SUSE-SU-2024:4314-1: important: Security update for the Linux Kernel
# Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:4314-1 Release Date: 2024-12-13T15:23:19Z Rating: important References: * bsc#1012628 * bsc#1082555 * bsc#1194869 * bsc#1215199 * bsc#1218644 * bsc#1220355 * bsc#1221309 * bsc#1222423 * bsc#1222587 * bsc#1222590 * bsc#1223112 * bsc#1223656 * bsc#1223733 * bsc#1224429 * bsc#1224518 * bsc#1224548 * bsc#1224948 * bsc#1225713 * bsc#1225725 * bsc#1225730 * bsc#1225742 * bsc#1225764 * bsc#1225768 * bsc#1225813 * bsc#1225903 * bsc#1226130 * bsc#1226748 * bsc#1226872 * bsc#1227726 * bsc#1227842 * bsc#1228430 * bsc#1228850 * bsc#1229165 * bsc#1230231 * bsc#1230557 * bsc#1230558 * bsc#1230733 * bsc#1230807 * bsc#1230817 * bsc#1230827 * bsc#1230971 * bsc#1231076 * bsc#1231114 * bsc#1231182 * bsc#1231453 * bsc#1231465 * bsc#1231630 * bsc#1231920 * bsc#1231930 * bsc#1231946 * bsc#1231952 * bsc#1232079 * bsc#1232096 * bsc#1232103 * bsc#1232104 * bsc#1232149 * bsc#1232157 * bsc#1232165 * bsc#1232166 * bsc#1232198 * bsc#1232199 * bsc#1232201 * bsc#1232207 * bsc#1232224 * bsc#1232258 * bsc#1232259 * bsc#1232264 * bsc#1232272 * bsc#1232305 * bsc#1232307 * bsc#1232318 * bsc#1232335 * bsc#1232337 * bsc#1232352 * bsc#1232354 * bsc#1232355 * bsc#1232357 * bsc#1232358 * bsc#1232361 * bsc#1232366 * bsc#1232367 * bsc#1232368 * bsc#1232371 * bsc#1232374 * bsc#1232385 * bsc#1232386 * bsc#1232387 * bsc#1232396 * bsc#1232413 * bsc#1232416 * bsc#1232436 * bsc#1232442 * bsc#1232446 * bsc#1232483 * bsc#1232494 * bsc#1232498 * bsc#1232499 * bsc#1232500 * bsc#1232501 * bsc#1232502 * bsc#1232704 * bsc#1232757 * bsc#1232819 * bsc#1232823 * bsc#1232860 * bsc#1232869 * bsc#1232870 * bsc#1232873 * bsc#1232876 * bsc#1232877 * bsc#1232878 * bsc#1232880 * bsc#1232881 * bsc#1232884 * bsc#1232885 * bsc#1232887 * bsc#1232888 * bsc#1232890 * bsc#1232892 * bsc#1232894 * bsc#1232896 * bsc#1232897 * bsc#1232905 * bsc#1232907 * bsc#1232914 * bsc#1232919 * bsc#1232925 * bsc#1232926 * bsc#1232928 * bsc#1232935 * bsc#1233029 * bsc#1233032 * bsc#1233035 * bsc#1233036 * bsc#1233041 * bsc#1233044 * bsc#1233049 * bsc#1233050 * bsc#1233051 * bsc#1233056 * bsc#1233057 * bsc#1233061 * bsc#1233062 * bsc#1233063 * bsc#1233065 * bsc#1233067 * bsc#1233070 * bsc#1233073 * bsc#1233074 * bsc#1233088 * bsc#1233091 * bsc#1233092 * bsc#1233097 * bsc#1233100 * bsc#1233103 * bsc#1233104 * bsc#1233105 * bsc#1233106 * bsc#1233107 * bsc#1233108 * bsc#1233110 * bsc#1233111 * bsc#1233113 * bsc#1233114 * bsc#1233115 * bsc#1233117 * bsc#1233119 * bsc#1233123 * bsc#1233125 * bsc#1233127 * bsc#1233129 * bsc#1233130 * bsc#1233132 * bsc#1233135 * bsc#1233176 * bsc#1233179 * bsc#1233185 * bsc#1233188 * bsc#1233189 * bsc#1233191 * bsc#1233193 * bsc#1233197 * bsc#1233201 * bsc#1233203 * bsc#1233204 * bsc#1233205 * bsc#1233206 * bsc#1233207 * bsc#1233208 * bsc#1233209 * bsc#1233210 * bsc#1233211 * bsc#1233212 * bsc#1233216 * bsc#1233217 * bsc#1233219 * bsc#1233226 * bsc#1233238 * bsc#1233241 * bsc#1233244 * bsc#1233253 * bsc#1233255 * bsc#1233293 * bsc#1233298 * bsc#1233305 * bsc#1233320 * bsc#1233350 * bsc#1233443 * bsc#1233452 * bsc#1233453 * bsc#1233454 * bsc#1233456 * bsc#1233457 * bsc#1233458 * bsc#1233460 * bsc#1233462 * bsc#1233463 * bsc#1233464 * bsc#1233465 * bsc#1233468 * bsc#1233471 * bsc#1233476 * bsc#1233478 * bsc#1233479 * bsc#1233481 * bsc#1233484 * bsc#1233485 * bsc#1233487 * bsc#1233490 * bsc#1233491 * bsc#1233523 * bsc#1233524 * bsc#1233540 * bsc#1233547 * bsc#1233548 * bsc#1233550 * bsc#1233552 * bsc#1233553 * bsc#1233554 * bsc#1233555 * bsc#1233557 * bsc#1233560 * bsc#1233561 * bsc#1233564 * bsc#1233566 * bsc#1233567 * bsc#1233568 * bsc#1233570 * bsc#1233572 * bsc#1233573 * bsc#1233577 * bsc#1233580 * bsc#1233640 * bsc#1233641 * bsc#1233642 * bsc#1233721 * bsc#1233754 * bsc#1233756 * bsc#1233769 * bsc#1233771 * bsc#1233977 * bsc#1234009 * bsc#1234011 * bsc#1234012 * bsc#1234025 * bsc#1234039 * bsc#1234040 * bsc#1234041 * bsc#1234042 * bsc#1234043 * bsc#1234044 * bsc#1234045 * bsc#1234046 * bsc#1234072 * bsc#1234078 * bsc#1234081 * bsc#1234083 * bsc#1234085 * bsc#1234087 * bsc#1234093 * bsc#1234098 * bsc#1234108 * bsc#1234121 * bsc#1234223 * jsc#PED-11316 * jsc#PED-11442 * jsc#PED-11580 * jsc#PED-9943 Cross-References: * CVE-2023-52778 * CVE-2023-52920 * CVE-2023-52921 * CVE-2023-52922 * CVE-2024-26596 * CVE-2024-26703 * CVE-2024-26741 * CVE-2024-26782 * CVE-2024-26864 * CVE-2024-26953 * CVE-2024-27017 * CVE-2024-27407 * CVE-2024-35888 * CVE-2024-36000 * CVE-2024-36031 * CVE-2024-36484 * CVE-2024-36883 * CVE-2024-36886 * CVE-2024-36905 * CVE-2024-36920 * CVE-2024-36927 * CVE-2024-36954 * CVE-2024-36968 * CVE-2024-38589 * CVE-2024-40914 * CVE-2024-41023 * CVE-2024-42102 * CVE-2024-44995 * CVE-2024-46680 * CVE-2024-46681 * CVE-2024-46765 * CVE-2024-46788 * CVE-2024-46800 * CVE-2024-46828 * CVE-2024-46845 * CVE-2024-47666 * CVE-2024-47679 * CVE-2024-47701 * CVE-2024-47703 * CVE-2024-49852 * CVE-2024-49866 * CVE-2024-49868 * CVE-2024-49881 * CVE-2024-49883 * CVE-2024-49884 * CVE-2024-49894 * CVE-2024-49895 * CVE-2024-49897 * CVE-2024-49899 * CVE-2024-49901 * CVE-2024-49905 * CVE-2024-49908 * CVE-2024-49909 * CVE-2024-49911 * CVE-2024-49912 * CVE-2024-49913 * CVE-2024-49921 * CVE-2024-49922 * CVE-2024-49923 * CVE-2024-49925 * CVE-2024-49933 * CVE-2024-49934 * CVE-2024-49944 * CVE-2024-49945 * CVE-2024-49952 * CVE-2024-49959 * CVE-2024-49968 * CVE-2024-49975 * CVE-2024-49976 * CVE-2024-49983 * CVE-2024-49987 * CVE-2024-49989 * CVE-2024-50003 * CVE-2024-50004 * CVE-2024-50006 * CVE-2024-50009 * CVE-2024-50012 * CVE-2024-50014 * CVE-2024-50015 * CVE-2024-50026 * CVE-2024-50067 * CVE-2024-50080 * CVE-2024-50081 * CVE-2024-50082 * CVE-2024-50084 * CVE-2024-50087 * CVE-2024-50088 * CVE-2024-50089 * CVE-2024-50093 * CVE-2024-50095 * CVE-2024-50096 * CVE-2024-50098 * CVE-2024-50099 * CVE-2024-50100 * CVE-2024-50101 * CVE-2024-50102 * CVE-2024-50103 * CVE-2024-50108 * CVE-2024-50110 * CVE-2024-50115 * CVE-2024-50116 * CVE-2024-50117 * CVE-2024-50121 * CVE-2024-50124 * CVE-2024-50125 * CVE-2024-50127 * CVE-2024-50128 * CVE-2024-50130 * CVE-2024-50131 * CVE-2024-50134 * CVE-2024-50135 * CVE-2024-50136 * CVE-2024-50138 * CVE-2024-50139 * CVE-2024-50141 * CVE-2024-50145 * CVE-2024-50146 * CVE-2024-50147 * CVE-2024-50148 * CVE-2024-50150 * CVE-2024-50153 * CVE-2024-50154 * CVE-2024-50155 * CVE-2024-50156 * CVE-2024-50157 * CVE-2024-50158 * CVE-2024-50159 * CVE-2024-50160 * CVE-2024-50166 * CVE-2024-50167 * CVE-2024-50169 * CVE-2024-50171 * CVE-2024-50172 * CVE-2024-50175 * CVE-2024-50176 * CVE-2024-50177 * CVE-2024-50179 * CVE-2024-50180 * CVE-2024-50181 * CVE-2024-50182 * CVE-2024-50183 * CVE-2024-50184 * CVE-2024-50186 * CVE-2024-50187 * CVE-2024-50188 * CVE-2024-50189 * CVE-2024-50192 * CVE-2024-50194 * CVE-2024-50195 * CVE-2024-50196 * CVE-2024-50198 * CVE-2024-50200 * CVE-2024-50201 * CVE-2024-50205 * CVE-2024-50208 * CVE-2024-50209 * CVE-2024-50210 * CVE-2024-50215 * CVE-2024-50216 * CVE-2024-50218 * CVE-2024-50221 * CVE-2024-50224 * CVE-2024-50225 * CVE-2024-50228 * CVE-2024-50229 * CVE-2024-50230 * CVE-2024-50231 * CVE-2024-50232 * CVE-2024-50233 * CVE-2024-50234 * CVE-2024-50235 * CVE-2024-50236 * CVE-2024-50237 * CVE-2024-50240 * CVE-2024-50245 * CVE-2024-50246 * CVE-2024-50248 * CVE-2024-50249 * CVE-2024-50250 * CVE-2024-50252 * CVE-2024-50255 * CVE-2024-50257 * CVE-2024-50261 * CVE-2024-50264 * CVE-2024-50265 * CVE-2024-50267 * CVE-2024-50268 * CVE-2024-50269 * CVE-2024-50271 * CVE-2024-50273 * CVE-2024-50274 * CVE-2024-50275 * CVE-2024-50276 * CVE-2024-50279 * CVE-2024-50282 * CVE-2024-50287 * CVE-2024-50289 * CVE-2024-50290 * CVE-2024-50292 * CVE-2024-50295 * CVE-2024-50296 * CVE-2024-50298 * CVE-2024-50301 * CVE-2024-50302 * CVE-2024-53042 * CVE-2024-53043 * CVE-2024-53045 * CVE-2024-53048 * CVE-2024-53051 * CVE-2024-53052 * CVE-2024-53055 * CVE-2024-53056 * CVE-2024-53058 * CVE-2024-53059 * CVE-2024-53060 * CVE-2024-53061 * CVE-2024-53063 * CVE-2024-53066 * CVE-2024-53068 * CVE-2024-53072 * CVE-2024-53074 * CVE-2024-53076 * CVE-2024-53079 * CVE-2024-53081 * CVE-2024-53082 * CVE-2024-53085 * CVE-2024-53088 * CVE-2024-53093 * CVE-2024-53094 * CVE-2024-53095 * CVE-2024-53096 * CVE-2024-53100 * CVE-2024-53101 * CVE-2024-53104 * CVE-2024-53106 * CVE-2024-53108 * CVE-2024-53110 * CVE-2024-53112 * CVE-2024-53114 * CVE-2024-53121 * CVE-2024-53138 CVSS scores: * CVE-2023-52778 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-52920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26596 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2024-26596 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26864 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36920 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41023 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-42102 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42102 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42102 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46680 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46680 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46681 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46765 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46788 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46845 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47666 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47679 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47703 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47703 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49866 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49866 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49866 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49894 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49894 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49894 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49895 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-49895 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49897 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49901 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49905 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49925 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49933 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49933 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49968 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49976 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49987 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49987 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49989 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50004 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50004 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50087 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50089 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50100 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50121 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50121 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50128 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50134 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50135 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50136 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50136 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50139 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50139 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-50139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50145 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50145 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50148 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50150 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50153 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50158 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50160 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50169 ( SUSE ): 0.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50169 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50169 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50171 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50172 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50176 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50177 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50181 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50181 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50183 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50205 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50208 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50210 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50225 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50228 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50229 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50231 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50231 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50232 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50233 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50235 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50236 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50240 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50245 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50246 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50246 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50248 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50248 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50248 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50250 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50250 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-50250 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-50252 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50257 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50275 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50275 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50276 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50296 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53042 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53043 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53043 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53074 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53100 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53100 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53101 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53101 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53108 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53110 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53112 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53121 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53138 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Real Time Module 15-SP6 An update that solves 241 vulnerabilities, contains four features and has 43 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52778: mptcp: deal with large GSO size (bsc#1224948). * CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in precision tracking (bsc#1232823). * CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check on non- DSA netdevice events (bsc#1220355). * CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished() (bsc#1222587). * CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590). * CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656). * CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on netlink dump (bsc#1223733). * CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head (bsc#1224518). * CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (bsc#1224548). * CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725). * CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730). * CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742). * CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb() (bsc#1225813). * CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764). * CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() (bsc#1226130). * CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748). * CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio (bsc#1227842). * CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430). * CVE-2024-42102: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" (bsc#1233132). * CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231). * CVE-2024-46680: Bluetooth: btnxpuart: Fix random crash seen while removing driver (bsc#1230557). * CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558). * CVE-2024-46765: ice: protect XDP configuration with a mutex (bsc#1230807). * CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827). * CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput() (bsc#1231930). * CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath the filesystem (bsc#1231920). * CVE-2024-47703: bpf, lsm: add check for BPF LSM return value (bsc#1231946). * CVE-2024-49852: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() (bsc#1232819). * CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272). * CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201). * CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent() (bsc#1232199). * CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware format translation (bsc#1232354). * CVE-2024-49895: drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation (bsc#1232352). * CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used (bsc#1232355). * CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1 (bsc#1232358). * CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs (bsc#1232305). * CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func (bsc#1232337). * CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func (bsc#1232366). * CVE-2024-49912: drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream' (bsc#1232367). * CVE-2024-49913: drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream (bsc#1232307). * CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371). * CVE-2024-49922: drm/amd/display: Check null pointers before using them (bsc#1232374). * CVE-2024-49923: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags (bsc#1232361). * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224) * CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368). * CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name (bsc#1232387). * CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start (bsc#1232166). * CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165). * CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption (bsc#1232157). * CVE-2024-49959: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error (bsc#1232149). * CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted with siphash (bsc#1232264). * CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (bsc#1232096). * CVE-2024-49987: bpftool: Fix undefined behavior in qsort(NULL, 0, ...) (bsc#1232258). * CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module unload (bsc#1232483). * CVE-2024-50003: drm/amd/display: Fix system hang while resume with TBT monitor (bsc#1232385). * CVE-2024-50004: drm/amd/display: update DML2 policy EnhancedPrefetchScheduleAccelerationFinal DCN35 (bsc#1232396). * CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate() (bsc#1232442). * CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value (bsc#1232318). * CVE-2024-50012: cpufreq: Avoid a bad reference count on CPU node (bsc#1232386). * CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path (bsc#1232446). * CVE-2024-50015: ext4: dax: fix overflowing extents beyond inode size when partially writing (bsc#1232079). * CVE-2024-50080: ublk: do not allow user copy for unprivileged device (bsc#1232502). * CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx (bsc#1232501). * CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (bsc#1232500). * CVE-2024-50084: net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test() (bsc#1232494). * CVE-2024-50087: btrfs: fix uninitialized pointer free on read_alloc_one_name() error (bsc#1232499). * CVE-2024-50088: btrfs: fix uninitialized pointer free in add_inode_ref() (bsc#1232498). * CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down (bsc#1232881). * CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping (bsc#1232885). * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919). * CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232926). * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928). * CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907). * CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905). * CVE-2024-50130: netfilter: bpf: must hold reference on net namespace (bsc#1232894). * CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935). * CVE-2024-50139: KVM: arm64: Fix shift-out-of-bounds bug (bsc#1233062). * CVE-2024-50145: octeon_ep: add SKB allocation failures handling in __octep_oq_process_rx() (bsc#1233044). * CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in target_alloc_device() (bsc#1233061). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070). * CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices (bsc#1233050). * CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049). * CVE-2024-50169: vsock: Update rx_bytes on read_skb() (bsc#1233320). * CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057). * CVE-2024-50177: drm/amd/display: fix a UBSAN warning in DML2.1 (bsc#1233115). * CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct map (bsc#1233129). * CVE-2024-50184: virtio_pmem: Check device status before requesting flush (bsc#1233135). * CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails (bsc#1233110). * CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE (bsc#1233106). * CVE-2024-50225: btrfs: fix error propagation of split bios (bsc#1233193). * CVE-2024-50228: mm: shmem: fix data-race in shmem_getattr() (bsc#1233204). * CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked flag (bsc#1233206). * CVE-2024-50245: fs/ntfs3: Fix possible deadlock in mi_read (bsc#1233203). * CVE-2024-50246: fs/ntfs3: Add rough attr alloc_size check (bsc#1233207). * CVE-2024-50248: ntfs3: add bounds checking to mi_enum_attr() (bsc#1233219). * CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks (bsc#1233226). * CVE-2024-50252: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address (bsc#1233201). * CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233244). * CVE-2024-50261: macsec: Fix use-after-free while sending the offloading packet (bsc#1233253). * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453). * CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460). * CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462). * CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463). * CVE-2024-50275: arm64/sve: Discard stale CPU state when handling SVE traps (bsc#1233464). * CVE-2024-50276: net: vertexcom: mse102x: Fix possible double free of TX skb (bsc#1233465). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468). * CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478). * CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single (bsc#1233484). * CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver (bsc#1233485). * CVE-2024-50298: net: enetc: allocate vf_state during PF probes (bsc#1233487). * CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow() (bsc#1233540). * CVE-2024-53043: mctp i2c: handle NULL header address (bsc#1233523). * CVE-2024-53048: ice: fix crash on probe for DPLL enabled E810 LOM (bsc#1233721). * CVE-2024-53051: drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability (bsc#1233547). * CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction (bsc#1233550). * CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in mtk_crtc_destroy() (bsc#1233568). * CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552). * CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking (bsc#1233570). * CVE-2024-53082: virtio_net: Add hash_key_length check (bsc#1233573). * CVE-2024-53095: smb: client: Fix use-after-free of network namespace (bsc#1233642). * CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error (bsc#1234085). * CVE-2024-53121: net/mlx5: fs, lock FTE when checking if active (bsc#1234078). * CVE-2024-53138: net/mlx5e: kTLS, Fix incorrect page refcounting (bsc#1234223). The following non-security bugs were fixed: * Documentation: kgdb: Correct parameter error (git-fixes). * Drop OCFS2 patch causing a regression (bsc#1233255) * Move upstreamed crypto patches into sorted section * Move upstreamed patches into sorted section * Revert "KVM: PPC: Book3S HV Nested: Stop forwarding all HFUs to L1" (bsc#1215199). * Revert "RDMA/core: Fix ENODEV error for iWARP test over vlan" (git-fixes) * Revert "cgroup: Fix memory leak caused by missing cgroup_bpf_offline" (bsc#1234108). * Revert "cpufreq: brcmstb-avs-cpufreq: Fix initial command check" (stable- fixes). * Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" (git- fixes). * Revert "usb: gadget: composite: fix OS descriptors w_value logic" (git- fixes). * Update config files (bsc#1218644). LIVEPATCH_IPA_CLONES=n => LIVEPATCH=n * Update config files. Enabled IDPF for ARM64 (bsc#1221309) * accel: Use XArray instead of IDR for minors (jsc#PED-11580). * accel: Use XArray instead of IDR for minors (jsc#PED-11580). * acpi/arm64: Adjust error handling procedure in gtdt_parse_timer_block() (git-fixes). * acpi: CPPC: Fix _CPC register setting issue (git-fixes). * ad7780: fix division by zero in ad7780_write_raw() (git-fixes). * add bugreference to a hv_netvsc patch (bsc#1232413). * aes-gcm-p10: Use the correct bit to test for P10 (bsc#1232704). * alsa: 6fire: Release resources at card release (git-fixes). * alsa: ac97: bus: Fix the mistake in the comment (git-fixes). * alsa: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes). * alsa: firewire-lib: fix return value on fail in amdtp_tscm_init() (git- fixes). * alsa: hda/conexant: fix Z60MR100 startup pop issue (stable-fixes). * alsa: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes). * alsa: hda/realtek - update set GPIO3 to default for Thinkpad with ALC1318 (git-fixes). * alsa: hda/realtek: Add support for Samsung Galaxy Book3 360 (NP730QFG) (stable-fixes). * alsa: hda/realtek: Apply quirk for Medion E15433 (bsc#1233298). * alsa: hda/realtek: Enable mute and micmute LED on HP ProBook 430 G8 (stable- fixes). * alsa: hda/realtek: Enable speaker pins for Medion E15443 platform (bsc#1233298). * alsa: hda/realtek: Fix Internal Speaker and Mic boost of Infinix Y4 Max (bsc#1233298). * alsa: hda/realtek: Set PCBeep to default value for ALC274 (stable-fixes). * alsa: hda/realtek: Update ALC225 depop procedure (git-fixes). * alsa: hda/realtek: Update ALC256 depop procedure (git-fixes). * alsa: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable- fixes). * alsa: hda: Poll jack events for LS7A HD-Audio (stable-fixes). * alsa: hda: Show the codec quirk info at probing (stable-fixes). * alsa: ice1712: Remove redundant code in stac9460_dac_vol_put (stable-fixes). * alsa: pcm: Add sanity NULL check for the default mmap fault handler (stable- fixes). * alsa: ump: Fix evaluation of MIDI 1.0 FB info (git-fixes). * alsa: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes). * alsa: usb-audio: Add Pioneer DJ/AlphaTheta DJM-A9 Mixer (stable-fixes). * alsa: usb-audio: Fix Yamaha P-125 Quirk Entry (stable-fixes). * alsa: usb-audio: Fix a DMA to stack memory bug (git-fixes). * alsa: usb-audio: Fix out of bounds reads when finding clock sources (stable- fixes). * alsa: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (git-fixes). * alsa: usb-audio: Make mic volume workarounds globally applicable (stable- fixes). * alsa: usb-audio: Use snprintf instead of sprintf in build_mixer_unit_ctl (stable-fixes). * alsa: usb-audio: add mixer mapping for Corsair HS80 (stable-fixes). * alsa: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes). * amd-pstate: Set min_perf to nominal_perf for active mode performance gov (git-fixes). * apparmor: fix 'Do simple duplicate message elimination' (git-fixes). * apparmor: test: Fix memory leak for aa_unpack_strdup() (git-fixes). * apparmor: use kvfree_sensitive to free data->data (git-fixes). * arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer (git- fixes) * arm64: dts: freescale: imx8mm-verdin: Fix SD regulator startup delay (git- fixes) * arm64: dts: freescale: imx8mp-verdin: Fix SD regulator startup delay (git- fixes) * arm64: dts: imx8-ss-vpu: Fix imx8qm VPU IRQs (git-fixes) * arm64: dts: imx8qxp: Add VPU subsystem file (git-fixes) * arm64: dts: imx93: add nvmem property for eqos (git-fixes) * arm64: dts: imx93: add nvmem property for fec1 (git-fixes) * arm64: dts: imx93: add ocotp node (git-fixes) * arm64: dts: rockchip: Add DTS for FriendlyARM NanoPi R2S Plus (git-fixes) * arm64: dts: rockchip: Correct GPIO polarity on brcm BT nodes (git-fixes) * arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc (git-fixes) * arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards (git-fixes) * arm64: dts: rockchip: Fix bluetooth properties on rk3566 box demo (git- fixes) * arm64: dts: rockchip: Fix reset-gpios property on brcm BT nodes (git-fixes) * arm64: dts: rockchip: Fix rt5651 compatible value on (git-fixes) * arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-eaidk-610 (git- fixes) * arm64: dts: rockchip: Fix wakeup prop names on PineNote BT node (git-fixes) * arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma (git- fixes) * arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328 (git-fixes) * arm64: dts: rockchip: Remove undocumented supports-emmc property (git-fixes) * arm64: dts: rockchip: fix i2c2 pinctrl-names property on (git-fixes) * arm64: dts: rockchip: remove num-slots property from (git-fixes) * arm64: dts: rockchip: remove orphaned pinctrl-names from pinephone (git- fixes) * arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes) * arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git- fixes) * arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes) * arm64: tegra: Move AGX Orin nodes to correct location (git-fixes) * arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git- fixes) * asoc: Intel: avs: da7219: Remove suspend_pre() and resume_post() (stable- fixes). * asoc: SOF: Add i2s bt dai configuration support for AMD platforms (bsc#1233305). * asoc: SOF: Add support for configuring PDM interface from topology (bsc#1233305). * asoc: SOF: Deprecate invalid enums in IPC3 (bsc#1233305). * asoc: SOF: IPC4: get pipeline priority from topology (bsc#1233305). * asoc: SOF: IPC4: synchronize fw_config_params with fw definitions (bsc#1233305). * asoc: SOF: Refactor sof_i2s_tokens reading to update acpbt dai (bsc#1233305). * asoc: SOF: Rename amd_bt sof_dai_type (bsc#1233305). * asoc: SOF: Wire up buffer flags (bsc#1233305). * asoc: SOF: add alignment for topology header file struct definition (bsc#1233305). * asoc: SOF: align topology header file with sof topology header (bsc#1233305). * asoc: SOF: ipc3-topology: Convert the topology pin index to ALH dai index (git-fixes). * asoc: SOF: ipc3-topology: fix resource leaks in sof_ipc3_widget_setup_comp_dai() (git-fixes). * asoc: SOF: ipc4-control: Add support for ALSA enum control (bsc#1233305). * asoc: SOF: ipc4-control: Add support for ALSA switch control (bsc#1233305). * asoc: SOF: ipc4-mtrace: move debug slot related definitions to header.h (bsc#1233305). * asoc: SOF: ipc4-topology: Add deep buffer size to debug prints (bsc#1233305). * asoc: SOF: ipc4-topology: Add definition for generic switch/enum control (bsc#1233305). * asoc: SOF: ipc4-topology: Add module ID print during module set up (bsc#1233305). * asoc: SOF: ipc4-topology: Helper to find an swidget by module/instance id (bsc#1233305). * asoc: SOF: ipc4-topology: Only handle dai_config with HW_PARAMS for ChainDMA (bsc#1233305). * asoc: SOF: ipc4-topology: change chain_dma handling in dai_config (bsc#1233305). * asoc: SOF: ipc4-topology: export sof_ipc4_copier_is_single_format (bsc#1233305). * asoc: SOF: ipc4-topology: set config_length based on device_count (bsc#1233305). * asoc: SOF: ipc4: Add data struct for module notification message from firmware (bsc#1233305). * asoc: SOF: ipc4: Add new message type: SOF_IPC4_GLB_LOAD_LIBRARY_PREPARE (bsc#1233305). * asoc: SOF: sof-client-probes-ipc4: Set param_size extension bits (git- fixes). * asoc: SOF: topology: Parse DAI type token for dspless mode (bsc#1233305). * asoc: SOF: topology: dynamically allocate and store DAI widget->private (bsc#1233305). * asoc: amd: yc: Add quirk for ASUS Vivobook S15 M3502RA (stable-fixes). * asoc: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes). * asoc: amd: yc: Fix non-functional mic on ASUS E1404FA (stable-fixes). * asoc: amd: yc: Support dmic on another model of Lenovo Thinkpad E14 Gen 6 (stable-fixes). * asoc: amd: yc: fix internal mic on Xiaomi Book Pro 14 2022 (stable-fixes). * asoc: audio-graph-card2: Purge absent supplies for device tree nodes (stable-fixes). * asoc: codecs: Fix atomicity violation in snd_soc_component_get_drvdata() (git-fixes). * asoc: fsl_micfil: Add sample rate constraint (stable-fixes). * asoc: fsl_micfil: fix regmap_write_bits usage (git-fixes). * asoc: mediatek: mt8188-mt6359: Remove hardcoded dmic codec (git-fixes). * asoc: rt722-sdca: Remove logically deadcode in rt722-sdca.c (git-fixes). * asoc: rt722-sdca: increase clk_stop_timeout to fix clock stop issue (stable- fixes). * asoc: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git- fixes). * asoc: stm: Prevent potential division by zero in stm32_sai_get_clk_div() (stable-fixes). * asoc: stm: Prevent potential division by zero in stm32_sai_mclk_round_rate() (stable-fixes). * asoc: tas2781: Add new driver version for tas2563 & tas2781 qfn chip (stable-fixes). * bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git- fixes). * bluetooth: btintel: Direct exception event to bluetooth stack (git-fixes). * bluetooth: btnxpuart: Resolve TX timeout error in power save stress test (bsc#1230557) * bluetooth: fix use-after-free in device_for_each_child() (git-fixes). * bluetooth: hci_core: Fix calling mgmt_device_connected (git-fixes). * bpf, arm64: Fix address emission with tag-based KASAN enabled (git-fixes) * bpf, arm64: Remove garbage frame for struct_ops trampoline (git-fixes) * bpf, sockmap: SK_DROP on attempted redirects of unsupported af_vsock (git- fixes). * bpf, vsock: Drop static vsock_bpf_prot initialization (git-fixes). * btrfs: merge btrfs_orig_bbio_end_io() into btrfs_bio_end_io() (bsc#1233193) * can: c_can: c_can_handle_bus_err(): update statistics if skb allocation fails (git-fixes). * can: c_can: fix {rx,tx}_errors statistics (git-fixes). * can: dev: can_set_termination(): allow sleeping GPIOs (git-fixes). * can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes). * can: hi311x: hi3110_can_ist(): fix potential use-after-free (git-fixes). * can: hi311x: hi3110_can_ist(): fix {rx,tx}_errors statistics (git-fixes). * can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes). * can: j1939: j1939_session_new(): fix skb reference counting (git-fixes). * can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git- fixes). * can: mcp251xfd: mcp251xfd_get_tef_len(): fix length calculation (git-fixes). * can: mcp251xfd: mcp251xfd_get_tef_len(): work around erratum DS80000789E 6 (git-fixes). * can: mcp251xfd: mcp251xfd_ring_alloc(): fix coalescing configuration when switching CAN modes (git-fixes). * can: sja1000: sja1000_err(): fix {rx,tx}_errors statistics (git-fixes). * can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL (git-fixes). * can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes). * cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108). * clk: clk-apple-nco: Add NULL check in applnco_probe (git-fixes). * clk: clk-axi-clkgen: make sure to enable the AXI bus clock (git-fixes). * clk: imx: clk-scu: fix clk enable state save and restore (git-fixes). * clk: imx: fracn-gppll: correct PLL initialization flow (git-fixes). * clk: imx: fracn-gppll: fix pll power up (git-fixes). * clk: imx: lpcg-scu: SW workaround for errata (e10858) (git-fixes). * clk: qcom: clk-alpha-pll: drop lucid-evo pll enabled warning (git-fixes). * clk: qcom: clk-alpha-pll: fix lucid 5lpe pll enabled check (git-fixes). * clk: qcom: gcc-qcs404: fix initial rate of GPLL3 (git-fixes). * clk: renesas: rzg2l: Fix FOUTPOSTDIV clk (git-fixes). * clk: sunxi-ng: d1: Fix PLL_AUDIO0 preset (git-fixes). * comedi: Flush partial mappings in error case (git-fixes). * cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() (git- fixes). * cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw() (git- fixes). * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_cost() (git-fixes). * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_power() (git-fixes). * cpufreq: loongson2: Unregister platform_driver on failure (git-fixes). * cpufreq: mediatek-hw: Fix wrong return value in mtk_cpufreq_get_cpu_power() (git-fixes). * crypto: aes-gcm-p10 - Use the correct bit to test for P10 (bsc#1232704). * crypto: api - Fix liveliness check in crypto_alg_tested (stable-fixes). * crypto: bcm - add error check in the ahash_hmac_init function (git-fixes). * crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes). * crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes). * crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git- fixes). * crypto: cavium - Fix the if condition to exit loop after timeout (git- fixes). * crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init() (git-fixes). * crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY (git-fixes). * crypto: qat - remove check after debugfs_create_dir() (git-fixes). * crypto: qat - remove faulty arbiter config reset (git-fixes). * crypto: qat/qat_4xxx - fix off by one in uof_get_name() (git-fixes). * crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes). * cxl: downgrade a warning message to debug level in cxl_probe_component_regs() (bsc#1229165). * dma-fence: Fix reference leak on fence merge failure path (git-fixes). * dma-fence: Use kernel's sort for merging fences (git-fixes). * doc: rcu: update printed dynticks counter bits (git-fixes). * drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend() (git-fixes). * drm/amd/display: Adjust VSDB parser for replay feature (stable-fixes). * drm/amd/display: Fix brightness level not retained over reboot (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in dcn20_program_pipe (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in hwss_setup_dpp (git-fixes). * drm/amd: Add some missing straps from NBIO 7.11.0 (git-fixes). * drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes). * drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable- fixes). * drm/amdgpu: Adjust debugfs register access permissions (stable-fixes). * drm/amdgpu: Fix DPX valid mode check on GC 9.4.3 (git-fixes). * drm/amdgpu: Fix JPEG v4.0.3 register write (git-fixes). * drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable- fixes). * drm/amdgpu: fix check in gmc_v9_0_get_vm_pte() (git-fixes). * drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git- fixes). * drm/amdkfd: Accounting pdd vram_usage for svm (stable-fixes). * drm/amdkfd: Fix wrong usage of INIT_WORK() (git-fixes). * drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: it6505: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: tc358767: Fix link properties discovery (git-fixes). * drm/bridge: tc358768: Fix DSI command tx (git-fixes). * drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git- fixes). * drm/etnaviv: hold GPU lock across perfmon sampling (git-fixes). * drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/mediatek: Fix child node refcount handling in early exit (git-fixes). * drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git- fixes). * drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk() (git-fixes). * drm/msm/dpu: drop LM_3 / LM_4 on MSM8998 (git-fixes). * drm/msm/dpu: drop LM_3 / LM_4 on SDM845 (git-fixes). * drm/msm/dpu: on SDM845 move DSPP_3 to LM_5 block (git-fixes). * drm/msm/gpu: Check the status of registration to PM QoS (git-fixes). * drm/msm: Fix some typos in comment (git-fixes). * drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() (git-fixes). * drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes). * drm/omap: Fix possible NULL dereference (git-fixes). * drm/panfrost: Add missing OPP table refcnt decremental (git-fixes). * drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes). * drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes). * drm/sti: Add __iomem for mixer_dbg_mxn's parameter (git-fixes). * drm/sti: avoid potential dereference of error pointers (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check (git-fixes). * drm/v3d: Address race-condition in MMU flush (git-fixes). * drm/v3d: Enable Performance Counters before clearing them (git-fixes). * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_atomic_flush (git- fixes). * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_lut_load (git-fixes). * drm/vc4: hdmi: Avoid hang with debug registers when suspended (git-fixes). * drm/vc4: hvs: Correct logic on stopping an HVS channel (git-fixes). * drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes). * drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git- fixes). * drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git- fixes). * drm/vkms: Drop unnecessary call to drm_crtc_cleanup() (git-fixes). * drm/vmwgfx: Limit display layout ioctl array size to VMWGFX_NUM_DISPLAY_UNITS (stable-fixes). * drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580). * drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580). * drm: Use XArray instead of IDR for minors (jsc#PED-11580). * drm: Use XArray instead of IDR for minors (jsc#PED-11580). * drm: use ATOMIC64_INIT() for atomic64_t (git-fixes). * drm: xlnx: zynqmp_dpsub: fix hotplug detection (git-fixes). * drm: zynqmp_kms: Unplug DRM device before removal (git-fixes). * e1000e: Remove Meteor Lake SMBUS workarounds (git-fixes). * efi/libstub: Free correct pointer on failure (git-fixes). * efi/libstub: fix efi_parse_options() ignoring the default command line (git- fixes). * efi/libstub: zboot.lds: Discard .discard sections (stable-fixes). * efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465). * ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201) * ext4: fix unttached inode after power cut with orphan file feature enabled (bsc#1234009). * f2fs: get out of a repeat loop when getting a locked data page (bsc#1234011). * fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() (git- fixes). * firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (git- fixes). * firmware: google: Unregister driver_info on failure (git-fixes). * firmware_loader: Fix possible resource leak in fw_log_firmware_info() (git- fixes). * fs/ntfs3: Add more attributes checks in mi_enum_attr() (bsc#1233207) * fs/ntfs3: Fixed overflow check in mi_enum_attr() (bsc#1233207) * fs/ntfs3: Sequential field availability check in mi_enum_attr() (bsc#1233207) * fs: Fix uninitialized value issue in from_kuid and from_kgid (git-fixes). * goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes). * gpio: exar: set value when external pull-up or pull-down is present (git- fixes). * gpio: zevio: Add missed label initialisation (git-fixes). * hid: core: zero-initialize the report buffer (git-fixes). * hid: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable- fixes). * hid: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable- fixes). * hid: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad (stable-fixes). * hid: multitouch: Add support for B2402FVA track point (stable-fixes). * hid: wacom: Interpret tilt data from Intuos Pro BT as signed values (git- fixes). * hid: wacom: fix when get product name maybe null pointer (git-fixes). * hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git- fixes). * hwmon: (nct6775-core) Fix overflows seen when writing limit attributes (git- fixes). * hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes). * i2c: designware: do not hold SCL low when I2C_DYNAMIC_TAR_UPDATE is not set (git-fixes). * i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git- fixes). * i3c: master: svc: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes). * i40e: fix race condition by adding filter's intermediate sync state (git- fixes). * iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes). * igb: Disable threaded IRQ for igb_msix_other (git-fixes). * iio: Fix fwnode_handle in __fwnode_iio_channel_get_by_name() (git-fixes). * iio: accel: kx022a: Fix raw read format (git-fixes). * iio: adc: ad7606: Fix typo in the driver name (git-fixes). * iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes). * iio: gts: Fix uninitialized symbol 'ret' (git-fixes). * iio: gts: fix infinite loop for gain_to_scaletables() (git-fixes). * iio: light: al3010: Fix an error handling path in al3010_probe() (git- fixes). * ima: fix buffer overrun in ima_eventdigest_init_common (git-fixes). * initramfs: avoid filename buffer overrun (bsc#1232436). * input: hideep - add missing dependency on REGMAP_I2C (git-fixes). * input: hycon-hy46xx - add missing dependency on REGMAP_I2C (git-fixes). * input: xpad - add GameSir T4 Kaleid Controller support (git-fixes). * input: xpad - add GameSir VID for Xbox One controllers (git-fixes). * input: xpad - add support for 8BitDo Ultimate 2C Wireless Controller (git- fixes). * input: xpad - add support for MSI Claw A1M (git-fixes). * input: xpad - add support for Machenike G5 Pro Controller (git-fixes). * input: xpad - fix support for some third-party controllers (git-fixes). * input: xpad - sort xpad_device by vendor and product ID (git-fixes). * input: xpad - spelling fixes for "Xbox" (git-fixes). * intel_idle: add Granite Rapids Xeon support (bsc#1231630). * intel_idle: fix ACPI _CST matching for newer Xeon platforms (bsc#1231630). * io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (git-fixes). * io_uring/sqpoll: close race on waiting for sqring entries (git-fixes). * irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes). * jbd2: Move j_transaction_overhead_buffers into a hole (bsc#1234042). * jbd2: avoid infinite transaction commit loop (bsc#1234039). * jbd2: avoid memleak in jbd2_journal_write_metadata_buffer (bsc#1234043). * jbd2: avoid mount failed when commit block is partial submitted (bsc#1234040). * jbd2: correct the printing of write_flags in jbd2_write_superblock() (bsc#1234045). * jbd2: fix kernel-doc for j_transaction_overhead_buffers (bsc#1234042). * jbd2: fix potential data lost in recovering journal raced with synchronizing fs bdev (bsc#1234044). * jbd2: fix soft lockup in journal_finish_inode_data_buffers() (bsc#1234046). * jbd2: make jbd2_journal_get_max_txn_bufs() internal (bsc#1234041). * jbd2: precompute number of transaction descriptor blocks (bsc#1234042). * kABI workaround for ASoC SOF (bsc#1233305). * kABI: Restore exported __arm_smccc_sve_check (git-fixes) * kabi, mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git- fixes kabi). * kasan: move checks to do_strncpy_from_user (git-fixes). * kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644). * kexec_file: fix elfcorehdr digest exclusion when CONFIG_CRASH_HOTPLUG=y (git-fixes). * kvm: PPC: Book3S HV: Avoid returning to nested hypervisor on pending doorbells (bsc#1215199). * kvm: PPC: Book3S HV: Stop using vc->dpdes for nested KVM guests (bsc#1215199). * kvm: PPC: Book3S HV: remove unused varible (bsc#1194869). * kvm: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests (bsc#1232207). * kvm: SEV-ES: Prevent MSR access post VMSA encryption (bsc#1232207). * leds: lp55xx: Remove redundant test for invalid channel number (git-fixes). * lib: string_helpers: silence snprintf() output truncation warning (git- fixes). * mailbox: arm_mhuv2: clean up loop in get_irq_chan_comb() (git-fixes). * maple_tree: fix alloc node fail issue (git-fixes). * maple_tree: refine mas_store_root() on storing NULL (git-fixes). * media: adv7604: prevent underflow condition when reporting colorspace (git- fixes). * media: amphion: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * media: amphion: Set video drvdata before register video device (git-fixes). * media: ar0521: do not overflow when checking PLL values (git-fixes). * media: atomisp: Add check for rgby_data memory allocation failure (git- fixes). * media: bttv: use audio defaults for winfast2000 (git-fixes). * media: core: v4l2-ioctl: check if ioctl is known to avoid NULL name (git- fixes). * media: cx24116: prevent overflows on SNR calculus (git-fixes). * media: dvb_frontend: do not play tricks with underflow values (git-fixes). * media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set (stable- fixes). * media: dvbdev: prevent the risk of out of memory access (git-fixes). * media: gspca: ov534-ov772x: Fix off-by-one error in set_frame_rate() (git- fixes). * media: i2c: dw9768: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes). * media: i2c: tc358743: Fix crash in the probe error path when using polling (git-fixes). * media: imx-jpeg: Ensure power suppliers be suspended before detach them (git-fixes). * media: imx-jpeg: Set video drvdata before register video device (git-fixes). * media: mantis: remove orphan mantis_core.h (git-fixes). * media: mtk-jpeg: Fix null-ptr-deref during unload module (git-fixes). * media: platform: allegro-dvt: Fix possible memory leak in allocate_buffers_internal() (git-fixes). * media: platform: exynos4-is: Fix an OF node reference leak in fimc_md_is_isp_available (git-fixes). * media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes). * media: s5p-jpeg: prevent buffer overflows (git-fixes). * media: stb0899_algo: initialize cfr before using it (git-fixes). * media: ts2020: fix null-ptr-deref in ts2020_probe() (git-fixes). * media: uvcvideo: Require entities to have a non-zero unique ID (git-fixes). * media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (git-fixes). * media: uvcvideo: Stop stream during unregister (git-fixes). * media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes). * media: v4l2-tpg: prevent the risk of a division by zero (git-fixes). * media: vb2: Fix comment (git-fixes). * media: venus: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * media: videobuf2: fix typo: vb2_dbuf -> vb2_qbuf (git-fixes). * media: wl128x: Fix atomicity violation in fmc_send_cmd() (git-fixes). * mfd: rt5033: Fix missing regmap_del_irq_chip() (git-fixes). * mfd: tps65010: Use IRQF_NO_AUTOEN flag in request_irq() to fix race (git- fixes). * minmax: scsi: fix mis-use of 'clamp()' in sr.c (git-fixes). * misc: apds990x: Fix missing pm_runtime_disable() (git-fixes). * mlxbf_gige: disable RX filters until RX path initialized (git-fixes). * mm/hugetlb: fix nodes huge page allocation when there are surplus pages (bsc#1234012). * mm: avoid unsafe VMA hook invocation when error arises on mmap hook (git- fixes). * mm: move dummy_vm_ops out of a header (git-fixes prerequisity). * mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-fixes). * mm: refactor map_deny_write_exec() (git-fixes). * mm: resolve faulty mmap_region() error path behaviour (git-fixes). * mm: unconditionally close VMAs on error (git-fixes). * mmc: core: Further prevent card detect during shutdown (git-fixes). * mmc: mmc_spi: drop buggy snprintf() (git-fixes). * mmc: sunxi-mmc: Fix A100 compatible description (git-fixes). * modpost: remove incorrect code in do_eisa_entry() (git-fixes). * mtd: rawnand: atmel: Fix possible memory leak (git-fixes). * mtd: spi-nor: core: replace dummy buswidth from addr to data (git-fixes). * net: mdio-ipq4019: add missing error check (git-fixes). * net: phy: dp83822: Fix reset pin definitions (git-fixes). * net: phy: ti: add PHY_RST_AFTER_CLK_EN flag (git-fixes). * net: relax socket state check at accept time (git-fixes). * net: usb: lan78xx: Fix double free issue with interrupt buffer allocation (git-fixes). * net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device (git-fixes). * net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration (git-fixes). * net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes). * net: wwan: fix global oob in wwan_rtnl_policy (git-fixes). * net: wwan: t7xx: Fix off-by-one error in t7xx_dpmaif_rx_buf_alloc() (git- fixes). * net: xfrm: preserve kabi for xfrm_state (bsc#1233754). * netdevsim: copy addresses for both in and out paths (git-fixes). * netfilter: nf_tables: missing iterator type in lookup walk (git-fixes). * nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes). * nfs: avoid i_lock contention in nfs_clear_invalid_mapping (git-fixes). * nfs: remove revoked delegation from server's delegation list (git-fixes). * nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234121). * nilfs2: fix potential deadlock with newly created symlinks (git-fixes). * nouveau/dp: handle retries for AUX CH transfers with GSP (git-fixes). * nouveau: fw: sync dma after setup is called (git-fixes). * nouveau: handle EBUSY and EAGAIN for GSP aux errors (git-fixes). * ntfs3: Add bounds checking to mi_enum_attr() (bsc#1233207) * nvme-fabrics: fix kernel crash while shutting down controller (git-fixes). * nvme-loop: flush off pending I/O while shutting down loop controller (git- fixes). * nvme-pci: fix freeing of the HMB descriptor table (git-fixes). * nvme-pci: reverse request order in nvme_queue_rqs (git-fixes). * nvme/host: Fix RCU list traversal to use SRCU primitive (git-fixes). * nvme: tcp: avoid race between queue_lock lock and destroy (git-fixes). * ocfs2: fix UBSAN warning in ocfs2_verify_volume() (git-fixes). * ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (git-fixes). * ocfs2: uncache inode which has failed entering the group (git-fixes). * of: Add cleanup.h based auto release via __free(device_node) markings (bsc#1232386) * pci: Add T_PVPERL macro (git-fixes). * pci: Fix reset_method_store() memory leak (git-fixes). * pci: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf() (git-fixes). * pci: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds (git-fixes). * pci: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes). * pci: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible (git-fixes). * pci: rockchip-ep: Fix address translation unit programming (git-fixes). * pinctrl: k210: Undef K210_PC_DEFAULT (git-fixes). * pinctrl: qcom: spmi: fix debugfs drive strength (git-fixes). * pinctrl: zynqmp: drop excess struct member description (git-fixes). * platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git- fixes). * platform/x86/amd/pmc: Detect when STB is not available (git-fixes). * platform/x86: panasonic-laptop: Return errno correctly in show callback (git-fixes). * posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098). * power: supply: bq27xxx: Fix registers of bq27426 (git-fixes). * power: supply: core: Remove might_sleep() from power_supply_put() (git- fixes). * power: supply: rt9471: Fix wrong WDT function regfield declaration (git- fixes). * power: supply: rt9471: Use IC status regfield to report real charger status (git-fixes). * powerpc/64s: Fix unnecessary copy to 0 when kernel is booted at address 0 (bsc#1215199). * powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869). * powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init() (bsc#1215199). * powerpc/fadump: Refactor and prepare fadump_cma_init for late init (bsc#1215199). * powerpc/kexec: Fix return of uninitialized variable (bsc#1194869). * powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869). * powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869). * powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL (bsc#1194869). * powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869). * powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector (bsc#1194869). * powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869). * powerpc/pseries: Use correct data types from pseries_hp_errorlog struct (bsc#1215199). * powerpc/vdso: Inconditionally use CFUNC macro (bsc#1215199). * pwm: imx-tpm: Use correct MODULO value for EPWM mode (git-fixes). * rdma/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes) * rdma/hns: Add mutex_destroy() (git-fixes) * rdma/hns: Disassociate mmap pages for all uctx when HW is being reset (git- fixes) * rdma/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes) * rdma/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci (git-fixes) * rdma/hns: Fix cpu stuck caused by printings during reset (git-fixes) * rdma/hns: Fix different dgids mapping to the same dip_idx (git-fixes) * rdma/hns: Fix flush cqe error when racing with destroy qp (git-fixes) * rdma/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes) * rdma/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes) * rdma/hns: Use macro instead of magic number (git-fixes) * rdma/mlx5: Move events notifier registration to be after device registration (git-fixes) * rdma/rxe: Fix the qp flush warnings in req (git-fixes) * rdma/rxe: Set queue pair cur_qp_state when being queried (git-fixes) * rdma/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES (git-fixes) * regmap: detach regmap from dev on regmap_exit (git-fixes). * regmap: irq: Set lockdep class for hierarchical IRQ domains (git-fixes). * rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644) * rtc: ab-eoz9: do not fail temperature reads on undervoltage notification (git-fixes). * rtc: abx80x: Fix WDT bit position of the status register (git-fixes). * rtc: bbnsm: add remove hook (git-fixes). * rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git- fixes). * rtc: rzn1: fix BCD to rtc_time conversion errors (git-fixes). * rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes). * scsi: NCR5380: Initialize buffer for MSG IN and STATUS transfers (git- fixes). * scsi: Remove scsi device no_start_on_resume flag (git-fixes). * scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes). * scsi: cdrom: kABI: fix cdrom_dev_ops change (git-fixes). * scsi: core: Disable CDL by default (git-fixes). * scsi: core: Fix handling of SCMD_FAIL_IF_RECOVERING (git-fixes). * scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes). * scsi: core: Handle devices which return an unusually large VPD page count (git-fixes). * scsi: core: alua: I/O errors for ALUA state transitions (git-fixes). * scsi: hisi_sas: Handle the NCQ error returned by D2H frame (git-fixes). * scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes). * scsi: kABI: restore no_start_on_resume to scsi_device (git-fixes). * scsi: libsas: Fix exp-attached device scan after probe failure scanned in again after probe failed (git-fixes). * scsi: libsas: Fix the failure of adding phy with zero-address to port (git- fixes). * scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241 jsc#PED-9943). * scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes). * scsi: mac_scsi: Refactor polling loop (git-fixes). * scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes). * scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (git-fixes). * scsi: mpi3mr: Avoid possible run-time warning with long manufacturer strings (git-fixes). * scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes). * scsi: mpi3mr: Validate SAS port assignments (git-fixes). * scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: pm8001: Do not overwrite PCI queue mapping (git-fixes). * scsi: pm80xx: Set phy->enable_completion only when we wait for it (git- fixes). * scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes). * scsi: scsi_transport_fc: Allow setting rport state to current state (git- fixes). * scsi: sd: Ignore command SYNCHRONIZE CACHE error if format in progress (git- fixes). * scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes). * scsi: smartpqi: correct stream detection (git-fixes). * scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git- fixes). * scsi: spi: Fix sshdr use (git-fixes). * scsi: sr: Fix unintentional arithmetic wraparound (git-fixes). * scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes). * security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes). * serial: 8250: omap: Move pm_runtime_get_sync (git-fixes). * signal: Replace BUG_ON()s (bsc#1234093). * soc: fsl: rcpm: fix missing of_node_put() in copy_ippdexpcr1_setting() (git- fixes). * soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (git- fixes). * soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * spi: Fix acpi deferred irq probe (git-fixes). * spi: atmel-quadspi: Fix register name in verbose logging function (git- fixes). * spi: mpc52xx: Add cancel_work_sync before module remove (git-fixes). * spi: tegra210-quad: Avoid shift-out-of-bounds (git-fixes). * sunrpc: Remove BUG_ON call sites (git-fixes). * tcp: Fix refcnt handling in __inet_hash_connect() (git-fixes). * thermal: core: Initialize thermal zones before registering them (git-fixes). * thermal: int3400: Fix reading of current_uuid for active policy (git-fixes). * thermal: intel: int340x: processor: Fix warning during module unload (git- fixes). * thunderbolt: Honor TMU requirements in the domain when setting TMU mode (stable-fixes). * tools/lib/thermal: Fix sampling handler context ptr (git-fixes). * tools/power turbostat: Fix trailing '\n' parsing (git-fixes). * tools/power turbostat: Increase the limit for fd opened (bsc#1233119). * tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes). * tpm: fix signed/unsigned bug when checking event logs (git-fixes). * tty: ldsic: fix tty_ldisc_autoload sysctl's proc_handler (git-fixes). * u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file (git-fixes). * ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460). * unicode: Fix utf8_load() error path (git-fixes). * usb: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes). * usb: chaoskey: fail open after removal (git-fixes). * usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing logic (git-fixes). * usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes). * usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes). * usb: ehci-spear: fix call balance of sehci clk handling routines (git- fixes). * usb: gadget: dummy-hcd: Fix "task hung" problem (git-fixes). * usb: gadget: dummy_hcd: Set transfer interval to 1 microframe (stable- fixes). * usb: gadget: dummy_hcd: Switch to hrtimer transfer scheduler (stable-fixes). * usb: gadget: dummy_hcd: execute hrtimer callback in softirq context (git- fixes). * usb: musb: Fix hardware lockup on first Rx endpoint request (git-fixes). * usb: musb: sunxi: Fix accessing an released usb phy (git-fixes). * usb: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git- fixes). * usb: serial: io_edgeport: fix use after free in debug printk (git-fixes). * usb: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes). * usb: serial: option: add Quectel RG650V (stable-fixes). * usb: serial: qcserial: add support for Sierra Wireless EM86xx (stable- fixes). * usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() (git-fixes). * usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read() (git-fixes). * usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes). * usb: yurex: make waiting on yurex_write interruptible (git-fixes). * vsock: Update msg_count on read_skb() (git-fixes). * watchdog: apple: Actually flush writes after requesting watchdog restart (git-fixes). * watchdog: mediatek: Make sure system reset gets asserted in mtk_wdt_restart() (git-fixes). * watchdog: rti: of: honor timeout-sec property (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1 (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2 (git-fixes). * wifi: ath11k: Fix CE offset address calculation for WCN6750 in SSR (git- fixes). * wifi: ath12k: Skip Rx TID cleanup for self peer (git-fixes). * wifi: ath12k: fix crash when unbinding (git-fixes). * wifi: ath12k: fix warning when unbinding (git-fixes). * wifi: ath12k: remove msdu_end structure for WCN7850 (git-fixes). * wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (git-fixes). * wifi: brcmfmac: release 'root' node in all execution paths (git-fixes). * wifi: cw1200: Fix potential NULL dereference (git-fixes). * wifi: iwlegacy: Clear stale interrupts before resuming device (stable- fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (git-fixes). * wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: wfx: Fix error handling in wfx_core_init() (git-fixes). * x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1233443). * x86/microcode/intel: Remove unnecessary cache writeback and invalidation (git-fixes). * x86/resctrl: Remove hard-coded memory bandwidth limit (git-fixes). * x86/syscall: Avoid memcpy() for ia32 syscall_get_arguments() (git-fixes). * x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes). * x86/tdx: Enable CPU topology enumeration (git-fixes). * x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes). * x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes). * x86/traps: move kmsan check after instrumentation_begin (git-fixes). * x86: Increase brk randomness entropy for 64-bit systems (git-fixes). * x86: fix off-by-one in access_ok() (git-fixes). * xfrm: Export symbol xfrm_dev_state_delete (bsc#1233754). * xfrm: Fix unregister netdevice hang on hardware offload (bsc#1233754). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4314=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-4314=1 * SUSE Real Time Module 15-SP6 zypper in -t patch SUSE-SLE-Module-RT-15-SP6-2024-4314=1 ## Package List: * openSUSE Leap 15.6 (x86_64) * kernel-rt_debug-debugsource-6.4.0-150600.10.20.1 * kselftests-kmp-rt-debuginfo-6.4.0-150600.10.20.1 * kernel-rt_debug-vdso-6.4.0-150600.10.20.1 * kernel-rt-devel-6.4.0-150600.10.20.1 * cluster-md-kmp-rt-6.4.0-150600.10.20.1 * gfs2-kmp-rt-debuginfo-6.4.0-150600.10.20.1 * kernel-rt_debug-devel-6.4.0-150600.10.20.1 * ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.20.1 * ocfs2-kmp-rt-6.4.0-150600.10.20.1 * kernel-rt-debugsource-6.4.0-150600.10.20.1 * kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.20.1 * reiserfs-kmp-rt-6.4.0-150600.10.20.1 * kernel-rt-devel-debuginfo-6.4.0-150600.10.20.1 * dlm-kmp-rt-6.4.0-150600.10.20.1 * kernel-rt_debug-debuginfo-6.4.0-150600.10.20.1 * kernel-rt-optional-6.4.0-150600.10.20.1 * kernel-rt-extra-6.4.0-150600.10.20.1 * reiserfs-kmp-rt-debuginfo-6.4.0-150600.10.20.1 * kernel-rt-extra-debuginfo-6.4.0-150600.10.20.1 * kernel-rt_debug-vdso-debuginfo-6.4.0-150600.10.20.1 * kernel-rt-vdso-6.4.0-150600.10.20.1 * kernel-rt-vdso-debuginfo-6.4.0-150600.10.20.1 * kernel-rt-optional-debuginfo-6.4.0-150600.10.20.1 * kernel-syms-rt-6.4.0-150600.10.20.1 * kernel-rt-debuginfo-6.4.0-150600.10.20.1 * kselftests-kmp-rt-6.4.0-150600.10.20.1 * dlm-kmp-rt-debuginfo-6.4.0-150600.10.20.1 * gfs2-kmp-rt-6.4.0-150600.10.20.1 * cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.20.1 * kernel-rt-livepatch-devel-6.4.0-150600.10.20.1 * openSUSE Leap 15.6 (noarch) * kernel-devel-rt-6.4.0-150600.10.20.1 * kernel-source-rt-6.4.0-150600.10.20.1 * openSUSE Leap 15.6 (nosrc x86_64) * kernel-rt-6.4.0-150600.10.20.1 * kernel-rt_debug-6.4.0-150600.10.20.1 * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-SLE15-SP6-RT_Update_6-debugsource-1-150600.1.3.1 * kernel-livepatch-6_4_0-150600_10_20-rt-1-150600.1.3.1 * kernel-livepatch-6_4_0-150600_10_20-rt-debuginfo-1-150600.1.3.1 * SUSE Real Time Module 15-SP6 (x86_64) * ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.20.1 * dlm-kmp-rt-debuginfo-6.4.0-150600.10.20.1 * kernel-rt_debug-debugsource-6.4.0-150600.10.20.1 * ocfs2-kmp-rt-6.4.0-150600.10.20.1 * kernel-rt-debugsource-6.4.0-150600.10.20.1 * kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.20.1 * gfs2-kmp-rt-6.4.0-150600.10.20.1 * kernel-rt-devel-debuginfo-6.4.0-150600.10.20.1 * cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.20.1 * cluster-md-kmp-rt-6.4.0-150600.10.20.1 * dlm-kmp-rt-6.4.0-150600.10.20.1 * gfs2-kmp-rt-debuginfo-6.4.0-150600.10.20.1 * kernel-rt-devel-6.4.0-150600.10.20.1 * kernel-rt_debug-debuginfo-6.4.0-150600.10.20.1 * kernel-syms-rt-6.4.0-150600.10.20.1 * kernel-rt_debug-devel-6.4.0-150600.10.20.1 * kernel-rt-debuginfo-6.4.0-150600.10.20.1 * SUSE Real Time Module 15-SP6 (noarch) * kernel-devel-rt-6.4.0-150600.10.20.1 * kernel-source-rt-6.4.0-150600.10.20.1 * SUSE Real Time Module 15-SP6 (nosrc x86_64) * kernel-rt-6.4.0-150600.10.20.1 * kernel-rt_debug-6.4.0-150600.10.20.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52778.html * https://www.suse.com/security/cve/CVE-2023-52920.html * https://www.suse.com/security/cve/CVE-2023-52921.html * https://www.suse.com/security/cve/CVE-2023-52922.html * https://www.suse.com/security/cve/CVE-2024-26596.html * https://www.suse.com/security/cve/CVE-2024-26703.html * https://www.suse.com/security/cve/CVE-2024-26741.html * https://www.suse.com/security/cve/CVE-2024-26782.html * https://www.suse.com/security/cve/CVE-2024-26864.html * https://www.suse.com/security/cve/CVE-2024-26953.html * https://www.suse.com/security/cve/CVE-2024-27017.html * https://www.suse.com/security/cve/CVE-2024-27407.html * https://www.suse.com/security/cve/CVE-2024-35888.html * https://www.suse.com/security/cve/CVE-2024-36000.html * https://www.suse.com/security/cve/CVE-2024-36031.html * https://www.suse.com/security/cve/CVE-2024-36484.html * https://www.suse.com/security/cve/CVE-2024-36883.html * https://www.suse.com/security/cve/CVE-2024-36886.html * https://www.suse.com/security/cve/CVE-2024-36905.html * https://www.suse.com/security/cve/CVE-2024-36920.html * https://www.suse.com/security/cve/CVE-2024-36927.html * https://www.suse.com/security/cve/CVE-2024-36954.html * https://www.suse.com/security/cve/CVE-2024-36968.html * https://www.suse.com/security/cve/CVE-2024-38589.html * https://www.suse.com/security/cve/CVE-2024-40914.html * https://www.suse.com/security/cve/CVE-2024-41023.html * https://www.suse.com/security/cve/CVE-2024-42102.html * https://www.suse.com/security/cve/CVE-2024-44995.html * https://www.suse.com/security/cve/CVE-2024-46680.html * https://www.suse.com/security/cve/CVE-2024-46681.html * https://www.suse.com/security/cve/CVE-2024-46765.html * https://www.suse.com/security/cve/CVE-2024-46788.html * https://www.suse.com/security/cve/CVE-2024-46800.html * https://www.suse.com/security/cve/CVE-2024-46828.html * https://www.suse.com/security/cve/CVE-2024-46845.html * https://www.suse.com/security/cve/CVE-2024-47666.html * https://www.suse.com/security/cve/CVE-2024-47679.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-47703.html * https://www.suse.com/security/cve/CVE-2024-49852.html * https://www.suse.com/security/cve/CVE-2024-49866.html * https://www.suse.com/security/cve/CVE-2024-49868.html * https://www.suse.com/security/cve/CVE-2024-49881.html * https://www.suse.com/security/cve/CVE-2024-49883.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49894.html * https://www.suse.com/security/cve/CVE-2024-49895.html * https://www.suse.com/security/cve/CVE-2024-49897.html * https://www.suse.com/security/cve/CVE-2024-49899.html * https://www.suse.com/security/cve/CVE-2024-49901.html * https://www.suse.com/security/cve/CVE-2024-49905.html * https://www.suse.com/security/cve/CVE-2024-49908.html * https://www.suse.com/security/cve/CVE-2024-49909.html * https://www.suse.com/security/cve/CVE-2024-49911.html * https://www.suse.com/security/cve/CVE-2024-49912.html * https://www.suse.com/security/cve/CVE-2024-49913.html * https://www.suse.com/security/cve/CVE-2024-49921.html * https://www.suse.com/security/cve/CVE-2024-49922.html * https://www.suse.com/security/cve/CVE-2024-49923.html * https://www.suse.com/security/cve/CVE-2024-49925.html * https://www.suse.com/security/cve/CVE-2024-49933.html * https://www.suse.com/security/cve/CVE-2024-49934.html * https://www.suse.com/security/cve/CVE-2024-49944.html * https://www.suse.com/security/cve/CVE-2024-49945.html * https://www.suse.com/security/cve/CVE-2024-49952.html * https://www.suse.com/security/cve/CVE-2024-49959.html * https://www.suse.com/security/cve/CVE-2024-49968.html * https://www.suse.com/security/cve/CVE-2024-49975.html * https://www.suse.com/security/cve/CVE-2024-49976.html * https://www.suse.com/security/cve/CVE-2024-49983.html * https://www.suse.com/security/cve/CVE-2024-49987.html * https://www.suse.com/security/cve/CVE-2024-49989.html * https://www.suse.com/security/cve/CVE-2024-50003.html * https://www.suse.com/security/cve/CVE-2024-50004.html * https://www.suse.com/security/cve/CVE-2024-50006.html * https://www.suse.com/security/cve/CVE-2024-50009.html * https://www.suse.com/security/cve/CVE-2024-50012.html * https://www.suse.com/security/cve/CVE-2024-50014.html * https://www.suse.com/security/cve/CVE-2024-50015.html * https://www.suse.com/security/cve/CVE-2024-50026.html * https://www.suse.com/security/cve/CVE-2024-50067.html * https://www.suse.com/security/cve/CVE-2024-50080.html * https://www.suse.com/security/cve/CVE-2024-50081.html * https://www.suse.com/security/cve/CVE-2024-50082.html * https://www.suse.com/security/cve/CVE-2024-50084.html * https://www.suse.com/security/cve/CVE-2024-50087.html * https://www.suse.com/security/cve/CVE-2024-50088.html * https://www.suse.com/security/cve/CVE-2024-50089.html * https://www.suse.com/security/cve/CVE-2024-50093.html * https://www.suse.com/security/cve/CVE-2024-50095.html * https://www.suse.com/security/cve/CVE-2024-50096.html * https://www.suse.com/security/cve/CVE-2024-50098.html * https://www.suse.com/security/cve/CVE-2024-50099.html * https://www.suse.com/security/cve/CVE-2024-50100.html * https://www.suse.com/security/cve/CVE-2024-50101.html * https://www.suse.com/security/cve/CVE-2024-50102.html * https://www.suse.com/security/cve/CVE-2024-50103.html * https://www.suse.com/security/cve/CVE-2024-50108.html * https://www.suse.com/security/cve/CVE-2024-50110.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50116.html * https://www.suse.com/security/cve/CVE-2024-50117.html * https://www.suse.com/security/cve/CVE-2024-50121.html * https://www.suse.com/security/cve/CVE-2024-50124.html * https://www.suse.com/security/cve/CVE-2024-50125.html * https://www.suse.com/security/cve/CVE-2024-50127.html * https://www.suse.com/security/cve/CVE-2024-50128.html * https://www.suse.com/security/cve/CVE-2024-50130.html * https://www.suse.com/security/cve/CVE-2024-50131.html * https://www.suse.com/security/cve/CVE-2024-50134.html * https://www.suse.com/security/cve/CVE-2024-50135.html * https://www.suse.com/security/cve/CVE-2024-50136.html * https://www.suse.com/security/cve/CVE-2024-50138.html * https://www.suse.com/security/cve/CVE-2024-50139.html * https://www.suse.com/security/cve/CVE-2024-50141.html * https://www.suse.com/security/cve/CVE-2024-50145.html * https://www.suse.com/security/cve/CVE-2024-50146.html * https://www.suse.com/security/cve/CVE-2024-50147.html * https://www.suse.com/security/cve/CVE-2024-50148.html * https://www.suse.com/security/cve/CVE-2024-50150.html * https://www.suse.com/security/cve/CVE-2024-50153.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50155.html * https://www.suse.com/security/cve/CVE-2024-50156.html * https://www.suse.com/security/cve/CVE-2024-50157.html * https://www.suse.com/security/cve/CVE-2024-50158.html * https://www.suse.com/security/cve/CVE-2024-50159.html * https://www.suse.com/security/cve/CVE-2024-50160.html * https://www.suse.com/security/cve/CVE-2024-50166.html * https://www.suse.com/security/cve/CVE-2024-50167.html * https://www.suse.com/security/cve/CVE-2024-50169.html * https://www.suse.com/security/cve/CVE-2024-50171.html * https://www.suse.com/security/cve/CVE-2024-50172.html * https://www.suse.com/security/cve/CVE-2024-50175.html * https://www.suse.com/security/cve/CVE-2024-50176.html * https://www.suse.com/security/cve/CVE-2024-50177.html * https://www.suse.com/security/cve/CVE-2024-50179.html * https://www.suse.com/security/cve/CVE-2024-50180.html * https://www.suse.com/security/cve/CVE-2024-50181.html * https://www.suse.com/security/cve/CVE-2024-50182.html * https://www.suse.com/security/cve/CVE-2024-50183.html * https://www.suse.com/security/cve/CVE-2024-50184.html * https://www.suse.com/security/cve/CVE-2024-50186.html * https://www.suse.com/security/cve/CVE-2024-50187.html * https://www.suse.com/security/cve/CVE-2024-50188.html * https://www.suse.com/security/cve/CVE-2024-50189.html * https://www.suse.com/security/cve/CVE-2024-50192.html * https://www.suse.com/security/cve/CVE-2024-50194.html * https://www.suse.com/security/cve/CVE-2024-50195.html * https://www.suse.com/security/cve/CVE-2024-50196.html * https://www.suse.com/security/cve/CVE-2024-50198.html * https://www.suse.com/security/cve/CVE-2024-50200.html * https://www.suse.com/security/cve/CVE-2024-50201.html * https://www.suse.com/security/cve/CVE-2024-50205.html * https://www.suse.com/security/cve/CVE-2024-50208.html * https://www.suse.com/security/cve/CVE-2024-50209.html * https://www.suse.com/security/cve/CVE-2024-50210.html * https://www.suse.com/security/cve/CVE-2024-50215.html * https://www.suse.com/security/cve/CVE-2024-50216.html * https://www.suse.com/security/cve/CVE-2024-50218.html * https://www.suse.com/security/cve/CVE-2024-50221.html * https://www.suse.com/security/cve/CVE-2024-50224.html * https://www.suse.com/security/cve/CVE-2024-50225.html * https://www.suse.com/security/cve/CVE-2024-50228.html * https://www.suse.com/security/cve/CVE-2024-50229.html * https://www.suse.com/security/cve/CVE-2024-50230.html * https://www.suse.com/security/cve/CVE-2024-50231.html * https://www.suse.com/security/cve/CVE-2024-50232.html * https://www.suse.com/security/cve/CVE-2024-50233.html * https://www.suse.com/security/cve/CVE-2024-50234.html * https://www.suse.com/security/cve/CVE-2024-50235.html * https://www.suse.com/security/cve/CVE-2024-50236.html * https://www.suse.com/security/cve/CVE-2024-50237.html * https://www.suse.com/security/cve/CVE-2024-50240.html * https://www.suse.com/security/cve/CVE-2024-50245.html * https://www.suse.com/security/cve/CVE-2024-50246.html * https://www.suse.com/security/cve/CVE-2024-50248.html * https://www.suse.com/security/cve/CVE-2024-50249.html * https://www.suse.com/security/cve/CVE-2024-50250.html * https://www.suse.com/security/cve/CVE-2024-50252.html * https://www.suse.com/security/cve/CVE-2024-50255.html * https://www.suse.com/security/cve/CVE-2024-50257.html * https://www.suse.com/security/cve/CVE-2024-50261.html * https://www.suse.com/security/cve/CVE-2024-50264.html * https://www.suse.com/security/cve/CVE-2024-50265.html * https://www.suse.com/security/cve/CVE-2024-50267.html * https://www.suse.com/security/cve/CVE-2024-50268.html * https://www.suse.com/security/cve/CVE-2024-50269.html * https://www.suse.com/security/cve/CVE-2024-50271.html * https://www.suse.com/security/cve/CVE-2024-50273.html * https://www.suse.com/security/cve/CVE-2024-50274.html * https://www.suse.com/security/cve/CVE-2024-50275.html * https://www.suse.com/security/cve/CVE-2024-50276.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50282.html * https://www.suse.com/security/cve/CVE-2024-50287.html * https://www.suse.com/security/cve/CVE-2024-50289.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50292.html * https://www.suse.com/security/cve/CVE-2024-50295.html * https://www.suse.com/security/cve/CVE-2024-50296.html * https://www.suse.com/security/cve/CVE-2024-50298.html * https://www.suse.com/security/cve/CVE-2024-50301.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53042.html * https://www.suse.com/security/cve/CVE-2024-53043.html * https://www.suse.com/security/cve/CVE-2024-53045.html * https://www.suse.com/security/cve/CVE-2024-53048.html * https://www.suse.com/security/cve/CVE-2024-53051.html * https://www.suse.com/security/cve/CVE-2024-53052.html * https://www.suse.com/security/cve/CVE-2024-53055.html * https://www.suse.com/security/cve/CVE-2024-53056.html * https://www.suse.com/security/cve/CVE-2024-53058.html * https://www.suse.com/security/cve/CVE-2024-53059.html * https://www.suse.com/security/cve/CVE-2024-53060.html * https://www.suse.com/security/cve/CVE-2024-53061.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53066.html * https://www.suse.com/security/cve/CVE-2024-53068.html * https://www.suse.com/security/cve/CVE-2024-53072.html * https://www.suse.com/security/cve/CVE-2024-53074.html * https://www.suse.com/security/cve/CVE-2024-53076.html * https://www.suse.com/security/cve/CVE-2024-53079.html * https://www.suse.com/security/cve/CVE-2024-53081.html * https://www.suse.com/security/cve/CVE-2024-53082.html * https://www.suse.com/security/cve/CVE-2024-53085.html * https://www.suse.com/security/cve/CVE-2024-53088.html * https://www.suse.com/security/cve/CVE-2024-53093.html * https://www.suse.com/security/cve/CVE-2024-53094.html * https://www.suse.com/security/cve/CVE-2024-53095.html * https://www.suse.com/security/cve/CVE-2024-53096.html * https://www.suse.com/security/cve/CVE-2024-53100.html * https://www.suse.com/security/cve/CVE-2024-53101.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-53106.html * https://www.suse.com/security/cve/CVE-2024-53108.html * https://www.suse.com/security/cve/CVE-2024-53110.html * https://www.suse.com/security/cve/CVE-2024-53112.html * https://www.suse.com/security/cve/CVE-2024-53114.html * https://www.suse.com/security/cve/CVE-2024-53121.html * https://www.suse.com/security/cve/CVE-2024-53138.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1082555 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1220355 * https://bugzilla.suse.com/show_bug.cgi?id=1221309 * https://bugzilla.suse.com/show_bug.cgi?id=1222423 * https://bugzilla.suse.com/show_bug.cgi?id=1222587 * https://bugzilla.suse.com/show_bug.cgi?id=1222590 * https://bugzilla.suse.com/show_bug.cgi?id=1223112 * https://bugzilla.suse.com/show_bug.cgi?id=1223656 * https://bugzilla.suse.com/show_bug.cgi?id=1223733 * https://bugzilla.suse.com/show_bug.cgi?id=1224429 * https://bugzilla.suse.com/show_bug.cgi?id=1224518 * https://bugzilla.suse.com/show_bug.cgi?id=1224548 * https://bugzilla.suse.com/show_bug.cgi?id=1224948 * https://bugzilla.suse.com/show_bug.cgi?id=1225713 * https://bugzilla.suse.com/show_bug.cgi?id=1225725 * https://bugzilla.suse.com/show_bug.cgi?id=1225730 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225764 * https://bugzilla.suse.com/show_bug.cgi?id=1225768 * https://bugzilla.suse.com/show_bug.cgi?id=1225813 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226130 * https://bugzilla.suse.com/show_bug.cgi?id=1226748 * https://bugzilla.suse.com/show_bug.cgi?id=1226872 * https://bugzilla.suse.com/show_bug.cgi?id=1227726 * https://bugzilla.suse.com/show_bug.cgi?id=1227842 * https://bugzilla.suse.com/show_bug.cgi?id=1228430 * https://bugzilla.suse.com/show_bug.cgi?id=1228850 * https://bugzilla.suse.com/show_bug.cgi?id=1229165 * https://bugzilla.suse.com/show_bug.cgi?id=1230231 * https://bugzilla.suse.com/show_bug.cgi?id=1230557 * https://bugzilla.suse.com/show_bug.cgi?id=1230558 * https://bugzilla.suse.com/show_bug.cgi?id=1230733 * https://bugzilla.suse.com/show_bug.cgi?id=1230807 * https://bugzilla.suse.com/show_bug.cgi?id=1230817 * https://bugzilla.suse.com/show_bug.cgi?id=1230827 * https://bugzilla.suse.com/show_bug.cgi?id=1230971 * https://bugzilla.suse.com/show_bug.cgi?id=1231076 * https://bugzilla.suse.com/show_bug.cgi?id=1231114 * https://bugzilla.suse.com/show_bug.cgi?id=1231182 * https://bugzilla.suse.com/show_bug.cgi?id=1231453 * https://bugzilla.suse.com/show_bug.cgi?id=1231465 * https://bugzilla.suse.com/show_bug.cgi?id=1231630 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231930 * https://bugzilla.suse.com/show_bug.cgi?id=1231946 * https://bugzilla.suse.com/show_bug.cgi?id=1231952 * https://bugzilla.suse.com/show_bug.cgi?id=1232079 * https://bugzilla.suse.com/show_bug.cgi?id=1232096 * https://bugzilla.suse.com/show_bug.cgi?id=1232103 * https://bugzilla.suse.com/show_bug.cgi?id=1232104 * https://bugzilla.suse.com/show_bug.cgi?id=1232149 * https://bugzilla.suse.com/show_bug.cgi?id=1232157 * https://bugzilla.suse.com/show_bug.cgi?id=1232165 * https://bugzilla.suse.com/show_bug.cgi?id=1232166 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232199 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232207 * https://bugzilla.suse.com/show_bug.cgi?id=1232224 * https://bugzilla.suse.com/show_bug.cgi?id=1232258 * https://bugzilla.suse.com/show_bug.cgi?id=1232259 * https://bugzilla.suse.com/show_bug.cgi?id=1232264 * https://bugzilla.suse.com/show_bug.cgi?id=1232272 * https://bugzilla.suse.com/show_bug.cgi?id=1232305 * https://bugzilla.suse.com/show_bug.cgi?id=1232307 * https://bugzilla.suse.com/show_bug.cgi?id=1232318 * https://bugzilla.suse.com/show_bug.cgi?id=1232335 * https://bugzilla.suse.com/show_bug.cgi?id=1232337 * https://bugzilla.suse.com/show_bug.cgi?id=1232352 * https://bugzilla.suse.com/show_bug.cgi?id=1232354 * https://bugzilla.suse.com/show_bug.cgi?id=1232355 * https://bugzilla.suse.com/show_bug.cgi?id=1232357 * https://bugzilla.suse.com/show_bug.cgi?id=1232358 * https://bugzilla.suse.com/show_bug.cgi?id=1232361 * https://bugzilla.suse.com/show_bug.cgi?id=1232366 * https://bugzilla.suse.com/show_bug.cgi?id=1232367 * https://bugzilla.suse.com/show_bug.cgi?id=1232368 * https://bugzilla.suse.com/show_bug.cgi?id=1232371 * https://bugzilla.suse.com/show_bug.cgi?id=1232374 * https://bugzilla.suse.com/show_bug.cgi?id=1232385 * https://bugzilla.suse.com/show_bug.cgi?id=1232386 * https://bugzilla.suse.com/show_bug.cgi?id=1232387 * https://bugzilla.suse.com/show_bug.cgi?id=1232396 * https://bugzilla.suse.com/show_bug.cgi?id=1232413 * https://bugzilla.suse.com/show_bug.cgi?id=1232416 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232442 * https://bugzilla.suse.com/show_bug.cgi?id=1232446 * https://bugzilla.suse.com/show_bug.cgi?id=1232483 * https://bugzilla.suse.com/show_bug.cgi?id=1232494 * https://bugzilla.suse.com/show_bug.cgi?id=1232498 * https://bugzilla.suse.com/show_bug.cgi?id=1232499 * https://bugzilla.suse.com/show_bug.cgi?id=1232500 * https://bugzilla.suse.com/show_bug.cgi?id=1232501 * https://bugzilla.suse.com/show_bug.cgi?id=1232502 * https://bugzilla.suse.com/show_bug.cgi?id=1232704 * https://bugzilla.suse.com/show_bug.cgi?id=1232757 * https://bugzilla.suse.com/show_bug.cgi?id=1232819 * https://bugzilla.suse.com/show_bug.cgi?id=1232823 * https://bugzilla.suse.com/show_bug.cgi?id=1232860 * https://bugzilla.suse.com/show_bug.cgi?id=1232869 * https://bugzilla.suse.com/show_bug.cgi?id=1232870 * https://bugzilla.suse.com/show_bug.cgi?id=1232873 * https://bugzilla.suse.com/show_bug.cgi?id=1232876 * https://bugzilla.suse.com/show_bug.cgi?id=1232877 * https://bugzilla.suse.com/show_bug.cgi?id=1232878 * https://bugzilla.suse.com/show_bug.cgi?id=1232880 * https://bugzilla.suse.com/show_bug.cgi?id=1232881 * https://bugzilla.suse.com/show_bug.cgi?id=1232884 * https://bugzilla.suse.com/show_bug.cgi?id=1232885 * https://bugzilla.suse.com/show_bug.cgi?id=1232887 * https://bugzilla.suse.com/show_bug.cgi?id=1232888 * https://bugzilla.suse.com/show_bug.cgi?id=1232890 * https://bugzilla.suse.com/show_bug.cgi?id=1232892 * https://bugzilla.suse.com/show_bug.cgi?id=1232894 * https://bugzilla.suse.com/show_bug.cgi?id=1232896 * https://bugzilla.suse.com/show_bug.cgi?id=1232897 * https://bugzilla.suse.com/show_bug.cgi?id=1232905 * https://bugzilla.suse.com/show_bug.cgi?id=1232907 * https://bugzilla.suse.com/show_bug.cgi?id=1232914 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1232925 * https://bugzilla.suse.com/show_bug.cgi?id=1232926 * https://bugzilla.suse.com/show_bug.cgi?id=1232928 * https://bugzilla.suse.com/show_bug.cgi?id=1232935 * https://bugzilla.suse.com/show_bug.cgi?id=1233029 * https://bugzilla.suse.com/show_bug.cgi?id=1233032 * https://bugzilla.suse.com/show_bug.cgi?id=1233035 * https://bugzilla.suse.com/show_bug.cgi?id=1233036 * https://bugzilla.suse.com/show_bug.cgi?id=1233041 * https://bugzilla.suse.com/show_bug.cgi?id=1233044 * https://bugzilla.suse.com/show_bug.cgi?id=1233049 * https://bugzilla.suse.com/show_bug.cgi?id=1233050 * https://bugzilla.suse.com/show_bug.cgi?id=1233051 * https://bugzilla.suse.com/show_bug.cgi?id=1233056 * https://bugzilla.suse.com/show_bug.cgi?id=1233057 * https://bugzilla.suse.com/show_bug.cgi?id=1233061 * https://bugzilla.suse.com/show_bug.cgi?id=1233062 * https://bugzilla.suse.com/show_bug.cgi?id=1233063 * https://bugzilla.suse.com/show_bug.cgi?id=1233065 * https://bugzilla.suse.com/show_bug.cgi?id=1233067 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233073 * https://bugzilla.suse.com/show_bug.cgi?id=1233074 * https://bugzilla.suse.com/show_bug.cgi?id=1233088 * https://bugzilla.suse.com/show_bug.cgi?id=1233091 * https://bugzilla.suse.com/show_bug.cgi?id=1233092 * https://bugzilla.suse.com/show_bug.cgi?id=1233097 * https://bugzilla.suse.com/show_bug.cgi?id=1233100 * https://bugzilla.suse.com/show_bug.cgi?id=1233103 * https://bugzilla.suse.com/show_bug.cgi?id=1233104 * https://bugzilla.suse.com/show_bug.cgi?id=1233105 * https://bugzilla.suse.com/show_bug.cgi?id=1233106 * https://bugzilla.suse.com/show_bug.cgi?id=1233107 * https://bugzilla.suse.com/show_bug.cgi?id=1233108 * https://bugzilla.suse.com/show_bug.cgi?id=1233110 * https://bugzilla.suse.com/show_bug.cgi?id=1233111 * https://bugzilla.suse.com/show_bug.cgi?id=1233113 * https://bugzilla.suse.com/show_bug.cgi?id=1233114 * https://bugzilla.suse.com/show_bug.cgi?id=1233115 * https://bugzilla.suse.com/show_bug.cgi?id=1233117 * https://bugzilla.suse.com/show_bug.cgi?id=1233119 * https://bugzilla.suse.com/show_bug.cgi?id=1233123 * https://bugzilla.suse.com/show_bug.cgi?id=1233125 * https://bugzilla.suse.com/show_bug.cgi?id=1233127 * https://bugzilla.suse.com/show_bug.cgi?id=1233129 * https://bugzilla.suse.com/show_bug.cgi?id=1233130 * https://bugzilla.suse.com/show_bug.cgi?id=1233132 * https://bugzilla.suse.com/show_bug.cgi?id=1233135 * https://bugzilla.suse.com/show_bug.cgi?id=1233176 * https://bugzilla.suse.com/show_bug.cgi?id=1233179 * https://bugzilla.suse.com/show_bug.cgi?id=1233185 * https://bugzilla.suse.com/show_bug.cgi?id=1233188 * https://bugzilla.suse.com/show_bug.cgi?id=1233189 * https://bugzilla.suse.com/show_bug.cgi?id=1233191 * https://bugzilla.suse.com/show_bug.cgi?id=1233193 * https://bugzilla.suse.com/show_bug.cgi?id=1233197 * https://bugzilla.suse.com/show_bug.cgi?id=1233201 * https://bugzilla.suse.com/show_bug.cgi?id=1233203 * https://bugzilla.suse.com/show_bug.cgi?id=1233204 * https://bugzilla.suse.com/show_bug.cgi?id=1233205 * https://bugzilla.suse.com/show_bug.cgi?id=1233206 * https://bugzilla.suse.com/show_bug.cgi?id=1233207 * https://bugzilla.suse.com/show_bug.cgi?id=1233208 * https://bugzilla.suse.com/show_bug.cgi?id=1233209 * https://bugzilla.suse.com/show_bug.cgi?id=1233210 * https://bugzilla.suse.com/show_bug.cgi?id=1233211 * https://bugzilla.suse.com/show_bug.cgi?id=1233212 * https://bugzilla.suse.com/show_bug.cgi?id=1233216 * https://bugzilla.suse.com/show_bug.cgi?id=1233217 * https://bugzilla.suse.com/show_bug.cgi?id=1233219 * https://bugzilla.suse.com/show_bug.cgi?id=1233226 * https://bugzilla.suse.com/show_bug.cgi?id=1233238 * https://bugzilla.suse.com/show_bug.cgi?id=1233241 * https://bugzilla.suse.com/show_bug.cgi?id=1233244 * https://bugzilla.suse.com/show_bug.cgi?id=1233253 * https://bugzilla.suse.com/show_bug.cgi?id=1233255 * https://bugzilla.suse.com/show_bug.cgi?id=1233293 * https://bugzilla.suse.com/show_bug.cgi?id=1233298 * https://bugzilla.suse.com/show_bug.cgi?id=1233305 * https://bugzilla.suse.com/show_bug.cgi?id=1233320 * https://bugzilla.suse.com/show_bug.cgi?id=1233350 * https://bugzilla.suse.com/show_bug.cgi?id=1233443 * https://bugzilla.suse.com/show_bug.cgi?id=1233452 * https://bugzilla.suse.com/show_bug.cgi?id=1233453 * https://bugzilla.suse.com/show_bug.cgi?id=1233454 * https://bugzilla.suse.com/show_bug.cgi?id=1233456 * https://bugzilla.suse.com/show_bug.cgi?id=1233457 * https://bugzilla.suse.com/show_bug.cgi?id=1233458 * https://bugzilla.suse.com/show_bug.cgi?id=1233460 * https://bugzilla.suse.com/show_bug.cgi?id=1233462 * https://bugzilla.suse.com/show_bug.cgi?id=1233463 * https://bugzilla.suse.com/show_bug.cgi?id=1233464 * https://bugzilla.suse.com/show_bug.cgi?id=1233465 * https://bugzilla.suse.com/show_bug.cgi?id=1233468 * https://bugzilla.suse.com/show_bug.cgi?id=1233471 * https://bugzilla.suse.com/show_bug.cgi?id=1233476 * https://bugzilla.suse.com/show_bug.cgi?id=1233478 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233481 * https://bugzilla.suse.com/show_bug.cgi?id=1233484 * https://bugzilla.suse.com/show_bug.cgi?id=1233485 * https://bugzilla.suse.com/show_bug.cgi?id=1233487 * https://bugzilla.suse.com/show_bug.cgi?id=1233490 * https://bugzilla.suse.com/show_bug.cgi?id=1233491 * https://bugzilla.suse.com/show_bug.cgi?id=1233523 * https://bugzilla.suse.com/show_bug.cgi?id=1233524 * https://bugzilla.suse.com/show_bug.cgi?id=1233540 * https://bugzilla.suse.com/show_bug.cgi?id=1233547 * https://bugzilla.suse.com/show_bug.cgi?id=1233548 * https://bugzilla.suse.com/show_bug.cgi?id=1233550 * https://bugzilla.suse.com/show_bug.cgi?id=1233552 * https://bugzilla.suse.com/show_bug.cgi?id=1233553 * https://bugzilla.suse.com/show_bug.cgi?id=1233554 * https://bugzilla.suse.com/show_bug.cgi?id=1233555 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233560 * https://bugzilla.suse.com/show_bug.cgi?id=1233561 * https://bugzilla.suse.com/show_bug.cgi?id=1233564 * https://bugzilla.suse.com/show_bug.cgi?id=1233566 * https://bugzilla.suse.com/show_bug.cgi?id=1233567 * https://bugzilla.suse.com/show_bug.cgi?id=1233568 * https://bugzilla.suse.com/show_bug.cgi?id=1233570 * https://bugzilla.suse.com/show_bug.cgi?id=1233572 * https://bugzilla.suse.com/show_bug.cgi?id=1233573 * https://bugzilla.suse.com/show_bug.cgi?id=1233577 * https://bugzilla.suse.com/show_bug.cgi?id=1233580 * https://bugzilla.suse.com/show_bug.cgi?id=1233640 * https://bugzilla.suse.com/show_bug.cgi?id=1233641 * https://bugzilla.suse.com/show_bug.cgi?id=1233642 * https://bugzilla.suse.com/show_bug.cgi?id=1233721 * https://bugzilla.suse.com/show_bug.cgi?id=1233754 * https://bugzilla.suse.com/show_bug.cgi?id=1233756 * https://bugzilla.suse.com/show_bug.cgi?id=1233769 * https://bugzilla.suse.com/show_bug.cgi?id=1233771 * https://bugzilla.suse.com/show_bug.cgi?id=1233977 * https://bugzilla.suse.com/show_bug.cgi?id=1234009 * https://bugzilla.suse.com/show_bug.cgi?id=1234011 * https://bugzilla.suse.com/show_bug.cgi?id=1234012 * https://bugzilla.suse.com/show_bug.cgi?id=1234025 * https://bugzilla.suse.com/show_bug.cgi?id=1234039 * https://bugzilla.suse.com/show_bug.cgi?id=1234040 * https://bugzilla.suse.com/show_bug.cgi?id=1234041 * https://bugzilla.suse.com/show_bug.cgi?id=1234042 * https://bugzilla.suse.com/show_bug.cgi?id=1234043 * https://bugzilla.suse.com/show_bug.cgi?id=1234044 * https://bugzilla.suse.com/show_bug.cgi?id=1234045 * https://bugzilla.suse.com/show_bug.cgi?id=1234046 * https://bugzilla.suse.com/show_bug.cgi?id=1234072 * https://bugzilla.suse.com/show_bug.cgi?id=1234078 * https://bugzilla.suse.com/show_bug.cgi?id=1234081 * https://bugzilla.suse.com/show_bug.cgi?id=1234083 * https://bugzilla.suse.com/show_bug.cgi?id=1234085 * https://bugzilla.suse.com/show_bug.cgi?id=1234087 * https://bugzilla.suse.com/show_bug.cgi?id=1234093 * https://bugzilla.suse.com/show_bug.cgi?id=1234098 * https://bugzilla.suse.com/show_bug.cgi?id=1234108 * https://bugzilla.suse.com/show_bug.cgi?id=1234121 * https://bugzilla.suse.com/show_bug.cgi?id=1234223 * https://jira.suse.com/browse/PED-11316 * https://jira.suse.com/browse/PED-11442 * https://jira.suse.com/browse/PED-11580 * https://jira.suse.com/browse/PED-9943
participants (1)
-
OPENSUSE-SECURITY-UPDATES