drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Linux
Name: |
Mehrere Probleme in Linux |
|
ID: |
SUSE-SU-2025:0201-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE Linux Enterprise Real Time 15 SP5, SUSE Linux Enterprise Server for SAP Applications 15 SP5, SUSE Linux Enterprise Server 15 SP5, SUSE Linux Enterprise High Performance Computing 15 SP5, SUSE Linux Enterprise High Availability Extension 15 SP5, SUSE Linux Enterprise Live Patching 15-SP5, SUSE Linux Enterprise Micro 5.5, SUSE openSUSE Leap 15.5, SUSE Linux Enterprise High Performance Computing LTSS 15 SP5, SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5, SUSE Linux Enterprise Server 15 SP5 LTSS |
|
Datum: |
Di, 21. Januar 2025, 18:49 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1382
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56604
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50256
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33951
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53240
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50262
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56539
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50181
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53239
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56548
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50279
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56570
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53214
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50280
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47678
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36915
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53122
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56598
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56571
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53173
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50278
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53157
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53114 |
|
Applikationen: |
Linux |
|
Originalnachricht |
--===============1811701390839862137== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2025:0201-1 Release Date: 2025-01-21T12:51:49Z Rating: important References:
* bsc#1170891 * bsc#1173139 * bsc#1185010 * bsc#1190358 * bsc#1190428 * bsc#1203332 * bsc#1205521 * bsc#1209288 * bsc#1209798 * bsc#1211593 * bsc#1211595 * bsc#1214635 * bsc#1215304 * bsc#1215523 * bsc#1216813 * bsc#1216909 * bsc#1219608 * bsc#1222878 * bsc#1223044 * bsc#1225758 * bsc#1225820 * bsc#1226694 * bsc#1228190 * bsc#1229809 * bsc#1230422 * bsc#1230697 * bsc#1231388 * bsc#1231453 * bsc#1231854 * bsc#1232045 * bsc#1232157 * bsc#1232166 * bsc#1232419 * bsc#1232436 * bsc#1232472 * bsc#1232823 * bsc#1233038 * bsc#1233050 * bsc#1233070 * bsc#1233096 * bsc#1233127 * bsc#1233200 * bsc#1233239 * bsc#1233324 * bsc#1233467 * bsc#1233468 * bsc#1233469 * bsc#1233485 * bsc#1233547 * bsc#1233550 * bsc#1233558 * bsc#1233564 * bsc#1233568 * bsc#1233637 * bsc#1233642 * bsc#1233701 * bsc#1233769 * bsc#1233837 * bsc#1234072 * bsc#1234073 * bsc#1234075 * bsc#1234076 * bsc#1234077 * bsc#1234087 * bsc#1234120 * bsc#1234156 * bsc#1234219 * bsc#1234220 * bsc#1234240 * bsc#1234241 * bsc#1234281 * bsc#1234282 * bsc#1234294 * bsc#1234338 * bsc#1234357 * bsc#1234437 * bsc#1234464 * bsc#1234605 * bsc#1234639 * bsc#1234650 * bsc#1234727 * bsc#1234811 * bsc#1234827 * bsc#1234834 * bsc#1234843 * bsc#1234846 * bsc#1234853 * bsc#1234856 * bsc#1234891 * bsc#1234912 * bsc#1234920 * bsc#1234921 * bsc#1234960 * bsc#1234963 * bsc#1234971 * bsc#1234973 * bsc#1235004 * bsc#1235035 * bsc#1235037 * bsc#1235039 * bsc#1235054 * bsc#1235056 * bsc#1235061 * bsc#1235073 * bsc#1235220 * bsc#1235224 * bsc#1235246 * bsc#1235507
Cross-References:
* CVE-2021-47202 * CVE-2022-36280 * CVE-2022-48742 * CVE-2022-49033 * CVE-2022-49035 * CVE-2023-1382 * CVE-2023-33951 * CVE-2023-33952 * CVE-2023-52920 * CVE-2024-24860 * CVE-2024-26886 * CVE-2024-26924 * CVE-2024-36915 * CVE-2024-42232 * CVE-2024-44934 * CVE-2024-47666 * CVE-2024-47678 * CVE-2024-49944 * CVE-2024-49952 * CVE-2024-50018 * CVE-2024-50143 * CVE-2024-50154 * CVE-2024-50166 * CVE-2024-50181 * CVE-2024-50202 * CVE-2024-50211 * CVE-2024-50256 * CVE-2024-50262 * CVE-2024-50278 * CVE-2024-50279 * CVE-2024-50280 * CVE-2024-50296 * CVE-2024-53051 * CVE-2024-53055 * CVE-2024-53056 * CVE-2024-53064 * CVE-2024-53072 * CVE-2024-53090 * CVE-2024-53095 * CVE-2024-53101 * CVE-2024-53113 * CVE-2024-53114 * CVE-2024-53119 * CVE-2024-53120 * CVE-2024-53122 * CVE-2024-53125 * CVE-2024-53130 * CVE-2024-53131 * CVE-2024-53142 * CVE-2024-53146 * CVE-2024-53150 * CVE-2024-53156 * CVE-2024-53157 * CVE-2024-53158 * CVE-2024-53161 * CVE-2024-53162 * CVE-2024-53173 * CVE-2024-53179 * CVE-2024-53206 * CVE-2024-53210 * CVE-2024-53213 * CVE-2024-53214 * CVE-2024-53239 * CVE-2024-53240 * CVE-2024-53241 * CVE-2024-56539 * CVE-2024-56548 * CVE-2024-56549 * CVE-2024-56570 * CVE-2024-56571 * CVE-2024-56575 * CVE-2024-56598 * CVE-2024-56604 * CVE-2024-56605 * CVE-2024-56619 * CVE-2024-56755 * CVE-2024-8805
CVSS scores:
* CVE-2021-47202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47202 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-36280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-36280 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H * CVE-2022-48742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48742 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49033 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49033 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49035 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49035 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49035 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1382 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1382 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-33951 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L * CVE-2023-33951 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2023-33952 ( SUSE ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2023-33952 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-24860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-24860 ( NVD ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26886 ( NVD ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26924 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36915 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-42232 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42232 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47666 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47678 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50018 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50143 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50143 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50143 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50181 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50181 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50202 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50202 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50211 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50211 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50256 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50256 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50262 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50262 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50262 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50262 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50278 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H * CVE-2024-50278 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50280 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50296 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53101 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53101 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53113 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53119 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53120 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53122 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53130 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53131 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53142 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53142 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53146 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53146 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53150 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53150 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53150 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53156 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53156 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53156 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53157 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53158 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53158 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-53161 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53161 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53162 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53162 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53173 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53173 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53179 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53179 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53206 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53206 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53206 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53210 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53213 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53213 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53213 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53214 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53214 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53241 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-56539 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56539 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-56548 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56549 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56549 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56549 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56570 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56570 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56571 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56571 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56575 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56598 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56598 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56604 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56604 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56604 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56619 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56619 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56755 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56755 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves 77 vulnerabilities and has 31 security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
* CVE-2022-36280: Fixed out-of-bounds memory access vulnerability found in vmwgfx driver (bsc#1203332). * CVE-2022-48742: rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() (bsc#1226694). * CVE-2022-49033: btrfs: qgroup: fix sleep from invalid context bug in btrfs_qgroup_inherit() (bsc#1232045). * CVE-2023-1382: Fixed denial of service in tipc_conn_close (bsc#1209288). * CVE-2023-33951: Fixed a race condition that could have led to an information disclosure inside the vmwgfx driver (bsc#1211593). * CVE-2023-33952: Fixed a double free that could have led to a local privilege escalation inside the vmwgfx driver (bsc#1211595). * CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in precision tracking (bsc#1232823). * CVE-2024-26886: Bluetooth: af_bluetooth: Fix deadlock (bsc#1223044). * CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820). * CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758). * CVE-2024-44934: net: bridge: mcast: wait for previous gc cycles when removing port (bsc#1229809). * CVE-2024-47666: scsi: pm80xx: Set phy->enable_completion only when we wait for it (bsc#1231453). * CVE-2024-47678: icmp: change the order of rate limits (bsc#1231854). * CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start (bsc#1232166). * CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption (bsc#1232157). * CVE-2024-50018: net: napi: Prevent overflow of napi_defer_hard_irqs (bsc#1232419). * CVE-2024-50143: udf: fix uninit-value use in udf_get_fileshortad (bsc#1233038). * CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices (bsc#1233050). * CVE-2024-50181: clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D (bsc#1233127). * CVE-2024-50202: nilfs2: propagate directory read errors from nilfs_find_entry() (bsc#1233324). * CVE-2024-50211: udf: refactor inode_bmap() to handle error (bsc#1233096). * CVE-2024-50256: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (bsc#1233200). * CVE-2024-50262: bpf: Fix out-of-bounds write in trie_get_next_key() (bsc#1233239). * CVE-2024-50278, CVE-2024-50280: dm cache: fix flushing uninitialized delayed_work on cache_ctr error (bsc#1233467 bsc#1233469). * CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first resume (bsc#1233467). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468). * CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver (bsc#1233485). * CVE-2024-53051: drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability (bsc#1233547). * CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction (bsc#1233550). * CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in mtk_crtc_destroy() (bsc#1233568). * CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558 bsc#1234464). * CVE-2024-53072: platform/x86/amd/pmc: Detect when STB is not available (bsc#1233564). * CVE-2024-53090: afs: Fix lock recursion (bsc#1233637). * CVE-2024-53095: smb: client: Fix use-after-free of network namespace (bsc#1233642). * CVE-2024-53101: fs: Fix uninitialized value issue in from_kuid and from_kgid (bsc#1233769). * CVE-2024-53113: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof (bsc#1234077). * CVE-2024-53114: x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1234072). * CVE-2024-53119: virtio/vsock: Fix accept_queue memory leak (bsc#1234073). * CVE-2024-53122: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (bsc#1234076). * CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156). * CVE-2024-53130: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint (bsc#1234219). * CVE-2024-53131: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint (bsc#1234220). * CVE-2024-53146: NFSD: Prevent a potential integer overflow (bsc#1234853). * CVE-2024-53150: ALSA: usb-audio: Fix out of bounds reads when finding clock sources (bsc#1234834). * CVE-2024-53156: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (bsc#1234846). * CVE-2024-53157: firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (bsc#1234827). * CVE-2024-53158: soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (bsc#1234811). * CVE-2024-53161: EDAC/bluefield: Fix potential integer overflow (bsc#1234856). * CVE-2024-53162: crypto: qat/qat_4xxx - fix off by one in uof_get_name() (bsc#1234843). * CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234891). * CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921). * CVE-2024-53210: s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct() (bsc#1234971). * CVE-2024-53213: net: usb: lan78xx: Fix double free issue with interrupt buffer allocation (bsc#1234973). * CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004). * CVE-2024-53239: ALSA: 6fire: Release resources at card release (bsc#1235054). * CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281). * CVE-2024-53241: x86/xen: use new hypercall functions instead of hypercall page (XSA-466 bsc#1234282). * CVE-2024-56539: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (bsc#1234963). * CVE-2024-56548: hfsplus: do not query the device logical block size multiple times (bsc#1235073). * CVE-2024-56549: cachefiles: Fix NULL pointer dereference in object->file (bsc#1234912). * CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function (bsc#1235035). * CVE-2024-56571: media: uvcvideo: Require entities to have a non-zero unique ID (bsc#1235037). * CVE-2024-56575: media: imx-jpeg: Ensure power suppliers be suspended before detach them (bsc#1235039). * CVE-2024-56598: jfs: array-index-out-of-bounds fix in dtReadFirst (bsc#1235220). * CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056). * CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235061). * CVE-2024-56619: nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (bsc#1235224). * CVE-2024-56755: netfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING (bsc#1234920).
The following non-security bugs were fixed:
* ACPI/HMAT: Move HMAT messages to pr_debug() (bsc#1234294) * Documentation: Add x86/amd_hsmp driver (jsc#PED-1295). * Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet (git- fixes). * Drop a couple of block layer git-fixes (bsc#1170891 bsc#1173139) * KVM: x86: fix sending PV IPI (git-fixes). * NFS/pnfs: Fix a live lock between recalled layouts and layoutget (git- fixes). * NFSD: Fix nfsd4_shutdown_copy() (git-fixes). * NFSD: Move fill_pre_wcc() and fill_post_wcc() (bsc#1234650 bsc#1233701 bsc#1232472). * NFSD: Prevent NULL dereference in nfsd4_process_cb_update() (git-fixes). * NFSD: Prevent a potential integer overflow (git-fixes). * NFSD: reduce locking in nfsd_lookup() (bsc#1234650 bsc#1233701 bsc#1232472). * NFSv4.0: Fix a use-after-free problem in the asynchronous open() (git- fixes). * PCI: vmd: Fix secondary bus reset for Intel bridges (git-fixes). * RDMA/hns: Disassociate mmap pages for all uctx when HW is being reset (git- fixes) * README: Clean-up trailing whitespace * SUNRPC: make sure cache entry active before cache_show (git-fixes). * amd_hsmp: Add HSMP protocol version 5 messages (jsc#PED-1295). * arm64: Ensure bits ASID[15:8] are masked out when the kernel uses (bsc#1234605) * arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer (git- fixes). * arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc (git-fixes). * arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards (git- fixes). * arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-sapphire- excavator (git-fixes). * arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma lion (git- fixes). * arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328 (git-fixes). * autofs: fix memory leak of waitqueues in autofs_catatonic_mode (git-fixes). * autofs: use flexible array in ioctl structure (git-fixes). * devlink: allow registering parameters after the instance (bsc#1231388 bsc#1230422). * devlink: do not require setting features before registration (bsc#1231388 bsc#1230422). * dma-fence: Fix reference leak on fence merge failure path (git-fixes). * dmaengine: idxd: Check for driver name match before sva user feature (bsc#1234357). * dmaengine: idxd: add wq driver name support for accel-config user tool (bsc#1234357). * drm/sti: Add __iomem for mixer_dbg_mxn's parameter (git-fixes). * drm/v3d: Enable Performance Counters before clearing them (git-fixes). * exfat: fix uninit-value in __exfat_get_dentry_set (git-fixes). * fixup "rpm: support gz and zst compression methods" once more (bsc#1190428, bsc#1190358) Fixes: 3b8c4d9bcc24 ("rpm: support gz and zst compression methods") Fixes: 23510fce36ec ("fixup "rpm: support gz and zst compression methods"") * hfsplus: do not query the device logical block size multiple times (git- fixes). * idpf: add support for SW triggered interrupts (bsc#1235507). * idpf: enable WB_ON_ITR (bsc#1235507). * idpf: trigger SW interrupt when exiting wb_on_itr mode (bsc#1235507). * ipc/sem: Fix dangling sem_array access in semtimedop race (bsc#1234727). * jffs2: Fix rtime decompressor (git-fixes). * jffs2: Prevent rtime decompress memory corruption (git-fixes). * jffs2: fix use of uninitialized variable (git-fixes). * jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree (git- fixes). * jfs: array-index-out-of-bounds fix in dtReadFirst (git-fixes). * jfs: fix array-index-out-of-bounds in jfs_readdir (git-fixes). * jfs: fix shift-out-of-bounds in dbSplit (git-fixes). * jfs: xattr: check invalid xattr size more strictly (git-fixes). * kabi/severities: ignore intermodule symbols between fsl_fman and fsl_dpaa_eth * kernel-binary: do not BuildIgnore m4. It is actually needed for regenerating zconf when it is not up-to-date due to merge. * kobject: Add sanity check for kset->kobj.ktype in kset_register() (bsc#1234639). * memory: tegra: Add API for retrieving carveout bounds (jsc#PED-1763). * mm/kfence: reset PG_slab and memcg_data before freeing __kfence_pool (bsc#1234120). * mmc: core: Further prevent card detect during shutdown (git-fixes). * net/ipv6: release expired exception dst cached in socket (bsc#1216813). * net: mana: Increase the DEF_RX_BUFFERS_PER_QUEUE to 1024 (bsc#1235246). * nfsd: make sure exp active before svc_export_show (git-fixes). * nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234650 bsc#1233701 bsc#1232472). * nfsd: restore callback functionality for NFSv4.0 (git-fixes). * nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (git-fixes). * nilfs2: prevent use of deleted inode (git-fixes). * ocfs2: uncache inode which has failed entering the group (bsc#1234087). * phy: tegra: p2u: Set ENABLE_L2_EXIT_RATE_CHANGE in calibration (jsc#PED-1763). * platform/x86: Add AMD system management interface (jsc#PED-1295). * proc/softirqs: replace seq_printf with seq_put_decimal_ull_width (git- fixes). * pwm: tegra: Improve required rate calculation (jsc#PED-1763). * regmap: detach regmap from dev on regmap_exit (git-fixes). * rpm/kernel-binary.spec.in: Fix build regression The previous fix forgot to take over grep -c option that broke the conditional expression * scatterlist: fix incorrect func name in kernel-doc (git-fixes). * scripts/git_sort/git_sort.py: add tegra DRM and linux-pwm repo * scsi: storvsc: Do not flag MAINTENANCE_IN return of SRB_STATUS_DATA_OVERRUN as an error (git-fixes). * serial: tegra: Read DMA status before terminating (jsc#PED-1763). * smb: client: fix TCP timers deadlock after rmmod (git-fixes) [hcarvalho: this fixes issue discussed in bsc#1233642]. * spi: mpc52xx: Add cancel_work_sync before module remove (git-fixes). * sunrpc: simplify two-level sysctl registration for svcrdma_parm_table (git- fixes). * supported.conf: add bsc1185010 dependency * supported.conf: hyperv_drm (jsc#sle-19733) * svcrdma: Address an integer overflow (git-fixes). * svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init() (git- fixes). * tpm_tis_spi: Release chip select when flow control fails (bsc#1234338) * ubifs: Correct the total block count by deducting journal reservation (git- fixes). * ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit (git- fixes). * udf: Handle error when adding extent to a file (bsc#1234437). * udf: refactor udf_current_aext() to handle error (bsc#1234240). * udf: refactor udf_next_aext() to handle error (bsc#1234241). * usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes). * usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git- fixes). * x86/bug: Merge annotate_reachable() into _BUG_FLAGS() asm (git-fixes). * x86/fpu/xsave: Handle compacted offsets correctly with supervisor states (git-fixes). * x86/fpu/xstate: Fix the ARCH_REQ_XCOMP_PERM implementation (git-fixes). * x86/fpu: Remove unused supervisor only offsets (git-fixes). * x86/kvm: Do not use pv tlb/ipi/sched_yield if on 1 vCPU (git-fixes). * x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes). * x86/mce: Allow instrumentation during task work queueing (git-fixes). * x86/mce: Mark mce_end() noinstr (git-fixes). * x86/mce: Mark mce_panic() noinstr (git-fixes). * x86/mce: Mark mce_read_aux() noinstr (git-fixes). * x86/mm: Flush global TLB when switching to trampoline page-table (git- fixes). * x86/sev: Make enc_dec_hypercall() accept a size instead of npages (bsc#1214635). * x86/sgx: Free backing memory after faulting the enclave page (git-fixes). * x86/sgx: Silence softlockup detection when releasing large enclaves (git- fixes). * x86/uaccess: Move variable into switch case statement (git-fixes). * x86: Annotate call_on_stack() (git-fixes). * xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909). * zonefs: fix zone report size in __zonefs_io_error() (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5 zypper in -t patch SUSE-2025-201=1
* SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-201=1
* SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-201=1
* SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2025-201=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-201=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-201=1
* SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-201=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-201=1
## Package List:
* openSUSE Leap 15.5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.91.1 * openSUSE Leap 15.5 (noarch) * kernel-macros-5.14.21-150500.55.91.1 * kernel-source-vanilla-5.14.21-150500.55.91.1 * kernel-docs-html-5.14.21-150500.55.91.1 * kernel-source-5.14.21-150500.55.91.1 * kernel-devel-5.14.21-150500.55.91.1 * openSUSE Leap 15.5 (nosrc ppc64le x86_64) * kernel-debug-5.14.21-150500.55.91.1 * openSUSE Leap 15.5 (ppc64le x86_64) * kernel-debug-debuginfo-5.14.21-150500.55.91.1 * kernel-debug-devel-debuginfo-5.14.21-150500.55.91.1 * kernel-debug-debugsource-5.14.21-150500.55.91.1 * kernel-debug-devel-5.14.21-150500.55.91.1 * openSUSE Leap 15.5 (x86_64) * kernel-default-vdso-debuginfo-5.14.21-150500.55.91.1 * kernel-kvmsmall-vdso-5.14.21-150500.55.91.1 * kernel-default-vdso-5.14.21-150500.55.91.1 * kernel-debug-vdso-5.14.21-150500.55.91.1 * kernel-kvmsmall-vdso-debuginfo-5.14.21-150500.55.91.1 * kernel-debug-vdso-debuginfo-5.14.21-150500.55.91.1 * openSUSE Leap 15.5 (aarch64 ppc64le x86_64) * kernel-kvmsmall-debugsource-5.14.21-150500.55.91.1 * kernel-default-base-5.14.21-150500.55.91.1.150500.6.41.1 * kernel-kvmsmall-debuginfo-5.14.21-150500.55.91.1 * kernel-kvmsmall-devel-debuginfo-5.14.21-150500.55.91.1 * kernel-default-base-rebuild-5.14.21-150500.55.91.1.150500.6.41.1 * kernel-kvmsmall-devel-5.14.21-150500.55.91.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * kernel-default-optional-5.14.21-150500.55.91.1 * kernel-default-devel-5.14.21-150500.55.91.1 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.91.1 * reiserfs-kmp-default-5.14.21-150500.55.91.1 * kselftests-kmp-default-5.14.21-150500.55.91.1 * kernel-syms-5.14.21-150500.55.91.1 * ocfs2-kmp-default-5.14.21-150500.55.91.1 * kernel-obs-build-debugsource-5.14.21-150500.55.91.1 * kernel-default-livepatch-5.14.21-150500.55.91.1 * kernel-default-debuginfo-5.14.21-150500.55.91.1 * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.91.1 * kernel-default-optional-debuginfo-5.14.21-150500.55.91.1 * kernel-obs-qa-5.14.21-150500.55.91.1 * dlm-kmp-default-5.14.21-150500.55.91.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.91.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.91.1 * kernel-default-extra-5.14.21-150500.55.91.1 * cluster-md-kmp-default-5.14.21-150500.55.91.1 * kselftests-kmp-default-debuginfo-5.14.21-150500.55.91.1 * kernel-default-debugsource-5.14.21-150500.55.91.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.91.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.91.1 * gfs2-kmp-default-5.14.21-150500.55.91.1 * kernel-obs-build-5.14.21-150500.55.91.1 * kernel-default-extra-debuginfo-5.14.21-150500.55.91.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.91.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_22-debugsource-1-150500.11.3.1 * kernel-livepatch-5_14_21-150500_55_91-default-debuginfo-1-150500.11.3.1 * kernel-livepatch-5_14_21-150500_55_91-default-1-150500.11.3.1 * kernel-default-livepatch-devel-5.14.21-150500.55.91.1 * openSUSE Leap 15.5 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150500.55.91.1 * openSUSE Leap 15.5 (nosrc s390x) * kernel-zfcpdump-5.14.21-150500.55.91.1 * openSUSE Leap 15.5 (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150500.55.91.1 * kernel-zfcpdump-debugsource-5.14.21-150500.55.91.1 * openSUSE Leap 15.5 (nosrc) * dtb-aarch64-5.14.21-150500.55.91.1 * openSUSE Leap 15.5 (aarch64) * dtb-nvidia-5.14.21-150500.55.91.1 * kernel-64kb-debugsource-5.14.21-150500.55.91.1 * dtb-apple-5.14.21-150500.55.91.1 * dtb-amlogic-5.14.21-150500.55.91.1 * ocfs2-kmp-64kb-5.14.21-150500.55.91.1 * dtb-socionext-5.14.21-150500.55.91.1 * dtb-allwinner-5.14.21-150500.55.91.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150500.55.91.1 * kernel-64kb-extra-5.14.21-150500.55.91.1 * kernel-64kb-optional-5.14.21-150500.55.91.1 * dtb-arm-5.14.21-150500.55.91.1 * dtb-qcom-5.14.21-150500.55.91.1 * dtb-rockchip-5.14.21-150500.55.91.1 * dtb-marvell-5.14.21-150500.55.91.1 * dtb-lg-5.14.21-150500.55.91.1 * kernel-64kb-devel-debuginfo-5.14.21-150500.55.91.1 * dtb-sprd-5.14.21-150500.55.91.1 * dtb-freescale-5.14.21-150500.55.91.1 * dtb-xilinx-5.14.21-150500.55.91.1 * dtb-exynos-5.14.21-150500.55.91.1 * cluster-md-kmp-64kb-5.14.21-150500.55.91.1 * dlm-kmp-64kb-5.14.21-150500.55.91.1 * kernel-64kb-extra-debuginfo-5.14.21-150500.55.91.1 * dlm-kmp-64kb-debuginfo-5.14.21-150500.55.91.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150500.55.91.1 * dtb-apm-5.14.21-150500.55.91.1 * kernel-64kb-optional-debuginfo-5.14.21-150500.55.91.1 * dtb-cavium-5.14.21-150500.55.91.1 * dtb-altera-5.14.21-150500.55.91.1 * dtb-amazon-5.14.21-150500.55.91.1 * dtb-hisilicon-5.14.21-150500.55.91.1 * kernel-64kb-debuginfo-5.14.21-150500.55.91.1 * kernel-64kb-devel-5.14.21-150500.55.91.1 * dtb-broadcom-5.14.21-150500.55.91.1 * kselftests-kmp-64kb-5.14.21-150500.55.91.1 * cluster-md-kmp-64kb-debuginfo-5.14.21-150500.55.91.1 * dtb-mediatek-5.14.21-150500.55.91.1 * dtb-amd-5.14.21-150500.55.91.1 * dtb-renesas-5.14.21-150500.55.91.1 * gfs2-kmp-64kb-debuginfo-5.14.21-150500.55.91.1 * reiserfs-kmp-64kb-5.14.21-150500.55.91.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150500.55.91.1 * gfs2-kmp-64kb-5.14.21-150500.55.91.1 * openSUSE Leap 15.5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.91.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.91.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64) * kernel-default-base-5.14.21-150500.55.91.1.150500.6.41.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * kernel-default-debugsource-5.14.21-150500.55.91.1 * kernel-default-debuginfo-5.14.21-150500.55.91.1 * SUSE Linux Enterprise Live Patching 15-SP5 (nosrc) * kernel-default-5.14.21-150500.55.91.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-default-debugsource-5.14.21-150500.55.91.1 * kernel-livepatch-5_14_21-150500_55_91-default-debuginfo-1-150500.11.3.1 * kernel-default-livepatch-5.14.21-150500.55.91.1 * kernel-default-debuginfo-5.14.21-150500.55.91.1 * kernel-default-livepatch-devel-5.14.21-150500.55.91.1 * kernel-livepatch-SLE15-SP5_Update_22-debugsource-1-150500.11.3.1 * kernel-livepatch-5_14_21-150500_55_91-default-1-150500.11.3.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-5.14.21-150500.55.91.1 * ocfs2-kmp-default-5.14.21-150500.55.91.1 * kernel-default-debugsource-5.14.21-150500.55.91.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.91.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.91.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.91.1 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.91.1 * cluster-md-kmp-default-5.14.21-150500.55.91.1 * kernel-default-debuginfo-5.14.21-150500.55.91.1 * gfs2-kmp-default-5.14.21-150500.55.91.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (nosrc) * kernel-default-5.14.21-150500.55.91.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.91.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64) * kernel-64kb-debugsource-5.14.21-150500.55.91.1 * kernel-64kb-devel-debuginfo-5.14.21-150500.55.91.1 * kernel-64kb-debuginfo-5.14.21-150500.55.91.1 * kernel-64kb-devel-5.14.21-150500.55.91.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150500.55.91.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * kernel-default-debugsource-5.14.21-150500.55.91.1 * kernel-obs-build-debugsource-5.14.21-150500.55.91.1 * kernel-default-devel-5.14.21-150500.55.91.1 * kernel-default-base-5.14.21-150500.55.91.1.150500.6.41.1 * kernel-default-debuginfo-5.14.21-150500.55.91.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.91.1 * kernel-syms-5.14.21-150500.55.91.1 * kernel-obs-build-5.14.21-150500.55.91.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * kernel-macros-5.14.21-150500.55.91.1 * kernel-devel-5.14.21-150500.55.91.1 * kernel-source-5.14.21-150500.55.91.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.91.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.91.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64) * kernel-64kb-debugsource-5.14.21-150500.55.91.1 * kernel-64kb-devel-debuginfo-5.14.21-150500.55.91.1 * kernel-64kb-debuginfo-5.14.21-150500.55.91.1 * kernel-64kb-devel-5.14.21-150500.55.91.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150500.55.91.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * kernel-default-debugsource-5.14.21-150500.55.91.1 * kernel-obs-build-debugsource-5.14.21-150500.55.91.1 * kernel-default-devel-5.14.21-150500.55.91.1 * kernel-default-base-5.14.21-150500.55.91.1.150500.6.41.1 * kernel-default-debuginfo-5.14.21-150500.55.91.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.91.1 * kernel-syms-5.14.21-150500.55.91.1 * kernel-obs-build-5.14.21-150500.55.91.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * kernel-macros-5.14.21-150500.55.91.1 * kernel-devel-5.14.21-150500.55.91.1 * kernel-source-5.14.21-150500.55.91.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.91.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.91.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64) * kernel-64kb-debugsource-5.14.21-150500.55.91.1 * kernel-64kb-devel-debuginfo-5.14.21-150500.55.91.1 * kernel-64kb-debuginfo-5.14.21-150500.55.91.1 * kernel-64kb-devel-5.14.21-150500.55.91.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.91.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150500.55.91.1.150500.6.41.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * kernel-default-debugsource-5.14.21-150500.55.91.1 * kernel-obs-build-debugsource-5.14.21-150500.55.91.1 * kernel-default-devel-5.14.21-150500.55.91.1 * reiserfs-kmp-default-5.14.21-150500.55.91.1 * kernel-default-debuginfo-5.14.21-150500.55.91.1 * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.91.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.91.1 * kernel-syms-5.14.21-150500.55.91.1 * kernel-obs-build-5.14.21-150500.55.91.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * kernel-macros-5.14.21-150500.55.91.1 * kernel-devel-5.14.21-150500.55.91.1 * kernel-source-5.14.21-150500.55.91.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch nosrc) * kernel-docs-5.14.21-150500.55.91.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (nosrc s390x) * kernel-zfcpdump-5.14.21-150500.55.91.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150500.55.91.1 * kernel-zfcpdump-debugsource-5.14.21-150500.55.91.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (nosrc ppc64le x86_64) * kernel-default-5.14.21-150500.55.91.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * kernel-default-debugsource-5.14.21-150500.55.91.1 * kernel-obs-build-debugsource-5.14.21-150500.55.91.1 * kernel-default-devel-5.14.21-150500.55.91.1 * reiserfs-kmp-default-5.14.21-150500.55.91.1 * kernel-default-base-5.14.21-150500.55.91.1.150500.6.41.1 * kernel-default-debuginfo-5.14.21-150500.55.91.1 * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.91.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.91.1 * kernel-syms-5.14.21-150500.55.91.1 * kernel-obs-build-5.14.21-150500.55.91.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * kernel-macros-5.14.21-150500.55.91.1 * kernel-devel-5.14.21-150500.55.91.1 * kernel-source-5.14.21-150500.55.91.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.91.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47202.html * https://www.suse.com/security/cve/CVE-2022-36280.html * https://www.suse.com/security/cve/CVE-2022-48742.html * https://www.suse.com/security/cve/CVE-2022-49033.html * https://www.suse.com/security/cve/CVE-2022-49035.html * https://www.suse.com/security/cve/CVE-2023-1382.html * https://www.suse.com/security/cve/CVE-2023-33951.html * https://www.suse.com/security/cve/CVE-2023-33952.html * https://www.suse.com/security/cve/CVE-2023-52920.html * https://www.suse.com/security/cve/CVE-2024-24860.html * https://www.suse.com/security/cve/CVE-2024-26886.html * https://www.suse.com/security/cve/CVE-2024-26924.html * https://www.suse.com/security/cve/CVE-2024-36915.html * https://www.suse.com/security/cve/CVE-2024-42232.html * https://www.suse.com/security/cve/CVE-2024-44934.html * https://www.suse.com/security/cve/CVE-2024-47666.html * https://www.suse.com/security/cve/CVE-2024-47678.html * https://www.suse.com/security/cve/CVE-2024-49944.html * https://www.suse.com/security/cve/CVE-2024-49952.html * https://www.suse.com/security/cve/CVE-2024-50018.html * https://www.suse.com/security/cve/CVE-2024-50143.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50166.html * https://www.suse.com/security/cve/CVE-2024-50181.html * https://www.suse.com/security/cve/CVE-2024-50202.html * https://www.suse.com/security/cve/CVE-2024-50211.html * https://www.suse.com/security/cve/CVE-2024-50256.html * https://www.suse.com/security/cve/CVE-2024-50262.html * https://www.suse.com/security/cve/CVE-2024-50278.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50280.html * https://www.suse.com/security/cve/CVE-2024-50296.html * https://www.suse.com/security/cve/CVE-2024-53051.html * https://www.suse.com/security/cve/CVE-2024-53055.html * https://www.suse.com/security/cve/CVE-2024-53056.html * https://www.suse.com/security/cve/CVE-2024-53064.html * https://www.suse.com/security/cve/CVE-2024-53072.html * https://www.suse.com/security/cve/CVE-2024-53090.html * https://www.suse.com/security/cve/CVE-2024-53095.html * https://www.suse.com/security/cve/CVE-2024-53101.html * https://www.suse.com/security/cve/CVE-2024-53113.html * https://www.suse.com/security/cve/CVE-2024-53114.html * https://www.suse.com/security/cve/CVE-2024-53119.html * https://www.suse.com/security/cve/CVE-2024-53120.html * https://www.suse.com/security/cve/CVE-2024-53122.html * https://www.suse.com/security/cve/CVE-2024-53125.html * https://www.suse.com/security/cve/CVE-2024-53130.html * https://www.suse.com/security/cve/CVE-2024-53131.html * https://www.suse.com/security/cve/CVE-2024-53142.html * https://www.suse.com/security/cve/CVE-2024-53146.html * https://www.suse.com/security/cve/CVE-2024-53150.html * https://www.suse.com/security/cve/CVE-2024-53156.html * https://www.suse.com/security/cve/CVE-2024-53157.html * https://www.suse.com/security/cve/CVE-2024-53158.html * https://www.suse.com/security/cve/CVE-2024-53161.html * https://www.suse.com/security/cve/CVE-2024-53162.html * https://www.suse.com/security/cve/CVE-2024-53173.html * https://www.suse.com/security/cve/CVE-2024-53179.html * https://www.suse.com/security/cve/CVE-2024-53206.html * https://www.suse.com/security/cve/CVE-2024-53210.html * https://www.suse.com/security/cve/CVE-2024-53213.html * https://www.suse.com/security/cve/CVE-2024-53214.html * https://www.suse.com/security/cve/CVE-2024-53239.html * https://www.suse.com/security/cve/CVE-2024-53240.html * https://www.suse.com/security/cve/CVE-2024-53241.html * https://www.suse.com/security/cve/CVE-2024-56539.html * https://www.suse.com/security/cve/CVE-2024-56548.html * https://www.suse.com/security/cve/CVE-2024-56549.html * https://www.suse.com/security/cve/CVE-2024-56570.html * https://www.suse.com/security/cve/CVE-2024-56571.html * https://www.suse.com/security/cve/CVE-2024-56575.html * https://www.suse.com/security/cve/CVE-2024-56598.html * https://www.suse.com/security/cve/CVE-2024-56604.html * https://www.suse.com/security/cve/CVE-2024-56605.html * https://www.suse.com/security/cve/CVE-2024-56619.html * https://www.suse.com/security/cve/CVE-2024-56755.html * https://www.suse.com/security/cve/CVE-2024-8805.html * https://bugzilla.suse.com/show_bug.cgi?id=1170891 * https://bugzilla.suse.com/show_bug.cgi?id=1173139 * https://bugzilla.suse.com/show_bug.cgi?id=1185010 * https://bugzilla.suse.com/show_bug.cgi?id=1190358 * https://bugzilla.suse.com/show_bug.cgi?id=1190428 * https://bugzilla.suse.com/show_bug.cgi?id=1203332 * https://bugzilla.suse.com/show_bug.cgi?id=1205521 * https://bugzilla.suse.com/show_bug.cgi?id=1209288 * https://bugzilla.suse.com/show_bug.cgi?id=1209798 * https://bugzilla.suse.com/show_bug.cgi?id=1211593 * https://bugzilla.suse.com/show_bug.cgi?id=1211595 * https://bugzilla.suse.com/show_bug.cgi?id=1214635 * https://bugzilla.suse.com/show_bug.cgi?id=1215304 * https://bugzilla.suse.com/show_bug.cgi?id=1215523 * https://bugzilla.suse.com/show_bug.cgi?id=1216813 * https://bugzilla.suse.com/show_bug.cgi?id=1216909 * https://bugzilla.suse.com/show_bug.cgi?id=1219608 * https://bugzilla.suse.com/show_bug.cgi?id=1222878 * https://bugzilla.suse.com/show_bug.cgi?id=1223044 * https://bugzilla.suse.com/show_bug.cgi?id=1225758 * https://bugzilla.suse.com/show_bug.cgi?id=1225820 * https://bugzilla.suse.com/show_bug.cgi?id=1226694 * https://bugzilla.suse.com/show_bug.cgi?id=1228190 * https://bugzilla.suse.com/show_bug.cgi?id=1229809 * https://bugzilla.suse.com/show_bug.cgi?id=1230422 * https://bugzilla.suse.com/show_bug.cgi?id=1230697 * https://bugzilla.suse.com/show_bug.cgi?id=1231388 * https://bugzilla.suse.com/show_bug.cgi?id=1231453 * https://bugzilla.suse.com/show_bug.cgi?id=1231854 * https://bugzilla.suse.com/show_bug.cgi?id=1232045 * https://bugzilla.suse.com/show_bug.cgi?id=1232157 * https://bugzilla.suse.com/show_bug.cgi?id=1232166 * https://bugzilla.suse.com/show_bug.cgi?id=1232419 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232472 * https://bugzilla.suse.com/show_bug.cgi?id=1232823 * https://bugzilla.suse.com/show_bug.cgi?id=1233038 * https://bugzilla.suse.com/show_bug.cgi?id=1233050 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233096 * https://bugzilla.suse.com/show_bug.cgi?id=1233127 * https://bugzilla.suse.com/show_bug.cgi?id=1233200 * https://bugzilla.suse.com/show_bug.cgi?id=1233239 * https://bugzilla.suse.com/show_bug.cgi?id=1233324 * https://bugzilla.suse.com/show_bug.cgi?id=1233467 * https://bugzilla.suse.com/show_bug.cgi?id=1233468 * https://bugzilla.suse.com/show_bug.cgi?id=1233469 * https://bugzilla.suse.com/show_bug.cgi?id=1233485 * https://bugzilla.suse.com/show_bug.cgi?id=1233547 * https://bugzilla.suse.com/show_bug.cgi?id=1233550 * https://bugzilla.suse.com/show_bug.cgi?id=1233558 * https://bugzilla.suse.com/show_bug.cgi?id=1233564 * https://bugzilla.suse.com/show_bug.cgi?id=1233568 * https://bugzilla.suse.com/show_bug.cgi?id=1233637 * https://bugzilla.suse.com/show_bug.cgi?id=1233642 * https://bugzilla.suse.com/show_bug.cgi?id=1233701 * https://bugzilla.suse.com/show_bug.cgi?id=1233769 * https://bugzilla.suse.com/show_bug.cgi?id=1233837 * https://bugzilla.suse.com/show_bug.cgi?id=1234072 * https://bugzilla.suse.com/show_bug.cgi?id=1234073 * https://bugzilla.suse.com/show_bug.cgi?id=1234075 * https://bugzilla.suse.com/show_bug.cgi?id=1234076 * https://bugzilla.suse.com/show_bug.cgi?id=1234077 * https://bugzilla.suse.com/show_bug.cgi?id=1234087 * https://bugzilla.suse.com/show_bug.cgi?id=1234120 * https://bugzilla.suse.com/show_bug.cgi?id=1234156 * https://bugzilla.suse.com/show_bug.cgi?id=1234219 * https://bugzilla.suse.com/show_bug.cgi?id=1234220 * https://bugzilla.suse.com/show_bug.cgi?id=1234240 * https://bugzilla.suse.com/show_bug.cgi?id=1234241 * https://bugzilla.suse.com/show_bug.cgi?id=1234281 * https://bugzilla.suse.com/show_bug.cgi?id=1234282 * https://bugzilla.suse.com/show_bug.cgi?id=1234294 * https://bugzilla.suse.com/show_bug.cgi?id=1234338 * https://bugzilla.suse.com/show_bug.cgi?id=1234357 * https://bugzilla.suse.com/show_bug.cgi?id=1234437 * https://bugzilla.suse.com/show_bug.cgi?id=1234464 * https://bugzilla.suse.com/show_bug.cgi?id=1234605 * https://bugzilla.suse.com/show_bug.cgi?id=1234639 * https://bugzilla.suse.com/show_bug.cgi?id=1234650 * https://bugzilla.suse.com/show_bug.cgi?id=1234727 * https://bugzilla.suse.com/show_bug.cgi?id=1234811 * https://bugzilla.suse.com/show_bug.cgi?id=1234827 * https://bugzilla.suse.com/show_bug.cgi?id=1234834 * https://bugzilla.suse.com/show_bug.cgi?id=1234843 * https://bugzilla.suse.com/show_bug.cgi?id=1234846 * https://bugzilla.suse.com/show_bug.cgi?id=1234853 * https://bugzilla.suse.com/show_bug.cgi?id=1234856 * https://bugzilla.suse.com/show_bug.cgi?id=1234891 * https://bugzilla.suse.com/show_bug.cgi?id=1234912 * https://bugzilla.suse.com/show_bug.cgi?id=1234920 * https://bugzilla.suse.com/show_bug.cgi?id=1234921 * https://bugzilla.suse.com/show_bug.cgi?id=1234960 * https://bugzilla.suse.com/show_bug.cgi?id=1234963 * https://bugzilla.suse.com/show_bug.cgi?id=1234971 * https://bugzilla.suse.com/show_bug.cgi?id=1234973 * https://bugzilla.suse.com/show_bug.cgi?id=1235004 * https://bugzilla.suse.com/show_bug.cgi?id=1235035 * https://bugzilla.suse.com/show_bug.cgi?id=1235037 * https://bugzilla.suse.com/show_bug.cgi?id=1235039 * https://bugzilla.suse.com/show_bug.cgi?id=1235054 * https://bugzilla.suse.com/show_bug.cgi?id=1235056 * https://bugzilla.suse.com/show_bug.cgi?id=1235061 * https://bugzilla.suse.com/show_bug.cgi?id=1235073 * https://bugzilla.suse.com/show_bug.cgi?id=1235220 * https://bugzilla.suse.com/show_bug.cgi?id=1235224 * https://bugzilla.suse.com/show_bug.cgi?id=1235246 * https://bugzilla.suse.com/show_bug.cgi?id=1235507
--===============1811701390839862137== Content-Type: text/html; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
<div class="container"> <h1>Security update for the Linux Kernel</h1>
<table class="table table-striped table-bordered"> <tbody> <tr> <th>Announcement ID:</th> <td>SUSE-SU-2025:0201-1</td> </tr> <tr> <th>Release Date:</th> <td>2025-01-21T12:51:49Z</td> </tr> <tr> <th>Rating:</th> <td>important</td> </tr> <tr> <th>References:</th> <td> <ul> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1170891">bsc#1170891</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1173139">bsc#1173139</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1185010">bsc#1185010</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1190358">bsc#1190358</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1190428">bsc#1190428</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1203332">bsc#1203332</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1205521">bsc#1205521</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209288">bsc#1209288</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209798">bsc#1209798</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211593">bsc#1211593</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211595">bsc#1211595</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1214635">bsc#1214635</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215304">bsc#1215304</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215523">bsc#1215523</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216813">bsc#1216813</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216909">bsc#1216909</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219608">bsc#1219608</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222878">bsc#1222878</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223044">bsc#1223044</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225758">bsc#1225758</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225820">bsc#1225820</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226694">bsc#1226694</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228190">bsc#1228190</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229809">bsc#1229809</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230422">bsc#1230422</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230697">bsc#1230697</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231388">bsc#1231388</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231453">bsc#1231453</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231854">bsc#1231854</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232045">bsc#1232045</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232157">bsc#1232157</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232166">bsc#1232166</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232419">bsc#1232419</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232436">bsc#1232436</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232472">bsc#1232472</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232823">bsc#1232823</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233038">bsc#1233038</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233050">bsc#1233050</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233070">bsc#1233070</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233096">bsc#1233096</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233127">bsc#1233127</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233200">bsc#1233200</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233239">bsc#1233239</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233324">bsc#1233324</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233467">bsc#1233467</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233468">bsc#1233468</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233469">bsc#1233469</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233485">bsc#1233485</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233547">bsc#1233547</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233550">bsc#1233550</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233558">bsc#1233558</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233564">bsc#1233564</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233568">bsc#1233568</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233637">bsc#1233637</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233642">bsc#1233642</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233701">bsc#1233701</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233769">bsc#1233769</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233837">bsc#1233837</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234072">bsc#1234072</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234073">bsc#1234073</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234075">bsc#1234075</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234076">bsc#1234076</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234077">bsc#1234077</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234087">bsc#1234087</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234120">bsc#1234120</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234156">bsc#1234156</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234219">bsc#1234219</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234220">bsc#1234220</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234240">bsc#1234240</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234241">bsc#1234241</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234281">bsc#1234281</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234282">bsc#1234282</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234294">bsc#1234294</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234338">bsc#1234338</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234357">bsc#1234357</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234437">bsc#1234437</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234464">bsc#1234464</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234605">bsc#1234605</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234639">bsc#1234639</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234650">bsc#1234650</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234727">bsc#1234727</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234811">bsc#1234811</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234827">bsc#1234827</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234834">bsc#1234834</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234843">bsc#1234843</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234846">bsc#1234846</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234853">bsc#1234853</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234856">bsc#1234856</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234891">bsc#1234891</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234912">bsc#1234912</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234920">bsc#1234920</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234921">bsc#1234921</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234960">bsc#1234960</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234963">bsc#1234963</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234971">bsc#1234971</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234973">bsc#1234973</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235004">bsc#1235004</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235035">bsc#1235035</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235037">bsc#1235037</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235039">bsc#1235039</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235054">bsc#1235054</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235056">bsc#1235056</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235061">bsc#1235061</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235073">bsc#1235073</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235220">bsc#1235220</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235224">bsc#1235224</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235246">bsc#1235246</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235507">bsc#1235507</a> </li> </ul> </td> </tr> <tr> <th> Cross-References: </th> <td> <ul> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47202.html">CVE-2021-47202</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-36280.html">CVE-2022-36280</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48742.html">CVE-2022-48742</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-49033.html">CVE-2022-49033</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-49035.html">CVE-2022-49035</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-1382.html">CVE-2023-1382</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-33951.html">CVE-2023-33951</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-33952.html">CVE-2023-33952</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52920.html">CVE-2023-52920</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-24860.html">CVE-2024-24860</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26886.html">CVE-2024-26886</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26924.html">CVE-2024-26924</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36915.html">CVE-2024-36915</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42232.html">CVE-2024-42232</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-44934.html">CVE-2024-44934</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-47666.html">CVE-2024-47666</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-47678.html">CVE-2024-47678</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-49944.html">CVE-2024-49944</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-49952.html">CVE-2024-49952</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-50018.html">CVE-2024-50018</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-50143.html">CVE-2024-50143</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-50154.html">CVE-2024-50154</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-50166.html">CVE-2024-50166</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-50181.html">CVE-2024-50181</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-50202.html">CVE-2024-50202</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-50211.html">CVE-2024-50211</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-50256.html">CVE-2024-50256</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-50262.html">CVE-2024-50262</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-50278.html">CVE-2024-50278</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-50279.html">CVE-2024-50279</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-50280.html">CVE-2024-50280</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-50296.html">CVE-2024-50296</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53051.html">CVE-2024-53051</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53055.html">CVE-2024-53055</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53056.html">CVE-2024-53056</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53064.html">CVE-2024-53064</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53072.html">CVE-2024-53072</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53090.html">CVE-2024-53090</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53095.html">CVE-2024-53095</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53101.html">CVE-2024-53101</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53113.html">CVE-2024-53113</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53114.html">CVE-2024-53114</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53119.html">CVE-2024-53119</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53120.html">CVE-2024-53120</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53122.html">CVE-2024-53122</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53125.html">CVE-2024-53125</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53130.html">CVE-2024-53130</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53131.html">CVE-2024-53131</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53142.html">CVE-2024-53142</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53146.html">CVE-2024-53146</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53150.html">CVE-2024-53150</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53156.html">CVE-2024-53156</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53157.html">CVE-2024-53157</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53158.html">CVE-2024-53158</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53161.html">CVE-2024-53161</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53162.html">CVE-2024-53162</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53173.html">CVE-2024-53173</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53179.html">CVE-2024-53179</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53206.html">CVE-2024-53206</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53210.html">CVE-2024-53210</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53213.html">CVE-2024-53213</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53214.html">CVE-2024-53214</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53239.html">CVE-2024-53239</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53240.html">CVE-2024-53240</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53241.html">CVE-2024-53241</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-56539.html">CVE-2024-56539</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-56548.html">CVE-2024-56548</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-56549.html">CVE-2024-56549</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-56570.html">CVE-2024-56570</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-56571.html">CVE-2024-56571</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-56575.html">CVE-2024-56575</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-56598.html">CVE-2024-56598</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-56604.html">CVE-2024-56604</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-56605.html">CVE-2024-56605</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-56619.html">CVE-2024-56619</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-56755.html">CVE-2024-56755</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-8805.html">CVE-2024-8805</a> </li> </ul> </td> </tr> <tr> <th>CVSS scores:</th> <td> <ul class="list-group"> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47202</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47202</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-36280</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-36280</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">6.3</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48742</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48742</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-49033</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-49033</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-49033</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-49035</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.5</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-49035</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-49035</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-1382</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-1382</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-33951</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-33951</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-33952</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.2</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-33952</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">6.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52920</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52920</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52920</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-24860</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-24860</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26886</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26886</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26924</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26924</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.9</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36915</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42232</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.3</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42232</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42232</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-44934</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-44934</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-47666</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.7</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-47666</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-47666</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-47678</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-47678</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-47678</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-49944</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-49944</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-49952</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-49952</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50018</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50018</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50143</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.9</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50143</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.6</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50143</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50154</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.3</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50154</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50154</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50154</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50166</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50166</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50181</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50181</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50181</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50202</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50202</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50202</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50211</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50211</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50211</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50256</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50256</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50256</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50262</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.9</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50262</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.6</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50262</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50262</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50278</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50278</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50279</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50279</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50280</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50280</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50296</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50296</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53051</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53051</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53055</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53055</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53056</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53056</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53064</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53064</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53072</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53072</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53090</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53090</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53095</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53095</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53101</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.9</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53101</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53101</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53113</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53113</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53114</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53114</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53119</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53119</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53120</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53120</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53122</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53122</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53125</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53130</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53130</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53131</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53131</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53142</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53142</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53146</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.5</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53146</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53146</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53150</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.9</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53150</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.6</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53150</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53156</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.5</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53156</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53156</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53157</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53157</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53157</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53158</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.9</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53158</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53161</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.9</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53161</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53162</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.9</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53162</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.6</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53173</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.3</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53173</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53173</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53179</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.3</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53179</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53179</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53206</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.9</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53206</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53206</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53210</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53210</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53210</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53213</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.9</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53213</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53213</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53214</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.5</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53214</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53239</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.5</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53239</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53241</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53241</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56539</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.6</span> <span class="cvss-vector">CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56539</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.0</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56548</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.4</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56548</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56549</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.7</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56549</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56549</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56570</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56570</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56571</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56571</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56575</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56575</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56598</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.3</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56598</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56598</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56604</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.5</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56604</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56604</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56605</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.5</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56605</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56605</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56619</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.5</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56619</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56755</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">2.0</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56755</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">2.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56755</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-8805</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.8</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-8805</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">8.8</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-8805</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">8.8</span> <span class="cvss-vector">CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span> </li> </ul> </td> </tr> <tr> <th>Affected Products:</th> <td> <ul class="list-group"> <li class="list-group-item">openSUSE Leap 15.5</li> <li class="list-group-item">SUSE Linux Enterprise High Availability Extension 15 SP5</li> <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP5</li> <li class="list-group-item">SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5</li> <li class="list-group-item">SUSE Linux Enterprise High Performance Computing LTSS 15 SP5</li> <li class="list-group-item">SUSE Linux Enterprise Live Patching 15-SP5</li> <li class="list-group-item">SUSE Linux Enterprise Micro 5.5</li> <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP5</li> <li class="list-group-item">SUSE Linux Enterprise Server 15 SP5</li> <li class="list-group-item">SUSE Linux Enterprise Server 15 SP5 LTSS</li> <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP5</li> </ul> </td> </tr> </tbody> </table>
<p>An update that solves 77 vulnerabilities and has 31 security fixes can now be installed.</p>
<h2>Description:</h2> <p>The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.</p> <p>The following security bugs were fixed:</p> <ul> <li>CVE-2022-36280: Fixed out-of-bounds memory access vulnerability found in vmwgfx driver (bsc#1203332).</li> <li>CVE-2022-48742: rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() (bsc#1226694).</li> <li>CVE-2022-49033: btrfs: qgroup: fix sleep from invalid context bug in btrfs_qgroup_inherit() (bsc#1232045).</li> <li>CVE-2023-1382: Fixed denial of service in tipc_conn_close (bsc#1209288).</li> <li>CVE-2023-33951: Fixed a race condition that could have led to an information disclosure inside the vmwgfx driver (bsc#1211593).</li> <li>CVE-2023-33952: Fixed a double free that could have led to a local privilege escalation inside the vmwgfx driver (bsc#1211595).</li> <li>CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in precision tracking (bsc#1232823).</li> <li>CVE-2024-26886: Bluetooth: af_bluetooth: Fix deadlock (bsc#1223044).</li> <li>CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).</li> <li>CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758).</li> <li>CVE-2024-44934: net: bridge: mcast: wait for previous gc cycles when removing port (bsc#1229809).</li> <li>CVE-2024-47666: scsi: pm80xx: Set phy->enable_completion only when we wait for it (bsc#1231453).</li> <li>CVE-2024-47678: icmp: change the order of rate limits (bsc#1231854).</li> <li>CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start (bsc#1232166).</li> <li>CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption (bsc#1232157).</li> <li>CVE-2024-50018: net: napi: Prevent overflow of napi_defer_hard_irqs (bsc#1232419).</li> <li>CVE-2024-50143: udf: fix uninit-value use in udf_get_fileshortad (bsc#1233038).</li> <li>CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices (bsc#1233050).</li> <li>CVE-2024-50181: clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D (bsc#1233127).</li> <li>CVE-2024-50202: nilfs2: propagate directory read errors from nilfs_find_entry() (bsc#1233324).</li> <li>CVE-2024-50211: udf: refactor inode_bmap() to handle error (bsc#1233096).</li> <li>CVE-2024-50256: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (bsc#1233200).</li> <li>CVE-2024-50262: bpf: Fix out-of-bounds write in trie_get_next_key() (bsc#1233239).</li> <li>CVE-2024-50278, CVE-2024-50280: dm cache: fix flushing uninitialized delayed_work on cache_ctr error (bsc#1233467 bsc#1233469).</li> <li>CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first resume (bsc#1233467).</li> <li>CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468).</li> <li>CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver (bsc#1233485).</li> <li>CVE-2024-53051: drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability (bsc#1233547).</li> <li>CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction (bsc#1233550).</li> <li>CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in mtk_crtc_destroy() (bsc#1233568).</li> <li>CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558 bsc#1234464).</li> <li>CVE-2024-53072: platform/x86/amd/pmc: Detect when STB is not available (bsc#1233564).</li> <li>CVE-2024-53090: afs: Fix lock recursion (bsc#1233637).</li> <li>CVE-2024-53095: smb: client: Fix use-after-free of network namespace (bsc#1233642).</li> <li>CVE-2024-53101: fs: Fix uninitialized value issue in from_kuid and from_kgid (bsc#1233769).</li> <li>CVE-2024-53113: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof (bsc#1234077).</li> <li>CVE-2024-53114: x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1234072).</li> <li>CVE-2024-53119: virtio/vsock: Fix accept_queue memory leak (bsc#1234073).</li> <li>CVE-2024-53122: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (bsc#1234076).</li> <li>CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156).</li> <li>CVE-2024-53130: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint (bsc#1234219).</li> <li>CVE-2024-53131: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint (bsc#1234220).</li> <li>CVE-2024-53146: NFSD: Prevent a potential integer overflow (bsc#1234853).</li> <li>CVE-2024-53150: ALSA: usb-audio: Fix out of bounds reads when finding clock sources (bsc#1234834).</li> <li>CVE-2024-53156: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (bsc#1234846).</li> <li>CVE-2024-53157: firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (bsc#1234827).</li> <li>CVE-2024-53158: soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (bsc#1234811).</li> <li>CVE-2024-53161: EDAC/bluefield: Fix potential integer overflow (bsc#1234856).</li> <li>CVE-2024-53162: crypto: qat/qat_4xxx - fix off by one in uof_get_name() (bsc#1234843).</li> <li>CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234891).</li> <li>CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921).</li> <li>CVE-2024-53210: s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct() (bsc#1234971).</li> <li>CVE-2024-53213: net: usb: lan78xx: Fix double free issue with interrupt buffer allocation (bsc#1234973).</li> <li>CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004).</li> <li>CVE-2024-53239: ALSA: 6fire: Release resources at card release (bsc#1235054).</li> <li>CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281).</li> <li>CVE-2024-53241: x86/xen: use new hypercall functions instead of hypercall page (XSA-466 bsc#1234282).</li> <li>CVE-2024-56539: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (bsc#1234963).</li> <li>CVE-2024-56548: hfsplus: do not query the device logical block size multiple times (bsc#1235073).</li> <li>CVE-2024-56549: cachefiles: Fix NULL pointer dereference in object->file (bsc#1234912).</li> <li>CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function (bsc#1235035).</li> <li>CVE-2024-56571: media: uvcvideo: Require entities to have a non-zero unique ID (bsc#1235037).</li> <li>CVE-2024-56575: media: imx-jpeg: Ensure power suppliers be suspended before detach them (bsc#1235039).</li> <li>CVE-2024-56598: jfs: array-index-out-of-bounds fix in dtReadFirst (bsc#1235220).</li> <li>CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056).</li> <li>CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235061).</li> <li>CVE-2024-56619: nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (bsc#1235224).</li> <li>CVE-2024-56755: netfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING (bsc#1234920).</li> </ul> <p>The following non-security bugs were fixed:</p> <ul> <li>ACPI/HMAT: Move HMAT messages to pr_debug() (bsc#1234294)</li> <li>Documentation: Add x86/amd_hsmp driver (jsc#PED-1295).</li> <li>Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet (git-fixes).</li> <li>Drop a couple of block layer git-fixes (bsc#1170891 bsc#1173139)</li> <li>KVM: x86: fix sending PV IPI (git-fixes).</li> <li>NFS/pnfs: Fix a live lock between recalled layouts and layoutget (git-fixes).</li> <li>NFSD: Fix nfsd4_shutdown_copy() (git-fixes).</li> <li>NFSD: Move fill_pre_wcc() and fill_post_wcc() (bsc#1234650 bsc#1233701 bsc#1232472).</li> <li>NFSD: Prevent NULL dereference in nfsd4_process_cb_update() (git-fixes).</li> <li>NFSD: Prevent a potential integer overflow (git-fixes).</li> <li>NFSD: reduce locking in nfsd_lookup() (bsc#1234650 bsc#1233701 bsc#1232472).</li> <li>NFSv4.0: Fix a use-after-free problem in the asynchronous open() (git-fixes).</li> <li>PCI: vmd: Fix secondary bus reset for Intel bridges (git-fixes).</li> <li>RDMA/hns: Disassociate mmap pages for all uctx when HW is being reset (git-fixes)</li> <li>README: Clean-up trailing whitespace</li> <li>SUNRPC: make sure cache entry active before cache_show (git-fixes).</li> <li>amd_hsmp: Add HSMP protocol version 5 messages (jsc#PED-1295).</li> <li>arm64: Ensure bits ASID[15:8] are masked out when the kernel uses (bsc#1234605)</li> <li>arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer (git-fixes).</li> <li>arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc (git-fixes).</li> <li>arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards (git-fixes).</li> <li>arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-sapphire-excavator (git-fixes).</li> <li>arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma lion (git-fixes).</li> <li>arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328 (git-fixes).</li> <li>autofs: fix memory leak of waitqueues in autofs_catatonic_mode (git-fixes).</li> <li>autofs: use flexible array in ioctl structure (git-fixes).</li> <li>devlink: allow registering parameters after the instance (bsc#1231388 bsc#1230422).</li> <li>devlink: do not require setting features before registration (bsc#1231388 bsc#1230422).</li> <li>dma-fence: Fix reference leak on fence merge failure path (git-fixes).</li> <li>dmaengine: idxd: Check for driver name match before sva user feature (bsc#1234357).</li> <li>dmaengine: idxd: add wq driver name support for accel-config user tool (bsc#1234357).</li> <li>drm/sti: Add __iomem for mixer_dbg_mxn's parameter (git-fixes).</li> <li>drm/v3d: Enable Performance Counters before clearing them (git-fixes).</li> <li>exfat: fix uninit-value in __exfat_get_dentry_set (git-fixes).</li> <li>fixup "rpm: support gz and zst compression methods" once more (bsc#1190428, bsc#1190358) Fixes: 3b8c4d9bcc24 ("rpm: support gz and zst compression methods") Fixes: 23510fce36ec ("fixup "rpm: support gz and zst compression methods"")</li> <li>hfsplus: do not query the device logical block size multiple times (git-fixes).</li> <li>idpf: add support for SW triggered interrupts (bsc#1235507).</li> <li>idpf: enable WB_ON_ITR (bsc#1235507).</li> <li>idpf: trigger SW interrupt when exiting wb_on_itr mode (bsc#1235507).</li> <li>ipc/sem: Fix dangling sem_array access in semtimedop race (bsc#1234727).</li> <li>jffs2: Fix rtime decompressor (git-fixes).</li> <li>jffs2: Prevent rtime decompress memory corruption (git-fixes).</li> <li>jffs2: fix use of uninitialized variable (git-fixes).</li> <li>jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree (git-fixes).</li> <li>jfs: array-index-out-of-bounds fix in dtReadFirst (git-fixes).</li> <li>jfs: fix array-index-out-of-bounds in jfs_readdir (git-fixes).</li> <li>jfs: fix shift-out-of-bounds in dbSplit (git-fixes).</li> <li>jfs: xattr: check invalid xattr size more strictly (git-fixes).</li> <li>kabi/severities: ignore intermodule symbols between fsl_fman and fsl_dpaa_eth</li> <li>kernel-binary: do not BuildIgnore m4. It is actually needed for regenerating zconf when it is not up-to-date due to merge.</li> <li>kobject: Add sanity check for kset->kobj.ktype in kset_register() (bsc#1234639).</li> <li>memory: tegra: Add API for retrieving carveout bounds (jsc#PED-1763).</li> <li>mm/kfence: reset PG_slab and memcg_data before freeing __kfence_pool (bsc#1234120).</li> <li>mmc: core: Further prevent card detect during shutdown (git-fixes).</li> <li>net/ipv6: release expired exception dst cached in socket (bsc#1216813).</li> <li>net: mana: Increase the DEF_RX_BUFFERS_PER_QUEUE to 1024 (bsc#1235246).</li> <li>nfsd: make sure exp active before svc_export_show (git-fixes).</li> <li>nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234650 bsc#1233701 bsc#1232472).</li> <li>nfsd: restore callback functionality for NFSv4.0 (git-fixes).</li> <li>nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (git-fixes).</li> <li>nilfs2: prevent use of deleted inode (git-fixes).</li> <li>ocfs2: uncache inode which has failed entering the group (bsc#1234087).</li> <li>phy: tegra: p2u: Set ENABLE_L2_EXIT_RATE_CHANGE in calibration (jsc#PED-1763).</li> <li>platform/x86: Add AMD system management interface (jsc#PED-1295).</li> <li>proc/softirqs: replace seq_printf with seq_put_decimal_ull_width (git-fixes).</li> <li>pwm: tegra: Improve required rate calculation (jsc#PED-1763).</li> <li>regmap: detach regmap from dev on regmap_exit (git-fixes).</li> <li>rpm/kernel-binary.spec.in: Fix build regression The previous fix forgot to take over grep -c option that broke the conditional expression</li> <li>scatterlist: fix incorrect func name in kernel-doc (git-fixes).</li> <li>scripts/git_sort/git_sort.py: add tegra DRM and linux-pwm repo</li> <li>scsi: storvsc: Do not flag MAINTENANCE_IN return of SRB_STATUS_DATA_OVERRUN as an error (git-fixes).</li> <li>serial: tegra: Read DMA status before terminating (jsc#PED-1763).</li> <li>smb: client: fix TCP timers deadlock after rmmod (git-fixes) [hcarvalho: this fixes issue discussed in bsc#1233642].</li> <li>spi: mpc52xx: Add cancel_work_sync before module remove (git-fixes).</li> <li>sunrpc: simplify two-level sysctl registration for svcrdma_parm_table (git-fixes).</li> <li>supported.conf: add bsc1185010 dependency</li> <li>supported.conf: hyperv_drm (jsc#sle-19733)</li> <li>svcrdma: Address an integer overflow (git-fixes).</li> <li>svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init() (git-fixes).</li> <li>tpm_tis_spi: Release chip select when flow control fails (bsc#1234338)</li> <li>ubifs: Correct the total block count by deducting journal reservation (git-fixes).</li> <li>ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit (git-fixes).</li> <li>udf: Handle error when adding extent to a file (bsc#1234437).</li> <li>udf: refactor udf_current_aext() to handle error (bsc#1234240).</li> <li>udf: refactor udf_next_aext() to handle error (bsc#1234241).</li> <li>usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).</li> <li>usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).</li> <li>x86/bug: Merge annotate_reachable() into _BUG_FLAGS() asm (git-fixes).</li> <li>x86/fpu/xsave: Handle compacted offsets correctly with supervisor states (git-fixes).</li> <li>x86/fpu/xstate: Fix the ARCH_REQ_XCOMP_PERM implementation (git-fixes).</li> <li>x86/fpu: Remove unused supervisor only offsets (git-fixes).</li> <li>x86/kvm: Do not use pv tlb/ipi/sched_yield if on 1 vCPU (git-fixes).</li> <li>x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes).</li> <li>x86/mce: Allow instrumentation during task work queueing (git-fixes).</li> <li>x86/mce: Mark mce_end() noinstr (git-fixes).</li> <li>x86/mce: Mark mce_panic() noinstr (git-fixes).</li> <li>x86/mce: Mark mce_read_aux() noinstr (git-fixes).</li> <li>x86/mm: Flush global TLB when switching to trampoline page-table (git-fixes).</li> <li>x86/sev: Make enc_dec_hypercall() accept a size instead of npages (bsc#1214635).</li> <li>x86/sgx: Free backing memory after faulting the enclave page (git-fixes).</li> <li>x86/sgx: Silence softlockup detection when releasing large enclaves (git-fixes).</li> <li>x86/uaccess: Move variable into switch case statement (git-fixes).</li> <li>x86: Annotate call_on_stack() (git-fixes).</li> <li>xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).</li> <li>zonefs: fix zone report size in __zonefs_io_error() (git-fixes).</li> </ul>
<h2>Special Instructions and Notes:</h2> <ul> <li>Please reboot the system after installing this update.</li> </ul>
<h2>Patch Instructions:</h2> <p> To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product: </p> <ul class="list-group"> <li class="list-group-item"> openSUSE Leap 15.5 <br/> <code>zypper in -t patch SUSE-2025-201=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Micro 5.5 <br/> <code>zypper in -t patch SUSE-SLE-Micro-5.5-2025-201=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Live Patching 15-SP5 <br/> <code>zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-201=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise High Availability Extension 15 SP5 <br/> <code>zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2025-201=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 <br/> <code>zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-201=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 <br/> <code>zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-201=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Server 15 SP5 LTSS <br/> <code>zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-201=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Server for SAP Applications 15 SP5 <br/> <code>zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-201=1</code> </li> </ul>
<h2>Package List:</h2> <ul> <li> openSUSE Leap 15.5 (noarch nosrc) <ul> <li>kernel-docs-5.14.21-150500.55.91.1</li> </ul> </li> <li> openSUSE Leap 15.5 (noarch) <ul> <li>kernel-macros-5.14.21-150500.55.91.1</li> <li>kernel-source-vanilla-5.14.21-150500.55.91.1</li> <li>kernel-docs-html-5.14.21-150500.55.91.1</li> <li>kernel-source-5.14.21-150500.55.91.1</li> <li>kernel-devel-5.14.21-150500.55.91.1</li> </ul> </li> <li> openSUSE Leap 15.5 (nosrc ppc64le x86_64) <ul> <li>kernel-debug-5.14.21-150500.55.91.1</li> </ul> </li> <li> openSUSE Leap 15.5 (ppc64le x86_64) <ul> <li>kernel-debug-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-debug-devel-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-debug-debugsource-5.14.21-150500.55.91.1</li> <li>kernel-debug-devel-5.14.21-150500.55.91.1</li> </ul> </li> <li> openSUSE Leap 15.5 (x86_64) <ul> <li>kernel-default-vdso-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-kvmsmall-vdso-5.14.21-150500.55.91.1</li> <li>kernel-default-vdso-5.14.21-150500.55.91.1</li> <li>kernel-debug-vdso-5.14.21-150500.55.91.1</li> <li>kernel-kvmsmall-vdso-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-debug-vdso-debuginfo-5.14.21-150500.55.91.1</li> </ul> </li> <li> openSUSE Leap 15.5 (aarch64 ppc64le x86_64) <ul> <li>kernel-kvmsmall-debugsource-5.14.21-150500.55.91.1</li> <li>kernel-default-base-5.14.21-150500.55.91.1.150500.6.41.1</li> <li>kernel-kvmsmall-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-kvmsmall-devel-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-default-base-rebuild-5.14.21-150500.55.91.1.150500.6.41.1</li> <li>kernel-kvmsmall-devel-5.14.21-150500.55.91.1</li> </ul> </li> <li> openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) <ul> <li>kernel-default-optional-5.14.21-150500.55.91.1</li> <li>kernel-default-devel-5.14.21-150500.55.91.1</li> <li>gfs2-kmp-default-debuginfo-5.14.21-150500.55.91.1</li> <li>reiserfs-kmp-default-5.14.21-150500.55.91.1</li> <li>kselftests-kmp-default-5.14.21-150500.55.91.1</li> <li>kernel-syms-5.14.21-150500.55.91.1</li> <li>ocfs2-kmp-default-5.14.21-150500.55.91.1</li> <li>kernel-obs-build-debugsource-5.14.21-150500.55.91.1</li> <li>kernel-default-livepatch-5.14.21-150500.55.91.1</li> <li>kernel-default-debuginfo-5.14.21-150500.55.91.1</li> <li>reiserfs-kmp-default-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-default-optional-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-obs-qa-5.14.21-150500.55.91.1</li> <li>dlm-kmp-default-5.14.21-150500.55.91.1</li> <li>ocfs2-kmp-default-debuginfo-5.14.21-150500.55.91.1</li> <li>dlm-kmp-default-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-default-extra-5.14.21-150500.55.91.1</li> <li>cluster-md-kmp-default-5.14.21-150500.55.91.1</li> <li>kselftests-kmp-default-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-default-debugsource-5.14.21-150500.55.91.1</li> <li>cluster-md-kmp-default-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-default-devel-debuginfo-5.14.21-150500.55.91.1</li> <li>gfs2-kmp-default-5.14.21-150500.55.91.1</li> <li>kernel-obs-build-5.14.21-150500.55.91.1</li> <li>kernel-default-extra-debuginfo-5.14.21-150500.55.91.1</li> </ul> </li> <li> openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc) <ul> <li>kernel-default-5.14.21-150500.55.91.1</li> </ul> </li> <li> openSUSE Leap 15.5 (ppc64le s390x x86_64) <ul> <li>kernel-livepatch-SLE15-SP5_Update_22-debugsource-1-150500.11.3.1</li> <li>kernel-livepatch-5_14_21-150500_55_91-default-debuginfo-1-150500.11.3.1</li> <li>kernel-livepatch-5_14_21-150500_55_91-default-1-150500.11.3.1</li> <li>kernel-default-livepatch-devel-5.14.21-150500.55.91.1</li> </ul> </li> <li> openSUSE Leap 15.5 (aarch64 nosrc ppc64le x86_64) <ul> <li>kernel-kvmsmall-5.14.21-150500.55.91.1</li> </ul> </li> <li> openSUSE Leap 15.5 (nosrc s390x) <ul> <li>kernel-zfcpdump-5.14.21-150500.55.91.1</li> </ul> </li> <li> openSUSE Leap 15.5 (s390x) <ul> <li>kernel-zfcpdump-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-zfcpdump-debugsource-5.14.21-150500.55.91.1</li> </ul> </li> <li> openSUSE Leap 15.5 (nosrc) <ul> <li>dtb-aarch64-5.14.21-150500.55.91.1</li> </ul> </li> <li> openSUSE Leap 15.5 (aarch64) <ul> <li>dtb-nvidia-5.14.21-150500.55.91.1</li> <li>kernel-64kb-debugsource-5.14.21-150500.55.91.1</li> <li>dtb-apple-5.14.21-150500.55.91.1</li> <li>dtb-amlogic-5.14.21-150500.55.91.1</li> <li>ocfs2-kmp-64kb-5.14.21-150500.55.91.1</li> <li>dtb-socionext-5.14.21-150500.55.91.1</li> <li>dtb-allwinner-5.14.21-150500.55.91.1</li> <li>kselftests-kmp-64kb-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-64kb-extra-5.14.21-150500.55.91.1</li> <li>kernel-64kb-optional-5.14.21-150500.55.91.1</li> <li>dtb-arm-5.14.21-150500.55.91.1</li> <li>dtb-qcom-5.14.21-150500.55.91.1</li> <li>dtb-rockchip-5.14.21-150500.55.91.1</li> <li>dtb-marvell-5.14.21-150500.55.91.1</li> <li>dtb-lg-5.14.21-150500.55.91.1</li> <li>kernel-64kb-devel-debuginfo-5.14.21-150500.55.91.1</li> <li>dtb-sprd-5.14.21-150500.55.91.1</li> <li>dtb-freescale-5.14.21-150500.55.91.1</li> <li>dtb-xilinx-5.14.21-150500.55.91.1</li> <li>dtb-exynos-5.14.21-150500.55.91.1</li> <li>cluster-md-kmp-64kb-5.14.21-150500.55.91.1</li> <li>dlm-kmp-64kb-5.14.21-150500.55.91.1</li> <li>kernel-64kb-extra-debuginfo-5.14.21-150500.55.91.1</li> <li>dlm-kmp-64kb-debuginfo-5.14.21-150500.55.91.1</li> <li>reiserfs-kmp-64kb-debuginfo-5.14.21-150500.55.91.1</li> <li>dtb-apm-5.14.21-150500.55.91.1</li> <li>kernel-64kb-optional-debuginfo-5.14.21-150500.55.91.1</li> <li>dtb-cavium-5.14.21-150500.55.91.1</li> <li>dtb-altera-5.14.21-150500.55.91.1</li> <li>dtb-amazon-5.14.21-150500.55.91.1</li> <li>dtb-hisilicon-5.14.21-150500.55.91.1</li> <li>kernel-64kb-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-64kb-devel-5.14.21-150500.55.91.1</li> <li>dtb-broadcom-5.14.21-150500.55.91.1</li> <li>kselftests-kmp-64kb-5.14.21-150500.55.91.1</li> <li>cluster-md-kmp-64kb-debuginfo-5.14.21-150500.55.91.1</li> <li>dtb-mediatek-5.14.21-150500.55.91.1</li> <li>dtb-amd-5.14.21-150500.55.91.1</li> <li>dtb-renesas-5.14.21-150500.55.91.1</li> <li>gfs2-kmp-64kb-debuginfo-5.14.21-150500.55.91.1</li> <li>reiserfs-kmp-64kb-5.14.21-150500.55.91.1</li> <li>ocfs2-kmp-64kb-debuginfo-5.14.21-150500.55.91.1</li> <li>gfs2-kmp-64kb-5.14.21-150500.55.91.1</li> </ul> </li> <li> openSUSE Leap 15.5 (aarch64 nosrc) <ul> <li>kernel-64kb-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64 nosrc) <ul> <li>kernel-default-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64) <ul> <li>kernel-default-base-5.14.21-150500.55.91.1.150500.6.41.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) <ul> <li>kernel-default-debugsource-5.14.21-150500.55.91.1</li> <li>kernel-default-debuginfo-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise Live Patching 15-SP5 (nosrc) <ul> <li>kernel-default-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) <ul> <li>kernel-default-debugsource-5.14.21-150500.55.91.1</li> <li>kernel-livepatch-5_14_21-150500_55_91-default-debuginfo-1-150500.11.3.1</li> <li>kernel-default-livepatch-5.14.21-150500.55.91.1</li> <li>kernel-default-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-default-livepatch-devel-5.14.21-150500.55.91.1</li> <li>kernel-livepatch-SLE15-SP5_Update_22-debugsource-1-150500.11.3.1</li> <li>kernel-livepatch-5_14_21-150500_55_91-default-1-150500.11.3.1</li> </ul> </li> <li> SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) <ul> <li>dlm-kmp-default-5.14.21-150500.55.91.1</li> <li>ocfs2-kmp-default-5.14.21-150500.55.91.1</li> <li>kernel-default-debugsource-5.14.21-150500.55.91.1</li> <li>ocfs2-kmp-default-debuginfo-5.14.21-150500.55.91.1</li> <li>cluster-md-kmp-default-debuginfo-5.14.21-150500.55.91.1</li> <li>dlm-kmp-default-debuginfo-5.14.21-150500.55.91.1</li> <li>gfs2-kmp-default-debuginfo-5.14.21-150500.55.91.1</li> <li>cluster-md-kmp-default-5.14.21-150500.55.91.1</li> <li>kernel-default-debuginfo-5.14.21-150500.55.91.1</li> <li>gfs2-kmp-default-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise High Availability Extension 15 SP5 (nosrc) <ul> <li>kernel-default-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 nosrc) <ul> <li>kernel-64kb-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64) <ul> <li>kernel-64kb-debugsource-5.14.21-150500.55.91.1</li> <li>kernel-64kb-devel-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-64kb-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-64kb-devel-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 nosrc x86_64) <ul> <li>kernel-default-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) <ul> <li>kernel-default-debugsource-5.14.21-150500.55.91.1</li> <li>kernel-obs-build-debugsource-5.14.21-150500.55.91.1</li> <li>kernel-default-devel-5.14.21-150500.55.91.1</li> <li>kernel-default-base-5.14.21-150500.55.91.1.150500.6.41.1</li> <li>kernel-default-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-default-devel-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-syms-5.14.21-150500.55.91.1</li> <li>kernel-obs-build-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) <ul> <li>kernel-macros-5.14.21-150500.55.91.1</li> <li>kernel-devel-5.14.21-150500.55.91.1</li> <li>kernel-source-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch nosrc) <ul> <li>kernel-docs-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc) <ul> <li>kernel-64kb-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64) <ul> <li>kernel-64kb-debugsource-5.14.21-150500.55.91.1</li> <li>kernel-64kb-devel-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-64kb-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-64kb-devel-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc x86_64) <ul> <li>kernel-default-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) <ul> <li>kernel-default-debugsource-5.14.21-150500.55.91.1</li> <li>kernel-obs-build-debugsource-5.14.21-150500.55.91.1</li> <li>kernel-default-devel-5.14.21-150500.55.91.1</li> <li>kernel-default-base-5.14.21-150500.55.91.1.150500.6.41.1</li> <li>kernel-default-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-default-devel-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-syms-5.14.21-150500.55.91.1</li> <li>kernel-obs-build-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) <ul> <li>kernel-macros-5.14.21-150500.55.91.1</li> <li>kernel-devel-5.14.21-150500.55.91.1</li> <li>kernel-source-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch nosrc) <ul> <li>kernel-docs-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 nosrc) <ul> <li>kernel-64kb-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64) <ul> <li>kernel-64kb-debugsource-5.14.21-150500.55.91.1</li> <li>kernel-64kb-devel-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-64kb-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-64kb-devel-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64 nosrc) <ul> <li>kernel-default-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le x86_64) <ul> <li>kernel-default-base-5.14.21-150500.55.91.1.150500.6.41.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) <ul> <li>kernel-default-debugsource-5.14.21-150500.55.91.1</li> <li>kernel-obs-build-debugsource-5.14.21-150500.55.91.1</li> <li>kernel-default-devel-5.14.21-150500.55.91.1</li> <li>reiserfs-kmp-default-5.14.21-150500.55.91.1</li> <li>kernel-default-debuginfo-5.14.21-150500.55.91.1</li> <li>reiserfs-kmp-default-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-default-devel-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-syms-5.14.21-150500.55.91.1</li> <li>kernel-obs-build-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) <ul> <li>kernel-macros-5.14.21-150500.55.91.1</li> <li>kernel-devel-5.14.21-150500.55.91.1</li> <li>kernel-source-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP5 LTSS (noarch nosrc) <ul> <li>kernel-docs-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP5 LTSS (nosrc s390x) <ul> <li>kernel-zfcpdump-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP5 LTSS (s390x) <ul> <li>kernel-zfcpdump-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-zfcpdump-debugsource-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 15 SP5 (nosrc ppc64le x86_64) <ul> <li>kernel-default-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) <ul> <li>kernel-default-debugsource-5.14.21-150500.55.91.1</li> <li>kernel-obs-build-debugsource-5.14.21-150500.55.91.1</li> <li>kernel-default-devel-5.14.21-150500.55.91.1</li> <li>reiserfs-kmp-default-5.14.21-150500.55.91.1</li> <li>kernel-default-base-5.14.21-150500.55.91.1.150500.6.41.1</li> <li>kernel-default-debuginfo-5.14.21-150500.55.91.1</li> <li>reiserfs-kmp-default-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-default-devel-debuginfo-5.14.21-150500.55.91.1</li> <li>kernel-syms-5.14.21-150500.55.91.1</li> <li>kernel-obs-build-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) <ul> <li>kernel-macros-5.14.21-150500.55.91.1</li> <li>kernel-devel-5.14.21-150500.55.91.1</li> <li>kernel-source-5.14.21-150500.55.91.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch nosrc) <ul> <li>kernel-docs-5.14.21-150500.55.91.1</li> </ul> </li> </ul>
<h2>References:</h2> <ul> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47202.html">https://www.suse.com/security/cve/CVE-2021-47202.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-36280.html">https://www.suse.com/security/cve/CVE-2022-36280.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48742.html">https://www.suse.com/security/cve/CVE-2022-48742.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-49033.html">https://www.suse.com/security/cve/CVE-2022-49033.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-49035.html">https://www.suse.com/security/cve/CVE-2022-49035.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-1382.html">https://www.suse.com/security/cve/CVE-2023-1382.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-33951.html">https://www.suse.com/security/cve/CVE-2023-33951.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-33952.html">https://www.suse.com/security/cve/CVE-2023-33952.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52920.html">https://www.suse.com/security/cve/CVE-2023-52920.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-24860.html">https://www.suse.com/security/cve/CVE-2024-24860.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26886.html">https://www.suse.com/security/cve/CVE-2024-26886.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26924.html">https://www.suse.com/security/cve/CVE-2024-26924.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36915.html">https://www.suse.com/security/cve/CVE-2024-36915.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42232.html">https://www.suse.com/security/cve/CVE-2024-42232.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-44934.html">https://www.suse.com/security/cve/CVE-2024-44934.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-47666.html">https://www.suse.com/security/cve/CVE-2024-47666.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-47678.html">https://www.suse.com/security/cve/CVE-2024-47678.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-49944.html">https://www.suse.com/security/cve/CVE-2024-49944.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-49952.html">https://www.suse.com/security/cve/CVE-2024-49952.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-50018.html">https://www.suse.com/security/cve/CVE-2024-50018.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-50143.html">https://www.suse.com/security/cve/CVE-2024-50143.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-50154.html">https://www.suse.com/security/cve/CVE-2024-50154.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-50166.html">https://www.suse.com/security/cve/CVE-2024-50166.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-50181.html">https://www.suse.com/security/cve/CVE-2024-50181.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-50202.html">https://www.suse.com/security/cve/CVE-2024-50202.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-50211.html">https://www.suse.com/security/cve/CVE-2024-50211.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-50256.html">https://www.suse.com/security/cve/CVE-2024-50256.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-50262.html">https://www.suse.com/security/cve/CVE-2024-50262.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-50278.html">https://www.suse.com/security/cve/CVE-2024-50278.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-50279.html">https://www.suse.com/security/cve/CVE-2024-50279.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-50280.html">https://www.suse.com/security/cve/CVE-2024-50280.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-50296.html">https://www.suse.com/security/cve/CVE-2024-50296.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53051.html">https://www.suse.com/security/cve/CVE-2024-53051.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53055.html">https://www.suse.com/security/cve/CVE-2024-53055.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53056.html">https://www.suse.com/security/cve/CVE-2024-53056.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53064.html">https://www.suse.com/security/cve/CVE-2024-53064.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53072.html">https://www.suse.com/security/cve/CVE-2024-53072.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53090.html">https://www.suse.com/security/cve/CVE-2024-53090.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53095.html">https://www.suse.com/security/cve/CVE-2024-53095.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53101.html">https://www.suse.com/security/cve/CVE-2024-53101.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53113.html">https://www.suse.com/security/cve/CVE-2024-53113.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53114.html">https://www.suse.com/security/cve/CVE-2024-53114.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53119.html">https://www.suse.com/security/cve/CVE-2024-53119.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53120.html">https://www.suse.com/security/cve/CVE-2024-53120.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53122.html">https://www.suse.com/security/cve/CVE-2024-53122.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53125.html">https://www.suse.com/security/cve/CVE-2024-53125.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53130.html">https://www.suse.com/security/cve/CVE-2024-53130.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53131.html">https://www.suse.com/security/cve/CVE-2024-53131.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53142.html">https://www.suse.com/security/cve/CVE-2024-53142.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53146.html">https://www.suse.com/security/cve/CVE-2024-53146.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53150.html">https://www.suse.com/security/cve/CVE-2024-53150.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53156.html">https://www.suse.com/security/cve/CVE-2024-53156.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53157.html">https://www.suse.com/security/cve/CVE-2024-53157.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53158.html">https://www.suse.com/security/cve/CVE-2024-53158.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53161.html">https://www.suse.com/security/cve/CVE-2024-53161.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53162.html">https://www.suse.com/security/cve/CVE-2024-53162.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53173.html">https://www.suse.com/security/cve/CVE-2024-53173.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53179.html">https://www.suse.com/security/cve/CVE-2024-53179.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53206.html">https://www.suse.com/security/cve/CVE-2024-53206.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53210.html">https://www.suse.com/security/cve/CVE-2024-53210.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53213.html">https://www.suse.com/security/cve/CVE-2024-53213.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53214.html">https://www.suse.com/security/cve/CVE-2024-53214.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53239.html">https://www.suse.com/security/cve/CVE-2024-53239.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53240.html">https://www.suse.com/security/cve/CVE-2024-53240.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53241.html">https://www.suse.com/security/cve/CVE-2024-53241.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-56539.html">https://www.suse.com/security/cve/CVE-2024-56539.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-56548.html">https://www.suse.com/security/cve/CVE-2024-56548.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-56549.html">https://www.suse.com/security/cve/CVE-2024-56549.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-56570.html">https://www.suse.com/security/cve/CVE-2024-56570.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-56571.html">https://www.suse.com/security/cve/CVE-2024-56571.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-56575.html">https://www.suse.com/security/cve/CVE-2024-56575.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-56598.html">https://www.suse.com/security/cve/CVE-2024-56598.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-56604.html">https://www.suse.com/security/cve/CVE-2024-56604.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-56605.html">https://www.suse.com/security/cve/CVE-2024-56605.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-56619.html">https://www.suse.com/security/cve/CVE-2024-56619.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-56755.html">https://www.suse.com/security/cve/CVE-2024-56755.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-8805.html">https://www.suse.com/security/cve/CVE-2024-8805.html</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1170891">https://bugzilla.suse.com/show_bug.cgi?id=1170891</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1173139">https://bugzilla.suse.com/show_bug.cgi?id=1173139</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1185010">https://bugzilla.suse.com/show_bug.cgi?id=1185010</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1190358">https://bugzilla.suse.com/show_bug.cgi?id=1190358</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1190428">https://bugzilla.suse.com/show_bug.cgi?id=1190428</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1203332">https://bugzilla.suse.com/show_bug.cgi?id=1203332</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1205521">https://bugzilla.suse.com/show_bug.cgi?id=1205521</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209288">https://bugzilla.suse.com/show_bug.cgi?id=1209288</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209798">https://bugzilla.suse.com/show_bug.cgi?id=1209798</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211593">https://bugzilla.suse.com/show_bug.cgi?id=1211593</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211595">https://bugzilla.suse.com/show_bug.cgi?id=1211595</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1214635">https://bugzilla.suse.com/show_bug.cgi?id=1214635</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215304">https://bugzilla.suse.com/show_bug.cgi?id=1215304</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215523">https://bugzilla.suse.com/show_bug.cgi?id=1215523</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216813">https://bugzilla.suse.com/show_bug.cgi?id=1216813</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216909">https://bugzilla.suse.com/show_bug.cgi?id=1216909</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219608">https://bugzilla.suse.com/show_bug.cgi?id=1219608</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222878">https://bugzilla.suse.com/show_bug.cgi?id=1222878</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223044">https://bugzilla.suse.com/show_bug.cgi?id=1223044</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225758">https://bugzilla.suse.com/show_bug.cgi?id=1225758</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225820">https://bugzilla.suse.com/show_bug.cgi?id=1225820</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226694">https://bugzilla.suse.com/show_bug.cgi?id=1226694</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228190">https://bugzilla.suse.com/show_bug.cgi?id=1228190</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229809">https://bugzilla.suse.com/show_bug.cgi?id=1229809</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230422">https://bugzilla.suse.com/show_bug.cgi?id=1230422</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230697">https://bugzilla.suse.com/show_bug.cgi?id=1230697</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231388">https://bugzilla.suse.com/show_bug.cgi?id=1231388</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231453">https://bugzilla.suse.com/show_bug.cgi?id=1231453</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231854">https://bugzilla.suse.com/show_bug.cgi?id=1231854</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232045">https://bugzilla.suse.com/show_bug.cgi?id=1232045</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232157">https://bugzilla.suse.com/show_bug.cgi?id=1232157</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232166">https://bugzilla.suse.com/show_bug.cgi?id=1232166</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232419">https://bugzilla.suse.com/show_bug.cgi?id=1232419</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232436">https://bugzilla.suse.com/show_bug.cgi?id=1232436</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232472">https://bugzilla.suse.com/show_bug.cgi?id=1232472</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232823">https://bugzilla.suse.com/show_bug.cgi?id=1232823</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233038">https://bugzilla.suse.com/show_bug.cgi?id=1233038</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233050">https://bugzilla.suse.com/show_bug.cgi?id=1233050</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233070">https://bugzilla.suse.com/show_bug.cgi?id=1233070</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233096">https://bugzilla.suse.com/show_bug.cgi?id=1233096</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233127">https://bugzilla.suse.com/show_bug.cgi?id=1233127</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233200">https://bugzilla.suse.com/show_bug.cgi?id=1233200</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233239">https://bugzilla.suse.com/show_bug.cgi?id=1233239</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233324">https://bugzilla.suse.com/show_bug.cgi?id=1233324</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233467">https://bugzilla.suse.com/show_bug.cgi?id=1233467</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233468">https://bugzilla.suse.com/show_bug.cgi?id=1233468</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233469">https://bugzilla.suse.com/show_bug.cgi?id=1233469</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233485">https://bugzilla.suse.com/show_bug.cgi?id=1233485</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233547">https://bugzilla.suse.com/show_bug.cgi?id=1233547</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233550">https://bugzilla.suse.com/show_bug.cgi?id=1233550</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233558">https://bugzilla.suse.com/show_bug.cgi?id=1233558</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233564">https://bugzilla.suse.com/show_bug.cgi?id=1233564</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233568">https://bugzilla.suse.com/show_bug.cgi?id=1233568</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233637">https://bugzilla.suse.com/show_bug.cgi?id=1233637</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233642">https://bugzilla.suse.com/show_bug.cgi?id=1233642</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233701">https://bugzilla.suse.com/show_bug.cgi?id=1233701</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233769">https://bugzilla.suse.com/show_bug.cgi?id=1233769</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233837">https://bugzilla.suse.com/show_bug.cgi?id=1233837</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234072">https://bugzilla.suse.com/show_bug.cgi?id=1234072</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234073">https://bugzilla.suse.com/show_bug.cgi?id=1234073</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234075">https://bugzilla.suse.com/show_bug.cgi?id=1234075</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234076">https://bugzilla.suse.com/show_bug.cgi?id=1234076</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234077">https://bugzilla.suse.com/show_bug.cgi?id=1234077</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234087">https://bugzilla.suse.com/show_bug.cgi?id=1234087</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234120">https://bugzilla.suse.com/show_bug.cgi?id=1234120</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234156">https://bugzilla.suse.com/show_bug.cgi?id=1234156</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234219">https://bugzilla.suse.com/show_bug.cgi?id=1234219</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234220">https://bugzilla.suse.com/show_bug.cgi?id=1234220</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234240">https://bugzilla.suse.com/show_bug.cgi?id=1234240</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234241">https://bugzilla.suse.com/show_bug.cgi?id=1234241</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234281">https://bugzilla.suse.com/show_bug.cgi?id=1234281</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234282">https://bugzilla.suse.com/show_bug.cgi?id=1234282</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234294">https://bugzilla.suse.com/show_bug.cgi?id=1234294</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234338">https://bugzilla.suse.com/show_bug.cgi?id=1234338</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234357">https://bugzilla.suse.com/show_bug.cgi?id=1234357</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234437">https://bugzilla.suse.com/show_bug.cgi?id=1234437</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234464">https://bugzilla.suse.com/show_bug.cgi?id=1234464</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234605">https://bugzilla.suse.com/show_bug.cgi?id=1234605</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234639">https://bugzilla.suse.com/show_bug.cgi?id=1234639</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234650">https://bugzilla.suse.com/show_bug.cgi?id=1234650</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234727">https://bugzilla.suse.com/show_bug.cgi?id=1234727</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234811">https://bugzilla.suse.com/show_bug.cgi?id=1234811</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234827">https://bugzilla.suse.com/show_bug.cgi?id=1234827</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234834">https://bugzilla.suse.com/show_bug.cgi?id=1234834</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234843">https://bugzilla.suse.com/show_bug.cgi?id=1234843</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234846">https://bugzilla.suse.com/show_bug.cgi?id=1234846</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234853">https://bugzilla.suse.com/show_bug.cgi?id=1234853</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234856">https://bugzilla.suse.com/show_bug.cgi?id=1234856</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234891">https://bugzilla.suse.com/show_bug.cgi?id=1234891</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234912">https://bugzilla.suse.com/show_bug.cgi?id=1234912</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234920">https://bugzilla.suse.com/show_bug.cgi?id=1234920</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234921">https://bugzilla.suse.com/show_bug.cgi?id=1234921</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234960">https://bugzilla.suse.com/show_bug.cgi?id=1234960</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234963">https://bugzilla.suse.com/show_bug.cgi?id=1234963</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234971">https://bugzilla.suse.com/show_bug.cgi?id=1234971</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234973">https://bugzilla.suse.com/show_bug.cgi?id=1234973</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235004">https://bugzilla.suse.com/show_bug.cgi?id=1235004</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235035">https://bugzilla.suse.com/show_bug.cgi?id=1235035</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235037">https://bugzilla.suse.com/show_bug.cgi?id=1235037</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235039">https://bugzilla.suse.com/show_bug.cgi?id=1235039</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235054">https://bugzilla.suse.com/show_bug.cgi?id=1235054</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235056">https://bugzilla.suse.com/show_bug.cgi?id=1235056</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235061">https://bugzilla.suse.com/show_bug.cgi?id=1235061</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235073">https://bugzilla.suse.com/show_bug.cgi?id=1235073</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235220">https://bugzilla.suse.com/show_bug.cgi?id=1235220</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235224">https://bugzilla.suse.com/show_bug.cgi?id=1235224</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235246">https://bugzilla.suse.com/show_bug.cgi?id=1235246</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235507">https://bugzilla.suse.com/show_bug.cgi?id=1235507</a> </li> </ul> </div>
--===============1811701390839862137==--
|
|
|
|