drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Linux
Name: |
Mehrere Probleme in Linux |
|
ID: |
SUSE-SU-2024:2901-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE Linux Enterprise Server 12 SP5, SUSE Linux Enterprise High Performance Computing 12 SP5, SUSE Linux Enterprise Server for SAP Applications 12 SP5 |
|
Datum: |
Mi, 14. August 2024, 22:02 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48836
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47520
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39501
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48811
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47588
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52507
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39507
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42223
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47501
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47275
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38598
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47197
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47438
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47542
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48792
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40929
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28748
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47191
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47441
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48775
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52743
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47399
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47580
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42224 |
|
Applikationen: |
Linux |
|
Originalnachricht |
--===============4975580546778265579== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:2901-1 Rating: important References:
* bsc#1065729 * bsc#1088701 * bsc#1149446 * bsc#1179610 * bsc#1186463 * bsc#1196018 * bsc#1202346 * bsc#1215420 * bsc#1216834 * bsc#1220138 * bsc#1220833 * bsc#1220942 * bsc#1221045 * bsc#1221614 * bsc#1221616 * bsc#1221618 * bsc#1221656 * bsc#1221659 * bsc#1222005 * bsc#1222060 * bsc#1222317 * bsc#1222326 * bsc#1222372 * bsc#1222625 * bsc#1222776 * bsc#1222792 * bsc#1222824 * bsc#1222829 * bsc#1222866 * bsc#1223012 * bsc#1223021 * bsc#1223188 * bsc#1223778 * bsc#1223813 * bsc#1223815 * bsc#1224500 * bsc#1224512 * bsc#1224545 * bsc#1224557 * bsc#1224571 * bsc#1224576 * bsc#1224587 * bsc#1224622 * bsc#1224627 * bsc#1224637 * bsc#1224641 * bsc#1224647 * bsc#1224663 * bsc#1224683 * bsc#1224686 * bsc#1224699 * bsc#1224700 * bsc#1224743 * bsc#1224965 * bsc#1224975 * bsc#1225003 * bsc#1225214 * bsc#1225224 * bsc#1225229 * bsc#1225238 * bsc#1225241 * bsc#1225326 * bsc#1225328 * bsc#1225346 * bsc#1225357 * bsc#1225361 * bsc#1225396 * bsc#1225427 * bsc#1225431 * bsc#1225455 * bsc#1225478 * bsc#1225505 * bsc#1225530 * bsc#1225532 * bsc#1225569 * bsc#1225593 * bsc#1225711 * bsc#1225719 * bsc#1225767 * bsc#1225820 * bsc#1225835 * bsc#1225838 * bsc#1225898 * bsc#1226550 * bsc#1226553 * bsc#1226555 * bsc#1226559 * bsc#1226568 * bsc#1226571 * bsc#1226645 * bsc#1226757 * bsc#1226783 * bsc#1226786 * bsc#1226834 * bsc#1226861 * bsc#1226908 * bsc#1226994 * bsc#1227191 * bsc#1227213 * bsc#1227407 * bsc#1227435 * bsc#1227487 * bsc#1227573 * bsc#1227618 * bsc#1227626 * bsc#1227716 * bsc#1227725 * bsc#1227729 * bsc#1227730 * bsc#1227733 * bsc#1227750 * bsc#1227754 * bsc#1227762 * bsc#1227770 * bsc#1227771 * bsc#1227772 * bsc#1227774 * bsc#1227786 * bsc#1227790 * bsc#1227806 * bsc#1227824 * bsc#1227828 * bsc#1227830 * bsc#1227836 * bsc#1227849 * bsc#1227865 * bsc#1227866 * bsc#1227884 * bsc#1227886 * bsc#1227891 * bsc#1227913 * bsc#1227924 * bsc#1227928 * bsc#1227929 * bsc#1227936 * bsc#1227957 * bsc#1227968 * bsc#1227969 * bsc#1227975 * bsc#1227985 * bsc#1227989 * bsc#1228003 * bsc#1228005 * bsc#1228008 * bsc#1228013 * bsc#1228025 * bsc#1228030 * bsc#1228037 * bsc#1228045 * bsc#1228054 * bsc#1228055 * bsc#1228063 * bsc#1228071 * bsc#1228235 * bsc#1228237 * bsc#1228327 * bsc#1228328 * bsc#1228408 * bsc#1228409 * bsc#1228410 * bsc#1228470 * bsc#1228530 * bsc#1228561 * bsc#1228565 * bsc#1228567 * bsc#1228580 * bsc#1228581 * bsc#1228584 * bsc#1228588 * bsc#1228599 * bsc#1228617 * bsc#1228625 * bsc#1228626 * bsc#1228633 * bsc#1228640 * bsc#1228649 * bsc#1228655 * bsc#1228658 * bsc#1228662 * bsc#1228680 * bsc#1228705 * bsc#1228723 * bsc#1228726 * bsc#1228743 * bsc#1228850
Cross-References:
* CVE-2020-26558 * CVE-2021-0129 * CVE-2021-47145 * CVE-2021-47191 * CVE-2021-47194 * CVE-2021-47197 * CVE-2021-47201 * CVE-2021-47219 * CVE-2021-47275 * CVE-2021-47295 * CVE-2021-47388 * CVE-2021-47395 * CVE-2021-47399 * CVE-2021-47403 * CVE-2021-47405 * CVE-2021-47438 * CVE-2021-47441 * CVE-2021-47468 * CVE-2021-47498 * CVE-2021-47501 * CVE-2021-47516 * CVE-2021-47520 * CVE-2021-47542 * CVE-2021-47547 * CVE-2021-47559 * CVE-2021-47580 * CVE-2021-47582 * CVE-2021-47588 * CVE-2021-47597 * CVE-2021-47599 * CVE-2021-47606 * CVE-2021-47619 * CVE-2022-20368 * CVE-2022-28748 * CVE-2022-2964 * CVE-2022-48775 * CVE-2022-48792 * CVE-2022-48794 * CVE-2022-48804 * CVE-2022-48805 * CVE-2022-48810 * CVE-2022-48811 * CVE-2022-48823 * CVE-2022-48826 * CVE-2022-48827 * CVE-2022-48828 * CVE-2022-48829 * CVE-2022-48836 * CVE-2022-48839 * CVE-2022-48850 * CVE-2022-48855 * CVE-2022-48857 * CVE-2022-48860 * CVE-2022-48863 * CVE-2023-4244 * CVE-2023-52435 * CVE-2023-52507 * CVE-2023-52594 * CVE-2023-52612 * CVE-2023-52615 * CVE-2023-52619 * CVE-2023-52623 * CVE-2023-52669 * CVE-2023-52683 * CVE-2023-52693 * CVE-2023-52743 * CVE-2023-52753 * CVE-2023-52817 * CVE-2023-52818 * CVE-2023-52819 * CVE-2023-52885 * CVE-2024-26615 * CVE-2024-26635 * CVE-2024-26636 * CVE-2024-26659 * CVE-2024-26663 * CVE-2024-26735 * CVE-2024-26830 * CVE-2024-26863 * CVE-2024-26880 * CVE-2024-26920 * CVE-2024-26924 * CVE-2024-27019 * CVE-2024-27020 * CVE-2024-27025 * CVE-2024-27437 * CVE-2024-35805 * CVE-2024-35806 * CVE-2024-35819 * CVE-2024-35828 * CVE-2024-35837 * CVE-2024-35887 * CVE-2024-35893 * CVE-2024-35934 * CVE-2024-35947 * CVE-2024-35949 * CVE-2024-35966 * CVE-2024-35967 * CVE-2024-35978 * CVE-2024-35995 * CVE-2024-36004 * CVE-2024-36014 * CVE-2024-36288 * CVE-2024-36592 * CVE-2024-36901 * CVE-2024-36902 * CVE-2024-36919 * CVE-2024-36924 * CVE-2024-36939 * CVE-2024-36941 * CVE-2024-36952 * CVE-2024-38558 * CVE-2024-38560 * CVE-2024-38598 * CVE-2024-38619 * CVE-2024-38630 * CVE-2024-39301 * CVE-2024-39475 * CVE-2024-39487 * CVE-2024-39488 * CVE-2024-39490 * CVE-2024-39494 * CVE-2024-39499 * CVE-2024-39501 * CVE-2024-39506 * CVE-2024-39507 * CVE-2024-39509 * CVE-2024-40901 * CVE-2024-40904 * CVE-2024-40912 * CVE-2024-40923 * CVE-2024-40929 * CVE-2024-40932 * CVE-2024-40937 * CVE-2024-40941 * CVE-2024-40942 * CVE-2024-40943 * CVE-2024-40953 * CVE-2024-40959 * CVE-2024-40966 * CVE-2024-40967 * CVE-2024-40978 * CVE-2024-40982 * CVE-2024-40987 * CVE-2024-40988 * CVE-2024-40990 * CVE-2024-40995 * CVE-2024-40998 * CVE-2024-40999 * CVE-2024-41014 * CVE-2024-41015 * CVE-2024-41016 * CVE-2024-41044 * CVE-2024-41048 * CVE-2024-41059 * CVE-2024-41060 * CVE-2024-41063 * CVE-2024-41064 * CVE-2024-41066 * CVE-2024-41070 * CVE-2024-41071 * CVE-2024-41072 * CVE-2024-41076 * CVE-2024-41078 * CVE-2024-41081 * CVE-2024-41089 * CVE-2024-41090 * CVE-2024-41091 * CVE-2024-41095 * CVE-2024-42070 * CVE-2024-42093 * CVE-2024-42096 * CVE-2024-42119 * CVE-2024-42120 * CVE-2024-42124 * CVE-2024-42145 * CVE-2024-42223 * CVE-2024-42224
CVSS scores:
* CVE-2020-26558 ( SUSE ): 4.2 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26558 ( NVD ): 4.2 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2021-0129 ( SUSE ): 6.4 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2021-0129 ( NVD ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47145 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47191 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47194 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47219 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47388 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47405 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47468 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47516 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47520 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47520 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47547 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2021-47559 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47580 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L * CVE-2021-47582 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47588 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47597 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2021-47599 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47619 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-20368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-20368 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-28748 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2022-2964 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48775 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48792 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48792 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48804 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48805 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48823 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2022-48829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2022-48836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48836 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48839 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48850 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48855 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-48857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48863 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2022-48863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-4244 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4244 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52435 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52435 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52507 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-52594 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52612 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52615 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52619 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52623 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52743 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52818 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52819 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52885 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26635 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-26636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26880 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27019 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-27020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27020 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27025 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27437 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35934 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35949 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35995 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-36004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36924 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36952 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38558 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-38560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38598 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38619 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38630 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39301 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39475 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39475 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39487 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-39488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39490 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-39494 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39494 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39499 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-39501 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39506 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39507 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40901 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-40904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40932 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-40937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40942 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40966 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40967 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40978 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40987 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2024-40988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40999 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-41014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41015 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41044 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-41048 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41060 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41063 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41063 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41064 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41064 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41066 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41066 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-41070 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41071 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-41072 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-41076 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41078 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41090 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2024-41091 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-41095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42070 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-42070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42093 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-42096 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42096 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-42119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42224 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5
An update that solves 178 vulnerabilities and has seven security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
* CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716). * CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633). * CVE-2024-39506: liquidio: adjust a NULL pointer handling path in lio_vf_rep_copy_packet (bsc#1227729). * CVE-2021-47619: i40e: Fix queues reservation for XDP (bsc#1226645). * CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743). * CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible (bsc#1228705). * CVE-2024-42223: media: dvb-frontends: tda10048: Fix integer overflow (bsc#1228726). * CVE-2024-42119: drm/amd/display: Skip finding free audio for unknown engine_id (bsc#1228584). * CVE-2024-42120: drm/amd/display: Check pipe offset before setting vblank (bsc#1228588). * CVE-2024-41095: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes (bsc#1228662). * CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list (bsc#1228723). * CVE-2024-41072: wifi: cfg80211: wext: add extra SIOCSIWSCAN data check (bsc#1228626). * CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565). * CVE-2024-40995: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (bsc#1227830). * CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets (bsc#1228530). * CVE-2024-41066: ibmvnic: add tx check to prevent skb leak (bsc#1228640). * CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680). * CVE-2024-41089: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes (bsc#1228658). * CVE-2024-41060: drm/radeon: check bo_va->bo is non-NULL before using it (bsc#1228567). * CVE-2022-48829: NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes (bsc#1228055). * CVE-2022-48828: NFSD: Fix ia_size underflow (bsc#1228054). * CVE-2022-48827: NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1228037). * CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable failure (bsc#1228655). * CVE-2024-41071: wifi: mac80211: Avoid address calculations via out of bounds array indexing (bsc#1228625). * CVE-2024-41064: powerpc/eeh: avoid possible crash when edev->pdev changes (bsc#1228599). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700). * CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617). * CVE-2024-40978: scsi: qedi: Fix crash while reading debugfs attribute (bsc#1227929). * CVE-2022-48792: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task (bsc#1228013). * CVE-2022-48823: scsi: qedf: Fix refcount issue when LOGO is received during TMF (bsc#1228045). * CVE-2024-41076: NFSv4: Fix memory leak in nfs4_set_security_label (bsc#1228649). * CVE-2024-40998: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() (bsc#1227866). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561). * CVE-2024-40987: drm/amdgpu: fix UBSAN warning in kv_dpm.c (bsc#1228235). * CVE-2022-48826: drm/vc4: Fix deadlock on DSI device attach error (bsc#1227975) * CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ (bsc#1222625). * CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry() (bsc#1228409). * CVE-2024-41016: ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410). * CVE-2024-41063: bluetooth: hci_core: cancel all works upon hci_unregister_dev() (bsc#1228580). * CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (bsc#1228470). * CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() (bsc#1228581). * CVE-2021-47405: HID: usbhid: free raw_report buffers in usbhid_stop (bsc#1225238). * CVE-2024-40988: drm/radeon: fix UBSAN warning in kv_dpm.c (bsc#1227957). * CVE-2024-40932: drm/exynos/vidi: fix memory leak in .get_modes() (bsc#1227828). * CVE-2021-47403: ipack: ipoctal: fix module reference leak (bsc#1225241). * CVE-2021-47388: mac80211: fix use-after-free in CCMP/GCMP RX (bsc#1225214). * CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data (bsc#1228408). * CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327). * CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328). * CVE-2024-40999: net: ena: Add validation for completion descriptors consistency (bsc#1227913). * CVE-2024-35837: net: mvpp2: clear BM pool before initialization (bsc#1224500). * CVE-2021-47588: sit: do not call ipip6_dev_free() from sit_init_net() (bsc#1226568). * CVE-2022-48804: vt_ioctl: fix array_index_nospec in vt_setactivate (bsc#1227968). * CVE-2024-40967: serial: imx: Introduce timeout when waiting on transmitter empty (bsc#1227891). * CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc (bsc#1227886). * CVE-2022-48850: net-sysfs: add check for netdevice being present to speed_show (bsc#1228071). * CVE-2021-47582: usb: core: Do not hold the device lock while sleeping in do_proc_control() (bsc#1226559). * CVE-2024-40982: ssb: fix potential NULL pointer dereference in ssb_device_uevent() (bsc#1227865). * CVE-2021-47468: isdn: mISDN: Fix sleeping function called from invalid context (bsc#1225346). * CVE-2021-47395: mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap (bsc#1225326). * CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path (bsc#1227936). * CVE-2023-52594: Fixed potential array-index-out-of-bounds read in ath9k_htc_txstatus() (bsc#1221045). * CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets (bsc#1228003). * CVE-2021-47580: scsi: scsi_debug: Fix type in min_t to avoid stack OOB (bsc#1226550). * CVE-2024-26735: ipv6: sr: fix possible use-after-free and null-ptr-deref (bsc#1222372). * CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786). * CVE-2022-48811: ibmvnic: do not release napi in __ibmvnic_open() (bsc#1227928). * CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bsc#1186463). * CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (bsc#1179610). * CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836). * CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario (bsc#1227730). * CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure (bsc#1227786). * CVE-2024-40941: wifi: iwlwifi: mvm: do not read past the mfuart notifcation (bsc#1227771). * CVE-2022-48860: ethernet: Fix error handling in xemaclite_of_probe (bsc#1228008). * CVE-2022-48863: mISDN: Fix memory leak in dsp_pipeline_build() (bsc#1228063). * CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() (bsc#1227806). * CVE-2024-39499: vmci: prevent speculation leaks by sanitizing event in event_deliver() (bsc#1227725). * CVE-2024-39487: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (bsc#1227573) * CVE-2024-35934: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() (bsc#1224641) * CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (bsc#1227884). * CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512) * CVE-2021-47441: mlxsw: thermal: Fix out-of-bounds memory accesses (bsc#1225224) * CVE-2021-47194: cfg80211: call cfg80211_stop_ap when switch from P2P_GO type (bsc#1222829). * CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (bsc#1223815) * CVE-2022-48775: Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj (bsc#1227924). * CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (bsc#1223813) * CVE-2024-40929: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids (bsc#1227774). * CVE-2024-40912: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() (bsc#1227790). * CVE-2024-40942: wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects (bsc#1227770). * CVE-2022-48857: NFC: port100: fix use-after-free in port100_send_complete (bsc#1228005). * CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (bsc#1225719). * CVE-2021-47606: net: netlink: af_netlink: Prevent empty skb by adding a check on len. (bsc#1226555). * CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non- allocated memory (bsc#1227762). * CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820). * CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove administratively set MAC (bsc#1223012). * CVE-2021-47516: nfp: Fix memory leak in nfp_cpp_area_cache_add() (bsc#1225427). * CVE-2021-47501: i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc (bsc#1225361). * CVE-2024-39501: drivers: core: synchronize really_probe() and dev_uevent() (bsc#1227754). * CVE-2023-52743: ice: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1225003) * CVE-2021-47542: net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() (bsc#1225455). * CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711) * CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1224545) * CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778) * CVE-2021-47599: btrfs: use latest_dev in btrfs_show_devname (bsc#1226571). * CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138). * CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (bsc#1222326). * CVE-2021-47597: inet_diag: fix kernel-infoleak for UDP sockets (bsc#1226553). * CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core (bsc#1227626). * CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for ICMPv6 (bsc#1226783). * CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942). * CVE-2023-52619: Fixed possible crash when setting number of cpus to an odd number in pstore/ram (bsc#1221618). * CVE-2024-26659: Fixed wrong handling of isoc Babble and Buffer Overrun events in xhci (bsc#1222317). * CVE-2024-35978: Bluetooth: Fix memory leak in hci_req_sync_complete() (bsc#1224571). * CVE-2023-52669: crypto: s390/aes - Fix buffer overread in CTR mode (bsc#1224637). * CVE-2023-52615: Fixed page fault dead lock on mmap-ed hwrng (bsc#1221614). * CVE-2023-52612: Fixed req->dst buffer overflow in crypto/scomp (bsc#1221616). * CVE-2024-35995: ACPI: CPPC: Use access_width over bit_width for system memory accesses (bsc#1224557). * CVE-2023-52623: Fixed suspicious RCU usage in SUNRPC (bsc#1222060). * CVE-2021-47295: net: sched: fix memory leak in tcindex_partial_destroy_work (bsc#1224975) * CVE-2023-52693: ACPI: video: check for error while searching for backlight device parent (bsc#1224686). * CVE-2023-52683: ACPI: LPIT: Avoid u32 multiplication overflow (bsc#1224627). * CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420). * CVE-2024-39475: fbdev: savage: Handle err return when savagefb_check_var failed (bsc#1227435) * CVE-2021-47520: can: pch_can: pch_can_rx_normal: fix use after free (bsc#1225431). * CVE-2024-36941: wifi: nl80211: do not free NULL coalescing rule (bsc#1225835). * CVE-2021-47145: btrfs: do not BUG_ON in link_to_fixup_dir (bsc#1222005). * CVE-2021-47547: net: tulip: de4x5: fix the problem that the array 'lp->phy' may be out of bound (bsc#1225505). * CVE-2023-52817: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (bsc#1225569). * CVE-2023-52819: drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (bsc#1225532). * CVE-2023-52818: drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 (bsc#1225530). * CVE-2023-52753: drm/amd/display: Avoid NULL dereference of timing generator (bsc#1225478). * CVE-2024-36014: drm/arm/malidp: fix a possible null pointer dereference (bsc#1225593). * CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes (bsc#1221659). * CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656). * CVE-2024-35828: wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer() (bsc#1224622). * CVE-2023-52507: Fixed possible shift-out-of-bounds in nfc/nci (bsc#1220833). * CVE-2024-38598: md: fix resync softlockup when bitmap size is less than array size (bsc#1226757). * CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit (bsc#1224743). * CVE-2024-26880: dm: call the resume method on internal suspend (bsc#1223188). * CVE-2021-47498: dm rq: do not queue request to blk-mq during DM suspend (bsc#1225357). * CVE-2021-47275: bcache: avoid oversized read request in cache missing code path (bsc#1224965). * CVE-2024-38619: usb-storage: alauda: Check whether the media is initialized (bsc#1226861). * CVE-2021-47201: iavf: free q_vectors before queues in iavf_disable_vf (bsc#1222792). * CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node() (bsc#1223021). * CVE-2024-38630: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (bsc#1226908). * CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994). * CVE-2021-47559: net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk() (bsc#1225396).
The following non-security bugs were fixed:
* Fix spurious WARNING caused by a qxl driver patch (bsc#1227213,bsc#1227191) * KVM: PPC: Book3S HV: Do not take kvm->lock around kvm_for_each_vcpu (bsc#1065729). * KVM: PPC: Book3S HV: remove extraneous asterisk from rm_host_ipi_action() comment (bsc#1065729). * KVM: PPC: Book3S PR: Exiting split hack mode needs to fixup both PC and LR (bsc#1065729). * KVM: PPC: Book3S: Fix some RCU-list locks (git-fixes). * KVM: PPC: Book3S: Only report KVM_CAP_SPAPR_TCE_VFIO on powernv machines (bsc#1065729). * KVM: PPC: Book3S: Use new mutex to synchronize access to rtas token list (bsc#1065729). * KVM: PPC: Inform the userspace about TCE update failures (bsc#1065729). * KVM: PPC: Move and undef TRACE_INCLUDE_PATH/FILE (bsc#1065729). * PCI: Fix resource double counting on remove & rescan (git-fixes). * PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git- fixes). * PM: hibernate: x86: Use crc32 instead of md5 for hibernation e820 integrity check (git-fixes). * SUNRPC: Fix gss_free_in_token_pages() (git-fixes). * SUNRPC: Fix loop termination condition in gss_free_in_token_pages() (git- fixes). * Tools: hv: kvp: eliminate 'may be used uninitialized' warning (git-fixes). * USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (git- fixes). * btrfs: fix 64bit compat send ioctl arguments not initializing version member (bsc#1228030). * btrfs: fix send ioctl on 32bit with 64bit kernel (bsc#1228030). * btrfs: incremental send, fix emission of invalid clone operations (bsc#1228030). * btrfs: remove unused members dir_path from recorded_ref (bsc#1228030). * btrfs: send, improve clone range (bsc#1228030). * btrfs: send: add new command FILEATTR for file attributes (bsc#1228030). * btrfs: send: add stream v2 definitions (bsc#1228030). * btrfs: send: always use the rbtree based inode ref management infrastructure (bsc#1228030). * btrfs: send: avoid copying file data (bsc#1228030). * btrfs: send: explicitly number commands and attributes (bsc#1228030). * btrfs: send: fix failures when processing inodes with no links (bsc#1228030). * btrfs: send: fix send failure of a subcase of orphan inodes (bsc#1228030). * btrfs: send: fix sending link commands for existing file paths (bsc#1228030). * btrfs: send: get rid of i_size logic in send_write() (bsc#1228030). * btrfs: send: introduce recorded_ref_alloc and recorded_ref_free (bsc#1228030). * btrfs: send: prepare for v2 protocol (bsc#1228030). * btrfs: send: refactor arguments of get_inode_info() (bsc#1228030). * btrfs: send: remove stale code when checking for shared extents (bsc#1228030). * btrfs: send: remove unused found_type parameter to lookup_dir_item_inode() (bsc#1228030). * btrfs: send: remove unused send_ctx::{total,cmd}_send_size (bsc#1228030). * btrfs: send: use boolean types for current inode status (bsc#1228030). * btrfs: silence maybe-uninitialized warning in clone_range (bsc#1228030). * drm/amdgpu/debugfs: fix error code when smc register accessors are NULL (git-fixes). * drm/vc4: dsi: Only register our component once a DSI device is (bsc#1227975) * hv_netvsc: rndis_filter needs to select NLS (git-fixes). * ipv6: sr: fix incorrect unregister order (git-fixes). * kgdb: Add kgdb_has_hit_break function (git-fixes). * kgdb: Move the extern declaration kgdb_has_hit_break() to generic kgdb.h (git-fixes). * net: hsr: fix placement of logical operator in a multi-line statement (bsc#1223021). * net: mana: Fix the extra HZ in mana_hwc_send_request (git-fixes). * net: mana: select PAGE_POOL (git-fixes). * net_sched: add a temporary refcnt for struct tcindex_data (bsc#1224975). * net_sched: fix a memory leak in cls_tcindex (bsc#1224975). * net_sched: fix a missing refcnt in tcindex_init() (bsc#1224975). * net_sched: hold rtnl lock in tcindex_partial_destroy_work() (bsc#1224975) * nfs: Handle error of rpc_proc_register() in nfs_net_init() (git-fixes). * nvme: fixup comment for nvme RDMA Provider Type (git-fixes). * ocfs2: fix DIO failure due to insufficient transaction credits (bsc#1216834). * ocfs2: remove redundant assignment to variable free_space (bsc#1228409). * ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410). * powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487). * sched/deadline: Fix BUG_ON condition for deboosted tasks (bsc#1227407). * scsi: qla2xxx: Avoid possible run-time warning with long model_num (bsc#1228850). * scsi: qla2xxx: Complete command early within lock (bsc#1228850). * scsi: qla2xxx: Convert comma to semicolon (bsc#1228850). * scsi: qla2xxx: Drop driver owner assignment (bsc#1228850). * scsi: qla2xxx: During vport delete send async logout explicitly (bsc#1228850). * scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850). * scsi: qla2xxx: Fix flash read failure (bsc#1228850). * scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850). * scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850). * scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850). * scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850). * scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds (bsc#1228850). * scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850). * scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850). * scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850). * scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850). * signal: Introduce clear_siginfo (git-fixes). * string.h: Introduce memtostr() and memtostr_pad() (bsc#1228850). * sunrpc: fix NFSACL RPC retry on soft mount (git-fixes). * tools lib: Fix builds when glibc contains strlcpy() (git-fixes). * tools: hv: fix KVP and VSS daemons exit code (git-fixes). * usb: add a hcd_uses_dma helper (git-fixes). * usb: atm: cxacru: fix endpoint checking in cxacru_bind() (git-fixes). * usb: musb: da8xx: fix a resource leak in probe() (git-fixes). * x86/apic: Fix kernel panic when booting with intremap=off and x2apic_phys (git-fixes). * x86/bhi: Avoid warning in #DB handler due to BHI mitigation (git-fixes). * x86/boot/e820: Fix typo in e820.c comment (git-fixes). * x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git- fixes). * x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI (git-fixes). * x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs (git-fixes). * x86/fpu: Return proper error codes from user access functions (git-fixes). * x86/ioremap: Fix page aligned size calculation in __ioremap_caller() (git- fixes). * x86/kprobes: Fix kprobes instruction boudary check with CONFIG_RETHUNK (git- fixes). * x86/kprobes: Fix optprobe optimization check with CONFIG_RETHUNK (git- fixes). * x86/msr: Fix wr/rdmsr_safe_regs_on_cpu() prototypes (git-fixes). * x86/numa: Use cpumask_available instead of hardcoded NULL check (git-fixes). * x86: __memcpy_flushcache: fix wrong alignment if size > 2^32 (git-fixes). * xfs: check that dir block entries do not off the end of the buffer (git- fixes). * xfs: refactor xfs_verifier_error and xfs_buf_ioerror (git-fixes). * xfs: remove XFS_WANT_CORRUPTED_RETURN from dir3 data verifiers (git-fixes). * xhci: Poll for U0 after disabling USB2 LPM (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2901=1
* SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2901=1
* SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2901=1
## Package List:
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc x86_64) * kernel-azure-4.12.14-16.194.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * kernel-azure-debugsource-4.12.14-16.194.1 * kernel-azure-devel-4.12.14-16.194.1 * kernel-azure-base-4.12.14-16.194.1 * kernel-azure-base-debuginfo-4.12.14-16.194.1 * kernel-syms-azure-4.12.14-16.194.1 * kernel-azure-debuginfo-4.12.14-16.194.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * kernel-devel-azure-4.12.14-16.194.1 * kernel-source-azure-4.12.14-16.194.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (nosrc x86_64) * kernel-azure-4.12.14-16.194.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * kernel-azure-debugsource-4.12.14-16.194.1 * kernel-azure-devel-4.12.14-16.194.1 * kernel-azure-base-4.12.14-16.194.1 * kernel-azure-base-debuginfo-4.12.14-16.194.1 * kernel-syms-azure-4.12.14-16.194.1 * kernel-azure-debuginfo-4.12.14-16.194.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * kernel-devel-azure-4.12.14-16.194.1 * kernel-source-azure-4.12.14-16.194.1 * SUSE Linux Enterprise Server 12 SP5 (nosrc x86_64) * kernel-azure-4.12.14-16.194.1 * SUSE Linux Enterprise Server 12 SP5 (x86_64) * kernel-azure-debugsource-4.12.14-16.194.1 * kernel-azure-devel-4.12.14-16.194.1 * kernel-azure-base-4.12.14-16.194.1 * kernel-azure-base-debuginfo-4.12.14-16.194.1 * kernel-syms-azure-4.12.14-16.194.1 * kernel-azure-debuginfo-4.12.14-16.194.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * kernel-devel-azure-4.12.14-16.194.1 * kernel-source-azure-4.12.14-16.194.1
## References:
* https://www.suse.com/security/cve/CVE-2020-26558.html * https://www.suse.com/security/cve/CVE-2021-0129.html * https://www.suse.com/security/cve/CVE-2021-47145.html * https://www.suse.com/security/cve/CVE-2021-47191.html * https://www.suse.com/security/cve/CVE-2021-47194.html * https://www.suse.com/security/cve/CVE-2021-47197.html * https://www.suse.com/security/cve/CVE-2021-47201.html * https://www.suse.com/security/cve/CVE-2021-47219.html * https://www.suse.com/security/cve/CVE-2021-47275.html * https://www.suse.com/security/cve/CVE-2021-47295.html * https://www.suse.com/security/cve/CVE-2021-47388.html * https://www.suse.com/security/cve/CVE-2021-47395.html * https://www.suse.com/security/cve/CVE-2021-47399.html * https://www.suse.com/security/cve/CVE-2021-47403.html * https://www.suse.com/security/cve/CVE-2021-47405.html * https://www.suse.com/security/cve/CVE-2021-47438.html * https://www.suse.com/security/cve/CVE-2021-47441.html * https://www.suse.com/security/cve/CVE-2021-47468.html * https://www.suse.com/security/cve/CVE-2021-47498.html * https://www.suse.com/security/cve/CVE-2021-47501.html * https://www.suse.com/security/cve/CVE-2021-47516.html * https://www.suse.com/security/cve/CVE-2021-47520.html * https://www.suse.com/security/cve/CVE-2021-47542.html * https://www.suse.com/security/cve/CVE-2021-47547.html * https://www.suse.com/security/cve/CVE-2021-47559.html * https://www.suse.com/security/cve/CVE-2021-47580.html * https://www.suse.com/security/cve/CVE-2021-47582.html * https://www.suse.com/security/cve/CVE-2021-47588.html * https://www.suse.com/security/cve/CVE-2021-47597.html * https://www.suse.com/security/cve/CVE-2021-47599.html * https://www.suse.com/security/cve/CVE-2021-47606.html * https://www.suse.com/security/cve/CVE-2021-47619.html * https://www.suse.com/security/cve/CVE-2022-20368.html * https://www.suse.com/security/cve/CVE-2022-28748.html * https://www.suse.com/security/cve/CVE-2022-2964.html * https://www.suse.com/security/cve/CVE-2022-48775.html * https://www.suse.com/security/cve/CVE-2022-48792.html * https://www.suse.com/security/cve/CVE-2022-48794.html * https://www.suse.com/security/cve/CVE-2022-48804.html * https://www.suse.com/security/cve/CVE-2022-48805.html * https://www.suse.com/security/cve/CVE-2022-48810.html * https://www.suse.com/security/cve/CVE-2022-48811.html * https://www.suse.com/security/cve/CVE-2022-48823.html * https://www.suse.com/security/cve/CVE-2022-48826.html * https://www.suse.com/security/cve/CVE-2022-48827.html * https://www.suse.com/security/cve/CVE-2022-48828.html * https://www.suse.com/security/cve/CVE-2022-48829.html * https://www.suse.com/security/cve/CVE-2022-48836.html * https://www.suse.com/security/cve/CVE-2022-48839.html * https://www.suse.com/security/cve/CVE-2022-48850.html * https://www.suse.com/security/cve/CVE-2022-48855.html * https://www.suse.com/security/cve/CVE-2022-48857.html * https://www.suse.com/security/cve/CVE-2022-48860.html * https://www.suse.com/security/cve/CVE-2022-48863.html * https://www.suse.com/security/cve/CVE-2023-4244.html * https://www.suse.com/security/cve/CVE-2023-52435.html * https://www.suse.com/security/cve/CVE-2023-52507.html * https://www.suse.com/security/cve/CVE-2023-52594.html * https://www.suse.com/security/cve/CVE-2023-52612.html * https://www.suse.com/security/cve/CVE-2023-52615.html * https://www.suse.com/security/cve/CVE-2023-52619.html * https://www.suse.com/security/cve/CVE-2023-52623.html * https://www.suse.com/security/cve/CVE-2023-52669.html * https://www.suse.com/security/cve/CVE-2023-52683.html * https://www.suse.com/security/cve/CVE-2023-52693.html * https://www.suse.com/security/cve/CVE-2023-52743.html * https://www.suse.com/security/cve/CVE-2023-52753.html * https://www.suse.com/security/cve/CVE-2023-52817.html * https://www.suse.com/security/cve/CVE-2023-52818.html * https://www.suse.com/security/cve/CVE-2023-52819.html * https://www.suse.com/security/cve/CVE-2023-52885.html * https://www.suse.com/security/cve/CVE-2024-26615.html * https://www.suse.com/security/cve/CVE-2024-26635.html * https://www.suse.com/security/cve/CVE-2024-26636.html * https://www.suse.com/security/cve/CVE-2024-26659.html * https://www.suse.com/security/cve/CVE-2024-26663.html * https://www.suse.com/security/cve/CVE-2024-26735.html * https://www.suse.com/security/cve/CVE-2024-26830.html * https://www.suse.com/security/cve/CVE-2024-26863.html * https://www.suse.com/security/cve/CVE-2024-26880.html * https://www.suse.com/security/cve/CVE-2024-26920.html * https://www.suse.com/security/cve/CVE-2024-26924.html * https://www.suse.com/security/cve/CVE-2024-27019.html * https://www.suse.com/security/cve/CVE-2024-27020.html * https://www.suse.com/security/cve/CVE-2024-27025.html * https://www.suse.com/security/cve/CVE-2024-27437.html * https://www.suse.com/security/cve/CVE-2024-35805.html * https://www.suse.com/security/cve/CVE-2024-35806.html * https://www.suse.com/security/cve/CVE-2024-35819.html * https://www.suse.com/security/cve/CVE-2024-35828.html * https://www.suse.com/security/cve/CVE-2024-35837.html * https://www.suse.com/security/cve/CVE-2024-35887.html * https://www.suse.com/security/cve/CVE-2024-35893.html * https://www.suse.com/security/cve/CVE-2024-35934.html * https://www.suse.com/security/cve/CVE-2024-35947.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-35966.html * https://www.suse.com/security/cve/CVE-2024-35967.html * https://www.suse.com/security/cve/CVE-2024-35978.html * https://www.suse.com/security/cve/CVE-2024-35995.html * https://www.suse.com/security/cve/CVE-2024-36004.html * https://www.suse.com/security/cve/CVE-2024-36014.html * https://www.suse.com/security/cve/CVE-2024-36288.html * https://www.suse.com/security/cve/CVE-2024-36592.html * https://www.suse.com/security/cve/CVE-2024-36901.html * https://www.suse.com/security/cve/CVE-2024-36902.html * https://www.suse.com/security/cve/CVE-2024-36919.html * https://www.suse.com/security/cve/CVE-2024-36924.html * https://www.suse.com/security/cve/CVE-2024-36939.html * https://www.suse.com/security/cve/CVE-2024-36941.html * https://www.suse.com/security/cve/CVE-2024-36952.html * https://www.suse.com/security/cve/CVE-2024-38558.html * https://www.suse.com/security/cve/CVE-2024-38560.html * https://www.suse.com/security/cve/CVE-2024-38598.html * https://www.suse.com/security/cve/CVE-2024-38619.html * https://www.suse.com/security/cve/CVE-2024-38630.html * https://www.suse.com/security/cve/CVE-2024-39301.html * https://www.suse.com/security/cve/CVE-2024-39475.html * https://www.suse.com/security/cve/CVE-2024-39487.html * https://www.suse.com/security/cve/CVE-2024-39488.html * https://www.suse.com/security/cve/CVE-2024-39490.html * https://www.suse.com/security/cve/CVE-2024-39494.html * https://www.suse.com/security/cve/CVE-2024-39499.html * https://www.suse.com/security/cve/CVE-2024-39501.html * https://www.suse.com/security/cve/CVE-2024-39506.html * https://www.suse.com/security/cve/CVE-2024-39507.html * https://www.suse.com/security/cve/CVE-2024-39509.html * https://www.suse.com/security/cve/CVE-2024-40901.html * https://www.suse.com/security/cve/CVE-2024-40904.html * https://www.suse.com/security/cve/CVE-2024-40912.html * https://www.suse.com/security/cve/CVE-2024-40923.html * https://www.suse.com/security/cve/CVE-2024-40929.html * https://www.suse.com/security/cve/CVE-2024-40932.html * https://www.suse.com/security/cve/CVE-2024-40937.html * https://www.suse.com/security/cve/CVE-2024-40941.html * https://www.suse.com/security/cve/CVE-2024-40942.html * https://www.suse.com/security/cve/CVE-2024-40943.html * https://www.suse.com/security/cve/CVE-2024-40953.html * https://www.suse.com/security/cve/CVE-2024-40959.html * https://www.suse.com/security/cve/CVE-2024-40966.html * https://www.suse.com/security/cve/CVE-2024-40967.html * https://www.suse.com/security/cve/CVE-2024-40978.html * https://www.suse.com/security/cve/CVE-2024-40982.html * https://www.suse.com/security/cve/CVE-2024-40987.html * https://www.suse.com/security/cve/CVE-2024-40988.html * https://www.suse.com/security/cve/CVE-2024-40990.html * https://www.suse.com/security/cve/CVE-2024-40995.html * https://www.suse.com/security/cve/CVE-2024-40998.html * https://www.suse.com/security/cve/CVE-2024-40999.html * https://www.suse.com/security/cve/CVE-2024-41014.html * https://www.suse.com/security/cve/CVE-2024-41015.html * https://www.suse.com/security/cve/CVE-2024-41016.html * https://www.suse.com/security/cve/CVE-2024-41044.html * https://www.suse.com/security/cve/CVE-2024-41048.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-41060.html * https://www.suse.com/security/cve/CVE-2024-41063.html * https://www.suse.com/security/cve/CVE-2024-41064.html * https://www.suse.com/security/cve/CVE-2024-41066.html * https://www.suse.com/security/cve/CVE-2024-41070.html * https://www.suse.com/security/cve/CVE-2024-41071.html * https://www.suse.com/security/cve/CVE-2024-41072.html * https://www.suse.com/security/cve/CVE-2024-41076.html * https://www.suse.com/security/cve/CVE-2024-41078.html * https://www.suse.com/security/cve/CVE-2024-41081.html * https://www.suse.com/security/cve/CVE-2024-41089.html * https://www.suse.com/security/cve/CVE-2024-41090.html * https://www.suse.com/security/cve/CVE-2024-41091.html * https://www.suse.com/security/cve/CVE-2024-41095.html * https://www.suse.com/security/cve/CVE-2024-42070.html * https://www.suse.com/security/cve/CVE-2024-42093.html * https://www.suse.com/security/cve/CVE-2024-42096.html * https://www.suse.com/security/cve/CVE-2024-42119.html * https://www.suse.com/security/cve/CVE-2024-42120.html * https://www.suse.com/security/cve/CVE-2024-42124.html * https://www.suse.com/security/cve/CVE-2024-42145.html * https://www.suse.com/security/cve/CVE-2024-42223.html * https://www.suse.com/security/cve/CVE-2024-42224.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1088701 * https://bugzilla.suse.com/show_bug.cgi?id=1149446 * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1186463 * https://bugzilla.suse.com/show_bug.cgi?id=1196018 * https://bugzilla.suse.com/show_bug.cgi?id=1202346 * https://bugzilla.suse.com/show_bug.cgi?id=1215420 * https://bugzilla.suse.com/show_bug.cgi?id=1216834 * https://bugzilla.suse.com/show_bug.cgi?id=1220138 * https://bugzilla.suse.com/show_bug.cgi?id=1220833 * https://bugzilla.suse.com/show_bug.cgi?id=1220942 * https://bugzilla.suse.com/show_bug.cgi?id=1221045 * https://bugzilla.suse.com/show_bug.cgi?id=1221614 * https://bugzilla.suse.com/show_bug.cgi?id=1221616 * https://bugzilla.suse.com/show_bug.cgi?id=1221618 * https://bugzilla.suse.com/show_bug.cgi?id=1221656 * https://bugzilla.suse.com/show_bug.cgi?id=1221659 * https://bugzilla.suse.com/show_bug.cgi?id=1222005 * https://bugzilla.suse.com/show_bug.cgi?id=1222060 * https://bugzilla.suse.com/show_bug.cgi?id=1222317 * https://bugzilla.suse.com/show_bug.cgi?id=1222326 * https://bugzilla.suse.com/show_bug.cgi?id=1222372 * https://bugzilla.suse.com/show_bug.cgi?id=1222625 * https://bugzilla.suse.com/show_bug.cgi?id=1222776 * https://bugzilla.suse.com/show_bug.cgi?id=1222792 * https://bugzilla.suse.com/show_bug.cgi?id=1222824 * https://bugzilla.suse.com/show_bug.cgi?id=1222829 * https://bugzilla.suse.com/show_bug.cgi?id=1222866 * https://bugzilla.suse.com/show_bug.cgi?id=1223012 * https://bugzilla.suse.com/show_bug.cgi?id=1223021 * https://bugzilla.suse.com/show_bug.cgi?id=1223188 * https://bugzilla.suse.com/show_bug.cgi?id=1223778 * https://bugzilla.suse.com/show_bug.cgi?id=1223813 * https://bugzilla.suse.com/show_bug.cgi?id=1223815 * https://bugzilla.suse.com/show_bug.cgi?id=1224500 * https://bugzilla.suse.com/show_bug.cgi?id=1224512 * https://bugzilla.suse.com/show_bug.cgi?id=1224545 * https://bugzilla.suse.com/show_bug.cgi?id=1224557 * https://bugzilla.suse.com/show_bug.cgi?id=1224571 * https://bugzilla.suse.com/show_bug.cgi?id=1224576 * https://bugzilla.suse.com/show_bug.cgi?id=1224587 * https://bugzilla.suse.com/show_bug.cgi?id=1224622 * https://bugzilla.suse.com/show_bug.cgi?id=1224627 * https://bugzilla.suse.com/show_bug.cgi?id=1224637 * https://bugzilla.suse.com/show_bug.cgi?id=1224641 * https://bugzilla.suse.com/show_bug.cgi?id=1224647 * https://bugzilla.suse.com/show_bug.cgi?id=1224663 * https://bugzilla.suse.com/show_bug.cgi?id=1224683 * https://bugzilla.suse.com/show_bug.cgi?id=1224686 * https://bugzilla.suse.com/show_bug.cgi?id=1224699 * https://bugzilla.suse.com/show_bug.cgi?id=1224700 * https://bugzilla.suse.com/show_bug.cgi?id=1224743 * https://bugzilla.suse.com/show_bug.cgi?id=1224965 * https://bugzilla.suse.com/show_bug.cgi?id=1224975 * https://bugzilla.suse.com/show_bug.cgi?id=1225003 * https://bugzilla.suse.com/show_bug.cgi?id=1225214 * https://bugzilla.suse.com/show_bug.cgi?id=1225224 * https://bugzilla.suse.com/show_bug.cgi?id=1225229 * https://bugzilla.suse.com/show_bug.cgi?id=1225238 * https://bugzilla.suse.com/show_bug.cgi?id=1225241 * https://bugzilla.suse.com/show_bug.cgi?id=1225326 * https://bugzilla.suse.com/show_bug.cgi?id=1225328 * https://bugzilla.suse.com/show_bug.cgi?id=1225346 * https://bugzilla.suse.com/show_bug.cgi?id=1225357 * https://bugzilla.suse.com/show_bug.cgi?id=1225361 * https://bugzilla.suse.com/show_bug.cgi?id=1225396 * https://bugzilla.suse.com/show_bug.cgi?id=1225427 * https://bugzilla.suse.com/show_bug.cgi?id=1225431 * https://bugzilla.suse.com/show_bug.cgi?id=1225455 * https://bugzilla.suse.com/show_bug.cgi?id=1225478 * https://bugzilla.suse.com/show_bug.cgi?id=1225505 * https://bugzilla.suse.com/show_bug.cgi?id=1225530 * https://bugzilla.suse.com/show_bug.cgi?id=1225532 * https://bugzilla.suse.com/show_bug.cgi?id=1225569 * https://bugzilla.suse.com/show_bug.cgi?id=1225593 * https://bugzilla.suse.com/show_bug.cgi?id=1225711 * https://bugzilla.suse.com/show_bug.cgi?id=1225719 * https://bugzilla.suse.com/show_bug.cgi?id=1225767 * https://bugzilla.suse.com/show_bug.cgi?id=1225820 * https://bugzilla.suse.com/show_bug.cgi?id=1225835 * https://bugzilla.suse.com/show_bug.cgi?id=1225838 * https://bugzilla.suse.com/show_bug.cgi?id=1225898 * https://bugzilla.suse.com/show_bug.cgi?id=1226550 * https://bugzilla.suse.com/show_bug.cgi?id=1226553 * https://bugzilla.suse.com/show_bug.cgi?id=1226555 * https://bugzilla.suse.com/show_bug.cgi?id=1226559 * https://bugzilla.suse.com/show_bug.cgi?id=1226568 * https://bugzilla.suse.com/show_bug.cgi?id=1226571 * https://bugzilla.suse.com/show_bug.cgi?id=1226645 * https://bugzilla.suse.com/show_bug.cgi?id=1226757 * https://bugzilla.suse.com/show_bug.cgi?id=1226783 * https://bugzilla.suse.com/show_bug.cgi?id=1226786 * https://bugzilla.suse.com/show_bug.cgi?id=1226834 * https://bugzilla.suse.com/show_bug.cgi?id=1226861 * https://bugzilla.suse.com/show_bug.cgi?id=1226908 * https://bugzilla.suse.com/show_bug.cgi?id=1226994 * https://bugzilla.suse.com/show_bug.cgi?id=1227191 * https://bugzilla.suse.com/show_bug.cgi?id=1227213 * https://bugzilla.suse.com/show_bug.cgi?id=1227407 * https://bugzilla.suse.com/show_bug.cgi?id=1227435 * https://bugzilla.suse.com/show_bug.cgi?id=1227487 * https://bugzilla.suse.com/show_bug.cgi?id=1227573 * https://bugzilla.suse.com/show_bug.cgi?id=1227618 * https://bugzilla.suse.com/show_bug.cgi?id=1227626 * https://bugzilla.suse.com/show_bug.cgi?id=1227716 * https://bugzilla.suse.com/show_bug.cgi?id=1227725 * https://bugzilla.suse.com/show_bug.cgi?id=1227729 * https://bugzilla.suse.com/show_bug.cgi?id=1227730 * https://bugzilla.suse.com/show_bug.cgi?id=1227733 * https://bugzilla.suse.com/show_bug.cgi?id=1227750 * https://bugzilla.suse.com/show_bug.cgi?id=1227754 * https://bugzilla.suse.com/show_bug.cgi?id=1227762 * https://bugzilla.suse.com/show_bug.cgi?id=1227770 * https://bugzilla.suse.com/show_bug.cgi?id=1227771 * https://bugzilla.suse.com/show_bug.cgi?id=1227772 * https://bugzilla.suse.com/show_bug.cgi?id=1227774 * https://bugzilla.suse.com/show_bug.cgi?id=1227786 * https://bugzilla.suse.com/show_bug.cgi?id=1227790 * https://bugzilla.suse.com/show_bug.cgi?id=1227806 * https://bugzilla.suse.com/show_bug.cgi?id=1227824 * https://bugzilla.suse.com/show_bug.cgi?id=1227828 * https://bugzilla.suse.com/show_bug.cgi?id=1227830 * https://bugzilla.suse.com/show_bug.cgi?id=1227836 * https://bugzilla.suse.com/show_bug.cgi?id=1227849 * https://bugzilla.suse.com/show_bug.cgi?id=1227865 * https://bugzilla.suse.com/show_bug.cgi?id=1227866 * https://bugzilla.suse.com/show_bug.cgi?id=1227884 * https://bugzilla.suse.com/show_bug.cgi?id=1227886 * https://bugzilla.suse.com/show_bug.cgi?id=1227891 * https://bugzilla.suse.com/show_bug.cgi?id=1227913 * https://bugzilla.suse.com/show_bug.cgi?id=1227924 * https://bugzilla.suse.com/show_bug.cgi?id=1227928 * https://bugzilla.suse.com/show_bug.cgi?id=1227929 * https://bugzilla.suse.com/show_bug.cgi?id=1227936 * https://bugzilla.suse.com/show_bug.cgi?id=1227957 * https://bugzilla.suse.com/show_bug.cgi?id=1227968 * https://bugzilla.suse.com/show_bug.cgi?id=1227969 * https://bugzilla.suse.com/show_bug.cgi?id=1227975 * https://bugzilla.suse.com/show_bug.cgi?id=1227985 * https://bugzilla.suse.com/show_bug.cgi?id=1227989 * https://bugzilla.suse.com/show_bug.cgi?id=1228003 * https://bugzilla.suse.com/show_bug.cgi?id=1228005 * https://bugzilla.suse.com/show_bug.cgi?id=1228008 * https://bugzilla.suse.com/show_bug.cgi?id=1228013 * https://bugzilla.suse.com/show_bug.cgi?id=1228025 * https://bugzilla.suse.com/show_bug.cgi?id=1228030 * https://bugzilla.suse.com/show_bug.cgi?id=1228037 * https://bugzilla.suse.com/show_bug.cgi?id=1228045 * https://bugzilla.suse.com/show_bug.cgi?id=1228054 * https://bugzilla.suse.com/show_bug.cgi?id=1228055 * https://bugzilla.suse.com/show_bug.cgi?id=1228063 * https://bugzilla.suse.com/show_bug.cgi?id=1228071 * https://bugzilla.suse.com/show_bug.cgi?id=1228235 * https://bugzilla.suse.com/show_bug.cgi?id=1228237 * https://bugzilla.suse.com/show_bug.cgi?id=1228327 * https://bugzilla.suse.com/show_bug.cgi?id=1228328 * https://bugzilla.suse.com/show_bug.cgi?id=1228408 * https://bugzilla.suse.com/show_bug.cgi?id=1228409 * https://bugzilla.suse.com/show_bug.cgi?id=1228410 * https://bugzilla.suse.com/show_bug.cgi?id=1228470 * https://bugzilla.suse.com/show_bug.cgi?id=1228530 * https://bugzilla.suse.com/show_bug.cgi?id=1228561 * https://bugzilla.suse.com/show_bug.cgi?id=1228565 * https://bugzilla.suse.com/show_bug.cgi?id=1228567 * https://bugzilla.suse.com/show_bug.cgi?id=1228580 * https://bugzilla.suse.com/show_bug.cgi?id=1228581 * https://bugzilla.suse.com/show_bug.cgi?id=1228584 * https://bugzilla.suse.com/show_bug.cgi?id=1228588 * https://bugzilla.suse.com/show_bug.cgi?id=1228599 * https://bugzilla.suse.com/show_bug.cgi?id=1228617 * https://bugzilla.suse.com/show_bug.cgi?id=1228625 * https://bugzilla.suse.com/show_bug.cgi?id=1228626 * https://bugzilla.suse.com/show_bug.cgi?id=1228633 * https://bugzilla.suse.com/show_bug.cgi?id=1228640 * https://bugzilla.suse.com/show_bug.cgi?id=1228649 * https://bugzilla.suse.com/show_bug.cgi?id=1228655 * https://bugzilla.suse.com/show_bug.cgi?id=1228658 * https://bugzilla.suse.com/show_bug.cgi?id=1228662 * https://bugzilla.suse.com/show_bug.cgi?id=1228680 * https://bugzilla.suse.com/show_bug.cgi?id=1228705 * https://bugzilla.suse.com/show_bug.cgi?id=1228723 * https://bugzilla.suse.com/show_bug.cgi?id=1228726 * https://bugzilla.suse.com/show_bug.cgi?id=1228743 * https://bugzilla.suse.com/show_bug.cgi?id=1228850
--===============4975580546778265579== Content-Type: text/html; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
<div class="container"> <h1>Security update for the Linux Kernel</h1>
<table class="table table-striped table-bordered"> <tbody> <tr> <th>Announcement ID:</th> <td>SUSE-SU-2024:2901-1</td> </tr> <tr> <th>Rating:</th> <td>important</td> </tr> <tr> <th>References:</th> <td> <ul> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1065729">bsc#1065729</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1088701">bsc#1088701</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1149446">bsc#1149446</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1179610">bsc#1179610</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1186463">bsc#1186463</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1196018">bsc#1196018</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1202346">bsc#1202346</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215420">bsc#1215420</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216834">bsc#1216834</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220138">bsc#1220138</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220833">bsc#1220833</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220942">bsc#1220942</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221045">bsc#1221045</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221614">bsc#1221614</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221616">bsc#1221616</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221618">bsc#1221618</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221656">bsc#1221656</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221659">bsc#1221659</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222005">bsc#1222005</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222060">bsc#1222060</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222317">bsc#1222317</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222326">bsc#1222326</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222372">bsc#1222372</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222625">bsc#1222625</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222776">bsc#1222776</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222792">bsc#1222792</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222824">bsc#1222824</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222829">bsc#1222829</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222866">bsc#1222866</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223012">bsc#1223012</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223021">bsc#1223021</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223188">bsc#1223188</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223778">bsc#1223778</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223813">bsc#1223813</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223815">bsc#1223815</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224500">bsc#1224500</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224512">bsc#1224512</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224545">bsc#1224545</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224557">bsc#1224557</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224571">bsc#1224571</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224576">bsc#1224576</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224587">bsc#1224587</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224622">bsc#1224622</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224627">bsc#1224627</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224637">bsc#1224637</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224641">bsc#1224641</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224647">bsc#1224647</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224663">bsc#1224663</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224683">bsc#1224683</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224686">bsc#1224686</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224699">bsc#1224699</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224700">bsc#1224700</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224743">bsc#1224743</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224965">bsc#1224965</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224975">bsc#1224975</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225003">bsc#1225003</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225214">bsc#1225214</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225224">bsc#1225224</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225229">bsc#1225229</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225238">bsc#1225238</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225241">bsc#1225241</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225326">bsc#1225326</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225328">bsc#1225328</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225346">bsc#1225346</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225357">bsc#1225357</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225361">bsc#1225361</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225396">bsc#1225396</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225427">bsc#1225427</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225431">bsc#1225431</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225455">bsc#1225455</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225478">bsc#1225478</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225505">bsc#1225505</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225530">bsc#1225530</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225532">bsc#1225532</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225569">bsc#1225569</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225593">bsc#1225593</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225711">bsc#1225711</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225719">bsc#1225719</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225767">bsc#1225767</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225820">bsc#1225820</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225835">bsc#1225835</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225838">bsc#1225838</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225898">bsc#1225898</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226550">bsc#1226550</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226553">bsc#1226553</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226555">bsc#1226555</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226559">bsc#1226559</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226568">bsc#1226568</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226571">bsc#1226571</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226645">bsc#1226645</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226757">bsc#1226757</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226783">bsc#1226783</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226786">bsc#1226786</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226834">bsc#1226834</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226861">bsc#1226861</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226908">bsc#1226908</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226994">bsc#1226994</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227191">bsc#1227191</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227213">bsc#1227213</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227407">bsc#1227407</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227435">bsc#1227435</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227487">bsc#1227487</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227573">bsc#1227573</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227618">bsc#1227618</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227626">bsc#1227626</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227716">bsc#1227716</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227725">bsc#1227725</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227729">bsc#1227729</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227730">bsc#1227730</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227733">bsc#1227733</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227750">bsc#1227750</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227754">bsc#1227754</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227762">bsc#1227762</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227770">bsc#1227770</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227771">bsc#1227771</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227772">bsc#1227772</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227774">bsc#1227774</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227786">bsc#1227786</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227790">bsc#1227790</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227806">bsc#1227806</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227824">bsc#1227824</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227828">bsc#1227828</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227830">bsc#1227830</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227836">bsc#1227836</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227849">bsc#1227849</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227865">bsc#1227865</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227866">bsc#1227866</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227884">bsc#1227884</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227886">bsc#1227886</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227891">bsc#1227891</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227913">bsc#1227913</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227924">bsc#1227924</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227928">bsc#1227928</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227929">bsc#1227929</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227936">bsc#1227936</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227957">bsc#1227957</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227968">bsc#1227968</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227969">bsc#1227969</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227975">bsc#1227975</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227985">bsc#1227985</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227989">bsc#1227989</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228003">bsc#1228003</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228005">bsc#1228005</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228008">bsc#1228008</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228013">bsc#1228013</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228025">bsc#1228025</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228030">bsc#1228030</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228037">bsc#1228037</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228045">bsc#1228045</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228054">bsc#1228054</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228055">bsc#1228055</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228063">bsc#1228063</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228071">bsc#1228071</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228235">bsc#1228235</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228237">bsc#1228237</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228327">bsc#1228327</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228328">bsc#1228328</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228408">bsc#1228408</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228409">bsc#1228409</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228410">bsc#1228410</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228470">bsc#1228470</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228530">bsc#1228530</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228561">bsc#1228561</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228565">bsc#1228565</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228567">bsc#1228567</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228580">bsc#1228580</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228581">bsc#1228581</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228584">bsc#1228584</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228588">bsc#1228588</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228599">bsc#1228599</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228617">bsc#1228617</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228625">bsc#1228625</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228626">bsc#1228626</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228633">bsc#1228633</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228640">bsc#1228640</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228649">bsc#1228649</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228655">bsc#1228655</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228658">bsc#1228658</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228662">bsc#1228662</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228680">bsc#1228680</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228705">bsc#1228705</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228723">bsc#1228723</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228726">bsc#1228726</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228743">bsc#1228743</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228850">bsc#1228850</a> </li> </ul> </td> </tr> <tr> <th> Cross-References: </th> <td> <ul> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2020-26558.html">CVE-2020-26558</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-0129.html">CVE-2021-0129</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47145.html">CVE-2021-47145</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47191.html">CVE-2021-47191</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47194.html">CVE-2021-47194</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47197.html">CVE-2021-47197</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47201.html">CVE-2021-47201</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47219.html">CVE-2021-47219</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47275.html">CVE-2021-47275</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47295.html">CVE-2021-47295</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47388.html">CVE-2021-47388</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47395.html">CVE-2021-47395</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47399.html">CVE-2021-47399</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47403.html">CVE-2021-47403</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47405.html">CVE-2021-47405</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47438.html">CVE-2021-47438</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47441.html">CVE-2021-47441</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47468.html">CVE-2021-47468</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47498.html">CVE-2021-47498</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47501.html">CVE-2021-47501</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47516.html">CVE-2021-47516</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47520.html">CVE-2021-47520</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47542.html">CVE-2021-47542</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47547.html">CVE-2021-47547</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47559.html">CVE-2021-47559</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47580.html">CVE-2021-47580</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47582.html">CVE-2021-47582</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47588.html">CVE-2021-47588</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47597.html">CVE-2021-47597</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47599.html">CVE-2021-47599</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47606.html">CVE-2021-47606</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47619.html">CVE-2021-47619</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-20368.html">CVE-2022-20368</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-28748.html">CVE-2022-28748</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-2964.html">CVE-2022-2964</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48775.html">CVE-2022-48775</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48792.html">CVE-2022-48792</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48794.html">CVE-2022-48794</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48804.html">CVE-2022-48804</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48805.html">CVE-2022-48805</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48810.html">CVE-2022-48810</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48811.html">CVE-2022-48811</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48823.html">CVE-2022-48823</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48826.html">CVE-2022-48826</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48827.html">CVE-2022-48827</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48828.html">CVE-2022-48828</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48829.html">CVE-2022-48829</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48836.html">CVE-2022-48836</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48839.html">CVE-2022-48839</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48850.html">CVE-2022-48850</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48855.html">CVE-2022-48855</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48857.html">CVE-2022-48857</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48860.html">CVE-2022-48860</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48863.html">CVE-2022-48863</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-4244.html">CVE-2023-4244</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52435.html">CVE-2023-52435</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52507.html">CVE-2023-52507</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52594.html">CVE-2023-52594</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52612.html">CVE-2023-52612</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52615.html">CVE-2023-52615</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52619.html">CVE-2023-52619</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52623.html">CVE-2023-52623</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52669.html">CVE-2023-52669</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52683.html">CVE-2023-52683</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52693.html">CVE-2023-52693</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52743.html">CVE-2023-52743</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52753.html">CVE-2023-52753</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52817.html">CVE-2023-52817</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52818.html">CVE-2023-52818</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52819.html">CVE-2023-52819</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52885.html">CVE-2023-52885</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26615.html">CVE-2024-26615</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26635.html">CVE-2024-26635</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26636.html">CVE-2024-26636</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26659.html">CVE-2024-26659</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26663.html">CVE-2024-26663</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26735.html">CVE-2024-26735</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26830.html">CVE-2024-26830</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26863.html">CVE-2024-26863</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26880.html">CVE-2024-26880</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26920.html">CVE-2024-26920</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26924.html">CVE-2024-26924</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27019.html">CVE-2024-27019</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27020.html">CVE-2024-27020</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27025.html">CVE-2024-27025</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27437.html">CVE-2024-27437</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35805.html">CVE-2024-35805</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35806.html">CVE-2024-35806</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35819.html">CVE-2024-35819</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35828.html">CVE-2024-35828</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35837.html">CVE-2024-35837</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35887.html">CVE-2024-35887</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35893.html">CVE-2024-35893</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35934.html">CVE-2024-35934</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35947.html">CVE-2024-35947</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35949.html">CVE-2024-35949</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35966.html">CVE-2024-35966</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35967.html">CVE-2024-35967</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35978.html">CVE-2024-35978</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35995.html">CVE-2024-35995</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36004.html">CVE-2024-36004</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36014.html">CVE-2024-36014</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36288.html">CVE-2024-36288</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36592.html">CVE-2024-36592</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36901.html">CVE-2024-36901</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36902.html">CVE-2024-36902</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36919.html">CVE-2024-36919</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36924.html">CVE-2024-36924</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36939.html">CVE-2024-36939</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36941.html">CVE-2024-36941</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36952.html">CVE-2024-36952</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-38558.html">CVE-2024-38558</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-38560.html">CVE-2024-38560</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-38598.html">CVE-2024-38598</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-38619.html">CVE-2024-38619</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-38630.html">CVE-2024-38630</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39301.html">CVE-2024-39301</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39475.html">CVE-2024-39475</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39487.html">CVE-2024-39487</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39488.html">CVE-2024-39488</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39490.html">CVE-2024-39490</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39494.html">CVE-2024-39494</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39499.html">CVE-2024-39499</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39501.html">CVE-2024-39501</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39506.html">CVE-2024-39506</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39507.html">CVE-2024-39507</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39509.html">CVE-2024-39509</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40901.html">CVE-2024-40901</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40904.html">CVE-2024-40904</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40912.html">CVE-2024-40912</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40923.html">CVE-2024-40923</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40929.html">CVE-2024-40929</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40932.html">CVE-2024-40932</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40937.html">CVE-2024-40937</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40941.html">CVE-2024-40941</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40942.html">CVE-2024-40942</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40943.html">CVE-2024-40943</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40953.html">CVE-2024-40953</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40959.html">CVE-2024-40959</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40966.html">CVE-2024-40966</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40967.html">CVE-2024-40967</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40978.html">CVE-2024-40978</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40982.html">CVE-2024-40982</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40987.html">CVE-2024-40987</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40988.html">CVE-2024-40988</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40990.html">CVE-2024-40990</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40995.html">CVE-2024-40995</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40998.html">CVE-2024-40998</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40999.html">CVE-2024-40999</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41014.html">CVE-2024-41014</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41015.html">CVE-2024-41015</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41016.html">CVE-2024-41016</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41044.html">CVE-2024-41044</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41048.html">CVE-2024-41048</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41059.html">CVE-2024-41059</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41060.html">CVE-2024-41060</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41063.html">CVE-2024-41063</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41064.html">CVE-2024-41064</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41066.html">CVE-2024-41066</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41070.html">CVE-2024-41070</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41071.html">CVE-2024-41071</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41072.html">CVE-2024-41072</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41076.html">CVE-2024-41076</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41078.html">CVE-2024-41078</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41081.html">CVE-2024-41081</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41089.html">CVE-2024-41089</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41090.html">CVE-2024-41090</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41091.html">CVE-2024-41091</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41095.html">CVE-2024-41095</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42070.html">CVE-2024-42070</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42093.html">CVE-2024-42093</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42096.html">CVE-2024-42096</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42119.html">CVE-2024-42119</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42120.html">CVE-2024-42120</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42124.html">CVE-2024-42124</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42145.html">CVE-2024-42145</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42223.html">CVE-2024-42223</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42224.html">CVE-2024-42224</a> </li> </ul> </td> </tr> <tr> <th>CVSS scores:</th> <td> <ul class="list-group"> <li class="list-group-item"> <span class="cvss-reference">CVE-2020-26558</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.2</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2020-26558</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.2</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-0129</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-0129</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.7</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47145</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47191</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47194</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47194</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47197</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47201</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47219</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47275</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47295</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47388</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47395</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47399</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47403</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47405</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47438</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47441</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47468</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47498</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47501</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47516</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47516</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47520</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47520</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47542</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47542</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47547</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47559</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47559</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47580</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47582</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47588</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47597</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47599</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47606</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47619</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-20368</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-20368</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-28748</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.7</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-2964</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-2964</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48775</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48792</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48792</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48794</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48804</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48805</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.6</span> <span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48810</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48811</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48823</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48826</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48827</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48828</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48829</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48836</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48836</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48839</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48839</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48850</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48850</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48855</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48855</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48857</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48857</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48860</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48860</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48863</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48863</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-4244</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-4244</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52435</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52435</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52507</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.7</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52594</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52612</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52615</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52619</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52623</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52669</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52683</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52693</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52743</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52753</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52753</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52817</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52817</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52818</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.6</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52819</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.6</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52885</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.1</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26615</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26635</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26636</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26659</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26663</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26735</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26830</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26863</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26880</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26920</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26924</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27019</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27019</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27020</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27020</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27025</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.6</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27437</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35805</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35806</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35819</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35828</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35837</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35887</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35893</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35934</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">2.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35947</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35949</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35966</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35967</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35978</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35978</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35995</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.6</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36004</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36014</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36288</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36288</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36901</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36901</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36902</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36902</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36919</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36924</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36939</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36941</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36952</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-38558</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-38560</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-38598</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-38619</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-38630</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39301</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39475</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39475</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39487</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39488</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39490</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39494</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39494</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39499</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39501</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39506</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39507</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39509</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40901</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.6</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40904</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40912</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40923</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40929</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40932</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40937</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40941</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40942</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40943</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40953</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40959</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40966</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40967</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40978</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40982</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40987</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40988</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40990</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40995</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40998</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40999</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.6</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41014</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41015</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41016</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41044</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.3</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41048</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41059</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.3</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41059</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41060</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41060</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41063</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.7</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41063</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41064</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.7</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41064</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41066</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41066</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41070</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41071</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.3</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41072</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41076</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41078</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41081</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41089</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41089</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41090</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41091</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41095</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41095</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42070</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42070</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42093</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.6</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42096</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42096</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42119</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42120</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42124</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42145</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.7</span> <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42145</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42223</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42223</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42224</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42224</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> </ul> </td> </tr> <tr> <th>Affected Products:</th> <td> <ul class="list-group"> <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 12 SP5</li> <li class="list-group-item">SUSE Linux Enterprise Server 12 SP5</li> <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 12 SP5</li> </ul> </td> </tr> </tbody> </table>
<p>An update that solves 178 vulnerabilities and has seven security fixes can now be installed.</p>
<h2>Description:</h2> <p>The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security bugfixes.</p> <p>The following security bugs were fixed:</p> <ul> <li>CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).</li> <li>CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633).</li> <li>CVE-2024-39506: liquidio: adjust a NULL pointer handling path in lio_vf_rep_copy_packet (bsc#1227729).</li> <li>CVE-2021-47619: i40e: Fix queues reservation for XDP (bsc#1226645).</li> <li>CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743).</li> <li>CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible (bsc#1228705).</li> <li>CVE-2024-42223: media: dvb-frontends: tda10048: Fix integer overflow (bsc#1228726).</li> <li>CVE-2024-42119: drm/amd/display: Skip finding free audio for unknown engine_id (bsc#1228584).</li> <li>CVE-2024-42120: drm/amd/display: Check pipe offset before setting vblank (bsc#1228588).</li> <li>CVE-2024-41095: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes (bsc#1228662).</li> <li>CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list (bsc#1228723).</li> <li>CVE-2024-41072: wifi: cfg80211: wext: add extra SIOCSIWSCAN data check (bsc#1228626).</li> <li>CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565).</li> <li>CVE-2024-40995: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (bsc#1227830).</li> <li>CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets (bsc#1228530).</li> <li>CVE-2024-41066: ibmvnic: add tx check to prevent skb leak (bsc#1228640).</li> <li>CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680).</li> <li>CVE-2024-41089: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes (bsc#1228658).</li> <li>CVE-2024-41060: drm/radeon: check bo_va->bo is non-NULL before using it (bsc#1228567).</li> <li>CVE-2022-48829: NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes (bsc#1228055).</li> <li>CVE-2022-48828: NFSD: Fix ia_size underflow (bsc#1228054).</li> <li>CVE-2022-48827: NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1228037).</li> <li>CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable failure (bsc#1228655).</li> <li>CVE-2024-41071: wifi: mac80211: Avoid address calculations via out of bounds array indexing (bsc#1228625).</li> <li>CVE-2024-41064: powerpc/eeh: avoid possible crash when edev->pdev changes (bsc#1228599).</li> <li>CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700).</li> <li>CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617).</li> <li>CVE-2024-40978: scsi: qedi: Fix crash while reading debugfs attribute (bsc#1227929).</li> <li>CVE-2022-48792: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task (bsc#1228013).</li> <li>CVE-2022-48823: scsi: qedf: Fix refcount issue when LOGO is received during TMF (bsc#1228045).</li> <li>CVE-2024-41076: NFSv4: Fix memory leak in nfs4_set_security_label (bsc#1228649).</li> <li>CVE-2024-40998: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() (bsc#1227866).</li> <li>CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).</li> <li>CVE-2024-40987: drm/amdgpu: fix UBSAN warning in kv_dpm.c (bsc#1228235).</li> <li>CVE-2022-48826: drm/vc4: Fix deadlock on DSI device attach error (bsc#1227975)</li> <li>CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ (bsc#1222625).</li> <li>CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry() (bsc#1228409).</li> <li>CVE-2024-41016: ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410).</li> <li>CVE-2024-41063: bluetooth: hci_core: cancel all works upon hci_unregister_dev() (bsc#1228580).</li> <li>CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (bsc#1228470).</li> <li>CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() (bsc#1228581).</li> <li>CVE-2021-47405: HID: usbhid: free raw_report buffers in usbhid_stop (bsc#1225238).</li> <li>CVE-2024-40988: drm/radeon: fix UBSAN warning in kv_dpm.c (bsc#1227957).</li> <li>CVE-2024-40932: drm/exynos/vidi: fix memory leak in .get_modes() (bsc#1227828).</li> <li>CVE-2021-47403: ipack: ipoctal: fix module reference leak (bsc#1225241).</li> <li>CVE-2021-47388: mac80211: fix use-after-free in CCMP/GCMP RX (bsc#1225214).</li> <li>CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data (bsc#1228408).</li> <li>CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327).</li> <li>CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).</li> <li>CVE-2024-40999: net: ena: Add validation for completion descriptors consistency (bsc#1227913).</li> <li>CVE-2024-35837: net: mvpp2: clear BM pool before initialization (bsc#1224500).</li> <li>CVE-2021-47588: sit: do not call ipip6_dev_free() from sit_init_net() (bsc#1226568).</li> <li>CVE-2022-48804: vt_ioctl: fix array_index_nospec in vt_setactivate (bsc#1227968).</li> <li>CVE-2024-40967: serial: imx: Introduce timeout when waiting on transmitter empty (bsc#1227891).</li> <li>CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc (bsc#1227886).</li> <li>CVE-2022-48850: net-sysfs: add check for netdevice being present to speed_show (bsc#1228071).</li> <li>CVE-2021-47582: usb: core: Do not hold the device lock while sleeping in do_proc_control() (bsc#1226559).</li> <li>CVE-2024-40982: ssb: fix potential NULL pointer dereference in ssb_device_uevent() (bsc#1227865).</li> <li>CVE-2021-47468: isdn: mISDN: Fix sleeping function called from invalid context (bsc#1225346).</li> <li>CVE-2021-47395: mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap (bsc#1225326).</li> <li>CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path (bsc#1227936).</li> <li>CVE-2023-52594: Fixed potential array-index-out-of-bounds read in ath9k_htc_txstatus() (bsc#1221045).</li> <li>CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets (bsc#1228003).</li> <li>CVE-2021-47580: scsi: scsi_debug: Fix type in min_t to avoid stack OOB (bsc#1226550).</li> <li>CVE-2024-26735: ipv6: sr: fix possible use-after-free and null-ptr-deref (bsc#1222372).</li> <li>CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).</li> <li>CVE-2022-48811: ibmvnic: do not release napi in __ibmvnic_open() (bsc#1227928).</li> <li>CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bsc#1186463).</li> <li>CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (bsc#1179610).</li> <li>CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836).</li> <li>CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario (bsc#1227730).</li> <li>CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure (bsc#1227786).</li> <li>CVE-2024-40941: wifi: iwlwifi: mvm: do not read past the mfuart notifcation (bsc#1227771).</li> <li>CVE-2022-48860: ethernet: Fix error handling in xemaclite_of_probe (bsc#1228008).</li> <li>CVE-2022-48863: mISDN: Fix memory leak in dsp_pipeline_build() (bsc#1228063).</li> <li>CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() (bsc#1227806).</li> <li>CVE-2024-39499: vmci: prevent speculation leaks by sanitizing event in event_deliver() (bsc#1227725).</li> <li>CVE-2024-39487: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (bsc#1227573)</li> <li>CVE-2024-35934: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() (bsc#1224641)</li> <li>CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (bsc#1227884).</li> <li>CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512)</li> <li>CVE-2021-47441: mlxsw: thermal: Fix out-of-bounds memory accesses (bsc#1225224)</li> <li>CVE-2021-47194: cfg80211: call cfg80211_stop_ap when switch from P2P_GO type (bsc#1222829).</li> <li>CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (bsc#1223815)</li> <li>CVE-2022-48775: Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj (bsc#1227924).</li> <li>CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (bsc#1223813)</li> <li>CVE-2024-40929: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids (bsc#1227774).</li> <li>CVE-2024-40912: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() (bsc#1227790).</li> <li>CVE-2024-40942: wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects (bsc#1227770).</li> <li>CVE-2022-48857: NFC: port100: fix use-after-free in port100_send_complete (bsc#1228005).</li> <li>CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (bsc#1225719).</li> <li>CVE-2021-47606: net: netlink: af_netlink: Prevent empty skb by adding a check on len. (bsc#1226555).</li> <li>CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory (bsc#1227762).</li> <li>CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).</li> <li>CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove administratively set MAC (bsc#1223012).</li> <li>CVE-2021-47516: nfp: Fix memory leak in nfp_cpp_area_cache_add() (bsc#1225427).</li> <li>CVE-2021-47501: i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc (bsc#1225361).</li> <li>CVE-2024-39501: drivers: core: synchronize really_probe() and dev_uevent() (bsc#1227754).</li> <li>CVE-2023-52743: ice: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1225003)</li> <li>CVE-2021-47542: net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() (bsc#1225455).</li> <li>CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711)</li> <li>CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1224545)</li> <li>CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778)</li> <li>CVE-2021-47599: btrfs: use latest_dev in btrfs_show_devname (bsc#1226571).</li> <li>CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138).</li> <li>CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (bsc#1222326).</li> <li>CVE-2021-47597: inet_diag: fix kernel-infoleak for UDP sockets (bsc#1226553).</li> <li>CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core (bsc#1227626).</li> <li>CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for ICMPv6 (bsc#1226783).</li> <li>CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942).</li> <li>CVE-2023-52619: Fixed possible crash when setting number of cpus to an odd number in pstore/ram (bsc#1221618).</li> <li>CVE-2024-26659: Fixed wrong handling of isoc Babble and Buffer Overrun events in xhci (bsc#1222317).</li> <li>CVE-2024-35978: Bluetooth: Fix memory leak in hci_req_sync_complete() (bsc#1224571).</li> <li>CVE-2023-52669: crypto: s390/aes - Fix buffer overread in CTR mode (bsc#1224637).</li> <li>CVE-2023-52615: Fixed page fault dead lock on mmap-ed hwrng (bsc#1221614).</li> <li>CVE-2023-52612: Fixed req->dst buffer overflow in crypto/scomp (bsc#1221616).</li> <li>CVE-2024-35995: ACPI: CPPC: Use access_width over bit_width for system memory accesses (bsc#1224557).</li> <li>CVE-2023-52623: Fixed suspicious RCU usage in SUNRPC (bsc#1222060).</li> <li>CVE-2021-47295: net: sched: fix memory leak in tcindex_partial_destroy_work (bsc#1224975)</li> <li>CVE-2023-52693: ACPI: video: check for error while searching for backlight device parent (bsc#1224686).</li> <li>CVE-2023-52683: ACPI: LPIT: Avoid u32 multiplication overflow (bsc#1224627).</li> <li>CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).</li> <li>CVE-2024-39475: fbdev: savage: Handle err return when savagefb_check_var failed (bsc#1227435)</li> <li>CVE-2021-47520: can: pch_can: pch_can_rx_normal: fix use after free (bsc#1225431).</li> <li>CVE-2024-36941: wifi: nl80211: do not free NULL coalescing rule (bsc#1225835).</li> <li>CVE-2021-47145: btrfs: do not BUG_ON in link_to_fixup_dir (bsc#1222005).</li> <li>CVE-2021-47547: net: tulip: de4x5: fix the problem that the array 'lp->phy' may be out of bound (bsc#1225505).</li> <li>CVE-2023-52817: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (bsc#1225569).</li> <li>CVE-2023-52819: drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (bsc#1225532).</li> <li>CVE-2023-52818: drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 (bsc#1225530).</li> <li>CVE-2023-52753: drm/amd/display: Avoid NULL dereference of timing generator (bsc#1225478).</li> <li>CVE-2024-36014: drm/arm/malidp: fix a possible null pointer dereference (bsc#1225593).</li> <li>CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes (bsc#1221659).</li> <li>CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656).</li> <li>CVE-2024-35828: wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer() (bsc#1224622).</li> <li>CVE-2023-52507: Fixed possible shift-out-of-bounds in nfc/nci (bsc#1220833).</li> <li>CVE-2024-38598: md: fix resync softlockup when bitmap size is less than array size (bsc#1226757).</li> <li>CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit (bsc#1224743).</li> <li>CVE-2024-26880: dm: call the resume method on internal suspend (bsc#1223188).</li> <li>CVE-2021-47498: dm rq: do not queue request to blk-mq during DM suspend (bsc#1225357).</li> <li>CVE-2021-47275: bcache: avoid oversized read request in cache missing code path (bsc#1224965).</li> <li>CVE-2024-38619: usb-storage: alauda: Check whether the media is initialized (bsc#1226861).</li> <li>CVE-2021-47201: iavf: free q_vectors before queues in iavf_disable_vf (bsc#1222792).</li> <li>CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node() (bsc#1223021).</li> <li>CVE-2024-38630: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (bsc#1226908).</li> <li>CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994).</li> <li>CVE-2021-47559: net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk() (bsc#1225396).</li> </ul> <p>The following non-security bugs were fixed:</p> <ul> <li>Fix spurious WARNING caused by a qxl driver patch (bsc#1227213,bsc#1227191)</li> <li>KVM: PPC: Book3S HV: Do not take kvm->lock around kvm_for_each_vcpu (bsc#1065729).</li> <li>KVM: PPC: Book3S HV: remove extraneous asterisk from rm_host_ipi_action() comment (bsc#1065729).</li> <li>KVM: PPC: Book3S PR: Exiting split hack mode needs to fixup both PC and LR (bsc#1065729).</li> <li>KVM: PPC: Book3S: Fix some RCU-list locks (git-fixes).</li> <li>KVM: PPC: Book3S: Only report KVM_CAP_SPAPR_TCE_VFIO on powernv machines (bsc#1065729).</li> <li>KVM: PPC: Book3S: Use new mutex to synchronize access to rtas token list (bsc#1065729).</li> <li>KVM: PPC: Inform the userspace about TCE update failures (bsc#1065729).</li> <li>KVM: PPC: Move and undef TRACE_INCLUDE_PATH/FILE (bsc#1065729).</li> <li>PCI: Fix resource double counting on remove & rescan (git-fixes).</li> <li>PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git-fixes).</li> <li>PM: hibernate: x86: Use crc32 instead of md5 for hibernation e820 integrity check (git-fixes).</li> <li>SUNRPC: Fix gss_free_in_token_pages() (git-fixes).</li> <li>SUNRPC: Fix loop termination condition in gss_free_in_token_pages() (git-fixes).</li> <li>Tools: hv: kvp: eliminate 'may be used uninitialized' warning (git-fixes).</li> <li>USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (git-fixes).</li> <li>btrfs: fix 64bit compat send ioctl arguments not initializing version member (bsc#1228030).</li> <li>btrfs: fix send ioctl on 32bit with 64bit kernel (bsc#1228030).</li> <li>btrfs: incremental send, fix emission of invalid clone operations (bsc#1228030).</li> <li>btrfs: remove unused members dir_path from recorded_ref (bsc#1228030).</li> <li>btrfs: send, improve clone range (bsc#1228030).</li> <li>btrfs: send: add new command FILEATTR for file attributes (bsc#1228030).</li> <li>btrfs: send: add stream v2 definitions (bsc#1228030).</li> <li>btrfs: send: always use the rbtree based inode ref management infrastructure (bsc#1228030).</li> <li>btrfs: send: avoid copying file data (bsc#1228030).</li> <li>btrfs: send: explicitly number commands and attributes (bsc#1228030).</li> <li>btrfs: send: fix failures when processing inodes with no links (bsc#1228030).</li> <li>btrfs: send: fix send failure of a subcase of orphan inodes (bsc#1228030).</li> <li>btrfs: send: fix sending link commands for existing file paths (bsc#1228030).</li> <li>btrfs: send: get rid of i_size logic in send_write() (bsc#1228030).</li> <li>btrfs: send: introduce recorded_ref_alloc and recorded_ref_free (bsc#1228030).</li> <li>btrfs: send: prepare for v2 protocol (bsc#1228030).</li> <li>btrfs: send: refactor arguments of get_inode_info() (bsc#1228030).</li> <li>btrfs: send: remove stale code when checking for shared extents (bsc#1228030).</li> <li>btrfs: send: remove unused found_type parameter to lookup_dir_item_inode() (bsc#1228030).</li> <li>btrfs: send: remove unused send_ctx::{total,cmd}_send_size (bsc#1228030).</li> <li>btrfs: send: use boolean types for current inode status (bsc#1228030).</li> <li>btrfs: silence maybe-uninitialized warning in clone_range (bsc#1228030).</li> <li>drm/amdgpu/debugfs: fix error code when smc register accessors are NULL (git-fixes).</li> <li>drm/vc4: dsi: Only register our component once a DSI device is (bsc#1227975)</li> <li>hv_netvsc: rndis_filter needs to select NLS (git-fixes).</li> <li>ipv6: sr: fix incorrect unregister order (git-fixes).</li> <li>kgdb: Add kgdb_has_hit_break function (git-fixes).</li> <li>kgdb: Move the extern declaration kgdb_has_hit_break() to generic kgdb.h (git-fixes).</li> <li>net: hsr: fix placement of logical operator in a multi-line statement (bsc#1223021).</li> <li>net: mana: Fix the extra HZ in mana_hwc_send_request (git-fixes).</li> <li>net: mana: select PAGE_POOL (git-fixes).</li> <li>net_sched: add a temporary refcnt for struct tcindex_data (bsc#1224975).</li> <li>net_sched: fix a memory leak in cls_tcindex (bsc#1224975).</li> <li>net_sched: fix a missing refcnt in tcindex_init() (bsc#1224975).</li> <li>net_sched: hold rtnl lock in tcindex_partial_destroy_work() (bsc#1224975)</li> <li>nfs: Handle error of rpc_proc_register() in nfs_net_init() (git-fixes).</li> <li>nvme: fixup comment for nvme RDMA Provider Type (git-fixes).</li> <li>ocfs2: fix DIO failure due to insufficient transaction credits (bsc#1216834).</li> <li>ocfs2: remove redundant assignment to variable free_space (bsc#1228409).</li> <li>ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410).</li> <li>powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487).</li> <li>sched/deadline: Fix BUG_ON condition for deboosted tasks (bsc#1227407).</li> <li>scsi: qla2xxx: Avoid possible run-time warning with long model_num (bsc#1228850).</li> <li>scsi: qla2xxx: Complete command early within lock (bsc#1228850).</li> <li>scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).</li> <li>scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).</li> <li>scsi: qla2xxx: During vport delete send async logout explicitly (bsc#1228850).</li> <li>scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850).</li> <li>scsi: qla2xxx: Fix flash read failure (bsc#1228850).</li> <li>scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850).</li> <li>scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850).</li> <li>scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850).</li> <li>scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850).</li> <li>scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds (bsc#1228850).</li> <li>scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850).</li> <li>scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850).</li> <li>scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850).</li> <li>scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850).</li> <li>signal: Introduce clear_siginfo (git-fixes).</li> <li>string.h: Introduce memtostr() and memtostr_pad() (bsc#1228850).</li> <li>sunrpc: fix NFSACL RPC retry on soft mount (git-fixes).</li> <li>tools lib: Fix builds when glibc contains strlcpy() (git-fixes).</li> <li>tools: hv: fix KVP and VSS daemons exit code (git-fixes).</li> <li>usb: add a hcd_uses_dma helper (git-fixes).</li> <li>usb: atm: cxacru: fix endpoint checking in cxacru_bind() (git-fixes).</li> <li>usb: musb: da8xx: fix a resource leak in probe() (git-fixes).</li> <li>x86/apic: Fix kernel panic when booting with intremap=off and x2apic_phys (git-fixes).</li> <li>x86/bhi: Avoid warning in #DB handler due to BHI mitigation (git-fixes).</li> <li>x86/boot/e820: Fix typo in e820.c comment (git-fixes).</li> <li>x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-fixes).</li> <li>x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI (git-fixes).</li> <li>x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs (git-fixes).</li> <li>x86/fpu: Return proper error codes from user access functions (git-fixes).</li> <li>x86/ioremap: Fix page aligned size calculation in __ioremap_caller() (git-fixes).</li> <li>x86/kprobes: Fix kprobes instruction boudary check with CONFIG_RETHUNK (git-fixes).</li> <li>x86/kprobes: Fix optprobe optimization check with CONFIG_RETHUNK (git-fixes).</li> <li>x86/msr: Fix wr/rdmsr_safe_regs_on_cpu() prototypes (git-fixes).</li> <li>x86/numa: Use cpumask_available instead of hardcoded NULL check (git-fixes).</li> <li>x86: __memcpy_flushcache: fix wrong alignment if size > 2^32 (git-fixes).</li> <li>xfs: check that dir block entries do not off the end of the buffer (git-fixes).</li> <li>xfs: refactor xfs_verifier_error and xfs_buf_ioerror (git-fixes).</li> <li>xfs: remove XFS_WANT_CORRUPTED_RETURN from dir3 data verifiers (git-fixes).</li> <li>xhci: Poll for U0 after disabling USB2 LPM (git-fixes).</li> </ul>
<h2>Special Instructions and Notes:</h2> <ul> <li>Please reboot the system after installing this update.</li> </ul>
<h2>Patch Instructions:</h2> <p> To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product: </p> <ul class="list-group"> <li class="list-group-item"> SUSE Linux Enterprise Server for SAP Applications 12 SP5 <br/> <code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2901=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise High Performance Computing 12 SP5 <br/> <code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2901=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Server 12 SP5 <br/> <code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2901=1</code> </li> </ul>
<h2>Package List:</h2> <ul> <li> SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc x86_64) <ul> <li>kernel-azure-4.12.14-16.194.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) <ul> <li>kernel-azure-debugsource-4.12.14-16.194.1</li> <li>kernel-azure-devel-4.12.14-16.194.1</li> <li>kernel-azure-base-4.12.14-16.194.1</li> <li>kernel-azure-base-debuginfo-4.12.14-16.194.1</li> <li>kernel-syms-azure-4.12.14-16.194.1</li> <li>kernel-azure-debuginfo-4.12.14-16.194.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) <ul> <li>kernel-devel-azure-4.12.14-16.194.1</li> <li>kernel-source-azure-4.12.14-16.194.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing 12 SP5 (nosrc x86_64) <ul> <li>kernel-azure-4.12.14-16.194.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) <ul> <li>kernel-azure-debugsource-4.12.14-16.194.1</li> <li>kernel-azure-devel-4.12.14-16.194.1</li> <li>kernel-azure-base-4.12.14-16.194.1</li> <li>kernel-azure-base-debuginfo-4.12.14-16.194.1</li> <li>kernel-syms-azure-4.12.14-16.194.1</li> <li>kernel-azure-debuginfo-4.12.14-16.194.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) <ul> <li>kernel-devel-azure-4.12.14-16.194.1</li> <li>kernel-source-azure-4.12.14-16.194.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 12 SP5 (nosrc x86_64) <ul> <li>kernel-azure-4.12.14-16.194.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 12 SP5 (x86_64) <ul> <li>kernel-azure-debugsource-4.12.14-16.194.1</li> <li>kernel-azure-devel-4.12.14-16.194.1</li> <li>kernel-azure-base-4.12.14-16.194.1</li> <li>kernel-azure-base-debuginfo-4.12.14-16.194.1</li> <li>kernel-syms-azure-4.12.14-16.194.1</li> <li>kernel-azure-debuginfo-4.12.14-16.194.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 12 SP5 (noarch) <ul> <li>kernel-devel-azure-4.12.14-16.194.1</li> <li>kernel-source-azure-4.12.14-16.194.1</li> </ul> </li> </ul>
<h2>References:</h2> <ul> <li> <a href="https://www.suse.com/security/cve/CVE-2020-26558.html">https://www.suse.com/security/cve/CVE-2020-26558.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-0129.html">https://www.suse.com/security/cve/CVE-2021-0129.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47145.html">https://www.suse.com/security/cve/CVE-2021-47145.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47191.html">https://www.suse.com/security/cve/CVE-2021-47191.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47194.html">https://www.suse.com/security/cve/CVE-2021-47194.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47197.html">https://www.suse.com/security/cve/CVE-2021-47197.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47201.html">https://www.suse.com/security/cve/CVE-2021-47201.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47219.html">https://www.suse.com/security/cve/CVE-2021-47219.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47275.html">https://www.suse.com/security/cve/CVE-2021-47275.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47295.html">https://www.suse.com/security/cve/CVE-2021-47295.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47388.html">https://www.suse.com/security/cve/CVE-2021-47388.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47395.html">https://www.suse.com/security/cve/CVE-2021-47395.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47399.html">https://www.suse.com/security/cve/CVE-2021-47399.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47403.html">https://www.suse.com/security/cve/CVE-2021-47403.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47405.html">https://www.suse.com/security/cve/CVE-2021-47405.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47438.html">https://www.suse.com/security/cve/CVE-2021-47438.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47441.html">https://www.suse.com/security/cve/CVE-2021-47441.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47468.html">https://www.suse.com/security/cve/CVE-2021-47468.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47498.html">https://www.suse.com/security/cve/CVE-2021-47498.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47501.html">https://www.suse.com/security/cve/CVE-2021-47501.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47516.html">https://www.suse.com/security/cve/CVE-2021-47516.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47520.html">https://www.suse.com/security/cve/CVE-2021-47520.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47542.html">https://www.suse.com/security/cve/CVE-2021-47542.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47547.html">https://www.suse.com/security/cve/CVE-2021-47547.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47559.html">https://www.suse.com/security/cve/CVE-2021-47559.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47580.html">https://www.suse.com/security/cve/CVE-2021-47580.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47582.html">https://www.suse.com/security/cve/CVE-2021-47582.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47588.html">https://www.suse.com/security/cve/CVE-2021-47588.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47597.html">https://www.suse.com/security/cve/CVE-2021-47597.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47599.html">https://www.suse.com/security/cve/CVE-2021-47599.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47606.html">https://www.suse.com/security/cve/CVE-2021-47606.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47619.html">https://www.suse.com/security/cve/CVE-2021-47619.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-20368.html">https://www.suse.com/security/cve/CVE-2022-20368.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-28748.html">https://www.suse.com/security/cve/CVE-2022-28748.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-2964.html">https://www.suse.com/security/cve/CVE-2022-2964.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48775.html">https://www.suse.com/security/cve/CVE-2022-48775.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48792.html">https://www.suse.com/security/cve/CVE-2022-48792.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48794.html">https://www.suse.com/security/cve/CVE-2022-48794.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48804.html">https://www.suse.com/security/cve/CVE-2022-48804.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48805.html">https://www.suse.com/security/cve/CVE-2022-48805.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48810.html">https://www.suse.com/security/cve/CVE-2022-48810.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48811.html">https://www.suse.com/security/cve/CVE-2022-48811.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48823.html">https://www.suse.com/security/cve/CVE-2022-48823.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48826.html">https://www.suse.com/security/cve/CVE-2022-48826.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48827.html">https://www.suse.com/security/cve/CVE-2022-48827.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48828.html">https://www.suse.com/security/cve/CVE-2022-48828.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48829.html">https://www.suse.com/security/cve/CVE-2022-48829.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48836.html">https://www.suse.com/security/cve/CVE-2022-48836.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48839.html">https://www.suse.com/security/cve/CVE-2022-48839.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48850.html">https://www.suse.com/security/cve/CVE-2022-48850.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48855.html">https://www.suse.com/security/cve/CVE-2022-48855.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48857.html">https://www.suse.com/security/cve/CVE-2022-48857.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48860.html">https://www.suse.com/security/cve/CVE-2022-48860.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48863.html">https://www.suse.com/security/cve/CVE-2022-48863.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-4244.html">https://www.suse.com/security/cve/CVE-2023-4244.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52435.html">https://www.suse.com/security/cve/CVE-2023-52435.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52507.html">https://www.suse.com/security/cve/CVE-2023-52507.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52594.html">https://www.suse.com/security/cve/CVE-2023-52594.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52612.html">https://www.suse.com/security/cve/CVE-2023-52612.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52615.html">https://www.suse.com/security/cve/CVE-2023-52615.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52619.html">https://www.suse.com/security/cve/CVE-2023-52619.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52623.html">https://www.suse.com/security/cve/CVE-2023-52623.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52669.html">https://www.suse.com/security/cve/CVE-2023-52669.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52683.html">https://www.suse.com/security/cve/CVE-2023-52683.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52693.html">https://www.suse.com/security/cve/CVE-2023-52693.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52743.html">https://www.suse.com/security/cve/CVE-2023-52743.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52753.html">https://www.suse.com/security/cve/CVE-2023-52753.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52817.html">https://www.suse.com/security/cve/CVE-2023-52817.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52818.html">https://www.suse.com/security/cve/CVE-2023-52818.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52819.html">https://www.suse.com/security/cve/CVE-2023-52819.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52885.html">https://www.suse.com/security/cve/CVE-2023-52885.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26615.html">https://www.suse.com/security/cve/CVE-2024-26615.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26635.html">https://www.suse.com/security/cve/CVE-2024-26635.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26636.html">https://www.suse.com/security/cve/CVE-2024-26636.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26659.html">https://www.suse.com/security/cve/CVE-2024-26659.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26663.html">https://www.suse.com/security/cve/CVE-2024-26663.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26735.html">https://www.suse.com/security/cve/CVE-2024-26735.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26830.html">https://www.suse.com/security/cve/CVE-2024-26830.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26863.html">https://www.suse.com/security/cve/CVE-2024-26863.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26880.html">https://www.suse.com/security/cve/CVE-2024-26880.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26920.html">https://www.suse.com/security/cve/CVE-2024-26920.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26924.html">https://www.suse.com/security/cve/CVE-2024-26924.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27019.html">https://www.suse.com/security/cve/CVE-2024-27019.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27020.html">https://www.suse.com/security/cve/CVE-2024-27020.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27025.html">https://www.suse.com/security/cve/CVE-2024-27025.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27437.html">https://www.suse.com/security/cve/CVE-2024-27437.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35805.html">https://www.suse.com/security/cve/CVE-2024-35805.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35806.html">https://www.suse.com/security/cve/CVE-2024-35806.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35819.html">https://www.suse.com/security/cve/CVE-2024-35819.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35828.html">https://www.suse.com/security/cve/CVE-2024-35828.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35837.html">https://www.suse.com/security/cve/CVE-2024-35837.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35887.html">https://www.suse.com/security/cve/CVE-2024-35887.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35893.html">https://www.suse.com/security/cve/CVE-2024-35893.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35934.html">https://www.suse.com/security/cve/CVE-2024-35934.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35947.html">https://www.suse.com/security/cve/CVE-2024-35947.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35949.html">https://www.suse.com/security/cve/CVE-2024-35949.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35966.html">https://www.suse.com/security/cve/CVE-2024-35966.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35967.html">https://www.suse.com/security/cve/CVE-2024-35967.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35978.html">https://www.suse.com/security/cve/CVE-2024-35978.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35995.html">https://www.suse.com/security/cve/CVE-2024-35995.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36004.html">https://www.suse.com/security/cve/CVE-2024-36004.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36014.html">https://www.suse.com/security/cve/CVE-2024-36014.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36288.html">https://www.suse.com/security/cve/CVE-2024-36288.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36592.html">https://www.suse.com/security/cve/CVE-2024-36592.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36901.html">https://www.suse.com/security/cve/CVE-2024-36901.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36902.html">https://www.suse.com/security/cve/CVE-2024-36902.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36919.html">https://www.suse.com/security/cve/CVE-2024-36919.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36924.html">https://www.suse.com/security/cve/CVE-2024-36924.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36939.html">https://www.suse.com/security/cve/CVE-2024-36939.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36941.html">https://www.suse.com/security/cve/CVE-2024-36941.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36952.html">https://www.suse.com/security/cve/CVE-2024-36952.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-38558.html">https://www.suse.com/security/cve/CVE-2024-38558.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-38560.html">https://www.suse.com/security/cve/CVE-2024-38560.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-38598.html">https://www.suse.com/security/cve/CVE-2024-38598.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-38619.html">https://www.suse.com/security/cve/CVE-2024-38619.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-38630.html">https://www.suse.com/security/cve/CVE-2024-38630.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39301.html">https://www.suse.com/security/cve/CVE-2024-39301.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39475.html">https://www.suse.com/security/cve/CVE-2024-39475.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39487.html">https://www.suse.com/security/cve/CVE-2024-39487.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39488.html">https://www.suse.com/security/cve/CVE-2024-39488.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39490.html">https://www.suse.com/security/cve/CVE-2024-39490.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39494.html">https://www.suse.com/security/cve/CVE-2024-39494.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39499.html">https://www.suse.com/security/cve/CVE-2024-39499.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39501.html">https://www.suse.com/security/cve/CVE-2024-39501.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39506.html">https://www.suse.com/security/cve/CVE-2024-39506.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39507.html">https://www.suse.com/security/cve/CVE-2024-39507.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39509.html">https://www.suse.com/security/cve/CVE-2024-39509.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40901.html">https://www.suse.com/security/cve/CVE-2024-40901.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40904.html">https://www.suse.com/security/cve/CVE-2024-40904.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40912.html">https://www.suse.com/security/cve/CVE-2024-40912.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40923.html">https://www.suse.com/security/cve/CVE-2024-40923.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40929.html">https://www.suse.com/security/cve/CVE-2024-40929.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40932.html">https://www.suse.com/security/cve/CVE-2024-40932.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40937.html">https://www.suse.com/security/cve/CVE-2024-40937.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40941.html">https://www.suse.com/security/cve/CVE-2024-40941.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40942.html">https://www.suse.com/security/cve/CVE-2024-40942.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40943.html">https://www.suse.com/security/cve/CVE-2024-40943.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40953.html">https://www.suse.com/security/cve/CVE-2024-40953.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40959.html">https://www.suse.com/security/cve/CVE-2024-40959.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40966.html">https://www.suse.com/security/cve/CVE-2024-40966.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40967.html">https://www.suse.com/security/cve/CVE-2024-40967.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40978.html">https://www.suse.com/security/cve/CVE-2024-40978.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40982.html">https://www.suse.com/security/cve/CVE-2024-40982.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40987.html">https://www.suse.com/security/cve/CVE-2024-40987.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40988.html">https://www.suse.com/security/cve/CVE-2024-40988.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40990.html">https://www.suse.com/security/cve/CVE-2024-40990.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40995.html">https://www.suse.com/security/cve/CVE-2024-40995.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40998.html">https://www.suse.com/security/cve/CVE-2024-40998.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40999.html">https://www.suse.com/security/cve/CVE-2024-40999.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41014.html">https://www.suse.com/security/cve/CVE-2024-41014.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41015.html">https://www.suse.com/security/cve/CVE-2024-41015.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41016.html">https://www.suse.com/security/cve/CVE-2024-41016.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41044.html">https://www.suse.com/security/cve/CVE-2024-41044.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41048.html">https://www.suse.com/security/cve/CVE-2024-41048.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41059.html">https://www.suse.com/security/cve/CVE-2024-41059.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41060.html">https://www.suse.com/security/cve/CVE-2024-41060.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41063.html">https://www.suse.com/security/cve/CVE-2024-41063.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41064.html">https://www.suse.com/security/cve/CVE-2024-41064.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41066.html">https://www.suse.com/security/cve/CVE-2024-41066.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41070.html">https://www.suse.com/security/cve/CVE-2024-41070.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41071.html">https://www.suse.com/security/cve/CVE-2024-41071.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41072.html">https://www.suse.com/security/cve/CVE-2024-41072.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41076.html">https://www.suse.com/security/cve/CVE-2024-41076.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41078.html">https://www.suse.com/security/cve/CVE-2024-41078.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41081.html">https://www.suse.com/security/cve/CVE-2024-41081.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41089.html">https://www.suse.com/security/cve/CVE-2024-41089.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41090.html">https://www.suse.com/security/cve/CVE-2024-41090.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41091.html">https://www.suse.com/security/cve/CVE-2024-41091.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41095.html">https://www.suse.com/security/cve/CVE-2024-41095.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42070.html">https://www.suse.com/security/cve/CVE-2024-42070.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42093.html">https://www.suse.com/security/cve/CVE-2024-42093.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42096.html">https://www.suse.com/security/cve/CVE-2024-42096.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42119.html">https://www.suse.com/security/cve/CVE-2024-42119.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42120.html">https://www.suse.com/security/cve/CVE-2024-42120.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42124.html">https://www.suse.com/security/cve/CVE-2024-42124.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42145.html">https://www.suse.com/security/cve/CVE-2024-42145.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42223.html">https://www.suse.com/security/cve/CVE-2024-42223.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42224.html">https://www.suse.com/security/cve/CVE-2024-42224.html</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1065729">https://bugzilla.suse.com/show_bug.cgi?id=1065729</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1088701">https://bugzilla.suse.com/show_bug.cgi?id=1088701</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1149446">https://bugzilla.suse.com/show_bug.cgi?id=1149446</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1179610">https://bugzilla.suse.com/show_bug.cgi?id=1179610</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1186463">https://bugzilla.suse.com/show_bug.cgi?id=1186463</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1196018">https://bugzilla.suse.com/show_bug.cgi?id=1196018</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1202346">https://bugzilla.suse.com/show_bug.cgi?id=1202346</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215420">https://bugzilla.suse.com/show_bug.cgi?id=1215420</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216834">https://bugzilla.suse.com/show_bug.cgi?id=1216834</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220138">https://bugzilla.suse.com/show_bug.cgi?id=1220138</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220833">https://bugzilla.suse.com/show_bug.cgi?id=1220833</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220942">https://bugzilla.suse.com/show_bug.cgi?id=1220942</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221045">https://bugzilla.suse.com/show_bug.cgi?id=1221045</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221614">https://bugzilla.suse.com/show_bug.cgi?id=1221614</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221616">https://bugzilla.suse.com/show_bug.cgi?id=1221616</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221618">https://bugzilla.suse.com/show_bug.cgi?id=1221618</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221656">https://bugzilla.suse.com/show_bug.cgi?id=1221656</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221659">https://bugzilla.suse.com/show_bug.cgi?id=1221659</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222005">https://bugzilla.suse.com/show_bug.cgi?id=1222005</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222060">https://bugzilla.suse.com/show_bug.cgi?id=1222060</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222317">https://bugzilla.suse.com/show_bug.cgi?id=1222317</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222326">https://bugzilla.suse.com/show_bug.cgi?id=1222326</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222372">https://bugzilla.suse.com/show_bug.cgi?id=1222372</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222625">https://bugzilla.suse.com/show_bug.cgi?id=1222625</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222776">https://bugzilla.suse.com/show_bug.cgi?id=1222776</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222792">https://bugzilla.suse.com/show_bug.cgi?id=1222792</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222824">https://bugzilla.suse.com/show_bug.cgi?id=1222824</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222829">https://bugzilla.suse.com/show_bug.cgi?id=1222829</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222866">https://bugzilla.suse.com/show_bug.cgi?id=1222866</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223012">https://bugzilla.suse.com/show_bug.cgi?id=1223012</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223021">https://bugzilla.suse.com/show_bug.cgi?id=1223021</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223188">https://bugzilla.suse.com/show_bug.cgi?id=1223188</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223778">https://bugzilla.suse.com/show_bug.cgi?id=1223778</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223813">https://bugzilla.suse.com/show_bug.cgi?id=1223813</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223815">https://bugzilla.suse.com/show_bug.cgi?id=1223815</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224500">https://bugzilla.suse.com/show_bug.cgi?id=1224500</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224512">https://bugzilla.suse.com/show_bug.cgi?id=1224512</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224545">https://bugzilla.suse.com/show_bug.cgi?id=1224545</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224557">https://bugzilla.suse.com/show_bug.cgi?id=1224557</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224571">https://bugzilla.suse.com/show_bug.cgi?id=1224571</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224576">https://bugzilla.suse.com/show_bug.cgi?id=1224576</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224587">https://bugzilla.suse.com/show_bug.cgi?id=1224587</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224622">https://bugzilla.suse.com/show_bug.cgi?id=1224622</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224627">https://bugzilla.suse.com/show_bug.cgi?id=1224627</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224637">https://bugzilla.suse.com/show_bug.cgi?id=1224637</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224641">https://bugzilla.suse.com/show_bug.cgi?id=1224641</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224647">https://bugzilla.suse.com/show_bug.cgi?id=1224647</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224663">https://bugzilla.suse.com/show_bug.cgi?id=1224663</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224683">https://bugzilla.suse.com/show_bug.cgi?id=1224683</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224686">https://bugzilla.suse.com/show_bug.cgi?id=1224686</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224699">https://bugzilla.suse.com/show_bug.cgi?id=1224699</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224700">https://bugzilla.suse.com/show_bug.cgi?id=1224700</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224743">https://bugzilla.suse.com/show_bug.cgi?id=1224743</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224965">https://bugzilla.suse.com/show_bug.cgi?id=1224965</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224975">https://bugzilla.suse.com/show_bug.cgi?id=1224975</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225003">https://bugzilla.suse.com/show_bug.cgi?id=1225003</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225214">https://bugzilla.suse.com/show_bug.cgi?id=1225214</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225224">https://bugzilla.suse.com/show_bug.cgi?id=1225224</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225229">https://bugzilla.suse.com/show_bug.cgi?id=1225229</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225238">https://bugzilla.suse.com/show_bug.cgi?id=1225238</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225241">https://bugzilla.suse.com/show_bug.cgi?id=1225241</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225326">https://bugzilla.suse.com/show_bug.cgi?id=1225326</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225328">https://bugzilla.suse.com/show_bug.cgi?id=1225328</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225346">https://bugzilla.suse.com/show_bug.cgi?id=1225346</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225357">https://bugzilla.suse.com/show_bug.cgi?id=1225357</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225361">https://bugzilla.suse.com/show_bug.cgi?id=1225361</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225396">https://bugzilla.suse.com/show_bug.cgi?id=1225396</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225427">https://bugzilla.suse.com/show_bug.cgi?id=1225427</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225431">https://bugzilla.suse.com/show_bug.cgi?id=1225431</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225455">https://bugzilla.suse.com/show_bug.cgi?id=1225455</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225478">https://bugzilla.suse.com/show_bug.cgi?id=1225478</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225505">https://bugzilla.suse.com/show_bug.cgi?id=1225505</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225530">https://bugzilla.suse.com/show_bug.cgi?id=1225530</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225532">https://bugzilla.suse.com/show_bug.cgi?id=1225532</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225569">https://bugzilla.suse.com/show_bug.cgi?id=1225569</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225593">https://bugzilla.suse.com/show_bug.cgi?id=1225593</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225711">https://bugzilla.suse.com/show_bug.cgi?id=1225711</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225719">https://bugzilla.suse.com/show_bug.cgi?id=1225719</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225767">https://bugzilla.suse.com/show_bug.cgi?id=1225767</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225820">https://bugzilla.suse.com/show_bug.cgi?id=1225820</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225835">https://bugzilla.suse.com/show_bug.cgi?id=1225835</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225838">https://bugzilla.suse.com/show_bug.cgi?id=1225838</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225898">https://bugzilla.suse.com/show_bug.cgi?id=1225898</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226550">https://bugzilla.suse.com/show_bug.cgi?id=1226550</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226553">https://bugzilla.suse.com/show_bug.cgi?id=1226553</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226555">https://bugzilla.suse.com/show_bug.cgi?id=1226555</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226559">https://bugzilla.suse.com/show_bug.cgi?id=1226559</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226568">https://bugzilla.suse.com/show_bug.cgi?id=1226568</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226571">https://bugzilla.suse.com/show_bug.cgi?id=1226571</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226645">https://bugzilla.suse.com/show_bug.cgi?id=1226645</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226757">https://bugzilla.suse.com/show_bug.cgi?id=1226757</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226783">https://bugzilla.suse.com/show_bug.cgi?id=1226783</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226786">https://bugzilla.suse.com/show_bug.cgi?id=1226786</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226834">https://bugzilla.suse.com/show_bug.cgi?id=1226834</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226861">https://bugzilla.suse.com/show_bug.cgi?id=1226861</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226908">https://bugzilla.suse.com/show_bug.cgi?id=1226908</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226994">https://bugzilla.suse.com/show_bug.cgi?id=1226994</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227191">https://bugzilla.suse.com/show_bug.cgi?id=1227191</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227213">https://bugzilla.suse.com/show_bug.cgi?id=1227213</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227407">https://bugzilla.suse.com/show_bug.cgi?id=1227407</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227435">https://bugzilla.suse.com/show_bug.cgi?id=1227435</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227487">https://bugzilla.suse.com/show_bug.cgi?id=1227487</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227573">https://bugzilla.suse.com/show_bug.cgi?id=1227573</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227618">https://bugzilla.suse.com/show_bug.cgi?id=1227618</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227626">https://bugzilla.suse.com/show_bug.cgi?id=1227626</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227716">https://bugzilla.suse.com/show_bug.cgi?id=1227716</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227725">https://bugzilla.suse.com/show_bug.cgi?id=1227725</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227729">https://bugzilla.suse.com/show_bug.cgi?id=1227729</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227730">https://bugzilla.suse.com/show_bug.cgi?id=1227730</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227733">https://bugzilla.suse.com/show_bug.cgi?id=1227733</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227750">https://bugzilla.suse.com/show_bug.cgi?id=1227750</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227754">https://bugzilla.suse.com/show_bug.cgi?id=1227754</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227762">https://bugzilla.suse.com/show_bug.cgi?id=1227762</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227770">https://bugzilla.suse.com/show_bug.cgi?id=1227770</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227771">https://bugzilla.suse.com/show_bug.cgi?id=1227771</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227772">https://bugzilla.suse.com/show_bug.cgi?id=1227772</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227774">https://bugzilla.suse.com/show_bug.cgi?id=1227774</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227786">https://bugzilla.suse.com/show_bug.cgi?id=1227786</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227790">https://bugzilla.suse.com/show_bug.cgi?id=1227790</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227806">https://bugzilla.suse.com/show_bug.cgi?id=1227806</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227824">https://bugzilla.suse.com/show_bug.cgi?id=1227824</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227828">https://bugzilla.suse.com/show_bug.cgi?id=1227828</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227830">https://bugzilla.suse.com/show_bug.cgi?id=1227830</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227836">https://bugzilla.suse.com/show_bug.cgi?id=1227836</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227849">https://bugzilla.suse.com/show_bug.cgi?id=1227849</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227865">https://bugzilla.suse.com/show_bug.cgi?id=1227865</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227866">https://bugzilla.suse.com/show_bug.cgi?id=1227866</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227884">https://bugzilla.suse.com/show_bug.cgi?id=1227884</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227886">https://bugzilla.suse.com/show_bug.cgi?id=1227886</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227891">https://bugzilla.suse.com/show_bug.cgi?id=1227891</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227913">https://bugzilla.suse.com/show_bug.cgi?id=1227913</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227924">https://bugzilla.suse.com/show_bug.cgi?id=1227924</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227928">https://bugzilla.suse.com/show_bug.cgi?id=1227928</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227929">https://bugzilla.suse.com/show_bug.cgi?id=1227929</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227936">https://bugzilla.suse.com/show_bug.cgi?id=1227936</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227957">https://bugzilla.suse.com/show_bug.cgi?id=1227957</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227968">https://bugzilla.suse.com/show_bug.cgi?id=1227968</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227969">https://bugzilla.suse.com/show_bug.cgi?id=1227969</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227975">https://bugzilla.suse.com/show_bug.cgi?id=1227975</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227985">https://bugzilla.suse.com/show_bug.cgi?id=1227985</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227989">https://bugzilla.suse.com/show_bug.cgi?id=1227989</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228003">https://bugzilla.suse.com/show_bug.cgi?id=1228003</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228005">https://bugzilla.suse.com/show_bug.cgi?id=1228005</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228008">https://bugzilla.suse.com/show_bug.cgi?id=1228008</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228013">https://bugzilla.suse.com/show_bug.cgi?id=1228013</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228025">https://bugzilla.suse.com/show_bug.cgi?id=1228025</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228030">https://bugzilla.suse.com/show_bug.cgi?id=1228030</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228037">https://bugzilla.suse.com/show_bug.cgi?id=1228037</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228045">https://bugzilla.suse.com/show_bug.cgi?id=1228045</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228054">https://bugzilla.suse.com/show_bug.cgi?id=1228054</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228055">https://bugzilla.suse.com/show_bug.cgi?id=1228055</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228063">https://bugzilla.suse.com/show_bug.cgi?id=1228063</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228071">https://bugzilla.suse.com/show_bug.cgi?id=1228071</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228235">https://bugzilla.suse.com/show_bug.cgi?id=1228235</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228237">https://bugzilla.suse.com/show_bug.cgi?id=1228237</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228327">https://bugzilla.suse.com/show_bug.cgi?id=1228327</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228328">https://bugzilla.suse.com/show_bug.cgi?id=1228328</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228408">https://bugzilla.suse.com/show_bug.cgi?id=1228408</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228409">https://bugzilla.suse.com/show_bug.cgi?id=1228409</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228410">https://bugzilla.suse.com/show_bug.cgi?id=1228410</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228470">https://bugzilla.suse.com/show_bug.cgi?id=1228470</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228530">https://bugzilla.suse.com/show_bug.cgi?id=1228530</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228561">https://bugzilla.suse.com/show_bug.cgi?id=1228561</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228565">https://bugzilla.suse.com/show_bug.cgi?id=1228565</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228567">https://bugzilla.suse.com/show_bug.cgi?id=1228567</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228580">https://bugzilla.suse.com/show_bug.cgi?id=1228580</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228581">https://bugzilla.suse.com/show_bug.cgi?id=1228581</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228584">https://bugzilla.suse.com/show_bug.cgi?id=1228584</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228588">https://bugzilla.suse.com/show_bug.cgi?id=1228588</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228599">https://bugzilla.suse.com/show_bug.cgi?id=1228599</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228617">https://bugzilla.suse.com/show_bug.cgi?id=1228617</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228625">https://bugzilla.suse.com/show_bug.cgi?id=1228625</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228626">https://bugzilla.suse.com/show_bug.cgi?id=1228626</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228633">https://bugzilla.suse.com/show_bug.cgi?id=1228633</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228640">https://bugzilla.suse.com/show_bug.cgi?id=1228640</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228649">https://bugzilla.suse.com/show_bug.cgi?id=1228649</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228655">https://bugzilla.suse.com/show_bug.cgi?id=1228655</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228658">https://bugzilla.suse.com/show_bug.cgi?id=1228658</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228662">https://bugzilla.suse.com/show_bug.cgi?id=1228662</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228680">https://bugzilla.suse.com/show_bug.cgi?id=1228680</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228705">https://bugzilla.suse.com/show_bug.cgi?id=1228705</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228723">https://bugzilla.suse.com/show_bug.cgi?id=1228723</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228726">https://bugzilla.suse.com/show_bug.cgi?id=1228726</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228743">https://bugzilla.suse.com/show_bug.cgi?id=1228743</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228850">https://bugzilla.suse.com/show_bug.cgi?id=1228850</a> </li> </ul> </div>
--===============4975580546778265579==--
|
|
|
|