Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: SUSE-SU-2024:2940-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Live Patching 12-SP5, SUSE Linux Enterprise Server 12 SP5, SUSE Linux Enterprise High Performance Computing 12 SP5, SUSE Linux Enterprise Server for SAP Applications 12 SP5, SUSE Linux Enterprise High Availability Extension 12 SP5, SUSE Linux Enterprise Software Development Kit 12 SP5, SUSE Linux Enterprise Workstation Extension 12 12-SP5
Datum: Fr, 16. August 2024, 22:10
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48836
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48811
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47542
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47197
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39507
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47438
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47580
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48792
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42223
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40929
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47191
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52743
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47501
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47588
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28748
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39501
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47399
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47441
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48775
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39488
Applikationen: Linux

Originalnachricht

--===============5329527720400185812==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:2940-1
Rating: important
References:

* bsc#1065729
* bsc#1088701
* bsc#1149446
* bsc#1179610
* bsc#1186463
* bsc#1196018
* bsc#1202346
* bsc#1216834
* bsc#1220138
* bsc#1220942
* bsc#1221045
* bsc#1221614
* bsc#1221616
* bsc#1221618
* bsc#1222060
* bsc#1222317
* bsc#1222326
* bsc#1222372
* bsc#1222625
* bsc#1222776
* bsc#1222824
* bsc#1222829
* bsc#1222866
* bsc#1223012
* bsc#1223778
* bsc#1223813
* bsc#1223815
* bsc#1224500
* bsc#1224512
* bsc#1224545
* bsc#1224557
* bsc#1224571
* bsc#1224576
* bsc#1224587
* bsc#1224637
* bsc#1224641
* bsc#1224663
* bsc#1224683
* bsc#1224699
* bsc#1224700
* bsc#1224975
* bsc#1225003
* bsc#1225214
* bsc#1225224
* bsc#1225229
* bsc#1225238
* bsc#1225241
* bsc#1225326
* bsc#1225328
* bsc#1225346
* bsc#1225361
* bsc#1225396
* bsc#1225427
* bsc#1225455
* bsc#1225711
* bsc#1225719
* bsc#1225767
* bsc#1225820
* bsc#1225838
* bsc#1225898
* bsc#1226550
* bsc#1226553
* bsc#1226555
* bsc#1226559
* bsc#1226568
* bsc#1226571
* bsc#1226645
* bsc#1226783
* bsc#1226786
* bsc#1226834
* bsc#1226908
* bsc#1227191
* bsc#1227213
* bsc#1227573
* bsc#1227618
* bsc#1227626
* bsc#1227716
* bsc#1227725
* bsc#1227729
* bsc#1227730
* bsc#1227733
* bsc#1227750
* bsc#1227754
* bsc#1227762
* bsc#1227770
* bsc#1227771
* bsc#1227772
* bsc#1227774
* bsc#1227786
* bsc#1227790
* bsc#1227806
* bsc#1227824
* bsc#1227828
* bsc#1227830
* bsc#1227836
* bsc#1227849
* bsc#1227865
* bsc#1227866
* bsc#1227884
* bsc#1227886
* bsc#1227891
* bsc#1227913
* bsc#1227924
* bsc#1227928
* bsc#1227929
* bsc#1227936
* bsc#1227957
* bsc#1227968
* bsc#1227969
* bsc#1227975
* bsc#1227985
* bsc#1227989
* bsc#1228003
* bsc#1228005
* bsc#1228008
* bsc#1228013
* bsc#1228025
* bsc#1228030
* bsc#1228037
* bsc#1228045
* bsc#1228054
* bsc#1228055
* bsc#1228063
* bsc#1228071
* bsc#1228235
* bsc#1228237
* bsc#1228327
* bsc#1228328
* bsc#1228408
* bsc#1228409
* bsc#1228410
* bsc#1228470
* bsc#1228530
* bsc#1228561
* bsc#1228565
* bsc#1228567
* bsc#1228580
* bsc#1228581
* bsc#1228584
* bsc#1228588
* bsc#1228599
* bsc#1228617
* bsc#1228625
* bsc#1228626
* bsc#1228633
* bsc#1228640
* bsc#1228655
* bsc#1228658
* bsc#1228662
* bsc#1228680
* bsc#1228705
* bsc#1228723
* bsc#1228726
* bsc#1228743
* bsc#1228850


Cross-References:

* CVE-2020-26558
* CVE-2021-0129
* CVE-2021-47191
* CVE-2021-47194
* CVE-2021-47197
* CVE-2021-47219
* CVE-2021-47295
* CVE-2021-47388
* CVE-2021-47395
* CVE-2021-47399
* CVE-2021-47403
* CVE-2021-47405
* CVE-2021-47438
* CVE-2021-47441
* CVE-2021-47468
* CVE-2021-47501
* CVE-2021-47516
* CVE-2021-47542
* CVE-2021-47559
* CVE-2021-47580
* CVE-2021-47582
* CVE-2021-47588
* CVE-2021-47597
* CVE-2021-47599
* CVE-2021-47606
* CVE-2021-47619
* CVE-2022-20368
* CVE-2022-28748
* CVE-2022-2964
* CVE-2022-48775
* CVE-2022-48792
* CVE-2022-48794
* CVE-2022-48804
* CVE-2022-48805
* CVE-2022-48810
* CVE-2022-48811
* CVE-2022-48823
* CVE-2022-48826
* CVE-2022-48827
* CVE-2022-48828
* CVE-2022-48829
* CVE-2022-48836
* CVE-2022-48839
* CVE-2022-48850
* CVE-2022-48855
* CVE-2022-48857
* CVE-2022-48860
* CVE-2022-48863
* CVE-2023-52435
* CVE-2023-52594
* CVE-2023-52612
* CVE-2023-52615
* CVE-2023-52619
* CVE-2023-52623
* CVE-2023-52669
* CVE-2023-52743
* CVE-2023-52885
* CVE-2024-26615
* CVE-2024-26659
* CVE-2024-26663
* CVE-2024-26735
* CVE-2024-26830
* CVE-2024-26920
* CVE-2024-26924
* CVE-2024-27019
* CVE-2024-27020
* CVE-2024-27025
* CVE-2024-27437
* CVE-2024-35806
* CVE-2024-35819
* CVE-2024-35837
* CVE-2024-35887
* CVE-2024-35893
* CVE-2024-35934
* CVE-2024-35949
* CVE-2024-35966
* CVE-2024-35967
* CVE-2024-35978
* CVE-2024-35995
* CVE-2024-36004
* CVE-2024-36288
* CVE-2024-36592
* CVE-2024-36901
* CVE-2024-36902
* CVE-2024-36919
* CVE-2024-36924
* CVE-2024-36939
* CVE-2024-36952
* CVE-2024-38558
* CVE-2024-38560
* CVE-2024-38630
* CVE-2024-39487
* CVE-2024-39488
* CVE-2024-39490
* CVE-2024-39494
* CVE-2024-39499
* CVE-2024-39501
* CVE-2024-39506
* CVE-2024-39507
* CVE-2024-39509
* CVE-2024-40901
* CVE-2024-40904
* CVE-2024-40912
* CVE-2024-40923
* CVE-2024-40929
* CVE-2024-40932
* CVE-2024-40937
* CVE-2024-40941
* CVE-2024-40942
* CVE-2024-40943
* CVE-2024-40953
* CVE-2024-40959
* CVE-2024-40966
* CVE-2024-40967
* CVE-2024-40978
* CVE-2024-40982
* CVE-2024-40987
* CVE-2024-40988
* CVE-2024-40990
* CVE-2024-40995
* CVE-2024-40998
* CVE-2024-40999
* CVE-2024-41014
* CVE-2024-41015
* CVE-2024-41016
* CVE-2024-41044
* CVE-2024-41048
* CVE-2024-41059
* CVE-2024-41060
* CVE-2024-41063
* CVE-2024-41064
* CVE-2024-41066
* CVE-2024-41070
* CVE-2024-41071
* CVE-2024-41072
* CVE-2024-41078
* CVE-2024-41081
* CVE-2024-41089
* CVE-2024-41090
* CVE-2024-41091
* CVE-2024-41095
* CVE-2024-42070
* CVE-2024-42093
* CVE-2024-42096
* CVE-2024-42119
* CVE-2024-42120
* CVE-2024-42124
* CVE-2024-42145
* CVE-2024-42223
* CVE-2024-42224


CVSS scores:

* CVE-2020-26558 ( SUSE ): 4.2 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2020-26558 ( NVD ): 4.2 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2021-0129 ( SUSE ): 6.4 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2021-0129 ( NVD ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47191 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47194 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47219 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47388 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47405 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47468 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47516 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47559 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47580 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L
* CVE-2021-47582 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47588 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47597 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47599 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47619 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-20368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-20368 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-28748 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-2964 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-2964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48775 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48792 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48792 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48804 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48805 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48823 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-48829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-48836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48836 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48839 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48850 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48855 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48863 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52435 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52435 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52594 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52612 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52615 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52619 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52623 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52743 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52885 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27019 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-27020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27020 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27025 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-27437 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35934 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-35949 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35995 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-36004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36924 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36952 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38558 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-38560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38630 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-39487 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-39488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39490 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-39494 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-39494 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-39499 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-39501 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39506 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39507 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40901 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
* CVE-2024-40904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40932 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-40937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40942 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40966 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40967 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40978 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40987 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-40988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40999 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-41014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41015 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41044 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-41048 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41060 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41063 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41063 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41064 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41064 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41066 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41066 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-41070 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41071 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-41072 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-41078 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41090 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
* CVE-2024-41091 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2024-41095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42070 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-42070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42093 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
* CVE-2024-42096 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42096 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-42119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42145 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42224 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H


Affected Products:

* SUSE Linux Enterprise High Availability Extension 12 SP5
* SUSE Linux Enterprise High Performance Computing 12 SP5
* SUSE Linux Enterprise Live Patching 12-SP5
* SUSE Linux Enterprise Server 12 SP5
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
* SUSE Linux Enterprise Software Development Kit 12 SP5
* SUSE Linux Enterprise Workstation Extension 12 12-SP5



An update that solves 150 vulnerabilities and has five security fixes can now
be
installed.

## Description:

The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

* CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name
(bsc#1227716).
* CVE-2024-42096: x86: stop playing stack games in profile_pc()
(bsc#1228633).
* CVE-2024-39506: liquidio: adjust a NULL pointer handling path in
lio_vf_rep_copy_packet (bsc#1227729).
* CVE-2021-47619: i40e: Fix queues reservation for XDP (bsc#1226645).
* CVE-2024-42145: IB/core: Implement a limit on UMAD receive List
(bsc#1228743).
* CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible
(bsc#1228705).
* CVE-2024-42223: media: dvb-frontends: tda10048: Fix integer overflow
(bsc#1228726)
* CVE-2024-42119: drm/amd/display: Skip finding free audio for unknown
engine_id (bsc#1228584)
* CVE-2024-42120: drm/amd/display: Check pipe offset before setting vblank
(bsc#1228588)
* CVE-2024-41095: drm/nouveau/dispnv04: fix null pointer dereference in
nv17_tv_get_ld_modes (bsc#1228662)
* CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list
(bsc#1228723).
* CVE-2024-41072: wifi: cfg80211: wext: add extra SIOCSIWSCAN data check
(bsc#1228626).
* CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg
(bsc#1228565).
* CVE-2024-40995: net/sched: act_api: fix possible infinite loop in
tcf_idr_check_alloc() (bsc#1227830).
* CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets
(bsc#1228530).
* CVE-2024-41066: ibmvnic: add tx check to prevent skb leak (bsc#1228640).
* CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack
(bsc#1228680).
* CVE-2024-41089: drm/nouveau/dispnv04: fix null pointer dereference in
(bsc#1228658)
* CVE-2024-41060: drm/radeon: check bo_va->bo is non-NULL before using it
(bsc#1228567)
* CVE-2022-48829: NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file
sizes (bsc#1228055).
* CVE-2022-48828: NFSD: Fix ia_size underflow (bsc#1228054).
* CVE-2022-48827: NFSD: Fix the behavior of READ near OFFSET_MAX
(bsc#1228037).
* CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable
failure (bsc#1228655).
* CVE-2024-41071: wifi: mac80211: Avoid address calculations via out of
bounds
array indexing (bsc#1228625).
* CVE-2024-41064: powerpc/eeh: avoid possible crash when edev->pdev
changes
(bsc#1228599).
* CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks
(bsc#1224700).
* CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617).
* CVE-2024-40978: scsi: qedi: Fix crash while reading debugfs attribute
(bsc#1227929).
* CVE-2022-48792: scsi: pm8001: Fix use-after-free for aborted SSP/STP
sas_task (bsc#1228013).
* CVE-2022-48823: scsi: qedf: Fix refcount issue when LOGO is received during
TMF (bsc#1228045).
* CVE-2024-40998: ext4: fix uninitialized ratelimit_state->lock access in
__ext4_fill_super() (bsc#1227866).
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
* CVE-2024-40987: drm/amdgpu: fix UBSAN warning in kv_dpm.c (bsc#1228235)
* CVE-2022-48826: drm/vc4: Fix deadlock on DSI device attach error
(bsc#1227975)
* CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ
(bsc#1222625).
* CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry()
(bsc#1228409).
* CVE-2024-41016: ocfs2: strict bound check before memcmp in
ocfs2_xattr_find_entry() (bsc#1228410).
* CVE-2024-41063: bluetooth: hci_core: cancel all works upon
hci_unregister_dev() (bsc#1228580).
* CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on
store
to data registers (bsc#1228470).
* CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in
kvm_spapr_tce_attach_iommu_group() (bsc#1228581).
* CVE-2021-47405: HID: usbhid: free raw_report buffers in usbhid_stop
(bsc#1225238).
* CVE-2024-40988: drm/radeon: fix UBSAN warning in kv_dpm.c (bsc#1227957)
* CVE-2024-40932: drm/exynos/vidi: fix memory leak in .get_modes()
(bsc#1227828)
* CVE-2021-47403: ipack: ipoctal: fix module reference leak (bsc#1225241).
* CVE-2021-47388: mac80211: fix use-after-free in CCMP/GCMP RX (bsc#1225214).
* CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data
(bsc#1228408).
* CVE-2024-41091: tun: add missing verification for short frame
(bsc#1228327).
* CVE-2024-41090: tap: add missing verification for short frame
(bsc#1228328).
* CVE-2024-40999: net: ena: Add validation for completion descriptors
consistency (bsc#1227913).
* CVE-2024-35837: net: mvpp2: clear BM pool before initialization
(bsc#1224500).
* CVE-2021-47588: sit: do not call ipip6_dev_free() from sit_init_net()
(bsc#1226568).
* CVE-2022-48804: vt_ioctl: fix array_index_nospec in vt_setactivate
(bsc#1227968).
* CVE-2024-40967: serial: imx: Introduce timeout when waiting on transmitter
empty (bsc#1227891).
* CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc
(bsc#1227886).
* CVE-2022-48850: net-sysfs: add check for netdevice being present to
speed_show (bsc#1228071).
* CVE-2021-47582: usb: core: Do not hold the device lock while sleeping in
do_proc_control() (bsc#1226559).
* CVE-2024-40982: ssb: fix potential NULL pointer dereference in
ssb_device_uevent() (bsc#1227865).
* CVE-2021-47468: isdn: mISDN: Fix sleeping function called from invalid
context (bsc#1225346).
* CVE-2021-47395: mac80211: limit injected vht mcs/nss in
ieee80211_parse_tx_radiotap (bsc#1225326).
* CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling
ip[6]mr_free_table()
on failure path (bsc#1227936).
* CVE-2023-52594: Fixed potential array-index-out-of-bounds read in
ath9k_htc_txstatus() (bsc#1221045).
* CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets (bsc#1228003).
* CVE-2021-47580: scsi: scsi_debug: Fix type in min_t to avoid stack OOB
(bsc#1226550).
* CVE-2024-26735: ipv6: sr: fix possible use-after-free and null-ptr-deref
(bsc#1222372).
* CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated
(bsc#1226786).
* CVE-2022-48811: ibmvnic: do not release napi in __ibmvnic_open()
(bsc#1227928).
* CVE-2021-0129: Improper access control in BlueZ may have allowed an
authenticated user to potentially enable information disclosure via
adjacent
access (bsc#1186463).
* CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing
that could permit a nearby man-in-the-middle attacker to identify the
Passkey used during pairing (bsc#1179610).
* CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any()
(bsc#1227836).
* CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario
(bsc#1227730).
* CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure
(bsc#1227786).
* CVE-2024-40941: wifi: iwlwifi: mvm: do not read past the mfuart notifcation
(bsc#1227771).
* CVE-2022-48860: ethernet: Fix error handling in xemaclite_of_probe
(bsc#1228008)
* CVE-2022-48863: mISDN: Fix memory leak in dsp_pipeline_build()
(bsc#1228063).
* CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in
kvm_vcpu_on_spin() (bsc#1227806).
* CVE-2024-39499: vmci: prevent speculation leaks by sanitizing event in
event_deliver() (bsc#1227725)
* CVE-2024-39509: HID: core: remove unnecessary WARN_ON() in implement()
(bsc#1227733)
* CVE-2024-39487: bonding: Fix out-of-bounds read in
bond_option_arp_ip_targets_set() (bsc#1227573)
* CVE-2024-35934: net/smc: reduce rtnl pressure in
smc_pnet_create_pnetids_list() (bsc#1224641)
* CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in
xfrm6_get_saddr() (bsc#1227884).
* CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak
(bsc#1224512)
* CVE-2021-47441: mlxsw: thermal: Fix out-of-bounds memory accesses
(bsc#1225224)
* CVE-2021-47194: cfg80211: call cfg80211_stop_ap when switch from P2P_GO
type
(bsc#1222829)
* CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in
__nft_expr_type_get() (bsc#1223815)
* CVE-2022-48775: Drivers: hv: vmbus: Fix memory leak in
vmbus_add_channel_kobj (bsc#1227924).
* CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in
__nft_obj_type_get() (bsc#1223813)
* CVE-2024-40929: wifi: iwlwifi: mvm: check n_ssids before accessing the
ssids
(bsc#1227774).
* CVE-2024-40912: wifi: mac80211: Fix deadlock in
ieee80211_sta_ps_deliver_wakeup() (bsc#1227790).
* CVE-2024-40942: wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects
(bsc#1227770).
* CVE-2022-48857: NFC: port100: fix use-after-free in port100_send_complete
(bsc#1228005).
* CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in
fib6_rule_action() (bsc#1225719).
* CVE-2021-47606: net: netlink: af_netlink: Prevent empty skb by adding a
check on len. (bsc#1226555).
* CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non-
allocated memory (bsc#1227762).
* CVE-2024-26924: scsi: lpfc: Release hbalock before calling
lpfc_worker_wake_up() (bsc#1225820).
* CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove
administratively set MAC (bsc#1223012).
* CVE-2021-47516: nfp: Fix memory leak in nfp_cpp_area_cache_add()
(bsc#1225427).
* CVE-2021-47501: i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc
(bsc#1225361).
* CVE-2024-39501: drivers: core: synchronize really_probe() and dev_uevent()
(bsc#1227754).
* CVE-2023-52743: ice: Do not use WQ_MEM_RECLAIM flag for workqueue
(bsc#1225003)
* CVE-2021-47542: net: qlogic: qlcnic: Fix a NULL pointer dereference in
qlcnic_83xx_add_rings() (bsc#1225455)
* CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output()
(bsc#1225711)
* CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue
(bsc#1224545)
* CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778)
* CVE-2021-47599: btrfs: use latest_dev in btrfs_show_devname (bsc#1226571).
* CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138).
* CVE-2024-26663: tipc: Check the bearer type before calling
tipc_udp_nl_bearer_add() (bsc#1222326).
* CVE-2021-47597: inet_diag: fix kernel-infoleak for UDP sockets
(bsc#1226553).
* CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core
(bsc#1227626).
* CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for
ICMPv6 (bsc#1226783).
* CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection
dump (bsc#1220942).
* CVE-2023-52619: Fixed possible crash when setting number of cpus to an odd
number in pstore/ram (bsc#1221618).
* CVE-2024-26659: Fixed wrong handling of isoc Babble and Buffer Overrun
events in xhci (bsc#1222317).
* CVE-2024-35978: Bluetooth: Fix memory leak in hci_req_sync_complete()
(bsc#1224571).
* CVE-2023-52669: crypto: s390/aes - Fix buffer overread in CTR mode
(bsc#1224637).
* CVE-2023-52615: Fixed page fault dead lock on mmap-ed hwrng (bsc#1221614).
* CVE-2023-52612: Fixed req->dst buffer overflow in crypto/scomp
(bsc#1221616).
* CVE-2024-35995: ACPI: CPPC: Use access_width over bit_width for system
memory accesses (bsc#1224557).
* CVE-2023-52623: Fixed suspicious RCU usage in SUNRPC (bsc#1222060).
* CVE-2021-47295: net: sched: fix memory leak in tcindex_partial_destroy_work
(bsc#1224975)
* CVE-2024-38630: watchdog: cpu5wdt.c: Fix use-after-free bug caused by
cpu5wdt_trigger (bsc#1226908).
* CVE-2021-47559: net/smc: Fix NULL pointer dereferencing in
smc_vlan_by_tcpsk() (bsc#1225396).

The following non-security bugs were fixed:

* Fix spurious WARNING caused by a qxl driver patch (bsc#1227213,bsc#1227191)
* Btrfs: incremental send, fix emission of invalid clone operations
(bsc#1228030).
* Btrfs: send, improve clone range (bsc#1228030).
* KVM: PPC: Book3S HV: Do not take kvm->lock around kvm_for_each_vcpu
(bsc#1065729).
* KVM: PPC: Book3S HV: remove extraneous asterisk from rm_host_ipi_action()
comment (bsc#1065729).
* KVM: PPC: Book3S PR: Exiting split hack mode needs to fixup both PC and LR
(bsc#1065729).
* KVM: PPC: Book3S: Fix some RCU-list locks (git-fixes).
* KVM: PPC: Book3S: Only report KVM_CAP_SPAPR_TCE_VFIO on powernv machines
(bsc#1065729).
* KVM: PPC: Book3S: Use new mutex to synchronize access to rtas token list
(bsc#1065729).
* KVM: PPC: Inform the userspace about TCE update failures (bsc#1065729).
* KVM: PPC: Move and undef TRACE_INCLUDE_PATH/FILE (bsc#1065729).
* PCI: Fix resource double counting on remove & rescan (git-fixes).
* PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git-
fixes).
* Tools: hv: kvp: eliminate 'may be used uninitialized' warning
(git-fixes).
* USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (git-
fixes).
* btrfs: fix 64bit compat send ioctl arguments not initializing version
member
(bsc#1228030).
* btrfs: fix send ioctl on 32bit with 64bit kernel (bsc#1228030).
* btrfs: remove unused members dir_path from recorded_ref (bsc#1228030).
* btrfs: send: add new command FILEATTR for file attributes (bsc#1228030).
* btrfs: send: add stream v2 definitions (bsc#1228030).
* btrfs: send: always use the rbtree based inode ref management
infrastructure
(bsc#1228030).
* btrfs: send: avoid copying file data (bsc#1228030).
* btrfs: send: explicitly number commands and attributes (bsc#1228030).
* btrfs: send: fix failures when processing inodes with no links
(bsc#1228030).
* btrfs: send: fix send failure of a subcase of orphan inodes (bsc#1228030).
* btrfs: send: fix sending link commands for existing file paths
(bsc#1228030).
* btrfs: send: get rid of i_size logic in send_write() (bsc#1228030).
* btrfs: send: introduce recorded_ref_alloc and recorded_ref_free
(bsc#1228030).
* btrfs: send: prepare for v2 protocol (bsc#1228030).
* btrfs: send: refactor arguments of get_inode_info() (bsc#1228030).
* btrfs: send: remove stale code when checking for shared extents
(bsc#1228030).
* btrfs: send: remove unused found_type parameter to lookup_dir_item_inode()
(bsc#1228030).
* btrfs: send: remove unused send_ctx::{total,cmd}_send_size (bsc#1228030).
* btrfs: send: use boolean types for current inode status (bsc#1228030).
* btrfs: silence maybe-uninitialized warning in clone_range (bsc#1228030).
* drm/vc4: dsi: Only register our component once a DSI device is
(bsc#1227975)
* hv_netvsc: rndis_filter needs to select NLS (git-fixes).
* ipv6: sr: fix incorrect unregister order (git-fixes).
* net: mana: Fix the extra HZ in mana_hwc_send_request (git-fixes).
* net: mana: select PAGE_POOL (git-fixes).
* net_sched: add a temporary refcnt for struct tcindex_data (bsc#1224975).
* net_sched: fix a memory leak in cls_tcindex (bsc#1224975).
* net_sched: fix a missing refcnt in tcindex_init() (bsc#1224975).
* net_sched: hold rtnl lock in tcindex_partial_destroy_work() (bsc#1224975)
* nvme: fixup comment for nvme RDMA Provider Type (git-fixes).
* ocfs2: fix DIO failure due to insufficient transaction credits
(bsc#1216834).
* ocfs2: remove redundant assignment to variable free_space (bsc#1228409).
* ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()
(bsc#1228410).
* scsi: qla2xxx: Avoid possible run-time warning with long model_num
(bsc#1228850).
* scsi: qla2xxx: Complete command early within lock (bsc#1228850).
* scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).
* scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).
* scsi: qla2xxx: During vport delete send async logout explicitly
(bsc#1228850).
* scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850).
* scsi: qla2xxx: Fix flash read failure (bsc#1228850).
* scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850).
* scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850).
* scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850).
* scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850).
* scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds
(bsc#1228850).
* scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850).
* scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850).
* scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850).
* scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850).
* signal: Introduce clear_siginfo (git-fixes).
* string.h: Introduce memtostr() and memtostr_pad() (bsc#1228850).
* tools lib: Fix builds when glibc contains strlcpy() (git-fixes).
* tools: hv: fix KVP and VSS daemons exit code (git-fixes).
* usb: add a hcd_uses_dma helper (git-fixes).
* usb: atm: cxacru: fix endpoint checking in cxacru_bind() (git-fixes).
* usb: musb: da8xx: fix a resource leak in probe() (git-fixes).
* x86/bhi: Avoid warning in #DB handler due to BHI mitigation (git-fixes).
* x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-
fixes).
* x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with
CONFIG_MITIGATION_SPECTRE_BHI (git-fixes).
* xfs: check that dir block entries do not off the end of the buffer (git-
fixes).
* xfs: refactor xfs_verifier_error and xfs_buf_ioerror (git-fixes).
* xfs: remove XFS_WANT_CORRUPTED_RETURN from dir3 data verifiers (git-fixes).
* xhci: Poll for U0 after disabling USB2 LPM (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Server for SAP Applications 12 SP5
zypper in -t patch SUSE-SLE-HA-12-SP5-2024-2940=1 SUSE-SLE-
SERVER-12-SP5-2024-2940=1

* SUSE Linux Enterprise High Availability Extension 12 SP5
zypper in -t patch SUSE-SLE-HA-12-SP5-2024-2940=1

* SUSE Linux Enterprise Live Patching 12-SP5
zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-2940=1

* SUSE Linux Enterprise Software Development Kit 12 SP5
zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-2940=1

* SUSE Linux Enterprise High Performance Computing 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2940=1

* SUSE Linux Enterprise Server 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2940=1

* SUSE Linux Enterprise Workstation Extension 12 12-SP5
zypper in -t patch SUSE-SLE-WE-12-SP5-2024-2940=1

## Package List:

* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
* cluster-md-kmp-default-debuginfo-4.12.14-122.225.1
* kernel-default-debuginfo-4.12.14-122.225.1
* kernel-default-devel-4.12.14-122.225.1
* gfs2-kmp-default-4.12.14-122.225.1
* kernel-default-base-debuginfo-4.12.14-122.225.1
* ocfs2-kmp-default-debuginfo-4.12.14-122.225.1
* dlm-kmp-default-4.12.14-122.225.1
* kernel-default-debugsource-4.12.14-122.225.1
* dlm-kmp-default-debuginfo-4.12.14-122.225.1
* ocfs2-kmp-default-4.12.14-122.225.1
* cluster-md-kmp-default-4.12.14-122.225.1
* kernel-default-base-4.12.14-122.225.1
* kernel-syms-4.12.14-122.225.1
* gfs2-kmp-default-debuginfo-4.12.14-122.225.1
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc ppc64le
x86_64)
* kernel-default-4.12.14-122.225.1
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch)
* kernel-source-4.12.14-122.225.1
* kernel-devel-4.12.14-122.225.1
* kernel-macros-4.12.14-122.225.1
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64)
* kernel-default-devel-debuginfo-4.12.14-122.225.1
* SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x
x86_64)
* cluster-md-kmp-default-debuginfo-4.12.14-122.225.1
* kernel-default-debuginfo-4.12.14-122.225.1
* gfs2-kmp-default-4.12.14-122.225.1
* ocfs2-kmp-default-debuginfo-4.12.14-122.225.1
* dlm-kmp-default-4.12.14-122.225.1
* kernel-default-debugsource-4.12.14-122.225.1
* dlm-kmp-default-debuginfo-4.12.14-122.225.1
* ocfs2-kmp-default-4.12.14-122.225.1
* cluster-md-kmp-default-4.12.14-122.225.1
* gfs2-kmp-default-debuginfo-4.12.14-122.225.1
* SUSE Linux Enterprise High Availability Extension 12 SP5 (nosrc)
* kernel-default-4.12.14-122.225.1
* SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
* kernel-default-kgraft-devel-4.12.14-122.225.1
* kernel-default-debuginfo-4.12.14-122.225.1
* kgraft-patch-4_12_14-122_225-default-1-8.3.1
* kernel-default-debugsource-4.12.14-122.225.1
* kernel-default-kgraft-4.12.14-122.225.1
* SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
* kernel-default-4.12.14-122.225.1
* SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch nosrc)
* kernel-docs-4.12.14-122.225.2
* SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le
s390x
x86_64)
* kernel-obs-build-debugsource-4.12.14-122.225.1
* kernel-obs-build-4.12.14-122.225.1
* SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 nosrc
x86_64)
* kernel-default-4.12.14-122.225.1
* SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64)
* kernel-default-debuginfo-4.12.14-122.225.1
* kernel-default-devel-4.12.14-122.225.1
* kernel-default-base-debuginfo-4.12.14-122.225.1
* kernel-default-debugsource-4.12.14-122.225.1
* kernel-syms-4.12.14-122.225.1
* kernel-default-base-4.12.14-122.225.1
* SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch)
* kernel-source-4.12.14-122.225.1
* kernel-devel-4.12.14-122.225.1
* kernel-macros-4.12.14-122.225.1
* SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64)
* kernel-default-devel-debuginfo-4.12.14-122.225.1
* SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-4.12.14-122.225.1
* SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64)
* kernel-default-debuginfo-4.12.14-122.225.1
* kernel-default-devel-4.12.14-122.225.1
* kernel-default-base-debuginfo-4.12.14-122.225.1
* kernel-default-debugsource-4.12.14-122.225.1
* kernel-syms-4.12.14-122.225.1
* kernel-default-base-4.12.14-122.225.1
* SUSE Linux Enterprise Server 12 SP5 (noarch)
* kernel-source-4.12.14-122.225.1
* kernel-devel-4.12.14-122.225.1
* kernel-macros-4.12.14-122.225.1
* SUSE Linux Enterprise Server 12 SP5 (s390x)
* kernel-default-man-4.12.14-122.225.1
* SUSE Linux Enterprise Server 12 SP5 (x86_64)
* kernel-default-devel-debuginfo-4.12.14-122.225.1
* SUSE Linux Enterprise Workstation Extension 12 12-SP5 (nosrc)
* kernel-default-4.12.14-122.225.1
* SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64)
* kernel-default-extra-4.12.14-122.225.1
* kernel-default-debuginfo-4.12.14-122.225.1
* kernel-default-extra-debuginfo-4.12.14-122.225.1
* kernel-default-debugsource-4.12.14-122.225.1

## References:

* https://www.suse.com/security/cve/CVE-2020-26558.html
* https://www.suse.com/security/cve/CVE-2021-0129.html
* https://www.suse.com/security/cve/CVE-2021-47191.html
* https://www.suse.com/security/cve/CVE-2021-47194.html
* https://www.suse.com/security/cve/CVE-2021-47197.html
* https://www.suse.com/security/cve/CVE-2021-47219.html
* https://www.suse.com/security/cve/CVE-2021-47295.html
* https://www.suse.com/security/cve/CVE-2021-47388.html
* https://www.suse.com/security/cve/CVE-2021-47395.html
* https://www.suse.com/security/cve/CVE-2021-47399.html
* https://www.suse.com/security/cve/CVE-2021-47403.html
* https://www.suse.com/security/cve/CVE-2021-47405.html
* https://www.suse.com/security/cve/CVE-2021-47438.html
* https://www.suse.com/security/cve/CVE-2021-47441.html
* https://www.suse.com/security/cve/CVE-2021-47468.html
* https://www.suse.com/security/cve/CVE-2021-47501.html
* https://www.suse.com/security/cve/CVE-2021-47516.html
* https://www.suse.com/security/cve/CVE-2021-47542.html
* https://www.suse.com/security/cve/CVE-2021-47559.html
* https://www.suse.com/security/cve/CVE-2021-47580.html
* https://www.suse.com/security/cve/CVE-2021-47582.html
* https://www.suse.com/security/cve/CVE-2021-47588.html
* https://www.suse.com/security/cve/CVE-2021-47597.html
* https://www.suse.com/security/cve/CVE-2021-47599.html
* https://www.suse.com/security/cve/CVE-2021-47606.html
* https://www.suse.com/security/cve/CVE-2021-47619.html
* https://www.suse.com/security/cve/CVE-2022-20368.html
* https://www.suse.com/security/cve/CVE-2022-28748.html
* https://www.suse.com/security/cve/CVE-2022-2964.html
* https://www.suse.com/security/cve/CVE-2022-48775.html
* https://www.suse.com/security/cve/CVE-2022-48792.html
* https://www.suse.com/security/cve/CVE-2022-48794.html
* https://www.suse.com/security/cve/CVE-2022-48804.html
* https://www.suse.com/security/cve/CVE-2022-48805.html
* https://www.suse.com/security/cve/CVE-2022-48810.html
* https://www.suse.com/security/cve/CVE-2022-48811.html
* https://www.suse.com/security/cve/CVE-2022-48823.html
* https://www.suse.com/security/cve/CVE-2022-48826.html
* https://www.suse.com/security/cve/CVE-2022-48827.html
* https://www.suse.com/security/cve/CVE-2022-48828.html
* https://www.suse.com/security/cve/CVE-2022-48829.html
* https://www.suse.com/security/cve/CVE-2022-48836.html
* https://www.suse.com/security/cve/CVE-2022-48839.html
* https://www.suse.com/security/cve/CVE-2022-48850.html
* https://www.suse.com/security/cve/CVE-2022-48855.html
* https://www.suse.com/security/cve/CVE-2022-48857.html
* https://www.suse.com/security/cve/CVE-2022-48860.html
* https://www.suse.com/security/cve/CVE-2022-48863.html
* https://www.suse.com/security/cve/CVE-2023-52435.html
* https://www.suse.com/security/cve/CVE-2023-52594.html
* https://www.suse.com/security/cve/CVE-2023-52612.html
* https://www.suse.com/security/cve/CVE-2023-52615.html
* https://www.suse.com/security/cve/CVE-2023-52619.html
* https://www.suse.com/security/cve/CVE-2023-52623.html
* https://www.suse.com/security/cve/CVE-2023-52669.html
* https://www.suse.com/security/cve/CVE-2023-52743.html
* https://www.suse.com/security/cve/CVE-2023-52885.html
* https://www.suse.com/security/cve/CVE-2024-26615.html
* https://www.suse.com/security/cve/CVE-2024-26659.html
* https://www.suse.com/security/cve/CVE-2024-26663.html
* https://www.suse.com/security/cve/CVE-2024-26735.html
* https://www.suse.com/security/cve/CVE-2024-26830.html
* https://www.suse.com/security/cve/CVE-2024-26920.html
* https://www.suse.com/security/cve/CVE-2024-26924.html
* https://www.suse.com/security/cve/CVE-2024-27019.html
* https://www.suse.com/security/cve/CVE-2024-27020.html
* https://www.suse.com/security/cve/CVE-2024-27025.html
* https://www.suse.com/security/cve/CVE-2024-27437.html
* https://www.suse.com/security/cve/CVE-2024-35806.html
* https://www.suse.com/security/cve/CVE-2024-35819.html
* https://www.suse.com/security/cve/CVE-2024-35837.html
* https://www.suse.com/security/cve/CVE-2024-35887.html
* https://www.suse.com/security/cve/CVE-2024-35893.html
* https://www.suse.com/security/cve/CVE-2024-35934.html
* https://www.suse.com/security/cve/CVE-2024-35949.html
* https://www.suse.com/security/cve/CVE-2024-35966.html
* https://www.suse.com/security/cve/CVE-2024-35967.html
* https://www.suse.com/security/cve/CVE-2024-35978.html
* https://www.suse.com/security/cve/CVE-2024-35995.html
* https://www.suse.com/security/cve/CVE-2024-36004.html
* https://www.suse.com/security/cve/CVE-2024-36288.html
* https://www.suse.com/security/cve/CVE-2024-36592.html
* https://www.suse.com/security/cve/CVE-2024-36901.html
* https://www.suse.com/security/cve/CVE-2024-36902.html
* https://www.suse.com/security/cve/CVE-2024-36919.html
* https://www.suse.com/security/cve/CVE-2024-36924.html
* https://www.suse.com/security/cve/CVE-2024-36939.html
* https://www.suse.com/security/cve/CVE-2024-36952.html
* https://www.suse.com/security/cve/CVE-2024-38558.html
* https://www.suse.com/security/cve/CVE-2024-38560.html
* https://www.suse.com/security/cve/CVE-2024-38630.html
* https://www.suse.com/security/cve/CVE-2024-39487.html
* https://www.suse.com/security/cve/CVE-2024-39488.html
* https://www.suse.com/security/cve/CVE-2024-39490.html
* https://www.suse.com/security/cve/CVE-2024-39494.html
* https://www.suse.com/security/cve/CVE-2024-39499.html
* https://www.suse.com/security/cve/CVE-2024-39501.html
* https://www.suse.com/security/cve/CVE-2024-39506.html
* https://www.suse.com/security/cve/CVE-2024-39507.html
* https://www.suse.com/security/cve/CVE-2024-39509.html
* https://www.suse.com/security/cve/CVE-2024-40901.html
* https://www.suse.com/security/cve/CVE-2024-40904.html
* https://www.suse.com/security/cve/CVE-2024-40912.html
* https://www.suse.com/security/cve/CVE-2024-40923.html
* https://www.suse.com/security/cve/CVE-2024-40929.html
* https://www.suse.com/security/cve/CVE-2024-40932.html
* https://www.suse.com/security/cve/CVE-2024-40937.html
* https://www.suse.com/security/cve/CVE-2024-40941.html
* https://www.suse.com/security/cve/CVE-2024-40942.html
* https://www.suse.com/security/cve/CVE-2024-40943.html
* https://www.suse.com/security/cve/CVE-2024-40953.html
* https://www.suse.com/security/cve/CVE-2024-40959.html
* https://www.suse.com/security/cve/CVE-2024-40966.html
* https://www.suse.com/security/cve/CVE-2024-40967.html
* https://www.suse.com/security/cve/CVE-2024-40978.html
* https://www.suse.com/security/cve/CVE-2024-40982.html
* https://www.suse.com/security/cve/CVE-2024-40987.html
* https://www.suse.com/security/cve/CVE-2024-40988.html
* https://www.suse.com/security/cve/CVE-2024-40990.html
* https://www.suse.com/security/cve/CVE-2024-40995.html
* https://www.suse.com/security/cve/CVE-2024-40998.html
* https://www.suse.com/security/cve/CVE-2024-40999.html
* https://www.suse.com/security/cve/CVE-2024-41014.html
* https://www.suse.com/security/cve/CVE-2024-41015.html
* https://www.suse.com/security/cve/CVE-2024-41016.html
* https://www.suse.com/security/cve/CVE-2024-41044.html
* https://www.suse.com/security/cve/CVE-2024-41048.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-41060.html
* https://www.suse.com/security/cve/CVE-2024-41063.html
* https://www.suse.com/security/cve/CVE-2024-41064.html
* https://www.suse.com/security/cve/CVE-2024-41066.html
* https://www.suse.com/security/cve/CVE-2024-41070.html
* https://www.suse.com/security/cve/CVE-2024-41071.html
* https://www.suse.com/security/cve/CVE-2024-41072.html
* https://www.suse.com/security/cve/CVE-2024-41078.html
* https://www.suse.com/security/cve/CVE-2024-41081.html
* https://www.suse.com/security/cve/CVE-2024-41089.html
* https://www.suse.com/security/cve/CVE-2024-41090.html
* https://www.suse.com/security/cve/CVE-2024-41091.html
* https://www.suse.com/security/cve/CVE-2024-41095.html
* https://www.suse.com/security/cve/CVE-2024-42070.html
* https://www.suse.com/security/cve/CVE-2024-42093.html
* https://www.suse.com/security/cve/CVE-2024-42096.html
* https://www.suse.com/security/cve/CVE-2024-42119.html
* https://www.suse.com/security/cve/CVE-2024-42120.html
* https://www.suse.com/security/cve/CVE-2024-42124.html
* https://www.suse.com/security/cve/CVE-2024-42145.html
* https://www.suse.com/security/cve/CVE-2024-42223.html
* https://www.suse.com/security/cve/CVE-2024-42224.html
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1088701
* https://bugzilla.suse.com/show_bug.cgi?id=1149446
* https://bugzilla.suse.com/show_bug.cgi?id=1179610
* https://bugzilla.suse.com/show_bug.cgi?id=1186463
* https://bugzilla.suse.com/show_bug.cgi?id=1196018
* https://bugzilla.suse.com/show_bug.cgi?id=1202346
* https://bugzilla.suse.com/show_bug.cgi?id=1216834
* https://bugzilla.suse.com/show_bug.cgi?id=1220138
* https://bugzilla.suse.com/show_bug.cgi?id=1220942
* https://bugzilla.suse.com/show_bug.cgi?id=1221045
* https://bugzilla.suse.com/show_bug.cgi?id=1221614
* https://bugzilla.suse.com/show_bug.cgi?id=1221616
* https://bugzilla.suse.com/show_bug.cgi?id=1221618
* https://bugzilla.suse.com/show_bug.cgi?id=1222060
* https://bugzilla.suse.com/show_bug.cgi?id=1222317
* https://bugzilla.suse.com/show_bug.cgi?id=1222326
* https://bugzilla.suse.com/show_bug.cgi?id=1222372
* https://bugzilla.suse.com/show_bug.cgi?id=1222625
* https://bugzilla.suse.com/show_bug.cgi?id=1222776
* https://bugzilla.suse.com/show_bug.cgi?id=1222824
* https://bugzilla.suse.com/show_bug.cgi?id=1222829
* https://bugzilla.suse.com/show_bug.cgi?id=1222866
* https://bugzilla.suse.com/show_bug.cgi?id=1223012
* https://bugzilla.suse.com/show_bug.cgi?id=1223778
* https://bugzilla.suse.com/show_bug.cgi?id=1223813
* https://bugzilla.suse.com/show_bug.cgi?id=1223815
* https://bugzilla.suse.com/show_bug.cgi?id=1224500
* https://bugzilla.suse.com/show_bug.cgi?id=1224512
* https://bugzilla.suse.com/show_bug.cgi?id=1224545
* https://bugzilla.suse.com/show_bug.cgi?id=1224557
* https://bugzilla.suse.com/show_bug.cgi?id=1224571
* https://bugzilla.suse.com/show_bug.cgi?id=1224576
* https://bugzilla.suse.com/show_bug.cgi?id=1224587
* https://bugzilla.suse.com/show_bug.cgi?id=1224637
* https://bugzilla.suse.com/show_bug.cgi?id=1224641
* https://bugzilla.suse.com/show_bug.cgi?id=1224663
* https://bugzilla.suse.com/show_bug.cgi?id=1224683
* https://bugzilla.suse.com/show_bug.cgi?id=1224699
* https://bugzilla.suse.com/show_bug.cgi?id=1224700
* https://bugzilla.suse.com/show_bug.cgi?id=1224975
* https://bugzilla.suse.com/show_bug.cgi?id=1225003
* https://bugzilla.suse.com/show_bug.cgi?id=1225214
* https://bugzilla.suse.com/show_bug.cgi?id=1225224
* https://bugzilla.suse.com/show_bug.cgi?id=1225229
* https://bugzilla.suse.com/show_bug.cgi?id=1225238
* https://bugzilla.suse.com/show_bug.cgi?id=1225241
* https://bugzilla.suse.com/show_bug.cgi?id=1225326
* https://bugzilla.suse.com/show_bug.cgi?id=1225328
* https://bugzilla.suse.com/show_bug.cgi?id=1225346
* https://bugzilla.suse.com/show_bug.cgi?id=1225361
* https://bugzilla.suse.com/show_bug.cgi?id=1225396
* https://bugzilla.suse.com/show_bug.cgi?id=1225427
* https://bugzilla.suse.com/show_bug.cgi?id=1225455
* https://bugzilla.suse.com/show_bug.cgi?id=1225711
* https://bugzilla.suse.com/show_bug.cgi?id=1225719
* https://bugzilla.suse.com/show_bug.cgi?id=1225767
* https://bugzilla.suse.com/show_bug.cgi?id=1225820
* https://bugzilla.suse.com/show_bug.cgi?id=1225838
* https://bugzilla.suse.com/show_bug.cgi?id=1225898
* https://bugzilla.suse.com/show_bug.cgi?id=1226550
* https://bugzilla.suse.com/show_bug.cgi?id=1226553
* https://bugzilla.suse.com/show_bug.cgi?id=1226555
* https://bugzilla.suse.com/show_bug.cgi?id=1226559
* https://bugzilla.suse.com/show_bug.cgi?id=1226568
* https://bugzilla.suse.com/show_bug.cgi?id=1226571
* https://bugzilla.suse.com/show_bug.cgi?id=1226645
* https://bugzilla.suse.com/show_bug.cgi?id=1226783
* https://bugzilla.suse.com/show_bug.cgi?id=1226786
* https://bugzilla.suse.com/show_bug.cgi?id=1226834
* https://bugzilla.suse.com/show_bug.cgi?id=1226908
* https://bugzilla.suse.com/show_bug.cgi?id=1227191
* https://bugzilla.suse.com/show_bug.cgi?id=1227213
* https://bugzilla.suse.com/show_bug.cgi?id=1227573
* https://bugzilla.suse.com/show_bug.cgi?id=1227618
* https://bugzilla.suse.com/show_bug.cgi?id=1227626
* https://bugzilla.suse.com/show_bug.cgi?id=1227716
* https://bugzilla.suse.com/show_bug.cgi?id=1227725
* https://bugzilla.suse.com/show_bug.cgi?id=1227729
* https://bugzilla.suse.com/show_bug.cgi?id=1227730
* https://bugzilla.suse.com/show_bug.cgi?id=1227733
* https://bugzilla.suse.com/show_bug.cgi?id=1227750
* https://bugzilla.suse.com/show_bug.cgi?id=1227754
* https://bugzilla.suse.com/show_bug.cgi?id=1227762
* https://bugzilla.suse.com/show_bug.cgi?id=1227770
* https://bugzilla.suse.com/show_bug.cgi?id=1227771
* https://bugzilla.suse.com/show_bug.cgi?id=1227772
* https://bugzilla.suse.com/show_bug.cgi?id=1227774
* https://bugzilla.suse.com/show_bug.cgi?id=1227786
* https://bugzilla.suse.com/show_bug.cgi?id=1227790
* https://bugzilla.suse.com/show_bug.cgi?id=1227806
* https://bugzilla.suse.com/show_bug.cgi?id=1227824
* https://bugzilla.suse.com/show_bug.cgi?id=1227828
* https://bugzilla.suse.com/show_bug.cgi?id=1227830
* https://bugzilla.suse.com/show_bug.cgi?id=1227836
* https://bugzilla.suse.com/show_bug.cgi?id=1227849
* https://bugzilla.suse.com/show_bug.cgi?id=1227865
* https://bugzilla.suse.com/show_bug.cgi?id=1227866
* https://bugzilla.suse.com/show_bug.cgi?id=1227884
* https://bugzilla.suse.com/show_bug.cgi?id=1227886
* https://bugzilla.suse.com/show_bug.cgi?id=1227891
* https://bugzilla.suse.com/show_bug.cgi?id=1227913
* https://bugzilla.suse.com/show_bug.cgi?id=1227924
* https://bugzilla.suse.com/show_bug.cgi?id=1227928
* https://bugzilla.suse.com/show_bug.cgi?id=1227929
* https://bugzilla.suse.com/show_bug.cgi?id=1227936
* https://bugzilla.suse.com/show_bug.cgi?id=1227957
* https://bugzilla.suse.com/show_bug.cgi?id=1227968
* https://bugzilla.suse.com/show_bug.cgi?id=1227969
* https://bugzilla.suse.com/show_bug.cgi?id=1227975
* https://bugzilla.suse.com/show_bug.cgi?id=1227985
* https://bugzilla.suse.com/show_bug.cgi?id=1227989
* https://bugzilla.suse.com/show_bug.cgi?id=1228003
* https://bugzilla.suse.com/show_bug.cgi?id=1228005
* https://bugzilla.suse.com/show_bug.cgi?id=1228008
* https://bugzilla.suse.com/show_bug.cgi?id=1228013
* https://bugzilla.suse.com/show_bug.cgi?id=1228025
* https://bugzilla.suse.com/show_bug.cgi?id=1228030
* https://bugzilla.suse.com/show_bug.cgi?id=1228037
* https://bugzilla.suse.com/show_bug.cgi?id=1228045
* https://bugzilla.suse.com/show_bug.cgi?id=1228054
* https://bugzilla.suse.com/show_bug.cgi?id=1228055
* https://bugzilla.suse.com/show_bug.cgi?id=1228063
* https://bugzilla.suse.com/show_bug.cgi?id=1228071
* https://bugzilla.suse.com/show_bug.cgi?id=1228235
* https://bugzilla.suse.com/show_bug.cgi?id=1228237
* https://bugzilla.suse.com/show_bug.cgi?id=1228327
* https://bugzilla.suse.com/show_bug.cgi?id=1228328
* https://bugzilla.suse.com/show_bug.cgi?id=1228408
* https://bugzilla.suse.com/show_bug.cgi?id=1228409
* https://bugzilla.suse.com/show_bug.cgi?id=1228410
* https://bugzilla.suse.com/show_bug.cgi?id=1228470
* https://bugzilla.suse.com/show_bug.cgi?id=1228530
* https://bugzilla.suse.com/show_bug.cgi?id=1228561
* https://bugzilla.suse.com/show_bug.cgi?id=1228565
* https://bugzilla.suse.com/show_bug.cgi?id=1228567
* https://bugzilla.suse.com/show_bug.cgi?id=1228580
* https://bugzilla.suse.com/show_bug.cgi?id=1228581
* https://bugzilla.suse.com/show_bug.cgi?id=1228584
* https://bugzilla.suse.com/show_bug.cgi?id=1228588
* https://bugzilla.suse.com/show_bug.cgi?id=1228599
* https://bugzilla.suse.com/show_bug.cgi?id=1228617
* https://bugzilla.suse.com/show_bug.cgi?id=1228625
* https://bugzilla.suse.com/show_bug.cgi?id=1228626
* https://bugzilla.suse.com/show_bug.cgi?id=1228633
* https://bugzilla.suse.com/show_bug.cgi?id=1228640
* https://bugzilla.suse.com/show_bug.cgi?id=1228655
* https://bugzilla.suse.com/show_bug.cgi?id=1228658
* https://bugzilla.suse.com/show_bug.cgi?id=1228662
* https://bugzilla.suse.com/show_bug.cgi?id=1228680
* https://bugzilla.suse.com/show_bug.cgi?id=1228705
* https://bugzilla.suse.com/show_bug.cgi?id=1228723
* https://bugzilla.suse.com/show_bug.cgi?id=1228726
* https://bugzilla.suse.com/show_bug.cgi?id=1228743
* https://bugzilla.suse.com/show_bug.cgi?id=1228850


--===============5329527720400185812==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for the Linux Kernel</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:2940-1</td>
</tr>

<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1065729">bsc#1065729</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1088701">bsc#1088701</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1149446">bsc#1149446</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1179610">bsc#1179610</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1186463">bsc#1186463</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1196018">bsc#1196018</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1202346">bsc#1202346</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216834">bsc#1216834</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220138">bsc#1220138</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220942">bsc#1220942</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221045">bsc#1221045</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221614">bsc#1221614</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221616">bsc#1221616</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221618">bsc#1221618</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222060">bsc#1222060</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222317">bsc#1222317</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222326">bsc#1222326</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222372">bsc#1222372</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222625">bsc#1222625</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222776">bsc#1222776</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222824">bsc#1222824</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222829">bsc#1222829</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222866">bsc#1222866</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223012">bsc#1223012</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223778">bsc#1223778</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223813">bsc#1223813</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223815">bsc#1223815</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224500">bsc#1224500</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224512">bsc#1224512</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224545">bsc#1224545</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224557">bsc#1224557</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224571">bsc#1224571</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224576">bsc#1224576</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224587">bsc#1224587</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224637">bsc#1224637</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224641">bsc#1224641</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224663">bsc#1224663</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224683">bsc#1224683</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224699">bsc#1224699</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224700">bsc#1224700</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224975">bsc#1224975</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225003">bsc#1225003</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225214">bsc#1225214</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225224">bsc#1225224</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225229">bsc#1225229</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225238">bsc#1225238</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225241">bsc#1225241</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225326">bsc#1225326</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225328">bsc#1225328</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225346">bsc#1225346</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225361">bsc#1225361</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225396">bsc#1225396</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225427">bsc#1225427</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225455">bsc#1225455</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225711">bsc#1225711</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225719">bsc#1225719</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225767">bsc#1225767</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225820">bsc#1225820</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225838">bsc#1225838</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225898">bsc#1225898</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226550">bsc#1226550</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226553">bsc#1226553</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226555">bsc#1226555</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226559">bsc#1226559</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226568">bsc#1226568</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226571">bsc#1226571</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226645">bsc#1226645</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226783">bsc#1226783</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226786">bsc#1226786</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226834">bsc#1226834</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226908">bsc#1226908</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227191">bsc#1227191</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227213">bsc#1227213</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227573">bsc#1227573</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227618">bsc#1227618</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227626">bsc#1227626</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227716">bsc#1227716</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227725">bsc#1227725</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227729">bsc#1227729</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227730">bsc#1227730</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227733">bsc#1227733</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227750">bsc#1227750</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227754">bsc#1227754</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227762">bsc#1227762</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227770">bsc#1227770</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227771">bsc#1227771</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227772">bsc#1227772</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227774">bsc#1227774</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227786">bsc#1227786</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227790">bsc#1227790</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227806">bsc#1227806</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227824">bsc#1227824</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227828">bsc#1227828</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227830">bsc#1227830</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227836">bsc#1227836</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227849">bsc#1227849</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227865">bsc#1227865</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227866">bsc#1227866</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227884">bsc#1227884</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227886">bsc#1227886</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227891">bsc#1227891</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227913">bsc#1227913</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227924">bsc#1227924</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227928">bsc#1227928</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227929">bsc#1227929</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227936">bsc#1227936</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227957">bsc#1227957</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227968">bsc#1227968</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227969">bsc#1227969</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227975">bsc#1227975</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227985">bsc#1227985</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227989">bsc#1227989</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228003">bsc#1228003</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228005">bsc#1228005</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228008">bsc#1228008</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228013">bsc#1228013</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228025">bsc#1228025</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228030">bsc#1228030</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228037">bsc#1228037</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228045">bsc#1228045</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228054">bsc#1228054</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228055">bsc#1228055</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228063">bsc#1228063</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228071">bsc#1228071</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228235">bsc#1228235</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228237">bsc#1228237</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228327">bsc#1228327</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228328">bsc#1228328</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228408">bsc#1228408</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228409">bsc#1228409</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228410">bsc#1228410</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228470">bsc#1228470</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228530">bsc#1228530</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228561">bsc#1228561</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228565">bsc#1228565</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228567">bsc#1228567</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228580">bsc#1228580</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228581">bsc#1228581</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228584">bsc#1228584</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228588">bsc#1228588</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228599">bsc#1228599</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228617">bsc#1228617</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228625">bsc#1228625</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228626">bsc#1228626</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228633">bsc#1228633</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228640">bsc#1228640</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228655">bsc#1228655</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228658">bsc#1228658</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228662">bsc#1228662</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228680">bsc#1228680</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228705">bsc#1228705</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228723">bsc#1228723</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228726">bsc#1228726</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228743">bsc#1228743</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228850">bsc#1228850</a>
</li>


</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2020-26558.html">CVE-2020-26558</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-0129.html">CVE-2021-0129</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47191.html">CVE-2021-47191</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47194.html">CVE-2021-47194</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47197.html">CVE-2021-47197</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47219.html">CVE-2021-47219</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47295.html">CVE-2021-47295</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47388.html">CVE-2021-47388</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47395.html">CVE-2021-47395</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47399.html">CVE-2021-47399</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47403.html">CVE-2021-47403</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47405.html">CVE-2021-47405</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47438.html">CVE-2021-47438</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47441.html">CVE-2021-47441</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47468.html">CVE-2021-47468</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47501.html">CVE-2021-47501</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47516.html">CVE-2021-47516</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47542.html">CVE-2021-47542</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47559.html">CVE-2021-47559</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47580.html">CVE-2021-47580</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47582.html">CVE-2021-47582</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47588.html">CVE-2021-47588</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47597.html">CVE-2021-47597</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47599.html">CVE-2021-47599</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47606.html">CVE-2021-47606</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47619.html">CVE-2021-47619</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-20368.html">CVE-2022-20368</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-28748.html">CVE-2022-28748</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-2964.html">CVE-2022-2964</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48775.html">CVE-2022-48775</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48792.html">CVE-2022-48792</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48794.html">CVE-2022-48794</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48804.html">CVE-2022-48804</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48805.html">CVE-2022-48805</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48810.html">CVE-2022-48810</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48811.html">CVE-2022-48811</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48823.html">CVE-2022-48823</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48826.html">CVE-2022-48826</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48827.html">CVE-2022-48827</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48828.html">CVE-2022-48828</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48829.html">CVE-2022-48829</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48836.html">CVE-2022-48836</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48839.html">CVE-2022-48839</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48850.html">CVE-2022-48850</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48855.html">CVE-2022-48855</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48857.html">CVE-2022-48857</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48860.html">CVE-2022-48860</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48863.html">CVE-2022-48863</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52435.html">CVE-2023-52435</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52594.html">CVE-2023-52594</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52612.html">CVE-2023-52612</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52615.html">CVE-2023-52615</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52619.html">CVE-2023-52619</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52623.html">CVE-2023-52623</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52669.html">CVE-2023-52669</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52743.html">CVE-2023-52743</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52885.html">CVE-2023-52885</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26615.html">CVE-2024-26615</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26659.html">CVE-2024-26659</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26663.html">CVE-2024-26663</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26735.html">CVE-2024-26735</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26830.html">CVE-2024-26830</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26920.html">CVE-2024-26920</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26924.html">CVE-2024-26924</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27019.html">CVE-2024-27019</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27020.html">CVE-2024-27020</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27025.html">CVE-2024-27025</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27437.html">CVE-2024-27437</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35806.html">CVE-2024-35806</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35819.html">CVE-2024-35819</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35837.html">CVE-2024-35837</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35887.html">CVE-2024-35887</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35893.html">CVE-2024-35893</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35934.html">CVE-2024-35934</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35949.html">CVE-2024-35949</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35966.html">CVE-2024-35966</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35967.html">CVE-2024-35967</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35978.html">CVE-2024-35978</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35995.html">CVE-2024-35995</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36004.html">CVE-2024-36004</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36288.html">CVE-2024-36288</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36592.html">CVE-2024-36592</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36901.html">CVE-2024-36901</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36902.html">CVE-2024-36902</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36919.html">CVE-2024-36919</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36924.html">CVE-2024-36924</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36939.html">CVE-2024-36939</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36952.html">CVE-2024-36952</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38558.html">CVE-2024-38558</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38560.html">CVE-2024-38560</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38630.html">CVE-2024-38630</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39487.html">CVE-2024-39487</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39488.html">CVE-2024-39488</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39490.html">CVE-2024-39490</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39494.html">CVE-2024-39494</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39499.html">CVE-2024-39499</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39501.html">CVE-2024-39501</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39506.html">CVE-2024-39506</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39507.html">CVE-2024-39507</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39509.html">CVE-2024-39509</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40901.html">CVE-2024-40901</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40904.html">CVE-2024-40904</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40912.html">CVE-2024-40912</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40923.html">CVE-2024-40923</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40929.html">CVE-2024-40929</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40932.html">CVE-2024-40932</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40937.html">CVE-2024-40937</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40941.html">CVE-2024-40941</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40942.html">CVE-2024-40942</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40943.html">CVE-2024-40943</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40953.html">CVE-2024-40953</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40959.html">CVE-2024-40959</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40966.html">CVE-2024-40966</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40967.html">CVE-2024-40967</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40978.html">CVE-2024-40978</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40982.html">CVE-2024-40982</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40987.html">CVE-2024-40987</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40988.html">CVE-2024-40988</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40990.html">CVE-2024-40990</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40995.html">CVE-2024-40995</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40998.html">CVE-2024-40998</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40999.html">CVE-2024-40999</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41014.html">CVE-2024-41014</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41015.html">CVE-2024-41015</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41016.html">CVE-2024-41016</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41044.html">CVE-2024-41044</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41048.html">CVE-2024-41048</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41059.html">CVE-2024-41059</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41060.html">CVE-2024-41060</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41063.html">CVE-2024-41063</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41064.html">CVE-2024-41064</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41066.html">CVE-2024-41066</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41070.html">CVE-2024-41070</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41071.html">CVE-2024-41071</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41072.html">CVE-2024-41072</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41078.html">CVE-2024-41078</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41081.html">CVE-2024-41081</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41089.html">CVE-2024-41089</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41090.html">CVE-2024-41090</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41091.html">CVE-2024-41091</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41095.html">CVE-2024-41095</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42070.html">CVE-2024-42070</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42093.html">CVE-2024-42093</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42096.html">CVE-2024-42096</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42119.html">CVE-2024-42119</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42120.html">CVE-2024-42120</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42124.html">CVE-2024-42124</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42145.html">CVE-2024-42145</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42223.html">CVE-2024-42223</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42224.html">CVE-2024-42224</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2020-26558</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.2</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2020-26558</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.2</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-0129</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-0129</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47191</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47194</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47194</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47197</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47219</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47295</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47388</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47395</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47399</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47403</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47405</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47438</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47441</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47468</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47501</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47516</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47516</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47542</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47542</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47559</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47559</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47580</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47582</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47588</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47597</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47599</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47606</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47619</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-20368</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-20368</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-28748</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-2964</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-2964</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48775</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48792</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48792</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48794</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48804</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48805</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48810</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48811</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48823</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48826</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48827</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48828</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48829</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48836</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48836</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48839</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48839</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48850</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48850</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48855</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48855</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48857</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48857</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48860</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48860</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48863</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48863</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52435</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52435</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52594</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52612</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52615</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52619</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52623</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52669</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52743</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52885</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26615</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26659</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26663</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26735</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26830</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26920</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26924</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27019</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27019</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27020</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27020</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27025</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27437</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35806</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35819</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35837</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35887</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35893</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35934</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35949</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35966</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35967</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35978</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35978</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35995</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36004</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36288</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36288</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36901</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36901</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36902</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36902</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36919</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36924</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36939</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36952</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38558</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38560</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38630</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39487</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39488</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39490</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39494</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39494</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39499</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39501</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39506</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39507</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39509</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40901</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40904</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40912</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40923</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40929</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40932</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40937</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40941</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40942</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40943</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40953</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40959</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40966</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40967</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40978</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40982</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40987</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40988</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40990</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40995</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40998</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40999</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41014</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41015</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41016</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41044</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41048</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41059</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41059</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41060</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41060</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41063</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41063</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41064</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41064</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41066</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41066</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41070</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41071</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41072</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41078</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41081</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41089</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41089</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41090</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41091</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41095</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41095</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42070</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42070</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42093</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42096</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42096</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42119</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42120</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42124</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42145</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42145</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42223</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42223</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42224</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42224</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">SUSE Linux
Enterprise High Availability Extension 12 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 12 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Live Patching 12-SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 12 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 12 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Software Development Kit 12 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Workstation Extension 12 12-SP5</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves 150 vulnerabilities and has five security
fixes can now be installed.</p>





<h2>Description:</h2>

<p>The SUSE Linux Enterprise 12 SP5 kernel was updated to receive
various security bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2024-39494: ima: Fix use-after-free on a dentry&#x27;s
dname.name (bsc#1227716).</li>
<li>CVE-2024-42096: x86: stop playing stack games in profile_pc()
(bsc#1228633).</li>
<li>CVE-2024-39506: liquidio: adjust a NULL pointer handling path in
lio_vf_rep_copy_packet (bsc#1227729).</li>
<li>CVE-2021-47619: i40e: Fix queues reservation for XDP
(bsc#1226645).</li>
<li>CVE-2024-42145: IB/core: Implement a limit on UMAD receive List
(bsc#1228743).</li>
<li>CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible
(bsc#1228705).</li>
<li>CVE-2024-42223: media: dvb-frontends: tda10048: Fix integer overflow
(bsc#1228726)</li>
<li>CVE-2024-42119: drm/amd/display: Skip finding free audio for unknown
engine_id (bsc#1228584)</li>
<li>CVE-2024-42120: drm/amd/display: Check pipe offset before setting
vblank (bsc#1228588)</li>
<li>CVE-2024-41095: drm/nouveau/dispnv04: fix null pointer dereference in
nv17_tv_get_ld_modes (bsc#1228662)</li>
<li>CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list
(bsc#1228723).</li>
<li>CVE-2024-41072: wifi: cfg80211: wext: add extra SIOCSIWSCAN data
check (bsc#1228626).</li>
<li>CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg
(bsc#1228565).</li>
<li>CVE-2024-40995: net/sched: act_api: fix possible infinite loop in
tcf_idr_check_alloc() (bsc#1227830).</li>
<li>CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed
packets (bsc#1228530).</li>
<li>CVE-2024-41066: ibmvnic: add tx check to prevent skb leak
(bsc#1228640).</li>
<li>CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on
stack (bsc#1228680).</li>
<li>CVE-2024-41089: drm/nouveau/dispnv04: fix null pointer dereference in
(bsc#1228658)</li>
<li>CVE-2024-41060: drm/radeon: check bo_va-&gt;bo is non-NULL before
using it (bsc#1228567)</li>
<li>CVE-2022-48829: NFSD: Fix NFSv3 SETATTR/CREATE&#x27;s handling of
large file sizes (bsc#1228055).</li>
<li>CVE-2022-48828: NFSD: Fix ia_size underflow (bsc#1228054).</li>
<li>CVE-2022-48827: NFSD: Fix the behavior of READ near OFFSET_MAX
(bsc#1228037).</li>
<li>CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota
disable failure (bsc#1228655).</li>
<li>CVE-2024-41071: wifi: mac80211: Avoid address calculations via out of
bounds array indexing (bsc#1228625).</li>
<li>CVE-2024-41064: powerpc/eeh: avoid possible crash when
edev-&gt;pdev changes (bsc#1228599).</li>
<li>CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata
blocks (bsc#1224700).</li>
<li>CVE-2024-41081: ila: block BH in ila_output()
(bsc#1228617).</li>
<li>CVE-2024-40978: scsi: qedi: Fix crash while reading debugfs attribute
(bsc#1227929).</li>
<li>CVE-2022-48792: scsi: pm8001: Fix use-after-free for aborted SSP/STP
sas_task (bsc#1228013).</li>
<li>CVE-2022-48823: scsi: qedf: Fix refcount issue when LOGO is received
during TMF (bsc#1228045).</li>
<li>CVE-2024-40998: ext4: fix uninitialized ratelimit_state-&gt;lock
access in __ext4_fill_super() (bsc#1227866).</li>
<li>CVE-2024-41059: hfsplus: fix uninit-value in copy_name
(bsc#1228561).</li>
<li>CVE-2024-40987: drm/amdgpu: fix UBSAN warning in kv_dpm.c
(bsc#1228235)</li>
<li>CVE-2022-48826: drm/vc4: Fix deadlock on DSI device attach error
(bsc#1227975)</li>
<li>CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ
(bsc#1222625).</li>
<li>CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry()
(bsc#1228409).</li>
<li>CVE-2024-41016: ocfs2: strict bound check before memcmp in
ocfs2_xattr_find_entry() (bsc#1228410).</li>
<li>CVE-2024-41063: bluetooth: hci_core: cancel all works upon
hci_unregister_dev() (bsc#1228580).</li>
<li>CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE
on store to data registers (bsc#1228470).</li>
<li>CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in
kvm_spapr_tce_attach_iommu_group() (bsc#1228581).</li>
<li>CVE-2021-47405: HID: usbhid: free raw_report buffers in usbhid_stop
(bsc#1225238).</li>
<li>CVE-2024-40988: drm/radeon: fix UBSAN warning in kv_dpm.c
(bsc#1227957)</li>
<li>CVE-2024-40932: drm/exynos/vidi: fix memory leak in .get_modes()
(bsc#1227828)</li>
<li>CVE-2021-47403: ipack: ipoctal: fix module reference leak
(bsc#1225241).</li>
<li>CVE-2021-47388: mac80211: fix use-after-free in CCMP/GCMP RX
(bsc#1225214).</li>
<li>CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data
(bsc#1228408).</li>
<li>CVE-2024-41091: tun: add missing verification for short frame
(bsc#1228327).</li>
<li>CVE-2024-41090: tap: add missing verification for short frame
(bsc#1228328).</li>
<li>CVE-2024-40999: net: ena: Add validation for completion descriptors
consistency (bsc#1227913).</li>
<li>CVE-2024-35837: net: mvpp2: clear BM pool before initialization
(bsc#1224500).</li>
<li>CVE-2021-47588: sit: do not call ipip6_dev_free() from sit_init_net()
(bsc#1226568).</li>
<li>CVE-2022-48804: vt_ioctl: fix array_index_nospec in vt_setactivate
(bsc#1227968).</li>
<li>CVE-2024-40967: serial: imx: Introduce timeout when waiting on
transmitter empty (bsc#1227891).</li>
<li>CVE-2024-40966: kABI: tty: add the option to have a tty reject a new
ldisc (bsc#1227886).</li>
<li>CVE-2022-48850: net-sysfs: add check for netdevice being present to
speed_show (bsc#1228071).</li>
<li>CVE-2021-47582: usb: core: Do not hold the device lock while sleeping
in do_proc_control() (bsc#1226559).</li>
<li>CVE-2024-40982: ssb: fix potential NULL pointer dereference in
ssb_device_uevent() (bsc#1227865).</li>
<li>CVE-2021-47468: isdn: mISDN: Fix sleeping function called from
invalid context (bsc#1225346).</li>
<li>CVE-2021-47395: mac80211: limit injected vht mcs/nss in
ieee80211_parse_tx_radiotap (bsc#1225326).</li>
<li>CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling
ip[6]mr_free_table() on failure path (bsc#1227936).</li>
<li>CVE-2023-52594: Fixed potential array-index-out-of-bounds read in
ath9k_htc_txstatus() (bsc#1221045).</li>
<li>CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets
(bsc#1228003).</li>
<li>CVE-2021-47580: scsi: scsi_debug: Fix type in min_t to avoid stack
OOB (bsc#1226550).</li>
<li>CVE-2024-26735: ipv6: sr: fix possible use-after-free and
null-ptr-deref (bsc#1222372).</li>
<li>CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated
(bsc#1226786).</li>
<li>CVE-2022-48811: ibmvnic: do not release napi in __ibmvnic_open()
(bsc#1227928).</li>
<li>CVE-2021-0129: Improper access control in BlueZ may have allowed an
authenticated user to potentially enable information disclosure via adjacent access (bsc#1186463).</li>
<li>CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure
pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (bsc#1179610).</li>
<li>CVE-2024-40937: gve: Clear napi-&gt;skb before
dev_kfree_skb_any() (bsc#1227836).</li>
<li>CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent
scenario (bsc#1227730).</li>
<li>CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation
failure (bsc#1227786).</li>
<li>CVE-2024-40941: wifi: iwlwifi: mvm: do not read past the mfuart
notifcation (bsc#1227771).</li>
<li>CVE-2022-48860: ethernet: Fix error handling in xemaclite_of_probe
(bsc#1228008)</li>
<li>CVE-2022-48863: mISDN: Fix memory leak in dsp_pipeline_build()
(bsc#1228063).</li>
<li>CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in
kvm_vcpu_on_spin() (bsc#1227806).</li>
<li>CVE-2024-39499: vmci: prevent speculation leaks by sanitizing event
in event_deliver() (bsc#1227725)</li>
<li>CVE-2024-39509: HID: core: remove unnecessary WARN_ON() in
implement() (bsc#1227733)</li>
<li>CVE-2024-39487: bonding: Fix out-of-bounds read in
bond_option_arp_ip_targets_set() (bsc#1227573)</li>
<li>CVE-2024-35934: net/smc: reduce rtnl pressure in
smc_pnet_create_pnetids_list() (bsc#1224641)</li>
<li>CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in
xfrm6_get_saddr() (bsc#1227884).</li>
<li>CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak
(bsc#1224512)</li>
<li>CVE-2021-47441: mlxsw: thermal: Fix out-of-bounds memory accesses
(bsc#1225224)</li>
<li>CVE-2021-47194: cfg80211: call cfg80211_stop_ap when switch from
P2P_GO type (bsc#1222829)</li>
<li>CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in
__nft_expr_type_get() (bsc#1223815)</li>
<li>CVE-2022-48775: Drivers: hv: vmbus: Fix memory leak in
vmbus_add_channel_kobj (bsc#1227924).</li>
<li>CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in
__nft_obj_type_get() (bsc#1223813)</li>
<li>CVE-2024-40929: wifi: iwlwifi: mvm: check n_ssids before accessing
the ssids (bsc#1227774).</li>
<li>CVE-2024-40912: wifi: mac80211: Fix deadlock in
ieee80211_sta_ps_deliver_wakeup() (bsc#1227790).</li>
<li>CVE-2024-40942: wifi: mac80211: mesh: Fix leak of mesh_preq_queue
objects (bsc#1227770).</li>
<li>CVE-2022-48857: NFC: port100: fix use-after-free in
port100_send_complete (bsc#1228005).</li>
<li>CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in
fib6_rule_action() (bsc#1225719).</li>
<li>CVE-2021-47606: net: netlink: af_netlink: Prevent empty skb by adding
a check on len. (bsc#1226555).</li>
<li>CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in
non-allocated memory (bsc#1227762).</li>
<li>CVE-2024-26924: scsi: lpfc: Release hbalock before calling
lpfc_worker_wake_up() (bsc#1225820).</li>
<li>CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove
administratively set MAC (bsc#1223012).</li>
<li>CVE-2021-47516: nfp: Fix memory leak in nfp_cpp_area_cache_add()
(bsc#1225427).</li>
<li>CVE-2021-47501: i40e: Fix NULL pointer dereference in
i40e_dbg_dump_desc (bsc#1225361).</li>
<li>CVE-2024-39501: drivers: core: synchronize really_probe() and
dev_uevent() (bsc#1227754).</li>
<li>CVE-2023-52743: ice: Do not use WQ_MEM_RECLAIM flag for workqueue
(bsc#1225003)</li>
<li>CVE-2021-47542: net: qlogic: qlcnic: Fix a NULL pointer dereference
in qlcnic_83xx_add_rings() (bsc#1225455)</li>
<li>CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output()
(bsc#1225711)</li>
<li>CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue
(bsc#1224545)</li>
<li>CVE-2024-27025: nbd: null check for nla_nest_start
(bsc#1223778)</li>
<li>CVE-2021-47599: btrfs: use latest_dev in btrfs_show_devname
(bsc#1226571).</li>
<li>CVE-2023-52435: net: prevent mss overflow in skb_segment()
(bsc#1220138).</li>
<li>CVE-2024-26663: tipc: Check the bearer type before calling
tipc_udp_nl_bearer_add() (bsc#1222326).</li>
<li>CVE-2021-47597: inet_diag: fix kernel-infoleak for UDP sockets
(bsc#1226553).</li>
<li>CVE-2024-39490: ipv6: sr: fix missing sk_buff release in
seg6_input_core (bsc#1227626).</li>
<li>CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple
for ICMPv6 (bsc#1226783).</li>
<li>CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D
connection dump (bsc#1220942).</li>
<li>CVE-2023-52619: Fixed possible crash when setting number of cpus to
an odd number in pstore/ram (bsc#1221618).</li>
<li>CVE-2024-26659: Fixed wrong handling of isoc Babble and Buffer
Overrun events in xhci (bsc#1222317).</li>
<li>CVE-2024-35978: Bluetooth: Fix memory leak in hci_req_sync_complete()
(bsc#1224571).</li>
<li>CVE-2023-52669: crypto: s390/aes - Fix buffer overread in CTR mode
(bsc#1224637).</li>
<li>CVE-2023-52615: Fixed page fault dead lock on mmap-ed hwrng
(bsc#1221614).</li>
<li>CVE-2023-52612: Fixed req-&gt;dst buffer overflow in crypto/scomp
(bsc#1221616).</li>
<li>CVE-2024-35995: ACPI: CPPC: Use access_width over bit_width for
system memory accesses (bsc#1224557).</li>
<li>CVE-2023-52623: Fixed suspicious RCU usage in SUNRPC
(bsc#1222060).</li>
<li>CVE-2021-47295: net: sched: fix memory leak in
tcindex_partial_destroy_work (bsc#1224975)</li>
<li>CVE-2024-38630: watchdog: cpu5wdt.c: Fix use-after-free bug caused by
cpu5wdt_trigger (bsc#1226908).</li>
<li>CVE-2021-47559: net/smc: Fix NULL pointer dereferencing in
smc_vlan_by_tcpsk() (bsc#1225396).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>Fix spurious WARNING caused by a qxl driver patch
(bsc#1227213,bsc#1227191)</li>
<li>Btrfs: incremental send, fix emission of invalid clone operations
(bsc#1228030).</li>
<li>Btrfs: send, improve clone range (bsc#1228030).</li>
<li>KVM: PPC: Book3S HV: Do not take kvm-&gt;lock around
kvm_for_each_vcpu (bsc#1065729).</li>
<li>KVM: PPC: Book3S HV: remove extraneous asterisk from
rm_host_ipi_action() comment (bsc#1065729).</li>
<li>KVM: PPC: Book3S PR: Exiting split hack mode needs to fixup both PC
and LR (bsc#1065729).</li>
<li>KVM: PPC: Book3S: Fix some RCU-list locks (git-fixes).</li>
<li>KVM: PPC: Book3S: Only report KVM_CAP_SPAPR_TCE_VFIO on powernv
machines (bsc#1065729).</li>
<li>KVM: PPC: Book3S: Use new mutex to synchronize access to rtas token
list (bsc#1065729).</li>
<li>KVM: PPC: Inform the userspace about TCE update failures
(bsc#1065729).</li>
<li>KVM: PPC: Move and undef TRACE_INCLUDE_PATH/FILE
(bsc#1065729).</li>
<li>PCI: Fix resource double counting on remove &amp; rescan
(git-fixes).</li>
<li>PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN
(git-fixes).</li>
<li>Tools: hv: kvp: eliminate &#x27;may be used
uninitialized&#x27; warning (git-fixes).</li>
<li>USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
(git-fixes).</li>
<li>btrfs: fix 64bit compat send ioctl arguments not initializing version
member (bsc#1228030).</li>
<li>btrfs: fix send ioctl on 32bit with 64bit kernel
(bsc#1228030).</li>
<li>btrfs: remove unused members dir_path from recorded_ref
(bsc#1228030).</li>
<li>btrfs: send: add new command FILEATTR for file attributes
(bsc#1228030).</li>
<li>btrfs: send: add stream v2 definitions (bsc#1228030).</li>
<li>btrfs: send: always use the rbtree based inode ref management
infrastructure (bsc#1228030).</li>
<li>btrfs: send: avoid copying file data (bsc#1228030).</li>
<li>btrfs: send: explicitly number commands and attributes
(bsc#1228030).</li>
<li>btrfs: send: fix failures when processing inodes with no links
(bsc#1228030).</li>
<li>btrfs: send: fix send failure of a subcase of orphan inodes
(bsc#1228030).</li>
<li>btrfs: send: fix sending link commands for existing file paths
(bsc#1228030).</li>
<li>btrfs: send: get rid of i_size logic in send_write()
(bsc#1228030).</li>
<li>btrfs: send: introduce recorded_ref_alloc and recorded_ref_free
(bsc#1228030).</li>
<li>btrfs: send: prepare for v2 protocol (bsc#1228030).</li>
<li>btrfs: send: refactor arguments of get_inode_info()
(bsc#1228030).</li>
<li>btrfs: send: remove stale code when checking for shared extents
(bsc#1228030).</li>
<li>btrfs: send: remove unused found_type parameter to
lookup_dir_item_inode() (bsc#1228030).</li>
<li>btrfs: send: remove unused send_ctx::{total,cmd}_send_size
(bsc#1228030).</li>
<li>btrfs: send: use boolean types for current inode status
(bsc#1228030).</li>
<li>btrfs: silence maybe-uninitialized warning in clone_range
(bsc#1228030).</li>
<li>drm/vc4: dsi: Only register our component once a DSI device is
(bsc#1227975)</li>
<li>hv_netvsc: rndis_filter needs to select NLS (git-fixes).</li>
<li>ipv6: sr: fix incorrect unregister order (git-fixes).</li>
<li>net: mana: Fix the extra HZ in mana_hwc_send_request
(git-fixes).</li>
<li>net: mana: select PAGE_POOL (git-fixes).</li>
<li>net_sched: add a temporary refcnt for struct tcindex_data
(bsc#1224975).</li>
<li>net_sched: fix a memory leak in cls_tcindex (bsc#1224975).</li>
<li>net_sched: fix a missing refcnt in tcindex_init()
(bsc#1224975).</li>
<li>net_sched: hold rtnl lock in tcindex_partial_destroy_work()
(bsc#1224975)</li>
<li>nvme: fixup comment for nvme RDMA Provider Type
(git-fixes).</li>
<li>ocfs2: fix DIO failure due to insufficient transaction credits
(bsc#1216834).</li>
<li>ocfs2: remove redundant assignment to variable free_space
(bsc#1228409).</li>
<li>ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()
(bsc#1228410).</li>
<li>scsi: qla2xxx: Avoid possible run-time warning with long model_num
(bsc#1228850).</li>
<li>scsi: qla2xxx: Complete command early within lock
(bsc#1228850).</li>
<li>scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).</li>
<li>scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).</li>
<li>scsi: qla2xxx: During vport delete send async logout explicitly
(bsc#1228850).</li>
<li>scsi: qla2xxx: Fix debugfs output for fw_resource_count
(bsc#1228850).</li>
<li>scsi: qla2xxx: Fix flash read failure (bsc#1228850).</li>
<li>scsi: qla2xxx: Fix for possible memory corruption
(bsc#1228850).</li>
<li>scsi: qla2xxx: Fix optrom version displayed in FDMI
(bsc#1228850).</li>
<li>scsi: qla2xxx: Reduce fabric scan duplicate code
(bsc#1228850).</li>
<li>scsi: qla2xxx: Remove unused struct
&#x27;scsi_dif_tuple&#x27; (bsc#1228850).</li>
<li>scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds
(bsc#1228850).</li>
<li>scsi: qla2xxx: Unable to act on RSCN for port online
(bsc#1228850).</li>
<li>scsi: qla2xxx: Update version to 10.02.09.300-k
(bsc#1228850).</li>
<li>scsi: qla2xxx: Use QP lock to search for bsg
(bsc#1228850).</li>
<li>scsi: qla2xxx: validate nvme_local_port correctly
(bsc#1228850).</li>
<li>signal: Introduce clear_siginfo (git-fixes).</li>
<li>string.h: Introduce memtostr() and memtostr_pad()
(bsc#1228850).</li>
<li>tools lib: Fix builds when glibc contains strlcpy()
(git-fixes).</li>
<li>tools: hv: fix KVP and VSS daemons exit code (git-fixes).</li>
<li>usb: add a hcd_uses_dma helper (git-fixes).</li>
<li>usb: atm: cxacru: fix endpoint checking in cxacru_bind()
(git-fixes).</li>
<li>usb: musb: da8xx: fix a resource leak in probe()
(git-fixes).</li>
<li>x86/bhi: Avoid warning in #DB handler due to BHI mitigation
(git-fixes).</li>
<li>x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto
(git-fixes).</li>
<li>x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with
CONFIG_MITIGATION_SPECTRE_BHI (git-fixes).</li>
<li>xfs: check that dir block entries do not off the end of the buffer
(git-fixes).</li>
<li>xfs: refactor xfs_verifier_error and xfs_buf_ioerror
(git-fixes).</li>
<li>xfs: remove XFS_WANT_CORRUPTED_RETURN from dir3 data verifiers
(git-fixes).</li>
<li>xhci: Poll for U0 after disabling USB2 LPM (git-fixes).</li>
</ul>




<h2>Special Instructions and Notes:</h2>
<ul>


<li>Please reboot the system after installing this
update.</li>


</ul>


<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
SUSE Linux Enterprise Server for SAP Applications 12 SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-HA-12-SP5-2024-2940=1 SUSE-SLE-SERVER-12-SP5-2024-2940=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise High Availability Extension 12 SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-HA-12-SP5-2024-2940=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Live Patching 12-SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-Live-Patching-12-SP5-2024-2940=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Software Development Kit 12 SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-SDK-12-SP5-2024-2940=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing 12 SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-SERVER-12-SP5-2024-2940=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server 12 SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-SERVER-12-SP5-2024-2940=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Workstation Extension 12 12-SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-WE-12-SP5-2024-2940=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
SUSE Linux Enterprise Server for SAP Applications 12 SP5
(ppc64le x86_64)
<ul>


<li>cluster-md-kmp-default-debuginfo-4.12.14-122.225.1</li>


<li>kernel-default-debuginfo-4.12.14-122.225.1</li>


<li>kernel-default-devel-4.12.14-122.225.1</li>


<li>gfs2-kmp-default-4.12.14-122.225.1</li>


<li>kernel-default-base-debuginfo-4.12.14-122.225.1</li>


<li>ocfs2-kmp-default-debuginfo-4.12.14-122.225.1</li>


<li>dlm-kmp-default-4.12.14-122.225.1</li>


<li>kernel-default-debugsource-4.12.14-122.225.1</li>


<li>dlm-kmp-default-debuginfo-4.12.14-122.225.1</li>


<li>ocfs2-kmp-default-4.12.14-122.225.1</li>


<li>cluster-md-kmp-default-4.12.14-122.225.1</li>


<li>kernel-default-base-4.12.14-122.225.1</li>

<li>kernel-syms-4.12.14-122.225.1</li>


<li>gfs2-kmp-default-debuginfo-4.12.14-122.225.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server for SAP Applications 12 SP5
(nosrc ppc64le x86_64)
<ul>


<li>kernel-default-4.12.14-122.225.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server for SAP Applications 12 SP5
(noarch)
<ul>


<li>kernel-source-4.12.14-122.225.1</li>

<li>kernel-devel-4.12.14-122.225.1</li>


<li>kernel-macros-4.12.14-122.225.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server for SAP Applications 12 SP5
(x86_64)
<ul>


<li>kernel-default-devel-debuginfo-4.12.14-122.225.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Availability Extension 12 SP5
(ppc64le s390x x86_64)
<ul>


<li>cluster-md-kmp-default-debuginfo-4.12.14-122.225.1</li>


<li>kernel-default-debuginfo-4.12.14-122.225.1</li>


<li>gfs2-kmp-default-4.12.14-122.225.1</li>


<li>ocfs2-kmp-default-debuginfo-4.12.14-122.225.1</li>


<li>dlm-kmp-default-4.12.14-122.225.1</li>


<li>kernel-default-debugsource-4.12.14-122.225.1</li>


<li>dlm-kmp-default-debuginfo-4.12.14-122.225.1</li>


<li>ocfs2-kmp-default-4.12.14-122.225.1</li>


<li>cluster-md-kmp-default-4.12.14-122.225.1</li>


<li>gfs2-kmp-default-debuginfo-4.12.14-122.225.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Availability Extension 12 SP5
(nosrc)
<ul>


<li>kernel-default-4.12.14-122.225.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x
x86_64)
<ul>


<li>kernel-default-kgraft-devel-4.12.14-122.225.1</li>


<li>kernel-default-debuginfo-4.12.14-122.225.1</li>


<li>kgraft-patch-4_12_14-122_225-default-1-8.3.1</li>


<li>kernel-default-debugsource-4.12.14-122.225.1</li>


<li>kernel-default-kgraft-4.12.14-122.225.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
<ul>


<li>kernel-default-4.12.14-122.225.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Software Development Kit 12 SP5
(noarch nosrc)
<ul>

<li>kernel-docs-4.12.14-122.225.2</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Software Development Kit 12 SP5
(aarch64 ppc64le s390x x86_64)
<ul>


<li>kernel-obs-build-debugsource-4.12.14-122.225.1</li>


<li>kernel-obs-build-4.12.14-122.225.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Performance Computing 12 SP5
(aarch64 nosrc x86_64)
<ul>


<li>kernel-default-4.12.14-122.225.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing 12 SP5
(aarch64 x86_64)
<ul>


<li>kernel-default-debuginfo-4.12.14-122.225.1</li>


<li>kernel-default-devel-4.12.14-122.225.1</li>


<li>kernel-default-base-debuginfo-4.12.14-122.225.1</li>


<li>kernel-default-debugsource-4.12.14-122.225.1</li>

<li>kernel-syms-4.12.14-122.225.1</li>


<li>kernel-default-base-4.12.14-122.225.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing 12 SP5
(noarch)
<ul>


<li>kernel-source-4.12.14-122.225.1</li>

<li>kernel-devel-4.12.14-122.225.1</li>


<li>kernel-macros-4.12.14-122.225.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing 12 SP5
(x86_64)
<ul>


<li>kernel-default-devel-debuginfo-4.12.14-122.225.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x
x86_64 nosrc)
<ul>


<li>kernel-default-4.12.14-122.225.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x
x86_64)
<ul>


<li>kernel-default-debuginfo-4.12.14-122.225.1</li>


<li>kernel-default-devel-4.12.14-122.225.1</li>


<li>kernel-default-base-debuginfo-4.12.14-122.225.1</li>


<li>kernel-default-debugsource-4.12.14-122.225.1</li>

<li>kernel-syms-4.12.14-122.225.1</li>


<li>kernel-default-base-4.12.14-122.225.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 12 SP5 (noarch)
<ul>


<li>kernel-source-4.12.14-122.225.1</li>

<li>kernel-devel-4.12.14-122.225.1</li>


<li>kernel-macros-4.12.14-122.225.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 12 SP5 (s390x)
<ul>


<li>kernel-default-man-4.12.14-122.225.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 12 SP5 (x86_64)
<ul>


<li>kernel-default-devel-debuginfo-4.12.14-122.225.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Workstation Extension 12 12-SP5
(nosrc)
<ul>


<li>kernel-default-4.12.14-122.225.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Workstation Extension 12 12-SP5
(x86_64)
<ul>


<li>kernel-default-extra-4.12.14-122.225.1</li>


<li>kernel-default-debuginfo-4.12.14-122.225.1</li>


<li>kernel-default-extra-debuginfo-4.12.14-122.225.1</li>


<li>kernel-default-debugsource-4.12.14-122.225.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2020-26558.html">https://www.suse.com/security/cve/CVE-2020-26558.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-0129.html">https://www.suse.com/security/cve/CVE-2021-0129.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47191.html">https://www.suse.com/security/cve/CVE-2021-47191.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47194.html">https://www.suse.com/security/cve/CVE-2021-47194.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47197.html">https://www.suse.com/security/cve/CVE-2021-47197.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47219.html">https://www.suse.com/security/cve/CVE-2021-47219.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47295.html">https://www.suse.com/security/cve/CVE-2021-47295.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47388.html">https://www.suse.com/security/cve/CVE-2021-47388.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47395.html">https://www.suse.com/security/cve/CVE-2021-47395.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47399.html">https://www.suse.com/security/cve/CVE-2021-47399.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47403.html">https://www.suse.com/security/cve/CVE-2021-47403.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47405.html">https://www.suse.com/security/cve/CVE-2021-47405.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47438.html">https://www.suse.com/security/cve/CVE-2021-47438.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47441.html">https://www.suse.com/security/cve/CVE-2021-47441.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47468.html">https://www.suse.com/security/cve/CVE-2021-47468.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47501.html">https://www.suse.com/security/cve/CVE-2021-47501.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47516.html">https://www.suse.com/security/cve/CVE-2021-47516.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47542.html">https://www.suse.com/security/cve/CVE-2021-47542.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47559.html">https://www.suse.com/security/cve/CVE-2021-47559.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47580.html">https://www.suse.com/security/cve/CVE-2021-47580.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47582.html">https://www.suse.com/security/cve/CVE-2021-47582.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47588.html">https://www.suse.com/security/cve/CVE-2021-47588.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47597.html">https://www.suse.com/security/cve/CVE-2021-47597.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47599.html">https://www.suse.com/security/cve/CVE-2021-47599.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47606.html">https://www.suse.com/security/cve/CVE-2021-47606.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47619.html">https://www.suse.com/security/cve/CVE-2021-47619.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-20368.html">https://www.suse.com/security/cve/CVE-2022-20368.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-28748.html">https://www.suse.com/security/cve/CVE-2022-28748.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-2964.html">https://www.suse.com/security/cve/CVE-2022-2964.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48775.html">https://www.suse.com/security/cve/CVE-2022-48775.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48792.html">https://www.suse.com/security/cve/CVE-2022-48792.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48794.html">https://www.suse.com/security/cve/CVE-2022-48794.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48804.html">https://www.suse.com/security/cve/CVE-2022-48804.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48805.html">https://www.suse.com/security/cve/CVE-2022-48805.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48810.html">https://www.suse.com/security/cve/CVE-2022-48810.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48811.html">https://www.suse.com/security/cve/CVE-2022-48811.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48823.html">https://www.suse.com/security/cve/CVE-2022-48823.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48826.html">https://www.suse.com/security/cve/CVE-2022-48826.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48827.html">https://www.suse.com/security/cve/CVE-2022-48827.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48828.html">https://www.suse.com/security/cve/CVE-2022-48828.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48829.html">https://www.suse.com/security/cve/CVE-2022-48829.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48836.html">https://www.suse.com/security/cve/CVE-2022-48836.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48839.html">https://www.suse.com/security/cve/CVE-2022-48839.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48850.html">https://www.suse.com/security/cve/CVE-2022-48850.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48855.html">https://www.suse.com/security/cve/CVE-2022-48855.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48857.html">https://www.suse.com/security/cve/CVE-2022-48857.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48860.html">https://www.suse.com/security/cve/CVE-2022-48860.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48863.html">https://www.suse.com/security/cve/CVE-2022-48863.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52435.html">https://www.suse.com/security/cve/CVE-2023-52435.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52594.html">https://www.suse.com/security/cve/CVE-2023-52594.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52612.html">https://www.suse.com/security/cve/CVE-2023-52612.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52615.html">https://www.suse.com/security/cve/CVE-2023-52615.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52619.html">https://www.suse.com/security/cve/CVE-2023-52619.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52623.html">https://www.suse.com/security/cve/CVE-2023-52623.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52669.html">https://www.suse.com/security/cve/CVE-2023-52669.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52743.html">https://www.suse.com/security/cve/CVE-2023-52743.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52885.html">https://www.suse.com/security/cve/CVE-2023-52885.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26615.html">https://www.suse.com/security/cve/CVE-2024-26615.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26659.html">https://www.suse.com/security/cve/CVE-2024-26659.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26663.html">https://www.suse.com/security/cve/CVE-2024-26663.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26735.html">https://www.suse.com/security/cve/CVE-2024-26735.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26830.html">https://www.suse.com/security/cve/CVE-2024-26830.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26920.html">https://www.suse.com/security/cve/CVE-2024-26920.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26924.html">https://www.suse.com/security/cve/CVE-2024-26924.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27019.html">https://www.suse.com/security/cve/CVE-2024-27019.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27020.html">https://www.suse.com/security/cve/CVE-2024-27020.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27025.html">https://www.suse.com/security/cve/CVE-2024-27025.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27437.html">https://www.suse.com/security/cve/CVE-2024-27437.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35806.html">https://www.suse.com/security/cve/CVE-2024-35806.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35819.html">https://www.suse.com/security/cve/CVE-2024-35819.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35837.html">https://www.suse.com/security/cve/CVE-2024-35837.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35887.html">https://www.suse.com/security/cve/CVE-2024-35887.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35893.html">https://www.suse.com/security/cve/CVE-2024-35893.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35934.html">https://www.suse.com/security/cve/CVE-2024-35934.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35949.html">https://www.suse.com/security/cve/CVE-2024-35949.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35966.html">https://www.suse.com/security/cve/CVE-2024-35966.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35967.html">https://www.suse.com/security/cve/CVE-2024-35967.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35978.html">https://www.suse.com/security/cve/CVE-2024-35978.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35995.html">https://www.suse.com/security/cve/CVE-2024-35995.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36004.html">https://www.suse.com/security/cve/CVE-2024-36004.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36288.html">https://www.suse.com/security/cve/CVE-2024-36288.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36592.html">https://www.suse.com/security/cve/CVE-2024-36592.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36901.html">https://www.suse.com/security/cve/CVE-2024-36901.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36902.html">https://www.suse.com/security/cve/CVE-2024-36902.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36919.html">https://www.suse.com/security/cve/CVE-2024-36919.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36924.html">https://www.suse.com/security/cve/CVE-2024-36924.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36939.html">https://www.suse.com/security/cve/CVE-2024-36939.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36952.html">https://www.suse.com/security/cve/CVE-2024-36952.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38558.html">https://www.suse.com/security/cve/CVE-2024-38558.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38560.html">https://www.suse.com/security/cve/CVE-2024-38560.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38630.html">https://www.suse.com/security/cve/CVE-2024-38630.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39487.html">https://www.suse.com/security/cve/CVE-2024-39487.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39488.html">https://www.suse.com/security/cve/CVE-2024-39488.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39490.html">https://www.suse.com/security/cve/CVE-2024-39490.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39494.html">https://www.suse.com/security/cve/CVE-2024-39494.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39499.html">https://www.suse.com/security/cve/CVE-2024-39499.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39501.html">https://www.suse.com/security/cve/CVE-2024-39501.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39506.html">https://www.suse.com/security/cve/CVE-2024-39506.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39507.html">https://www.suse.com/security/cve/CVE-2024-39507.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39509.html">https://www.suse.com/security/cve/CVE-2024-39509.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40901.html">https://www.suse.com/security/cve/CVE-2024-40901.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40904.html">https://www.suse.com/security/cve/CVE-2024-40904.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40912.html">https://www.suse.com/security/cve/CVE-2024-40912.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40923.html">https://www.suse.com/security/cve/CVE-2024-40923.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40929.html">https://www.suse.com/security/cve/CVE-2024-40929.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40932.html">https://www.suse.com/security/cve/CVE-2024-40932.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40937.html">https://www.suse.com/security/cve/CVE-2024-40937.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40941.html">https://www.suse.com/security/cve/CVE-2024-40941.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40942.html">https://www.suse.com/security/cve/CVE-2024-40942.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40943.html">https://www.suse.com/security/cve/CVE-2024-40943.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40953.html">https://www.suse.com/security/cve/CVE-2024-40953.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40959.html">https://www.suse.com/security/cve/CVE-2024-40959.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40966.html">https://www.suse.com/security/cve/CVE-2024-40966.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40967.html">https://www.suse.com/security/cve/CVE-2024-40967.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40978.html">https://www.suse.com/security/cve/CVE-2024-40978.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40982.html">https://www.suse.com/security/cve/CVE-2024-40982.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40987.html">https://www.suse.com/security/cve/CVE-2024-40987.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40988.html">https://www.suse.com/security/cve/CVE-2024-40988.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40990.html">https://www.suse.com/security/cve/CVE-2024-40990.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40995.html">https://www.suse.com/security/cve/CVE-2024-40995.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40998.html">https://www.suse.com/security/cve/CVE-2024-40998.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40999.html">https://www.suse.com/security/cve/CVE-2024-40999.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41014.html">https://www.suse.com/security/cve/CVE-2024-41014.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41015.html">https://www.suse.com/security/cve/CVE-2024-41015.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41016.html">https://www.suse.com/security/cve/CVE-2024-41016.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41044.html">https://www.suse.com/security/cve/CVE-2024-41044.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41048.html">https://www.suse.com/security/cve/CVE-2024-41048.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41059.html">https://www.suse.com/security/cve/CVE-2024-41059.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41060.html">https://www.suse.com/security/cve/CVE-2024-41060.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41063.html">https://www.suse.com/security/cve/CVE-2024-41063.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41064.html">https://www.suse.com/security/cve/CVE-2024-41064.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41066.html">https://www.suse.com/security/cve/CVE-2024-41066.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41070.html">https://www.suse.com/security/cve/CVE-2024-41070.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41071.html">https://www.suse.com/security/cve/CVE-2024-41071.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41072.html">https://www.suse.com/security/cve/CVE-2024-41072.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41078.html">https://www.suse.com/security/cve/CVE-2024-41078.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41081.html">https://www.suse.com/security/cve/CVE-2024-41081.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41089.html">https://www.suse.com/security/cve/CVE-2024-41089.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41090.html">https://www.suse.com/security/cve/CVE-2024-41090.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41091.html">https://www.suse.com/security/cve/CVE-2024-41091.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41095.html">https://www.suse.com/security/cve/CVE-2024-41095.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42070.html">https://www.suse.com/security/cve/CVE-2024-42070.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42093.html">https://www.suse.com/security/cve/CVE-2024-42093.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42096.html">https://www.suse.com/security/cve/CVE-2024-42096.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42119.html">https://www.suse.com/security/cve/CVE-2024-42119.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42120.html">https://www.suse.com/security/cve/CVE-2024-42120.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42124.html">https://www.suse.com/security/cve/CVE-2024-42124.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42145.html">https://www.suse.com/security/cve/CVE-2024-42145.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42223.html">https://www.suse.com/security/cve/CVE-2024-42223.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42224.html">https://www.suse.com/security/cve/CVE-2024-42224.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1065729">https://bugzilla.suse.com/show_bug.cgi?id=1065729</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1088701">https://bugzilla.suse.com/show_bug.cgi?id=1088701</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1149446">https://bugzilla.suse.com/show_bug.cgi?id=1149446</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1179610">https://bugzilla.suse.com/show_bug.cgi?id=1179610</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1186463">https://bugzilla.suse.com/show_bug.cgi?id=1186463</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1196018">https://bugzilla.suse.com/show_bug.cgi?id=1196018</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1202346">https://bugzilla.suse.com/show_bug.cgi?id=1202346</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216834">https://bugzilla.suse.com/show_bug.cgi?id=1216834</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220138">https://bugzilla.suse.com/show_bug.cgi?id=1220138</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220942">https://bugzilla.suse.com/show_bug.cgi?id=1220942</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221045">https://bugzilla.suse.com/show_bug.cgi?id=1221045</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221614">https://bugzilla.suse.com/show_bug.cgi?id=1221614</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221616">https://bugzilla.suse.com/show_bug.cgi?id=1221616</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221618">https://bugzilla.suse.com/show_bug.cgi?id=1221618</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222060">https://bugzilla.suse.com/show_bug.cgi?id=1222060</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222317">https://bugzilla.suse.com/show_bug.cgi?id=1222317</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222326">https://bugzilla.suse.com/show_bug.cgi?id=1222326</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222372">https://bugzilla.suse.com/show_bug.cgi?id=1222372</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222625">https://bugzilla.suse.com/show_bug.cgi?id=1222625</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222776">https://bugzilla.suse.com/show_bug.cgi?id=1222776</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222824">https://bugzilla.suse.com/show_bug.cgi?id=1222824</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222829">https://bugzilla.suse.com/show_bug.cgi?id=1222829</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222866">https://bugzilla.suse.com/show_bug.cgi?id=1222866</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223012">https://bugzilla.suse.com/show_bug.cgi?id=1223012</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223778">https://bugzilla.suse.com/show_bug.cgi?id=1223778</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223813">https://bugzilla.suse.com/show_bug.cgi?id=1223813</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223815">https://bugzilla.suse.com/show_bug.cgi?id=1223815</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224500">https://bugzilla.suse.com/show_bug.cgi?id=1224500</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224512">https://bugzilla.suse.com/show_bug.cgi?id=1224512</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224545">https://bugzilla.suse.com/show_bug.cgi?id=1224545</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224557">https://bugzilla.suse.com/show_bug.cgi?id=1224557</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224571">https://bugzilla.suse.com/show_bug.cgi?id=1224571</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224576">https://bugzilla.suse.com/show_bug.cgi?id=1224576</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224587">https://bugzilla.suse.com/show_bug.cgi?id=1224587</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224637">https://bugzilla.suse.com/show_bug.cgi?id=1224637</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224641">https://bugzilla.suse.com/show_bug.cgi?id=1224641</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224663">https://bugzilla.suse.com/show_bug.cgi?id=1224663</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224683">https://bugzilla.suse.com/show_bug.cgi?id=1224683</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224699">https://bugzilla.suse.com/show_bug.cgi?id=1224699</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224700">https://bugzilla.suse.com/show_bug.cgi?id=1224700</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224975">https://bugzilla.suse.com/show_bug.cgi?id=1224975</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225003">https://bugzilla.suse.com/show_bug.cgi?id=1225003</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225214">https://bugzilla.suse.com/show_bug.cgi?id=1225214</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225224">https://bugzilla.suse.com/show_bug.cgi?id=1225224</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225229">https://bugzilla.suse.com/show_bug.cgi?id=1225229</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225238">https://bugzilla.suse.com/show_bug.cgi?id=1225238</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225241">https://bugzilla.suse.com/show_bug.cgi?id=1225241</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225326">https://bugzilla.suse.com/show_bug.cgi?id=1225326</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225328">https://bugzilla.suse.com/show_bug.cgi?id=1225328</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225346">https://bugzilla.suse.com/show_bug.cgi?id=1225346</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225361">https://bugzilla.suse.com/show_bug.cgi?id=1225361</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225396">https://bugzilla.suse.com/show_bug.cgi?id=1225396</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225427">https://bugzilla.suse.com/show_bug.cgi?id=1225427</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225455">https://bugzilla.suse.com/show_bug.cgi?id=1225455</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225711">https://bugzilla.suse.com/show_bug.cgi?id=1225711</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225719">https://bugzilla.suse.com/show_bug.cgi?id=1225719</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225767">https://bugzilla.suse.com/show_bug.cgi?id=1225767</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225820">https://bugzilla.suse.com/show_bug.cgi?id=1225820</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225838">https://bugzilla.suse.com/show_bug.cgi?id=1225838</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225898">https://bugzilla.suse.com/show_bug.cgi?id=1225898</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226550">https://bugzilla.suse.com/show_bug.cgi?id=1226550</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226553">https://bugzilla.suse.com/show_bug.cgi?id=1226553</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226555">https://bugzilla.suse.com/show_bug.cgi?id=1226555</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226559">https://bugzilla.suse.com/show_bug.cgi?id=1226559</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226568">https://bugzilla.suse.com/show_bug.cgi?id=1226568</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226571">https://bugzilla.suse.com/show_bug.cgi?id=1226571</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226645">https://bugzilla.suse.com/show_bug.cgi?id=1226645</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226783">https://bugzilla.suse.com/show_bug.cgi?id=1226783</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226786">https://bugzilla.suse.com/show_bug.cgi?id=1226786</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226834">https://bugzilla.suse.com/show_bug.cgi?id=1226834</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226908">https://bugzilla.suse.com/show_bug.cgi?id=1226908</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227191">https://bugzilla.suse.com/show_bug.cgi?id=1227191</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227213">https://bugzilla.suse.com/show_bug.cgi?id=1227213</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227573">https://bugzilla.suse.com/show_bug.cgi?id=1227573</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227618">https://bugzilla.suse.com/show_bug.cgi?id=1227618</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227626">https://bugzilla.suse.com/show_bug.cgi?id=1227626</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227716">https://bugzilla.suse.com/show_bug.cgi?id=1227716</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227725">https://bugzilla.suse.com/show_bug.cgi?id=1227725</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227729">https://bugzilla.suse.com/show_bug.cgi?id=1227729</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227730">https://bugzilla.suse.com/show_bug.cgi?id=1227730</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227733">https://bugzilla.suse.com/show_bug.cgi?id=1227733</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227750">https://bugzilla.suse.com/show_bug.cgi?id=1227750</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227754">https://bugzilla.suse.com/show_bug.cgi?id=1227754</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227762">https://bugzilla.suse.com/show_bug.cgi?id=1227762</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227770">https://bugzilla.suse.com/show_bug.cgi?id=1227770</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227771">https://bugzilla.suse.com/show_bug.cgi?id=1227771</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227772">https://bugzilla.suse.com/show_bug.cgi?id=1227772</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227774">https://bugzilla.suse.com/show_bug.cgi?id=1227774</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227786">https://bugzilla.suse.com/show_bug.cgi?id=1227786</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227790">https://bugzilla.suse.com/show_bug.cgi?id=1227790</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227806">https://bugzilla.suse.com/show_bug.cgi?id=1227806</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227824">https://bugzilla.suse.com/show_bug.cgi?id=1227824</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227828">https://bugzilla.suse.com/show_bug.cgi?id=1227828</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227830">https://bugzilla.suse.com/show_bug.cgi?id=1227830</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227836">https://bugzilla.suse.com/show_bug.cgi?id=1227836</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227849">https://bugzilla.suse.com/show_bug.cgi?id=1227849</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227865">https://bugzilla.suse.com/show_bug.cgi?id=1227865</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227866">https://bugzilla.suse.com/show_bug.cgi?id=1227866</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227884">https://bugzilla.suse.com/show_bug.cgi?id=1227884</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227886">https://bugzilla.suse.com/show_bug.cgi?id=1227886</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227891">https://bugzilla.suse.com/show_bug.cgi?id=1227891</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227913">https://bugzilla.suse.com/show_bug.cgi?id=1227913</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227924">https://bugzilla.suse.com/show_bug.cgi?id=1227924</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227928">https://bugzilla.suse.com/show_bug.cgi?id=1227928</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227929">https://bugzilla.suse.com/show_bug.cgi?id=1227929</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227936">https://bugzilla.suse.com/show_bug.cgi?id=1227936</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227957">https://bugzilla.suse.com/show_bug.cgi?id=1227957</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227968">https://bugzilla.suse.com/show_bug.cgi?id=1227968</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227969">https://bugzilla.suse.com/show_bug.cgi?id=1227969</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227975">https://bugzilla.suse.com/show_bug.cgi?id=1227975</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227985">https://bugzilla.suse.com/show_bug.cgi?id=1227985</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227989">https://bugzilla.suse.com/show_bug.cgi?id=1227989</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228003">https://bugzilla.suse.com/show_bug.cgi?id=1228003</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228005">https://bugzilla.suse.com/show_bug.cgi?id=1228005</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228008">https://bugzilla.suse.com/show_bug.cgi?id=1228008</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228013">https://bugzilla.suse.com/show_bug.cgi?id=1228013</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228025">https://bugzilla.suse.com/show_bug.cgi?id=1228025</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228030">https://bugzilla.suse.com/show_bug.cgi?id=1228030</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228037">https://bugzilla.suse.com/show_bug.cgi?id=1228037</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228045">https://bugzilla.suse.com/show_bug.cgi?id=1228045</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228054">https://bugzilla.suse.com/show_bug.cgi?id=1228054</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228055">https://bugzilla.suse.com/show_bug.cgi?id=1228055</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228063">https://bugzilla.suse.com/show_bug.cgi?id=1228063</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228071">https://bugzilla.suse.com/show_bug.cgi?id=1228071</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228235">https://bugzilla.suse.com/show_bug.cgi?id=1228235</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228237">https://bugzilla.suse.com/show_bug.cgi?id=1228237</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228327">https://bugzilla.suse.com/show_bug.cgi?id=1228327</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228328">https://bugzilla.suse.com/show_bug.cgi?id=1228328</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228408">https://bugzilla.suse.com/show_bug.cgi?id=1228408</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228409">https://bugzilla.suse.com/show_bug.cgi?id=1228409</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228410">https://bugzilla.suse.com/show_bug.cgi?id=1228410</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228470">https://bugzilla.suse.com/show_bug.cgi?id=1228470</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228530">https://bugzilla.suse.com/show_bug.cgi?id=1228530</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228561">https://bugzilla.suse.com/show_bug.cgi?id=1228561</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228565">https://bugzilla.suse.com/show_bug.cgi?id=1228565</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228567">https://bugzilla.suse.com/show_bug.cgi?id=1228567</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228580">https://bugzilla.suse.com/show_bug.cgi?id=1228580</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228581">https://bugzilla.suse.com/show_bug.cgi?id=1228581</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228584">https://bugzilla.suse.com/show_bug.cgi?id=1228584</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228588">https://bugzilla.suse.com/show_bug.cgi?id=1228588</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228599">https://bugzilla.suse.com/show_bug.cgi?id=1228599</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228617">https://bugzilla.suse.com/show_bug.cgi?id=1228617</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228625">https://bugzilla.suse.com/show_bug.cgi?id=1228625</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228626">https://bugzilla.suse.com/show_bug.cgi?id=1228626</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228633">https://bugzilla.suse.com/show_bug.cgi?id=1228633</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228640">https://bugzilla.suse.com/show_bug.cgi?id=1228640</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228655">https://bugzilla.suse.com/show_bug.cgi?id=1228655</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228658">https://bugzilla.suse.com/show_bug.cgi?id=1228658</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228662">https://bugzilla.suse.com/show_bug.cgi?id=1228662</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228680">https://bugzilla.suse.com/show_bug.cgi?id=1228680</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228705">https://bugzilla.suse.com/show_bug.cgi?id=1228705</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228723">https://bugzilla.suse.com/show_bug.cgi?id=1228723</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228726">https://bugzilla.suse.com/show_bug.cgi?id=1228726</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228743">https://bugzilla.suse.com/show_bug.cgi?id=1228743</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228850">https://bugzilla.suse.com/show_bug.cgi?id=1228850</a>
</li>


</ul>

</div>

--===============5329527720400185812==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung