SUSE-SU-2024:3483-1: important: Security update for the Linux Kernel
# Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:3483-1 Rating: important References: * bsc#1193629 * bsc#1194111 * bsc#1194765 * bsc#1194869 * bsc#1196261 * bsc#1196516 * bsc#1196894 * bsc#1198017 * bsc#1203329 * bsc#1203330 * bsc#1203360 * bsc#1205462 * bsc#1206006 * bsc#1206258 * bsc#1206843 * bsc#1207158 * bsc#1208783 * bsc#1210644 * bsc#1213580 * bsc#1213632 * bsc#1214285 * bsc#1216834 * bsc#1220428 * bsc#1220877 * bsc#1220962 * bsc#1221269 * bsc#1221326 * bsc#1221630 * bsc#1221645 * bsc#1222335 * bsc#1222350 * bsc#1222372 * bsc#1222387 * bsc#1222634 * bsc#1222808 * bsc#1222967 * bsc#1223074 * bsc#1223191 * bsc#1223508 * bsc#1223720 * bsc#1223742 * bsc#1223777 * bsc#1223803 * bsc#1223807 * bsc#1224105 * bsc#1224415 * bsc#1224496 * bsc#1224510 * bsc#1224542 * bsc#1224578 * bsc#1224639 * bsc#1225162 * bsc#1225352 * bsc#1225428 * bsc#1225524 * bsc#1225578 * bsc#1225582 * bsc#1225773 * bsc#1225814 * bsc#1225827 * bsc#1225832 * bsc#1225903 * bsc#1226168 * bsc#1226530 * bsc#1226613 * bsc#1226742 * bsc#1226765 * bsc#1226798 * bsc#1226801 * bsc#1226874 * bsc#1226885 * bsc#1227079 * bsc#1227623 * bsc#1227761 * bsc#1227830 * bsc#1227863 * bsc#1227867 * bsc#1227929 * bsc#1227937 * bsc#1227958 * bsc#1228020 * bsc#1228065 * bsc#1228114 * bsc#1228410 * bsc#1228426 * bsc#1228427 * bsc#1228429 * bsc#1228446 * bsc#1228447 * bsc#1228449 * bsc#1228450 * bsc#1228452 * bsc#1228456 * bsc#1228463 * bsc#1228466 * bsc#1228467 * bsc#1228469 * bsc#1228480 * bsc#1228481 * bsc#1228482 * bsc#1228483 * bsc#1228484 * bsc#1228485 * bsc#1228487 * bsc#1228489 * bsc#1228491 * bsc#1228493 * bsc#1228494 * bsc#1228495 * bsc#1228496 * bsc#1228501 * bsc#1228503 * bsc#1228509 * bsc#1228513 * bsc#1228515 * bsc#1228516 * bsc#1228526 * bsc#1228531 * bsc#1228563 * bsc#1228564 * bsc#1228567 * bsc#1228576 * bsc#1228579 * bsc#1228584 * bsc#1228588 * bsc#1228590 * bsc#1228615 * bsc#1228616 * bsc#1228635 * bsc#1228636 * bsc#1228654 * bsc#1228656 * bsc#1228658 * bsc#1228660 * bsc#1228662 * bsc#1228667 * bsc#1228673 * bsc#1228677 * bsc#1228687 * bsc#1228706 * bsc#1228708 * bsc#1228710 * bsc#1228718 * bsc#1228720 * bsc#1228721 * bsc#1228722 * bsc#1228724 * bsc#1228726 * bsc#1228727 * bsc#1228733 * bsc#1228748 * bsc#1228766 * bsc#1228779 * bsc#1228801 * bsc#1228850 * bsc#1228857 * bsc#1228959 * bsc#1228964 * bsc#1228966 * bsc#1228967 * bsc#1228979 * bsc#1228988 * bsc#1228989 * bsc#1228991 * bsc#1228992 * bsc#1229042 * bsc#1229054 * bsc#1229086 * bsc#1229136 * bsc#1229154 * bsc#1229187 * bsc#1229188 * bsc#1229190 * bsc#1229287 * bsc#1229290 * bsc#1229292 * bsc#1229296 * bsc#1229297 * bsc#1229301 * bsc#1229303 * bsc#1229304 * bsc#1229305 * bsc#1229307 * bsc#1229309 * bsc#1229312 * bsc#1229314 * bsc#1229315 * bsc#1229317 * bsc#1229318 * bsc#1229319 * bsc#1229327 * bsc#1229341 * bsc#1229345 * bsc#1229346 * bsc#1229347 * bsc#1229349 * bsc#1229350 * bsc#1229351 * bsc#1229354 * bsc#1229356 * bsc#1229357 * bsc#1229358 * bsc#1229359 * bsc#1229360 * bsc#1229366 * bsc#1229370 * bsc#1229373 * bsc#1229374 * bsc#1229381 * bsc#1229382 * bsc#1229383 * bsc#1229386 * bsc#1229388 * bsc#1229391 * bsc#1229392 * bsc#1229395 * bsc#1229398 * bsc#1229399 * bsc#1229400 * bsc#1229407 * bsc#1229409 * bsc#1229410 * bsc#1229411 * bsc#1229413 * bsc#1229414 * bsc#1229417 * bsc#1229418 * bsc#1229444 * bsc#1229453 * bsc#1229454 * bsc#1229481 * bsc#1229482 * bsc#1229488 * bsc#1229489 * bsc#1229490 * bsc#1229493 * bsc#1229495 * bsc#1229497 * bsc#1229500 * bsc#1229503 * bsc#1229506 * bsc#1229507 * bsc#1229508 * bsc#1229509 * bsc#1229510 * bsc#1229512 * bsc#1229516 * bsc#1229521 * bsc#1229522 * bsc#1229523 * bsc#1229524 * bsc#1229525 * bsc#1229526 * bsc#1229527 * bsc#1229528 * bsc#1229529 * bsc#1229531 * bsc#1229533 * bsc#1229535 * bsc#1229536 * bsc#1229537 * bsc#1229540 * bsc#1229544 * bsc#1229545 * bsc#1229546 * bsc#1229547 * bsc#1229548 * bsc#1229554 * bsc#1229557 * bsc#1229558 * bsc#1229559 * bsc#1229560 * bsc#1229562 * bsc#1229564 * bsc#1229565 * bsc#1229566 * bsc#1229568 * bsc#1229569 * bsc#1229572 * bsc#1229573 * bsc#1229576 * bsc#1229581 * bsc#1229588 * bsc#1229598 * bsc#1229603 * bsc#1229604 * bsc#1229605 * bsc#1229608 * bsc#1229611 * bsc#1229612 * bsc#1229613 * bsc#1229614 * bsc#1229615 * bsc#1229616 * bsc#1229617 * bsc#1229620 * bsc#1229622 * bsc#1229623 * bsc#1229624 * bsc#1229625 * bsc#1229626 * bsc#1229628 * bsc#1229629 * bsc#1229630 * bsc#1229631 * bsc#1229632 * bsc#1229635 * bsc#1229636 * bsc#1229637 * bsc#1229638 * bsc#1229639 * bsc#1229641 * bsc#1229642 * bsc#1229643 * bsc#1229645 * bsc#1229657 * bsc#1229658 * bsc#1229662 * bsc#1229664 * bsc#1229707 * bsc#1229739 * bsc#1229743 * bsc#1229746 * bsc#1229754 * bsc#1229755 * bsc#1229756 * bsc#1229759 * bsc#1229761 * bsc#1229767 * bsc#1229768 * bsc#1229781 * bsc#1229784 * bsc#1229787 * bsc#1229788 * bsc#1229789 * bsc#1229792 * bsc#1229820 * bsc#1230413 * jsc#PED-8491 * jsc#PED-8779 Cross-References: * CVE-2021-4204 * CVE-2021-4441 * CVE-2021-47106 * CVE-2021-47517 * CVE-2021-47546 * CVE-2022-0500 * CVE-2022-23222 * CVE-2022-38457 * CVE-2022-40133 * CVE-2022-4382 * CVE-2022-48645 * CVE-2022-48706 * CVE-2022-48808 * CVE-2022-48865 * CVE-2022-48868 * CVE-2022-48869 * CVE-2022-48870 * CVE-2022-48871 * CVE-2022-48872 * CVE-2022-48873 * CVE-2022-48875 * CVE-2022-48878 * CVE-2022-48880 * CVE-2022-48881 * CVE-2022-48882 * CVE-2022-48883 * CVE-2022-48884 * CVE-2022-48885 * CVE-2022-48886 * CVE-2022-48887 * CVE-2022-48888 * CVE-2022-48889 * CVE-2022-48890 * CVE-2022-48891 * CVE-2022-48893 * CVE-2022-48896 * CVE-2022-48898 * CVE-2022-48899 * CVE-2022-48903 * CVE-2022-48904 * CVE-2022-48905 * CVE-2022-48906 * CVE-2022-48907 * CVE-2022-48909 * CVE-2022-48910 * CVE-2022-48912 * CVE-2022-48913 * CVE-2022-48914 * CVE-2022-48915 * CVE-2022-48916 * CVE-2022-48917 * CVE-2022-48918 * CVE-2022-48919 * CVE-2022-48920 * CVE-2022-48921 * CVE-2022-48923 * CVE-2022-48924 * CVE-2022-48925 * CVE-2022-48926 * CVE-2022-48927 * CVE-2022-48928 * CVE-2022-48929 * CVE-2022-48930 * CVE-2022-48931 * CVE-2022-48932 * CVE-2022-48934 * CVE-2022-48937 * CVE-2022-48938 * CVE-2022-48939 * CVE-2022-48940 * CVE-2022-48941 * CVE-2022-48942 * CVE-2022-48943 * CVE-2023-3610 * CVE-2023-52458 * CVE-2023-52489 * CVE-2023-52498 * CVE-2023-52581 * CVE-2023-52859 * CVE-2023-52887 * CVE-2023-52889 * CVE-2023-52893 * CVE-2023-52894 * CVE-2023-52896 * CVE-2023-52898 * CVE-2023-52899 * CVE-2023-52900 * CVE-2023-52901 * CVE-2023-52904 * CVE-2023-52905 * CVE-2023-52906 * CVE-2023-52907 * CVE-2023-52908 * CVE-2023-52909 * CVE-2023-52910 * CVE-2023-52911 * CVE-2023-52912 * CVE-2023-52913 * CVE-2024-26631 * CVE-2024-26668 * CVE-2024-26669 * CVE-2024-26677 * CVE-2024-26735 * CVE-2024-26808 * CVE-2024-26812 * CVE-2024-26835 * CVE-2024-26851 * CVE-2024-27010 * CVE-2024-27011 * CVE-2024-27016 * CVE-2024-27024 * CVE-2024-27079 * CVE-2024-27403 * CVE-2024-31076 * CVE-2024-35897 * CVE-2024-35902 * CVE-2024-35945 * CVE-2024-35971 * CVE-2024-36009 * CVE-2024-36013 * CVE-2024-36270 * CVE-2024-36286 * CVE-2024-36489 * CVE-2024-36929 * CVE-2024-36933 * CVE-2024-36936 * CVE-2024-36962 * CVE-2024-38554 * CVE-2024-38602 * CVE-2024-38662 * CVE-2024-39489 * CVE-2024-40905 * CVE-2024-40978 * CVE-2024-40980 * CVE-2024-40995 * CVE-2024-41000 * CVE-2024-41007 * CVE-2024-41009 * CVE-2024-41011 * CVE-2024-41016 * CVE-2024-41020 * CVE-2024-41022 * CVE-2024-41035 * CVE-2024-41036 * CVE-2024-41038 * CVE-2024-41039 * CVE-2024-41042 * CVE-2024-41045 * CVE-2024-41056 * CVE-2024-41060 * CVE-2024-41062 * CVE-2024-41065 * CVE-2024-41068 * CVE-2024-41073 * CVE-2024-41079 * CVE-2024-41080 * CVE-2024-41087 * CVE-2024-41088 * CVE-2024-41089 * CVE-2024-41092 * CVE-2024-41093 * CVE-2024-41095 * CVE-2024-41097 * CVE-2024-41098 * CVE-2024-42069 * CVE-2024-42074 * CVE-2024-42076 * CVE-2024-42077 * CVE-2024-42080 * CVE-2024-42082 * CVE-2024-42085 * CVE-2024-42086 * CVE-2024-42087 * CVE-2024-42089 * CVE-2024-42090 * CVE-2024-42092 * CVE-2024-42095 * CVE-2024-42097 * CVE-2024-42098 * CVE-2024-42101 * CVE-2024-42104 * CVE-2024-42106 * CVE-2024-42107 * CVE-2024-42110 * CVE-2024-42114 * CVE-2024-42115 * CVE-2024-42119 * CVE-2024-42120 * CVE-2024-42121 * CVE-2024-42126 * CVE-2024-42127 * CVE-2024-42130 * CVE-2024-42137 * CVE-2024-42139 * CVE-2024-42142 * CVE-2024-42143 * CVE-2024-42148 * CVE-2024-42152 * CVE-2024-42155 * CVE-2024-42156 * CVE-2024-42157 * CVE-2024-42158 * CVE-2024-42162 * CVE-2024-42223 * CVE-2024-42225 * CVE-2024-42228 * CVE-2024-42229 * CVE-2024-42230 * CVE-2024-42232 * CVE-2024-42236 * CVE-2024-42237 * CVE-2024-42238 * CVE-2024-42239 * CVE-2024-42240 * CVE-2024-42244 * CVE-2024-42246 * CVE-2024-42247 * CVE-2024-42268 * CVE-2024-42271 * CVE-2024-42274 * CVE-2024-42276 * CVE-2024-42277 * CVE-2024-42280 * CVE-2024-42281 * CVE-2024-42283 * CVE-2024-42284 * CVE-2024-42285 * CVE-2024-42286 * CVE-2024-42287 * CVE-2024-42288 * CVE-2024-42289 * CVE-2024-42291 * CVE-2024-42292 * CVE-2024-42295 * CVE-2024-42301 * CVE-2024-42302 * CVE-2024-42308 * CVE-2024-42309 * CVE-2024-42310 * CVE-2024-42311 * CVE-2024-42312 * CVE-2024-42313 * CVE-2024-42315 * CVE-2024-42318 * CVE-2024-42319 * CVE-2024-42320 * CVE-2024-42322 * CVE-2024-43816 * CVE-2024-43818 * CVE-2024-43819 * CVE-2024-43821 * CVE-2024-43823 * CVE-2024-43829 * CVE-2024-43830 * CVE-2024-43831 * CVE-2024-43834 * CVE-2024-43837 * CVE-2024-43839 * CVE-2024-43841 * CVE-2024-43842 * CVE-2024-43846 * CVE-2024-43849 * CVE-2024-43853 * CVE-2024-43854 * CVE-2024-43856 * CVE-2024-43858 * CVE-2024-43860 * CVE-2024-43861 * CVE-2024-43863 * CVE-2024-43866 * CVE-2024-43867 * CVE-2024-43871 * CVE-2024-43872 * CVE-2024-43873 * CVE-2024-43879 * CVE-2024-43880 * CVE-2024-43882 * CVE-2024-43883 * CVE-2024-43884 * CVE-2024-43889 * CVE-2024-43892 * CVE-2024-43893 * CVE-2024-43894 * CVE-2024-43895 * CVE-2024-43899 * CVE-2024-43900 * CVE-2024-43902 * CVE-2024-43903 * CVE-2024-43904 * CVE-2024-43905 * CVE-2024-43907 * CVE-2024-43908 * CVE-2024-43909 * CVE-2024-44938 * CVE-2024-44939 * CVE-2024-44947 CVSS scores: * CVE-2021-4204 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-4204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2021-4441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-4441 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47106 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2021-47546 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-0500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-0500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-23222 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-23222 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-38457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-38457 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H * CVE-2022-40133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-40133 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H * CVE-2022-4382 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-4382 ( NVD ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48706 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2022-48808 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48808 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48869 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48869 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2022-48871 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-48872 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48872 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48873 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48875 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48878 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48878 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2022-48878 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48880 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-48880 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2022-48881 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-48881 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2022-48881 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-48882 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48883 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48883 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48884 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48884 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48885 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-48885 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2022-48885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48886 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48887 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48896 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48898 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48899 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48904 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48905 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48906 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2022-48906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48907 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48909 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48910 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48910 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48912 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48912 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48913 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48919 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48919 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48919 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48921 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48923 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48923 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48924 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48925 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48927 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48928 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48931 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48932 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48934 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48937 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48938 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48938 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48939 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48940 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48941 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48942 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48942 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48943 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3610 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3610 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52458 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52489 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52887 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-52887 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-52889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52894 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52894 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52896 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52898 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52898 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52898 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52899 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52900 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52906 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52909 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52910 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52912 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52912 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26812 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26835 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-26851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27024 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-31076 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36270 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36286 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-36489 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36929 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36933 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-36936 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36962 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38554 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38554 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38602 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38602 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38662 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38662 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-39489 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-39489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40905 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40978 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40980 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41000 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41007 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41007 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41011 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41011 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41020 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41020 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41022 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41022 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41036 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41036 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41038 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-41038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41039 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41039 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41045 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41060 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41062 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41065 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41065 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41068 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41073 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41088 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41092 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41097 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42082 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42086 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42086 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-42087 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-42089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42097 ( SUSE ): 2.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-42097 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2024-42098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42104 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-42104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42114 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42115 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42115 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42130 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-42130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42137 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42143 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-42143 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-42148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42148 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42152 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42155 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-42155 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42155 ( NVD ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2024-42156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42156 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42157 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42158 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42162 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42225 ( NVD ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42228 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42229 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42229 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42230 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42230 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42230 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42232 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42232 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42236 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42236 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-42236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42238 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42240 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42244 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42244 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42246 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42247 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42268 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-42268 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42271 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42271 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42271 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42274 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42276 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42277 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42277 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42280 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42283 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42283 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42284 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42285 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42286 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42286 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42287 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42289 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42291 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42301 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42308 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42309 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42310 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42311 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-42311 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42313 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42315 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42322 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43818 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43823 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43837 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43872 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43882 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43882 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43883 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-43883 ( SUSE ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43884 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43884 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43889 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43889 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43892 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43892 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43892 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43893 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43894 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43894 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43895 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43895 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43900 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43902 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43903 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43904 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43905 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43907 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44938 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-44938 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44939 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44939 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44947 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * Legacy Module 15-SP5 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP5 An update that solves 296 vulnerabilities, contains two features and has 42 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-44947: Initialize beyond-EOF page contents before setting uptodate (bsc#1229454). * CVE-2024-36936: Touch soft lockup during memory accept (bsc#1225773). * CVE-2022-48706: Do proper cleanup if IFCVF init fails (bsc#1225524). * CVE-2024-43883: Do not drop references before new references are gained (bsc#1229707). * CVE-2024-41062: Sync sock recv cb and release (bsc#1228576). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500). * CVE-2024-36270: Fix reference in patches.suse/netfilter-tproxy-bail-out-if- IP-has-been-disabled-on.patch (bsc#1226798) * CVE-2023-52489: Fix race in accessing memory_section->usage (bsc#1221326). * CVE-2024-43893: Check uartclk for zero to avoid divide by zero (bsc#1229759). * CVE-2024-43821: Fix a possible null pointer dereference (bsc#1229315). * CVE-2024-43900: Avoid use-after-free in load_firmware_cb() (bsc#1229756). * CVE-2024-44938: Fix shift-out-of-bounds in dbDiscardAG (bsc#1229792). * CVE-2024-44939: Fix null ptr deref in dtInsertEntry (bsc#1229820). * CVE-2024-41087: Fix double free on error (CVE-2024-41087,bsc#1228466). * CVE-2024-42277: Avoid NULL deref in sprd_iommu_hw_en (bsc#1229409). * CVE-2024-43902: Add null checker before passing variables (bsc#1229767). * CVE-2024-43904: Add null checks for 'stream' and 'plane' before dereferencing (bsc#1229768) * CVE-2024-43880: Put back removed metod in struct objagg_ops (bsc#1229481). * CVE-2024-43884: Add error handling to pair_device() (bsc#1229739) * CVE-2024-43899: Fix null pointer deref in dcn20_resource.c (bsc#1229754). * CVE-2022-48920: Get rid of warning on transaction commit when using flushoncommit (bsc#1229658). * CVE-2023-52906: Fix warning during failed attribute validation (bsc#1229527). * CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503) * CVE-2024-43866: Always drain health in shutdown callback (bsc#1229495). * CVE-2024-26812: Struct virqfd kABI workaround (bsc#1222808). * CVE-2022-48912: Fix use-after-free in __nf_register_net_hook() (bsc#1229641) * CVE-2024-27010: Fix mirred deadlock on device recursion (bsc#1223720). * CVE-2022-48906: Correctly set DATA_FIN timeout when number of retransmits is large (bsc#1229605) * CVE-2024-42155: Wipe copies of protected- and secure-keys (bsc#1228733). * CVE-2024-42156: Wipe copies of clear-key structures on failure (bsc#1228722). * CVE-2023-52899: Add exception protection processing for vd in axi_chan_handle_err function (bsc#1229569). * CVE-2024-42158: Use kfree_sensitive() to fix Coccinelle warnings (bsc#1228720). * CVE-2024-26631: Fix data-race in ipv6_mc_down / mld_ifc_work (bsc#1221630). * CVE-2024-43873: Always initialize seqpacket_allow (bsc#1229488) * CVE-2024-40905: Fix possible race in __fib6_drop_pcpu_from() (bsc#1227761) * CVE-2024-39489: Fix memleak in seg6_hmac_init_algo (bsc#1227623) * CVE-2021-47106: Fix use-after-free in nft_set_catchall_destroy() (bsc#1220962) * CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225428). * CVE-2024-36489: Fix missing memory barrier in tls_init (bsc#1226874) * CVE-2024-41020: Fix fcntl/close race recovery compat path (bsc#1228427). * CVE-2024-27079: Fix NULL domain on device release (bsc#1223742). * CVE-2024-35897: Discard table flag update with pending basechain deletion (bsc#1224510). * CVE-2024-27403: Restore const specifier in flow_offload_route_init() (bsc#1224415). * CVE-2024-27011: Fix memleak in map from abort path (bsc#1223803). * CVE-2024-43819: Reject memory region operations for ucontrol VMs (bsc#1229290 git-fixes). * CVE-2024-26668: Reject configurations that cause integer overflow (bsc#1222335). * CVE-2024-26835: Set dormant flag on hook register failure (bsc#1222967). * CVE-2024-26808: Handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634). * CVE-2024-27016: Validate pppoe header (bsc#1223807). * CVE-2024-35945: Prevent nullptr exceptions on ISR (bsc#1224639). * CVE-2023-52581: Fix memleak when more than 255 elements expired (bsc#1220877). * CVE-2024-36013: Fix slab-use-after-free in l2cap_connect() (bsc#1225578). * CVE-2024-43837: Fix updating attached freplace prog in prog_array map (bsc#1229297). * CVE-2024-42291: Add a per-VF limit on number of FDIR filters (bsc#1229374). * CVE-2024-42268: Fix missing lock on sync reset reload (bsc#1229391). * CVE-2024-43834: Fix invalid wait context of page_pool_destroy() (bsc#1229314) * CVE-2024-36286: Acquire rcu_read_lock() in instance_destroy_rcu() (bsc#1226801) * CVE-2024-26851: Add protection for bmp length out of range (bsc#1223074) * CVE-2024-42157: Wipe sensitive data on failure (bsc#1228727 CVE-2024-42157 git-fixes). * CVE-2024-26677: Blacklist e7870cf13d20 (" Fix delayed ACKs to not set the reference serial number") (bsc#1222387) * CVE-2024-36009: Blacklist 467324bcfe1a ("ax25: Fix netdev refcount issue") (bsc#1224542) * CVE-2023-52859: Fix use-after-free when register pmu fails (bsc#1225582). * CVE-2024-42280: Fix a use after free in hfcmulti_tx() (bsc#1229388) * CVE-2024-42284: Return non-zero value from tipc_udp_addr2str() on error (bsc#1229382) * CVE-2024-42283: Initialize all fields in dumped nexthops (bsc#1229383) * CVE-2024-42312: Always initialize i_uid/i_gid (bsc#1229357) * CVE-2024-43854: Initialize integrity buffer to zero before writing it to media (bsc#1229345) * CVE-2024-42322: Properly dereference pe in ip_vs_add_service (bsc#1229347) * CVE-2024-42308: Update DRM patch reference (bsc#1229411) * CVE-2024-42301: Fix the array out-of-bounds risk (bsc#1229407). * CVE-2024-42318: Do not lose track of restrictions on cred_transfer (bsc#1229351). * CVE-2024-26669: Fix chain template offload (bsc#1222350). * CVE-2023-52889: Fix null pointer deref when receiving skb during sock creation (bsc#1229287,). * CVE-2022-48645: Move enetc_set_psfp() out of the common enetc_set_features() (bsc#1223508). * CVE-2024-41007: Use signed arithmetic in tcp_rtx_probe0_timed_out() (bsc#1227863). * CVE-2024-36933: Use correct mac_offset to unwind gso skb in nsh_gso_segment() (bsc#1225832). * CVE-2024-42295: Handle inconsistent state in nilfs_btnode_create_block() (bsc#1229370). * CVE-2024-42319: Move devm_mbox_controller_register() after devm_pm_runtime_enable() (bsc#1229350). * CVE-2024-43860: Skip over memory region when node value is NULL (bsc#1229319). * CVE-2024-43831: Handle invalid decoder vsi (bsc#1229309). * CVE-2024-43849: Protect locator_addr with the main mutex (bsc#1229307). * CVE-2024-43841: Do not use strlen() in const context (bsc#1229304). * CVE-2024-43839: Adjust 'name' buf size of bna_tcb and bna_ccb structures (bsc#1229301). * CVE-2024-41088: Fix infinite loop when xmit fails (bsc#1228469). * CVE-2024-42281: Fix a segment issue when downgrading gso_size (bsc#1229386). * CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400) * CVE-2024-41080: Fix possible deadlock in io_register_iowq_max_workers() (bsc#1228616). * CVE-2024-42246: Remap EPERM in case of connection failure in xs_tcp_setup_socket (bsc#1228989). * CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop(). (bsc#1228959) * CVE-2024-26735: Fix possible use-after-free and null-ptr-deref (bsc#1222372). * CVE-2024-42106: Initialize pad field in struct inet_diag_req_v2 (bsc#1228493). * CVE-2024-38662: Cover verifier checks for mutating sockmap/sockhash (bsc#1226885). * CVE-2024-42110: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() (bsc#1228501). * CVE-2024-42247: Avoid unaligned 64-bit memory accesses (bsc#1228988). * CVE-2022-48865: Fix kernel panic when enabling bearer (bsc#1228065). * CVE-2023-52498: Fix possible deadlocks in core system-wide PM code (bsc#1221269). * CVE-2024-41068: Fix sclp_init() cleanup on failure (bsc#1228579). * CVE-2022-48808: Fix panic when DSA master device unbinds on shutdown (bsc#1227958). * CVE-2024-42095: Fix Errata i2310 with RX FIFO level check (bsc#1228446). * CVE-2024-40978: Fix crash while reading debugfs attribute (bsc#1227929). * CVE-2024-42107: Do not process extts if PTP is disabled (bsc#1228494). * CVE-2024-42139: Fix improper extts handling (bsc#1228503). * CVE-2024-42148: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487). * CVE-2024-42142: E-switch, Create ingress ACL when needed (bsc#1228491). * CVE-2024-42162: Account for stopped queues when reading NIC stats (bsc#1228706). * CVE-2024-42082: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482). * CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526). * CVE-2023-3610: Fixed use-after-free vulnerability in nf_tables can be exploited to achieve local privilege escalation (bsc#1213580). * CVE-2024-42228: Using uninitialized value *size when calling amdgpu_vce_cs_reloc (bsc#1228667). * CVE-2024-40995: Fix possible infinite loop in tcf_idr_check_alloc() (bsc#1227830). * CVE-2024-38602: Merge repeat codes in ax25_dev_device_down() (git-fixes CVE-2024-38602 bsc#1226613). * CVE-2024-38554: Fix reference count leak issue of net_device (bsc#1226742). * CVE-2024-36929: Reject skb_copy(_expand) for fraglist GSO skbs (bsc#1225814). * CVE-2024-41009: Fix overrunning reservations in ringbuf (bsc#1228020). * CVE-2024-27024: Fix WARNING in rds_conn_connect_if_down (bsc#1223777). The following non-security bugs were fixed: * Indicate support for IRQ ResourceSource thru _OSC (git-fixes). * Indicate support for the Generic Event Device thru _OSC (git-fixes). * Rework system-level device notification handling (git-fixes). * Drop nocrt parameter (git-fixes). * x86: s2 Post-increment variables when getting constraints (git-fixes). * Do not cross .backup mountpoint from backup volume (git-fixes). * Add HP MP9 G4 Retail System AMS to force connect list (stable-fixes). * Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes). * Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes). * Fix noise from speakers on Lenovo IdeaPad 3 15IAU7 (git-fixes). * line6: Fix racy access to midibuf (stable-fixes). * Relax start tick time check for slave timer elements (git-fixes). * Add delay quirk for VIVO USB-C-XE710 HEADSET (stable-fixes). * Re-add ScratchAmp quirk entries (git-fixes). * Support Yamaha P-125 quirk entry (stable-fixes). * Fix UBSAN warning in parse_audio_unit() (stable-fixes). * arm64: initialize all values of acpi_early_node_map to (git-fixes) * arm64: initialize all values of acpi_early_node_map to (git-fixes) * arm64: Add Neoverse-V2 part (git-fixes) * arm64: armv8_ Fix warning in isndep cpuhp starting process (git-fixes) * arm64: armv8_ Fix warning in isndep cpuhp starting process (git-fixes) * arm64: Restore spec_bar() macro (git-fixes) * arm64: Add missing .field_width for GIC system registers (git-fixes) * arm64: Fix the visibility of compat hwcaps (git-fixes) * arm64: Force HWCAP to be based on the sysreg visible to (git-fixes) * arm64: Add Cortex-A720 definitions (git-fixes) * arm64: Add Cortex-A725 definitions (git-fixes) * arm64: Add Cortex-X1C definitions (git-fixes) * arm64: Add Cortex-X3 definitions (git-fixes) * arm64: Add Cortex-X4 definitions (git-fixes) * arm64: Add Cortex-X925 definitions (git-fixes) * arm64: Add Neoverse-V3 definitions (git-fixes) * arm64: Increase VOP clk rate on RK3328 (git-fixes) * arm64: Increase VOP clk rate on RK3328 (git-fixes) * arm64: Expand speculative SSBS workaround (again) (git-fixes) * arm64: Expand speculative SSBS workaround (git-fixes) * arm64: Unify speculative SSBS errata logic (git-fixes) Also update default configuration. * arm64: Fix KASAN random tag seed initialization (git-fixes) * arm64: Fix KASAN random tag seed initialization (git-fixes) * wcd938 Correct Soundwire ports mask (git-fixes). * wsa881 Correct Soundwire ports mask (git-fixes). * fix irq scheduling issue with PREEMPT_RT (git-fixes). * Introduce async_schedule_dev_nocall() (bsc#1221269). * Split async_schedule_node_domain() (bsc#1221269). * Fix usage of __hci_cmd_sync_status (git-fixes). * hci_ Fix not handling hibernation actions (git-fixes). * l2 always unlock channel in l2cap_conless_channel() (git-fixes). * L2 Fix deadlock (git-fixes). * Fix a kernel verifier crash in stacksafe() (bsc#1225903). * remove unused declaring of bpf_kprobe_override (git-fixes). * fix leak of qgroup extent records after transaction abort (git-fixes). * make btrfs_destroy_delayed_refs() return void (git-fixes). * remove unnecessary prototype declarations at disk-io.c (git-fixes). * update fs features directory asynchronously (bsc#1226168). * propagate errors from vfs_getxattr() to avoid infinite loop (bsc#1229418). * issue a cap release immediately if no cap exists (bsc#1225162). * periodically flush the cap releases (bsc#1225162). * Enable SMT only if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes). * cpuidle, Evaluate LPI arch_flags for broadcast timer (git-fixes). * Fix register ID of SPSR_FIQ (git-fixes). * add missing MODULE_DESCRIPTION() macros (stable-fixes). * Add labels for both Valve Steam Deck revisions (stable-fixes). * Add quirk for Aya Neo KUN (stable-fixes). * Add quirk for Lenovo Yoga Tab 3 X90F (stable-fixes). * Add quirk for Nanote UMPC-01 (stable-fixes). * Add quirk for OrangePi Neo (stable-fixes). * drm/amd/amdgpu/imu_v11_0: Increase buffer size to ensure all possible values can be stored (stable-fixes). * Add NULL check for 'afb' before dereferencing in amdgpu_dm_plane_handle_cursor_update (stable-fixes). * avoid using null object of framebuffer (git-fixes). * Fix && vs || typos (git-fixes). * Skip Recompute DSC Params if no Stream on Link (stable-fixes). * Validate hw_points_num before using it (stable-fixes). * Fix the null pointer dereference for vega10_hwmgr (stable-fixes). * Actually check flags for all context ops (stable-fixes). * Add lock around VF RLCG interface (stable-fixes). * fix dereference null return value for the function amdgpu_vm_pt_parent (stable-fixes). * Fix the null pointer dereference to ras_manager (stable-fixes). * Validate TA binary size (stable-fixes). * drm/amdgpu/jpeg2: properly set atomics vmid field (stable-fixes). * Fix the null pointer dereference for smu7 (stable-fixes). * Fix the null pointer dereference in apply_state_adjust_rules (stable-fixes). * Fix the param type of set_power_profile_mode (stable-fixes). * analogix_ properly handle zero sized AUX transactions (stable-fixes). * tc358768: Attempt to fix DSI horizontal timings (stable-fixes). * fix null pointer dereference in drm_client_modeset_probe (git-fixes). * drm/dp_ Skip CSN if topology probing is not done yet (stable-fixes). * set gp bus_stop bit before hard reset (stable-fixes). * reset the link phy params before link training (git-fixes). * cleanup FB if dpu_format_populate_layout fails (git-fixes). * do not play tricks with debug macros (git-fixes). * Zero-initialize iosys_map (stable-fixes). * fix inode->i_blocks for non-512 byte sector size device (git-fixes). * fix potential deadlock on __exfat_get_dentry_set (git-fixes). * redefine DIR_DELETED as the bad cluster number (git-fixes). * support dynamic allocate bh for exfat_entry_set_cache (git-fixes). * fs/netfs/fscache_ add missing "n_accesses" check (bsc#1229453). * Initialize beyond-EOF page contents before setting uptodate (bsc#1229454). * Add might_sleep() to disable_irq() (git-fixes). * Always limit the affinity to online CPUs (git-fixes). * Do not return error on missing optional irq_request_resources() (git-fixes). * Take the proposed affinity at face value if force==true (git-fixes). * genirq/cpuhotplug, x86 Prevent vector leak during CPU offline (git-fixes). * genirq/generic_ Make irq_remove_generic_chip() irqdomain aware (git-fixes). * Fix NULL pointer deref in irq_data_get_affinity_mask() (git-fixes). * Do not try to remove non-existing sysfs files (git-fixes). * Exclude managed interrupts in irq_matrix_allocated() (git-fixes). * Shutdown managed interrupts with unsatifiable affinities (git-fixes). * gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey (git- fixes). * fix to initialize fields of hfs_inode_info after hfs_alloc_inode() (git- fixes). * i2 Improve handling of stuck alerts (git-fixes). * i2 Send alert notifications to all devices if source not found (git-fixes). * Convert comma to semicolon (git-fixes). * ip6_ Fix broken GRO (bsc#1229444). * ipv6: fix incorrect unregister order (git-fixes). * Drop bogus fwspec-mapping error handling (git-fixes). * Fix association race (git-fixes). * Fix disassociation race (git-fixes). * Fix domain registration race (git-fixes). * Fix mapping-creation race (git-fixes). * Fixed unbalanced fwnode get and put (git-fixes). * Look for existing mapping only once (git-fixes). * Refactor __irq_domain_alloc_irqs() (git-fixes). * Report irq number for NOMAP domains (git-fixes). * Revert "mm: prevent derefencing NULL ptr in pfn_section_valid()" (bsc#1230413). * Revert "mm, kmsan: fix infinite recursion due to RCU critical section" (bsc#1230413). * Revert "mm/sparsemem: fix race in accessing memory_section->usage" (bsc#1230413). * kernel/irq/irqdomain. fix memory leak with using debugfs_lookup() (git- fixes). * Fix to check symbol prefixes correctly (git-fixes). * move from strlcpy with unused retval to strscpy (git-fixes). * protect concurrent access to mem_cgroup_idr (git-fixes). * mm, fix infinite recursion due to RCU critical section (git-fixes). * prevent derefencing NULL ptr in pfn_section_valid() (git-fixes). * dw_ allow biu and ciu clocks to defer (git-fixes). * mmc_ Fix NULL dereference on allocation failure (git-fixes). * ks8851: Fix another TX stall caused by wrong ISR flag handling (git-fixes). * ks8851: Fix deadlock with the SPI chip variant (git-fixes). * ks8851: Fix potential TX stall after interface reopen (git-fixes). * ks8851: Fix TX stall caused by TX buffer overrun (gix-fixes). * Add support for page sizes other than 4KB on ARM64 (jsc#PED-8491 bsc#1226530). * Fix doorbell out of order violation and avoid unnecessary doorbell rings (bsc#1229154). * Fix race of mana_hwc_post_rx_wqe and new hwc response (git-fixes). * Fix RX buf alloc_size alignment and atomic op panic (bsc#1229086). * remove two BUG() from skb_checksum_help() (bsc#1229312). * qmi_ fix memory leak for not ip packets (git-fixes). * fix possible cp null dereference (git-fixes). * initialize noop_qdisc owner (git-fixes). * pn533: Add poll mod list filling check (git-fixes). * expose /proc/net/sunrpc/nfs in net namespaces (git-fixes). * make the rpc_stat per net namespace (git-fixes). * add posix ACLs to struct nfsd_attrs (git-fixes). * add security label to struct nfsd_attrs (git-fixes). * fix regression with setting ACLs (git-fixes). * Fix strncpy() fortify warning (git-fixes). * Increase NFSD_MAX_OPS_PER_COMPOUND (git-fixes). * introduce struct nfsd_attrs (git-fixes). * move from strlcpy with unused retval to strscpy (git-fixes). * Optimize DRC bucket pruning (git-fixes). * return error if nfs4_setacl fails (git-fixes). * set attributes when creating symlinks (git-fixes). * use locks_inode_context helper (git-fixes). * nilfs2: Remove check for PageError (git-fixes). * nvme_ scan namespaces asynchronously (bsc#1224105). * ocfs2: use coarse time for new created files (git-fixes). * Fix possible divide-by-0 panic in padata_mt_helper() (git-fixes). * perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09 (git- fixes). * platform/x86 Add support for ACPI based probing (jsc#PED-8779). * platform/x86 Cache pci_dev in struct hsmp_socket (jsc#PED-8779). * platform/x86 Change devm_kzalloc() to devm_kcalloc() (jsc#PED-8779). * platform/x86 Check HSMP support on AMD family of processors (jsc#PED-8779). * platform/x86 Check num_sockets against MAX_AMD_SOCKETS (jsc#PED-8779). * platform/x86 Create static func to handle platdev (jsc#PED-8779). * platform/x86 Define a struct to hold mailbox regs (jsc#PED-8779). * platform/x86 Move dev from platdev to hsmp_socket (jsc#PED-8779). * platform/x86 Move hsmp_test to probe (jsc#PED-8779). * platform/x86 Non-ACPI support for AMD F1A_M00~0Fh (jsc#PED-8779). * platform/x86 Remove extra parenthesis and add a space (jsc#PED-8779). * platform/x86 Restructure sysfs group creation (jsc#PED-8779). * platform/x86 switch to use device_add_groups() (jsc#PED-8779). * axp288_ Fix constant_charge_voltage writes (git-fixes). * axp288_ Round constant_charge_voltage writes down (git-fixes). * Fail build if using recordmcount with binutils v2.37 (bsc#1194869). * Mark .opd section read-only (bsc#1194869). * use generic version of arch_is_kernel_initmem_freed() (bsc#1194869). * xor_ Add '-mhard-float' to CFLAGS (bsc#1194869). * powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for CONFIG_PCI=n (bsc#1194869). * Avoid clang null pointer arithmetic warnings (bsc#1194869). * powerpc/kexec_ fix cpus node update to FDT (bsc#1194869). * make the update_cpus_node() function public (bsc#1194869). * split CONFIG_KEXEC_FILE and CONFIG_CRASH_DUMP (bsc#1194869). * Add failure related checks for h_get_mpp and h_get_ppp (bsc#1194869). * Whitelist dtl slub object for copying to userspace (bsc#1194869). * Move some functions into #ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE (bsc#1194869). * Check if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes). * Check cpu id in commands "c#", "dp#" and "dx#" (bsc#1194869). * RDMA/mana_ Use virtual address in dma regions for MRs (git-fixes). * Fix incomplete state save in rxe_requester (git-fixes) * Fix rxe_modify_srq (git-fixes) * Handle zero length rdma (git-fixes) * Move work queue code to subroutines (git-fixes) * s390 get rid of register asm (git-fixes bsc#1227079 bsc#1229187). * s390 Make use of invalid opcode produce a link error (git-fixes bsc#1227079). * s390 Split and rework cpacf query functions (git-fixes bsc#1229187). * s390 fix error checks in dasd_copy_pair_store() (git-fixes bsc#1229190). * s390 fix error recovery leading to data corruption on ESE devices (git-fixes bsc#1229573). * s390 Prevent release of buffer in I/O (git-fixes bsc#1229572). * s390 Panic for set and remove shared access UVC errors (git-fixes bsc#1229188). * Fix scldiv calculation (git-fixes). * add a struct rpc_stats arg to rpc_create_args (git-fixes). * Fix a race to wake a sync task (git-fixes). * fix swiotlb_bounce() to do partial sync's correctly (git-fixes). * fix compat_sys_io_pgetevents_time64 usage (git-fixes). * Return from tracing_buffers_read() if the file has been closed (bsc#1229136 git-fixes). * add check for crypto_shash_tfm_digest (git-fixes). * dbg_orphan_ Fix missed key type checking (git-fixes). * Fix adding orphan entry twice for the same inode (git-fixes). * Fix unattached xattr inode if powercut happens after deleting (git-fixes). * fix potential memory leak in vfio_intx_enable() (git-fixes). * fix wgds rev 3 exact size (git-fixes). * duplicate static structs used in driver instances (git-fixes). * x86 drop the duplicate APM_MINOR_DEV macro (git-fixes). * x86 Fix PUSH instruction in x86 instruction decoder opcode map (git-fixes). * x86 Fix pti_clone_entry_text() for i386 (git-fixes). * x86 Check if fixed MTRRs exist before saving them (git-fixes). * x86 Work around false positive kmemleak report in msr_build_context() (git- fixes). * Fix missing interval for missing_owner in xfs fsmap (git-fixes). * Fix the owner setting issue for rmap query in xfs fsmap (git-fixes). * use XFS_BUF_DADDR_NULL for daddrs in getfsmap code (git-fixes). * Fix Panther point NULL pointer deref at full-speed re-enumeration (git- fixes). * Fix rpcrdma_reqs_reset() (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-3483=1 openSUSE-SLE-15.5-2024-3483=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3483=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-3483=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3483=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3483=1 * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-3483=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3483=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-3483=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-3483=1 ## Package List: * openSUSE Leap 15.5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.80.2 * openSUSE Leap 15.5 (noarch) * kernel-docs-html-5.14.21-150500.55.80.2 * kernel-source-5.14.21-150500.55.80.2 * kernel-macros-5.14.21-150500.55.80.2 * kernel-source-vanilla-5.14.21-150500.55.80.2 * kernel-devel-5.14.21-150500.55.80.2 * openSUSE Leap 15.5 (nosrc ppc64le x86_64) * kernel-debug-5.14.21-150500.55.80.2 * openSUSE Leap 15.5 (ppc64le x86_64) * kernel-debug-devel-5.14.21-150500.55.80.2 * kernel-debug-livepatch-devel-5.14.21-150500.55.80.2 * kernel-debug-debugsource-5.14.21-150500.55.80.2 * kernel-debug-devel-debuginfo-5.14.21-150500.55.80.2 * kernel-debug-debuginfo-5.14.21-150500.55.80.2 * openSUSE Leap 15.5 (x86_64) * kernel-kvmsmall-vdso-debuginfo-5.14.21-150500.55.80.2 * kernel-kvmsmall-vdso-5.14.21-150500.55.80.2 * kernel-debug-vdso-5.14.21-150500.55.80.2 * kernel-default-vdso-5.14.21-150500.55.80.2 * kernel-debug-vdso-debuginfo-5.14.21-150500.55.80.2 * kernel-default-vdso-debuginfo-5.14.21-150500.55.80.2 * openSUSE Leap 15.5 (aarch64 ppc64le x86_64) * kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.80.2 * kernel-kvmsmall-debugsource-5.14.21-150500.55.80.2 * kernel-kvmsmall-debuginfo-5.14.21-150500.55.80.2 * kernel-default-base-rebuild-5.14.21-150500.55.80.2.150500.6.35.6 * kernel-kvmsmall-devel-debuginfo-5.14.21-150500.55.80.2 * kernel-kvmsmall-devel-5.14.21-150500.55.80.2 * kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-5.14.21-150500.55.80.2 * kernel-default-debugsource-5.14.21-150500.55.80.2 * gfs2-kmp-default-5.14.21-150500.55.80.2 * dlm-kmp-default-debuginfo-5.14.21-150500.55.80.2 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.80.2 * kernel-default-debuginfo-5.14.21-150500.55.80.2 * kernel-obs-build-debugsource-5.14.21-150500.55.80.1 * kernel-default-optional-debuginfo-5.14.21-150500.55.80.2 * cluster-md-kmp-default-5.14.21-150500.55.80.2 * kernel-default-livepatch-5.14.21-150500.55.80.2 * dlm-kmp-default-5.14.21-150500.55.80.2 * kernel-default-extra-5.14.21-150500.55.80.2 * kernel-syms-5.14.21-150500.55.80.1 * kernel-obs-qa-5.14.21-150500.55.80.1 * kselftests-kmp-default-5.14.21-150500.55.80.2 * kernel-default-livepatch-devel-5.14.21-150500.55.80.2 * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.80.2 * ocfs2-kmp-default-5.14.21-150500.55.80.2 * kernel-default-devel-debuginfo-5.14.21-150500.55.80.2 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.80.2 * kselftests-kmp-default-debuginfo-5.14.21-150500.55.80.2 * kernel-obs-build-5.14.21-150500.55.80.1 * kernel-default-extra-debuginfo-5.14.21-150500.55.80.2 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.80.2 * kernel-default-optional-5.14.21-150500.55.80.2 * reiserfs-kmp-default-5.14.21-150500.55.80.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.80.2 * openSUSE Leap 15.5 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150500.55.80.2 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_80-default-debuginfo-1-150500.11.3.2 * kernel-livepatch-SLE15-SP5_Update_19-debugsource-1-150500.11.3.2 * kernel-livepatch-5_14_21-150500_55_80-default-1-150500.11.3.2 * openSUSE Leap 15.5 (nosrc s390x) * kernel-zfcpdump-5.14.21-150500.55.80.2 * openSUSE Leap 15.5 (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150500.55.80.2 * kernel-zfcpdump-debugsource-5.14.21-150500.55.80.2 * openSUSE Leap 15.5 (nosrc) * dtb-aarch64-5.14.21-150500.55.80.1 * openSUSE Leap 15.5 (aarch64) * dtb-arm-5.14.21-150500.55.80.1 * gfs2-kmp-64kb-5.14.21-150500.55.80.2 * kernel-64kb-debuginfo-5.14.21-150500.55.80.2 * dtb-amazon-5.14.21-150500.55.80.1 * kernel-64kb-debugsource-5.14.21-150500.55.80.2 * dtb-altera-5.14.21-150500.55.80.1 * kernel-64kb-optional-debuginfo-5.14.21-150500.55.80.2 * dtb-lg-5.14.21-150500.55.80.1 * dtb-exynos-5.14.21-150500.55.80.1 * dtb-rockchip-5.14.21-150500.55.80.1 * dtb-qcom-5.14.21-150500.55.80.1 * ocfs2-kmp-64kb-5.14.21-150500.55.80.2 * dtb-amlogic-5.14.21-150500.55.80.1 * kernel-64kb-devel-debuginfo-5.14.21-150500.55.80.2 * kselftests-kmp-64kb-5.14.21-150500.55.80.2 * dtb-nvidia-5.14.21-150500.55.80.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150500.55.80.2 * cluster-md-kmp-64kb-5.14.21-150500.55.80.2 * dtb-amd-5.14.21-150500.55.80.1 * dtb-xilinx-5.14.21-150500.55.80.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150500.55.80.2 * dlm-kmp-64kb-debuginfo-5.14.21-150500.55.80.2 * dtb-allwinner-5.14.21-150500.55.80.1 * dtb-broadcom-5.14.21-150500.55.80.1 * dtb-socionext-5.14.21-150500.55.80.1 * dtb-sprd-5.14.21-150500.55.80.1 * dtb-freescale-5.14.21-150500.55.80.1 * kernel-64kb-devel-5.14.21-150500.55.80.2 * dtb-apm-5.14.21-150500.55.80.1 * dtb-apple-5.14.21-150500.55.80.1 * dlm-kmp-64kb-5.14.21-150500.55.80.2 * kernel-64kb-optional-5.14.21-150500.55.80.2 * reiserfs-kmp-64kb-5.14.21-150500.55.80.2 * cluster-md-kmp-64kb-debuginfo-5.14.21-150500.55.80.2 * kernel-64kb-extra-5.14.21-150500.55.80.2 * ocfs2-kmp-64kb-debuginfo-5.14.21-150500.55.80.2 * dtb-cavium-5.14.21-150500.55.80.1 * dtb-marvell-5.14.21-150500.55.80.1 * gfs2-kmp-64kb-debuginfo-5.14.21-150500.55.80.2 * kernel-64kb-livepatch-devel-5.14.21-150500.55.80.2 * dtb-hisilicon-5.14.21-150500.55.80.1 * dtb-mediatek-5.14.21-150500.55.80.1 * dtb-renesas-5.14.21-150500.55.80.1 * kernel-64kb-extra-debuginfo-5.14.21-150500.55.80.2 * openSUSE Leap 15.5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.80.2 * openSUSE Leap Micro 5.5 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150500.55.80.2 * openSUSE Leap Micro 5.5 (aarch64 x86_64) * kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150500.55.80.2 * kernel-default-debugsource-5.14.21-150500.55.80.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.80.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64) * kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * kernel-default-debuginfo-5.14.21-150500.55.80.2 * kernel-default-debugsource-5.14.21-150500.55.80.2 * Basesystem Module 15-SP5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.80.2 * Basesystem Module 15-SP5 (aarch64) * kernel-64kb-debuginfo-5.14.21-150500.55.80.2 * kernel-64kb-debugsource-5.14.21-150500.55.80.2 * kernel-64kb-devel-5.14.21-150500.55.80.2 * kernel-64kb-devel-debuginfo-5.14.21-150500.55.80.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.80.2 * Basesystem Module 15-SP5 (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-5.14.21-150500.55.80.2 * kernel-default-devel-debuginfo-5.14.21-150500.55.80.2 * kernel-default-debuginfo-5.14.21-150500.55.80.2 * kernel-default-debugsource-5.14.21-150500.55.80.2 * Basesystem Module 15-SP5 (noarch) * kernel-macros-5.14.21-150500.55.80.2 * kernel-devel-5.14.21-150500.55.80.2 * Basesystem Module 15-SP5 (nosrc s390x) * kernel-zfcpdump-5.14.21-150500.55.80.2 * Basesystem Module 15-SP5 (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150500.55.80.2 * kernel-zfcpdump-debugsource-5.14.21-150500.55.80.2 * Development Tools Module 15-SP5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.80.2 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-5.14.21-150500.55.80.1 * kernel-syms-5.14.21-150500.55.80.1 * kernel-obs-build-debugsource-5.14.21-150500.55.80.1 * Development Tools Module 15-SP5 (noarch) * kernel-source-5.14.21-150500.55.80.2 * Legacy Module 15-SP5 (nosrc) * kernel-default-5.14.21-150500.55.80.2 * Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.80.2 * reiserfs-kmp-default-5.14.21-150500.55.80.2 * kernel-default-debuginfo-5.14.21-150500.55.80.2 * kernel-default-debugsource-5.14.21-150500.55.80.2 * SUSE Linux Enterprise Live Patching 15-SP5 (nosrc) * kernel-default-5.14.21-150500.55.80.2 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_19-debugsource-1-150500.11.3.2 * kernel-default-debugsource-5.14.21-150500.55.80.2 * kernel-default-debuginfo-5.14.21-150500.55.80.2 * kernel-livepatch-5_14_21-150500_55_80-default-1-150500.11.3.2 * kernel-default-livepatch-devel-5.14.21-150500.55.80.2 * kernel-livepatch-5_14_21-150500_55_80-default-debuginfo-1-150500.11.3.2 * kernel-default-livepatch-5.14.21-150500.55.80.2 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-5.14.21-150500.55.80.2 * dlm-kmp-default-debuginfo-5.14.21-150500.55.80.2 * kernel-default-debugsource-5.14.21-150500.55.80.2 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.80.2 * kernel-default-debuginfo-5.14.21-150500.55.80.2 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.80.2 * gfs2-kmp-default-5.14.21-150500.55.80.2 * ocfs2-kmp-default-5.14.21-150500.55.80.2 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.80.2 * cluster-md-kmp-default-5.14.21-150500.55.80.2 * SUSE Linux Enterprise High Availability Extension 15 SP5 (nosrc) * kernel-default-5.14.21-150500.55.80.2 * SUSE Linux Enterprise Workstation Extension 15 SP5 (nosrc) * kernel-default-5.14.21-150500.55.80.2 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * kernel-default-extra-5.14.21-150500.55.80.2 * kernel-default-debuginfo-5.14.21-150500.55.80.2 * kernel-default-extra-debuginfo-5.14.21-150500.55.80.2 * kernel-default-debugsource-5.14.21-150500.55.80.2 ## References: * https://www.suse.com/security/cve/CVE-2021-4204.html * https://www.suse.com/security/cve/CVE-2021-4441.html * https://www.suse.com/security/cve/CVE-2021-47106.html * https://www.suse.com/security/cve/CVE-2021-47517.html * https://www.suse.com/security/cve/CVE-2021-47546.html * https://www.suse.com/security/cve/CVE-2022-0500.html * https://www.suse.com/security/cve/CVE-2022-23222.html * https://www.suse.com/security/cve/CVE-2022-38457.html * https://www.suse.com/security/cve/CVE-2022-40133.html * https://www.suse.com/security/cve/CVE-2022-4382.html * https://www.suse.com/security/cve/CVE-2022-48645.html * https://www.suse.com/security/cve/CVE-2022-48706.html * https://www.suse.com/security/cve/CVE-2022-48808.html * https://www.suse.com/security/cve/CVE-2022-48865.html * https://www.suse.com/security/cve/CVE-2022-48868.html * https://www.suse.com/security/cve/CVE-2022-48869.html * https://www.suse.com/security/cve/CVE-2022-48870.html * https://www.suse.com/security/cve/CVE-2022-48871.html * https://www.suse.com/security/cve/CVE-2022-48872.html * https://www.suse.com/security/cve/CVE-2022-48873.html * https://www.suse.com/security/cve/CVE-2022-48875.html * https://www.suse.com/security/cve/CVE-2022-48878.html * https://www.suse.com/security/cve/CVE-2022-48880.html * https://www.suse.com/security/cve/CVE-2022-48881.html * https://www.suse.com/security/cve/CVE-2022-48882.html * https://www.suse.com/security/cve/CVE-2022-48883.html * https://www.suse.com/security/cve/CVE-2022-48884.html * https://www.suse.com/security/cve/CVE-2022-48885.html * https://www.suse.com/security/cve/CVE-2022-48886.html * https://www.suse.com/security/cve/CVE-2022-48887.html * https://www.suse.com/security/cve/CVE-2022-48888.html * https://www.suse.com/security/cve/CVE-2022-48889.html * https://www.suse.com/security/cve/CVE-2022-48890.html * https://www.suse.com/security/cve/CVE-2022-48891.html * https://www.suse.com/security/cve/CVE-2022-48893.html * https://www.suse.com/security/cve/CVE-2022-48896.html * https://www.suse.com/security/cve/CVE-2022-48898.html * https://www.suse.com/security/cve/CVE-2022-48899.html * https://www.suse.com/security/cve/CVE-2022-48903.html * https://www.suse.com/security/cve/CVE-2022-48904.html * https://www.suse.com/security/cve/CVE-2022-48905.html * https://www.suse.com/security/cve/CVE-2022-48906.html * https://www.suse.com/security/cve/CVE-2022-48907.html * https://www.suse.com/security/cve/CVE-2022-48909.html * https://www.suse.com/security/cve/CVE-2022-48910.html * https://www.suse.com/security/cve/CVE-2022-48912.html * https://www.suse.com/security/cve/CVE-2022-48913.html * https://www.suse.com/security/cve/CVE-2022-48914.html * https://www.suse.com/security/cve/CVE-2022-48915.html * https://www.suse.com/security/cve/CVE-2022-48916.html * https://www.suse.com/security/cve/CVE-2022-48917.html * https://www.suse.com/security/cve/CVE-2022-48918.html * https://www.suse.com/security/cve/CVE-2022-48919.html * https://www.suse.com/security/cve/CVE-2022-48920.html * https://www.suse.com/security/cve/CVE-2022-48921.html * https://www.suse.com/security/cve/CVE-2022-48923.html * https://www.suse.com/security/cve/CVE-2022-48924.html * https://www.suse.com/security/cve/CVE-2022-48925.html * https://www.suse.com/security/cve/CVE-2022-48926.html * https://www.suse.com/security/cve/CVE-2022-48927.html * https://www.suse.com/security/cve/CVE-2022-48928.html * https://www.suse.com/security/cve/CVE-2022-48929.html * https://www.suse.com/security/cve/CVE-2022-48930.html * https://www.suse.com/security/cve/CVE-2022-48931.html * https://www.suse.com/security/cve/CVE-2022-48932.html * https://www.suse.com/security/cve/CVE-2022-48934.html * https://www.suse.com/security/cve/CVE-2022-48937.html * https://www.suse.com/security/cve/CVE-2022-48938.html * https://www.suse.com/security/cve/CVE-2022-48939.html * https://www.suse.com/security/cve/CVE-2022-48940.html * https://www.suse.com/security/cve/CVE-2022-48941.html * https://www.suse.com/security/cve/CVE-2022-48942.html * https://www.suse.com/security/cve/CVE-2022-48943.html * https://www.suse.com/security/cve/CVE-2023-3610.html * https://www.suse.com/security/cve/CVE-2023-52458.html * https://www.suse.com/security/cve/CVE-2023-52489.html * https://www.suse.com/security/cve/CVE-2023-52498.html * https://www.suse.com/security/cve/CVE-2023-52581.html * https://www.suse.com/security/cve/CVE-2023-52859.html * https://www.suse.com/security/cve/CVE-2023-52887.html * https://www.suse.com/security/cve/CVE-2023-52889.html * https://www.suse.com/security/cve/CVE-2023-52893.html * https://www.suse.com/security/cve/CVE-2023-52894.html * https://www.suse.com/security/cve/CVE-2023-52896.html * https://www.suse.com/security/cve/CVE-2023-52898.html * https://www.suse.com/security/cve/CVE-2023-52899.html * https://www.suse.com/security/cve/CVE-2023-52900.html * https://www.suse.com/security/cve/CVE-2023-52901.html * https://www.suse.com/security/cve/CVE-2023-52904.html * https://www.suse.com/security/cve/CVE-2023-52905.html * https://www.suse.com/security/cve/CVE-2023-52906.html * https://www.suse.com/security/cve/CVE-2023-52907.html * https://www.suse.com/security/cve/CVE-2023-52908.html * https://www.suse.com/security/cve/CVE-2023-52909.html * https://www.suse.com/security/cve/CVE-2023-52910.html * https://www.suse.com/security/cve/CVE-2023-52911.html * https://www.suse.com/security/cve/CVE-2023-52912.html * https://www.suse.com/security/cve/CVE-2023-52913.html * https://www.suse.com/security/cve/CVE-2024-26631.html * https://www.suse.com/security/cve/CVE-2024-26668.html * https://www.suse.com/security/cve/CVE-2024-26669.html * https://www.suse.com/security/cve/CVE-2024-26677.html * https://www.suse.com/security/cve/CVE-2024-26735.html * https://www.suse.com/security/cve/CVE-2024-26808.html * https://www.suse.com/security/cve/CVE-2024-26812.html * https://www.suse.com/security/cve/CVE-2024-26835.html * https://www.suse.com/security/cve/CVE-2024-26851.html * https://www.suse.com/security/cve/CVE-2024-27010.html * https://www.suse.com/security/cve/CVE-2024-27011.html * https://www.suse.com/security/cve/CVE-2024-27016.html * https://www.suse.com/security/cve/CVE-2024-27024.html * https://www.suse.com/security/cve/CVE-2024-27079.html * https://www.suse.com/security/cve/CVE-2024-27403.html * https://www.suse.com/security/cve/CVE-2024-31076.html * https://www.suse.com/security/cve/CVE-2024-35897.html * https://www.suse.com/security/cve/CVE-2024-35902.html * https://www.suse.com/security/cve/CVE-2024-35945.html * https://www.suse.com/security/cve/CVE-2024-35971.html * https://www.suse.com/security/cve/CVE-2024-36009.html * https://www.suse.com/security/cve/CVE-2024-36013.html * https://www.suse.com/security/cve/CVE-2024-36270.html * https://www.suse.com/security/cve/CVE-2024-36286.html * https://www.suse.com/security/cve/CVE-2024-36489.html * https://www.suse.com/security/cve/CVE-2024-36929.html * https://www.suse.com/security/cve/CVE-2024-36933.html * https://www.suse.com/security/cve/CVE-2024-36936.html * https://www.suse.com/security/cve/CVE-2024-36962.html * https://www.suse.com/security/cve/CVE-2024-38554.html * https://www.suse.com/security/cve/CVE-2024-38602.html * https://www.suse.com/security/cve/CVE-2024-38662.html * https://www.suse.com/security/cve/CVE-2024-39489.html * https://www.suse.com/security/cve/CVE-2024-40905.html * https://www.suse.com/security/cve/CVE-2024-40978.html * https://www.suse.com/security/cve/CVE-2024-40980.html * https://www.suse.com/security/cve/CVE-2024-40995.html * https://www.suse.com/security/cve/CVE-2024-41000.html * https://www.suse.com/security/cve/CVE-2024-41007.html * https://www.suse.com/security/cve/CVE-2024-41009.html * https://www.suse.com/security/cve/CVE-2024-41011.html * https://www.suse.com/security/cve/CVE-2024-41016.html * https://www.suse.com/security/cve/CVE-2024-41020.html * https://www.suse.com/security/cve/CVE-2024-41022.html * https://www.suse.com/security/cve/CVE-2024-41035.html * https://www.suse.com/security/cve/CVE-2024-41036.html * https://www.suse.com/security/cve/CVE-2024-41038.html * https://www.suse.com/security/cve/CVE-2024-41039.html * https://www.suse.com/security/cve/CVE-2024-41042.html * https://www.suse.com/security/cve/CVE-2024-41045.html * https://www.suse.com/security/cve/CVE-2024-41056.html * https://www.suse.com/security/cve/CVE-2024-41060.html * https://www.suse.com/security/cve/CVE-2024-41062.html * https://www.suse.com/security/cve/CVE-2024-41065.html * https://www.suse.com/security/cve/CVE-2024-41068.html * https://www.suse.com/security/cve/CVE-2024-41073.html * https://www.suse.com/security/cve/CVE-2024-41079.html * https://www.suse.com/security/cve/CVE-2024-41080.html * https://www.suse.com/security/cve/CVE-2024-41087.html * https://www.suse.com/security/cve/CVE-2024-41088.html * https://www.suse.com/security/cve/CVE-2024-41089.html * https://www.suse.com/security/cve/CVE-2024-41092.html * https://www.suse.com/security/cve/CVE-2024-41093.html * https://www.suse.com/security/cve/CVE-2024-41095.html * https://www.suse.com/security/cve/CVE-2024-41097.html * https://www.suse.com/security/cve/CVE-2024-41098.html * https://www.suse.com/security/cve/CVE-2024-42069.html * https://www.suse.com/security/cve/CVE-2024-42074.html * https://www.suse.com/security/cve/CVE-2024-42076.html * https://www.suse.com/security/cve/CVE-2024-42077.html * https://www.suse.com/security/cve/CVE-2024-42080.html * https://www.suse.com/security/cve/CVE-2024-42082.html * https://www.suse.com/security/cve/CVE-2024-42085.html * https://www.suse.com/security/cve/CVE-2024-42086.html * https://www.suse.com/security/cve/CVE-2024-42087.html * https://www.suse.com/security/cve/CVE-2024-42089.html * https://www.suse.com/security/cve/CVE-2024-42090.html * https://www.suse.com/security/cve/CVE-2024-42092.html * https://www.suse.com/security/cve/CVE-2024-42095.html * https://www.suse.com/security/cve/CVE-2024-42097.html * https://www.suse.com/security/cve/CVE-2024-42098.html * https://www.suse.com/security/cve/CVE-2024-42101.html * https://www.suse.com/security/cve/CVE-2024-42104.html * https://www.suse.com/security/cve/CVE-2024-42106.html * https://www.suse.com/security/cve/CVE-2024-42107.html * https://www.suse.com/security/cve/CVE-2024-42110.html * https://www.suse.com/security/cve/CVE-2024-42114.html * https://www.suse.com/security/cve/CVE-2024-42115.html * https://www.suse.com/security/cve/CVE-2024-42119.html * https://www.suse.com/security/cve/CVE-2024-42120.html * https://www.suse.com/security/cve/CVE-2024-42121.html * https://www.suse.com/security/cve/CVE-2024-42126.html * https://www.suse.com/security/cve/CVE-2024-42127.html * https://www.suse.com/security/cve/CVE-2024-42130.html * https://www.suse.com/security/cve/CVE-2024-42137.html * https://www.suse.com/security/cve/CVE-2024-42139.html * https://www.suse.com/security/cve/CVE-2024-42142.html * https://www.suse.com/security/cve/CVE-2024-42143.html * https://www.suse.com/security/cve/CVE-2024-42148.html * https://www.suse.com/security/cve/CVE-2024-42152.html * https://www.suse.com/security/cve/CVE-2024-42155.html * https://www.suse.com/security/cve/CVE-2024-42156.html * https://www.suse.com/security/cve/CVE-2024-42157.html * https://www.suse.com/security/cve/CVE-2024-42158.html * https://www.suse.com/security/cve/CVE-2024-42162.html * https://www.suse.com/security/cve/CVE-2024-42223.html * https://www.suse.com/security/cve/CVE-2024-42225.html * https://www.suse.com/security/cve/CVE-2024-42228.html * https://www.suse.com/security/cve/CVE-2024-42229.html * https://www.suse.com/security/cve/CVE-2024-42230.html * https://www.suse.com/security/cve/CVE-2024-42232.html * https://www.suse.com/security/cve/CVE-2024-42236.html * https://www.suse.com/security/cve/CVE-2024-42237.html * https://www.suse.com/security/cve/CVE-2024-42238.html * https://www.suse.com/security/cve/CVE-2024-42239.html * https://www.suse.com/security/cve/CVE-2024-42240.html * https://www.suse.com/security/cve/CVE-2024-42244.html * https://www.suse.com/security/cve/CVE-2024-42246.html * https://www.suse.com/security/cve/CVE-2024-42247.html * https://www.suse.com/security/cve/CVE-2024-42268.html * https://www.suse.com/security/cve/CVE-2024-42271.html * https://www.suse.com/security/cve/CVE-2024-42274.html * https://www.suse.com/security/cve/CVE-2024-42276.html * https://www.suse.com/security/cve/CVE-2024-42277.html * https://www.suse.com/security/cve/CVE-2024-42280.html * https://www.suse.com/security/cve/CVE-2024-42281.html * https://www.suse.com/security/cve/CVE-2024-42283.html * https://www.suse.com/security/cve/CVE-2024-42284.html * https://www.suse.com/security/cve/CVE-2024-42285.html * https://www.suse.com/security/cve/CVE-2024-42286.html * https://www.suse.com/security/cve/CVE-2024-42287.html * https://www.suse.com/security/cve/CVE-2024-42288.html * https://www.suse.com/security/cve/CVE-2024-42289.html * https://www.suse.com/security/cve/CVE-2024-42291.html * https://www.suse.com/security/cve/CVE-2024-42292.html * https://www.suse.com/security/cve/CVE-2024-42295.html * https://www.suse.com/security/cve/CVE-2024-42301.html * https://www.suse.com/security/cve/CVE-2024-42302.html * https://www.suse.com/security/cve/CVE-2024-42308.html * https://www.suse.com/security/cve/CVE-2024-42309.html * https://www.suse.com/security/cve/CVE-2024-42310.html * https://www.suse.com/security/cve/CVE-2024-42311.html * https://www.suse.com/security/cve/CVE-2024-42312.html * https://www.suse.com/security/cve/CVE-2024-42313.html * https://www.suse.com/security/cve/CVE-2024-42315.html * https://www.suse.com/security/cve/CVE-2024-42318.html * https://www.suse.com/security/cve/CVE-2024-42319.html * https://www.suse.com/security/cve/CVE-2024-42320.html * https://www.suse.com/security/cve/CVE-2024-42322.html * https://www.suse.com/security/cve/CVE-2024-43816.html * https://www.suse.com/security/cve/CVE-2024-43818.html * https://www.suse.com/security/cve/CVE-2024-43819.html * https://www.suse.com/security/cve/CVE-2024-43821.html * https://www.suse.com/security/cve/CVE-2024-43823.html * https://www.suse.com/security/cve/CVE-2024-43829.html * https://www.suse.com/security/cve/CVE-2024-43830.html * https://www.suse.com/security/cve/CVE-2024-43831.html * https://www.suse.com/security/cve/CVE-2024-43834.html * https://www.suse.com/security/cve/CVE-2024-43837.html * https://www.suse.com/security/cve/CVE-2024-43839.html * https://www.suse.com/security/cve/CVE-2024-43841.html * https://www.suse.com/security/cve/CVE-2024-43842.html * https://www.suse.com/security/cve/CVE-2024-43846.html * https://www.suse.com/security/cve/CVE-2024-43849.html * https://www.suse.com/security/cve/CVE-2024-43853.html * https://www.suse.com/security/cve/CVE-2024-43854.html * https://www.suse.com/security/cve/CVE-2024-43856.html * https://www.suse.com/security/cve/CVE-2024-43858.html * https://www.suse.com/security/cve/CVE-2024-43860.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://www.suse.com/security/cve/CVE-2024-43863.html * https://www.suse.com/security/cve/CVE-2024-43866.html * https://www.suse.com/security/cve/CVE-2024-43867.html * https://www.suse.com/security/cve/CVE-2024-43871.html * https://www.suse.com/security/cve/CVE-2024-43872.html * https://www.suse.com/security/cve/CVE-2024-43873.html * https://www.suse.com/security/cve/CVE-2024-43879.html * https://www.suse.com/security/cve/CVE-2024-43880.html * https://www.suse.com/security/cve/CVE-2024-43882.html * https://www.suse.com/security/cve/CVE-2024-43883.html * https://www.suse.com/security/cve/CVE-2024-43884.html * https://www.suse.com/security/cve/CVE-2024-43889.html * https://www.suse.com/security/cve/CVE-2024-43892.html * https://www.suse.com/security/cve/CVE-2024-43893.html * https://www.suse.com/security/cve/CVE-2024-43894.html * https://www.suse.com/security/cve/CVE-2024-43895.html * https://www.suse.com/security/cve/CVE-2024-43899.html * https://www.suse.com/security/cve/CVE-2024-43900.html * https://www.suse.com/security/cve/CVE-2024-43902.html * https://www.suse.com/security/cve/CVE-2024-43903.html * https://www.suse.com/security/cve/CVE-2024-43904.html * https://www.suse.com/security/cve/CVE-2024-43905.html * https://www.suse.com/security/cve/CVE-2024-43907.html * https://www.suse.com/security/cve/CVE-2024-43908.html * https://www.suse.com/security/cve/CVE-2024-43909.html * https://www.suse.com/security/cve/CVE-2024-44938.html * https://www.suse.com/security/cve/CVE-2024-44939.html * https://www.suse.com/security/cve/CVE-2024-44947.html * https://bugzilla.suse.com/show_bug.cgi?id=1193629 * https://bugzilla.suse.com/show_bug.cgi?id=1194111 * https://bugzilla.suse.com/show_bug.cgi?id=1194765 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1196261 * https://bugzilla.suse.com/show_bug.cgi?id=1196516 * https://bugzilla.suse.com/show_bug.cgi?id=1196894 * https://bugzilla.suse.com/show_bug.cgi?id=1198017 * https://bugzilla.suse.com/show_bug.cgi?id=1203329 * https://bugzilla.suse.com/show_bug.cgi?id=1203330 * https://bugzilla.suse.com/show_bug.cgi?id=1203360 * https://bugzilla.suse.com/show_bug.cgi?id=1205462 * https://bugzilla.suse.com/show_bug.cgi?id=1206006 * https://bugzilla.suse.com/show_bug.cgi?id=1206258 * https://bugzilla.suse.com/show_bug.cgi?id=1206843 * https://bugzilla.suse.com/show_bug.cgi?id=1207158 * https://bugzilla.suse.com/show_bug.cgi?id=1208783 * https://bugzilla.suse.com/show_bug.cgi?id=1210644 * https://bugzilla.suse.com/show_bug.cgi?id=1213580 * https://bugzilla.suse.com/show_bug.cgi?id=1213632 * https://bugzilla.suse.com/show_bug.cgi?id=1214285 * https://bugzilla.suse.com/show_bug.cgi?id=1216834 * https://bugzilla.suse.com/show_bug.cgi?id=1220428 * https://bugzilla.suse.com/show_bug.cgi?id=1220877 * https://bugzilla.suse.com/show_bug.cgi?id=1220962 * https://bugzilla.suse.com/show_bug.cgi?id=1221269 * https://bugzilla.suse.com/show_bug.cgi?id=1221326 * https://bugzilla.suse.com/show_bug.cgi?id=1221630 * https://bugzilla.suse.com/show_bug.cgi?id=1221645 * https://bugzilla.suse.com/show_bug.cgi?id=1222335 * https://bugzilla.suse.com/show_bug.cgi?id=1222350 * https://bugzilla.suse.com/show_bug.cgi?id=1222372 * https://bugzilla.suse.com/show_bug.cgi?id=1222387 * https://bugzilla.suse.com/show_bug.cgi?id=1222634 * https://bugzilla.suse.com/show_bug.cgi?id=1222808 * https://bugzilla.suse.com/show_bug.cgi?id=1222967 * https://bugzilla.suse.com/show_bug.cgi?id=1223074 * https://bugzilla.suse.com/show_bug.cgi?id=1223191 * https://bugzilla.suse.com/show_bug.cgi?id=1223508 * https://bugzilla.suse.com/show_bug.cgi?id=1223720 * https://bugzilla.suse.com/show_bug.cgi?id=1223742 * https://bugzilla.suse.com/show_bug.cgi?id=1223777 * https://bugzilla.suse.com/show_bug.cgi?id=1223803 * https://bugzilla.suse.com/show_bug.cgi?id=1223807 * https://bugzilla.suse.com/show_bug.cgi?id=1224105 * https://bugzilla.suse.com/show_bug.cgi?id=1224415 * https://bugzilla.suse.com/show_bug.cgi?id=1224496 * https://bugzilla.suse.com/show_bug.cgi?id=1224510 * https://bugzilla.suse.com/show_bug.cgi?id=1224542 * https://bugzilla.suse.com/show_bug.cgi?id=1224578 * https://bugzilla.suse.com/show_bug.cgi?id=1224639 * https://bugzilla.suse.com/show_bug.cgi?id=1225162 * https://bugzilla.suse.com/show_bug.cgi?id=1225352 * https://bugzilla.suse.com/show_bug.cgi?id=1225428 * https://bugzilla.suse.com/show_bug.cgi?id=1225524 * https://bugzilla.suse.com/show_bug.cgi?id=1225578 * https://bugzilla.suse.com/show_bug.cgi?id=1225582 * https://bugzilla.suse.com/show_bug.cgi?id=1225773 * https://bugzilla.suse.com/show_bug.cgi?id=1225814 * https://bugzilla.suse.com/show_bug.cgi?id=1225827 * https://bugzilla.suse.com/show_bug.cgi?id=1225832 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226168 * https://bugzilla.suse.com/show_bug.cgi?id=1226530 * https://bugzilla.suse.com/show_bug.cgi?id=1226613 * https://bugzilla.suse.com/show_bug.cgi?id=1226742 * https://bugzilla.suse.com/show_bug.cgi?id=1226765 * https://bugzilla.suse.com/show_bug.cgi?id=1226798 * https://bugzilla.suse.com/show_bug.cgi?id=1226801 * https://bugzilla.suse.com/show_bug.cgi?id=1226874 * https://bugzilla.suse.com/show_bug.cgi?id=1226885 * https://bugzilla.suse.com/show_bug.cgi?id=1227079 * https://bugzilla.suse.com/show_bug.cgi?id=1227623 * https://bugzilla.suse.com/show_bug.cgi?id=1227761 * https://bugzilla.suse.com/show_bug.cgi?id=1227830 * https://bugzilla.suse.com/show_bug.cgi?id=1227863 * https://bugzilla.suse.com/show_bug.cgi?id=1227867 * https://bugzilla.suse.com/show_bug.cgi?id=1227929 * https://bugzilla.suse.com/show_bug.cgi?id=1227937 * https://bugzilla.suse.com/show_bug.cgi?id=1227958 * https://bugzilla.suse.com/show_bug.cgi?id=1228020 * https://bugzilla.suse.com/show_bug.cgi?id=1228065 * https://bugzilla.suse.com/show_bug.cgi?id=1228114 * https://bugzilla.suse.com/show_bug.cgi?id=1228410 * https://bugzilla.suse.com/show_bug.cgi?id=1228426 * https://bugzilla.suse.com/show_bug.cgi?id=1228427 * https://bugzilla.suse.com/show_bug.cgi?id=1228429 * https://bugzilla.suse.com/show_bug.cgi?id=1228446 * https://bugzilla.suse.com/show_bug.cgi?id=1228447 * https://bugzilla.suse.com/show_bug.cgi?id=1228449 * https://bugzilla.suse.com/show_bug.cgi?id=1228450 * https://bugzilla.suse.com/show_bug.cgi?id=1228452 * https://bugzilla.suse.com/show_bug.cgi?id=1228456 * https://bugzilla.suse.com/show_bug.cgi?id=1228463 * https://bugzilla.suse.com/show_bug.cgi?id=1228466 * https://bugzilla.suse.com/show_bug.cgi?id=1228467 * https://bugzilla.suse.com/show_bug.cgi?id=1228469 * https://bugzilla.suse.com/show_bug.cgi?id=1228480 * https://bugzilla.suse.com/show_bug.cgi?id=1228481 * https://bugzilla.suse.com/show_bug.cgi?id=1228482 * https://bugzilla.suse.com/show_bug.cgi?id=1228483 * https://bugzilla.suse.com/show_bug.cgi?id=1228484 * https://bugzilla.suse.com/show_bug.cgi?id=1228485 * https://bugzilla.suse.com/show_bug.cgi?id=1228487 * https://bugzilla.suse.com/show_bug.cgi?id=1228489 * https://bugzilla.suse.com/show_bug.cgi?id=1228491 * https://bugzilla.suse.com/show_bug.cgi?id=1228493 * https://bugzilla.suse.com/show_bug.cgi?id=1228494 * https://bugzilla.suse.com/show_bug.cgi?id=1228495 * https://bugzilla.suse.com/show_bug.cgi?id=1228496 * https://bugzilla.suse.com/show_bug.cgi?id=1228501 * https://bugzilla.suse.com/show_bug.cgi?id=1228503 * https://bugzilla.suse.com/show_bug.cgi?id=1228509 * https://bugzilla.suse.com/show_bug.cgi?id=1228513 * https://bugzilla.suse.com/show_bug.cgi?id=1228515 * https://bugzilla.suse.com/show_bug.cgi?id=1228516 * https://bugzilla.suse.com/show_bug.cgi?id=1228526 * https://bugzilla.suse.com/show_bug.cgi?id=1228531 * https://bugzilla.suse.com/show_bug.cgi?id=1228563 * https://bugzilla.suse.com/show_bug.cgi?id=1228564 * https://bugzilla.suse.com/show_bug.cgi?id=1228567 * https://bugzilla.suse.com/show_bug.cgi?id=1228576 * https://bugzilla.suse.com/show_bug.cgi?id=1228579 * https://bugzilla.suse.com/show_bug.cgi?id=1228584 * https://bugzilla.suse.com/show_bug.cgi?id=1228588 * https://bugzilla.suse.com/show_bug.cgi?id=1228590 * https://bugzilla.suse.com/show_bug.cgi?id=1228615 * https://bugzilla.suse.com/show_bug.cgi?id=1228616 * https://bugzilla.suse.com/show_bug.cgi?id=1228635 * https://bugzilla.suse.com/show_bug.cgi?id=1228636 * https://bugzilla.suse.com/show_bug.cgi?id=1228654 * https://bugzilla.suse.com/show_bug.cgi?id=1228656 * https://bugzilla.suse.com/show_bug.cgi?id=1228658 * https://bugzilla.suse.com/show_bug.cgi?id=1228660 * https://bugzilla.suse.com/show_bug.cgi?id=1228662 * https://bugzilla.suse.com/show_bug.cgi?id=1228667 * https://bugzilla.suse.com/show_bug.cgi?id=1228673 * https://bugzilla.suse.com/show_bug.cgi?id=1228677 * https://bugzilla.suse.com/show_bug.cgi?id=1228687 * https://bugzilla.suse.com/show_bug.cgi?id=1228706 * https://bugzilla.suse.com/show_bug.cgi?id=1228708 * https://bugzilla.suse.com/show_bug.cgi?id=1228710 * https://bugzilla.suse.com/show_bug.cgi?id=1228718 * https://bugzilla.suse.com/show_bug.cgi?id=1228720 * https://bugzilla.suse.com/show_bug.cgi?id=1228721 * https://bugzilla.suse.com/show_bug.cgi?id=1228722 * https://bugzilla.suse.com/show_bug.cgi?id=1228724 * https://bugzilla.suse.com/show_bug.cgi?id=1228726 * https://bugzilla.suse.com/show_bug.cgi?id=1228727 * https://bugzilla.suse.com/show_bug.cgi?id=1228733 * https://bugzilla.suse.com/show_bug.cgi?id=1228748 * https://bugzilla.suse.com/show_bug.cgi?id=1228766 * https://bugzilla.suse.com/show_bug.cgi?id=1228779 * https://bugzilla.suse.com/show_bug.cgi?id=1228801 * https://bugzilla.suse.com/show_bug.cgi?id=1228850 * https://bugzilla.suse.com/show_bug.cgi?id=1228857 * https://bugzilla.suse.com/show_bug.cgi?id=1228959 * https://bugzilla.suse.com/show_bug.cgi?id=1228964 * https://bugzilla.suse.com/show_bug.cgi?id=1228966 * https://bugzilla.suse.com/show_bug.cgi?id=1228967 * https://bugzilla.suse.com/show_bug.cgi?id=1228979 * https://bugzilla.suse.com/show_bug.cgi?id=1228988 * https://bugzilla.suse.com/show_bug.cgi?id=1228989 * https://bugzilla.suse.com/show_bug.cgi?id=1228991 * https://bugzilla.suse.com/show_bug.cgi?id=1228992 * https://bugzilla.suse.com/show_bug.cgi?id=1229042 * https://bugzilla.suse.com/show_bug.cgi?id=1229054 * https://bugzilla.suse.com/show_bug.cgi?id=1229086 * https://bugzilla.suse.com/show_bug.cgi?id=1229136 * https://bugzilla.suse.com/show_bug.cgi?id=1229154 * https://bugzilla.suse.com/show_bug.cgi?id=1229187 * https://bugzilla.suse.com/show_bug.cgi?id=1229188 * https://bugzilla.suse.com/show_bug.cgi?id=1229190 * https://bugzilla.suse.com/show_bug.cgi?id=1229287 * https://bugzilla.suse.com/show_bug.cgi?id=1229290 * https://bugzilla.suse.com/show_bug.cgi?id=1229292 * https://bugzilla.suse.com/show_bug.cgi?id=1229296 * https://bugzilla.suse.com/show_bug.cgi?id=1229297 * https://bugzilla.suse.com/show_bug.cgi?id=1229301 * https://bugzilla.suse.com/show_bug.cgi?id=1229303 * https://bugzilla.suse.com/show_bug.cgi?id=1229304 * https://bugzilla.suse.com/show_bug.cgi?id=1229305 * https://bugzilla.suse.com/show_bug.cgi?id=1229307 * https://bugzilla.suse.com/show_bug.cgi?id=1229309 * https://bugzilla.suse.com/show_bug.cgi?id=1229312 * https://bugzilla.suse.com/show_bug.cgi?id=1229314 * https://bugzilla.suse.com/show_bug.cgi?id=1229315 * https://bugzilla.suse.com/show_bug.cgi?id=1229317 * https://bugzilla.suse.com/show_bug.cgi?id=1229318 * https://bugzilla.suse.com/show_bug.cgi?id=1229319 * https://bugzilla.suse.com/show_bug.cgi?id=1229327 * https://bugzilla.suse.com/show_bug.cgi?id=1229341 * https://bugzilla.suse.com/show_bug.cgi?id=1229345 * https://bugzilla.suse.com/show_bug.cgi?id=1229346 * https://bugzilla.suse.com/show_bug.cgi?id=1229347 * https://bugzilla.suse.com/show_bug.cgi?id=1229349 * https://bugzilla.suse.com/show_bug.cgi?id=1229350 * https://bugzilla.suse.com/show_bug.cgi?id=1229351 * https://bugzilla.suse.com/show_bug.cgi?id=1229354 * https://bugzilla.suse.com/show_bug.cgi?id=1229356 * https://bugzilla.suse.com/show_bug.cgi?id=1229357 * https://bugzilla.suse.com/show_bug.cgi?id=1229358 * https://bugzilla.suse.com/show_bug.cgi?id=1229359 * https://bugzilla.suse.com/show_bug.cgi?id=1229360 * https://bugzilla.suse.com/show_bug.cgi?id=1229366 * https://bugzilla.suse.com/show_bug.cgi?id=1229370 * https://bugzilla.suse.com/show_bug.cgi?id=1229373 * https://bugzilla.suse.com/show_bug.cgi?id=1229374 * https://bugzilla.suse.com/show_bug.cgi?id=1229381 * https://bugzilla.suse.com/show_bug.cgi?id=1229382 * https://bugzilla.suse.com/show_bug.cgi?id=1229383 * https://bugzilla.suse.com/show_bug.cgi?id=1229386 * https://bugzilla.suse.com/show_bug.cgi?id=1229388 * https://bugzilla.suse.com/show_bug.cgi?id=1229391 * https://bugzilla.suse.com/show_bug.cgi?id=1229392 * https://bugzilla.suse.com/show_bug.cgi?id=1229395 * https://bugzilla.suse.com/show_bug.cgi?id=1229398 * https://bugzilla.suse.com/show_bug.cgi?id=1229399 * https://bugzilla.suse.com/show_bug.cgi?id=1229400 * https://bugzilla.suse.com/show_bug.cgi?id=1229407 * https://bugzilla.suse.com/show_bug.cgi?id=1229409 * https://bugzilla.suse.com/show_bug.cgi?id=1229410 * https://bugzilla.suse.com/show_bug.cgi?id=1229411 * https://bugzilla.suse.com/show_bug.cgi?id=1229413 * https://bugzilla.suse.com/show_bug.cgi?id=1229414 * https://bugzilla.suse.com/show_bug.cgi?id=1229417 * https://bugzilla.suse.com/show_bug.cgi?id=1229418 * https://bugzilla.suse.com/show_bug.cgi?id=1229444 * https://bugzilla.suse.com/show_bug.cgi?id=1229453 * https://bugzilla.suse.com/show_bug.cgi?id=1229454 * https://bugzilla.suse.com/show_bug.cgi?id=1229481 * https://bugzilla.suse.com/show_bug.cgi?id=1229482 * https://bugzilla.suse.com/show_bug.cgi?id=1229488 * https://bugzilla.suse.com/show_bug.cgi?id=1229489 * https://bugzilla.suse.com/show_bug.cgi?id=1229490 * https://bugzilla.suse.com/show_bug.cgi?id=1229493 * https://bugzilla.suse.com/show_bug.cgi?id=1229495 * https://bugzilla.suse.com/show_bug.cgi?id=1229497 * https://bugzilla.suse.com/show_bug.cgi?id=1229500 * https://bugzilla.suse.com/show_bug.cgi?id=1229503 * https://bugzilla.suse.com/show_bug.cgi?id=1229506 * https://bugzilla.suse.com/show_bug.cgi?id=1229507 * https://bugzilla.suse.com/show_bug.cgi?id=1229508 * https://bugzilla.suse.com/show_bug.cgi?id=1229509 * https://bugzilla.suse.com/show_bug.cgi?id=1229510 * https://bugzilla.suse.com/show_bug.cgi?id=1229512 * https://bugzilla.suse.com/show_bug.cgi?id=1229516 * https://bugzilla.suse.com/show_bug.cgi?id=1229521 * https://bugzilla.suse.com/show_bug.cgi?id=1229522 * https://bugzilla.suse.com/show_bug.cgi?id=1229523 * https://bugzilla.suse.com/show_bug.cgi?id=1229524 * https://bugzilla.suse.com/show_bug.cgi?id=1229525 * https://bugzilla.suse.com/show_bug.cgi?id=1229526 * https://bugzilla.suse.com/show_bug.cgi?id=1229527 * https://bugzilla.suse.com/show_bug.cgi?id=1229528 * https://bugzilla.suse.com/show_bug.cgi?id=1229529 * https://bugzilla.suse.com/show_bug.cgi?id=1229531 * https://bugzilla.suse.com/show_bug.cgi?id=1229533 * https://bugzilla.suse.com/show_bug.cgi?id=1229535 * https://bugzilla.suse.com/show_bug.cgi?id=1229536 * https://bugzilla.suse.com/show_bug.cgi?id=1229537 * https://bugzilla.suse.com/show_bug.cgi?id=1229540 * https://bugzilla.suse.com/show_bug.cgi?id=1229544 * https://bugzilla.suse.com/show_bug.cgi?id=1229545 * https://bugzilla.suse.com/show_bug.cgi?id=1229546 * https://bugzilla.suse.com/show_bug.cgi?id=1229547 * https://bugzilla.suse.com/show_bug.cgi?id=1229548 * https://bugzilla.suse.com/show_bug.cgi?id=1229554 * https://bugzilla.suse.com/show_bug.cgi?id=1229557 * https://bugzilla.suse.com/show_bug.cgi?id=1229558 * https://bugzilla.suse.com/show_bug.cgi?id=1229559 * https://bugzilla.suse.com/show_bug.cgi?id=1229560 * https://bugzilla.suse.com/show_bug.cgi?id=1229562 * https://bugzilla.suse.com/show_bug.cgi?id=1229564 * https://bugzilla.suse.com/show_bug.cgi?id=1229565 * https://bugzilla.suse.com/show_bug.cgi?id=1229566 * https://bugzilla.suse.com/show_bug.cgi?id=1229568 * https://bugzilla.suse.com/show_bug.cgi?id=1229569 * https://bugzilla.suse.com/show_bug.cgi?id=1229572 * https://bugzilla.suse.com/show_bug.cgi?id=1229573 * https://bugzilla.suse.com/show_bug.cgi?id=1229576 * https://bugzilla.suse.com/show_bug.cgi?id=1229581 * https://bugzilla.suse.com/show_bug.cgi?id=1229588 * https://bugzilla.suse.com/show_bug.cgi?id=1229598 * https://bugzilla.suse.com/show_bug.cgi?id=1229603 * https://bugzilla.suse.com/show_bug.cgi?id=1229604 * https://bugzilla.suse.com/show_bug.cgi?id=1229605 * https://bugzilla.suse.com/show_bug.cgi?id=1229608 * https://bugzilla.suse.com/show_bug.cgi?id=1229611 * https://bugzilla.suse.com/show_bug.cgi?id=1229612 * https://bugzilla.suse.com/show_bug.cgi?id=1229613 * https://bugzilla.suse.com/show_bug.cgi?id=1229614 * https://bugzilla.suse.com/show_bug.cgi?id=1229615 * https://bugzilla.suse.com/show_bug.cgi?id=1229616 * https://bugzilla.suse.com/show_bug.cgi?id=1229617 * https://bugzilla.suse.com/show_bug.cgi?id=1229620 * https://bugzilla.suse.com/show_bug.cgi?id=1229622 * https://bugzilla.suse.com/show_bug.cgi?id=1229623 * https://bugzilla.suse.com/show_bug.cgi?id=1229624 * https://bugzilla.suse.com/show_bug.cgi?id=1229625 * https://bugzilla.suse.com/show_bug.cgi?id=1229626 * https://bugzilla.suse.com/show_bug.cgi?id=1229628 * https://bugzilla.suse.com/show_bug.cgi?id=1229629 * https://bugzilla.suse.com/show_bug.cgi?id=1229630 * https://bugzilla.suse.com/show_bug.cgi?id=1229631 * https://bugzilla.suse.com/show_bug.cgi?id=1229632 * https://bugzilla.suse.com/show_bug.cgi?id=1229635 * https://bugzilla.suse.com/show_bug.cgi?id=1229636 * https://bugzilla.suse.com/show_bug.cgi?id=1229637 * https://bugzilla.suse.com/show_bug.cgi?id=1229638 * https://bugzilla.suse.com/show_bug.cgi?id=1229639 * https://bugzilla.suse.com/show_bug.cgi?id=1229641 * https://bugzilla.suse.com/show_bug.cgi?id=1229642 * https://bugzilla.suse.com/show_bug.cgi?id=1229643 * https://bugzilla.suse.com/show_bug.cgi?id=1229645 * https://bugzilla.suse.com/show_bug.cgi?id=1229657 * https://bugzilla.suse.com/show_bug.cgi?id=1229658 * https://bugzilla.suse.com/show_bug.cgi?id=1229662 * https://bugzilla.suse.com/show_bug.cgi?id=1229664 * https://bugzilla.suse.com/show_bug.cgi?id=1229707 * https://bugzilla.suse.com/show_bug.cgi?id=1229739 * https://bugzilla.suse.com/show_bug.cgi?id=1229743 * https://bugzilla.suse.com/show_bug.cgi?id=1229746 * https://bugzilla.suse.com/show_bug.cgi?id=1229754 * https://bugzilla.suse.com/show_bug.cgi?id=1229755 * https://bugzilla.suse.com/show_bug.cgi?id=1229756 * https://bugzilla.suse.com/show_bug.cgi?id=1229759 * https://bugzilla.suse.com/show_bug.cgi?id=1229761 * https://bugzilla.suse.com/show_bug.cgi?id=1229767 * https://bugzilla.suse.com/show_bug.cgi?id=1229768 * https://bugzilla.suse.com/show_bug.cgi?id=1229781 * https://bugzilla.suse.com/show_bug.cgi?id=1229784 * https://bugzilla.suse.com/show_bug.cgi?id=1229787 * https://bugzilla.suse.com/show_bug.cgi?id=1229788 * https://bugzilla.suse.com/show_bug.cgi?id=1229789 * https://bugzilla.suse.com/show_bug.cgi?id=1229792 * https://bugzilla.suse.com/show_bug.cgi?id=1229820 * https://bugzilla.suse.com/show_bug.cgi?id=1230413 * https://jira.suse.com/browse/PED-8491 * https://jira.suse.com/browse/PED-8779
participants (1)
-
OPENSUSE-SECURITY-UPDATES