=1224671</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224676">https://bugzilla.suse.com/show_bug.cgi?id=1224676</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224680">https://bugzilla.suse.com/show_bug.cgi?id=1224680</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224682">https://bugzilla.suse.com/show_bug.cgi?id=1224682</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224725">https://bugzilla.suse.com/show_bug.cgi?id=1224725</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224728">https://bugzilla.suse.com/show_bug.cgi?id=1224728</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224733">https://bugzilla.suse.com/show_bug.cgi?id=1224733</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224738">https://bugzilla.suse.com/show_bug.cgi?id=1224738</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224747">https://bugzilla.suse.com/show_bug.cgi?id=1224747</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224749">https://bugzilla.suse.com/show_bug.cgi?id=1224749</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224759">https://bugzilla.suse.com/show_bug.cgi?id=1224759</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224803">https://bugzilla.suse.com/show_bug.cgi?id=1224803</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224827">https://bugzilla.suse.com/show_bug.cgi?id=1224827</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224830">https://bugzilla.suse.com/show_bug.cgi?id=1224830</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224831">https://bugzilla.suse.com/show_bug.cgi?id=1224831</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224834">https://bugzilla.suse.com/show_bug.cgi?id=1224834</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224838">https://bugzilla.suse.com/show_bug.cgi?id=1224838</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224841">https://bugzilla.suse.com/show_bug.cgi?id=1224841</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224844">https://bugzilla.suse.com/show_bug.cgi?id=1224844</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224846">https://bugzilla.suse.com/show_bug.cgi?id=1224846</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224847">https://bugzilla.suse.com/show_bug.cgi?id=1224847</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224849">https://bugzilla.suse.com/show_bug.cgi?id=1224849</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224854">https://bugzilla.suse.com/show_bug.cgi?id=1224854</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224859">https://bugzilla.suse.com/show_bug.cgi?id=1224859</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224867">https://bugzilla.suse.com/show_bug.cgi?id=1224867</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224880">https://bugzilla.suse.com/show_bug.cgi?id=1224880</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224882">https://bugzilla.suse.com/show_bug.cgi?id=1224882</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224888">https://bugzilla.suse.com/show_bug.cgi?id=1224888</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224889">https://bugzilla.suse.com/show_bug.cgi?id=1224889</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224892">https://bugzilla.suse.com/show_bug.cgi?id=1224892</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224893">https://bugzilla.suse.com/show_bug.cgi?id=1224893</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224899">https://bugzilla.suse.com/show_bug.cgi?id=1224899</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224904">https://bugzilla.suse.com/show_bug.cgi?id=1224904</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224907">https://bugzilla.suse.com/show_bug.cgi?id=1224907</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224916">https://bugzilla.suse.com/show_bug.cgi?id=1224916</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224917">https://bugzilla.suse.com/show_bug.cgi?id=1224917</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224922">https://bugzilla.suse.com/show_bug.cgi?id=1224922</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224926">https://bugzilla.suse.com/show_bug.cgi?id=1224926</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224930">https://bugzilla.suse.com/show_bug.cgi?id=1224930</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224931">https://bugzilla.suse.com/show_bug.cgi?id=1224931</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224942">https://bugzilla.suse.com/show_bug.cgi?id=1224942</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224954">https://bugzilla.suse.com/show_bug.cgi?id=1224954</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224956">https://bugzilla.suse.com/show_bug.cgi?id=1224956</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224957">https://bugzilla.suse.com/show_bug.cgi?id=1224957</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224959">https://bugzilla.suse.com/show_bug.cgi?id=1224959</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224960">https://bugzilla.suse.com/show_bug.cgi?id=1224960</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224961">https://bugzilla.suse.com/show_bug.cgi?id=1224961</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224963">https://bugzilla.suse.com/show_bug.cgi?id=1224963</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224966">https://bugzilla.suse.com/show_bug.cgi?id=1224966</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224968">https://bugzilla.suse.com/show_bug.cgi?id=1224968</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224981">https://bugzilla.suse.com/show_bug.cgi?id=1224981</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224982">https://bugzilla.suse.com/show_bug.cgi?id=1224982</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224983">https://bugzilla.suse.com/show_bug.cgi?id=1224983</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224987">https://bugzilla.suse.com/show_bug.cgi?id=1224987</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224990">https://bugzilla.suse.com/show_bug.cgi?id=1224990</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224996">https://bugzilla.suse.com/show_bug.cgi?id=1224996</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225008">https://bugzilla.suse.com/show_bug.cgi?id=1225008</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225009">https://bugzilla.suse.com/show_bug.cgi?id=1225009</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225010">https://bugzilla.suse.com/show_bug.cgi?id=1225010</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225022">https://bugzilla.suse.com/show_bug.cgi?id=1225022</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225026">https://bugzilla.suse.com/show_bug.cgi?id=1225026</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225030">https://bugzilla.suse.com/show_bug.cgi?id=1225030</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225054">https://bugzilla.suse.com/show_bug.cgi?id=1225054</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225058">https://bugzilla.suse.com/show_bug.cgi?id=1225058</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225059">https://bugzilla.suse.com/show_bug.cgi?id=1225059</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225060">https://bugzilla.suse.com/show_bug.cgi?id=1225060</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225062">https://bugzilla.suse.com/show_bug.cgi?id=1225062</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225082">https://bugzilla.suse.com/show_bug.cgi?id=1225082</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225084">https://bugzilla.suse.com/show_bug.cgi?id=1225084</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225086">https://bugzilla.suse.com/show_bug.cgi?id=1225086</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225092">https://bugzilla.suse.com/show_bug.cgi?id=1225092</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225096">https://bugzilla.suse.com/show_bug.cgi?id=1225096</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225112">https://bugzilla.suse.com/show_bug.cgi?id=1225112</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225124">https://bugzilla.suse.com/show_bug.cgi?id=1225124</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225128">https://bugzilla.suse.com/show_bug.cgi?id=1225128</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225132">https://bugzilla.suse.com/show_bug.cgi?id=1225132</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225141">https://bugzilla.suse.com/show_bug.cgi?id=1225141</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225143">https://bugzilla.suse.com/show_bug.cgi?id=1225143</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225144">https://bugzilla.suse.com/show_bug.cgi?id=1225144</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225151">https://bugzilla.suse.com/show_bug.cgi?id=1225151</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225153">https://bugzilla.suse.com/show_bug.cgi?id=1225153</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225155">https://bugzilla.suse.com/show_bug.cgi?id=1225155</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225157">https://bugzilla.suse.com/show_bug.cgi?id=1225157</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225164">https://bugzilla.suse.com/show_bug.cgi?id=1225164</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225177">https://bugzilla.suse.com/show_bug.cgi?id=1225177</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225189">https://bugzilla.suse.com/show_bug.cgi?id=1225189</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225192">https://bugzilla.suse.com/show_bug.cgi?id=1225192</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225193">https://bugzilla.suse.com/show_bug.cgi?id=1225193</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225198">https://bugzilla.suse.com/show_bug.cgi?id=1225198</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225201">https://bugzilla.suse.com/show_bug.cgi?id=1225201</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225207">https://bugzilla.suse.com/show_bug.cgi?id=1225207</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225208">https://bugzilla.suse.com/show_bug.cgi?id=1225208</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225222">https://bugzilla.suse.com/show_bug.cgi?id=1225222</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225230">https://bugzilla.suse.com/show_bug.cgi?id=1225230</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225242">https://bugzilla.suse.com/show_bug.cgi?id=1225242</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225244">https://bugzilla.suse.com/show_bug.cgi?id=1225244</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225247">https://bugzilla.suse.com/show_bug.cgi?id=1225247</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225251">https://bugzilla.suse.com/show_bug.cgi?id=1225251</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225252">https://bugzilla.suse.com/show_bug.cgi?id=1225252</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225256">https://bugzilla.suse.com/show_bug.cgi?id=1225256</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225303">https://bugzilla.suse.com/show_bug.cgi?id=1225303</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225318">https://bugzilla.suse.com/show_bug.cgi?id=1225318</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225322">https://bugzilla.suse.com/show_bug.cgi?id=1225322</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225329">https://bugzilla.suse.com/show_bug.cgi?id=1225329</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225330">https://bugzilla.suse.com/show_bug.cgi?id=1225330</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225336">https://bugzilla.suse.com/show_bug.cgi?id=1225336</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225347">https://bugzilla.suse.com/show_bug.cgi?id=1225347</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225351">https://bugzilla.suse.com/show_bug.cgi?id=1225351</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225354">https://bugzilla.suse.com/show_bug.cgi?id=1225354</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225355">https://bugzilla.suse.com/show_bug.cgi?id=1225355</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225360">https://bugzilla.suse.com/show_bug.cgi?id=1225360</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225366">https://bugzilla.suse.com/show_bug.cgi?id=1225366</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225367">https://bugzilla.suse.com/show_bug.cgi?id=1225367</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225384">https://bugzilla.suse.com/show_bug.cgi?id=1225384</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225390">https://bugzilla.suse.com/show_bug.cgi?id=1225390</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225404">https://bugzilla.suse.com/show_bug.cgi?id=1225404</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225409">https://bugzilla.suse.com/show_bug.cgi?id=1225409</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225411">https://bugzilla.suse.com/show_bug.cgi?id=1225411</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225438">https://bugzilla.suse.com/show_bug.cgi?id=1225438</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225453">https://bugzilla.suse.com/show_bug.cgi?id=1225453</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225479">https://bugzilla.suse.com/show_bug.cgi?id=1225479</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225482">https://bugzilla.suse.com/show_bug.cgi?id=1225482</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225506">https://bugzilla.suse.com/show_bug.cgi?id=1225506</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225549">https://bugzilla.suse.com/show_bug.cgi?id=1225549</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225560">https://bugzilla.suse.com/show_bug.cgi?id=1225560</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225572">https://bugzilla.suse.com/show_bug.cgi?id=1225572</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225640">https://bugzilla.suse.com/show_bug.cgi?id=1225640</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225708">https://bugzilla.suse.com/show_bug.cgi?id=1225708</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225764">https://bugzilla.suse.com/show_bug.cgi?id=1225764</a> </li> </ul> </div>
--===============2255928255857657655==--
|
|
|
|