SUSE 5093 Published by

OpenSUSE Leap and SUSE Linux Enterprise have received several security updates, including chromium, libecpg6-17~rc1-1.1, python39, python310-azure-identity-1.18.0-1.1, python310-azure-identity-1.18.0-1.1, postgresql16-16.4-1.1, libmfx, qemu, and rage-encryption:

openSUSE-SU-2024:0312-1: important: Security update for chromium
openSUSE-SU-2024:0311-1: important: Security update for chromium
SUSE-SU-2024:3408-1: important: Security update for the Linux Kernel
openSUSE-SU-2024:14361-1: moderate: libecpg6-17~rc1-1.1 on GA media
SUSE-SU-2024:3411-1: important: Security update for python39
openSUSE-SU-2024:14362-1: moderate: python310-azure-identity-1.18.0-1.1 on GA media
openSUSE-SU-2024:14360-1: moderate: postgresql16-16.4-1.1 on GA media
SUSE-SU-2024:3397-1: moderate: Security update for libmfx
SUSE-SU-2024:3396-1: important: Security update for qemu
SUSE-SU-2024:3404-1: moderate: Security update for rage-encryption
SUSE-SU-2024:3383-1: important: Security update for the Linux Kernel




openSUSE-SU-2024:0312-1: important: Security update for chromium


openSUSE Security Update: Security update for chromium
_______________________________

Announcement ID: openSUSE-SU-2024:0312-1
Rating: important
References: #1230678
Cross-References: CVE-2024-8904 CVE-2024-8905 CVE-2024-8906
CVE-2024-8907 CVE-2024-8908 CVE-2024-8909

Affected Products:
openSUSE Backports SLE-15-SP5
_______________________________

An update that fixes 6 vulnerabilities is now available.

Description:

This update for chromium fixes the following issues:

- Chromium 129.0.6668.58 (stable released 2024-09-17) (boo#1230678)

* CVE-2024-8904: Type Confusion in V8
* CVE-2024-8905: Inappropriate implementation in V8
* CVE-2024-8906: Incorrect security UI in Downloads
* CVE-2024-8907: Insufficient data validation in Omnibox
* CVE-2024-8908: Inappropriate implementation in Autofill
* CVE-2024-8909: Inappropriate implementation in UI

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP5:

zypper in -t patch openSUSE-2024-312=1

Package List:

- openSUSE Backports SLE-15-SP5 (aarch64 x86_64):

chromedriver-129.0.6668.58-bp155.2.117.2
chromium-129.0.6668.58-bp155.2.117.2

References:

https://www.suse.com/security/cve/CVE-2024-8904.html
https://www.suse.com/security/cve/CVE-2024-8905.html
https://www.suse.com/security/cve/CVE-2024-8906.html
https://www.suse.com/security/cve/CVE-2024-8907.html
https://www.suse.com/security/cve/CVE-2024-8908.html
https://www.suse.com/security/cve/CVE-2024-8909.html
https://bugzilla.suse.com/1230678



openSUSE-SU-2024:0311-1: important: Security update for chromium


openSUSE Security Update: Security update for chromium
_______________________________

Announcement ID: openSUSE-SU-2024:0311-1
Rating: important
References: #1230678
Cross-References: CVE-2024-8904 CVE-2024-8905 CVE-2024-8906
CVE-2024-8907 CVE-2024-8908 CVE-2024-8909

Affected Products:
openSUSE Backports SLE-15-SP6
_______________________________

An update that fixes 6 vulnerabilities is now available.

Description:

This update for chromium fixes the following issues:

Chromium 129.0.6668.58 (stable released 2024-09-17) (boo#1230678)

* CVE-2024-8904: Type Confusion in V8
* CVE-2024-8905: Inappropriate implementation in V8
* CVE-2024-8906: Incorrect security UI in Downloads
* CVE-2024-8907: Insufficient data validation in Omnibox
* CVE-2024-8908: Inappropriate implementation in Autofill
* CVE-2024-8909: Inappropriate implementation in UI

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP6:

zypper in -t patch openSUSE-2024-311=1

Package List:

- openSUSE Backports SLE-15-SP6 (aarch64 x86_64):

chromedriver-129.0.6668.58-bp156.2.29.2
chromium-129.0.6668.58-bp156.2.29.2

References:

https://www.suse.com/security/cve/CVE-2024-8904.html
https://www.suse.com/security/cve/CVE-2024-8905.html
https://www.suse.com/security/cve/CVE-2024-8906.html
https://www.suse.com/security/cve/CVE-2024-8907.html
https://www.suse.com/security/cve/CVE-2024-8908.html
https://www.suse.com/security/cve/CVE-2024-8909.html
https://bugzilla.suse.com/1230678



SUSE-SU-2024:3408-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:3408-1
Rating: important
References:

* bsc#1193629
* bsc#1194111
* bsc#1194765
* bsc#1194869
* bsc#1196261
* bsc#1196516
* bsc#1196894
* bsc#1198017
* bsc#1203360
* bsc#1206006
* bsc#1206258
* bsc#1207158
* bsc#1216834
* bsc#1221326
* bsc#1221645
* bsc#1223191
* bsc#1224105
* bsc#1227832
* bsc#1228020
* bsc#1228114
* bsc#1228466
* bsc#1228489
* bsc#1228516
* bsc#1228576
* bsc#1228718
* bsc#1228801
* bsc#1228959
* bsc#1229042
* bsc#1229292
* bsc#1229400
* bsc#1229454
* bsc#1229500
* bsc#1229503
* bsc#1229506
* bsc#1229507
* bsc#1229508
* bsc#1229509
* bsc#1229510
* bsc#1229512
* bsc#1229516
* bsc#1229522
* bsc#1229526
* bsc#1229528
* bsc#1229531
* bsc#1229533
* bsc#1229535
* bsc#1229536
* bsc#1229537
* bsc#1229540
* bsc#1229544
* bsc#1229554
* bsc#1229557
* bsc#1229565
* bsc#1229566
* bsc#1229568
* bsc#1229581
* bsc#1229598
* bsc#1229603
* bsc#1229604
* bsc#1229608
* bsc#1229611
* bsc#1229612
* bsc#1229613
* bsc#1229614
* bsc#1229617
* bsc#1229619
* bsc#1229620
* bsc#1229622
* bsc#1229623
* bsc#1229624
* bsc#1229625
* bsc#1229626
* bsc#1229628
* bsc#1229629
* bsc#1229630
* bsc#1229631
* bsc#1229635
* bsc#1229636
* bsc#1229637
* bsc#1229638
* bsc#1229639
* bsc#1229641
* bsc#1229642
* bsc#1229643
* bsc#1229645
* bsc#1229657
* bsc#1229664
* bsc#1229707
* bsc#1229792
* bsc#1230245
* bsc#1230413

Cross-References:

* CVE-2021-4441
* CVE-2022-4382
* CVE-2022-48868
* CVE-2022-48869
* CVE-2022-48870
* CVE-2022-48871
* CVE-2022-48872
* CVE-2022-48873
* CVE-2022-48875
* CVE-2022-48878
* CVE-2022-48880
* CVE-2022-48890
* CVE-2022-48891
* CVE-2022-48896
* CVE-2022-48898
* CVE-2022-48899
* CVE-2022-48903
* CVE-2022-48904
* CVE-2022-48905
* CVE-2022-48907
* CVE-2022-48909
* CVE-2022-48912
* CVE-2022-48913
* CVE-2022-48914
* CVE-2022-48915
* CVE-2022-48916
* CVE-2022-48917
* CVE-2022-48918
* CVE-2022-48919
* CVE-2022-48921
* CVE-2022-48924
* CVE-2022-48925
* CVE-2022-48926
* CVE-2022-48927
* CVE-2022-48928
* CVE-2022-48929
* CVE-2022-48930
* CVE-2022-48931
* CVE-2022-48932
* CVE-2022-48934
* CVE-2022-48935
* CVE-2022-48937
* CVE-2022-48938
* CVE-2022-48941
* CVE-2022-48942
* CVE-2022-48943
* CVE-2023-52489
* CVE-2023-52893
* CVE-2023-52894
* CVE-2023-52896
* CVE-2023-52898
* CVE-2023-52900
* CVE-2023-52901
* CVE-2023-52905
* CVE-2023-52907
* CVE-2023-52911
* CVE-2024-40910
* CVE-2024-41009
* CVE-2024-41011
* CVE-2024-41062
* CVE-2024-41087
* CVE-2024-42077
* CVE-2024-42126
* CVE-2024-42230
* CVE-2024-42232
* CVE-2024-42271
* CVE-2024-43853
* CVE-2024-43861
* CVE-2024-43882
* CVE-2024-43883
* CVE-2024-44938
* CVE-2024-44947
* CVE-2024-45003

CVSS scores:

* CVE-2021-4441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-4441 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-4382 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-4382 ( NVD ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48869 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48869 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-48871 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48872 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48872 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48873 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48875 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48878 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48878 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-48878 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48880 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48880 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48896 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48898 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48899 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48904 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48905 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48907 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48909 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48912 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48912 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48913 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48919 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48919 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48919 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48921 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48924 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48925 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48927 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48928 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48931 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48932 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48934 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48937 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48938 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48938 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48941 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48942 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48942 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48943 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52489 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52894 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52894 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52896 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52898 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52898 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52898 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52900 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40910 ( SUSE ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40910 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41011 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41011 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41062 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42230 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42230 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42230 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42232 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42232 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42271 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42271 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42271 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43882 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43882 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43883 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43883 ( SUSE ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44938 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44938 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44947 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-45003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Availability Extension 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves 73 vulnerabilities and has 18 security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

* CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
* CVE-2024-44947: Initialize beyond-EOF page contents before setting uptodate
(bsc#1229454).
* CVE-2024-43883: Do not drop references before new references are gained
(bsc#1229707).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500).
* CVE-2023-52489: Fix race in accessing memory_section->usage (bsc#1221326).
* CVE-2024-44938: Fix shift-out-of-bounds in dbDiscardAG (bsc#1229792).
* CVE-2024-41087: Fix double free on error (CVE-2024-41087,bsc#1228466).
* CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage.
(bsc#1229503)
* CVE-2022-48935: Fixed an unregister flowtable hooks on netns exit
(bsc#1229619)
* CVE-2022-48912: Fix use-after-free in __nf_register_net_hook() (bsc#1229641)
* CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400)
* CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop().
(bsc#1228959)
* CVE-2024-40910: Fix refcount imbalance on inbound connections (bsc#1227832).
* CVE-2024-41009: Fix overrunning reservations in ringbuf (bsc#1228020).
* CVE-2024-45003: Don't evict inode under the inode lru traversing context
(bsc#1230245).

The following non-security bugs were fixed:

* Bluetooth: L2CAP: Fix deadlock (git-fixes).
* mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes).
* mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes).
* Revert "mm: prevent derefencing NULL ptr in pfn_section_valid()"
(bsc#1230413).
* Revert "mm, kmsan: fix infinite recursion due to RCU critical section"
(bsc#1230413).
* Revert "mm/sparsemem: fix race in accessing memory_section->usage"
(bsc#1230413).
* nvme_core: scan namespaces asynchronously (bsc#1224105).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3408=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3408=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3408=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3408=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3408=1

* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-3408=1
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.

* SUSE Linux Enterprise High Availability Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-3408=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3408=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3408=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3408=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3408=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3408=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3408=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3408=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3408=1

## Package List:

* openSUSE Leap 15.4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.133.1
* openSUSE Leap 15.4 (noarch)
* kernel-macros-5.14.21-150400.24.133.2
* kernel-source-vanilla-5.14.21-150400.24.133.2
* kernel-devel-5.14.21-150400.24.133.2
* kernel-source-5.14.21-150400.24.133.2
* kernel-docs-html-5.14.21-150400.24.133.1
* openSUSE Leap 15.4 (nosrc ppc64le x86_64)
* kernel-debug-5.14.21-150400.24.133.2
* openSUSE Leap 15.4 (ppc64le x86_64)
* kernel-debug-devel-5.14.21-150400.24.133.2
* kernel-debug-devel-debuginfo-5.14.21-150400.24.133.2
* kernel-debug-debugsource-5.14.21-150400.24.133.2
* kernel-debug-debuginfo-5.14.21-150400.24.133.2
* kernel-debug-livepatch-devel-5.14.21-150400.24.133.2
* openSUSE Leap 15.4 (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
* kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.133.2
* kernel-kvmsmall-devel-5.14.21-150400.24.133.2
* kernel-kvmsmall-debugsource-5.14.21-150400.24.133.2
* kernel-kvmsmall-debuginfo-5.14.21-150400.24.133.2
* kernel-default-base-rebuild-5.14.21-150400.24.133.2.150400.24.64.5
* kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.133.2
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* kernel-default-optional-5.14.21-150400.24.133.2
* ocfs2-kmp-default-5.14.21-150400.24.133.2
* kselftests-kmp-default-5.14.21-150400.24.133.2
* kernel-obs-build-debugsource-5.14.21-150400.24.133.2
* kernel-obs-qa-5.14.21-150400.24.133.1
* kselftests-kmp-default-debuginfo-5.14.21-150400.24.133.2
* reiserfs-kmp-default-5.14.21-150400.24.133.2
* gfs2-kmp-default-5.14.21-150400.24.133.2
* dlm-kmp-default-5.14.21-150400.24.133.2
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.133.2
* kernel-obs-build-5.14.21-150400.24.133.2
* kernel-default-optional-debuginfo-5.14.21-150400.24.133.2
* kernel-syms-5.14.21-150400.24.133.1
* kernel-default-extra-debuginfo-5.14.21-150400.24.133.2
* kernel-default-debuginfo-5.14.21-150400.24.133.2
* cluster-md-kmp-default-5.14.21-150400.24.133.2
* kernel-default-extra-5.14.21-150400.24.133.2
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.133.2
* kernel-default-livepatch-5.14.21-150400.24.133.2
* dlm-kmp-default-debuginfo-5.14.21-150400.24.133.2
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.133.2
* kernel-default-livepatch-devel-5.14.21-150400.24.133.2
* kernel-default-debugsource-5.14.21-150400.24.133.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.133.2
* kernel-default-devel-5.14.21-150400.24.133.2
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.133.2
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150400.24.133.2
* openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150400.24.133.2
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_133-default-debuginfo-1-150400.9.3.2
* kernel-livepatch-5_14_21-150400_24_133-default-1-150400.9.3.2
* kernel-livepatch-SLE15-SP4_Update_31-debugsource-1-150400.9.3.2
* openSUSE Leap 15.4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.133.2
* openSUSE Leap 15.4 (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.133.2
* kernel-zfcpdump-debugsource-5.14.21-150400.24.133.2
* openSUSE Leap 15.4 (nosrc)
* dtb-aarch64-5.14.21-150400.24.133.1
* openSUSE Leap 15.4 (aarch64)
* dtb-amd-5.14.21-150400.24.133.1
* dtb-freescale-5.14.21-150400.24.133.1
* dtb-renesas-5.14.21-150400.24.133.1
* dtb-nvidia-5.14.21-150400.24.133.1
* dtb-xilinx-5.14.21-150400.24.133.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.133.2
* dtb-allwinner-5.14.21-150400.24.133.1
* gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.133.2
* kernel-64kb-optional-5.14.21-150400.24.133.2
* kselftests-kmp-64kb-5.14.21-150400.24.133.2
* dlm-kmp-64kb-debuginfo-5.14.21-150400.24.133.2
* dtb-altera-5.14.21-150400.24.133.1
* cluster-md-kmp-64kb-5.14.21-150400.24.133.2
* cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.133.2
* dtb-lg-5.14.21-150400.24.133.1
* kernel-64kb-devel-5.14.21-150400.24.133.2
* dtb-exynos-5.14.21-150400.24.133.1
* dtb-marvell-5.14.21-150400.24.133.1
* ocfs2-kmp-64kb-5.14.21-150400.24.133.2
* kernel-64kb-optional-debuginfo-5.14.21-150400.24.133.2
* reiserfs-kmp-64kb-5.14.21-150400.24.133.2
* kernel-64kb-debuginfo-5.14.21-150400.24.133.2
* dtb-socionext-5.14.21-150400.24.133.1
* dtb-cavium-5.14.21-150400.24.133.1
* kernel-64kb-extra-debuginfo-5.14.21-150400.24.133.2
* dtb-sprd-5.14.21-150400.24.133.1
* dtb-amlogic-5.14.21-150400.24.133.1
* dtb-mediatek-5.14.21-150400.24.133.1
* dtb-hisilicon-5.14.21-150400.24.133.1
* gfs2-kmp-64kb-5.14.21-150400.24.133.2
* dtb-qcom-5.14.21-150400.24.133.1
* reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.133.2
* dlm-kmp-64kb-5.14.21-150400.24.133.2
* dtb-apple-5.14.21-150400.24.133.1
* ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.133.2
* dtb-apm-5.14.21-150400.24.133.1
* kernel-64kb-debugsource-5.14.21-150400.24.133.2
* dtb-amazon-5.14.21-150400.24.133.1
* kernel-64kb-extra-5.14.21-150400.24.133.2
* kernel-64kb-livepatch-devel-5.14.21-150400.24.133.2
* kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.133.2
* dtb-broadcom-5.14.21-150400.24.133.1
* dtb-rockchip-5.14.21-150400.24.133.1
* dtb-arm-5.14.21-150400.24.133.1
* openSUSE Leap 15.4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.133.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.133.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.133.2
* kernel-default-debuginfo-5.14.21-150400.24.133.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.133.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.133.2
* kernel-default-debuginfo-5.14.21-150400.24.133.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.133.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.133.2
* kernel-default-debuginfo-5.14.21-150400.24.133.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.133.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.133.2
* kernel-default-debuginfo-5.14.21-150400.24.133.2
* SUSE Linux Enterprise Live Patching 15-SP4 (nosrc)
* kernel-default-5.14.21-150400.24.133.2
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_133-default-1-150400.9.3.2
* kernel-default-livepatch-devel-5.14.21-150400.24.133.2
* kernel-default-livepatch-5.14.21-150400.24.133.2
* kernel-default-debugsource-5.14.21-150400.24.133.2
* kernel-livepatch-SLE15-SP4_Update_31-debugsource-1-150400.9.3.2
* kernel-livepatch-5_14_21-150400_24_133-default-debuginfo-1-150400.9.3.2
* kernel-default-debuginfo-5.14.21-150400.24.133.2
* SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le
s390x x86_64)
* cluster-md-kmp-default-5.14.21-150400.24.133.2
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.133.2
* ocfs2-kmp-default-5.14.21-150400.24.133.2
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.133.2
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.133.2
* kernel-default-debuginfo-5.14.21-150400.24.133.2
* kernel-default-debugsource-5.14.21-150400.24.133.2
* dlm-kmp-default-debuginfo-5.14.21-150400.24.133.2
* gfs2-kmp-default-5.14.21-150400.24.133.2
* dlm-kmp-default-5.14.21-150400.24.133.2
* SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc)
* kernel-default-5.14.21-150400.24.133.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
nosrc)
* kernel-64kb-5.14.21-150400.24.133.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* kernel-64kb-devel-5.14.21-150400.24.133.2
* kernel-64kb-debugsource-5.14.21-150400.24.133.2
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.133.2
* kernel-64kb-debuginfo-5.14.21-150400.24.133.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.133.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
* kernel-obs-build-debugsource-5.14.21-150400.24.133.2
* kernel-obs-build-5.14.21-150400.24.133.2
* reiserfs-kmp-default-5.14.21-150400.24.133.2
* kernel-default-debugsource-5.14.21-150400.24.133.2
* kernel-syms-5.14.21-150400.24.133.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.133.2
* kernel-default-devel-5.14.21-150400.24.133.2
* kernel-default-debuginfo-5.14.21-150400.24.133.2
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.133.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* kernel-macros-5.14.21-150400.24.133.2
* kernel-devel-5.14.21-150400.24.133.2
* kernel-source-5.14.21-150400.24.133.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.133.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.133.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* kernel-64kb-devel-5.14.21-150400.24.133.2
* kernel-64kb-debugsource-5.14.21-150400.24.133.2
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.133.2
* kernel-64kb-debuginfo-5.14.21-150400.24.133.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.133.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
* kernel-obs-build-debugsource-5.14.21-150400.24.133.2
* kernel-obs-build-5.14.21-150400.24.133.2
* reiserfs-kmp-default-5.14.21-150400.24.133.2
* kernel-default-debugsource-5.14.21-150400.24.133.2
* kernel-syms-5.14.21-150400.24.133.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.133.2
* kernel-default-devel-5.14.21-150400.24.133.2
* kernel-default-debuginfo-5.14.21-150400.24.133.2
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.133.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* kernel-macros-5.14.21-150400.24.133.2
* kernel-devel-5.14.21-150400.24.133.2
* kernel-source-5.14.21-150400.24.133.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.133.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.133.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
* kernel-default-extra-5.14.21-150400.24.133.2
* kernel-obs-build-debugsource-5.14.21-150400.24.133.2
* kernel-obs-build-5.14.21-150400.24.133.2
* kernel-default-debugsource-5.14.21-150400.24.133.2
* kernel-syms-5.14.21-150400.24.133.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.133.2
* kernel-default-extra-debuginfo-5.14.21-150400.24.133.2
* kernel-default-devel-5.14.21-150400.24.133.2
* kernel-default-debuginfo-5.14.21-150400.24.133.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* kernel-macros-5.14.21-150400.24.133.2
* kernel-devel-5.14.21-150400.24.133.2
* kernel-source-5.14.21-150400.24.133.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.133.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.133.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64)
* kernel-64kb-devel-5.14.21-150400.24.133.2
* kernel-64kb-debugsource-5.14.21-150400.24.133.2
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.133.2
* kernel-64kb-debuginfo-5.14.21-150400.24.133.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64 nosrc)
* kernel-default-5.14.21-150400.24.133.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* kernel-obs-build-debugsource-5.14.21-150400.24.133.2
* kernel-obs-build-5.14.21-150400.24.133.2
* reiserfs-kmp-default-5.14.21-150400.24.133.2
* kernel-default-debugsource-5.14.21-150400.24.133.2
* kernel-syms-5.14.21-150400.24.133.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.133.2
* kernel-default-devel-5.14.21-150400.24.133.2
* kernel-default-debuginfo-5.14.21-150400.24.133.2
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.133.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* kernel-macros-5.14.21-150400.24.133.2
* kernel-devel-5.14.21-150400.24.133.2
* kernel-source-5.14.21-150400.24.133.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.133.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.133.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.133.2
* kernel-zfcpdump-debugsource-5.14.21-150400.24.133.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le
x86_64)
* kernel-default-5.14.21-150400.24.133.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
* kernel-obs-build-debugsource-5.14.21-150400.24.133.2
* kernel-obs-build-5.14.21-150400.24.133.2
* reiserfs-kmp-default-5.14.21-150400.24.133.2
* kernel-default-debugsource-5.14.21-150400.24.133.2
* kernel-syms-5.14.21-150400.24.133.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.133.2
* kernel-default-devel-5.14.21-150400.24.133.2
* kernel-default-debuginfo-5.14.21-150400.24.133.2
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.133.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* kernel-macros-5.14.21-150400.24.133.2
* kernel-devel-5.14.21-150400.24.133.2
* kernel-source-5.14.21-150400.24.133.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.133.1
* SUSE Manager Proxy 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.133.2
* SUSE Manager Proxy 4.3 (x86_64)
* kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
* kernel-default-debugsource-5.14.21-150400.24.133.2
* kernel-syms-5.14.21-150400.24.133.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.133.2
* kernel-default-devel-5.14.21-150400.24.133.2
* kernel-default-debuginfo-5.14.21-150400.24.133.2
* SUSE Manager Proxy 4.3 (noarch)
* kernel-macros-5.14.21-150400.24.133.2
* kernel-devel-5.14.21-150400.24.133.2
* kernel-source-5.14.21-150400.24.133.2
* SUSE Manager Retail Branch Server 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.133.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
* kernel-default-debugsource-5.14.21-150400.24.133.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.133.2
* kernel-default-devel-5.14.21-150400.24.133.2
* kernel-default-debuginfo-5.14.21-150400.24.133.2
* SUSE Manager Retail Branch Server 4.3 (noarch)
* kernel-macros-5.14.21-150400.24.133.2
* kernel-devel-5.14.21-150400.24.133.2
* SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64)
* kernel-default-5.14.21-150400.24.133.2
* SUSE Manager Server 4.3 (ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.133.2
* kernel-syms-5.14.21-150400.24.133.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.133.2
* kernel-default-devel-5.14.21-150400.24.133.2
* kernel-default-debuginfo-5.14.21-150400.24.133.2
* SUSE Manager Server 4.3 (noarch)
* kernel-macros-5.14.21-150400.24.133.2
* kernel-devel-5.14.21-150400.24.133.2
* kernel-source-5.14.21-150400.24.133.2
* SUSE Manager Server 4.3 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.133.2
* SUSE Manager Server 4.3 (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.133.2
* kernel-zfcpdump-debugsource-5.14.21-150400.24.133.2

## References:

* https://www.suse.com/security/cve/CVE-2021-4441.html
* https://www.suse.com/security/cve/CVE-2022-4382.html
* https://www.suse.com/security/cve/CVE-2022-48868.html
* https://www.suse.com/security/cve/CVE-2022-48869.html
* https://www.suse.com/security/cve/CVE-2022-48870.html
* https://www.suse.com/security/cve/CVE-2022-48871.html
* https://www.suse.com/security/cve/CVE-2022-48872.html
* https://www.suse.com/security/cve/CVE-2022-48873.html
* https://www.suse.com/security/cve/CVE-2022-48875.html
* https://www.suse.com/security/cve/CVE-2022-48878.html
* https://www.suse.com/security/cve/CVE-2022-48880.html
* https://www.suse.com/security/cve/CVE-2022-48890.html
* https://www.suse.com/security/cve/CVE-2022-48891.html
* https://www.suse.com/security/cve/CVE-2022-48896.html
* https://www.suse.com/security/cve/CVE-2022-48898.html
* https://www.suse.com/security/cve/CVE-2022-48899.html
* https://www.suse.com/security/cve/CVE-2022-48903.html
* https://www.suse.com/security/cve/CVE-2022-48904.html
* https://www.suse.com/security/cve/CVE-2022-48905.html
* https://www.suse.com/security/cve/CVE-2022-48907.html
* https://www.suse.com/security/cve/CVE-2022-48909.html
* https://www.suse.com/security/cve/CVE-2022-48912.html
* https://www.suse.com/security/cve/CVE-2022-48913.html
* https://www.suse.com/security/cve/CVE-2022-48914.html
* https://www.suse.com/security/cve/CVE-2022-48915.html
* https://www.suse.com/security/cve/CVE-2022-48916.html
* https://www.suse.com/security/cve/CVE-2022-48917.html
* https://www.suse.com/security/cve/CVE-2022-48918.html
* https://www.suse.com/security/cve/CVE-2022-48919.html
* https://www.suse.com/security/cve/CVE-2022-48921.html
* https://www.suse.com/security/cve/CVE-2022-48924.html
* https://www.suse.com/security/cve/CVE-2022-48925.html
* https://www.suse.com/security/cve/CVE-2022-48926.html
* https://www.suse.com/security/cve/CVE-2022-48927.html
* https://www.suse.com/security/cve/CVE-2022-48928.html
* https://www.suse.com/security/cve/CVE-2022-48929.html
* https://www.suse.com/security/cve/CVE-2022-48930.html
* https://www.suse.com/security/cve/CVE-2022-48931.html
* https://www.suse.com/security/cve/CVE-2022-48932.html
* https://www.suse.com/security/cve/CVE-2022-48934.html
* https://www.suse.com/security/cve/CVE-2022-48935.html
* https://www.suse.com/security/cve/CVE-2022-48937.html
* https://www.suse.com/security/cve/CVE-2022-48938.html
* https://www.suse.com/security/cve/CVE-2022-48941.html
* https://www.suse.com/security/cve/CVE-2022-48942.html
* https://www.suse.com/security/cve/CVE-2022-48943.html
* https://www.suse.com/security/cve/CVE-2023-52489.html
* https://www.suse.com/security/cve/CVE-2023-52893.html
* https://www.suse.com/security/cve/CVE-2023-52894.html
* https://www.suse.com/security/cve/CVE-2023-52896.html
* https://www.suse.com/security/cve/CVE-2023-52898.html
* https://www.suse.com/security/cve/CVE-2023-52900.html
* https://www.suse.com/security/cve/CVE-2023-52901.html
* https://www.suse.com/security/cve/CVE-2023-52905.html
* https://www.suse.com/security/cve/CVE-2023-52907.html
* https://www.suse.com/security/cve/CVE-2023-52911.html
* https://www.suse.com/security/cve/CVE-2024-40910.html
* https://www.suse.com/security/cve/CVE-2024-41009.html
* https://www.suse.com/security/cve/CVE-2024-41011.html
* https://www.suse.com/security/cve/CVE-2024-41062.html
* https://www.suse.com/security/cve/CVE-2024-41087.html
* https://www.suse.com/security/cve/CVE-2024-42077.html
* https://www.suse.com/security/cve/CVE-2024-42126.html
* https://www.suse.com/security/cve/CVE-2024-42230.html
* https://www.suse.com/security/cve/CVE-2024-42232.html
* https://www.suse.com/security/cve/CVE-2024-42271.html
* https://www.suse.com/security/cve/CVE-2024-43853.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://www.suse.com/security/cve/CVE-2024-43882.html
* https://www.suse.com/security/cve/CVE-2024-43883.html
* https://www.suse.com/security/cve/CVE-2024-44938.html
* https://www.suse.com/security/cve/CVE-2024-44947.html
* https://www.suse.com/security/cve/CVE-2024-45003.html
* https://bugzilla.suse.com/show_bug.cgi?id=1193629
* https://bugzilla.suse.com/show_bug.cgi?id=1194111
* https://bugzilla.suse.com/show_bug.cgi?id=1194765
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1196261
* https://bugzilla.suse.com/show_bug.cgi?id=1196516
* https://bugzilla.suse.com/show_bug.cgi?id=1196894
* https://bugzilla.suse.com/show_bug.cgi?id=1198017
* https://bugzilla.suse.com/show_bug.cgi?id=1203360
* https://bugzilla.suse.com/show_bug.cgi?id=1206006
* https://bugzilla.suse.com/show_bug.cgi?id=1206258
* https://bugzilla.suse.com/show_bug.cgi?id=1207158
* https://bugzilla.suse.com/show_bug.cgi?id=1216834
* https://bugzilla.suse.com/show_bug.cgi?id=1221326
* https://bugzilla.suse.com/show_bug.cgi?id=1221645
* https://bugzilla.suse.com/show_bug.cgi?id=1223191
* https://bugzilla.suse.com/show_bug.cgi?id=1224105
* https://bugzilla.suse.com/show_bug.cgi?id=1227832
* https://bugzilla.suse.com/show_bug.cgi?id=1228020
* https://bugzilla.suse.com/show_bug.cgi?id=1228114
* https://bugzilla.suse.com/show_bug.cgi?id=1228466
* https://bugzilla.suse.com/show_bug.cgi?id=1228489
* https://bugzilla.suse.com/show_bug.cgi?id=1228516
* https://bugzilla.suse.com/show_bug.cgi?id=1228576
* https://bugzilla.suse.com/show_bug.cgi?id=1228718
* https://bugzilla.suse.com/show_bug.cgi?id=1228801
* https://bugzilla.suse.com/show_bug.cgi?id=1228959
* https://bugzilla.suse.com/show_bug.cgi?id=1229042
* https://bugzilla.suse.com/show_bug.cgi?id=1229292
* https://bugzilla.suse.com/show_bug.cgi?id=1229400
* https://bugzilla.suse.com/show_bug.cgi?id=1229454
* https://bugzilla.suse.com/show_bug.cgi?id=1229500
* https://bugzilla.suse.com/show_bug.cgi?id=1229503
* https://bugzilla.suse.com/show_bug.cgi?id=1229506
* https://bugzilla.suse.com/show_bug.cgi?id=1229507
* https://bugzilla.suse.com/show_bug.cgi?id=1229508
* https://bugzilla.suse.com/show_bug.cgi?id=1229509
* https://bugzilla.suse.com/show_bug.cgi?id=1229510
* https://bugzilla.suse.com/show_bug.cgi?id=1229512
* https://bugzilla.suse.com/show_bug.cgi?id=1229516
* https://bugzilla.suse.com/show_bug.cgi?id=1229522
* https://bugzilla.suse.com/show_bug.cgi?id=1229526
* https://bugzilla.suse.com/show_bug.cgi?id=1229528
* https://bugzilla.suse.com/show_bug.cgi?id=1229531
* https://bugzilla.suse.com/show_bug.cgi?id=1229533
* https://bugzilla.suse.com/show_bug.cgi?id=1229535
* https://bugzilla.suse.com/show_bug.cgi?id=1229536
* https://bugzilla.suse.com/show_bug.cgi?id=1229537
* https://bugzilla.suse.com/show_bug.cgi?id=1229540
* https://bugzilla.suse.com/show_bug.cgi?id=1229544
* https://bugzilla.suse.com/show_bug.cgi?id=1229554
* https://bugzilla.suse.com/show_bug.cgi?id=1229557
* https://bugzilla.suse.com/show_bug.cgi?id=1229565
* https://bugzilla.suse.com/show_bug.cgi?id=1229566
* https://bugzilla.suse.com/show_bug.cgi?id=1229568
* https://bugzilla.suse.com/show_bug.cgi?id=1229581
* https://bugzilla.suse.com/show_bug.cgi?id=1229598
* https://bugzilla.suse.com/show_bug.cgi?id=1229603
* https://bugzilla.suse.com/show_bug.cgi?id=1229604
* https://bugzilla.suse.com/show_bug.cgi?id=1229608
* https://bugzilla.suse.com/show_bug.cgi?id=1229611
* https://bugzilla.suse.com/show_bug.cgi?id=1229612
* https://bugzilla.suse.com/show_bug.cgi?id=1229613
* https://bugzilla.suse.com/show_bug.cgi?id=1229614
* https://bugzilla.suse.com/show_bug.cgi?id=1229617
* https://bugzilla.suse.com/show_bug.cgi?id=1229619
* https://bugzilla.suse.com/show_bug.cgi?id=1229620
* https://bugzilla.suse.com/show_bug.cgi?id=1229622
* https://bugzilla.suse.com/show_bug.cgi?id=1229623
* https://bugzilla.suse.com/show_bug.cgi?id=1229624
* https://bugzilla.suse.com/show_bug.cgi?id=1229625
* https://bugzilla.suse.com/show_bug.cgi?id=1229626
* https://bugzilla.suse.com/show_bug.cgi?id=1229628
* https://bugzilla.suse.com/show_bug.cgi?id=1229629
* https://bugzilla.suse.com/show_bug.cgi?id=1229630
* https://bugzilla.suse.com/show_bug.cgi?id=1229631
* https://bugzilla.suse.com/show_bug.cgi?id=1229635
* https://bugzilla.suse.com/show_bug.cgi?id=1229636
* https://bugzilla.suse.com/show_bug.cgi?id=1229637
* https://bugzilla.suse.com/show_bug.cgi?id=1229638
* https://bugzilla.suse.com/show_bug.cgi?id=1229639
* https://bugzilla.suse.com/show_bug.cgi?id=1229641
* https://bugzilla.suse.com/show_bug.cgi?id=1229642
* https://bugzilla.suse.com/show_bug.cgi?id=1229643
* https://bugzilla.suse.com/show_bug.cgi?id=1229645
* https://bugzilla.suse.com/show_bug.cgi?id=1229657
* https://bugzilla.suse.com/show_bug.cgi?id=1229664
* https://bugzilla.suse.com/show_bug.cgi?id=1229707
* https://bugzilla.suse.com/show_bug.cgi?id=1229792
* https://bugzilla.suse.com/show_bug.cgi?id=1230245
* https://bugzilla.suse.com/show_bug.cgi?id=1230413



openSUSE-SU-2024:14361-1: moderate: libecpg6-17~rc1-1.1 on GA media


# libecpg6-17~rc1-1.1 on GA media

Announcement ID: openSUSE-SU-2024:14361-1
Rating: moderate

Cross-References:

* CVE-2024-7348

CVSS scores:

* CVE-2024-7348 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-7348 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the libecpg6-17~rc1-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* libecpg6 17~rc1-1.1
* libecpg6-32bit 17~rc1-1.1
* libpq5 17~rc1-1.1
* libpq5-32bit 17~rc1-1.1
* postgresql17 17~rc1-1.1
* postgresql17-contrib 17~rc1-1.1
* postgresql17-devel 17~rc1-1.1
* postgresql17-docs 17~rc1-1.1
* postgresql17-llvmjit 17~rc1-1.1
* postgresql17-llvmjit-devel 17~rc1-1.1
* postgresql17-plperl 17~rc1-1.1
* postgresql17-plpython 17~rc1-1.1
* postgresql17-pltcl 17~rc1-1.1
* postgresql17-server 17~rc1-1.1
* postgresql17-server-devel 17~rc1-1.1
* postgresql17-test 17~rc1-1.1

## References:

* https://www.suse.com/security/cve/CVE-2024-7348.html



SUSE-SU-2024:3411-1: important: Security update for python39


# Security update for python39

Announcement ID: SUSE-SU-2024:3411-1
Rating: important
References:

* bsc#1229596
* bsc#1229704
* bsc#1230227

Cross-References:

* CVE-2024-6232
* CVE-2024-7592
* CVE-2024-8088

CVSS scores:

* CVE-2024-6232 ( SUSE ): 8.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-6232 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-6232 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-7592 ( SUSE ): 2.6 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-7592 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-8088 ( SUSE ): 5.9
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-8088 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H

Affected Products:

* Legacy Module 15-SP5
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves three vulnerabilities can now be installed.

## Description:

This update for python39 fixes the following issues:

* Update to 3.9.20:
* CVE-2024-6232: excessive backtracking when parsing tarfile headers leads to
ReDoS. (bsc#1230227)
* CVE-2024-7592: quadratic algorithm used when parsing cookies leads to
excessive resource consumption. (bsc#1229596)
* CVE-2024-8088: lack of name validation when extracting a zip archive leads
to infinite loops. (bsc#1229704)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-3411=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3411=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3411=1

* Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-3411=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3411=1

* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3411=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3411=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3411=1

## Package List:

* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* python39-core-debugsource-3.9.20-150300.4.52.1
* python39-devel-3.9.20-150300.4.52.1
* python39-base-3.9.20-150300.4.52.1
* python39-tools-3.9.20-150300.4.52.1
* python39-curses-debuginfo-3.9.20-150300.4.52.1
* python39-debugsource-3.9.20-150300.4.52.1
* python39-tk-3.9.20-150300.4.52.1
* python39-base-debuginfo-3.9.20-150300.4.52.1
* python39-doc-devhelp-3.9.20-150300.4.52.1
* python39-dbm-debuginfo-3.9.20-150300.4.52.1
* python39-dbm-3.9.20-150300.4.52.1
* libpython3_9-1_0-3.9.20-150300.4.52.1
* libpython3_9-1_0-debuginfo-3.9.20-150300.4.52.1
* python39-tk-debuginfo-3.9.20-150300.4.52.1
* python39-curses-3.9.20-150300.4.52.1
* python39-testsuite-debuginfo-3.9.20-150300.4.52.1
* python39-debuginfo-3.9.20-150300.4.52.1
* python39-testsuite-3.9.20-150300.4.52.1
* python39-3.9.20-150300.4.52.1
* python39-idle-3.9.20-150300.4.52.1
* python39-doc-3.9.20-150300.4.52.1
* openSUSE Leap 15.3 (x86_64)
* python39-32bit-3.9.20-150300.4.52.1
* libpython3_9-1_0-32bit-debuginfo-3.9.20-150300.4.52.1
* python39-base-32bit-debuginfo-3.9.20-150300.4.52.1
* libpython3_9-1_0-32bit-3.9.20-150300.4.52.1
* python39-32bit-debuginfo-3.9.20-150300.4.52.1
* python39-base-32bit-3.9.20-150300.4.52.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* python39-64bit-3.9.20-150300.4.52.1
* libpython3_9-1_0-64bit-debuginfo-3.9.20-150300.4.52.1
* python39-base-64bit-debuginfo-3.9.20-150300.4.52.1
* python39-base-64bit-3.9.20-150300.4.52.1
* libpython3_9-1_0-64bit-3.9.20-150300.4.52.1
* python39-64bit-debuginfo-3.9.20-150300.4.52.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python39-core-debugsource-3.9.20-150300.4.52.1
* python39-devel-3.9.20-150300.4.52.1
* python39-base-3.9.20-150300.4.52.1
* python39-tools-3.9.20-150300.4.52.1
* python39-curses-debuginfo-3.9.20-150300.4.52.1
* python39-debugsource-3.9.20-150300.4.52.1
* python39-tk-3.9.20-150300.4.52.1
* python39-base-debuginfo-3.9.20-150300.4.52.1
* python39-doc-devhelp-3.9.20-150300.4.52.1
* python39-dbm-debuginfo-3.9.20-150300.4.52.1
* python39-dbm-3.9.20-150300.4.52.1
* libpython3_9-1_0-3.9.20-150300.4.52.1
* libpython3_9-1_0-debuginfo-3.9.20-150300.4.52.1
* python39-tk-debuginfo-3.9.20-150300.4.52.1
* python39-curses-3.9.20-150300.4.52.1
* python39-testsuite-debuginfo-3.9.20-150300.4.52.1
* python39-debuginfo-3.9.20-150300.4.52.1
* python39-testsuite-3.9.20-150300.4.52.1
* python39-3.9.20-150300.4.52.1
* python39-idle-3.9.20-150300.4.52.1
* python39-doc-3.9.20-150300.4.52.1
* openSUSE Leap 15.5 (x86_64)
* python39-32bit-3.9.20-150300.4.52.1
* libpython3_9-1_0-32bit-debuginfo-3.9.20-150300.4.52.1
* python39-base-32bit-debuginfo-3.9.20-150300.4.52.1
* libpython3_9-1_0-32bit-3.9.20-150300.4.52.1
* python39-32bit-debuginfo-3.9.20-150300.4.52.1
* python39-base-32bit-3.9.20-150300.4.52.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python39-core-debugsource-3.9.20-150300.4.52.1
* python39-devel-3.9.20-150300.4.52.1
* python39-base-3.9.20-150300.4.52.1
* python39-tools-3.9.20-150300.4.52.1
* python39-curses-debuginfo-3.9.20-150300.4.52.1
* python39-debugsource-3.9.20-150300.4.52.1
* python39-tk-3.9.20-150300.4.52.1
* python39-base-debuginfo-3.9.20-150300.4.52.1
* python39-doc-devhelp-3.9.20-150300.4.52.1
* python39-dbm-debuginfo-3.9.20-150300.4.52.1
* python39-dbm-3.9.20-150300.4.52.1
* libpython3_9-1_0-3.9.20-150300.4.52.1
* libpython3_9-1_0-debuginfo-3.9.20-150300.4.52.1
* python39-tk-debuginfo-3.9.20-150300.4.52.1
* python39-curses-3.9.20-150300.4.52.1
* python39-testsuite-debuginfo-3.9.20-150300.4.52.1
* python39-debuginfo-3.9.20-150300.4.52.1
* python39-testsuite-3.9.20-150300.4.52.1
* python39-3.9.20-150300.4.52.1
* python39-idle-3.9.20-150300.4.52.1
* python39-doc-3.9.20-150300.4.52.1
* openSUSE Leap 15.6 (x86_64)
* python39-32bit-3.9.20-150300.4.52.1
* libpython3_9-1_0-32bit-debuginfo-3.9.20-150300.4.52.1
* python39-base-32bit-debuginfo-3.9.20-150300.4.52.1
* libpython3_9-1_0-32bit-3.9.20-150300.4.52.1
* python39-32bit-debuginfo-3.9.20-150300.4.52.1
* python39-base-32bit-3.9.20-150300.4.52.1
* Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* python39-curses-3.9.20-150300.4.52.1
* python39-base-3.9.20-150300.4.52.1
* python39-dbm-3.9.20-150300.4.52.1
* python39-3.9.20-150300.4.52.1
* libpython3_9-1_0-3.9.20-150300.4.52.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* python39-tk-debuginfo-3.9.20-150300.4.52.1
* python39-curses-3.9.20-150300.4.52.1
* python39-core-debugsource-3.9.20-150300.4.52.1
* python39-devel-3.9.20-150300.4.52.1
* python39-base-3.9.20-150300.4.52.1
* python39-debuginfo-3.9.20-150300.4.52.1
* python39-tools-3.9.20-150300.4.52.1
* python39-dbm-debuginfo-3.9.20-150300.4.52.1
* python39-curses-debuginfo-3.9.20-150300.4.52.1
* python39-debugsource-3.9.20-150300.4.52.1
* python39-tk-3.9.20-150300.4.52.1
* python39-dbm-3.9.20-150300.4.52.1
* python39-3.9.20-150300.4.52.1
* python39-base-debuginfo-3.9.20-150300.4.52.1
* libpython3_9-1_0-3.9.20-150300.4.52.1
* python39-idle-3.9.20-150300.4.52.1
* libpython3_9-1_0-debuginfo-3.9.20-150300.4.52.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* python39-tk-debuginfo-3.9.20-150300.4.52.1
* python39-curses-3.9.20-150300.4.52.1
* python39-core-debugsource-3.9.20-150300.4.52.1
* python39-devel-3.9.20-150300.4.52.1
* python39-base-3.9.20-150300.4.52.1
* python39-debuginfo-3.9.20-150300.4.52.1
* python39-tools-3.9.20-150300.4.52.1
* python39-dbm-debuginfo-3.9.20-150300.4.52.1
* python39-curses-debuginfo-3.9.20-150300.4.52.1
* python39-debugsource-3.9.20-150300.4.52.1
* python39-tk-3.9.20-150300.4.52.1
* python39-dbm-3.9.20-150300.4.52.1
* python39-3.9.20-150300.4.52.1
* python39-base-debuginfo-3.9.20-150300.4.52.1
* libpython3_9-1_0-3.9.20-150300.4.52.1
* python39-idle-3.9.20-150300.4.52.1
* libpython3_9-1_0-debuginfo-3.9.20-150300.4.52.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* python39-tk-debuginfo-3.9.20-150300.4.52.1
* python39-curses-3.9.20-150300.4.52.1
* python39-core-debugsource-3.9.20-150300.4.52.1
* python39-devel-3.9.20-150300.4.52.1
* python39-base-3.9.20-150300.4.52.1
* python39-debuginfo-3.9.20-150300.4.52.1
* python39-tools-3.9.20-150300.4.52.1
* python39-dbm-debuginfo-3.9.20-150300.4.52.1
* python39-curses-debuginfo-3.9.20-150300.4.52.1
* python39-debugsource-3.9.20-150300.4.52.1
* python39-tk-3.9.20-150300.4.52.1
* python39-dbm-3.9.20-150300.4.52.1
* python39-3.9.20-150300.4.52.1
* python39-base-debuginfo-3.9.20-150300.4.52.1
* libpython3_9-1_0-3.9.20-150300.4.52.1
* python39-idle-3.9.20-150300.4.52.1
* libpython3_9-1_0-debuginfo-3.9.20-150300.4.52.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* python39-tk-debuginfo-3.9.20-150300.4.52.1
* python39-curses-3.9.20-150300.4.52.1
* python39-core-debugsource-3.9.20-150300.4.52.1
* python39-devel-3.9.20-150300.4.52.1
* python39-base-3.9.20-150300.4.52.1
* python39-debuginfo-3.9.20-150300.4.52.1
* python39-tools-3.9.20-150300.4.52.1
* python39-dbm-debuginfo-3.9.20-150300.4.52.1
* python39-curses-debuginfo-3.9.20-150300.4.52.1
* python39-debugsource-3.9.20-150300.4.52.1
* python39-tk-3.9.20-150300.4.52.1
* python39-dbm-3.9.20-150300.4.52.1
* python39-3.9.20-150300.4.52.1
* python39-base-debuginfo-3.9.20-150300.4.52.1
* libpython3_9-1_0-3.9.20-150300.4.52.1
* python39-idle-3.9.20-150300.4.52.1
* libpython3_9-1_0-debuginfo-3.9.20-150300.4.52.1

## References:

* https://www.suse.com/security/cve/CVE-2024-6232.html
* https://www.suse.com/security/cve/CVE-2024-7592.html
* https://www.suse.com/security/cve/CVE-2024-8088.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229596
* https://bugzilla.suse.com/show_bug.cgi?id=1229704
* https://bugzilla.suse.com/show_bug.cgi?id=1230227



openSUSE-SU-2024:14362-1: moderate: python310-azure-identity-1.18.0-1.1 on GA media


# python310-azure-identity-1.18.0-1.1 on GA media

Announcement ID: openSUSE-SU-2024:14362-1
Rating: moderate

Cross-References:

* CVE-2024-35255

CVSS scores:

* CVE-2024-35255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-35255 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the python310-azure-identity-1.18.0-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python310-azure-identity 1.18.0-1.1
* python311-azure-identity 1.18.0-1.1
* python312-azure-identity 1.18.0-1.1

## References:

* https://www.suse.com/security/cve/CVE-2024-35255.html



openSUSE-SU-2024:14360-1: moderate: postgresql16-16.4-1.1 on GA media


# postgresql16-16.4-1.1 on GA media

Announcement ID: openSUSE-SU-2024:14360-1
Rating: moderate

Cross-References:

* CVE-2020-25694
* CVE-2020-25695
* CVE-2020-25696
* CVE-2021-20229
* CVE-2021-23214
* CVE-2021-23222
* CVE-2021-32027
* CVE-2021-32028
* CVE-2021-32029
* CVE-2021-3393
* CVE-2022-1552
* CVE-2022-41862
* CVE-2023-2454
* CVE-2023-2455
* CVE-2024-7348

CVSS scores:

* CVE-2020-25694 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2020-25695 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2020-25696 ( SUSE ): 8 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-20229 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-23214 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-23222 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-32027 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-32028 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-32029 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-3393 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-1552 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-41862 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-2454 ( SUSE ): 6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
* CVE-2023-2455 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-7348 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-7348 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 15 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the postgresql16-16.4-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* postgresql16 16.4-1.1
* postgresql16-contrib 16.4-1.1
* postgresql16-devel 16.4-1.1
* postgresql16-docs 16.4-1.1
* postgresql16-llvmjit 16.4-1.1
* postgresql16-llvmjit-devel 16.4-1.1
* postgresql16-plperl 16.4-1.1
* postgresql16-plpython 16.4-1.1
* postgresql16-pltcl 16.4-1.1
* postgresql16-server 16.4-1.1
* postgresql16-server-devel 16.4-1.1
* postgresql16-test 16.4-1.1

## References:

* https://www.suse.com/security/cve/CVE-2020-25694.html
* https://www.suse.com/security/cve/CVE-2020-25695.html
* https://www.suse.com/security/cve/CVE-2020-25696.html
* https://www.suse.com/security/cve/CVE-2021-20229.html
* https://www.suse.com/security/cve/CVE-2021-23214.html
* https://www.suse.com/security/cve/CVE-2021-23222.html
* https://www.suse.com/security/cve/CVE-2021-32027.html
* https://www.suse.com/security/cve/CVE-2021-32028.html
* https://www.suse.com/security/cve/CVE-2021-32029.html
* https://www.suse.com/security/cve/CVE-2021-3393.html
* https://www.suse.com/security/cve/CVE-2022-1552.html
* https://www.suse.com/security/cve/CVE-2022-41862.html
* https://www.suse.com/security/cve/CVE-2023-2454.html
* https://www.suse.com/security/cve/CVE-2023-2455.html
* https://www.suse.com/security/cve/CVE-2024-7348.html



SUSE-SU-2024:3397-1: moderate: Security update for libmfx


# Security update for libmfx

Announcement ID: SUSE-SU-2024:3397-1
Rating: moderate
References:

* bsc#1219494
* bsc#1226892
* bsc#1226897
* bsc#1226898
* bsc#1226899
* bsc#1226900
* bsc#1226901
* jsc#PED-10024

Cross-References:

* CVE-2023-22656
* CVE-2023-45221
* CVE-2023-47169
* CVE-2023-47282
* CVE-2023-48368

CVSS scores:

* CVE-2023-22656 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
* CVE-2023-45221 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
* CVE-2023-47169 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-47282 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
* CVE-2023-48368 ( SUSE ): 5.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.4

An update that solves five vulnerabilities, contains one feature and has two
security fixes can now be installed.

## Description:

This update for libmfx fixes the following issues:

* CVE-2023-48368: Fixed an improper input validation. (bsc#1226897)
* CVE-2023-45221: Fixed an improper buffer restrictions. (bsc#1226898)
* CVE-2023-22656: Fixed an out-of-bounds read. (bsc#1226899)
* CVE-2023-47282: Fixed an out-of-bounds write. (bsc#1226900)
* CVE-2023-47169: Fixed an improper buffer restrictions. (bsc#1226901)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3397=1

## Package List:

* openSUSE Leap 15.4 (x86_64)
* libmfx-debugsource-21.3.4-150400.3.5.1
* libmfx1-debuginfo-21.3.4-150400.3.5.1
* libmfx1-21.3.4-150400.3.5.1
* libmfx-21.3.4-150400.3.5.1

## References:

* https://www.suse.com/security/cve/CVE-2023-22656.html
* https://www.suse.com/security/cve/CVE-2023-45221.html
* https://www.suse.com/security/cve/CVE-2023-47169.html
* https://www.suse.com/security/cve/CVE-2023-47282.html
* https://www.suse.com/security/cve/CVE-2023-48368.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219494
* https://bugzilla.suse.com/show_bug.cgi?id=1226892
* https://bugzilla.suse.com/show_bug.cgi?id=1226897
* https://bugzilla.suse.com/show_bug.cgi?id=1226898
* https://bugzilla.suse.com/show_bug.cgi?id=1226899
* https://bugzilla.suse.com/show_bug.cgi?id=1226900
* https://bugzilla.suse.com/show_bug.cgi?id=1226901
* https://jira.suse.com/browse/PED-10024



SUSE-SU-2024:3396-1: important: Security update for qemu


# Security update for qemu

Announcement ID: SUSE-SU-2024:3396-1
Rating: important
References:

* bsc#1227322
* bsc#1230363

Cross-References:

* CVE-2024-4467

CVSS scores:

* CVE-2024-4467 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-4467 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves one vulnerability and has one security fix can now be
installed.

## Description:

This update for qemu fixes the following issues:

* CVE-2024-4467: Fixed denial of service and file read/write via qemu-img info
command (bsc#1227322)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3396=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3396=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3396=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3396=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3396=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3396=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3396=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3396=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3396=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3396=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3396=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3396=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3396=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* qemu-s390x-debuginfo-6.2.0-150400.37.34.1
* qemu-block-dmg-debuginfo-6.2.0-150400.37.34.1
* qemu-audio-spice-6.2.0-150400.37.34.1
* qemu-ui-spice-core-6.2.0-150400.37.34.1
* qemu-lang-6.2.0-150400.37.34.1
* qemu-audio-oss-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.34.1
* qemu-x86-debuginfo-6.2.0-150400.37.34.1
* qemu-accel-tcg-x86-6.2.0-150400.37.34.1
* qemu-s390x-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.34.1
* qemu-ivshmem-tools-6.2.0-150400.37.34.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.34.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.34.1
* qemu-ksm-6.2.0-150400.37.34.1
* qemu-block-dmg-6.2.0-150400.37.34.1
* qemu-ui-curses-6.2.0-150400.37.34.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.34.1
* qemu-debuginfo-6.2.0-150400.37.34.1
* qemu-guest-agent-6.2.0-150400.37.34.1
* qemu-accel-qtest-debuginfo-6.2.0-150400.37.34.1
* qemu-audio-pa-6.2.0-150400.37.34.1
* qemu-hw-usb-redirect-6.2.0-150400.37.34.1
* qemu-tools-6.2.0-150400.37.34.1
* qemu-linux-user-debugsource-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.34.1
* qemu-block-curl-6.2.0-150400.37.34.1
* qemu-accel-qtest-6.2.0-150400.37.34.1
* qemu-vhost-user-gpu-debuginfo-6.2.0-150400.37.34.1
* qemu-block-nfs-debuginfo-6.2.0-150400.37.34.1
* qemu-arm-6.2.0-150400.37.34.1
* qemu-block-ssh-debuginfo-6.2.0-150400.37.34.1
* qemu-extra-6.2.0-150400.37.34.1
* qemu-block-nfs-6.2.0-150400.37.34.1
* qemu-extra-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.34.1
* qemu-hw-usb-smartcard-6.2.0-150400.37.34.1
* qemu-block-gluster-6.2.0-150400.37.34.1
* qemu-ui-spice-app-6.2.0-150400.37.34.1
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.34.1
* qemu-linux-user-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-baum-6.2.0-150400.37.34.1
* qemu-audio-jack-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.34.1
* qemu-block-iscsi-6.2.0-150400.37.34.1
* qemu-ppc-debuginfo-6.2.0-150400.37.34.1
* qemu-audio-oss-6.2.0-150400.37.34.1
* qemu-block-gluster-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.34.1
* qemu-ivshmem-tools-debuginfo-6.2.0-150400.37.34.1
* qemu-x86-6.2.0-150400.37.34.1
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.34.1
* qemu-arm-debuginfo-6.2.0-150400.37.34.1
* qemu-audio-pa-debuginfo-6.2.0-150400.37.34.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-spice-6.2.0-150400.37.34.1
* qemu-debugsource-6.2.0-150400.37.34.1
* qemu-hw-usb-host-6.2.0-150400.37.34.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.34.1
* qemu-tools-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.34.1
* qemu-hw-display-qxl-6.2.0-150400.37.34.1
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-usb-smartcard-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-opengl-6.2.0-150400.37.34.1
* qemu-vhost-user-gpu-6.2.0-150400.37.34.1
* qemu-ui-gtk-6.2.0-150400.37.34.1
* qemu-block-ssh-6.2.0-150400.37.34.1
* qemu-6.2.0-150400.37.34.1
* qemu-audio-jack-6.2.0-150400.37.34.1
* qemu-ui-curses-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.34.1
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.34.1
* qemu-block-curl-debuginfo-6.2.0-150400.37.34.1
* qemu-audio-alsa-6.2.0-150400.37.34.1
* qemu-ppc-6.2.0-150400.37.34.1
* qemu-linux-user-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.34.1
* openSUSE Leap 15.4 (s390x x86_64 i586)
* qemu-kvm-6.2.0-150400.37.34.1
* openSUSE Leap 15.4 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.34.1
* qemu-ipxe-1.0.0+-150400.37.34.1
* qemu-sgabios-8-150400.37.34.1
* qemu-skiboot-6.2.0-150400.37.34.1
* qemu-microvm-6.2.0-150400.37.34.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.34.1
* qemu-SLOF-6.2.0-150400.37.34.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* qemu-block-rbd-debuginfo-6.2.0-150400.37.34.1
* qemu-block-rbd-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* qemu-audio-spice-6.2.0-150400.37.34.1
* qemu-ui-spice-core-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.34.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.34.1
* qemu-debuginfo-6.2.0-150400.37.34.1
* qemu-guest-agent-6.2.0-150400.37.34.1
* qemu-hw-usb-redirect-6.2.0-150400.37.34.1
* qemu-tools-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-spice-6.2.0-150400.37.34.1
* qemu-debugsource-6.2.0-150400.37.34.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.34.1
* qemu-tools-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.34.1
* qemu-hw-display-qxl-6.2.0-150400.37.34.1
* qemu-ui-opengl-6.2.0-150400.37.34.1
* qemu-6.2.0-150400.37.34.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.34.1
* qemu-arm-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* qemu-sgabios-8-150400.37.34.1
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.34.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.34.1
* qemu-ipxe-1.0.0+-150400.37.34.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (s390x)
* qemu-s390x-debuginfo-6.2.0-150400.37.34.1
* qemu-s390x-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.34.1
* qemu-x86-debuginfo-6.2.0-150400.37.34.1
* qemu-x86-6.2.0-150400.37.34.1
* qemu-accel-tcg-x86-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* qemu-audio-spice-6.2.0-150400.37.34.1
* qemu-ui-spice-core-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.34.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.34.1
* qemu-debuginfo-6.2.0-150400.37.34.1
* qemu-guest-agent-6.2.0-150400.37.34.1
* qemu-hw-usb-redirect-6.2.0-150400.37.34.1
* qemu-tools-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-spice-6.2.0-150400.37.34.1
* qemu-debugsource-6.2.0-150400.37.34.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.34.1
* qemu-tools-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.34.1
* qemu-hw-display-qxl-6.2.0-150400.37.34.1
* qemu-ui-opengl-6.2.0-150400.37.34.1
* qemu-6.2.0-150400.37.34.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Micro 5.3 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.34.1
* qemu-arm-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* qemu-sgabios-8-150400.37.34.1
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.34.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.34.1
* qemu-ipxe-1.0.0+-150400.37.34.1
* SUSE Linux Enterprise Micro 5.3 (s390x)
* qemu-s390x-debuginfo-6.2.0-150400.37.34.1
* qemu-s390x-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Micro 5.3 (x86_64)
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.34.1
* qemu-x86-debuginfo-6.2.0-150400.37.34.1
* qemu-x86-6.2.0-150400.37.34.1
* qemu-accel-tcg-x86-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* qemu-audio-spice-6.2.0-150400.37.34.1
* qemu-ui-spice-core-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.34.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.34.1
* qemu-debuginfo-6.2.0-150400.37.34.1
* qemu-guest-agent-6.2.0-150400.37.34.1
* qemu-hw-usb-redirect-6.2.0-150400.37.34.1
* qemu-tools-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-spice-6.2.0-150400.37.34.1
* qemu-debugsource-6.2.0-150400.37.34.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.34.1
* qemu-tools-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.34.1
* qemu-hw-display-qxl-6.2.0-150400.37.34.1
* qemu-ui-opengl-6.2.0-150400.37.34.1
* qemu-6.2.0-150400.37.34.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.34.1
* qemu-arm-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* qemu-sgabios-8-150400.37.34.1
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.34.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.34.1
* qemu-ipxe-1.0.0+-150400.37.34.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (s390x)
* qemu-s390x-debuginfo-6.2.0-150400.37.34.1
* qemu-s390x-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.34.1
* qemu-x86-debuginfo-6.2.0-150400.37.34.1
* qemu-x86-6.2.0-150400.37.34.1
* qemu-accel-tcg-x86-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* qemu-audio-spice-6.2.0-150400.37.34.1
* qemu-ui-spice-core-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.34.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.34.1
* qemu-debuginfo-6.2.0-150400.37.34.1
* qemu-guest-agent-6.2.0-150400.37.34.1
* qemu-hw-usb-redirect-6.2.0-150400.37.34.1
* qemu-tools-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-spice-6.2.0-150400.37.34.1
* qemu-debugsource-6.2.0-150400.37.34.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.34.1
* qemu-tools-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.34.1
* qemu-hw-display-qxl-6.2.0-150400.37.34.1
* qemu-ui-opengl-6.2.0-150400.37.34.1
* qemu-6.2.0-150400.37.34.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Micro 5.4 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.34.1
* qemu-arm-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* qemu-sgabios-8-150400.37.34.1
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.34.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.34.1
* qemu-ipxe-1.0.0+-150400.37.34.1
* SUSE Linux Enterprise Micro 5.4 (s390x)
* qemu-s390x-debuginfo-6.2.0-150400.37.34.1
* qemu-s390x-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Micro 5.4 (x86_64)
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.34.1
* qemu-x86-debuginfo-6.2.0-150400.37.34.1
* qemu-x86-6.2.0-150400.37.34.1
* qemu-accel-tcg-x86-6.2.0-150400.37.34.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* qemu-audio-spice-6.2.0-150400.37.34.1
* qemu-ui-spice-core-6.2.0-150400.37.34.1
* qemu-lang-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.34.1
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.34.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.34.1
* qemu-ksm-6.2.0-150400.37.34.1
* qemu-block-rbd-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-curses-6.2.0-150400.37.34.1
* qemu-debuginfo-6.2.0-150400.37.34.1
* qemu-guest-agent-6.2.0-150400.37.34.1
* qemu-hw-usb-redirect-6.2.0-150400.37.34.1
* qemu-tools-6.2.0-150400.37.34.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.34.1
* qemu-block-curl-6.2.0-150400.37.34.1
* qemu-block-ssh-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-spice-app-6.2.0-150400.37.34.1
* qemu-chardev-baum-6.2.0-150400.37.34.1
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.34.1
* qemu-block-iscsi-6.2.0-150400.37.34.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-spice-6.2.0-150400.37.34.1
* qemu-debugsource-6.2.0-150400.37.34.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.34.1
* qemu-block-rbd-6.2.0-150400.37.34.1
* qemu-hw-usb-host-6.2.0-150400.37.34.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.34.1
* qemu-tools-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-qxl-6.2.0-150400.37.34.1
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-opengl-6.2.0-150400.37.34.1
* qemu-block-ssh-6.2.0-150400.37.34.1
* qemu-6.2.0-150400.37.34.1
* qemu-ui-curses-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.34.1
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.34.1
* qemu-block-curl-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-gtk-6.2.0-150400.37.34.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.34.1
* qemu-arm-6.2.0-150400.37.34.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* qemu-sgabios-8-150400.37.34.1
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.34.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.34.1
* qemu-ipxe-1.0.0+-150400.37.34.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.34.1
* qemu-audio-pa-debuginfo-6.2.0-150400.37.34.1
* qemu-audio-pa-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.34.1
* qemu-x86-debuginfo-6.2.0-150400.37.34.1
* qemu-x86-6.2.0-150400.37.34.1
* qemu-accel-tcg-x86-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.34.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.34.1
* qemu-audio-alsa-6.2.0-150400.37.34.1
* qemu-kvm-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.34.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* qemu-audio-spice-6.2.0-150400.37.34.1
* qemu-ui-spice-core-6.2.0-150400.37.34.1
* qemu-lang-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.34.1
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.34.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.34.1
* qemu-ksm-6.2.0-150400.37.34.1
* qemu-block-rbd-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-curses-6.2.0-150400.37.34.1
* qemu-debuginfo-6.2.0-150400.37.34.1
* qemu-guest-agent-6.2.0-150400.37.34.1
* qemu-hw-usb-redirect-6.2.0-150400.37.34.1
* qemu-tools-6.2.0-150400.37.34.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.34.1
* qemu-block-curl-6.2.0-150400.37.34.1
* qemu-block-ssh-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-spice-app-6.2.0-150400.37.34.1
* qemu-chardev-baum-6.2.0-150400.37.34.1
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.34.1
* qemu-block-iscsi-6.2.0-150400.37.34.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-spice-6.2.0-150400.37.34.1
* qemu-debugsource-6.2.0-150400.37.34.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.34.1
* qemu-block-rbd-6.2.0-150400.37.34.1
* qemu-hw-usb-host-6.2.0-150400.37.34.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.34.1
* qemu-tools-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-qxl-6.2.0-150400.37.34.1
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-opengl-6.2.0-150400.37.34.1
* qemu-block-ssh-6.2.0-150400.37.34.1
* qemu-6.2.0-150400.37.34.1
* qemu-ui-curses-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.34.1
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.34.1
* qemu-block-curl-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-gtk-6.2.0-150400.37.34.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.34.1
* qemu-arm-6.2.0-150400.37.34.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* qemu-sgabios-8-150400.37.34.1
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.34.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.34.1
* qemu-ipxe-1.0.0+-150400.37.34.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.34.1
* qemu-audio-pa-debuginfo-6.2.0-150400.37.34.1
* qemu-audio-pa-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.34.1
* qemu-x86-debuginfo-6.2.0-150400.37.34.1
* qemu-x86-6.2.0-150400.37.34.1
* qemu-accel-tcg-x86-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.34.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.34.1
* qemu-audio-alsa-6.2.0-150400.37.34.1
* qemu-kvm-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* qemu-debugsource-6.2.0-150400.37.34.1
* qemu-debuginfo-6.2.0-150400.37.34.1
* qemu-tools-debuginfo-6.2.0-150400.37.34.1
* qemu-tools-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* qemu-lang-6.2.0-150400.37.34.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.34.1
* qemu-ksm-6.2.0-150400.37.34.1
* qemu-block-rbd-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-curses-6.2.0-150400.37.34.1
* qemu-debuginfo-6.2.0-150400.37.34.1
* qemu-guest-agent-6.2.0-150400.37.34.1
* qemu-tools-6.2.0-150400.37.34.1
* qemu-block-curl-6.2.0-150400.37.34.1
* qemu-block-ssh-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-baum-6.2.0-150400.37.34.1
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.34.1
* qemu-block-iscsi-6.2.0-150400.37.34.1
* qemu-hw-usb-host-6.2.0-150400.37.34.1
* qemu-debugsource-6.2.0-150400.37.34.1
* qemu-tools-debuginfo-6.2.0-150400.37.34.1
* qemu-block-rbd-6.2.0-150400.37.34.1
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.34.1
* qemu-block-ssh-6.2.0-150400.37.34.1
* qemu-6.2.0-150400.37.34.1
* qemu-ui-curses-debuginfo-6.2.0-150400.37.34.1
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.34.1
* qemu-block-curl-debuginfo-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64)
* qemu-arm-debuginfo-6.2.0-150400.37.34.1
* qemu-arm-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-spice-app-6.2.0-150400.37.34.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-qxl-6.2.0-150400.37.34.1
* qemu-hw-usb-redirect-6.2.0-150400.37.34.1
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.34.1
* qemu-audio-spice-6.2.0-150400.37.34.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-opengl-6.2.0-150400.37.34.1
* qemu-ui-spice-core-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-gtk-6.2.0-150400.37.34.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.34.1
* qemu-chardev-spice-6.2.0-150400.37.34.1
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.34.1
* qemu-ipxe-1.0.0+-150400.37.34.1
* qemu-sgabios-8-150400.37.34.1
* qemu-skiboot-6.2.0-150400.37.34.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.34.1
* qemu-SLOF-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (ppc64le)
* qemu-ppc-6.2.0-150400.37.34.1
* qemu-ppc-debuginfo-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x x86_64)
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.34.1
* qemu-kvm-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x)
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.34.1
* qemu-s390x-debuginfo-6.2.0-150400.37.34.1
* qemu-s390x-6.2.0-150400.37.34.1
* qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.34.1
* qemu-audio-pa-debuginfo-6.2.0-150400.37.34.1
* qemu-audio-pa-6.2.0-150400.37.34.1
* qemu-x86-debuginfo-6.2.0-150400.37.34.1
* qemu-x86-6.2.0-150400.37.34.1
* qemu-accel-tcg-x86-6.2.0-150400.37.34.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.34.1
* qemu-audio-alsa-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* qemu-audio-spice-6.2.0-150400.37.34.1
* qemu-ui-spice-core-6.2.0-150400.37.34.1
* qemu-lang-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.34.1
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.34.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.34.1
* qemu-ksm-6.2.0-150400.37.34.1
* qemu-block-rbd-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-curses-6.2.0-150400.37.34.1
* qemu-debuginfo-6.2.0-150400.37.34.1
* qemu-guest-agent-6.2.0-150400.37.34.1
* qemu-hw-usb-redirect-6.2.0-150400.37.34.1
* qemu-tools-6.2.0-150400.37.34.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.34.1
* qemu-block-curl-6.2.0-150400.37.34.1
* qemu-block-ssh-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-spice-app-6.2.0-150400.37.34.1
* qemu-chardev-baum-6.2.0-150400.37.34.1
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.34.1
* qemu-block-iscsi-6.2.0-150400.37.34.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-spice-6.2.0-150400.37.34.1
* qemu-debugsource-6.2.0-150400.37.34.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.34.1
* qemu-block-rbd-6.2.0-150400.37.34.1
* qemu-hw-usb-host-6.2.0-150400.37.34.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.34.1
* qemu-tools-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-qxl-6.2.0-150400.37.34.1
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-opengl-6.2.0-150400.37.34.1
* qemu-block-ssh-6.2.0-150400.37.34.1
* qemu-6.2.0-150400.37.34.1
* qemu-ui-curses-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.34.1
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.34.1
* qemu-block-curl-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-gtk-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.34.1
* qemu-ipxe-1.0.0+-150400.37.34.1
* qemu-sgabios-8-150400.37.34.1
* qemu-skiboot-6.2.0-150400.37.34.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.34.1
* qemu-SLOF-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le)
* qemu-ppc-6.2.0-150400.37.34.1
* qemu-ppc-debuginfo-6.2.0-150400.37.34.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.34.1
* qemu-audio-pa-debuginfo-6.2.0-150400.37.34.1
* qemu-audio-pa-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.34.1
* qemu-x86-debuginfo-6.2.0-150400.37.34.1
* qemu-x86-6.2.0-150400.37.34.1
* qemu-accel-tcg-x86-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.34.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.34.1
* qemu-audio-alsa-6.2.0-150400.37.34.1
* qemu-kvm-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.34.1
* SUSE Manager Proxy 4.3 (x86_64)
* qemu-audio-spice-6.2.0-150400.37.34.1
* qemu-ui-spice-core-6.2.0-150400.37.34.1
* qemu-lang-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.34.1
* qemu-x86-debuginfo-6.2.0-150400.37.34.1
* qemu-accel-tcg-x86-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.34.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.34.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.34.1
* qemu-kvm-6.2.0-150400.37.34.1
* qemu-ksm-6.2.0-150400.37.34.1
* qemu-block-rbd-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-curses-6.2.0-150400.37.34.1
* qemu-debuginfo-6.2.0-150400.37.34.1
* qemu-guest-agent-6.2.0-150400.37.34.1
* qemu-hw-usb-redirect-6.2.0-150400.37.34.1
* qemu-audio-pa-6.2.0-150400.37.34.1
* qemu-tools-6.2.0-150400.37.34.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.34.1
* qemu-block-curl-6.2.0-150400.37.34.1
* qemu-block-ssh-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.34.1
* qemu-ui-spice-app-6.2.0-150400.37.34.1
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-baum-6.2.0-150400.37.34.1
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.34.1
* qemu-block-iscsi-6.2.0-150400.37.34.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.34.1
* qemu-x86-6.2.0-150400.37.34.1
* qemu-audio-pa-debuginfo-6.2.0-150400.37.34.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-spice-6.2.0-150400.37.34.1
* qemu-block-rbd-6.2.0-150400.37.34.1
* qemu-debugsource-6.2.0-150400.37.34.1
* qemu-hw-usb-host-6.2.0-150400.37.34.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.34.1
* qemu-tools-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.34.1
* qemu-hw-display-qxl-6.2.0-150400.37.34.1
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-opengl-6.2.0-150400.37.34.1
* qemu-ui-gtk-6.2.0-150400.37.34.1
* qemu-block-ssh-6.2.0-150400.37.34.1
* qemu-6.2.0-150400.37.34.1
* qemu-ui-curses-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.34.1
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.34.1
* qemu-block-curl-debuginfo-6.2.0-150400.37.34.1
* qemu-audio-alsa-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.34.1
* SUSE Manager Proxy 4.3 (noarch)
* qemu-sgabios-8-150400.37.34.1
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.34.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.34.1
* qemu-ipxe-1.0.0+-150400.37.34.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* qemu-audio-spice-6.2.0-150400.37.34.1
* qemu-ui-spice-core-6.2.0-150400.37.34.1
* qemu-lang-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.34.1
* qemu-x86-debuginfo-6.2.0-150400.37.34.1
* qemu-accel-tcg-x86-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.34.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.34.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.34.1
* qemu-kvm-6.2.0-150400.37.34.1
* qemu-ksm-6.2.0-150400.37.34.1
* qemu-block-rbd-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-curses-6.2.0-150400.37.34.1
* qemu-debuginfo-6.2.0-150400.37.34.1
* qemu-guest-agent-6.2.0-150400.37.34.1
* qemu-hw-usb-redirect-6.2.0-150400.37.34.1
* qemu-audio-pa-6.2.0-150400.37.34.1
* qemu-tools-6.2.0-150400.37.34.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.34.1
* qemu-block-curl-6.2.0-150400.37.34.1
* qemu-block-ssh-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.34.1
* qemu-ui-spice-app-6.2.0-150400.37.34.1
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-baum-6.2.0-150400.37.34.1
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.34.1
* qemu-block-iscsi-6.2.0-150400.37.34.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.34.1
* qemu-x86-6.2.0-150400.37.34.1
* qemu-audio-pa-debuginfo-6.2.0-150400.37.34.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-spice-6.2.0-150400.37.34.1
* qemu-block-rbd-6.2.0-150400.37.34.1
* qemu-debugsource-6.2.0-150400.37.34.1
* qemu-hw-usb-host-6.2.0-150400.37.34.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.34.1
* qemu-tools-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.34.1
* qemu-hw-display-qxl-6.2.0-150400.37.34.1
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-opengl-6.2.0-150400.37.34.1
* qemu-ui-gtk-6.2.0-150400.37.34.1
* qemu-block-ssh-6.2.0-150400.37.34.1
* qemu-6.2.0-150400.37.34.1
* qemu-ui-curses-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.34.1
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.34.1
* qemu-block-curl-debuginfo-6.2.0-150400.37.34.1
* qemu-audio-alsa-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.34.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* qemu-sgabios-8-150400.37.34.1
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.34.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.34.1
* qemu-ipxe-1.0.0+-150400.37.34.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* qemu-lang-6.2.0-150400.37.34.1
* qemu-guest-agent-debuginfo-6.2.0-150400.37.34.1
* qemu-ksm-6.2.0-150400.37.34.1
* qemu-block-rbd-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-curses-6.2.0-150400.37.34.1
* qemu-debuginfo-6.2.0-150400.37.34.1
* qemu-guest-agent-6.2.0-150400.37.34.1
* qemu-tools-6.2.0-150400.37.34.1
* qemu-block-curl-6.2.0-150400.37.34.1
* qemu-block-ssh-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-baum-6.2.0-150400.37.34.1
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.34.1
* qemu-block-iscsi-6.2.0-150400.37.34.1
* qemu-hw-usb-host-6.2.0-150400.37.34.1
* qemu-debugsource-6.2.0-150400.37.34.1
* qemu-tools-debuginfo-6.2.0-150400.37.34.1
* qemu-block-rbd-6.2.0-150400.37.34.1
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.34.1
* qemu-block-ssh-6.2.0-150400.37.34.1
* qemu-6.2.0-150400.37.34.1
* qemu-ui-curses-debuginfo-6.2.0-150400.37.34.1
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.34.1
* qemu-block-curl-debuginfo-6.2.0-150400.37.34.1
* SUSE Manager Server 4.3 (noarch)
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.34.1
* qemu-ipxe-1.0.0+-150400.37.34.1
* qemu-sgabios-8-150400.37.34.1
* qemu-skiboot-6.2.0-150400.37.34.1
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.34.1
* qemu-SLOF-6.2.0-150400.37.34.1
* SUSE Manager Server 4.3 (ppc64le x86_64)
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-spice-app-6.2.0-150400.37.34.1
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-qxl-6.2.0-150400.37.34.1
* qemu-hw-usb-redirect-6.2.0-150400.37.34.1
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.34.1
* qemu-audio-spice-6.2.0-150400.37.34.1
* qemu-audio-spice-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-opengl-6.2.0-150400.37.34.1
* qemu-ui-spice-core-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.34.1
* qemu-ui-gtk-6.2.0-150400.37.34.1
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.34.1
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-vga-6.2.0-150400.37.34.1
* qemu-chardev-spice-6.2.0-150400.37.34.1
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.34.1
* SUSE Manager Server 4.3 (ppc64le)
* qemu-ppc-6.2.0-150400.37.34.1
* qemu-ppc-debuginfo-6.2.0-150400.37.34.1
* SUSE Manager Server 4.3 (s390x x86_64)
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.34.1
* qemu-kvm-6.2.0-150400.37.34.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.34.1
* SUSE Manager Server 4.3 (s390x)
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.34.1
* qemu-s390x-debuginfo-6.2.0-150400.37.34.1
* qemu-s390x-6.2.0-150400.37.34.1
* qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.34.1
* SUSE Manager Server 4.3 (x86_64)
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.34.1
* qemu-audio-pa-debuginfo-6.2.0-150400.37.34.1
* qemu-audio-pa-6.2.0-150400.37.34.1
* qemu-x86-debuginfo-6.2.0-150400.37.34.1
* qemu-x86-6.2.0-150400.37.34.1
* qemu-accel-tcg-x86-6.2.0-150400.37.34.1
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.34.1
* qemu-audio-alsa-6.2.0-150400.37.34.1

## References:

* https://www.suse.com/security/cve/CVE-2024-4467.html
* https://bugzilla.suse.com/show_bug.cgi?id=1227322
* https://bugzilla.suse.com/show_bug.cgi?id=1230363



SUSE-SU-2024:3404-1: moderate: Security update for rage-encryption


# Security update for rage-encryption

Announcement ID: SUSE-SU-2024:3404-1
Rating: moderate
References:

* bsc#1229959

Cross-References:

* CVE-2024-43806

CVSS scores:

* CVE-2024-43806 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves one vulnerability can now be installed.

## Description:

This update for rage-encryption fixes the following issues:

* Update to version 0.10.0
* CVE-2024-43806: Fixed rustix::fs::Dir iterator with the linux_raw backend
that can cause memory exhaustion. (bsc#1229959)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3404=1 openSUSE-SLE-15.5-2024-3404=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3404=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3404=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3404=1

## Package List:

* openSUSE Leap 15.5 (aarch64 x86_64)
* rage-encryption-0.10.0+0-150500.3.6.1
* openSUSE Leap 15.5 (noarch)
* rage-encryption-bash-completion-0.10.0+0-150500.3.6.1
* rage-encryption-fish-completion-0.10.0+0-150500.3.6.1
* rage-encryption-zsh-completion-0.10.0+0-150500.3.6.1
* openSUSE Leap 15.6 (aarch64 x86_64)
* rage-encryption-0.10.0+0-150500.3.6.1
* openSUSE Leap 15.6 (noarch)
* rage-encryption-bash-completion-0.10.0+0-150500.3.6.1
* rage-encryption-fish-completion-0.10.0+0-150500.3.6.1
* rage-encryption-zsh-completion-0.10.0+0-150500.3.6.1
* Basesystem Module 15-SP5 (aarch64 x86_64)
* rage-encryption-0.10.0+0-150500.3.6.1
* Basesystem Module 15-SP5 (noarch)
* rage-encryption-bash-completion-0.10.0+0-150500.3.6.1
* Basesystem Module 15-SP6 (aarch64 x86_64)
* rage-encryption-0.10.0+0-150500.3.6.1
* Basesystem Module 15-SP6 (noarch)
* rage-encryption-bash-completion-0.10.0+0-150500.3.6.1

## References:

* https://www.suse.com/security/cve/CVE-2024-43806.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229959



SUSE-SU-2024:3383-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:3383-1
Rating: important
References:

* bsc#1012628
* bsc#1193454
* bsc#1194869
* bsc#1205462
* bsc#1208783
* bsc#1213123
* bsc#1214285
* bsc#1215199
* bsc#1220066
* bsc#1220252
* bsc#1220877
* bsc#1221326
* bsc#1221630
* bsc#1221645
* bsc#1221652
* bsc#1221857
* bsc#1222254
* bsc#1222335
* bsc#1222350
* bsc#1222364
* bsc#1222372
* bsc#1222387
* bsc#1222433
* bsc#1222434
* bsc#1222463
* bsc#1222625
* bsc#1222633
* bsc#1222634
* bsc#1222808
* bsc#1222967
* bsc#1222973
* bsc#1223053
* bsc#1223074
* bsc#1223191
* bsc#1223395
* bsc#1223635
* bsc#1223720
* bsc#1223731
* bsc#1223742
* bsc#1223763
* bsc#1223767
* bsc#1223777
* bsc#1223803
* bsc#1224105
* bsc#1224415
* bsc#1224485
* bsc#1224496
* bsc#1224510
* bsc#1224535
* bsc#1224631
* bsc#1224636
* bsc#1224690
* bsc#1224694
* bsc#1224700
* bsc#1224711
* bsc#1225475
* bsc#1225582
* bsc#1225607
* bsc#1225717
* bsc#1225718
* bsc#1225744
* bsc#1225745
* bsc#1225751
* bsc#1225814
* bsc#1225832
* bsc#1225838
* bsc#1225903
* bsc#1226031
* bsc#1226127
* bsc#1226502
* bsc#1226530
* bsc#1226588
* bsc#1226604
* bsc#1226743
* bsc#1226751
* bsc#1226765
* bsc#1226798
* bsc#1226801
* bsc#1226834
* bsc#1226874
* bsc#1226885
* bsc#1226920
* bsc#1227149
* bsc#1227182
* bsc#1227383
* bsc#1227437
* bsc#1227492
* bsc#1227493
* bsc#1227494
* bsc#1227618
* bsc#1227620
* bsc#1227623
* bsc#1227627
* bsc#1227634
* bsc#1227706
* bsc#1227722
* bsc#1227724
* bsc#1227725
* bsc#1227728
* bsc#1227729
* bsc#1227732
* bsc#1227733
* bsc#1227734
* bsc#1227747
* bsc#1227750
* bsc#1227754
* bsc#1227758
* bsc#1227760
* bsc#1227761
* bsc#1227764
* bsc#1227766
* bsc#1227770
* bsc#1227771
* bsc#1227772
* bsc#1227774
* bsc#1227781
* bsc#1227784
* bsc#1227785
* bsc#1227787
* bsc#1227790
* bsc#1227791
* bsc#1227792
* bsc#1227796
* bsc#1227798
* bsc#1227799
* bsc#1227802
* bsc#1227808
* bsc#1227810
* bsc#1227811
* bsc#1227812
* bsc#1227815
* bsc#1227816
* bsc#1227818
* bsc#1227820
* bsc#1227823
* bsc#1227824
* bsc#1227826
* bsc#1227828
* bsc#1227829
* bsc#1227830
* bsc#1227832
* bsc#1227833
* bsc#1227834
* bsc#1227839
* bsc#1227840
* bsc#1227846
* bsc#1227849
* bsc#1227851
* bsc#1227853
* bsc#1227863
* bsc#1227864
* bsc#1227865
* bsc#1227867
* bsc#1227869
* bsc#1227870
* bsc#1227883
* bsc#1227884
* bsc#1227891
* bsc#1227893
* bsc#1227929
* bsc#1227950
* bsc#1227957
* bsc#1227981
* bsc#1228020
* bsc#1228021
* bsc#1228114
* bsc#1228192
* bsc#1228195
* bsc#1228202
* bsc#1228235
* bsc#1228236
* bsc#1228237
* bsc#1228247
* bsc#1228321
* bsc#1228409
* bsc#1228410
* bsc#1228426
* bsc#1228427
* bsc#1228429
* bsc#1228446
* bsc#1228447
* bsc#1228449
* bsc#1228450
* bsc#1228452
* bsc#1228456
* bsc#1228457
* bsc#1228458
* bsc#1228459
* bsc#1228460
* bsc#1228462
* bsc#1228463
* bsc#1228466
* bsc#1228467
* bsc#1228468
* bsc#1228469
* bsc#1228470
* bsc#1228472
* bsc#1228479
* bsc#1228480
* bsc#1228481
* bsc#1228482
* bsc#1228483
* bsc#1228484
* bsc#1228485
* bsc#1228486
* bsc#1228487
* bsc#1228489
* bsc#1228491
* bsc#1228492
* bsc#1228493
* bsc#1228494
* bsc#1228495
* bsc#1228496
* bsc#1228499
* bsc#1228500
* bsc#1228501
* bsc#1228502
* bsc#1228503
* bsc#1228505
* bsc#1228508
* bsc#1228509
* bsc#1228510
* bsc#1228511
* bsc#1228513
* bsc#1228515
* bsc#1228516
* bsc#1228518
* bsc#1228520
* bsc#1228525
* bsc#1228527
* bsc#1228530
* bsc#1228531
* bsc#1228539
* bsc#1228561
* bsc#1228563
* bsc#1228564
* bsc#1228565
* bsc#1228567
* bsc#1228568
* bsc#1228572
* bsc#1228576
* bsc#1228579
* bsc#1228580
* bsc#1228581
* bsc#1228582
* bsc#1228584
* bsc#1228586
* bsc#1228588
* bsc#1228590
* bsc#1228591
* bsc#1228599
* bsc#1228615
* bsc#1228616
* bsc#1228617
* bsc#1228625
* bsc#1228626
* bsc#1228633
* bsc#1228635
* bsc#1228636
* bsc#1228640
* bsc#1228643
* bsc#1228644
* bsc#1228646
* bsc#1228649
* bsc#1228650
* bsc#1228654
* bsc#1228655
* bsc#1228656
* bsc#1228658
* bsc#1228660
* bsc#1228662
* bsc#1228665
* bsc#1228666
* bsc#1228667
* bsc#1228672
* bsc#1228673
* bsc#1228674
* bsc#1228677
* bsc#1228680
* bsc#1228687
* bsc#1228705
* bsc#1228706
* bsc#1228707
* bsc#1228708
* bsc#1228709
* bsc#1228710
* bsc#1228718
* bsc#1228720
* bsc#1228721
* bsc#1228722
* bsc#1228723
* bsc#1228724
* bsc#1228726
* bsc#1228727
* bsc#1228733
* bsc#1228737
* bsc#1228743
* bsc#1228748
* bsc#1228754
* bsc#1228756
* bsc#1228757
* bsc#1228758
* bsc#1228764
* bsc#1228766
* bsc#1228779
* bsc#1228801
* bsc#1228849
* bsc#1228850
* bsc#1228857
* bsc#1228959
* bsc#1228964
* bsc#1228966
* bsc#1228967
* bsc#1228973
* bsc#1228977
* bsc#1228978
* bsc#1228979
* bsc#1228986
* bsc#1228988
* bsc#1228989
* bsc#1228991
* bsc#1228992
* bsc#1229005
* bsc#1229024
* bsc#1229042
* bsc#1229045
* bsc#1229046
* bsc#1229054
* bsc#1229056
* bsc#1229086
* bsc#1229134
* bsc#1229136
* bsc#1229154
* bsc#1229156
* bsc#1229160
* bsc#1229167
* bsc#1229168
* bsc#1229169
* bsc#1229170
* bsc#1229171
* bsc#1229172
* bsc#1229173
* bsc#1229174
* bsc#1229239
* bsc#1229240
* bsc#1229241
* bsc#1229243
* bsc#1229244
* bsc#1229245
* bsc#1229246
* bsc#1229247
* bsc#1229248
* bsc#1229249
* bsc#1229250
* bsc#1229251
* bsc#1229252
* bsc#1229253
* bsc#1229254
* bsc#1229255
* bsc#1229256
* bsc#1229287
* bsc#1229290
* bsc#1229291
* bsc#1229292
* bsc#1229294
* bsc#1229296
* bsc#1229297
* bsc#1229298
* bsc#1229299
* bsc#1229301
* bsc#1229303
* bsc#1229304
* bsc#1229305
* bsc#1229307
* bsc#1229309
* bsc#1229312
* bsc#1229313
* bsc#1229314
* bsc#1229315
* bsc#1229316
* bsc#1229317
* bsc#1229318
* bsc#1229319
* bsc#1229320
* bsc#1229327
* bsc#1229341
* bsc#1229342
* bsc#1229344
* bsc#1229345
* bsc#1229346
* bsc#1229347
* bsc#1229349
* bsc#1229350
* bsc#1229351
* bsc#1229353
* bsc#1229354
* bsc#1229355
* bsc#1229356
* bsc#1229357
* bsc#1229358
* bsc#1229359
* bsc#1229360
* bsc#1229365
* bsc#1229366
* bsc#1229369
* bsc#1229370
* bsc#1229373
* bsc#1229374
* bsc#1229379
* bsc#1229381
* bsc#1229382
* bsc#1229383
* bsc#1229386
* bsc#1229388
* bsc#1229390
* bsc#1229391
* bsc#1229392
* bsc#1229395
* bsc#1229398
* bsc#1229399
* bsc#1229400
* bsc#1229402
* bsc#1229403
* bsc#1229404
* bsc#1229407
* bsc#1229409
* bsc#1229410
* bsc#1229411
* bsc#1229413
* bsc#1229414
* bsc#1229417
* bsc#1229444
* bsc#1229451
* bsc#1229452
* bsc#1229455
* bsc#1229456
* bsc#1229480
* bsc#1229481
* bsc#1229482
* bsc#1229484
* bsc#1229485
* bsc#1229486
* bsc#1229487
* bsc#1229488
* bsc#1229489
* bsc#1229490
* bsc#1229493
* bsc#1229495
* bsc#1229496
* bsc#1229497
* bsc#1229500
* bsc#1229503
* bsc#1229707
* bsc#1229739
* bsc#1229743
* bsc#1229746
* bsc#1229747
* bsc#1229752
* bsc#1229754
* bsc#1229755
* bsc#1229756
* bsc#1229759
* bsc#1229761
* bsc#1229767
* bsc#1229781
* bsc#1229784
* bsc#1229785
* bsc#1229787
* bsc#1229788
* bsc#1229789
* bsc#1229792
* bsc#1229820
* bsc#1229827
* bsc#1229830
* bsc#1229837
* bsc#1229940
* bsc#1230056
* bsc#1230350
* bsc#1230413
* jsc#PED-10029
* jsc#PED-10045
* jsc#PED-10055
* jsc#PED-10105
* jsc#PED-10108
* jsc#PED-8491
* jsc#PED-8779
* jsc#PED-8954

Cross-References:

* CVE-2023-52489
* CVE-2023-52581
* CVE-2023-52668
* CVE-2023-52688
* CVE-2023-52735
* CVE-2023-52859
* CVE-2023-52885
* CVE-2023-52886
* CVE-2023-52887
* CVE-2023-52889
* CVE-2024-26590
* CVE-2024-26631
* CVE-2024-26637
* CVE-2024-26668
* CVE-2024-26669
* CVE-2024-26677
* CVE-2024-26682
* CVE-2024-26683
* CVE-2024-26691
* CVE-2024-26735
* CVE-2024-26808
* CVE-2024-26809
* CVE-2024-26812
* CVE-2024-26835
* CVE-2024-26837
* CVE-2024-26849
* CVE-2024-26851
* CVE-2024-26889
* CVE-2024-26920
* CVE-2024-26944
* CVE-2024-26976
* CVE-2024-27010
* CVE-2024-27011
* CVE-2024-27024
* CVE-2024-27049
* CVE-2024-27050
* CVE-2024-27079
* CVE-2024-27403
* CVE-2024-27433
* CVE-2024-27437
* CVE-2024-31076
* CVE-2024-35854
* CVE-2024-35855
* CVE-2024-35897
* CVE-2024-35902
* CVE-2024-35913
* CVE-2024-35939
* CVE-2024-35949
* CVE-2024-36270
* CVE-2024-36286
* CVE-2024-36288
* CVE-2024-36489
* CVE-2024-36881
* CVE-2024-36907
* CVE-2024-36909
* CVE-2024-36910
* CVE-2024-36911
* CVE-2024-36929
* CVE-2024-36933
* CVE-2024-36939
* CVE-2024-36970
* CVE-2024-36979
* CVE-2024-38548
* CVE-2024-38563
* CVE-2024-38609
* CVE-2024-38662
* CVE-2024-39476
* CVE-2024-39483
* CVE-2024-39484
* CVE-2024-39486
* CVE-2024-39488
* CVE-2024-39489
* CVE-2024-39491
* CVE-2024-39493
* CVE-2024-39497
* CVE-2024-39499
* CVE-2024-39500
* CVE-2024-39501
* CVE-2024-39505
* CVE-2024-39506
* CVE-2024-39508
* CVE-2024-39509
* CVE-2024-39510
* CVE-2024-40899
* CVE-2024-40900
* CVE-2024-40902
* CVE-2024-40903
* CVE-2024-40904
* CVE-2024-40905
* CVE-2024-40909
* CVE-2024-40910
* CVE-2024-40911
* CVE-2024-40912
* CVE-2024-40913
* CVE-2024-40916
* CVE-2024-40920
* CVE-2024-40921
* CVE-2024-40922
* CVE-2024-40924
* CVE-2024-40926
* CVE-2024-40927
* CVE-2024-40929
* CVE-2024-40930
* CVE-2024-40932
* CVE-2024-40934
* CVE-2024-40936
* CVE-2024-40938
* CVE-2024-40939
* CVE-2024-40941
* CVE-2024-40942
* CVE-2024-40943
* CVE-2024-40944
* CVE-2024-40945
* CVE-2024-40954
* CVE-2024-40956
* CVE-2024-40957
* CVE-2024-40958
* CVE-2024-40959
* CVE-2024-40962
* CVE-2024-40964
* CVE-2024-40967
* CVE-2024-40976
* CVE-2024-40977
* CVE-2024-40978
* CVE-2024-40981
* CVE-2024-40982
* CVE-2024-40984
* CVE-2024-40987
* CVE-2024-40988
* CVE-2024-40989
* CVE-2024-40990
* CVE-2024-40992
* CVE-2024-40994
* CVE-2024-40995
* CVE-2024-40997
* CVE-2024-41000
* CVE-2024-41001
* CVE-2024-41002
* CVE-2024-41004
* CVE-2024-41007
* CVE-2024-41009
* CVE-2024-41010
* CVE-2024-41011
* CVE-2024-41012
* CVE-2024-41015
* CVE-2024-41016
* CVE-2024-41020
* CVE-2024-41022
* CVE-2024-41024
* CVE-2024-41025
* CVE-2024-41028
* CVE-2024-41032
* CVE-2024-41035
* CVE-2024-41036
* CVE-2024-41037
* CVE-2024-41038
* CVE-2024-41039
* CVE-2024-41040
* CVE-2024-41041
* CVE-2024-41044
* CVE-2024-41045
* CVE-2024-41048
* CVE-2024-41049
* CVE-2024-41050
* CVE-2024-41051
* CVE-2024-41056
* CVE-2024-41057
* CVE-2024-41058
* CVE-2024-41059
* CVE-2024-41060
* CVE-2024-41061
* CVE-2024-41062
* CVE-2024-41063
* CVE-2024-41064
* CVE-2024-41065
* CVE-2024-41066
* CVE-2024-41068
* CVE-2024-41069
* CVE-2024-41070
* CVE-2024-41071
* CVE-2024-41072
* CVE-2024-41073
* CVE-2024-41074
* CVE-2024-41075
* CVE-2024-41076
* CVE-2024-41078
* CVE-2024-41079
* CVE-2024-41080
* CVE-2024-41081
* CVE-2024-41084
* CVE-2024-41087
* CVE-2024-41088
* CVE-2024-41089
* CVE-2024-41092
* CVE-2024-41093
* CVE-2024-41094
* CVE-2024-41095
* CVE-2024-41096
* CVE-2024-41097
* CVE-2024-41098
* CVE-2024-42064
* CVE-2024-42069
* CVE-2024-42070
* CVE-2024-42073
* CVE-2024-42074
* CVE-2024-42076
* CVE-2024-42077
* CVE-2024-42079
* CVE-2024-42080
* CVE-2024-42082
* CVE-2024-42085
* CVE-2024-42086
* CVE-2024-42087
* CVE-2024-42089
* CVE-2024-42090
* CVE-2024-42092
* CVE-2024-42093
* CVE-2024-42095
* CVE-2024-42096
* CVE-2024-42097
* CVE-2024-42098
* CVE-2024-42101
* CVE-2024-42104
* CVE-2024-42105
* CVE-2024-42106
* CVE-2024-42107
* CVE-2024-42109
* CVE-2024-42110
* CVE-2024-42113
* CVE-2024-42114
* CVE-2024-42115
* CVE-2024-42117
* CVE-2024-42119
* CVE-2024-42120
* CVE-2024-42121
* CVE-2024-42122
* CVE-2024-42124
* CVE-2024-42125
* CVE-2024-42126
* CVE-2024-42127
* CVE-2024-42130
* CVE-2024-42131
* CVE-2024-42132
* CVE-2024-42133
* CVE-2024-42136
* CVE-2024-42137
* CVE-2024-42138
* CVE-2024-42139
* CVE-2024-42141
* CVE-2024-42142
* CVE-2024-42143
* CVE-2024-42144
* CVE-2024-42145
* CVE-2024-42147
* CVE-2024-42148
* CVE-2024-42152
* CVE-2024-42153
* CVE-2024-42155
* CVE-2024-42156
* CVE-2024-42157
* CVE-2024-42158
* CVE-2024-42159
* CVE-2024-42161
* CVE-2024-42162
* CVE-2024-42223
* CVE-2024-42224
* CVE-2024-42225
* CVE-2024-42226
* CVE-2024-42227
* CVE-2024-42228
* CVE-2024-42229
* CVE-2024-42230
* CVE-2024-42232
* CVE-2024-42236
* CVE-2024-42237
* CVE-2024-42238
* CVE-2024-42239
* CVE-2024-42240
* CVE-2024-42241
* CVE-2024-42244
* CVE-2024-42245
* CVE-2024-42246
* CVE-2024-42247
* CVE-2024-42250
* CVE-2024-42253
* CVE-2024-42259
* CVE-2024-42268
* CVE-2024-42269
* CVE-2024-42270
* CVE-2024-42271
* CVE-2024-42274
* CVE-2024-42276
* CVE-2024-42277
* CVE-2024-42278
* CVE-2024-42279
* CVE-2024-42280
* CVE-2024-42281
* CVE-2024-42283
* CVE-2024-42284
* CVE-2024-42285
* CVE-2024-42286
* CVE-2024-42287
* CVE-2024-42288
* CVE-2024-42289
* CVE-2024-42290
* CVE-2024-42291
* CVE-2024-42292
* CVE-2024-42295
* CVE-2024-42298
* CVE-2024-42301
* CVE-2024-42302
* CVE-2024-42303
* CVE-2024-42308
* CVE-2024-42309
* CVE-2024-42310
* CVE-2024-42311
* CVE-2024-42312
* CVE-2024-42313
* CVE-2024-42314
* CVE-2024-42315
* CVE-2024-42316
* CVE-2024-42318
* CVE-2024-42319
* CVE-2024-42320
* CVE-2024-42322
* CVE-2024-43816
* CVE-2024-43817
* CVE-2024-43818
* CVE-2024-43819
* CVE-2024-43821
* CVE-2024-43823
* CVE-2024-43824
* CVE-2024-43825
* CVE-2024-43826
* CVE-2024-43829
* CVE-2024-43830
* CVE-2024-43831
* CVE-2024-43833
* CVE-2024-43834
* CVE-2024-43837
* CVE-2024-43839
* CVE-2024-43840
* CVE-2024-43841
* CVE-2024-43842
* CVE-2024-43846
* CVE-2024-43847
* CVE-2024-43849
* CVE-2024-43850
* CVE-2024-43851
* CVE-2024-43853
* CVE-2024-43854
* CVE-2024-43855
* CVE-2024-43856
* CVE-2024-43858
* CVE-2024-43860
* CVE-2024-43861
* CVE-2024-43863
* CVE-2024-43864
* CVE-2024-43866
* CVE-2024-43867
* CVE-2024-43871
* CVE-2024-43872
* CVE-2024-43873
* CVE-2024-43874
* CVE-2024-43875
* CVE-2024-43876
* CVE-2024-43877
* CVE-2024-43879
* CVE-2024-43880
* CVE-2024-43881
* CVE-2024-43882
* CVE-2024-43883
* CVE-2024-43884
* CVE-2024-43885
* CVE-2024-43889
* CVE-2024-43892
* CVE-2024-43893
* CVE-2024-43894
* CVE-2024-43895
* CVE-2024-43897
* CVE-2024-43899
* CVE-2024-43900
* CVE-2024-43902
* CVE-2024-43903
* CVE-2024-43905
* CVE-2024-43906
* CVE-2024-43907
* CVE-2024-43908
* CVE-2024-43909
* CVE-2024-43911
* CVE-2024-43912
* CVE-2024-44931
* CVE-2024-44938
* CVE-2024-44939

CVSS scores:

* CVE-2023-52489 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52885 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52885 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52886 ( NVD ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52887 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-52887 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2023-52889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26590 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26590 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26682 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26812 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26835 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-26837 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-26849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26944 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27024 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27049 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27050 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27437 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-31076 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-35949 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36270 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36286 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-36288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36489 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36881 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-36907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-36910 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-36911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-36929 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36933 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-36939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36970 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36979 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38563 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38662 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38662 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-39476 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39476 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39483 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-39483 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39484 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39486 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-39488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39489 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-39489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39491 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-39493 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-39493 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39497 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39499 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-39500 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39501 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39505 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-39506 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39506 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39508 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-39509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39510 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-39510 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40899 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40899 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40900 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-40902 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40903 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40903 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40905 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40910 ( SUSE ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40910 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40913 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40922 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-40924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40927 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40932 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-40932 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40934 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-40934 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40936 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-40938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40942 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40956 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40956 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40958 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40967 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40967 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40976 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40977 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40978 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40981 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-40981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40987 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-40988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40989 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40994 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40994 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41000 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41001 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-41001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41002 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-41002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41004 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-41007 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41007 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41011 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41011 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41012 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41012 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41015 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41020 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41020 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41022 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41022 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41024 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41024 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41025 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-41028 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41036 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41036 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41037 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41038 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-41038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41039 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41039 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41040 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41040 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41041 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-41044 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-41045 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41048 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41049 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41049 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41057 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41057 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41058 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41058 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-41058 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41060 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41061 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-41061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41062 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41063 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41063 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41064 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41064 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41065 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41065 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41066 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41066 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-41066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41068 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41069 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41069 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41070 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41070 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41071 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-41071 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41072 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-41073 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41075 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41076 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41078 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41088 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41092 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41094 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41094 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41096 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41097 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42064 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42070 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-42070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42073 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42079 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42082 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42086 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42086 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-42087 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-42089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42093 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
* CVE-2024-42093 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42096 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42096 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-42097 ( SUSE ): 2.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-42097 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-42098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42104 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-42104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42105 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42105 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-42106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42109 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42115 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42115 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42117 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-42119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42122 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42125 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42130 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-42130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42131 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42132 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42133 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42136 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-42136 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-42136 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42137 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42141 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42143 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-42143 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-42144 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42144 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42145 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42147 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42148 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42152 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42155 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-42155 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42155 ( NVD ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-42156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42156 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42157 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42158 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42159 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42159 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42161 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42161 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42161 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42162 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42224 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42225 ( NVD ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42226 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42226 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42227 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42227 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42228 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42229 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42229 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42230 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42230 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42230 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42232 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42232 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42236 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42236 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-42236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42238 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42240 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42241 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42244 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42244 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42246 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42247 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42250 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42250 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42253 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42253 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-42253 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42259 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42259 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-42259 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42268 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-42268 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42269 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42270 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42271 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42271 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42271 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42274 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42276 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42277 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42277 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42278 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42278 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42279 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42280 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42283 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42283 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42284 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42285 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42286 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42286 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42287 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42289 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42290 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42291 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42301 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42303 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42308 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42309 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42310 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42311 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-42311 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42313 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42314 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42314 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42315 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42316 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42316 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42322 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43818 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43823 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43837 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43872 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43874 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43881 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-43881 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-43882 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43882 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43883 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43883 ( SUSE ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43884 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43884 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43889 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43889 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43892 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43892 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43892 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43893 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43894 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43894 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43895 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43895 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43900 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43902 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43903 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43905 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43906 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43907 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43908 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43909 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43911 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43912 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-43912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-43912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44931 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-44931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44938 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44938 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44939 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44939 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP6
* Development Tools Module 15-SP6
* Legacy Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Availability Extension 15 SP6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP6

An update that solves 394 vulnerabilities, contains eight features and has 85
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

* CVE-2024-43911: wifi: mac80211: fix NULL dereference at band check in
starting tx ba session (bsc#1229827).
* CVE-2024-43899: drm/amd/display: Fix null pointer deref in dcn20_resource.c
(bsc#1229754).
* CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage.
(bsc#1229503)
* CVE-2024-43880: kabi: lib: objagg: Put back removed metod in struct
objagg_ops (bsc#1229481).
* CVE-2024-43866: net/mlx5: Always drain health in shutdown callback
(bsc#1229495).
* CVE-2024-43864: net/mlx5e: Fix CT entry update leaks of modify header
context (bsc#1229496).
* CVE-2024-43855: md: fix deadlock between mddev_suspend and flush bio
(bsc#1229342).
* CVE-2024-43854: block: initialize integrity buffer to zero before writing it
to media (bsc#1229345)
* CVE-2024-43850: soc: qcom: icc-bwmon: Fix refcount imbalance seen during
bwmon_remove (bsc#1229316).
* CVE-2024-43839: bna: adjust 'name' buf size of bna_tcb and bna_ccb
structures (bsc#1229301).
* CVE-2024-43837: bpf: Fix updating attached freplace prog in prog_array map
(bsc#1229297).
* CVE-2024-43834: xdp: fix invalid wait context of page_pool_destroy()
(bsc#1229314)
* CVE-2024-43831: media: mediatek: vcodec: Handle invalid decoder vsi
(bsc#1229309).
* CVE-2024-43821: scsi: lpfc: Fix a possible null pointer dereference
(bsc#1229315).
* CVE-2024-42322: ipvs: properly dereference pe in ip_vs_add_service
(bsc#1229347)
* CVE-2024-42318: landlock: Do not lose track of restrictions on cred_transfer
(bsc#1229351).
* CVE-2024-42316: mm/mglru: fix div-by-zero in vmpressure_calc_level()
(bsc#1229353).
* CVE-2024-42312: sysctl: always initialize i_uid/i_gid (bsc#1229357)
* CVE-2024-42308: Update DRM patch reference (bsc#1229411)
* CVE-2024-42301: dev/parport: fix the array out-of-bounds risk (bsc#1229407).
* CVE-2024-42295: nilfs2: handle inconsistent state in
nilfs_btnode_create_block() (bsc#1229370).
* CVE-2024-42291: ice: Add a per-VF limit on number of FDIR filters
(bsc#1229374).
* CVE-2024-42290: irqchip/imx-irqsteer: Handle runtime power management
correctly (bsc#1229379).
* CVE-2024-42284: tipc: Return non-zero value from tipc_udp_addr2str() on
error (bsc#1229382)
* CVE-2024-42283: net: nexthop: Initialize all fields in dumped nexthops
(bsc#1229383)
* CVE-2024-42281: bpf: Fix a segment issue when downgrading gso_size
(bsc#1229386).
* CVE-2024-42277: iommu: sprd: Avoid NULL deref in sprd_iommu_hw_en
(bsc#1229409).
* CVE-2024-42270: netfilter: iptables: Fix null-ptr-deref in
iptable_nat_table_init() (bsc#1229404).
* CVE-2024-42269: netfilter: iptables: Fix potential null-ptr-deref in
ip6table_nat_table_init() (bsc#1229402).
* CVE-2024-42268: net/mlx5: Fix missing lock on sync reset reload
(bsc#1229391).
* CVE-2024-42247: wireguard: allowedips: avoid unaligned 64-bit memory
accesses (bsc#1228988).
* CVE-2024-42246: net, sunrpc: Remap EPERM in case of connection failure in
xs_tcp_setup_socket (bsc#1228989).
* CVE-2024-42245: Revert "sched/fair: Make sure to try to detach at least one
movable task" (bsc#1228978).
* CVE-2024-42241: mm/shmem: disable PMD-sized page cache if needed
(bsc#1228986).
* CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list
(bsc#1228723).
* CVE-2024-42162: gve: Account for stopped queues when reading NIC stats
(bsc#1228706).
* CVE-2024-42161: bpf: avoid uninitialized value in BPF_CORE_READ_BITFIELD
(bsc#1228756).
* CVE-2024-42159: scsi: mpi3mr: fix sanitise num_phys (bsc#1228754).
* CVE-2024-42158: s390/pkey: Use kfree_sensitive() to fix Coccinelle warnings
(bsc#1228720).
* CVE-2024-42157: s390/pkey: Wipe sensitive data on failure (bsc#1228727).
* CVE-2024-42156: s390/pkey: Wipe copies of clear-key structures on failure
(bsc#1228722).
* CVE-2024-42155: s390/pkey: Wipe copies of protected- and secure-keys
(bsc#1228733).
* CVE-2024-42148: bnx2x: Fix multiple UBSAN array-index-out-of-bounds
(bsc#1228487).
* CVE-2024-42145: IB/core: Implement a limit on UMAD receive List
(bsc#1228743).
* CVE-2024-42142: net/mlx5: E-switch, Create ingress ACL when needed
(bsc#1228491).
* CVE-2024-42139: ice: Fix improper extts handling (bsc#1228503).
* CVE-2024-42138: mlxsw: core_linecards: Fix double memory deallocation in
case of invalid INI file (bsc#1228500).
* CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible
(bsc#1228705).
* CVE-2024-42122: drm/amd/display: Add NULL pointer check for kzalloc
(bsc#1228591).
* CVE-2024-42113: net: txgbe: initialize num_q_vectors for MSI/INTx interrupts
(bsc#1228568).
* CVE-2024-42110: net: ntb_netdev: Move ntb_netdev_rx_handler() to call
netif_rx() from __netif_rx() (bsc#1228501).
* CVE-2024-42109: netfilter: nf_tables: unconditionally flush pending work
before notifier (bsc#1228505).
* CVE-2024-42107: ice: Do not process extts if PTP is disabled (bsc#1228494).
* CVE-2024-42106: inet_diag: Initialize pad field in struct inet_diag_req_v2
(bsc#1228493).
* CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633).
* CVE-2024-42095: serial: 8250_omap: Fix Errata i2310 with RX FIFO level check
(bsc#1228446).
* CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack
(bsc#1228680).
* CVE-2024-42082: xdp: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482).
* CVE-2024-42079: gfs2: Fix NULL pointer dereference in gfs2_log_flush
(bsc#1228672).
* CVE-2024-42073: mlxsw: spectrum_buffers: Fix memory corruptions on
Spectrum-4 systems (bsc#1228457).
* CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store
to data registers (bsc#1228470).
* CVE-2024-41084: cxl/region: Avoid null pointer dereference in region lookup
(bsc#1228472).
* CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617).
* CVE-2024-41080: io_uring: fix possible deadlock in
io_register_iowq_max_workers() (bsc#1228616).
* CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable
failure (bsc#1228655).
* CVE-2024-41076: NFSv4: Fix memory leak in nfs4_set_security_label
(bsc#1228649).
* CVE-2024-41075: cachefiles: add consistency check for copen/cread
(bsc#1228646).
* CVE-2024-41074: cachefiles: Set object to close if ondemand_id < 0 in copen
(bsc#1228643).
* CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in
kvm_spapr_tce_attach_iommu_group() (bsc#1228581).
* CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).
* CVE-2024-41068: s390/sclp: Fix sclp_init() cleanup on failure (bsc#1228579).
* CVE-2024-41066: ibmvnic: add tx check to prevent skb leak (bsc#1228640).
* CVE-2024-41064: powerpc/eeh: avoid possible crash when edev->pdev changes
(bsc#1228599).
* CVE-2024-41062: bluetooth/l2cap: sync sock recv cb and release
(bsc#1228576).
* CVE-2024-41058: cachefiles: fix slab-use-after-free in
fscache_withdraw_volume() (bsc#1228459).
* CVE-2024-41057: cachefiles: fix slab-use-after-free in
cachefiles_withdraw_cookie() (bsc#1228462).
* CVE-2024-41051: cachefiles: wait for ondemand_object_worker to finish when
dropping object (bsc#1228468).
* CVE-2024-41050: cachefiles: cyclic allocation of msg_id to avoid reuse
(bsc#1228499).
* CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565).
* CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets
(bsc#1228530).
* CVE-2024-41041: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port()
(bsc#1228520).
* CVE-2024-41040: net/sched: Fix UAF when resolving a clash (bsc#1228518).
* CVE-2024-41036: net: ks8851: Fix deadlock with the SPI chip variant
(bsc#1228496).
* CVE-2024-41032: mm: vmalloc: check if a hash-index is in cpu_possible_mask
(bsc#1228460).
* CVE-2024-41020: filelock: Fix fcntl/close race recovery compat path
(bsc#1228427).
* CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry()
(bsc#1228409).
* CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is
detected (bsc#1228247).
* CVE-2024-41010: bpf: Fix too early release of tcx_entry (bsc#1228021).
* CVE-2024-41009: bpf: Fix overrunning reservations in ringbuf (bsc#1228020).
* CVE-2024-41007: tcp: use signed arithmetic in tcp_rtx_probe0_timed_out()
(bsc#1227863).
* CVE-2024-41000: block/ioctl: prefer different overflow check (bsc#1227867).
* CVE-2024-40995: net/sched: act_api: fix possible infinite loop in
tcf_idr_check_alloc() (bsc#1227830).
* CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store
(bsc#1227829).
* CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on
teardown (bsc#1227823).
* CVE-2024-40978: scsi: qedi: Fix crash while reading debugfs attribute
(bsc#1227929).
* CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in
xfrm6_get_saddr() (bsc#1227884).
* CVE-2024-40958: netns: Make get_net_ns() handle zero refcount net
(bsc#1227812).
* CVE-2024-40957: seg6: fix parameter passing when calling NF_HOOK() in
End.DX4 and End.DX6 behaviors (bsc#1227811).
* CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in
irq_process_work_list (bsc#1227810).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-40939: net: wwan: iosm: Fix tainted pointer delete is case of
region creation fail (bsc#1227799).
* CVE-2024-40938: landlock: fix d_parent walk (bsc#1227840).
* CVE-2024-40921: net: bridge: mst: pass vlan group directly to
br_mst_vlan_set_state (bsc#1227784).
* CVE-2024-40920: net: bridge: mst: fix suspicious rcu usage in
br_mst_set_state (bsc#1227781).
* CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free()
(bsc#1227798).
* CVE-2024-40905: ipv6: fix possible race in __fib6_drop_pcpu_from()
(bsc#1227761)
* CVE-2024-39506: liquidio: adjust a NULL pointer handling path in
lio_vf_rep_copy_packet (bsc#1227729).
* CVE-2024-39489: ipv6: sr: fix memleak in seg6_hmac_init_algo (bsc#1227623)
* CVE-2024-38662: selftests/bpf: Cover verifier checks for mutating
sockmap/sockhash (bsc#1226885).
* CVE-2024-36979: net: bridge: mst: fix vlan use-after-free (bsc#1226604).
* CVE-2024-36933: net: nsh: Use correct mac_offset to unwind gso skb in
nsh_gso_segment() (bsc#1225832).
* CVE-2024-36929: net: core: reject skb_copy(_expand) for fraglist GSO skbs
(bsc#1225814).
* CVE-2024-36911: hv_netvsc: Do not free decrypted memory (bsc#1225745).
* CVE-2024-36910: uio_hv_generic: Do not free decrypted memory (bsc#1225717).
* CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that couldn't
be re-encrypted (bsc#1225744).
* CVE-2024-36881: mm/userfaultfd: Fix reset ptes when close() for wr-protected
(bsc#1225718).
* CVE-2024-36489: tls: fix missing memory barrier in tls_init (bsc#1226874)
* CVE-2024-36286: netfilter: nfnetlink_queue: acquire rcu_read_lock() in
instance_destroy_rcu() (bsc#1226801)
* CVE-2024-36270: Fix reference in patches.suse/netfilter-tproxy-bail-out-if-
IP-has-been-disabled-on.patch (bsc#1226798)
* CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks
(bsc#1224700).
* CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure
(bsc#1224535).
* CVE-2024-35897: netfilter: nf_tables: discard table flag update with pending
basechain deletion (bsc#1224510).
* CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ
(bsc#1222625).
* CVE-2024-27433: clk: mediatek: mt7622-apmixedsys: Fix an error handling path
in clk_mt8135_apmixed_probe() (bsc#1224711).
* CVE-2024-27403: kabi: restore const specifier in flow_offload_route_init()
(bsc#1224415).
* CVE-2024-27079: iommu/vt-d: Fix NULL domain on device release (bsc#1223742).
* CVE-2024-27024: net/rds: fix WARNING in rds_conn_connect_if_down
(bsc#1223777).
* CVE-2024-27011: netfilter: nf_tables: fix memleak in map from abort path
(bsc#1223803).
* CVE-2024-27010: net/sched: Fix mirred deadlock on device recursion
(bsc#1223720).
* CVE-2024-26851: netfilter: nf_conntrack_h323: Add protection for bmp length
out of range (bsc#1223074)
* CVE-2024-26837: net: bridge: switchdev: race between creation of new group
memberships and generation of the list of MDB events to replay
(bsc#1222973).
* CVE-2024-26835: netfilter: nf_tables: set dormant flag on hook register
failure (bsc#1222967).
* CVE-2024-26812: kABI: vfio: struct virqfd kABI workaround (bsc#1222808).
* CVE-2024-26809: netfilter: nft_set_pipapo: release elements in clone only
from destroy path (bsc#1222633).
* CVE-2024-26808: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for
inet/ingress basechain (bsc#1222634).
* CVE-2024-26735: ipv6: sr: fix possible use-after-free and null-ptr-deref
(bsc#1222372).
* CVE-2024-26677: blacklist.conf: Add e7870cf13d20 ("rxrpc: Fix delayed ACKs
to not set the reference serial number") (bsc#1222387)
* CVE-2024-26669: kABI fix for net/sched: flower: Fix chain template offload
(bsc#1222350).
* CVE-2024-26668: netfilter: nft_limit: reject configurations that cause
integer overflow (bsc#1222335).
* CVE-2024-26631: ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work
(bsc#1221630).
* CVE-2024-26590: erofs: fix inconsistent per-file compression format
(bsc#1220252).
* CVE-2023-52889: apparmor: Fix null pointer deref when receiving skb during
sock creation (bsc#1229287).
* CVE-2023-52859: perf: hisi: Fix use-after-free when register pmu fails
(bsc#1225582).
* CVE-2023-52581: netfilter: nf_tables: fix memleak when more than 255
elements expired (bsc#1220877).
* CVE-2023-52489: mm/sparsemem: fix race in accessing memory_section->usage
(bsc#1221326).

The following non-security bugs were fixed:

* ACPI/NUMA: Apply SRAT proximity domain to entire CFMWS window (git-fixes).
* ACPI: SBS: manage alarm sysfs attribute through psy core (stable-fixes).
* ACPI: battery: create alarm sysfs attribute atomically (stable-fixes).
* ACPI: processor_idle: use raw_safe_halt() in acpi_idle_play_dead() (git-
fixes).
* ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).
* ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).
* ALSA: hda/realtek - Fixed ALC256 headphone no sound (stable-fixes).
* ALSA: hda/realtek - Fixed ALC285 headphone no sound (stable-fixes).
* ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks
(stable-fixes).
* ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks
(stable-fixes).
* ALSA: hda/realtek: Add quirk for Acer Aspire E5-574G (stable-fixes).
* ALSA: hda/realtek: Add support for new HP G12 laptops (stable-fixes).
* ALSA: hda/realtek: Enable mute/micmute LEDs on HP Laptop 14-ey0xxx (stable-
fixes).
* ALSA: hda/realtek: Fix noise from speakers on Lenovo IdeaPad 3 15IAU7 (git-
fixes).
* ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book3 Ultra
(stable-fixes).
* ALSA: hda/realtek: Implement sound init sequence for Samsung Galaxy Book3
Pro 360 (stable-fixes).
* ALSA: hda/realtek: support HP Pavilion Aero 13-bg0xxx Mute LED (stable-
fixes).
* ALSA: hda/tas2781: Use correct endian conversion (git-fixes).
* ALSA: hda/tas2781: fix wrong calibrated data order (git-fixes).
* ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-
fixes).
* ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-
fixes).
* ALSA: hda: Conditionally use snooping for AMD HDMI (git-fixes).
* ALSA: hda: conexant: Fix headset auto detect fail in the polling mode (git-
fixes).
* ALSA: line6: Fix racy access to midibuf (stable-fixes).
* ALSA: line6: Fix racy access to midibuf (stable-fixes).
* ALSA: seq: Skip event type filtering for UMP events (git-fixes).
* ALSA: seq: ump: Explicitly reset RPN with Null RPN (stable-fixes).
* ALSA: seq: ump: Optimize conversions from SysEx to UMP (git-fixes).
* ALSA: seq: ump: Transmit RPN/NRPN message at each MSB/LSB data reception
(stable-fixes).
* ALSA: seq: ump: Use the common RPN/bank conversion context (stable-fixes).
* ALSA: timer: Relax start tick time check for slave timer elements (git-
fixes).
* ALSA: ump: Explicitly reset RPN with Null RPN (stable-fixes).
* ALSA: ump: Transmit RPN/NRPN message at each MSB/LSB data reception (stable-
fixes).
* ALSA: usb-audio: Add delay quirk for VIVO USB-C-XE710 HEADSET (stable-
fixes).
* ALSA: usb-audio: Correct surround channels in UAC1 channel map (git-fixes).
* ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).
* ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).
* ALSA: usb-audio: Support Yamaha P-125 quirk entry (stable-fixes).
* ALSA: usb: Fix UBSAN warning in parse_audio_unit() (stable-fixes).
* ASoC: SOF: Intel: hda-dsp: Make sure that no irq handler is pending before
suspend (stable-fixes).
* ASoC: SOF: Remove libraries from topology lookups (git-fixes).
* ASoC: SOF: Remove libraries from topology lookups (git-fixes).
* ASoC: SOF: amd: Fix for acp init sequence (git-fixes).
* ASoC: SOF: ipc4: check return value of snd_sof_ipc_msg_data (stable-fixes).
* ASoC: SOF: mediatek: Add missing board compatible (stable-fixes).
* ASoC: allow module autoloading for table board_ids (stable-fixes).
* ASoC: allow module autoloading for table db1200_pids (stable-fixes).
* ASoC: amd: acp: fix module autoloading (git-fixes).
* ASoC: amd: yc: Add quirk entry for OMEN by HP Gaming Laptop 16-n0xxx
(bsc#1227182).
* ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes).
* ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes).
* ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes).
* ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes).
* ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes).
* ASoC: cs35l45: Checks index of cs35l45_irqs[] (stable-fixes).
* ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes).
* ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes).
* ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable-
fixes).
* ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable-
fixes).
* ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes).
* ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes).
* ASoC: mediatek: mt8188: Mark AFE_DAC_CON0 register as volatile (stable-
fixes).
* ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes).
* ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes).
* ASoC: nau8822: Lower debug print priority (stable-fixes).
* ASoC: nau8822: Lower debug print priority (stable-fixes).
* Bluetooth: Add device 13d3:3572 IMC Networks Bluetooth Radio (stable-fixes).
* Bluetooth: Fix usage of __hci_cmd_sync_status (git-fixes).
* Bluetooth: L2CAP: Fix deadlock (git-fixes).
* Bluetooth: MGMT: Add error handling to pair_device() (git-fixes).
* Bluetooth: SMP: Fix assumption of Central always being Initiator (git-
fixes).
* Bluetooth: bnep: Fix out-of-bound access (stable-fixes).
* Bluetooth: btintel: Fail setup on error (git-fixes).
* Bluetooth: btnxpuart: Shutdown timer and prevent rearming when driver
unloading (stable-fixes).
* Bluetooth: btusb: Add RTL8852BE device 0489:e125 to device tables (stable-
fixes).
* Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x13d3:0x3591 (stable-
fixes).
* Bluetooth: hci_conn: Check non NULL function before calling for HFP offload
(stable-fixes).
* Bluetooth: hci_core: Fix LE quote calculation (git-fixes).
* Bluetooth: hci_core: Fix not handling hibernation actions (git-fixes).
* Bluetooth: hci_sync: Fix suspending with wrong filter policy (git-fixes).
* Bluetooth: hci_sync: avoid dup filtering when passive scanning with adv
monitor (git-fixes).
* Bluetooth: l2cap: always unlock channel in l2cap_conless_channel() (git-
fixes).
* Drop libata patch that caused a regression (bsc#1229054)
* HID: wacom: Defer calculation of resolution until resolution_code is known
(git-fixes).
* Input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (bsc#1229056).
* Input: i8042 - add forcenorestore quirk to leave controller untouched even
on s3 (stable-fixes).
* Input: i8042 - use new forcenorestore quirk to replace old buggy quirk
combination (stable-fixes).
* KVM: Always flush async #PF workqueue when vCPU is being destroyed (git-
fixes).
* KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY (git-
fixes).
* KVM: PPC: Book3S HV: Fix the set_one_reg for MMCR3 (bsc#1194869).
* KVM: PPC: Book3S HV: Handle pending exceptions on guest entry with MSR_EE
(bsc#1215199).
* KVM: Protect vcpu->pid dereference via debugfs with RCU (git-fixes).
* KVM: Reject overly excessive IDs in KVM_CREATE_VCPU (git-fixes).
* KVM: Stop processing _all_ memslots when "null" mmu_notifier handler is
found (git-fixes).
* KVM: VMX: Move posted interrupt descriptor out of VMX code (git-fixes).
* KVM: VMX: Split out the non-virtualization part of vmx_interrupt_blocked()
(git-fixes).
* KVM: VMX: Switch __vmx_exit() and kvm_x86_vendor_exit() in vmx_exit() (git-
fixes).
* KVM: arm64: AArch32: Fix spurious trapping of conditional instructions (git-
fixes).
* KVM: arm64: Add missing memory barriers when switching to pKVM's hyp pgd
(git-fixes).
* KVM: arm64: Allow AArch32 PSTATE.M to be restored as System mode (git-
fixes).
* KVM: arm64: Fix AArch32 register narrowing on userspace write (git-fixes).
* KVM: arm64: Fix __pkvm_init_switch_pgd call ABI (git-fixes).
* KVM: arm64: Fix clobbered ELR in sync abort/SError (git-fixes)
* KVM: arm64: GICv4: Do not perform a map to a mapped vLPI (git-fixes).
* KVM: arm64: timers: Correctly handle TGE flip with CNTPOFF_EL2 (git-fixes).
* KVM: arm64: timers: Fix resource leaks in kvm_timer_hyp_init() (git-fixes).
* KVM: arm64: vgic-its: Test for valid IRQ in MOVALL handler (git-fixes).
* KVM: arm64: vgic-its: Test for valid IRQ in its_sync_lpi_pending_table()
(git-fixes).
* KVM: arm64: vgic-v2: Use cpuid from userspace as vcpu_id (git-fixes).
* KVM: arm64: vgic-v4: Restore pending state on host userspace write (git-
fixes).
* KVM: arm64: vgic: Add a non-locking primitive for kvm_vgic_vcpu_destroy()
(git-fixes).
* KVM: arm64: vgic: Force vcpu vgic teardown on vcpu destroy (git-fixes).
* KVM: arm64: vgic: Simplify kvm_vgic_destroy() (git-fixes).
* KVM: fix kvm_mmu_memory_cache allocation warning (git-fixes).
* KVM: nVMX: Add a helper to get highest pending from Posted Interrupt vector
(git-fixes).
* KVM: nVMX: Check for pending posted interrupts when looking for nested
events (git-fixes).
* KVM: nVMX: Request immediate exit iff pending nested event needs injection
(git-fixes).
* KVM: s390: fix LPSWEY handling (bsc#1227634 git-fixes).
* KVM: s390: fix validity interception issue when gisa is switched off (git-
fixes bsc#1229167).
* KVM: x86/mmu: Bug the VM if KVM tries to split a !hugepage SPTE (git-fixes).
* KVM: x86: Limit check IDs for KVM_SET_BOOT_CPU_ID (git-fixes).
* Move upstreamed powerpc patches into sorted section
* Move upstreamed sound patches into sorted section
* Moved upstreamed ASoC patch into sorted section
* NFSD: Support write delegations in LAYOUTGET (git-fixes).
* NFSv4.1 another fix for EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes).
* PCI: Add Edimax Vendor ID to pci_ids.h (stable-fixes).
* PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git-
fixes).
* PCI: loongson: Enable MSI in LS7A Root Complex (stable-fixes).
* RDMA/cache: Release GID table even if leak is detected (git-fixes)
* RDMA/device: Return error earlier if port in not valid (git-fixes)
* RDMA/hns: Check atomic wr length (git-fixes)
* RDMA/hns: Fix insufficient extend DB for VFs. (git-fixes)
* RDMA/hns: Fix mbx timing out before CMD execution is completed (git-fixes)
* RDMA/hns: Fix missing pagesize and alignment check in FRMR (git-fixes)
* RDMA/hns: Fix shift-out-bounds when max_inline_data is 0 (git-fixes)
* RDMA/hns: Fix soft lockup under heavy CEQE load (git-fixes)
* RDMA/hns: Fix undifined behavior caused by invalid max_sge (git-fixes)
* RDMA/hns: Fix unmatch exception handling when init eq table fails (git-
fixes)
* RDMA/iwcm: Fix a use-after-free related to destroying CM IDs (git-fixes)
* RDMA/mana_ib: Use virtual address in dma regions for MRs (git-fixes).
* RDMA/mlx4: Fix truncated output warning in alias_GUID.c (git-fixes)
* RDMA/mlx4: Fix truncated output warning in mad.c (git-fixes)
* RDMA/mlx5: Set mkeys for dmabuf at PAGE_SIZE (git-fixes)
* RDMA/rxe: Do not set BTH_ACK_MASK for UC or UD QPs (git-fixes)
* RDMA: Fix netdev tracker in ib_device_set_netdev (git-fixes)
* Revert "ALSA: firewire-lib: obsolete workqueue for period update"
(bsc#1208783).
* Revert "ALSA: firewire-lib: operate for period elapse event in process
context" (bsc#1208783).
* Revert "KVM: Prevent module exit until all VMs are freed" (git-fixes).
* Revert "Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d"" (git-
fixes).
* Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d" (git-fixes).
* Revert "misc: fastrpc: Restrict untrusted app to attach to privileged PD"
(git-fixes).
* Revert "mm: prevent derefencing NULL ptr in pfn_section_valid()"
(bsc#1230413).
* Revert "mm, kmsan: fix infinite recursion due to RCU critical section"
(bsc#1230413).
* Revert "mm/sparsemem: fix race in accessing memory_section->usage"
(bsc#1230413).
* Revert "usb: gadget: uvc: cleanup request when not in correct state"
(stable-fixes).
* Revert "usb: typec: tcpm: clear pd_event queue in PORT_RESET" (git-fixes).
* SUNRPC: Fix a race to wake a sync task (git-fixes).
* SUNRPC: add a missing rpc_stat for TCP TLS (git-fixes).
* Squashfs: fix variable overflow triggered by sysbot (git-fixes).
* USB: serial: debug: do not echo input by default (stable-fixes).
* Update config files. Disable CONFIG_KFENCE on ppc64le (bsc#1226920)
* Update config files. Disable vdpa drivers for Alibaba ENI and SolidNET
(jsc#PED-8954, bsc#1227834)
* Update patch references for ASoC regression fixes (bsc#1229045, bsc#1229046)
* afs: fix __afs_break_callback() / afs_drop_open_mmap() race (git-fixes).
* apparmor: unpack transition table if dfa is not present (bsc#1226031).
* arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git-
fixes)
* arm64: Add Neoverse-V2 part (git-fixes)
* arm64: Fix KASAN random tag seed initialization (git-fixes)
* arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git-
fixes)
* arm64: barrier: Restore spec_bar() macro (git-fixes)
* arm64: cputype: Add Cortex-A720 definitions (git-fixes)
* arm64: cputype: Add Cortex-A725 definitions (git-fixes)
* arm64: cputype: Add Cortex-X1C definitions (git-fixes)
* arm64: cputype: Add Cortex-X3 definitions (git-fixes)
* arm64: cputype: Add Cortex-X4 definitions (git-fixes)
* arm64: cputype: Add Cortex-X925 definitions (git-fixes)
* arm64: cputype: Add Neoverse-V3 definitions (git-fixes)
* arm64: dts: imx8mp: Add NPU Node (git-fixes)
* arm64: dts: imx8mp: Fix pgc vpu locations (git-fixes)
* arm64: dts: imx8mp: Fix pgc_mlmix location (git-fixes)
* arm64: dts: imx8mp: add HDMI power-domains (git-fixes)
* arm64: errata: Expand speculative SSBS workaround (again) (git-fixes)
* arm64: errata: Expand speculative SSBS workaround (git-fixes)
* arm64: errata: Unify speculative SSBS errata logic (git-fixes). Update
config files.
* arm64: jump_label: Ensure patched jump_labels are visible to all CPUs (git-
fixes)
* ata: libata-scsi: Do not overwrite valid sense data when CK_COND=1 (stable-
fixes).
* ata: libata-scsi: Honor the D_SENSE bit for CK_COND=1 and no error (stable-
fixes).
* blacklist.conf: Add libata upstream revert entry (bsc#1229054)
* bnxt_re: Fix imm_data endianness (git-fixes)
* bpf, arm64: Fix trampoline for BPF_TRAMP_F_CALL_ORIG (git-fixes)
* bpf, lpm: Fix check prefixlen before walking trie (git-fixes).
* bpf/tests: Remove duplicate JSGT tests (git-fixes).
* bpf: Add crosstask check to __bpf_get_stack (git-fixes).
* bpf: Detect IP == ksym.end as part of BPF program (git-fixes).
* bpf: Ensure proper register state printing for cond jumps (git-fixes).
* bpf: Fix a few selftest failures due to llvm18 change (git-fixes).
* bpf: Fix a kernel verifier crash in stacksafe() (bsc#1225903).
* bpf: Fix check_stack_write_fixed_off() to correctly spill imm (git-fixes).
* bpf: Fix kfunc callback register type handling (git-fixes).
* bpf: Fix prog_array_map_poke_run map poke update (git-fixes).
* bpf: Fix unnecessary -EBUSY from htab_lock_bucket (git-fixes).
* bpf: Mark bpf_spin_{lock,unlock}() helpers with notrace correctly (git-
fixes).
* bpf: Remove unnecessary wait from bpf_map_copy_value() (git-fixes).
* bpf: Set uattr->batch.count as zero before batched update or deletion (git-
fixes).
* bpf: do not infer PTR_TO_CTX for programs with unnamed context type (git-
fixes).
* bpf: enforce precision of R0 on callback return (git-fixes).
* bpf: extract bpf_ctx_convert_map logic and make it more reusable (git-
fixes).
* bpf: fix control-flow graph checking in privileged mode (git-fixes).
* bpf: handle bpf_user_pt_regs_t typedef explicitly for PTR_TO_CTX global arg
(git-fixes).
* bpf: hardcode BPF_PROG_PACK_SIZE to 2MB * num_possible_nodes() (git-fixes).
* bpf: kprobe: remove unused declaring of bpf_kprobe_override (git-fixes).
* bpf: simplify btf_get_prog_ctx_type() into btf_is_prog_ctx_type() (git-
fixes).
* bpftool: Align output skeleton ELF code (git-fixes).
* bpftool: Fix -Wcast-qual warning (git-fixes).
* bpftool: Silence build warning about calloc() (git-fixes).
* bpftool: mark orphaned programs during prog show (git-fixes).
* btrfs: add a btrfs_finish_ordered_extent helper (git-fixes).
* btrfs: add a is_data_bbio helper (git-fixes).
* btrfs: add an ordered_extent pointer to struct btrfs_bio (git-fixes).
* btrfs: copy dir permission and time when creating a stub subvolume
(bsc#1228321).
* btrfs: ensure fast fsync waits for ordered extents after a write failure
(git-fixes).
* btrfs: factor out a btrfs_queue_ordered_fn helper (git-fixes).
* btrfs: factor out a can_finish_ordered_extent helper (git-fixes).
* btrfs: fix corruption after buffer fault in during direct IO append write
(git-fixes).
* btrfs: fix double inode unlock for direct IO sync writes (git-fixes).
* btrfs: fix extent map use-after-free when adding pages to compressed bio
(git-fixes).
* btrfs: fix leak of qgroup extent records after transaction abort (git-
fixes).
* btrfs: fix ordered extent split error handling in btrfs_dio_submit_io (git-
fixes).
* btrfs: limit write bios to a single ordered extent (git-fixes).
* btrfs: make btrfs_finish_ordered_extent() return void (git-fixes).
* btrfs: merge the two calls to btrfs_add_ordered_extent in run_delalloc_nocow
(git-fixes).
* btrfs: open code btrfs_bio_end_io in btrfs_dio_submit_io (git-fixes).
* btrfs: open code end_extent_writepage in end_bio_extent_writepage (git-
fixes).
* btrfs: pass a btrfs_inode to btrfs_fdatawrite_range() (git-fixes).
* btrfs: pass a btrfs_inode to btrfs_wait_ordered_range() (git-fixes).
* btrfs: pass an ordered_extent to btrfs_reloc_clone_csums (git-fixes).
* btrfs: pass an ordered_extent to btrfs_submit_compressed_write (git-fixes).
* btrfs: remove btrfs_add_ordered_extent (git-fixes).
* btrfs: rename err to ret in btrfs_direct_write() (git-fixes).
* btrfs: uninline some static inline helpers from tree-log.h (git-fixes).
* btrfs: use a btrfs_inode in the log context (struct btrfs_log_ctx) (git-
fixes).
* btrfs: use a btrfs_inode local variable at btrfs_sync_file() (git-fixes).
* btrfs: use bbio->ordered in btrfs_csum_one_bio (git-fixes).
* btrfs: use btrfs_finish_ordered_extent to complete buffered writes (git-
fixes).
* btrfs: use btrfs_finish_ordered_extent to complete compressed writes (git-
fixes).
* btrfs: use btrfs_finish_ordered_extent to complete direct writes (git-
fixes).
* btrfs: use irq safe locking when running and adding delayed iputs (git-
fixes).
* cachefiles, erofs: Fix NULL deref in when cachefiles is not doing ondemand-
mode (bsc#1229245).
* cachefiles: add missing lock protection when polling (bsc#1229256).
* cachefiles: add restore command to recover inflight ondemand read requests
(bsc#1229244).
* cachefiles: add spin_lock for cachefiles_ondemand_info (bsc#1229249).
* cachefiles: cancel all requests for the object that is being dropped
(bsc#1229255).
* cachefiles: defer exposing anon_fd until after copy_to_user() succeeds
(bsc#1229251).
* cachefiles: extract ondemand info field from cachefiles_object
(bsc#1229240).
* cachefiles: fix slab-use-after-free in cachefiles_ondemand_daemon_read()
(bsc#1229247).
* cachefiles: fix slab-use-after-free in cachefiles_ondemand_get_fd()
(bsc#1229246).
* cachefiles: introduce object ondemand state (bsc#1229239).
* cachefiles: make on-demand read killable (bsc#1229252).
* cachefiles: narrow the scope of triggering EPOLLIN events in ondemand mode
(bsc#1229243).
* cachefiles: never get a new anonymous fd if ondemand_id is valid
(bsc#1229250).
* cachefiles: propagate errors from vfs_getxattr() to avoid infinite loop
(bsc#1229253).
* cachefiles: remove err_put_fd label in cachefiles_ondemand_daemon_read()
(bsc#1229248).
* cachefiles: resend an open request if the read request's object is closed
(bsc#1229241).
* cachefiles: stop sending new request when dropping object (bsc#1229254).
* can: mcp251xfd: tef: prepare to workaround broken TEF FIFO tail index
erratum (stable-fixes).
* can: mcp251xfd: tef: update workaround for erratum DS80000789E 6 of
mcp2518fd (stable-fixes).
* ceph: periodically flush the cap releases (bsc#1230056).
* cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801).
* cgroup: Add annotation for holding namespace_sem in
current_cgns_cgroup_from_root() (bsc#1222254).
* cgroup: Eliminate the need for cgroup_mutex in proc_cgroup_show()
(bsc#1222254).
* cgroup: Make operations on the cgroup root_list RCU safe (bsc#1222254).
* cgroup: Remove unnecessary list_empty() (bsc#1222254).
* cgroup: preserve KABI of cgroup_root (bsc#1222254).
* char: xillybus: Check USB endpoints when probing device (git-fixes).
* char: xillybus: Do not destroy workqueue from work item running on it
(stable-fixes).
* char: xillybus: Refine workqueue handling (git-fixes).
* clk: en7523: fix rate divider for slic and spi clocks (git-fixes).
* clk: qcom: Park shared RCGs upon registration (git-fixes).
* clk: qcom: camcc-sc7280: Add parent dependency to all camera GDSCs (git-
fixes).
* clk: qcom: gcc-sa8775p: Update the GDSC wait_val fields and flags (git-
fixes).
* clk: qcom: gcc-sc7280: Update force mem core bit for UFS ICE clock (git-
fixes).
* clk: qcom: gpucc-sa8775p: Park RCG's clk source at XO during disable (git-
fixes).
* clk: qcom: gpucc-sa8775p: Remove the CLK_IS_CRITICAL and ALWAYS_ON flags
(git-fixes).
* clk: qcom: gpucc-sa8775p: Update wait_val fields for GPU GDSC's (git-fixes).
* clk: qcom: gpucc-sm8350: Park RCG's clk source at XO during disable (git-
fixes).
* clk: qcom: kpss-xcc: Return of_clk_add_hw_provider to transfer the error
(git-fixes).
* clk: visconti: Add bounds-checking coverage for struct visconti_pll_provider
(stable-fixes).
* clocksource/drivers/sh_cmt: Address race condition for clock events (stable-
fixes).
* cpu/SMT: Enable SMT only if a core is online (bsc#1214285 bsc#1205462
ltc#200161 ltc#200588 git-fixes).
* dev/parport: fix the array out-of-bounds risk (stable-fixes).
* device property: Add cleanup.h based fwnode_handle_put() scope based cleanup
(stable-fixes).
* dmaengine: dw: Add memory bus width verification (git-fixes).
* dmaengine: dw: Add peripheral bus width verification (git-fixes).
* docs: KVM: Fix register ID of SPSR_FIQ (git-fixes).
* driver core: Fix uevent_show() vs driver detach race (git-fixes).
* drm/admgpu: fix dereferencing null pointer context (stable-fixes).
* drm/amd/display: Add delay to improve LTTPR UHBR interop (stable-fixes).
* drm/amd/display: Add null checker before passing variables (stable-fixes).
* drm/amd/display: Adjust cursor position (git-fixes).
* drm/amd/display: Check for NULL pointer (stable-fixes).
* drm/amd/display: Skip Recompute DSC Params if no Stream on Link (stable-
fixes).
* drm/amd/display: avoid using null object of framebuffer (git-fixes).
* drm/amd/display: fix cursor offset on rotation 180 (git-fixes).
* drm/amd/display: fix s2idle entry for DCN3.5+ (stable-fixes).
* drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr (stable-
fixes).
* drm/amdgpu/jpeg2: properly set atomics vmid field (stable-fixes).
* drm/amdgpu/jpeg4: properly set atomics vmid field (stable-fixes).
* drm/amdgpu/pm: Fix the null pointer dereference for smu7 (stable-fixes).
* drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules
(stable-fixes).
* drm/amdgpu/pm: Fix the param type of set_power_profile_mode (stable-fixes).
* drm/amdgpu/sdma5.2: Update wptr registers as well as doorbell (stable-
fixes).
* drm/amdgpu/sdma5.2: limit wptr workaround to sdma 5.2.1 (git-fixes).
* drm/amdgpu: Actually check flags for all context ops (stable-fixes).
* drm/amdgpu: Add lock around VF RLCG interface (stable-fixes).
* drm/amdgpu: Fix the null pointer dereference to ras_manager (stable-fixes).
* drm/amdgpu: Forward soft recovery errors to userspace (stable-fixes).
* drm/amdgpu: Validate TA binary size (stable-fixes).
* drm/amdgpu: fix dereference null return value for the function
amdgpu_vm_pt_parent (stable-fixes).
* drm/amdgpu: fix potential resource leak warning (stable-fixes).
* drm/amdgpu: reset vm state machine after gpu reset(vram lost) (stable-
fixes).
* drm/bridge: analogix_dp: properly handle zero sized AUX transactions
(stable-fixes).
* drm/client: fix null pointer dereference in drm_client_modeset_probe (git-
fixes).
* drm/dp_mst: Skip CSN if topology probing is not done yet (stable-fixes).
* drm/etnaviv: do not block scheduler when GPU is still active (stable-fixes).
* drm/i915/dsi: Make Lenovo Yoga Tab 3 X90F DMI match less strict (git-fixes).
* drm/i915/gem: Adjust vma offset for framebuffer mmap offset (stable-fixes).
* drm/i915/gem: Fix Virtual Memory mapping boundaries calculation (git-fixes).
* drm/i915/hdcp: Fix HDCP2_STREAM_STATUS macro (git-fixes).
* drm/i915: Fix possible int overflow in skl_ddi_calculate_wrpll() (git-
fixes).
* drm/lima: set gp bus_stop bit before hard reset (stable-fixes).
* drm/mediatek/dp: Fix spurious kfree() (git-fixes).
* drm/msm/dp: fix the max supported bpp logic (git-fixes).
* drm/msm/dp: reset the link phy params before link training (git-fixes).
* drm/msm/dpu: capture snapshot on the first commit_done timeout (stable-
fixes).
* drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails (git-fixes).
* drm/msm/dpu: do not play tricks with debug macros (git-fixes).
* drm/msm/dpu: drop MSM_ENC_VBLANK support (stable-fixes).
* drm/msm/dpu: move dpu_encoder's connector assignment to atomic_enable()
(git-fixes).
* drm/msm/dpu: split dpu_encoder_wait_for_event into two functions (stable-
fixes).
* drm/msm/dpu: take plane rotation into account for wide planes (git-fixes).
* drm/msm/dpu: try multirect based on mdp clock limits (stable-fixes).
* drm/msm/dpu: use drmm-managed allocation for dpu_encoder_phys (stable-
fixes).
* drm/msm/mdss: Rename path references to mdp_path (stable-fixes).
* drm/msm/mdss: switch mdss to use devm_of_icc_get() (stable-fixes).
* drm/msm: Reduce fallout of fence signaling vs reclaim hangs (stable-fixes).
* drm/nouveau: prime: fix refcount underflow (git-fixes).
* drm/panel: nt36523: Set 120Hz fps for xiaomi,elish panels (stable-fixes).
* drm/radeon/evergreen_cs: Clean up errors in evergreen_cs.c (bsc#1229024).
* drm/radeon: Remove __counted_by from StateArray.states[] (git-fixes).
* drm/rockchip: vop2: clear afbc en and transform bit for cluster window at
linear mode (stable-fixes).
* drm/virtio: Fix type of dma-fence context variable (git-fixes).
* drm/vmwgfx: Fix a deadlock in dma buf fence polling (git-fixes).
* drm/vmwgfx: Fix overlay when using Screen Targets (git-fixes).
* drm/vmwgfx: Fix prime with external buffers (git-fixes).
* efi/libstub: Zero initialize heap allocated struct screen_info (git-fixes).
* evm: do not copy up 'security.evm' xattr (git-fixes).
* firmware: cirrus: cs_dsp: Initialize debugfs_root to invalid (stable-fixes).
* fs/netfs/fscache_cookie: add missing "n_accesses" check (bsc#1229455).
* fuse: Initialize beyond-EOF page contents before setting uptodate
(bsc#1229456).
* genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline (git-
fixes).
* genirq/generic_chip: Make irq_remove_generic_chip() irqdomain aware (git-
fixes).
* genirq/matrix: Exclude managed interrupts in irq_matrix_allocated() (git-
fixes).
* gfs2: setattr_chown: Add missing initialization (git-fixes).
* gpio: mlxbf3: Support shutdown() function (git-fixes).
* gpio: prevent potential speculation leaks in gpio_device_get_desc() (stable-
fixes).
* gpio: sysfs: extend the critical section for unregistering sysfs devices
(stable-fixes).
* gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey (git-
fixes).
* hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode()
(git-fixes).
* hwmon: (ltc2992) Avoid division by zero (stable-fixes).
* hwmon: (ltc2992) Fix memory leak in ltc2992_parse_dt() (git-fixes).
* hwmon: (pc87360) Bounds check data->innr usage (stable-fixes).
* i2c: Fix conditional for substituting empty ACPI functions (stable-fixes).
* i2c: Use IS_REACHABLE() for substituting empty ACPI functions (git-fixes).
* i2c: qcom-geni: Add missing clk_disable_unprepare in geni_i2c_runtime_resume
(git-fixes).
* i2c: qcom-geni: Add missing geni_icc_disable in geni_i2c_runtime_resume
(git-fixes).
* i2c: qcom-geni: Add missing geni_icc_disable in geni_i2c_runtime_resume
(git-fixes).
* i2c: riic: avoid potential division by zero (stable-fixes).
* i2c: smbus: Improve handling of stuck alerts (git-fixes).
* i2c: smbus: Send alert notifications to all devices if source not found
(git-fixes).
* i2c: stm32f7: Add atomic_xfer method to driver (stable-fixes).
* i3c: mipi-i3c-hci: Do not unmap region not mapped for transfer (stable-
fixes).
* i3c: mipi-i3c-hci: Remove BUG() when Ring Abort request times out (stable-
fixes).
* i915/perf: Remove code to update PWR_CLK_STATE for gen12 (git-fixes).
* ice: Fix NULL pointer access, if PF does not support SRIOV_LAG
(bsc#1228737).
* io_uring/advise: support 64-bit lengths (git-fixes).
* io_uring: Drop per-ctx dummy_ubuf (git-fixes).
* io_uring: Fix probe of disabled operations (git-fixes).
* io_uring: fix io_match_task must_hold (git-fixes).
* io_uring: tighten task exit cancellations (git-fixes).
* iommu/amd: Convert comma to semicolon (git-fixes).
* iommu/vt-d: Fix identity map bounds in si_domain_init() (git-fixes).
* iommufd/device: Fix hwpt at err_unresv in iommufd_device_do_replace() (git-
fixes).
* ip6_tunnel: Fix broken GRO (bsc#1229444).
* ipv6: sr: fix incorrect unregister order (git-fixes).
* irqdomain: Fixed unbalanced fwnode get and put (git-fixes).
* jfs: Fix shift-out-of-bounds in dbDiscardAG (git-fixes).
* jfs: define xtree root and page independently (git-fixes).
* jfs: fix null ptr deref in dtInsertEntry (git-fixes).
* jump_label: Clarify condition in static_key_fast_inc_not_disabled() (git-
fixes).
* jump_label: Fix concurrency issues in static_key_slow_dec() (git-fixes).
* jump_label: Fix the fix, brown paper bags galore (git-fixes).
* jump_label: Simplify and clarify static_key_fast_inc_cpus_locked() (git-
fixes).
* kABI fix of: virtio-crypto: handle config changed by work queue (git-fixes).
* kABI workaround for sound core UMP conversion (stable-fixes).
* kabi fix for KVM: s390: fix LPSWEY handling (bsc#1227634 git-fixes).
* kabi fix for SUNRPC: add a missing rpc_stat for TCP TLS (git-fixes).
* kabi/severities: ignore kABI for FireWire sound local symbols (bsc#1208783)
* kabi: more build fix without patches.kabi (bsc#1226502)
* kcov: properly check for softirq context (git-fixes).
* kernel-binary.spec.in: Enable klp_symbols on openSUSE Tumbleweed
(boo#1229042).
* kernel-binary: generate and install compile_commands.json (bsc#1228971).
* kernfs: Convert kernfs_path_from_node_locked() from strlcpy() to strscpy()
(bsc#1229134).
* kernfs: fix false-positive WARN(nr_mmapped) in kernfs_drain_open_files (git-
fixes).
* kprobes: Fix to check symbol prefixes correctly (git-fixes).
* kprobes: Prohibit probing on CFI preamble symbol (git-fixes).
* kvm: s390: Reject memory region operations for ucontrol VMs (git-fixes
bsc#1229168).
* libbpf: Add missing LIBBPF_API annotation to libbpf_set_memlock_rlim API
(git-fixes).
* libbpf: Apply map_set_def_max_entries() for inner_maps on creation (git-
fixes).
* libbpf: Fix faccessat() usage on Android (git-fixes).
* libbpf: Use OPTS_SET() macro in bpf_xdp_query() (git-fixes).
* md-cluster: fix hanging issue while a new disk adding (bsc#1223395).
* md-cluster: fix hanging issue while a new disk adding (bsc#1223395).
* md-cluster: fix no recovery job when adding/re-adding a disk (bsc#1223395).
* md-cluster: fix no recovery job when adding/re-adding a disk (bsc#1223395).
* md-cluster: keeping kabi compatibility for upstream commit 35a0a409fa26
(bsc#1223395).
* md/md-bitmap: fix writing non bitmap pages (git-fixes).
* md/raid1: set max_sectors during early return from choose_slow_rdev() (git-
fixes).
* md/raid1: support read error check (git-fixes).
* md/raid5: fix deadlock that raid5d() wait for itself to clear
MD_SB_CHANGE_PENDING (git-fixes).
* md/raid5: fix spares errors about rcu usage (git-fixes).
* md/raid5: recheck if reshape has finished with device_lock held (git-fixes).
* md: Do not wait for MD_RECOVERY_NEEDED for HOT_REMOVE_DISK ioctl (git-
fixes).
* md: add a mddev_add_trace_msg helper (git-fixes).
* md: add check for sleepers in md_wakeup_thread() (git-fixes).
* md: change the return value type of md_write_start to void (git-fixes).
* md: do not account sync_io if iostats of the disk is disabled (git-fixes).
* md: do not delete safemode_timer in mddev_suspend (git-fixes).
* md: factor out a helper exceed_read_errors() to check read_errors (git-
fixes).
* md: fix a suspicious RCU usage warning (git-fixes).
* media: Revert "media: dvb-usb: Fix unexpected infinite loop in
dvb_usb_read_remote_control()" (git-fixes).
* media: amphion: Remove lock in s_ctrl callback (stable-fixes).
* media: drivers/media/dvb-core: copy user arrays safely (stable-fixes).
* media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes).
* media: uvcvideo: Add quirk for invalid dev_sof in Logitech C920 (git-fixes).
* media: uvcvideo: Disable autosuspend for Insta360 Link (stable-fixes).
* media: uvcvideo: Fix the bandwdith quirk on USB 3.x (stable-fixes).
* media: uvcvideo: Ignore empty TS packets (stable-fixes).
* media: uvcvideo: Quirk for invalid dev_sof in Logitech C922 (stable-fixes).
* media: xc2028: avoid use-after-free in load_firmware_cb() (stable-fixes).
* memcg: protect concurrent access to mem_cgroup_idr (git-fixes).
* memory: stm32-fmc2-ebi: check regmap_read return value (stable-fixes).
* memory: tegra: Skip SID programming if SID registers are not set (stable-
fixes).
* minmax: add a few more MIN_T/MAX_T users (bsc#1229024).
* minmax: avoid overly complicated constant expressions in VM code
(bsc#1229024).
* minmax: do not use max() in situations that want a C constant expression
(bsc#1229024).
* minmax: fix up min3() and max3() too (bsc#1229024).
* minmax: improve macro expansion and type checking (bsc#1229024).
* minmax: make generic MIN() and MAX() macros available everywhere
(bsc#1229024).
* minmax: simplify and clarify min_t()/max_t() implementation (bsc#1229024).
* minmax: simplify min()/max()/clamp() implementation (bsc#1229024).
* mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes).
* mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes).
* mmc: dw_mmc: allow biu and ciu clocks to defer (git-fixes).
* mmc: mmc_test: Fix NULL dereference on allocation failure (git-fixes).
* mmc: mtk-sd: receive cmd8 data when hs400 tuning fail (git-fixes).
* net/iucv: fix the allocation size of iucv_path_table array (git-fixes
bsc#1229451).
* net/iucv: fix use after free in iucv_sock_close() (bsc#1228973).
* net/rds: fix possible cp null dereference (git-fixes).
* net/sched: initialize noop_qdisc owner (git-fixes).
* net: drop bad gso csum_start and offset in virtio_net_hdr (git-fixes).
* net: ethernet: mtk_wed: fix use-after-free panic in
mtk_wed_setup_tc_block_cb() (git-fixes).
* net: fix sk_memory_allocated_{add|sub} vs softirqs (bsc#1228757).
* net: mana: Add support for page sizes other than 4KB on ARM64 (jsc#PED-8491
bsc#1226530).
* net: mana: Fix RX buf alloc_size alignment and atomic op panic
(bsc#1229086).
* net: mana: Fix doorbell out of order violation and avoid unnecessary
doorbell rings (bsc#1229154).
* net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git-
fixes).
* net: missing check virtio (git-fixes).
* net: phy: micrel: Fix the KSZ9131 MDI-X status issue (git-fixes).
* net: phy: realtek: add support for RTL8366S Gigabit PHY (git-fixes).
* net: usb: qmi_wwan: fix memory leak for not ip packets (git-fixes).
* net: usb: sr9700: fix uninitialized variable use in sr_mdio_read (git-
fixes).
* netfs, fscache: export fscache_put_volume() and add fscache_try_get_volume()
(bsc#1228459 bsc#1228462).
* nfc: pn533: Add poll mod list filling check (git-fixes).
* nfs: do not invalidate dentries on transient errors (git-fixes).
* nfs: expose /proc/net/sunrpc/nfs in net namespaces (git-fixes).
* nfs: make the rpc_stat per net namespace (git-fixes).
* nfs: pass explicit offset/count to trace events (git-fixes).
* nfs: propagate readlink errors in nfs_symlink_filler (git-fixes).
* nouveau/firmware: use dma non-coherent allocator (git-fixes).
* nvme-multipath: find NUMA path only for online numa-node (git-fixes).
* nvme-multipath: implement "queue-depth" iopolicy (bsc#1227706).
* nvme-multipath: prepare for "queue-depth" iopolicy (bsc#1227706).
* nvme-pci: Fix the instructions for disabling power management (git-fixes).
* nvme-pci: add missing condition check for existence of mapped data (git-
fixes).
* nvme-pci: do not directly handle subsys reset fallout (bsc#1220066).
* nvme-sysfs: add 'tls_configured_key' sysfs attribute (bsc#1221857).
* nvme-sysfs: add 'tls_keyring' attribute (bsc#1221857).
* nvme-tcp: check for invalidated or revoked key (bsc#1221857).
* nvme-tcp: sanitize TLS key handling (bsc#1221857).
* nvme: add a newline to the 'tls_key' sysfs attribute (bsc#1221857).
* nvme: adjust multiples of NVME_CTRL_PAGE_SIZE in offset (git-fixes).
* nvme: avoid double free special payload (git-fixes).
* nvme: fix NVME_NS_DEAC may incorrectly identifying the disk as EXT_LBA (git-
fixes).
* nvme: fixup comment for nvme RDMA Provider Type (git-fixes).
* nvme: split off TLS sysfs attributes into a separate group (bsc#1221857).
* nvme: tcp: remove unnecessary goto statement (bsc#1221857).
* nvme_core: scan namespaces asynchronously (bsc#1224105).
* nvmet-auth: fix nvmet_auth hash error handling (git-fixes).
* nvmet: always initialize cqe.result (git-fixes).
* nvmet: do not return 'reserved' for empty TSAS values (git-fixes).
* nvmet: fix a possible leak when destroy a ctrl during qp establishment (git-
fixes).
* nvmet: make 'tsas' attribute idempotent for RDMA (git-fixes).
* ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()
(bsc#1228410).
* padata: Fix possible divide-by-0 panic in padata_mt_helper() (git-fixes).
* perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09 (git-
fixes).
* pinctrl: mediatek: common-v2: Fix broken bias-disable for
PULL_PU_PD_RSEL_TYPE (git-fixes).
* pinctrl: rockchip: correct RK3328 iomux width flag for GPIO2-B pins (git-
fixes).
* pinctrl: single: fix potential NULL dereference in pcs_get_function() (git-
fixes).
* pinctrl: starfive: jh7110: Correct the level trigger configuration of iev
register (git-fixes).
* platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git-
fixes).
* platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git-
fixes).
* platform/surface: aggregator: Fix warning when controller is destroyed in
probe (git-fixes).
* platform/x86/amd/hsmp: Add support for ACPI based probing (jsc#PED-8779).
* platform/x86/amd/hsmp: Cache pci_dev in struct hsmp_socket (jsc#PED-8779).
* platform/x86/amd/hsmp: Change devm_kzalloc() to devm_kcalloc()
(jsc#PED-8779).
* platform/x86/amd/hsmp: Check HSMP support on AMD family of processors
(jsc#PED-8779).
* platform/x86/amd/hsmp: Check num_sockets against MAX_AMD_SOCKETS
(jsc#PED-8779).
* platform/x86/amd/hsmp: Create static func to handle platdev (jsc#PED-8779).
* platform/x86/amd/hsmp: Define a struct to hold mailbox regs (jsc#PED-8779).
* platform/x86/amd/hsmp: Move dev from platdev to hsmp_socket (jsc#PED-8779).
* platform/x86/amd/hsmp: Move hsmp_test to probe (jsc#PED-8779).
* platform/x86/amd/hsmp: Non-ACPI support for AMD F1A_M00~0Fh (jsc#PED-8779).
* platform/x86/amd/hsmp: Remove extra parenthesis and add a space
(jsc#PED-8779).
* platform/x86/amd/hsmp: Restructure sysfs group creation (jsc#PED-8779).
* platform/x86/amd/hsmp: switch to use device_add_groups() (jsc#PED-8779).
* platform/x86/intel/ifs: Initialize union ifs_status to zero (git-fixes).
* platform/x86: lg-laptop: fix %s null argument warning (stable-fixes).
* power: supply: axp288_charger: Fix constant_charge_voltage writes (git-
fixes).
* power: supply: axp288_charger: Round constant_charge_voltage writes down
(git-fixes).
* power: supply: qcom_battmgr: return EAGAIN when firmware service is not up
(git-fixes).
* powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for CONFIG_PCI=n
(bsc#1194869).
* powerpc/io: Avoid clang null pointer arithmetic warnings (bsc#1194869).
* powerpc/kexec: make the update_cpus_node() function public (bsc#1194869).
* powerpc/kexec: split CONFIG_KEXEC_FILE and CONFIG_CRASH_DUMP (bsc#1194869).
* powerpc/kexec_file: fix cpus node update to FDT (bsc#1194869).
* powerpc/pseries: Add failure related checks for h_get_mpp and h_get_ppp
(bsc#1194869).
* powerpc/pseries: Whitelist dtl slub object for copying to userspace
(bsc#1194869).
* powerpc/radix: Move some functions into #ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE
(bsc#1194869).
* powerpc/topology: Check if a core is online (bsc#1214285 bsc#1205462
ltc#200161 ltc#200588 git-fixes).
* powerpc/xmon: Check cpu id in commands "c#", "dp#" and "dx#" (bsc#1194869).
* powerpc: fix a file leak in kvm_vcpu_ioctl_enable_cap() (bsc#1194869).
* powerpc: xor_vmx: Add '-mhard-float' to CFLAGS (bsc#1194869).
* printk/panic: Allow cpu backtraces to be written into ringbuffer during
panic (bsc#1225607).
* reiserfs: fix uninit-value in comp_keys (git-fixes).
* rtc: nct3018y: fix possible NULL dereference (stable-fixes).
* s390/cpum_cf: Fix endless loop in CF_DIAG event stop (git-fixes
bsc#1229171).
* s390/dasd: fix error checks in dasd_copy_pair_store() (git-fixes
bsc#1229173).
* s390/dasd: fix error recovery leading to data corruption on ESE devices
(git-fixes bsc#1229452).
* s390/pci: Add missing virt_to_phys() for directed DIBV (git-fixes
bsc#1229174).
* s390/pci: Allow allocation of more than 1 MSI interrupt (git-fixes
bsc#1229172).
* s390/pci: Refactor arch_setup_msi_irqs() (git-fixes bsc#1229172).
* s390/pkey: harmonize pkey s390 debug feature calls (bsc#1228720).
* s390/pkey: introduce dynamic debugging for pkey (bsc#1228720).
* s390/sclp: Prevent release of buffer in I/O (git-fixes bsc#1229169).
* s390/uv: Panic for set and remove shared access UVC errors (git-fixes
bsc#1229170).
* samples/bpf: syscall_tp_user: Fix array out-of-bound access (git-fixes).
* samples/bpf: syscall_tp_user: Rename num_progs into nr_tests (git-fixes).
* sbitmap: use READ_ONCE to access map->word (stable-fixes).
* scsi: lpfc: Allow DEVICE_RECOVERY mode after RSCN receipt if in PRLI_ISSUE
state (bsc#1228857).
* scsi: lpfc: Cancel ELS WQE instead of issuing abort when SLI port is
inactive (bsc#1228857).
* scsi: lpfc: Fix handling of fully recovered fabric node in dev_loss callbk
(bsc#1228857).
* scsi: lpfc: Fix incorrect request len mbox field when setting trunking via
sysfs (bsc#1228857).
* scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info (bsc#1228857).
* scsi: lpfc: Relax PRLI issue conditions after GID_FT response (bsc#1228857).
* scsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian macro
usages (bsc#1228857).
* scsi: lpfc: Update lpfc version to 14.4.0.3 (bsc#1228857).
* scsi: qla2xxx: Avoid possible run-time warning with long model_num
(bsc#1228850).
* scsi: qla2xxx: Complete command early within lock (bsc#1228850).
* scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).
* scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).
* scsi: qla2xxx: During vport delete send async logout explicitly
(bsc#1228850).
* scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850).
* scsi: qla2xxx: Fix flash read failure (bsc#1228850).
* scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850).
* scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850).
* scsi: qla2xxx: Indent help text (bsc#1228850).
* scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850).
* scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850).
* scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds
(bsc#1228850).
* scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850).
* scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850).
* scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850).
* scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850).
* selftest/bpf: Add map_in_maps with BPF_MAP_TYPE_PERF_EVENT_ARRAY values
(git-fixes).
* selftests/bpf: Add a test to verify previous stacksafe() fix (bsc#1225903).
* selftests/bpf: Add assert for user stacks in test_task_stack (git-fixes).
* selftests/bpf: Add netkit to tc_redirect selftest (git-fixes).
* selftests/bpf: De-veth-ize the tc_redirect test case (git-fixes).
* selftests/bpf: Disable IPv6 for lwt_redirect test (git-fixes).
* selftests/bpf: Fix erroneous bitmask operation (git-fixes).
* selftests/bpf: Fix issues in setup_classid_environment() (git-fixes).
* selftests/bpf: Fix potential premature unload in bpf_testmod (git-fixes).
* selftests/bpf: Fix pyperf180 compilation failure with clang18 (git-fixes).
* selftests/bpf: Fix the flaky tc_redirect_dtime test (git-fixes).
* selftests/bpf: Fix up xdp bonding test wrt feature flags (git-fixes).
* selftests/bpf: Make linked_list failure test more robust (git-fixes).
* selftests/bpf: Relax time_tai test for equal timestamps in tai_forward (git-
fixes).
* selftests/bpf: Skip module_fentry_shadow test when bpf_testmod is not
available (git-fixes).
* selftests/bpf: Wait for the netstamp_needed_key static key to be turned on
(git-fixes).
* selftests/bpf: fix RELEASE=1 build for tc_opts (git-fixes).
* selftests/bpf: fix bpf_loop_bench for new callback verification scheme (git-
fixes).
* selftests/bpf: fix compiler warnings in RELEASE=1 mode (git-fixes).
* selftests/bpf: satisfy compiler by having explicit return in btf test (git-
fixes).
* serial: core: check uartclk for zero to avoid divide by zero (stable-fixes).
* soc: qcom: cmd-db: Map shared memory as WC, not WB (git-fixes).
* soc: qcom: pmic_glink: Actually communicate when remote goes down (git-
fixes).
* soundwire: stream: fix programming slave ports for non-continous port maps
(git-fixes).
* spi: Add empty versions of ACPI functions (stable-fixes).
* spi: microchip-core: fix init function not setting the master and motorola
modes (git-fixes).
* spi: microchip-core: switch to use modern name (stable-fixes).
* spi: spi-fsl-lpspi: Fix scldiv calculation (git-fixes).
* spi: spidev: Add missing spi_device_id for bh2228fv (git-fixes).
* squashfs: squashfs_read_data need to check if the length is 0 (git-fixes).
* ssb: Fix division by zero issue in ssb_calc_clock_rate (stable-fixes).
* staging: iio: resolver: ad2s1210: fix use before initialization (stable-
fixes).
* staging: ks7010: disable bh on tx_dev_lock (stable-fixes).
* string.h: Introduce memtostr() and memtostr_pad() (bsc#1228849).
* sunrpc: add a struct rpc_stats arg to rpc_create_args (git-fixes).
* swiotlb: do not set total_used to 0 in swiotlb_create_debugfs_files() (git-
fixes).
* swiotlb: fix swiotlb_bounce() to do partial sync's correctly (git-fixes).
* syscalls: fix compat_sys_io_pgetevents_time64 usage (git-fixes).
* thermal/drivers/broadcom: Fix race between removal and clock disable (git-
fixes).
* thermal: bcm2835: Convert to platform remove callback returning void
(stable-fixes).
* thunderbolt: Mark XDomain as unplugged when router is removed (stable-
fixes).
* tools/perf: Fix perf bench epoll to enable the run when some CPU's are
offline (bsc#1227747).
* tools/perf: Fix perf bench futex to enable the run when some CPU's are
offline (bsc#1227747).
* tools/perf: Fix timing issue with parallel threads in perf bench wake-up-
parallel (bsc#1227747).
* tools/resolve_btfids: Fix comparison of distinct pointer types warning in
resolve_btfids (git-fixes).
* tools/resolve_btfids: Fix cross-compilation to non-host endianness (git-
fixes).
* tools/resolve_btfids: Refactor set sorting with types from btf_ids.h (git-
fixes).
* tools/resolve_btfids: fix build with musl libc (git-fixes).
* trace/pid_list: Change gfp flags in pid_list_fill_irq() (git-fixes).
* tracing: Return from tracing_buffers_read() if the file has been closed
(bsc#1229136 git-fixes).
* tty: atmel_serial: use the correct RTS flag (git-fixes).
* tty: serial: fsl_lpuart: mark last busy before uart_add_one_port (git-
fixes).
* usb: cdnsp: fix for Link TRB with TC (git-fixes).
* usb: cdnsp: fix incorrect index in cdnsp_get_hw_deq function (git-fixes).
* usb: core: sysfs: Unmerge @usb3_hardware_lpm_attr_group in
remove_power_attributes() (git-fixes).
* usb: dwc3: core: Skip setting event buffers for host only controllers
(stable-fixes).
* usb: dwc3: omap: add missing depopulate in probe error path (git-fixes).
* usb: dwc3: st: add missing depopulate in probe error path (git-fixes).
* usb: dwc3: st: fix probed platform device ref count on probe error path
(git-fixes).
* usb: gadget: core: Check for unset descriptor (git-fixes).
* usb: gadget: fsl: Increase size of name buffer for endpoints (stable-fixes).
* usb: gadget: u_audio: Check return codes from usb_ep_enable and
config_ep_by_speed (git-fixes).
* usb: gadget: u_serial: Set start_delayed during suspend (git-fixes).
* usb: gadget: uvc: cleanup request when not in correct state (stable-fixes).
* usb: typec: fsa4480: Add support to swap SBU orientation (git-fixes).
* usb: typec: fsa4480: Check if the chip is really there (git-fixes).
* usb: typec: fsa4480: Relax CHIP_ID check (git-fixes).
* usb: typec: fsa4480: add support for Audio Accessory Mode (git-fixes).
* usb: typec: fsa4480: rework mux & switch setup to handle more states (git-
fixes).
* usb: vhci-hcd: Do not drop references before new references are gained
(stable-fixes).
* vfio/pci: fix potential memory leak in vfio_intx_enable() (git-fixes).
* vhost-scsi: Handle vhost_vq_work_queue failures for events (git-fixes).
* vhost-vdpa: switch to use vmf_insert_pfn() in the fault handler (git-fixes).
* vhost/vsock: always initialize seqpacket_allow (git-fixes).
* vhost: Release worker mutex during flushes (git-fixes).
* vhost: Use virtqueue mutex for swapping worker (git-fixes).
* virt: guest_memfd: fix reference leak on hwpoisoned page (git-fixes).
* virtio-crypto: handle config changed by work queue (git-fixes).
* virtio: reenable config if freezing device failed (git-fixes).
* virtio_net: use u64_stats_t infra to avoid data-races (git-fixes).
* virtiofs: forbid newlines in tags (bsc#1229940).
* wifi: ath12k: fix memory leak in ath12k_dp_rx_peer_frag_setup() (stable-
fixes).
* wifi: ath12k: fix soft lockup on suspend (git-fixes).
* wifi: brcmfmac: cfg80211: Handle SSID based pmksa deletion (git-fixes).
* wifi: cfg80211: fix reporting failed MLO links status with
cfg80211_connect_done (git-fixes).
* wifi: iwlwifi: fw: fix wgds rev 3 exact size (git-fixes).
* wifi: mac80211: use monitor sdata with driver only if desired (git-fixes).
* wifi: mwifiex: duplicate static structs used in driver instances (git-
fixes).
* wifi: nl80211: disallow setting special AP channel widths (stable-fixes).
* wifi: nl80211: do not give key data to userspace (stable-fixes).
* wifi: rtw88: usb: Fix disconnection after beacon loss (stable-fixes).
* wifi: wfx: repair open network AP mode (git-fixes).
* workqueue: Improve scalability of workqueue watchdog touch (bsc#1193454).
* workqueue: wq_watchdog_touch is always called with valid CPU (bsc#1193454).
* x86/asm: Use %c/%n instead of %P operand modifier in asm templates (git-
fixes).
* x86/entry/64: Remove obsolete comment on tracing vs. SYSRET (git-fixes).
* x86/mm: Fix pti_clone_entry_text() for i386 (git-fixes).
* x86/mm: Fix pti_clone_pgtable() alignment assumption (git-fixes).
* x86/mtrr: Check if fixed MTRRs exist before saving them (git-fixes).
* x86/numa: Fix SRAT lookup of CFMWS ranges with numa_fill_memblks() (git-
fixes).
* x86/numa: Fix the address overlap check in numa_fill_memblks() (git-fixes).
* x86/numa: Fix the sort compare func used in numa_fill_memblks() (git-fixes).
* x86/numa: Introduce numa_fill_memblks() (git-fixes).
* x86/pci: Skip early E820 check for ECAM region (git-fixes).
* x86/xen: Convert comma to semicolon (git-fixes).
* xfs: Fix missing interval for missing_owner in xfs fsmap (git-fixes).
* xfs: Fix the owner setting issue for rmap query in xfs fsmap (git-fixes).
* xfs: allow cross-linking special files without project quota (git-fixes).
* xfs: allow symlinks with short remote targets (bsc#1229160).
* xfs: allow unlinked symlinks and dirs with zero size (git-fixes).
* xfs: attr forks require attr, not attr2 (git-fixes).
* xfs: convert comma to semicolon (git-fixes).
* xfs: do not use current->journal_info (git-fixes).
* xfs: fix unlink vs cluster buffer instantiation race (git-fixes).
* xfs: honor init_xattrs in xfs_init_new_inode for !ATTR fs (git-fixes).
* xfs: journal geometry is not properly bounds checked (git-fixes).
* xfs: match lock mode in xfs_buffered_write_iomap_begin() (git-fixes).
* xfs: require XFS_SB_FEAT_INCOMPAT_LOG_XATTRS for attr log intent item
recovery (git-fixes).
* xfs: upgrade the extent counters in xfs_reflink_end_cow_extent later (git-
fixes).
* xfs: use XFS_BUF_DADDR_NULL for daddrs in getfsmap code (git-fixes).
* xfs: use consistent uid/gid when grabbing dquots for inodes (git-fixes).
* xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration
(git-fixes).
* xprtrdma: Fix rpcrdma_reqs_reset() (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3383=1 openSUSE-SLE-15.6-2024-3383=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3383=1

* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3383=1

* Legacy Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-3383=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-3383=1
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.

* SUSE Linux Enterprise High Availability Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-3383=1

* SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3383=1

## Package List:

* openSUSE Leap 15.6 (noarch nosrc)
* kernel-docs-6.4.0-150600.23.22.1
* openSUSE Leap 15.6 (noarch)
* kernel-devel-6.4.0-150600.23.22.1
* kernel-macros-6.4.0-150600.23.22.1
* kernel-docs-html-6.4.0-150600.23.22.1
* kernel-source-6.4.0-150600.23.22.1
* kernel-source-vanilla-6.4.0-150600.23.22.1
* openSUSE Leap 15.6 (nosrc ppc64le x86_64)
* kernel-debug-6.4.0-150600.23.22.1
* openSUSE Leap 15.6 (ppc64le x86_64)
* kernel-debug-livepatch-devel-6.4.0-150600.23.22.1
* kernel-debug-devel-6.4.0-150600.23.22.1
* kernel-debug-debugsource-6.4.0-150600.23.22.1
* kernel-debug-devel-debuginfo-6.4.0-150600.23.22.1
* kernel-debug-debuginfo-6.4.0-150600.23.22.1
* openSUSE Leap 15.6 (x86_64)
* kernel-debug-vdso-debuginfo-6.4.0-150600.23.22.1
* kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.22.1
* kernel-debug-vdso-6.4.0-150600.23.22.1
* kernel-default-vdso-6.4.0-150600.23.22.1
* kernel-kvmsmall-vdso-6.4.0-150600.23.22.1
* kernel-default-vdso-debuginfo-6.4.0-150600.23.22.1
* openSUSE Leap 15.6 (aarch64 ppc64le x86_64)
* kernel-default-base-6.4.0-150600.23.22.1.150600.12.8.3
* kernel-kvmsmall-devel-6.4.0-150600.23.22.1
* kernel-kvmsmall-livepatch-devel-6.4.0-150600.23.22.1
* kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.22.1
* kernel-kvmsmall-debugsource-6.4.0-150600.23.22.1
* kernel-kvmsmall-debuginfo-6.4.0-150600.23.22.1
* kernel-default-base-rebuild-6.4.0-150600.23.22.1.150600.12.8.3
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kernel-syms-6.4.0-150600.23.22.1
* kernel-default-extra-6.4.0-150600.23.22.1
* cluster-md-kmp-default-6.4.0-150600.23.22.1
* dlm-kmp-default-6.4.0-150600.23.22.1
* kernel-default-optional-6.4.0-150600.23.22.1
* kernel-obs-build-debugsource-6.4.0-150600.23.22.1
* kernel-default-livepatch-6.4.0-150600.23.22.1
* ocfs2-kmp-default-debuginfo-6.4.0-150600.23.22.1
* kernel-default-livepatch-devel-6.4.0-150600.23.22.1
* reiserfs-kmp-default-debuginfo-6.4.0-150600.23.22.1
* kernel-default-debuginfo-6.4.0-150600.23.22.1
* kernel-default-optional-debuginfo-6.4.0-150600.23.22.1
* kselftests-kmp-default-debuginfo-6.4.0-150600.23.22.1
* kernel-default-devel-debuginfo-6.4.0-150600.23.22.1
* kselftests-kmp-default-6.4.0-150600.23.22.1
* ocfs2-kmp-default-6.4.0-150600.23.22.1
* kernel-obs-build-6.4.0-150600.23.22.1
* cluster-md-kmp-default-debuginfo-6.4.0-150600.23.22.1
* kernel-default-extra-debuginfo-6.4.0-150600.23.22.1
* kernel-default-devel-6.4.0-150600.23.22.1
* dlm-kmp-default-debuginfo-6.4.0-150600.23.22.1
* gfs2-kmp-default-6.4.0-150600.23.22.1
* gfs2-kmp-default-debuginfo-6.4.0-150600.23.22.1
* reiserfs-kmp-default-6.4.0-150600.23.22.1
* kernel-obs-qa-6.4.0-150600.23.22.1
* kernel-default-debugsource-6.4.0-150600.23.22.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-6.4.0-150600.23.22.1
* openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-6.4.0-150600.23.22.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_4-debugsource-1-150600.13.3.3
* kernel-livepatch-6_4_0-150600_23_22-default-debuginfo-1-150600.13.3.3
* kernel-livepatch-6_4_0-150600_23_22-default-1-150600.13.3.3
* openSUSE Leap 15.6 (nosrc s390x)
* kernel-zfcpdump-6.4.0-150600.23.22.1
* openSUSE Leap 15.6 (s390x)
* kernel-zfcpdump-debuginfo-6.4.0-150600.23.22.1
* kernel-zfcpdump-debugsource-6.4.0-150600.23.22.1
* openSUSE Leap 15.6 (nosrc)
* dtb-aarch64-6.4.0-150600.23.22.1
* openSUSE Leap 15.6 (aarch64)
* kernel-64kb-extra-6.4.0-150600.23.22.1
* kselftests-kmp-64kb-6.4.0-150600.23.22.1
* dtb-apple-6.4.0-150600.23.22.1
* kernel-64kb-devel-debuginfo-6.4.0-150600.23.22.1
* dlm-kmp-64kb-6.4.0-150600.23.22.1
* kernel-64kb-debugsource-6.4.0-150600.23.22.1
* kernel-64kb-debuginfo-6.4.0-150600.23.22.1
* dtb-arm-6.4.0-150600.23.22.1
* kernel-64kb-optional-6.4.0-150600.23.22.1
* kernel-64kb-extra-debuginfo-6.4.0-150600.23.22.1
* dtb-allwinner-6.4.0-150600.23.22.1
* dtb-broadcom-6.4.0-150600.23.22.1
* dtb-qcom-6.4.0-150600.23.22.1
* dtb-amd-6.4.0-150600.23.22.1
* kernel-64kb-livepatch-devel-6.4.0-150600.23.22.1
* ocfs2-kmp-64kb-6.4.0-150600.23.22.1
* dtb-amazon-6.4.0-150600.23.22.1
* kernel-64kb-devel-6.4.0-150600.23.22.1
* dtb-hisilicon-6.4.0-150600.23.22.1
* gfs2-kmp-64kb-6.4.0-150600.23.22.1
* cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.22.1
* dlm-kmp-64kb-debuginfo-6.4.0-150600.23.22.1
* dtb-renesas-6.4.0-150600.23.22.1
* dtb-sprd-6.4.0-150600.23.22.1
* dtb-nvidia-6.4.0-150600.23.22.1
* dtb-apm-6.4.0-150600.23.22.1
* ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.22.1
* gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.22.1
* dtb-altera-6.4.0-150600.23.22.1
* dtb-amlogic-6.4.0-150600.23.22.1
* dtb-lg-6.4.0-150600.23.22.1
* dtb-xilinx-6.4.0-150600.23.22.1
* kernel-64kb-optional-debuginfo-6.4.0-150600.23.22.1
* dtb-marvell-6.4.0-150600.23.22.1
* reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.22.1
* dtb-freescale-6.4.0-150600.23.22.1
* dtb-cavium-6.4.0-150600.23.22.1
* cluster-md-kmp-64kb-6.4.0-150600.23.22.1
* kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.22.1
* dtb-rockchip-6.4.0-150600.23.22.1
* dtb-mediatek-6.4.0-150600.23.22.1
* reiserfs-kmp-64kb-6.4.0-150600.23.22.1
* dtb-exynos-6.4.0-150600.23.22.1
* dtb-socionext-6.4.0-150600.23.22.1
* openSUSE Leap 15.6 (aarch64 nosrc)
* kernel-64kb-6.4.0-150600.23.22.1
* Basesystem Module 15-SP6 (aarch64 nosrc)
* kernel-64kb-6.4.0-150600.23.22.1
* Basesystem Module 15-SP6 (aarch64)
* kernel-64kb-debugsource-6.4.0-150600.23.22.1
* kernel-64kb-debuginfo-6.4.0-150600.23.22.1
* kernel-64kb-devel-6.4.0-150600.23.22.1
* kernel-64kb-devel-debuginfo-6.4.0-150600.23.22.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-6.4.0-150600.23.22.1
* Basesystem Module 15-SP6 (aarch64 ppc64le x86_64)
* kernel-default-base-6.4.0-150600.23.22.1.150600.12.8.3
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kernel-default-devel-debuginfo-6.4.0-150600.23.22.1
* kernel-default-debuginfo-6.4.0-150600.23.22.1
* kernel-default-devel-6.4.0-150600.23.22.1
* kernel-default-debugsource-6.4.0-150600.23.22.1
* Basesystem Module 15-SP6 (noarch)
* kernel-devel-6.4.0-150600.23.22.1
* kernel-macros-6.4.0-150600.23.22.1
* Basesystem Module 15-SP6 (nosrc s390x)
* kernel-zfcpdump-6.4.0-150600.23.22.1
* Basesystem Module 15-SP6 (s390x)
* kernel-zfcpdump-debuginfo-6.4.0-150600.23.22.1
* kernel-zfcpdump-debugsource-6.4.0-150600.23.22.1
* Development Tools Module 15-SP6 (noarch nosrc)
* kernel-docs-6.4.0-150600.23.22.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kernel-obs-build-6.4.0-150600.23.22.1
* kernel-syms-6.4.0-150600.23.22.1
* kernel-obs-build-debugsource-6.4.0-150600.23.22.1
* Development Tools Module 15-SP6 (noarch)
* kernel-source-6.4.0-150600.23.22.1
* Legacy Module 15-SP6 (nosrc)
* kernel-default-6.4.0-150600.23.22.1
* Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* reiserfs-kmp-default-6.4.0-150600.23.22.1
* kernel-default-debuginfo-6.4.0-150600.23.22.1
* reiserfs-kmp-default-debuginfo-6.4.0-150600.23.22.1
* kernel-default-debugsource-6.4.0-150600.23.22.1
* SUSE Linux Enterprise Live Patching 15-SP6 (nosrc)
* kernel-default-6.4.0-150600.23.22.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-default-livepatch-6.4.0-150600.23.22.1
* kernel-default-livepatch-devel-6.4.0-150600.23.22.1
* kernel-livepatch-6_4_0-150600_23_22-default-debuginfo-1-150600.13.3.3
* kernel-default-debuginfo-6.4.0-150600.23.22.1
* kernel-livepatch-SLE15-SP6_Update_4-debugsource-1-150600.13.3.3
* kernel-livepatch-6_4_0-150600_23_22-default-1-150600.13.3.3
* kernel-default-debugsource-6.4.0-150600.23.22.1
* SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le
s390x x86_64)
* ocfs2-kmp-default-debuginfo-6.4.0-150600.23.22.1
* dlm-kmp-default-debuginfo-6.4.0-150600.23.22.1
* gfs2-kmp-default-6.4.0-150600.23.22.1
* gfs2-kmp-default-debuginfo-6.4.0-150600.23.22.1
* cluster-md-kmp-default-debuginfo-6.4.0-150600.23.22.1
* kernel-default-debuginfo-6.4.0-150600.23.22.1
* ocfs2-kmp-default-6.4.0-150600.23.22.1
* cluster-md-kmp-default-6.4.0-150600.23.22.1
* dlm-kmp-default-6.4.0-150600.23.22.1
* kernel-default-debugsource-6.4.0-150600.23.22.1
* SUSE Linux Enterprise High Availability Extension 15 SP6 (nosrc)
* kernel-default-6.4.0-150600.23.22.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (nosrc)
* kernel-default-6.4.0-150600.23.22.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
* kernel-default-extra-debuginfo-6.4.0-150600.23.22.1
* kernel-default-debuginfo-6.4.0-150600.23.22.1
* kernel-default-extra-6.4.0-150600.23.22.1
* kernel-default-debugsource-6.4.0-150600.23.22.1

## References:

* https://www.suse.com/security/cve/CVE-2023-52489.html
* https://www.suse.com/security/cve/CVE-2023-52581.html
* https://www.suse.com/security/cve/CVE-2023-52668.html
* https://www.suse.com/security/cve/CVE-2023-52688.html
* https://www.suse.com/security/cve/CVE-2023-52735.html
* https://www.suse.com/security/cve/CVE-2023-52859.html
* https://www.suse.com/security/cve/CVE-2023-52885.html
* https://www.suse.com/security/cve/CVE-2023-52886.html
* https://www.suse.com/security/cve/CVE-2023-52887.html
* https://www.suse.com/security/cve/CVE-2023-52889.html
* https://www.suse.com/security/cve/CVE-2024-26590.html
* https://www.suse.com/security/cve/CVE-2024-26631.html
* https://www.suse.com/security/cve/CVE-2024-26637.html
* https://www.suse.com/security/cve/CVE-2024-26668.html
* https://www.suse.com/security/cve/CVE-2024-26669.html
* https://www.suse.com/security/cve/CVE-2024-26677.html
* https://www.suse.com/security/cve/CVE-2024-26682.html
* https://www.suse.com/security/cve/CVE-2024-26683.html
* https://www.suse.com/security/cve/CVE-2024-26691.html
* https://www.suse.com/security/cve/CVE-2024-26735.html
* https://www.suse.com/security/cve/CVE-2024-26808.html
* https://www.suse.com/security/cve/CVE-2024-26809.html
* https://www.suse.com/security/cve/CVE-2024-26812.html
* https://www.suse.com/security/cve/CVE-2024-26835.html
* https://www.suse.com/security/cve/CVE-2024-26837.html
* https://www.suse.com/security/cve/CVE-2024-26849.html
* https://www.suse.com/security/cve/CVE-2024-26851.html
* https://www.suse.com/security/cve/CVE-2024-26889.html
* https://www.suse.com/security/cve/CVE-2024-26920.html
* https://www.suse.com/security/cve/CVE-2024-26944.html
* https://www.suse.com/security/cve/CVE-2024-26976.html
* https://www.suse.com/security/cve/CVE-2024-27010.html
* https://www.suse.com/security/cve/CVE-2024-27011.html
* https://www.suse.com/security/cve/CVE-2024-27024.html
* https://www.suse.com/security/cve/CVE-2024-27049.html
* https://www.suse.com/security/cve/CVE-2024-27050.html
* https://www.suse.com/security/cve/CVE-2024-27079.html
* https://www.suse.com/security/cve/CVE-2024-27403.html
* https://www.suse.com/security/cve/CVE-2024-27433.html
* https://www.suse.com/security/cve/CVE-2024-27437.html
* https://www.suse.com/security/cve/CVE-2024-31076.html
* https://www.suse.com/security/cve/CVE-2024-35854.html
* https://www.suse.com/security/cve/CVE-2024-35855.html
* https://www.suse.com/security/cve/CVE-2024-35897.html
* https://www.suse.com/security/cve/CVE-2024-35902.html
* https://www.suse.com/security/cve/CVE-2024-35913.html
* https://www.suse.com/security/cve/CVE-2024-35939.html
* https://www.suse.com/security/cve/CVE-2024-35949.html
* https://www.suse.com/security/cve/CVE-2024-36270.html
* https://www.suse.com/security/cve/CVE-2024-36286.html
* https://www.suse.com/security/cve/CVE-2024-36288.html
* https://www.suse.com/security/cve/CVE-2024-36489.html
* https://www.suse.com/security/cve/CVE-2024-36881.html
* https://www.suse.com/security/cve/CVE-2024-36907.html
* https://www.suse.com/security/cve/CVE-2024-36909.html
* https://www.suse.com/security/cve/CVE-2024-36910.html
* https://www.suse.com/security/cve/CVE-2024-36911.html
* https://www.suse.com/security/cve/CVE-2024-36929.html
* https://www.suse.com/security/cve/CVE-2024-36933.html
* https://www.suse.com/security/cve/CVE-2024-36939.html
* https://www.suse.com/security/cve/CVE-2024-36970.html
* https://www.suse.com/security/cve/CVE-2024-36979.html
* https://www.suse.com/security/cve/CVE-2024-38548.html
* https://www.suse.com/security/cve/CVE-2024-38563.html
* https://www.suse.com/security/cve/CVE-2024-38609.html
* https://www.suse.com/security/cve/CVE-2024-38662.html
* https://www.suse.com/security/cve/CVE-2024-39476.html
* https://www.suse.com/security/cve/CVE-2024-39483.html
* https://www.suse.com/security/cve/CVE-2024-39484.html
* https://www.suse.com/security/cve/CVE-2024-39486.html
* https://www.suse.com/security/cve/CVE-2024-39488.html
* https://www.suse.com/security/cve/CVE-2024-39489.html
* https://www.suse.com/security/cve/CVE-2024-39491.html
* https://www.suse.com/security/cve/CVE-2024-39493.html
* https://www.suse.com/security/cve/CVE-2024-39497.html
* https://www.suse.com/security/cve/CVE-2024-39499.html
* https://www.suse.com/security/cve/CVE-2024-39500.html
* https://www.suse.com/security/cve/CVE-2024-39501.html
* https://www.suse.com/security/cve/CVE-2024-39505.html
* https://www.suse.com/security/cve/CVE-2024-39506.html
* https://www.suse.com/security/cve/CVE-2024-39508.html
* https://www.suse.com/security/cve/CVE-2024-39509.html
* https://www.suse.com/security/cve/CVE-2024-39510.html
* https://www.suse.com/security/cve/CVE-2024-40899.html
* https://www.suse.com/security/cve/CVE-2024-40900.html
* https://www.suse.com/security/cve/CVE-2024-40902.html
* https://www.suse.com/security/cve/CVE-2024-40903.html
* https://www.suse.com/security/cve/CVE-2024-40904.html
* https://www.suse.com/security/cve/CVE-2024-40905.html
* https://www.suse.com/security/cve/CVE-2024-40909.html
* https://www.suse.com/security/cve/CVE-2024-40910.html
* https://www.suse.com/security/cve/CVE-2024-40911.html
* https://www.suse.com/security/cve/CVE-2024-40912.html
* https://www.suse.com/security/cve/CVE-2024-40913.html
* https://www.suse.com/security/cve/CVE-2024-40916.html
* https://www.suse.com/security/cve/CVE-2024-40920.html
* https://www.suse.com/security/cve/CVE-2024-40921.html
* https://www.suse.com/security/cve/CVE-2024-40922.html
* https://www.suse.com/security/cve/CVE-2024-40924.html
* https://www.suse.com/security/cve/CVE-2024-40926.html
* https://www.suse.com/security/cve/CVE-2024-40927.html
* https://www.suse.com/security/cve/CVE-2024-40929.html
* https://www.suse.com/security/cve/CVE-2024-40930.html
* https://www.suse.com/security/cve/CVE-2024-40932.html
* https://www.suse.com/security/cve/CVE-2024-40934.html
* https://www.suse.com/security/cve/CVE-2024-40936.html
* https://www.suse.com/security/cve/CVE-2024-40938.html
* https://www.suse.com/security/cve/CVE-2024-40939.html
* https://www.suse.com/security/cve/CVE-2024-40941.html
* https://www.suse.com/security/cve/CVE-2024-40942.html
* https://www.suse.com/security/cve/CVE-2024-40943.html
* https://www.suse.com/security/cve/CVE-2024-40944.html
* https://www.suse.com/security/cve/CVE-2024-40945.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-40956.html
* https://www.suse.com/security/cve/CVE-2024-40957.html
* https://www.suse.com/security/cve/CVE-2024-40958.html
* https://www.suse.com/security/cve/CVE-2024-40959.html
* https://www.suse.com/security/cve/CVE-2024-40962.html
* https://www.suse.com/security/cve/CVE-2024-40964.html
* https://www.suse.com/security/cve/CVE-2024-40967.html
* https://www.suse.com/security/cve/CVE-2024-40976.html
* https://www.suse.com/security/cve/CVE-2024-40977.html
* https://www.suse.com/security/cve/CVE-2024-40978.html
* https://www.suse.com/security/cve/CVE-2024-40981.html
* https://www.suse.com/security/cve/CVE-2024-40982.html
* https://www.suse.com/security/cve/CVE-2024-40984.html
* https://www.suse.com/security/cve/CVE-2024-40987.html
* https://www.suse.com/security/cve/CVE-2024-40988.html
* https://www.suse.com/security/cve/CVE-2024-40989.html
* https://www.suse.com/security/cve/CVE-2024-40990.html
* https://www.suse.com/security/cve/CVE-2024-40992.html
* https://www.suse.com/security/cve/CVE-2024-40994.html
* https://www.suse.com/security/cve/CVE-2024-40995.html
* https://www.suse.com/security/cve/CVE-2024-40997.html
* https://www.suse.com/security/cve/CVE-2024-41000.html
* https://www.suse.com/security/cve/CVE-2024-41001.html
* https://www.suse.com/security/cve/CVE-2024-41002.html
* https://www.suse.com/security/cve/CVE-2024-41004.html
* https://www.suse.com/security/cve/CVE-2024-41007.html
* https://www.suse.com/security/cve/CVE-2024-41009.html
* https://www.suse.com/security/cve/CVE-2024-41010.html
* https://www.suse.com/security/cve/CVE-2024-41011.html
* https://www.suse.com/security/cve/CVE-2024-41012.html
* https://www.suse.com/security/cve/CVE-2024-41015.html
* https://www.suse.com/security/cve/CVE-2024-41016.html
* https://www.suse.com/security/cve/CVE-2024-41020.html
* https://www.suse.com/security/cve/CVE-2024-41022.html
* https://www.suse.com/security/cve/CVE-2024-41024.html
* https://www.suse.com/security/cve/CVE-2024-41025.html
* https://www.suse.com/security/cve/CVE-2024-41028.html
* https://www.suse.com/security/cve/CVE-2024-41032.html
* https://www.suse.com/security/cve/CVE-2024-41035.html
* https://www.suse.com/security/cve/CVE-2024-41036.html
* https://www.suse.com/security/cve/CVE-2024-41037.html
* https://www.suse.com/security/cve/CVE-2024-41038.html
* https://www.suse.com/security/cve/CVE-2024-41039.html
* https://www.suse.com/security/cve/CVE-2024-41040.html
* https://www.suse.com/security/cve/CVE-2024-41041.html
* https://www.suse.com/security/cve/CVE-2024-41044.html
* https://www.suse.com/security/cve/CVE-2024-41045.html
* https://www.suse.com/security/cve/CVE-2024-41048.html
* https://www.suse.com/security/cve/CVE-2024-41049.html
* https://www.suse.com/security/cve/CVE-2024-41050.html
* https://www.suse.com/security/cve/CVE-2024-41051.html
* https://www.suse.com/security/cve/CVE-2024-41056.html
* https://www.suse.com/security/cve/CVE-2024-41057.html
* https://www.suse.com/security/cve/CVE-2024-41058.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-41060.html
* https://www.suse.com/security/cve/CVE-2024-41061.html
* https://www.suse.com/security/cve/CVE-2024-41062.html
* https://www.suse.com/security/cve/CVE-2024-41063.html
* https://www.suse.com/security/cve/CVE-2024-41064.html
* https://www.suse.com/security/cve/CVE-2024-41065.html
* https://www.suse.com/security/cve/CVE-2024-41066.html
* https://www.suse.com/security/cve/CVE-2024-41068.html
* https://www.suse.com/security/cve/CVE-2024-41069.html
* https://www.suse.com/security/cve/CVE-2024-41070.html
* https://www.suse.com/security/cve/CVE-2024-41071.html
* https://www.suse.com/security/cve/CVE-2024-41072.html
* https://www.suse.com/security/cve/CVE-2024-41073.html
* https://www.suse.com/security/cve/CVE-2024-41074.html
* https://www.suse.com/security/cve/CVE-2024-41075.html
* https://www.suse.com/security/cve/CVE-2024-41076.html
* https://www.suse.com/security/cve/CVE-2024-41078.html
* https://www.suse.com/security/cve/CVE-2024-41079.html
* https://www.suse.com/security/cve/CVE-2024-41080.html
* https://www.suse.com/security/cve/CVE-2024-41081.html
* https://www.suse.com/security/cve/CVE-2024-41084.html
* https://www.suse.com/security/cve/CVE-2024-41087.html
* https://www.suse.com/security/cve/CVE-2024-41088.html
* https://www.suse.com/security/cve/CVE-2024-41089.html
* https://www.suse.com/security/cve/CVE-2024-41092.html
* https://www.suse.com/security/cve/CVE-2024-41093.html
* https://www.suse.com/security/cve/CVE-2024-41094.html
* https://www.suse.com/security/cve/CVE-2024-41095.html
* https://www.suse.com/security/cve/CVE-2024-41096.html
* https://www.suse.com/security/cve/CVE-2024-41097.html
* https://www.suse.com/security/cve/CVE-2024-41098.html
* https://www.suse.com/security/cve/CVE-2024-42064.html
* https://www.suse.com/security/cve/CVE-2024-42069.html
* https://www.suse.com/security/cve/CVE-2024-42070.html
* https://www.suse.com/security/cve/CVE-2024-42073.html
* https://www.suse.com/security/cve/CVE-2024-42074.html
* https://www.suse.com/security/cve/CVE-2024-42076.html
* https://www.suse.com/security/cve/CVE-2024-42077.html
* https://www.suse.com/security/cve/CVE-2024-42079.html
* https://www.suse.com/security/cve/CVE-2024-42080.html
* https://www.suse.com/security/cve/CVE-2024-42082.html
* https://www.suse.com/security/cve/CVE-2024-42085.html
* https://www.suse.com/security/cve/CVE-2024-42086.html
* https://www.suse.com/security/cve/CVE-2024-42087.html
* https://www.suse.com/security/cve/CVE-2024-42089.html
* https://www.suse.com/security/cve/CVE-2024-42090.html
* https://www.suse.com/security/cve/CVE-2024-42092.html
* https://www.suse.com/security/cve/CVE-2024-42093.html
* https://www.suse.com/security/cve/CVE-2024-42095.html
* https://www.suse.com/security/cve/CVE-2024-42096.html
* https://www.suse.com/security/cve/CVE-2024-42097.html
* https://www.suse.com/security/cve/CVE-2024-42098.html
* https://www.suse.com/security/cve/CVE-2024-42101.html
* https://www.suse.com/security/cve/CVE-2024-42104.html
* https://www.suse.com/security/cve/CVE-2024-42105.html
* https://www.suse.com/security/cve/CVE-2024-42106.html
* https://www.suse.com/security/cve/CVE-2024-42107.html
* https://www.suse.com/security/cve/CVE-2024-42109.html
* https://www.suse.com/security/cve/CVE-2024-42110.html
* https://www.suse.com/security/cve/CVE-2024-42113.html
* https://www.suse.com/security/cve/CVE-2024-42114.html
* https://www.suse.com/security/cve/CVE-2024-42115.html
* https://www.suse.com/security/cve/CVE-2024-42117.html
* https://www.suse.com/security/cve/CVE-2024-42119.html
* https://www.suse.com/security/cve/CVE-2024-42120.html
* https://www.suse.com/security/cve/CVE-2024-42121.html
* https://www.suse.com/security/cve/CVE-2024-42122.html
* https://www.suse.com/security/cve/CVE-2024-42124.html
* https://www.suse.com/security/cve/CVE-2024-42125.html
* https://www.suse.com/security/cve/CVE-2024-42126.html
* https://www.suse.com/security/cve/CVE-2024-42127.html
* https://www.suse.com/security/cve/CVE-2024-42130.html
* https://www.suse.com/security/cve/CVE-2024-42131.html
* https://www.suse.com/security/cve/CVE-2024-42132.html
* https://www.suse.com/security/cve/CVE-2024-42133.html
* https://www.suse.com/security/cve/CVE-2024-42136.html
* https://www.suse.com/security/cve/CVE-2024-42137.html
* https://www.suse.com/security/cve/CVE-2024-42138.html
* https://www.suse.com/security/cve/CVE-2024-42139.html
* https://www.suse.com/security/cve/CVE-2024-42141.html
* https://www.suse.com/security/cve/CVE-2024-42142.html
* https://www.suse.com/security/cve/CVE-2024-42143.html
* https://www.suse.com/security/cve/CVE-2024-42144.html
* https://www.suse.com/security/cve/CVE-2024-42145.html
* https://www.suse.com/security/cve/CVE-2024-42147.html
* https://www.suse.com/security/cve/CVE-2024-42148.html
* https://www.suse.com/security/cve/CVE-2024-42152.html
* https://www.suse.com/security/cve/CVE-2024-42153.html
* https://www.suse.com/security/cve/CVE-2024-42155.html
* https://www.suse.com/security/cve/CVE-2024-42156.html
* https://www.suse.com/security/cve/CVE-2024-42157.html
* https://www.suse.com/security/cve/CVE-2024-42158.html
* https://www.suse.com/security/cve/CVE-2024-42159.html
* https://www.suse.com/security/cve/CVE-2024-42161.html
* https://www.suse.com/security/cve/CVE-2024-42162.html
* https://www.suse.com/security/cve/CVE-2024-42223.html
* https://www.suse.com/security/cve/CVE-2024-42224.html
* https://www.suse.com/security/cve/CVE-2024-42225.html
* https://www.suse.com/security/cve/CVE-2024-42226.html
* https://www.suse.com/security/cve/CVE-2024-42227.html
* https://www.suse.com/security/cve/CVE-2024-42228.html
* https://www.suse.com/security/cve/CVE-2024-42229.html
* https://www.suse.com/security/cve/CVE-2024-42230.html
* https://www.suse.com/security/cve/CVE-2024-42232.html
* https://www.suse.com/security/cve/CVE-2024-42236.html
* https://www.suse.com/security/cve/CVE-2024-42237.html
* https://www.suse.com/security/cve/CVE-2024-42238.html
* https://www.suse.com/security/cve/CVE-2024-42239.html
* https://www.suse.com/security/cve/CVE-2024-42240.html
* https://www.suse.com/security/cve/CVE-2024-42241.html
* https://www.suse.com/security/cve/CVE-2024-42244.html
* https://www.suse.com/security/cve/CVE-2024-42245.html
* https://www.suse.com/security/cve/CVE-2024-42246.html
* https://www.suse.com/security/cve/CVE-2024-42247.html
* https://www.suse.com/security/cve/CVE-2024-42250.html
* https://www.suse.com/security/cve/CVE-2024-42253.html
* https://www.suse.com/security/cve/CVE-2024-42259.html
* https://www.suse.com/security/cve/CVE-2024-42268.html
* https://www.suse.com/security/cve/CVE-2024-42269.html
* https://www.suse.com/security/cve/CVE-2024-42270.html
* https://www.suse.com/security/cve/CVE-2024-42271.html
* https://www.suse.com/security/cve/CVE-2024-42274.html
* https://www.suse.com/security/cve/CVE-2024-42276.html
* https://www.suse.com/security/cve/CVE-2024-42277.html
* https://www.suse.com/security/cve/CVE-2024-42278.html
* https://www.suse.com/security/cve/CVE-2024-42279.html
* https://www.suse.com/security/cve/CVE-2024-42280.html
* https://www.suse.com/security/cve/CVE-2024-42281.html
* https://www.suse.com/security/cve/CVE-2024-42283.html
* https://www.suse.com/security/cve/CVE-2024-42284.html
* https://www.suse.com/security/cve/CVE-2024-42285.html
* https://www.suse.com/security/cve/CVE-2024-42286.html
* https://www.suse.com/security/cve/CVE-2024-42287.html
* https://www.suse.com/security/cve/CVE-2024-42288.html
* https://www.suse.com/security/cve/CVE-2024-42289.html
* https://www.suse.com/security/cve/CVE-2024-42290.html
* https://www.suse.com/security/cve/CVE-2024-42291.html
* https://www.suse.com/security/cve/CVE-2024-42292.html
* https://www.suse.com/security/cve/CVE-2024-42295.html
* https://www.suse.com/security/cve/CVE-2024-42298.html
* https://www.suse.com/security/cve/CVE-2024-42301.html
* https://www.suse.com/security/cve/CVE-2024-42302.html
* https://www.suse.com/security/cve/CVE-2024-42303.html
* https://www.suse.com/security/cve/CVE-2024-42308.html
* https://www.suse.com/security/cve/CVE-2024-42309.html
* https://www.suse.com/security/cve/CVE-2024-42310.html
* https://www.suse.com/security/cve/CVE-2024-42311.html
* https://www.suse.com/security/cve/CVE-2024-42312.html
* https://www.suse.com/security/cve/CVE-2024-42313.html
* https://www.suse.com/security/cve/CVE-2024-42314.html
* https://www.suse.com/security/cve/CVE-2024-42315.html
* https://www.suse.com/security/cve/CVE-2024-42316.html
* https://www.suse.com/security/cve/CVE-2024-42318.html
* https://www.suse.com/security/cve/CVE-2024-42319.html
* https://www.suse.com/security/cve/CVE-2024-42320.html
* https://www.suse.com/security/cve/CVE-2024-42322.html
* https://www.suse.com/security/cve/CVE-2024-43816.html
* https://www.suse.com/security/cve/CVE-2024-43817.html
* https://www.suse.com/security/cve/CVE-2024-43818.html
* https://www.suse.com/security/cve/CVE-2024-43819.html
* https://www.suse.com/security/cve/CVE-2024-43821.html
* https://www.suse.com/security/cve/CVE-2024-43823.html
* https://www.suse.com/security/cve/CVE-2024-43824.html
* https://www.suse.com/security/cve/CVE-2024-43825.html
* https://www.suse.com/security/cve/CVE-2024-43826.html
* https://www.suse.com/security/cve/CVE-2024-43829.html
* https://www.suse.com/security/cve/CVE-2024-43830.html
* https://www.suse.com/security/cve/CVE-2024-43831.html
* https://www.suse.com/security/cve/CVE-2024-43833.html
* https://www.suse.com/security/cve/CVE-2024-43834.html
* https://www.suse.com/security/cve/CVE-2024-43837.html
* https://www.suse.com/security/cve/CVE-2024-43839.html
* https://www.suse.com/security/cve/CVE-2024-43840.html
* https://www.suse.com/security/cve/CVE-2024-43841.html
* https://www.suse.com/security/cve/CVE-2024-43842.html
* https://www.suse.com/security/cve/CVE-2024-43846.html
* https://www.suse.com/security/cve/CVE-2024-43847.html
* https://www.suse.com/security/cve/CVE-2024-43849.html
* https://www.suse.com/security/cve/CVE-2024-43850.html
* https://www.suse.com/security/cve/CVE-2024-43851.html
* https://www.suse.com/security/cve/CVE-2024-43853.html
* https://www.suse.com/security/cve/CVE-2024-43854.html
* https://www.suse.com/security/cve/CVE-2024-43855.html
* https://www.suse.com/security/cve/CVE-2024-43856.html
* https://www.suse.com/security/cve/CVE-2024-43858.html
* https://www.suse.com/security/cve/CVE-2024-43860.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://www.suse.com/security/cve/CVE-2024-43863.html
* https://www.suse.com/security/cve/CVE-2024-43864.html
* https://www.suse.com/security/cve/CVE-2024-43866.html
* https://www.suse.com/security/cve/CVE-2024-43867.html
* https://www.suse.com/security/cve/CVE-2024-43871.html
* https://www.suse.com/security/cve/CVE-2024-43872.html
* https://www.suse.com/security/cve/CVE-2024-43873.html
* https://www.suse.com/security/cve/CVE-2024-43874.html
* https://www.suse.com/security/cve/CVE-2024-43875.html
* https://www.suse.com/security/cve/CVE-2024-43876.html
* https://www.suse.com/security/cve/CVE-2024-43877.html
* https://www.suse.com/security/cve/CVE-2024-43879.html
* https://www.suse.com/security/cve/CVE-2024-43880.html
* https://www.suse.com/security/cve/CVE-2024-43881.html
* https://www.suse.com/security/cve/CVE-2024-43882.html
* https://www.suse.com/security/cve/CVE-2024-43883.html
* https://www.suse.com/security/cve/CVE-2024-43884.html
* https://www.suse.com/security/cve/CVE-2024-43885.html
* https://www.suse.com/security/cve/CVE-2024-43889.html
* https://www.suse.com/security/cve/CVE-2024-43892.html
* https://www.suse.com/security/cve/CVE-2024-43893.html
* https://www.suse.com/security/cve/CVE-2024-43894.html
* https://www.suse.com/security/cve/CVE-2024-43895.html
* https://www.suse.com/security/cve/CVE-2024-43897.html
* https://www.suse.com/security/cve/CVE-2024-43899.html
* https://www.suse.com/security/cve/CVE-2024-43900.html
* https://www.suse.com/security/cve/CVE-2024-43902.html
* https://www.suse.com/security/cve/CVE-2024-43903.html
* https://www.suse.com/security/cve/CVE-2024-43905.html
* https://www.suse.com/security/cve/CVE-2024-43906.html
* https://www.suse.com/security/cve/CVE-2024-43907.html
* https://www.suse.com/security/cve/CVE-2024-43908.html
* https://www.suse.com/security/cve/CVE-2024-43909.html
* https://www.suse.com/security/cve/CVE-2024-43911.html
* https://www.suse.com/security/cve/CVE-2024-43912.html
* https://www.suse.com/security/cve/CVE-2024-44931.html
* https://www.suse.com/security/cve/CVE-2024-44938.html
* https://www.suse.com/security/cve/CVE-2024-44939.html
* https://bugzilla.suse.com/show_bug.cgi?id=1012628
* https://bugzilla.suse.com/show_bug.cgi?id=1193454
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1205462
* https://bugzilla.suse.com/show_bug.cgi?id=1208783
* https://bugzilla.suse.com/show_bug.cgi?id=1213123
* https://bugzilla.suse.com/show_bug.cgi?id=1214285
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1220066
* https://bugzilla.suse.com/show_bug.cgi?id=1220252
* https://bugzilla.suse.com/show_bug.cgi?id=1220877
* https://bugzilla.suse.com/show_bug.cgi?id=1221326
* https://bugzilla.suse.com/show_bug.cgi?id=1221630
* https://bugzilla.suse.com/show_bug.cgi?id=1221645
* https://bugzilla.suse.com/show_bug.cgi?id=1221652
* https://bugzilla.suse.com/show_bug.cgi?id=1221857
* https://bugzilla.suse.com/show_bug.cgi?id=1222254
* https://bugzilla.suse.com/show_bug.cgi?id=1222335
* https://bugzilla.suse.com/show_bug.cgi?id=1222350
* https://bugzilla.suse.com/show_bug.cgi?id=1222364
* https://bugzilla.suse.com/show_bug.cgi?id=1222372
* https://bugzilla.suse.com/show_bug.cgi?id=1222387
* https://bugzilla.suse.com/show_bug.cgi?id=1222433
* https://bugzilla.suse.com/show_bug.cgi?id=1222434
* https://bugzilla.suse.com/show_bug.cgi?id=1222463
* https://bugzilla.suse.com/show_bug.cgi?id=1222625
* https://bugzilla.suse.com/show_bug.cgi?id=1222633
* https://bugzilla.suse.com/show_bug.cgi?id=1222634
* https://bugzilla.suse.com/show_bug.cgi?id=1222808
* https://bugzilla.suse.com/show_bug.cgi?id=1222967
* https://bugzilla.suse.com/show_bug.cgi?id=1222973
* https://bugzilla.suse.com/show_bug.cgi?id=1223053
* https://bugzilla.suse.com/show_bug.cgi?id=1223074
* https://bugzilla.suse.com/show_bug.cgi?id=1223191
* https://bugzilla.suse.com/show_bug.cgi?id=1223395
* https://bugzilla.suse.com/show_bug.cgi?id=1223635
* https://bugzilla.suse.com/show_bug.cgi?id=1223720
* https://bugzilla.suse.com/show_bug.cgi?id=1223731
* https://bugzilla.suse.com/show_bug.cgi?id=1223742
* https://bugzilla.suse.com/show_bug.cgi?id=1223763
* https://bugzilla.suse.com/show_bug.cgi?id=1223767
* https://bugzilla.suse.com/show_bug.cgi?id=1223777
* https://bugzilla.suse.com/show_bug.cgi?id=1223803
* https://bugzilla.suse.com/show_bug.cgi?id=1224105
* https://bugzilla.suse.com/show_bug.cgi?id=1224415
* https://bugzilla.suse.com/show_bug.cgi?id=1224485
* https://bugzilla.suse.com/show_bug.cgi?id=1224496
* https://bugzilla.suse.com/show_bug.cgi?id=1224510
* https://bugzilla.suse.com/show_bug.cgi?id=1224535
* https://bugzilla.suse.com/show_bug.cgi?id=1224631
* https://bugzilla.suse.com/show_bug.cgi?id=1224636
* https://bugzilla.suse.com/show_bug.cgi?id=1224690
* https://bugzilla.suse.com/show_bug.cgi?id=1224694
* https://bugzilla.suse.com/show_bug.cgi?id=1224700
* https://bugzilla.suse.com/show_bug.cgi?id=1224711
* https://bugzilla.suse.com/show_bug.cgi?id=1225475
* https://bugzilla.suse.com/show_bug.cgi?id=1225582
* https://bugzilla.suse.com/show_bug.cgi?id=1225607
* https://bugzilla.suse.com/show_bug.cgi?id=1225717
* https://bugzilla.suse.com/show_bug.cgi?id=1225718
* https://bugzilla.suse.com/show_bug.cgi?id=1225744
* https://bugzilla.suse.com/show_bug.cgi?id=1225745
* https://bugzilla.suse.com/show_bug.cgi?id=1225751
* https://bugzilla.suse.com/show_bug.cgi?id=1225814
* https://bugzilla.suse.com/show_bug.cgi?id=1225832
* https://bugzilla.suse.com/show_bug.cgi?id=1225838
* https://bugzilla.suse.com/show_bug.cgi?id=1225903
* https://bugzilla.suse.com/show_bug.cgi?id=1226031
* https://bugzilla.suse.com/show_bug.cgi?id=1226127
* https://bugzilla.suse.com/show_bug.cgi?id=1226502
* https://bugzilla.suse.com/show_bug.cgi?id=1226530
* https://bugzilla.suse.com/show_bug.cgi?id=1226588
* https://bugzilla.suse.com/show_bug.cgi?id=1226604
* https://bugzilla.suse.com/show_bug.cgi?id=1226743
* https://bugzilla.suse.com/show_bug.cgi?id=1226751
* https://bugzilla.suse.com/show_bug.cgi?id=1226765
* https://bugzilla.suse.com/show_bug.cgi?id=1226798
* https://bugzilla.suse.com/show_bug.cgi?id=1226801
* https://bugzilla.suse.com/show_bug.cgi?id=1226834
* https://bugzilla.suse.com/show_bug.cgi?id=1226874
* https://bugzilla.suse.com/show_bug.cgi?id=1226885
* https://bugzilla.suse.com/show_bug.cgi?id=1226920
* https://bugzilla.suse.com/show_bug.cgi?id=1227149
* https://bugzilla.suse.com/show_bug.cgi?id=1227182
* https://bugzilla.suse.com/show_bug.cgi?id=1227383
* https://bugzilla.suse.com/show_bug.cgi?id=1227437
* https://bugzilla.suse.com/show_bug.cgi?id=1227492
* https://bugzilla.suse.com/show_bug.cgi?id=1227493
* https://bugzilla.suse.com/show_bug.cgi?id=1227494
* https://bugzilla.suse.com/show_bug.cgi?id=1227618
* https://bugzilla.suse.com/show_bug.cgi?id=1227620
* https://bugzilla.suse.com/show_bug.cgi?id=1227623
* https://bugzilla.suse.com/show_bug.cgi?id=1227627
* https://bugzilla.suse.com/show_bug.cgi?id=1227634
* https://bugzilla.suse.com/show_bug.cgi?id=1227706
* https://bugzilla.suse.com/show_bug.cgi?id=1227722
* https://bugzilla.suse.com/show_bug.cgi?id=1227724
* https://bugzilla.suse.com/show_bug.cgi?id=1227725
* https://bugzilla.suse.com/show_bug.cgi?id=1227728
* https://bugzilla.suse.com/show_bug.cgi?id=1227729
* https://bugzilla.suse.com/show_bug.cgi?id=1227732
* https://bugzilla.suse.com/show_bug.cgi?id=1227733
* https://bugzilla.suse.com/show_bug.cgi?id=1227734
* https://bugzilla.suse.com/show_bug.cgi?id=1227747
* https://bugzilla.suse.com/show_bug.cgi?id=1227750
* https://bugzilla.suse.com/show_bug.cgi?id=1227754
* https://bugzilla.suse.com/show_bug.cgi?id=1227758
* https://bugzilla.suse.com/show_bug.cgi?id=1227760
* https://bugzilla.suse.com/show_bug.cgi?id=1227761
* https://bugzilla.suse.com/show_bug.cgi?id=1227764
* https://bugzilla.suse.com/show_bug.cgi?id=1227766
* https://bugzilla.suse.com/show_bug.cgi?id=1227770
* https://bugzilla.suse.com/show_bug.cgi?id=1227771
* https://bugzilla.suse.com/show_bug.cgi?id=1227772
* https://bugzilla.suse.com/show_bug.cgi?id=1227774
* https://bugzilla.suse.com/show_bug.cgi?id=1227781
* https://bugzilla.suse.com/show_bug.cgi?id=1227784
* https://bugzilla.suse.com/show_bug.cgi?id=1227785
* https://bugzilla.suse.com/show_bug.cgi?id=1227787
* https://bugzilla.suse.com/show_bug.cgi?id=1227790
* https://bugzilla.suse.com/show_bug.cgi?id=1227791
* https://bugzilla.suse.com/show_bug.cgi?id=1227792
* https://bugzilla.suse.com/show_bug.cgi?id=1227796
* https://bugzilla.suse.com/show_bug.cgi?id=1227798
* https://bugzilla.suse.com/show_bug.cgi?id=1227799
* https://bugzilla.suse.com/show_bug.cgi?id=1227802
* https://bugzilla.suse.com/show_bug.cgi?id=1227808
* https://bugzilla.suse.com/show_bug.cgi?id=1227810
* https://bugzilla.suse.com/show_bug.cgi?id=1227811
* https://bugzilla.suse.com/show_bug.cgi?id=1227812
* https://bugzilla.suse.com/show_bug.cgi?id=1227815
* https://bugzilla.suse.com/show_bug.cgi?id=1227816
* https://bugzilla.suse.com/show_bug.cgi?id=1227818
* https://bugzilla.suse.com/show_bug.cgi?id=1227820
* https://bugzilla.suse.com/show_bug.cgi?id=1227823
* https://bugzilla.suse.com/show_bug.cgi?id=1227824
* https://bugzilla.suse.com/show_bug.cgi?id=1227826
* https://bugzilla.suse.com/show_bug.cgi?id=1227828
* https://bugzilla.suse.com/show_bug.cgi?id=1227829
* https://bugzilla.suse.com/show_bug.cgi?id=1227830
* https://bugzilla.suse.com/show_bug.cgi?id=1227832
* https://bugzilla.suse.com/show_bug.cgi?id=1227833
* https://bugzilla.suse.com/show_bug.cgi?id=1227834
* https://bugzilla.suse.com/show_bug.cgi?id=1227839
* https://bugzilla.suse.com/show_bug.cgi?id=1227840
* https://bugzilla.suse.com/show_bug.cgi?id=1227846
* https://bugzilla.suse.com/show_bug.cgi?id=1227849
* https://bugzilla.suse.com/show_bug.cgi?id=1227851
* https://bugzilla.suse.com/show_bug.cgi?id=1227853
* https://bugzilla.suse.com/show_bug.cgi?id=1227863
* https://bugzilla.suse.com/show_bug.cgi?id=1227864
* https://bugzilla.suse.com/show_bug.cgi?id=1227865
* https://bugzilla.suse.com/show_bug.cgi?id=1227867
* https://bugzilla.suse.com/show_bug.cgi?id=1227869
* https://bugzilla.suse.com/show_bug.cgi?id=1227870
* https://bugzilla.suse.com/show_bug.cgi?id=1227883
* https://bugzilla.suse.com/show_bug.cgi?id=1227884
* https://bugzilla.suse.com/show_bug.cgi?id=1227891
* https://bugzilla.suse.com/show_bug.cgi?id=1227893
* https://bugzilla.suse.com/show_bug.cgi?id=1227929
* https://bugzilla.suse.com/show_bug.cgi?id=1227950
* https://bugzilla.suse.com/show_bug.cgi?id=1227957
* https://bugzilla.suse.com/show_bug.cgi?id=1227981
* https://bugzilla.suse.com/show_bug.cgi?id=1228020
* https://bugzilla.suse.com/show_bug.cgi?id=1228021
* https://bugzilla.suse.com/show_bug.cgi?id=1228114
* https://bugzilla.suse.com/show_bug.cgi?id=1228192
* https://bugzilla.suse.com/show_bug.cgi?id=1228195
* https://bugzilla.suse.com/show_bug.cgi?id=1228202
* https://bugzilla.suse.com/show_bug.cgi?id=1228235
* https://bugzilla.suse.com/show_bug.cgi?id=1228236
* https://bugzilla.suse.com/show_bug.cgi?id=1228237
* https://bugzilla.suse.com/show_bug.cgi?id=1228247
* https://bugzilla.suse.com/show_bug.cgi?id=1228321
* https://bugzilla.suse.com/show_bug.cgi?id=1228409
* https://bugzilla.suse.com/show_bug.cgi?id=1228410
* https://bugzilla.suse.com/show_bug.cgi?id=1228426
* https://bugzilla.suse.com/show_bug.cgi?id=1228427
* https://bugzilla.suse.com/show_bug.cgi?id=1228429
* https://bugzilla.suse.com/show_bug.cgi?id=1228446
* https://bugzilla.suse.com/show_bug.cgi?id=1228447
* https://bugzilla.suse.com/show_bug.cgi?id=1228449
* https://bugzilla.suse.com/show_bug.cgi?id=1228450
* https://bugzilla.suse.com/show_bug.cgi?id=1228452
* https://bugzilla.suse.com/show_bug.cgi?id=1228456
* https://bugzilla.suse.com/show_bug.cgi?id=1228457
* https://bugzilla.suse.com/show_bug.cgi?id=1228458
* https://bugzilla.suse.com/show_bug.cgi?id=1228459
* https://bugzilla.suse.com/show_bug.cgi?id=1228460
* https://bugzilla.suse.com/show_bug.cgi?id=1228462
* https://bugzilla.suse.com/show_bug.cgi?id=1228463
* https://bugzilla.suse.com/show_bug.cgi?id=1228466
* https://bugzilla.suse.com/show_bug.cgi?id=1228467
* https://bugzilla.suse.com/show_bug.cgi?id=1228468
* https://bugzilla.suse.com/show_bug.cgi?id=1228469
* https://bugzilla.suse.com/show_bug.cgi?id=1228470
* https://bugzilla.suse.com/show_bug.cgi?id=1228472
* https://bugzilla.suse.com/show_bug.cgi?id=1228479
* https://bugzilla.suse.com/show_bug.cgi?id=1228480
* https://bugzilla.suse.com/show_bug.cgi?id=1228481
* https://bugzilla.suse.com/show_bug.cgi?id=1228482
* https://bugzilla.suse.com/show_bug.cgi?id=1228483
* https://bugzilla.suse.com/show_bug.cgi?id=1228484
* https://bugzilla.suse.com/show_bug.cgi?id=1228485
* https://bugzilla.suse.com/show_bug.cgi?id=1228486
* https://bugzilla.suse.com/show_bug.cgi?id=1228487
* https://bugzilla.suse.com/show_bug.cgi?id=1228489
* https://bugzilla.suse.com/show_bug.cgi?id=1228491
* https://bugzilla.suse.com/show_bug.cgi?id=1228492
* https://bugzilla.suse.com/show_bug.cgi?id=1228493
* https://bugzilla.suse.com/show_bug.cgi?id=1228494
* https://bugzilla.suse.com/show_bug.cgi?id=1228495
* https://bugzilla.suse.com/show_bug.cgi?id=1228496
* https://bugzilla.suse.com/show_bug.cgi?id=1228499
* https://bugzilla.suse.com/show_bug.cgi?id=1228500
* https://bugzilla.suse.com/show_bug.cgi?id=1228501
* https://bugzilla.suse.com/show_bug.cgi?id=1228502
* https://bugzilla.suse.com/show_bug.cgi?id=1228503
* https://bugzilla.suse.com/show_bug.cgi?id=1228505
* https://bugzilla.suse.com/show_bug.cgi?id=1228508
* https://bugzilla.suse.com/show_bug.cgi?id=1228509
* https://bugzilla.suse.com/show_bug.cgi?id=1228510
* https://bugzilla.suse.com/show_bug.cgi?id=1228511
* https://bugzilla.suse.com/show_bug.cgi?id=1228513
* https://bugzilla.suse.com/show_bug.cgi?id=1228515
* https://bugzilla.suse.com/show_bug.cgi?id=1228516
* https://bugzilla.suse.com/show_bug.cgi?id=1228518
* https://bugzilla.suse.com/show_bug.cgi?id=1228520
* https://bugzilla.suse.com/show_bug.cgi?id=1228525
* https://bugzilla.suse.com/show_bug.cgi?id=1228527
* https://bugzilla.suse.com/show_bug.cgi?id=1228530
* https://bugzilla.suse.com/show_bug.cgi?id=1228531
* https://bugzilla.suse.com/show_bug.cgi?id=1228539
* https://bugzilla.suse.com/show_bug.cgi?id=1228561
* https://bugzilla.suse.com/show_bug.cgi?id=1228563
* https://bugzilla.suse.com/show_bug.cgi?id=1228564
* https://bugzilla.suse.com/show_bug.cgi?id=1228565
* https://bugzilla.suse.com/show_bug.cgi?id=1228567
* https://bugzilla.suse.com/show_bug.cgi?id=1228568
* https://bugzilla.suse.com/show_bug.cgi?id=1228572
* https://bugzilla.suse.com/show_bug.cgi?id=1228576
* https://bugzilla.suse.com/show_bug.cgi?id=1228579
* https://bugzilla.suse.com/show_bug.cgi?id=1228580
* https://bugzilla.suse.com/show_bug.cgi?id=1228581
* https://bugzilla.suse.com/show_bug.cgi?id=1228582
* https://bugzilla.suse.com/show_bug.cgi?id=1228584
* https://bugzilla.suse.com/show_bug.cgi?id=1228586
* https://bugzilla.suse.com/show_bug.cgi?id=1228588
* https://bugzilla.suse.com/show_bug.cgi?id=1228590
* https://bugzilla.suse.com/show_bug.cgi?id=1228591
* https://bugzilla.suse.com/show_bug.cgi?id=1228599
* https://bugzilla.suse.com/show_bug.cgi?id=1228615
* https://bugzilla.suse.com/show_bug.cgi?id=1228616
* https://bugzilla.suse.com/show_bug.cgi?id=1228617
* https://bugzilla.suse.com/show_bug.cgi?id=1228625
* https://bugzilla.suse.com/show_bug.cgi?id=1228626
* https://bugzilla.suse.com/show_bug.cgi?id=1228633
* https://bugzilla.suse.com/show_bug.cgi?id=1228635
* https://bugzilla.suse.com/show_bug.cgi?id=1228636
* https://bugzilla.suse.com/show_bug.cgi?id=1228640
* https://bugzilla.suse.com/show_bug.cgi?id=1228643
* https://bugzilla.suse.com/show_bug.cgi?id=1228644
* https://bugzilla.suse.com/show_bug.cgi?id=1228646
* https://bugzilla.suse.com/show_bug.cgi?id=1228649
* https://bugzilla.suse.com/show_bug.cgi?id=1228650
* https://bugzilla.suse.com/show_bug.cgi?id=1228654
* https://bugzilla.suse.com/show_bug.cgi?id=1228655
* https://bugzilla.suse.com/show_bug.cgi?id=1228656
* https://bugzilla.suse.com/show_bug.cgi?id=1228658
* https://bugzilla.suse.com/show_bug.cgi?id=1228660
* https://bugzilla.suse.com/show_bug.cgi?id=1228662
* https://bugzilla.suse.com/show_bug.cgi?id=1228665
* https://bugzilla.suse.com/show_bug.cgi?id=1228666
* https://bugzilla.suse.com/show_bug.cgi?id=1228667
* https://bugzilla.suse.com/show_bug.cgi?id=1228672
* https://bugzilla.suse.com/show_bug.cgi?id=1228673
* https://bugzilla.suse.com/show_bug.cgi?id=1228674
* https://bugzilla.suse.com/show_bug.cgi?id=1228677
* https://bugzilla.suse.com/show_bug.cgi?id=1228680
* https://bugzilla.suse.com/show_bug.cgi?id=1228687
* https://bugzilla.suse.com/show_bug.cgi?id=1228705
* https://bugzilla.suse.com/show_bug.cgi?id=1228706
* https://bugzilla.suse.com/show_bug.cgi?id=1228707
* https://bugzilla.suse.com/show_bug.cgi?id=1228708
* https://bugzilla.suse.com/show_bug.cgi?id=1228709
* https://bugzilla.suse.com/show_bug.cgi?id=1228710
* https://bugzilla.suse.com/show_bug.cgi?id=1228718
* https://bugzilla.suse.com/show_bug.cgi?id=1228720
* https://bugzilla.suse.com/show_bug.cgi?id=1228721
* https://bugzilla.suse.com/show_bug.cgi?id=1228722
* https://bugzilla.suse.com/show_bug.cgi?id=1228723
* https://bugzilla.suse.com/show_bug.cgi?id=1228724
* https://bugzilla.suse.com/show_bug.cgi?id=1228726
* https://bugzilla.suse.com/show_bug.cgi?id=1228727
* https://bugzilla.suse.com/show_bug.cgi?id=1228733
* https://bugzilla.suse.com/show_bug.cgi?id=1228737
* https://bugzilla.suse.com/show_bug.cgi?id=1228743
* https://bugzilla.suse.com/show_bug.cgi?id=1228748
* https://bugzilla.suse.com/show_bug.cgi?id=1228754
* https://bugzilla.suse.com/show_bug.cgi?id=1228756
* https://bugzilla.suse.com/show_bug.cgi?id=1228757
* https://bugzilla.suse.com/show_bug.cgi?id=1228758
* https://bugzilla.suse.com/show_bug.cgi?id=1228764
* https://bugzilla.suse.com/show_bug.cgi?id=1228766
* https://bugzilla.suse.com/show_bug.cgi?id=1228779
* https://bugzilla.suse.com/show_bug.cgi?id=1228801
* https://bugzilla.suse.com/show_bug.cgi?id=1228849
* https://bugzilla.suse.com/show_bug.cgi?id=1228850
* https://bugzilla.suse.com/show_bug.cgi?id=1228857
* https://bugzilla.suse.com/show_bug.cgi?id=1228959
* https://bugzilla.suse.com/show_bug.cgi?id=1228964
* https://bugzilla.suse.com/show_bug.cgi?id=1228966
* https://bugzilla.suse.com/show_bug.cgi?id=1228967
* https://bugzilla.suse.com/show_bug.cgi?id=1228973
* https://bugzilla.suse.com/show_bug.cgi?id=1228977
* https://bugzilla.suse.com/show_bug.cgi?id=1228978
* https://bugzilla.suse.com/show_bug.cgi?id=1228979
* https://bugzilla.suse.com/show_bug.cgi?id=1228986
* https://bugzilla.suse.com/show_bug.cgi?id=1228988
* https://bugzilla.suse.com/show_bug.cgi?id=1228989
* https://bugzilla.suse.com/show_bug.cgi?id=1228991
* https://bugzilla.suse.com/show_bug.cgi?id=1228992
* https://bugzilla.suse.com/show_bug.cgi?id=1229005
* https://bugzilla.suse.com/show_bug.cgi?id=1229024
* https://bugzilla.suse.com/show_bug.cgi?id=1229042
* https://bugzilla.suse.com/show_bug.cgi?id=1229045
* https://bugzilla.suse.com/show_bug.cgi?id=1229046
* https://bugzilla.suse.com/show_bug.cgi?id=1229054
* https://bugzilla.suse.com/show_bug.cgi?id=1229056
* https://bugzilla.suse.com/show_bug.cgi?id=1229086
* https://bugzilla.suse.com/show_bug.cgi?id=1229134
* https://bugzilla.suse.com/show_bug.cgi?id=1229136
* https://bugzilla.suse.com/show_bug.cgi?id=1229154
* https://bugzilla.suse.com/show_bug.cgi?id=1229156
* https://bugzilla.suse.com/show_bug.cgi?id=1229160
* https://bugzilla.suse.com/show_bug.cgi?id=1229167
* https://bugzilla.suse.com/show_bug.cgi?id=1229168
* https://bugzilla.suse.com/show_bug.cgi?id=1229169
* https://bugzilla.suse.com/show_bug.cgi?id=1229170
* https://bugzilla.suse.com/show_bug.cgi?id=1229171
* https://bugzilla.suse.com/show_bug.cgi?id=1229172
* https://bugzilla.suse.com/show_bug.cgi?id=1229173
* https://bugzilla.suse.com/show_bug.cgi?id=1229174
* https://bugzilla.suse.com/show_bug.cgi?id=1229239
* https://bugzilla.suse.com/show_bug.cgi?id=1229240
* https://bugzilla.suse.com/show_bug.cgi?id=1229241
* https://bugzilla.suse.com/show_bug.cgi?id=1229243
* https://bugzilla.suse.com/show_bug.cgi?id=1229244
* https://bugzilla.suse.com/show_bug.cgi?id=1229245
* https://bugzilla.suse.com/show_bug.cgi?id=1229246
* https://bugzilla.suse.com/show_bug.cgi?id=1229247
* https://bugzilla.suse.com/show_bug.cgi?id=1229248
* https://bugzilla.suse.com/show_bug.cgi?id=1229249
* https://bugzilla.suse.com/show_bug.cgi?id=1229250
* https://bugzilla.suse.com/show_bug.cgi?id=1229251
* https://bugzilla.suse.com/show_bug.cgi?id=1229252
* https://bugzilla.suse.com/show_bug.cgi?id=1229253
* https://bugzilla.suse.com/show_bug.cgi?id=1229254
* https://bugzilla.suse.com/show_bug.cgi?id=1229255
* https://bugzilla.suse.com/show_bug.cgi?id=1229256
* https://bugzilla.suse.com/show_bug.cgi?id=1229287
* https://bugzilla.suse.com/show_bug.cgi?id=1229290
* https://bugzilla.suse.com/show_bug.cgi?id=1229291
* https://bugzilla.suse.com/show_bug.cgi?id=1229292
* https://bugzilla.suse.com/show_bug.cgi?id=1229294
* https://bugzilla.suse.com/show_bug.cgi?id=1229296
* https://bugzilla.suse.com/show_bug.cgi?id=1229297
* https://bugzilla.suse.com/show_bug.cgi?id=1229298
* https://bugzilla.suse.com/show_bug.cgi?id=1229299
* https://bugzilla.suse.com/show_bug.cgi?id=1229301
* https://bugzilla.suse.com/show_bug.cgi?id=1229303
* https://bugzilla.suse.com/show_bug.cgi?id=1229304
* https://bugzilla.suse.com/show_bug.cgi?id=1229305
* https://bugzilla.suse.com/show_bug.cgi?id=1229307
* https://bugzilla.suse.com/show_bug.cgi?id=1229309
* https://bugzilla.suse.com/show_bug.cgi?id=1229312
* https://bugzilla.suse.com/show_bug.cgi?id=1229313
* https://bugzilla.suse.com/show_bug.cgi?id=1229314
* https://bugzilla.suse.com/show_bug.cgi?id=1229315
* https://bugzilla.suse.com/show_bug.cgi?id=1229316
* https://bugzilla.suse.com/show_bug.cgi?id=1229317
* https://bugzilla.suse.com/show_bug.cgi?id=1229318
* https://bugzilla.suse.com/show_bug.cgi?id=1229319
* https://bugzilla.suse.com/show_bug.cgi?id=1229320
* https://bugzilla.suse.com/show_bug.cgi?id=1229327
* https://bugzilla.suse.com/show_bug.cgi?id=1229341
* https://bugzilla.suse.com/show_bug.cgi?id=1229342
* https://bugzilla.suse.com/show_bug.cgi?id=1229344
* https://bugzilla.suse.com/show_bug.cgi?id=1229345
* https://bugzilla.suse.com/show_bug.cgi?id=1229346
* https://bugzilla.suse.com/show_bug.cgi?id=1229347
* https://bugzilla.suse.com/show_bug.cgi?id=1229349
* https://bugzilla.suse.com/show_bug.cgi?id=1229350
* https://bugzilla.suse.com/show_bug.cgi?id=1229351
* https://bugzilla.suse.com/show_bug.cgi?id=1229353
* https://bugzilla.suse.com/show_bug.cgi?id=1229354
* https://bugzilla.suse.com/show_bug.cgi?id=1229355
* https://bugzilla.suse.com/show_bug.cgi?id=1229356
* https://bugzilla.suse.com/show_bug.cgi?id=1229357
* https://bugzilla.suse.com/show_bug.cgi?id=1229358
* https://bugzilla.suse.com/show_bug.cgi?id=1229359
* https://bugzilla.suse.com/show_bug.cgi?id=1229360
* https://bugzilla.suse.com/show_bug.cgi?id=1229365
* https://bugzilla.suse.com/show_bug.cgi?id=1229366
* https://bugzilla.suse.com/show_bug.cgi?id=1229369
* https://bugzilla.suse.com/show_bug.cgi?id=1229370
* https://bugzilla.suse.com/show_bug.cgi?id=1229373
* https://bugzilla.suse.com/show_bug.cgi?id=1229374
* https://bugzilla.suse.com/show_bug.cgi?id=1229379
* https://bugzilla.suse.com/show_bug.cgi?id=1229381
* https://bugzilla.suse.com/show_bug.cgi?id=1229382
* https://bugzilla.suse.com/show_bug.cgi?id=1229383
* https://bugzilla.suse.com/show_bug.cgi?id=1229386
* https://bugzilla.suse.com/show_bug.cgi?id=1229388
* https://bugzilla.suse.com/show_bug.cgi?id=1229390
* https://bugzilla.suse.com/show_bug.cgi?id=1229391
* https://bugzilla.suse.com/show_bug.cgi?id=1229392
* https://bugzilla.suse.com/show_bug.cgi?id=1229395
* https://bugzilla.suse.com/show_bug.cgi?id=1229398
* https://bugzilla.suse.com/show_bug.cgi?id=1229399
* https://bugzilla.suse.com/show_bug.cgi?id=1229400
* https://bugzilla.suse.com/show_bug.cgi?id=1229402
* https://bugzilla.suse.com/show_bug.cgi?id=1229403
* https://bugzilla.suse.com/show_bug.cgi?id=1229404
* https://bugzilla.suse.com/show_bug.cgi?id=1229407
* https://bugzilla.suse.com/show_bug.cgi?id=1229409
* https://bugzilla.suse.com/show_bug.cgi?id=1229410
* https://bugzilla.suse.com/show_bug.cgi?id=1229411
* https://bugzilla.suse.com/show_bug.cgi?id=1229413
* https://bugzilla.suse.com/show_bug.cgi?id=1229414
* https://bugzilla.suse.com/show_bug.cgi?id=1229417
* https://bugzilla.suse.com/show_bug.cgi?id=1229444
* https://bugzilla.suse.com/show_bug.cgi?id=1229451
* https://bugzilla.suse.com/show_bug.cgi?id=1229452
* https://bugzilla.suse.com/show_bug.cgi?id=1229455
* https://bugzilla.suse.com/show_bug.cgi?id=1229456
* https://bugzilla.suse.com/show_bug.cgi?id=1229480
* https://bugzilla.suse.com/show_bug.cgi?id=1229481
* https://bugzilla.suse.com/show_bug.cgi?id=1229482
* https://bugzilla.suse.com/show_bug.cgi?id=1229484
* https://bugzilla.suse.com/show_bug.cgi?id=1229485
* https://bugzilla.suse.com/show_bug.cgi?id=1229486
* https://bugzilla.suse.com/show_bug.cgi?id=1229487
* https://bugzilla.suse.com/show_bug.cgi?id=1229488
* https://bugzilla.suse.com/show_bug.cgi?id=1229489
* https://bugzilla.suse.com/show_bug.cgi?id=1229490
* https://bugzilla.suse.com/show_bug.cgi?id=1229493
* https://bugzilla.suse.com/show_bug.cgi?id=1229495
* https://bugzilla.suse.com/show_bug.cgi?id=1229496
* https://bugzilla.suse.com/show_bug.cgi?id=1229497
* https://bugzilla.suse.com/show_bug.cgi?id=1229500
* https://bugzilla.suse.com/show_bug.cgi?id=1229503
* https://bugzilla.suse.com/show_bug.cgi?id=1229707
* https://bugzilla.suse.com/show_bug.cgi?id=1229739
* https://bugzilla.suse.com/show_bug.cgi?id=1229743
* https://bugzilla.suse.com/show_bug.cgi?id=1229746
* https://bugzilla.suse.com/show_bug.cgi?id=1229747
* https://bugzilla.suse.com/show_bug.cgi?id=1229752
* https://bugzilla.suse.com/show_bug.cgi?id=1229754
* https://bugzilla.suse.com/show_bug.cgi?id=1229755
* https://bugzilla.suse.com/show_bug.cgi?id=1229756
* https://bugzilla.suse.com/show_bug.cgi?id=1229759
* https://bugzilla.suse.com/show_bug.cgi?id=1229761
* https://bugzilla.suse.com/show_bug.cgi?id=1229767
* https://bugzilla.suse.com/show_bug.cgi?id=1229781
* https://bugzilla.suse.com/show_bug.cgi?id=1229784
* https://bugzilla.suse.com/show_bug.cgi?id=1229785
* https://bugzilla.suse.com/show_bug.cgi?id=1229787
* https://bugzilla.suse.com/show_bug.cgi?id=1229788
* https://bugzilla.suse.com/show_bug.cgi?id=1229789
* https://bugzilla.suse.com/show_bug.cgi?id=1229792
* https://bugzilla.suse.com/show_bug.cgi?id=1229820
* https://bugzilla.suse.com/show_bug.cgi?id=1229827
* https://bugzilla.suse.com/show_bug.cgi?id=1229830
* https://bugzilla.suse.com/show_bug.cgi?id=1229837
* https://bugzilla.suse.com/show_bug.cgi?id=1229940
* https://bugzilla.suse.com/show_bug.cgi?id=1230056
* https://bugzilla.suse.com/show_bug.cgi?id=1230350
* https://bugzilla.suse.com/show_bug.cgi?id=1230413
* https://jira.suse.com/browse/PED-10029
* https://jira.suse.com/browse/PED-10045
* https://jira.suse.com/browse/PED-10055
* https://jira.suse.com/browse/PED-10105
* https://jira.suse.com/browse/PED-10108
* https://jira.suse.com/browse/PED-8491
* https://jira.suse.com/browse/PED-8779
* https://jira.suse.com/browse/PED-8954