SUSE 5162 Published by

The following security updates have been released for openSUSE Leap and SUSE Linux Enterprise:

SUSE-SU-2024:2245-1: important: Security update for frr
SUSE-SU-2024:2200-1: moderate: Security update for avahi
SUSE-SU-2024:2195-1: important: Security update for hdf5
SUSE-SU-2024:2198-1: important: Security update for ghostscript
SUSE-SU-2024:2190-1: important: Security update for the Linux Kernel
SUSE-SU-2024:2180-1: important: Security update for vte
SUSE-SU-2024:2201-1: moderate: Security update for wget
SUSE-SU-2024:2170-1: important: Security update for gnome-settings-daemon
SUSE-SU-2024:2171-1: important: Security update for libarchive
SUSE-SU-2024:2189-1: important: Security update for the Linux Kernel
SUSE-SU-2024:2168-1: important: Security update for gnome-settings-daemon
SUSE-SU-2024:2185-1: important: Security update for the Linux Kernel
SUSE-SU-2024:1530-2: moderate: Security update for grafana and mybatis
SUSE-SU-2024:2174-1: moderate: Security update for wget
SUSE-SU-2024:2153-1: important: Security update for vte
SUSE-SU-2024:2135-1: important: Security update for the Linux Kernel
SUSE-SU-2024:2137-1: moderate: Security update for podofo
SUSE-SU-2024:2138-1: moderate: Security update for python-cryptography
SUSE-SU-2024:2106-1: important: Security update for php-composer2
SUSE-SU-2024:2107-1: important: Security update for php-composer2
SUSE-SU-2024:2102-1: moderate: Security update for opencc
SUSE-SU-2024:2088-1: important: Security update for openssl-3
SUSE-SU-2024:2089-1: important: Security update for openssl-1_1
SUSE-SU-2024:2090-1: important: Security update for podman
SUSE-SU-2024:2077-1: important: Security update for gdk-pixbuf
SUSE-SU-2024:2083-1: important: Security update for libarchive
SUSE-SU-2024:2076-1: important: Security update for gdk-pixbuf




SUSE-SU-2024:2245-1: important: Security update for frr


# Security update for frr

Announcement ID: SUSE-SU-2024:2245-1
Rating: important
References:

* bsc#1216896
* bsc#1216897
* bsc#1216899
* bsc#1216900

Cross-References:

* CVE-2023-38406
* CVE-2023-38407
* CVE-2023-47234
* CVE-2023-47235

CVSS scores:

* CVE-2023-38406 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-38406 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-38407 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-38407 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47234 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47234 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47235 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47235 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves four vulnerabilities can now be installed.

## Description:

This update for frr fixes the following issues:

* CVE-2023-38406: Fixed nlri length of zero mishandling, aka "flowspec
overflow". (bsc#1216900)
* CVE-2023-47235: Fixed a crash on malformed BGP UPDATE message with an EOR,
because the presence of EOR does not lead to a treat-as-withdraw outcome.
(bsc#1216896)
* CVE-2023-47234: Fixed a crash on crafted BGP UPDATE message with a
MP_UNREACH_NLRI attribute and additional NLRI data. (bsc#1216897)
* CVE-2023-38407: Fixed attempts to read beyond the end of the stream during
labeled unicast parsing. (bsc#1216899)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2245=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-2245=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2245=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-2245=1

* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-2245=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2245=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2245=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2245=1

* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2245=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2245=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2245=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2245=1

## Package List:

* SUSE Manager Proxy 4.3 (x86_64)
* libfrrcares0-debuginfo-7.4-150300.4.26.1
* frr-7.4-150300.4.26.1
* frr-debugsource-7.4-150300.4.26.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1
* libfrrfpm_pb0-7.4-150300.4.26.1
* libfrrsnmp0-7.4-150300.4.26.1
* libfrr0-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-7.4-150300.4.26.1
* frr-devel-7.4-150300.4.26.1
* libmlag_pb0-7.4-150300.4.26.1
* libfrrgrpc_pb0-7.4-150300.4.26.1
* libfrrcares0-7.4-150300.4.26.1
* libfrrzmq0-debuginfo-7.4-150300.4.26.1
* libfrr0-7.4-150300.4.26.1
* libmlag_pb0-debuginfo-7.4-150300.4.26.1
* frr-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-debuginfo-7.4-150300.4.26.1
* libfrrsnmp0-debuginfo-7.4-150300.4.26.1
* libfrrospfapiclient0-7.4-150300.4.26.1
* libfrrzmq0-7.4-150300.4.26.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libfrrcares0-debuginfo-7.4-150300.4.26.1
* frr-7.4-150300.4.26.1
* frr-debugsource-7.4-150300.4.26.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1
* libfrrfpm_pb0-7.4-150300.4.26.1
* libfrrsnmp0-7.4-150300.4.26.1
* libfrr0-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-7.4-150300.4.26.1
* frr-devel-7.4-150300.4.26.1
* libmlag_pb0-7.4-150300.4.26.1
* libfrrgrpc_pb0-7.4-150300.4.26.1
* libfrrcares0-7.4-150300.4.26.1
* libfrrzmq0-debuginfo-7.4-150300.4.26.1
* libfrr0-7.4-150300.4.26.1
* libmlag_pb0-debuginfo-7.4-150300.4.26.1
* frr-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-debuginfo-7.4-150300.4.26.1
* libfrrsnmp0-debuginfo-7.4-150300.4.26.1
* libfrrospfapiclient0-7.4-150300.4.26.1
* libfrrzmq0-7.4-150300.4.26.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libfrrcares0-debuginfo-7.4-150300.4.26.1
* frr-7.4-150300.4.26.1
* frr-debugsource-7.4-150300.4.26.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1
* libfrrfpm_pb0-7.4-150300.4.26.1
* libfrrsnmp0-7.4-150300.4.26.1
* libfrr0-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-7.4-150300.4.26.1
* frr-devel-7.4-150300.4.26.1
* libmlag_pb0-7.4-150300.4.26.1
* libfrrgrpc_pb0-7.4-150300.4.26.1
* libfrrcares0-7.4-150300.4.26.1
* libfrrzmq0-debuginfo-7.4-150300.4.26.1
* libfrr0-7.4-150300.4.26.1
* libmlag_pb0-debuginfo-7.4-150300.4.26.1
* frr-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-debuginfo-7.4-150300.4.26.1
* libfrrsnmp0-debuginfo-7.4-150300.4.26.1
* libfrrospfapiclient0-7.4-150300.4.26.1
* libfrrzmq0-7.4-150300.4.26.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libfrrcares0-debuginfo-7.4-150300.4.26.1
* frr-7.4-150300.4.26.1
* frr-debugsource-7.4-150300.4.26.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1
* libfrrfpm_pb0-7.4-150300.4.26.1
* libfrrsnmp0-7.4-150300.4.26.1
* libfrr0-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-7.4-150300.4.26.1
* frr-devel-7.4-150300.4.26.1
* libmlag_pb0-7.4-150300.4.26.1
* libfrrgrpc_pb0-7.4-150300.4.26.1
* libfrrcares0-7.4-150300.4.26.1
* libfrrzmq0-debuginfo-7.4-150300.4.26.1
* libfrr0-7.4-150300.4.26.1
* libmlag_pb0-debuginfo-7.4-150300.4.26.1
* frr-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-debuginfo-7.4-150300.4.26.1
* libfrrsnmp0-debuginfo-7.4-150300.4.26.1
* libfrrospfapiclient0-7.4-150300.4.26.1
* libfrrzmq0-7.4-150300.4.26.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* libfrrcares0-debuginfo-7.4-150300.4.26.1
* frr-7.4-150300.4.26.1
* frr-debugsource-7.4-150300.4.26.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1
* libfrrfpm_pb0-7.4-150300.4.26.1
* libfrrsnmp0-7.4-150300.4.26.1
* libfrr0-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-7.4-150300.4.26.1
* frr-devel-7.4-150300.4.26.1
* libmlag_pb0-7.4-150300.4.26.1
* libfrrgrpc_pb0-7.4-150300.4.26.1
* libfrrcares0-7.4-150300.4.26.1
* libfrrzmq0-debuginfo-7.4-150300.4.26.1
* libfrr0-7.4-150300.4.26.1
* libmlag_pb0-debuginfo-7.4-150300.4.26.1
* frr-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-debuginfo-7.4-150300.4.26.1
* libfrrsnmp0-debuginfo-7.4-150300.4.26.1
* libfrrospfapiclient0-7.4-150300.4.26.1
* libfrrzmq0-7.4-150300.4.26.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libfrrcares0-debuginfo-7.4-150300.4.26.1
* frr-7.4-150300.4.26.1
* frr-debugsource-7.4-150300.4.26.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1
* libfrrfpm_pb0-7.4-150300.4.26.1
* libfrrsnmp0-7.4-150300.4.26.1
* libfrr0-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-7.4-150300.4.26.1
* frr-devel-7.4-150300.4.26.1
* libmlag_pb0-7.4-150300.4.26.1
* libfrrgrpc_pb0-7.4-150300.4.26.1
* libfrrcares0-7.4-150300.4.26.1
* libfrrzmq0-debuginfo-7.4-150300.4.26.1
* libfrr0-7.4-150300.4.26.1
* libmlag_pb0-debuginfo-7.4-150300.4.26.1
* frr-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-debuginfo-7.4-150300.4.26.1
* libfrrsnmp0-debuginfo-7.4-150300.4.26.1
* libfrrospfapiclient0-7.4-150300.4.26.1
* libfrrzmq0-7.4-150300.4.26.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libfrrcares0-debuginfo-7.4-150300.4.26.1
* frr-7.4-150300.4.26.1
* frr-debugsource-7.4-150300.4.26.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1
* libfrrfpm_pb0-7.4-150300.4.26.1
* libfrrsnmp0-7.4-150300.4.26.1
* libfrr0-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-7.4-150300.4.26.1
* frr-devel-7.4-150300.4.26.1
* libmlag_pb0-7.4-150300.4.26.1
* libfrrgrpc_pb0-7.4-150300.4.26.1
* libfrrcares0-7.4-150300.4.26.1
* libfrrzmq0-debuginfo-7.4-150300.4.26.1
* libfrr0-7.4-150300.4.26.1
* libmlag_pb0-debuginfo-7.4-150300.4.26.1
* frr-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-debuginfo-7.4-150300.4.26.1
* libfrrsnmp0-debuginfo-7.4-150300.4.26.1
* libfrrospfapiclient0-7.4-150300.4.26.1
* libfrrzmq0-7.4-150300.4.26.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libfrrcares0-debuginfo-7.4-150300.4.26.1
* frr-7.4-150300.4.26.1
* frr-debugsource-7.4-150300.4.26.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1
* libfrrfpm_pb0-7.4-150300.4.26.1
* libfrrsnmp0-7.4-150300.4.26.1
* libfrr0-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-7.4-150300.4.26.1
* frr-devel-7.4-150300.4.26.1
* libmlag_pb0-7.4-150300.4.26.1
* libfrrgrpc_pb0-7.4-150300.4.26.1
* libfrrcares0-7.4-150300.4.26.1
* libfrrzmq0-debuginfo-7.4-150300.4.26.1
* libfrr0-7.4-150300.4.26.1
* libmlag_pb0-debuginfo-7.4-150300.4.26.1
* frr-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-debuginfo-7.4-150300.4.26.1
* libfrrsnmp0-debuginfo-7.4-150300.4.26.1
* libfrrospfapiclient0-7.4-150300.4.26.1
* libfrrzmq0-7.4-150300.4.26.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libfrrcares0-debuginfo-7.4-150300.4.26.1
* frr-7.4-150300.4.26.1
* frr-debugsource-7.4-150300.4.26.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1
* libfrrfpm_pb0-7.4-150300.4.26.1
* libfrrsnmp0-7.4-150300.4.26.1
* libfrr0-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-7.4-150300.4.26.1
* frr-devel-7.4-150300.4.26.1
* libmlag_pb0-7.4-150300.4.26.1
* libfrrgrpc_pb0-7.4-150300.4.26.1
* libfrrcares0-7.4-150300.4.26.1
* libfrrzmq0-debuginfo-7.4-150300.4.26.1
* libfrr0-7.4-150300.4.26.1
* libmlag_pb0-debuginfo-7.4-150300.4.26.1
* frr-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-debuginfo-7.4-150300.4.26.1
* libfrrsnmp0-debuginfo-7.4-150300.4.26.1
* libfrrospfapiclient0-7.4-150300.4.26.1
* libfrrzmq0-7.4-150300.4.26.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libfrrcares0-debuginfo-7.4-150300.4.26.1
* frr-7.4-150300.4.26.1
* frr-debugsource-7.4-150300.4.26.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1
* libfrrfpm_pb0-7.4-150300.4.26.1
* libfrrsnmp0-7.4-150300.4.26.1
* libfrr0-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-7.4-150300.4.26.1
* frr-devel-7.4-150300.4.26.1
* libmlag_pb0-7.4-150300.4.26.1
* libfrrgrpc_pb0-7.4-150300.4.26.1
* libfrrcares0-7.4-150300.4.26.1
* libfrrzmq0-debuginfo-7.4-150300.4.26.1
* libfrr0-7.4-150300.4.26.1
* libmlag_pb0-debuginfo-7.4-150300.4.26.1
* frr-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-debuginfo-7.4-150300.4.26.1
* libfrrsnmp0-debuginfo-7.4-150300.4.26.1
* libfrrospfapiclient0-7.4-150300.4.26.1
* libfrrzmq0-7.4-150300.4.26.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libfrrcares0-debuginfo-7.4-150300.4.26.1
* frr-7.4-150300.4.26.1
* frr-debugsource-7.4-150300.4.26.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1
* libfrrfpm_pb0-7.4-150300.4.26.1
* libfrrsnmp0-7.4-150300.4.26.1
* libfrr0-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-7.4-150300.4.26.1
* frr-devel-7.4-150300.4.26.1
* libmlag_pb0-7.4-150300.4.26.1
* libfrrgrpc_pb0-7.4-150300.4.26.1
* libfrrcares0-7.4-150300.4.26.1
* libfrrzmq0-debuginfo-7.4-150300.4.26.1
* libfrr0-7.4-150300.4.26.1
* libmlag_pb0-debuginfo-7.4-150300.4.26.1
* frr-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-debuginfo-7.4-150300.4.26.1
* libfrrsnmp0-debuginfo-7.4-150300.4.26.1
* libfrrospfapiclient0-7.4-150300.4.26.1
* libfrrzmq0-7.4-150300.4.26.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libfrrcares0-debuginfo-7.4-150300.4.26.1
* frr-7.4-150300.4.26.1
* frr-debugsource-7.4-150300.4.26.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.26.1
* libfrrfpm_pb0-7.4-150300.4.26.1
* libfrrsnmp0-7.4-150300.4.26.1
* libfrr0-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-7.4-150300.4.26.1
* frr-devel-7.4-150300.4.26.1
* libmlag_pb0-7.4-150300.4.26.1
* libfrrgrpc_pb0-7.4-150300.4.26.1
* libfrrcares0-7.4-150300.4.26.1
* libfrrzmq0-debuginfo-7.4-150300.4.26.1
* libfrr0-7.4-150300.4.26.1
* libmlag_pb0-debuginfo-7.4-150300.4.26.1
* frr-debuginfo-7.4-150300.4.26.1
* libfrr_pb0-debuginfo-7.4-150300.4.26.1
* libfrrsnmp0-debuginfo-7.4-150300.4.26.1
* libfrrospfapiclient0-7.4-150300.4.26.1
* libfrrzmq0-7.4-150300.4.26.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.26.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.26.1

## References:

* https://www.suse.com/security/cve/CVE-2023-38406.html
* https://www.suse.com/security/cve/CVE-2023-38407.html
* https://www.suse.com/security/cve/CVE-2023-47234.html
* https://www.suse.com/security/cve/CVE-2023-47235.html
* https://bugzilla.suse.com/show_bug.cgi?id=1216896
* https://bugzilla.suse.com/show_bug.cgi?id=1216897
* https://bugzilla.suse.com/show_bug.cgi?id=1216899
* https://bugzilla.suse.com/show_bug.cgi?id=1216900



SUSE-SU-2024:2200-1: moderate: Security update for avahi


# Security update for avahi

Announcement ID: SUSE-SU-2024:2200-1
Rating: moderate
References:

* bsc#1216594
* bsc#1216598
* bsc#1226586

Cross-References:

* CVE-2023-38469
* CVE-2023-38471

CVSS scores:

* CVE-2023-38469 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-38469 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-38471 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-38471 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP6
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6

An update that solves two vulnerabilities and has one security fix can now be
installed.

## Description:

This update for avahi fixes the following issues:

* CVE-2023-38471: Fixed a reachable assertion in dbus_set_host_name.
(bsc#1216594)
* CVE-2023-38469: Fixed a reachable assertion in
avahi_dns_packet_append_record. (bsc#1216598)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-2200=1 SUSE-2024-2200=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2200=1

* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2200=1

* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2200=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* python3-avahi-0.8-150600.15.3.1
* libavahi-qt5-devel-0.8-150600.15.3.1
* avahi-debugsource-0.8-150600.15.3.1
* libavahi-client3-0.8-150600.15.3.1
* libavahi-glib-devel-0.8-150600.15.3.1
* typelib-1_0-Avahi-0_6-0.8-150600.15.3.1
* libdns_sd-debuginfo-0.8-150600.15.3.1
* avahi-autoipd-0.8-150600.15.3.1
* libavahi-gobject0-debuginfo-0.8-150600.15.3.1
* libavahi-gobject-devel-0.8-150600.15.3.1
* avahi-debuginfo-0.8-150600.15.3.1
* python3-avahi-gtk-0.8-150600.15.3.1
* libavahi-gobject0-0.8-150600.15.3.1
* libavahi-devel-0.8-150600.15.3.1
* avahi-0.8-150600.15.3.1
* libavahi-core7-0.8-150600.15.3.1
* libdns_sd-0.8-150600.15.3.1
* libavahi-common3-debuginfo-0.8-150600.15.3.1
* avahi-compat-howl-devel-0.8-150600.15.3.1
* libavahi-libevent1-0.8-150600.15.3.1
* avahi-utils-debuginfo-0.8-150600.15.3.1
* libavahi-qt5-1-0.8-150600.15.3.1
* libavahi-ui-gtk3-0-debuginfo-0.8-150600.15.3.1
* libhowl0-0.8-150600.15.3.1
* libavahi-ui-gtk3-0-0.8-150600.15.3.1
* avahi-utils-0.8-150600.15.3.1
* libavahi-glib1-debuginfo-0.8-150600.15.3.1
* avahi-glib2-debugsource-0.8-150600.15.3.1
* libavahi-client3-debuginfo-0.8-150600.15.3.1
* libhowl0-debuginfo-0.8-150600.15.3.1
* libavahi-core7-debuginfo-0.8-150600.15.3.1
* libavahi-common3-0.8-150600.15.3.1
* libavahi-qt5-1-debuginfo-0.8-150600.15.3.1
* avahi-utils-gtk-debuginfo-0.8-150600.15.3.1
* avahi-autoipd-debuginfo-0.8-150600.15.3.1
* libavahi-glib1-0.8-150600.15.3.1
* libavahi-libevent1-debuginfo-0.8-150600.15.3.1
* avahi-qt5-debugsource-0.8-150600.15.3.1
* avahi-compat-mDNSResponder-devel-0.8-150600.15.3.1
* avahi-utils-gtk-0.8-150600.15.3.1
* openSUSE Leap 15.6 (x86_64)
* libavahi-glib1-32bit-debuginfo-0.8-150600.15.3.1
* avahi-32bit-debuginfo-0.8-150600.15.3.1
* libavahi-glib1-32bit-0.8-150600.15.3.1
* libdns_sd-32bit-debuginfo-0.8-150600.15.3.1
* libavahi-common3-32bit-0.8-150600.15.3.1
* libavahi-client3-32bit-debuginfo-0.8-150600.15.3.1
* libdns_sd-32bit-0.8-150600.15.3.1
* libavahi-client3-32bit-0.8-150600.15.3.1
* libavahi-common3-32bit-debuginfo-0.8-150600.15.3.1
* openSUSE Leap 15.6 (noarch)
* avahi-lang-0.8-150600.15.3.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libavahi-common3-64bit-debuginfo-0.8-150600.15.3.1
* libdns_sd-64bit-0.8-150600.15.3.1
* avahi-64bit-debuginfo-0.8-150600.15.3.1
* libdns_sd-64bit-debuginfo-0.8-150600.15.3.1
* libavahi-glib1-64bit-debuginfo-0.8-150600.15.3.1
* libavahi-glib1-64bit-0.8-150600.15.3.1
* libavahi-client3-64bit-debuginfo-0.8-150600.15.3.1
* libavahi-common3-64bit-0.8-150600.15.3.1
* libavahi-client3-64bit-0.8-150600.15.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* avahi-debugsource-0.8-150600.15.3.1
* libavahi-client3-0.8-150600.15.3.1
* libavahi-glib-devel-0.8-150600.15.3.1
* typelib-1_0-Avahi-0_6-0.8-150600.15.3.1
* libdns_sd-debuginfo-0.8-150600.15.3.1
* libavahi-gobject0-debuginfo-0.8-150600.15.3.1
* avahi-debuginfo-0.8-150600.15.3.1
* libavahi-gobject0-0.8-150600.15.3.1
* libavahi-devel-0.8-150600.15.3.1
* avahi-0.8-150600.15.3.1
* libavahi-core7-0.8-150600.15.3.1
* libdns_sd-0.8-150600.15.3.1
* libavahi-common3-debuginfo-0.8-150600.15.3.1
* avahi-compat-howl-devel-0.8-150600.15.3.1
* libavahi-libevent1-0.8-150600.15.3.1
* avahi-utils-debuginfo-0.8-150600.15.3.1
* libavahi-ui-gtk3-0-debuginfo-0.8-150600.15.3.1
* libhowl0-0.8-150600.15.3.1
* libavahi-ui-gtk3-0-0.8-150600.15.3.1
* avahi-utils-0.8-150600.15.3.1
* libavahi-glib1-debuginfo-0.8-150600.15.3.1
* avahi-glib2-debugsource-0.8-150600.15.3.1
* libavahi-client3-debuginfo-0.8-150600.15.3.1
* libhowl0-debuginfo-0.8-150600.15.3.1
* libavahi-core7-debuginfo-0.8-150600.15.3.1
* libavahi-common3-0.8-150600.15.3.1
* libavahi-glib1-0.8-150600.15.3.1
* libavahi-libevent1-debuginfo-0.8-150600.15.3.1
* avahi-compat-mDNSResponder-devel-0.8-150600.15.3.1
* Basesystem Module 15-SP6 (noarch)
* avahi-lang-0.8-150600.15.3.1
* Basesystem Module 15-SP6 (x86_64)
* avahi-32bit-debuginfo-0.8-150600.15.3.1
* libavahi-common3-32bit-0.8-150600.15.3.1
* libavahi-client3-32bit-debuginfo-0.8-150600.15.3.1
* libavahi-client3-32bit-0.8-150600.15.3.1
* libavahi-common3-32bit-debuginfo-0.8-150600.15.3.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* avahi-autoipd-debuginfo-0.8-150600.15.3.1
* avahi-debuginfo-0.8-150600.15.3.1
* avahi-debugsource-0.8-150600.15.3.1
* avahi-glib2-debugsource-0.8-150600.15.3.1
* avahi-autoipd-0.8-150600.15.3.1
* avahi-utils-gtk-0.8-150600.15.3.1
* libavahi-gobject-devel-0.8-150600.15.3.1
* avahi-utils-gtk-debuginfo-0.8-150600.15.3.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* avahi-debuginfo-0.8-150600.15.3.1
* python3-avahi-0.8-150600.15.3.1
* avahi-debugsource-0.8-150600.15.3.1

## References:

* https://www.suse.com/security/cve/CVE-2023-38469.html
* https://www.suse.com/security/cve/CVE-2023-38471.html
* https://bugzilla.suse.com/show_bug.cgi?id=1216594
* https://bugzilla.suse.com/show_bug.cgi?id=1216598
* https://bugzilla.suse.com/show_bug.cgi?id=1226586



SUSE-SU-2024:2195-1: important: Security update for hdf5


# Security update for hdf5

Announcement ID: SUSE-SU-2024:2195-1
Rating: important
References:

* bsc#1224158

Cross-References:

* CVE-2017-17507
* CVE-2018-11205
* CVE-2024-29158
* CVE-2024-29161
* CVE-2024-29166
* CVE-2024-32608
* CVE-2024-32610
* CVE-2024-32614
* CVE-2024-32619
* CVE-2024-32620
* CVE-2024-33873
* CVE-2024-33874
* CVE-2024-33875

CVSS scores:

* CVE-2017-17507 ( SUSE ): 4.4 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
* CVE-2017-17507 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2018-11205 ( SUSE ): 5.1 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2018-11205 ( NVD ): 8.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
* CVE-2024-29158 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-29161 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-29166 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-32608 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-32610 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-32614 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-32619 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-32620 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-33873 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-33874 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-33875 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H

Affected Products:

* HPC Module 15-SP5
* HPC Module 15-SP6
* openSUSE Leap 15.3
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* Server Applications Module 15-SP5
* Server Applications Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6

An update that solves 13 vulnerabilities can now be installed.

## Description:

This update for hdf5 fixes the following issues:

* Fix bsc#1224158 - this fixes: CVE-2024-29158, CVE-2024-29161,
CVE-2024-29166, CVE-2024-32608, CVE-2024-32610, CVE-2024-32614,
CVE-2024-32619, CVE-2024-32620, CVE-2024-33873, CVE-2024-33874,
CVE-2024-33875 Additionally, these fixes resolve crashes triggered by the
reproducers for CVE-2017-17507, CVE-2018-11205. These crashes appear to be
unrelated to the original problems.

This update also ships several missing PackageHub packages for 15 SP5 and 15
SP6.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-2195=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2195=1

* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-2195=1 openSUSE-SLE-15.5-2024-2195=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-2195=1 SUSE-2024-2195=1

* HPC Module 15-SP5
zypper in -t patch SUSE-SLE-Module-HPC-15-SP5-2024-2195=1

* HPC Module 15-SP6
zypper in -t patch SUSE-SLE-Module-HPC-15-SP6-2024-2195=1

* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2195=1

* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2195=1

* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-2195=1

* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-2195=1

* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2195=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2195=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2195=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2195=1

## Package List:

* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* libpmix2-debuginfo-3.2.3-150300.3.10.1
* pmix-3.2.3-150300.3.10.1
* pmix-test-3.2.3-150300.3.10.1
* pmix-devel-3.2.3-150300.3.10.1
* pmix-plugin-munge-3.2.3-150300.3.10.1
* pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1
* pmix-debugsource-3.2.3-150300.3.10.1
* libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1
* libpmix2-3.2.3-150300.3.10.1
* pmix-test-debuginfo-3.2.3-150300.3.10.1
* pmix-plugins-3.2.3-150300.3.10.1
* libmca_common_dstore1-3.2.3-150300.3.10.1
* pmix-plugins-debuginfo-3.2.3-150300.3.10.1
* pmix-debuginfo-3.2.3-150300.3.10.1
* openSUSE Leap 15.3 (noarch)
* pmix-headers-3.2.3-150300.3.10.1
* pmix-mca-params-3.2.3-150300.3.10.1
* openSUSE Leap 15.4 (noarch)
* hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1
* hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5-hpc-examples-1.10.11-150400.3.17.1
* hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-hpc-1.10.11-150400.3.17.1
* hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2
* libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.17.2
* libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* mvapich2-gnu-hpc-2.3.7-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* mpich-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* openmpi4-debugsource-4.1.4-150500.3.2.1
* mpich_4_0_2-gnu-hpc-4.0.2-150500.3.2.1
* openmpi4-devel-4.1.4-150500.3.2.1
* openmpi4-devel-debuginfo-4.1.4-150500.3.2.1
* mpich-ofi-4.0.2-150500.3.2.1
* mvapich2_2_3_7-gnu-hpc-2.3.7-150500.3.2.1
* mvapich2-gnu-hpc-devel-2.3.7-150500.3.2.1
* mpich-ofi-debugsource-4.0.2-150500.3.2.1
* openmpi4-libs-debuginfo-4.1.4-150500.3.2.1
* mpich-gnu-hpc-devel-4.0.2-150500.3.2.1
* mpich-debuginfo-4.0.2-150500.3.2.1
* mvapich2-devel-static-2.3.7-150500.3.2.1
* mvapich2-debugsource-2.3.7-150500.3.2.1
* mpich_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1
* openmpi_4_1_4-gnu-hpc-devel-debuginfo-4.1.4-150500.3.2.1
* openmpi4-config-4.1.4-150500.3.2.1
* mpich-ofi-devel-4.0.2-150500.3.2.1
* openmpi4-debuginfo-4.1.4-150500.3.2.1
* openmpi_4_1_4-gnu-hpc-debuginfo-4.1.4-150500.3.2.1
* mvapich2_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-4.0.2-150500.3.2.1
* libopenmpi4-gnu-hpc-4.1.4-150500.3.2.1
* mpich_4_0_2-gnu-hpc-debuginfo-4.0.2-150500.3.2.1
* openmpi_4_1_4-gnu-hpc-debugsource-4.1.4-150500.3.2.1
* libopenmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1
* openmpi_4_1_4-gnu-hpc-docs-4.1.4-150500.3.2.1
* mvapich2-2.3.7-150500.3.2.1
* mpich-gnu-hpc-4.0.2-150500.3.2.1
* mpich_4_0_2-gnu-hpc-macros-devel-4.0.2-150500.3.2.1
* mvapich2_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-debugsource-4.0.2-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-macros-devel-4.0.2-150500.3.2.1
* openmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1
* mpich-debugsource-4.0.2-150500.3.2.1
* mvapich2_2_3_7-gnu-hpc-debuginfo-2.3.7-150500.3.2.1
* openmpi_4_1_4-gnu-hpc-devel-4.1.4-150500.3.2.1
* mpich-ofi-gnu-hpc-4.0.2-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-debuginfo-4.0.2-150500.3.2.1
* mpich-devel-4.0.2-150500.3.2.1
* mpich_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* libopenmpi_4_1_4-gnu-hpc-debuginfo-4.1.4-150500.3.2.1
* mvapich2-debuginfo-2.3.7-150500.3.2.1
* mpich_4_0_2-gnu-hpc-debugsource-4.0.2-150500.3.2.1
* openmpi4-docs-4.1.4-150500.3.2.1
* openmpi4-gnu-hpc-4.1.4-150500.3.2.1
* mvapich2-devel-2.3.7-150500.3.2.1
* mpich-ofi-gnu-hpc-devel-4.0.2-150500.3.2.1
* mvapich2_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1
* mvapich2_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1
* openmpi_4_1_4-gnu-hpc-devel-static-4.1.4-150500.3.2.1
* mvapich2_2_3_7-gnu-hpc-debugsource-2.3.7-150500.3.2.1
* openmpi_4_1_4-gnu-hpc-macros-devel-4.1.4-150500.3.2.1
* openmpi4-4.1.4-150500.3.2.1
* openmpi4-macros-devel-4.1.4-150500.3.2.1
* openmpi4-libs-4.1.4-150500.3.2.1
* mvapich2-doc-2.3.7-150500.3.2.1
* mpich-4.0.2-150500.3.2.1
* openmpi4-gnu-hpc-devel-static-4.1.4-150500.3.2.1
* mpich-ofi-debuginfo-4.0.2-150500.3.2.1
* mpich-ofi-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1
* openSUSE Leap 15.5 (noarch)
* hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1
* hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* mvapich2-psm-gnu-hpc-doc-2.3.7-150500.3.2.1
* mvapich2-psm-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5-hpc-examples-1.10.11-150400.3.17.1
* openmpi4-gnu-hpc-macros-devel-4.1.4-150500.3.2.1
* mvapich2-psm2-gnu-hpc-doc-2.3.7-150500.3.2.1
* mvapich2-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* mvapich2-gnu-hpc-doc-2.3.7-150500.3.2.1
* luaposix-doc-34.1.1-150200.3.5.1
* hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* openmpi4-gnu-hpc-devel-4.1.4-150500.3.2.1
* hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* openmpi4-gnu-hpc-docs-4.1.4-150500.3.2.1
* mvapich2-psm2-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-hpc-1.10.11-150400.3.17.1
* openmpi4-testsuite-4.1.4-150500.3.2.1
* mpich-ofi-gnu-hpc-macros-devel-4.0.2-150500.3.2.1
* mpich-gnu-hpc-macros-devel-4.0.2-150500.3.2.1
* pmix-headers-3.2.3-150300.3.10.1
* openmpi_4_1_4-gnu-hpc-testsuite-4.1.4-150500.3.2.1
* hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* pmix-mca-params-3.2.3-150300.3.10.1
* hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* openSUSE Leap 15.5 (x86_64 i586)
* mvapich2-psm_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1
* mvapich2-psm-debuginfo-2.3.7-150500.3.2.1
* mvapich2-psm-doc-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1
* mvapich2-psm-2.3.7-150500.3.2.1
* mvapich2-psm-devel-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* mvapich2-psm-debugsource-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-2.3.7-150500.3.2.1
* mvapich2-psm-gnu-hpc-devel-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-debuginfo-2.3.7-150500.3.2.1
* mvapich2-psm-gnu-hpc-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-debugsource-2.3.7-150500.3.2.1
* mvapich2-psm-devel-static-2.3.7-150500.3.2.1
* openSUSE Leap 15.5 (x86_64)
* mvapich2-psm2_2_3_7-gnu-hpc-debuginfo-2.3.7-150500.3.2.1
* openmpi4-libs-32bit-debuginfo-4.1.4-150500.3.2.1
* openmpi4-libs-32bit-4.1.4-150500.3.2.1
* mvapich2-psm2-debuginfo-2.3.7-150500.3.2.1
* mvapich2-psm2-debugsource-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1
* mvapich2-psm2-2.3.7-150500.3.2.1
* mvapich2-psm2-gnu-hpc-devel-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-debugsource-2.3.7-150500.3.2.1
* mvapich2-psm2-devel-static-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1
* mvapich2-psm2-doc-2.3.7-150500.3.2.1
* mvapich2-psm2-devel-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-2.3.7-150500.3.2.1
* mvapich2-psm2-gnu-hpc-2.3.7-150500.3.2.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* openmpi4-libs-64bit-debuginfo-4.1.4-150500.3.2.1
* openmpi4-libs-64bit-4.1.4-150500.3.2.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* pmix-plugin-munge-3.2.3-150300.3.10.1
* libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* lua51-luaposix-34.1.1-150200.3.5.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* pmix-plugins-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* pmix-3.2.3-150300.3.10.1
* pmix-devel-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libpmix2-3.2.3-150300.3.10.1
* libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-test-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* lua53-luaterm-0.07-150000.5.5.1
* libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2
* lua53-luaposix-34.1.1-150200.3.5.1
* libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2
* libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* lua51-luaterm-debuginfo-0.07-150000.5.5.1
* pmix-test-3.2.3-150300.3.10.1
* libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* lua51-luaterm-0.07-150000.5.5.1
* libmca_common_dstore1-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.17.2
* libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1
* libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1
* lua53-luaterm-debuginfo-0.07-150000.5.5.1
* libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.17.2
* libpmix2-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-plugins-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* lua51-luaposix-debuginfo-34.1.1-150200.3.5.1
* lua51-luaterm-debugsource-0.07-150000.5.5.1
* libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* lua53-luaterm-debugsource-0.07-150000.5.5.1
* libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* lua53-luaposix-debuginfo-34.1.1-150200.3.5.1
* libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* pmix-debugsource-3.2.3-150300.3.10.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* mpich-4.1.2-150600.3.2.1
* mvapich2_2_3_7-gnu-hpc-debuginfo-2.3.7-150600.9.2.1
* mvapich2-debugsource-2.3.7-150600.9.2.1
* mpich-ofi_4_1_2-gnu-hpc-4.1.2-150600.3.2.1
* openmpi_4_1_6-gnu-hpc-docs-4.1.6-150600.3.2.1
* openmpi4-docs-4.1.6-150600.3.2.1
* openmpi4-libs-debuginfo-4.1.6-150600.3.2.1
* mvapich2-gnu-hpc-devel-2.3.7-150600.9.2.1
* mpich-ofi-debugsource-4.1.2-150600.3.2.1
* openmpi4-gnu-hpc-devel-static-4.1.6-150600.3.2.1
* libopenmpi_4_1_6-gnu-hpc-debuginfo-4.1.6-150600.3.2.1
* mpich-ofi_4_1_2-gnu-hpc-macros-devel-4.1.2-150600.3.2.1
* mpich-ofi_4_1_2-gnu-hpc-debugsource-4.1.2-150600.3.2.1
* mpich-ofi_4_1_2-gnu-hpc-devel-static-4.1.2-150600.3.2.1
* mpich-debugsource-4.1.2-150600.3.2.1
* libopenmpi4-gnu-hpc-4.1.6-150600.3.2.1
* mvapich2_2_3_7-gnu-hpc-macros-devel-2.3.7-150600.9.2.1
* openmpi_4_1_6-gnu-hpc-debuginfo-4.1.6-150600.3.2.1
* openmpi_4_1_6-gnu-hpc-devel-debuginfo-4.1.6-150600.3.2.1
* openmpi4-config-4.1.6-150600.3.2.1
* openmpi4-macros-devel-4.1.6-150600.3.2.1
* mpich_4_1_2-gnu-hpc-devel-4.1.2-150600.3.2.1
* mvapich2-devel-2.3.7-150600.9.2.1
* openmpi_4_1_6-gnu-hpc-macros-devel-4.1.6-150600.3.2.1
* openmpi4-gnu-hpc-4.1.6-150600.3.2.1
* mpich-ofi-gnu-hpc-4.1.2-150600.3.2.1
* mpich-gnu-hpc-devel-4.1.2-150600.3.2.1
* mvapich2_2_3_7-gnu-hpc-doc-2.3.7-150600.9.2.1
* mpich-devel-4.1.2-150600.3.2.1
* openmpi_4_1_6-gnu-hpc-debugsource-4.1.6-150600.3.2.1
* openmpi_4_1_6-gnu-hpc-devel-4.1.6-150600.3.2.1
* openmpi4-debuginfo-4.1.6-150600.3.2.1
* mpich-gnu-hpc-4.1.2-150600.3.2.1
* mpich-ofi_4_1_2-gnu-hpc-debuginfo-4.1.2-150600.3.2.1
* openmpi4-debugsource-4.1.6-150600.3.2.1
* mvapich2-gnu-hpc-2.3.7-150600.9.2.1
* mpich-gnu-hpc-devel-static-4.1.2-150600.3.2.1
* mpich-ofi_4_1_2-gnu-hpc-devel-4.1.2-150600.3.2.1
* mvapich2-devel-static-2.3.7-150600.9.2.1
* mvapich2_2_3_7-gnu-hpc-devel-2.3.7-150600.9.2.1
* mpich-debuginfo-4.1.2-150600.3.2.1
* mpich-ofi-4.1.2-150600.3.2.1
* mpich-ofi-devel-4.1.2-150600.3.2.1
* mvapich2-2.3.7-150600.9.2.1
* openmpi_4_1_6-gnu-hpc-4.1.6-150600.3.2.1
* mpich_4_1_2-gnu-hpc-4.1.2-150600.3.2.1
* mvapich2_2_3_7-gnu-hpc-devel-static-2.3.7-150600.9.2.1
* libopenmpi_4_1_6-gnu-hpc-4.1.6-150600.3.2.1
* mpich_4_1_2-gnu-hpc-debuginfo-4.1.2-150600.3.2.1
* mpich_4_1_2-gnu-hpc-devel-static-4.1.2-150600.3.2.1
* openmpi_4_1_6-gnu-hpc-devel-static-4.1.6-150600.3.2.1
* mvapich2_2_3_7-gnu-hpc-debugsource-2.3.7-150600.9.2.1
* openmpi4-devel-debuginfo-4.1.6-150600.3.2.1
* mpich_4_1_2-gnu-hpc-debugsource-4.1.2-150600.3.2.1
* mpich_4_1_2-gnu-hpc-macros-devel-4.1.2-150600.3.2.1
* mpich-ofi-gnu-hpc-devel-static-4.1.2-150600.3.2.1
* mpich-ofi-debuginfo-4.1.2-150600.3.2.1
* mvapich2_2_3_7-gnu-hpc-2.3.7-150600.9.2.1
* openmpi4-libs-4.1.6-150600.3.2.1
* mvapich2-doc-2.3.7-150600.9.2.1
* mpich-ofi-gnu-hpc-devel-4.1.2-150600.3.2.1
* mvapich2-debuginfo-2.3.7-150600.9.2.1
* openmpi4-4.1.6-150600.3.2.1
* openmpi4-devel-4.1.6-150600.3.2.1
* openSUSE Leap 15.6 (noarch)
* mpich-ofi-gnu-hpc-macros-devel-4.1.2-150600.3.2.1
* mpich-gnu-hpc-macros-devel-4.1.2-150600.3.2.1
* openmpi4-testsuite-4.1.6-150600.3.2.1
* openmpi4-gnu-hpc-devel-4.1.6-150600.3.2.1
* openmpi4-gnu-hpc-docs-4.1.6-150600.3.2.1
* openmpi_4_1_6-gnu-hpc-testsuite-4.1.6-150600.3.2.1
* openmpi_4_1_4-gnu-hpc-testsuite-4.1.4-150500.3.2.1
* mvapich2-psm-gnu-hpc-doc-2.3.7-150500.3.2.1
* mvapich2-psm2-gnu-hpc-macros-devel-2.3.7-150600.9.2.1
* mvapich2-psm-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* pmix-headers-3.2.3-150300.3.10.1
* pmix-mca-params-3.2.3-150300.3.10.1
* openmpi4-gnu-hpc-macros-devel-4.1.6-150600.3.2.1
* luaposix-doc-34.1.1-150200.3.5.1
* mvapich2-gnu-hpc-macros-devel-2.3.7-150600.9.2.1
* mvapich2-gnu-hpc-doc-2.3.7-150600.9.2.1
* mvapich2-psm2-gnu-hpc-doc-2.3.7-150600.9.2.1
* openSUSE Leap 15.6 (x86_64)
* mvapich2-psm2-debugsource-2.3.7-150600.9.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-debugsource-2.3.7-150600.9.2.1
* mvapich2-psm-2.3.7-150500.3.2.1
* openmpi4-libs-32bit-4.1.6-150600.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-doc-2.3.7-150600.9.2.1
* mvapich2-psm2-gnu-hpc-2.3.7-150600.9.2.1
* mvapich2-psm2-debuginfo-2.3.7-150600.9.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-macros-devel-2.3.7-150600.9.2.1
* mvapich2-psm_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1
* mvapich2-psm2-2.3.7-150600.9.2.1
* mvapich2-psm-devel-2.3.7-150500.3.2.1
* mvapich2-psm2-devel-2.3.7-150600.9.2.1
* mvapich2-psm2-devel-static-2.3.7-150600.9.2.1
* mvapich2-psm-gnu-hpc-devel-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-debuginfo-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-debugsource-2.3.7-150500.3.2.1
* mvapich2-psm2-gnu-hpc-devel-2.3.7-150600.9.2.1
* mvapich2-psm-devel-static-2.3.7-150500.3.2.1
* mvapich2-psm-debuginfo-2.3.7-150500.3.2.1
* mvapich2-psm-doc-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* mvapich2-psm-debugsource-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-devel-2.3.7-150600.9.2.1
* mvapich2-psm2-doc-2.3.7-150600.9.2.1
* mvapich2-psm_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-debuginfo-2.3.7-150600.9.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-devel-static-2.3.7-150600.9.2.1
* mvapich2-psm_2_3_7-gnu-hpc-2.3.7-150500.3.2.1
* mvapich2-psm-gnu-hpc-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-2.3.7-150600.9.2.1
* openmpi4-libs-32bit-debuginfo-4.1.6-150600.3.2.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* openmpi4-libs-64bit-debuginfo-4.1.6-150600.3.2.1
* openmpi4-libs-64bit-4.1.6-150600.3.2.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* pmix-plugin-munge-3.2.3-150300.3.10.1
* libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* lua51-luaposix-34.1.1-150200.3.5.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* pmix-plugins-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* openmpi_4_1_4-gnu-hpc-debuginfo-4.1.4-150500.3.2.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* pmix-3.2.3-150300.3.10.1
* pmix-devel-3.2.3-150300.3.10.1
* openmpi_4_1_4-gnu-hpc-docs-4.1.4-150500.3.2.1
* hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libpmix2-3.2.3-150300.3.10.1
* mpich-ofi_4_0_2-gnu-hpc-debugsource-4.0.2-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-macros-devel-4.0.2-150500.3.2.1
* libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-test-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* mpich-ofi_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* mpich_4_0_2-gnu-hpc-4.0.2-150500.3.2.1
* hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_4-gnu-hpc-devel-debuginfo-4.1.4-150500.3.2.1
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* lua53-luaterm-0.07-150000.5.5.1
* libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich_4_0_2-gnu-hpc-debuginfo-4.0.2-150500.3.2.1
* libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1
* pmix-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_4-gnu-hpc-devel-4.1.4-150500.3.2.1
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2
* lua53-luaposix-34.1.1-150200.3.5.1
* libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2
* mpich_4_0_2-gnu-hpc-debugsource-4.0.2-150500.3.2.1
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* lua51-luaterm-debuginfo-0.07-150000.5.5.1
* pmix-test-3.2.3-150300.3.10.1
* openmpi_4_1_4-gnu-hpc-macros-devel-4.1.4-150500.3.2.1
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* lua51-luaterm-0.07-150000.5.5.1
* mpich_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1
* libmca_common_dstore1-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* mpich-ofi_4_0_2-gnu-hpc-4.0.2-150500.3.2.1
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.17.2
* libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1
* mpich_4_0_2-gnu-hpc-macros-devel-4.0.2-150500.3.2.1
* pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1
* lua53-luaterm-debuginfo-0.07-150000.5.5.1
* libopenmpi_4_1_4-gnu-hpc-debuginfo-4.1.4-150500.3.2.1
* mpich_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.17.2
* libpmix2-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-plugins-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* lua51-luaposix-debuginfo-34.1.1-150200.3.5.1
* lua51-luaterm-debugsource-0.07-150000.5.5.1
* libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libopenmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1
* hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2
* openmpi_4_1_4-gnu-hpc-debugsource-4.1.4-150500.3.2.1
* libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* lua53-luaterm-debugsource-0.07-150000.5.5.1
* libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* mpich-ofi_4_0_2-gnu-hpc-debuginfo-4.0.2-150500.3.2.1
* libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* lua53-luaposix-debuginfo-34.1.1-150200.3.5.1
* openmpi_4_1_4-gnu-hpc-devel-static-4.1.4-150500.3.2.1
* libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* pmix-debugsource-3.2.3-150300.3.10.1
* HPC Module 15-SP5 (noarch)
* hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1
* hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* mvapich2-psm-gnu-hpc-doc-2.3.7-150500.3.2.1
* mvapich2-psm-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* hdf5-hpc-examples-1.10.11-150400.3.17.1
* hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openmpi4-gnu-hpc-macros-devel-4.1.4-150500.3.2.1
* mvapich2-psm2-gnu-hpc-doc-2.3.7-150500.3.2.1
* mvapich2-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* mvapich2-gnu-hpc-doc-2.3.7-150500.3.2.1
* luaposix-doc-34.1.1-150200.3.5.1
* hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* openmpi4-gnu-hpc-devel-4.1.4-150500.3.2.1
* hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* openmpi4-gnu-hpc-docs-4.1.4-150500.3.2.1
* mvapich2-psm2-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-hpc-1.10.11-150400.3.17.1
* mpich-gnu-hpc-macros-devel-4.0.2-150500.3.2.1
* pmix-headers-3.2.3-150300.3.10.1
* hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* pmix-mca-params-3.2.3-150300.3.10.1
* hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* HPC Module 15-SP5 (aarch64 x86_64)
* mvapich2-gnu-hpc-2.3.7-150500.3.2.1
* libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* mvapich2_2_3_7-gnu-hpc-2.3.7-150500.3.2.1
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* mvapich2-gnu-hpc-devel-2.3.7-150500.3.2.1
* pmix-plugin-munge-3.2.3-150300.3.10.1
* mpich-gnu-hpc-devel-4.0.2-150500.3.2.1
* libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* pmix-plugins-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* openmpi_4_1_4-gnu-hpc-debuginfo-4.1.4-150500.3.2.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* pmix-3.2.3-150300.3.10.1
* openmpi_4_1_4-gnu-hpc-docs-4.1.4-150500.3.2.1
* hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libpmix2-3.2.3-150300.3.10.1
* mpich-ofi_4_0_2-gnu-hpc-debugsource-4.0.2-150500.3.2.1
* libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.17.1
* mpich-ofi-gnu-hpc-4.0.2-150500.3.2.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-test-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1
* libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1
* mvapich2_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openmpi4-gnu-hpc-devel-static-4.1.4-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* mpich_4_0_2-gnu-hpc-4.0.2-150500.3.2.1
* hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_4-gnu-hpc-devel-debuginfo-4.1.4-150500.3.2.1
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* lua53-luaterm-0.07-150000.5.5.1
* libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich_4_0_2-gnu-hpc-debuginfo-4.0.2-150500.3.2.1
* libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1
* pmix-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_4-gnu-hpc-devel-4.1.4-150500.3.2.1
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2
* lua53-luaposix-34.1.1-150200.3.5.1
* libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2
* mpich_4_0_2-gnu-hpc-debugsource-4.0.2-150500.3.2.1
* libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openmpi4-gnu-hpc-4.1.4-150500.3.2.1
* libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-test-3.2.3-150300.3.10.1
* openmpi_4_1_4-gnu-hpc-macros-devel-4.1.4-150500.3.2.1
* libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* mpich-ofi-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* mpich-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1
* libmca_common_dstore1-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libopenmpi4-gnu-hpc-4.1.4-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-4.0.2-150500.3.2.1
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.17.2
* libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1
* mpich_4_0_2-gnu-hpc-macros-devel-4.0.2-150500.3.2.1
* libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-debuginfo-2.3.7-150500.3.2.1
* pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1
* lua53-luaterm-debuginfo-0.07-150000.5.5.1
* libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libopenmpi_4_1_4-gnu-hpc-debuginfo-4.1.4-150500.3.2.1
* mpich_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.17.2
* libpmix2-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-debugsource-2.3.7-150500.3.2.1
* hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-plugins-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2
* libopenmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1
* libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* openmpi_4_1_4-gnu-hpc-debugsource-4.1.4-150500.3.2.1
* mpich-gnu-hpc-4.0.2-150500.3.2.1
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5-gnu-hpc-1.10.11-150400.3.17.1
* mvapich2_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* lua53-luaterm-debugsource-0.07-150000.5.5.1
* libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* mpich-ofi_4_0_2-gnu-hpc-debuginfo-4.0.2-150500.3.2.1
* libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* mpich-ofi-gnu-hpc-devel-4.0.2-150500.3.2.1
* lua53-luaposix-debuginfo-34.1.1-150200.3.5.1
* openmpi_4_1_4-gnu-hpc-devel-static-4.1.4-150500.3.2.1
* libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* pmix-debugsource-3.2.3-150300.3.10.1
* HPC Module 15-SP5 (x86_64)
* mvapich2-psm_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-debuginfo-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-debugsource-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* pmix-devel-3.2.3-150300.3.10.1
* mvapich2-psm_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1
* mvapich2-psm2-gnu-hpc-devel-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-debugsource-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-2.3.7-150500.3.2.1
* mvapich2-psm-gnu-hpc-devel-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1
* mvapich2-psm_2_3_7-gnu-hpc-debuginfo-2.3.7-150500.3.2.1
* mvapich2-psm-gnu-hpc-2.3.7-150500.3.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-2.3.7-150500.3.2.1
* mvapich2-psm2-gnu-hpc-2.3.7-150500.3.2.1
* HPC Module 15-SP6 (noarch)
* hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1
* mvapich2-psm2-gnu-hpc-doc-2.3.7-150600.9.2.1
* hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* mpich-gnu-hpc-macros-devel-4.1.2-150600.3.2.1
* openmpi4-gnu-hpc-devel-4.1.6-150600.3.2.1
* luaposix-doc-34.1.1-150200.3.5.1
* openmpi4-gnu-hpc-docs-4.1.6-150600.3.2.1
* pmix-headers-3.2.3-150300.3.10.1
* mvapich2-psm2-gnu-hpc-macros-devel-2.3.7-150600.9.2.1
* hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* pmix-mca-params-3.2.3-150300.3.10.1
* openmpi4-gnu-hpc-macros-devel-4.1.6-150600.3.2.1
* hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5-hpc-examples-1.10.11-150400.3.17.1
* hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-hpc-1.10.11-150400.3.17.1
* mvapich2-gnu-hpc-macros-devel-2.3.7-150600.9.2.1
* mvapich2-gnu-hpc-doc-2.3.7-150600.9.2.1
* hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* HPC Module 15-SP6 (aarch64 x86_64)
* openmpi_4_1_6-gnu-hpc-docs-4.1.6-150600.3.2.1
* libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* pmix-plugin-munge-3.2.3-150300.3.10.1
* libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* mvapich2-gnu-hpc-devel-2.3.7-150600.9.2.1
* mpich-ofi_4_1_2-gnu-hpc-debugsource-4.1.2-150600.3.2.1
* libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* pmix-plugins-3.2.3-150300.3.10.1
* libopenmpi4-gnu-hpc-4.1.6-150600.3.2.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-macros-devel-2.3.7-150600.9.2.1
* libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_6-gnu-hpc-devel-debuginfo-4.1.6-150600.3.2.1
* libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* pmix-3.2.3-150300.3.10.1
* openmpi_4_1_6-gnu-hpc-macros-devel-4.1.6-150600.3.2.1
* hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libpmix2-3.2.3-150300.3.10.1
* libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.17.1
* libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1
* pmix-test-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-devel-2.3.7-150600.9.2.1
* libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1
* openmpi_4_1_6-gnu-hpc-4.1.6-150600.3.2.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-devel-static-2.3.7-150600.9.2.1
* libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich_4_1_2-gnu-hpc-macros-devel-4.1.2-150600.3.2.1
* mvapich2_2_3_7-gnu-hpc-debuginfo-2.3.7-150600.9.2.1
* hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* lua53-luaterm-0.07-150000.5.5.1
* openmpi4-gnu-hpc-devel-static-4.1.6-150600.3.2.1
* libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libopenmpi_4_1_6-gnu-hpc-debuginfo-4.1.6-150600.3.2.1
* hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2
* mpich_4_1_2-gnu-hpc-devel-4.1.2-150600.3.2.1
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_6-gnu-hpc-debugsource-4.1.6-150600.3.2.1
* pmix-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2
* lua53-luaposix-34.1.1-150200.3.5.1
* mvapich2-gnu-hpc-2.3.7-150600.9.2.1
* libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich-ofi_4_1_2-gnu-hpc-devel-4.1.2-150600.3.2.1
* libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-test-3.2.3-150300.3.10.1
* mpich_4_1_2-gnu-hpc-4.1.2-150600.3.2.1
* libopenmpi_4_1_6-gnu-hpc-4.1.6-150600.3.2.1
* openmpi_4_1_6-gnu-hpc-devel-static-4.1.6-150600.3.2.1
* mvapich2_2_3_7-gnu-hpc-debugsource-2.3.7-150600.9.2.1
* libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* mpich-ofi_4_1_2-gnu-hpc-4.1.2-150600.3.2.1
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libmca_common_dstore1-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* mpich-ofi_4_1_2-gnu-hpc-devel-static-4.1.2-150600.3.2.1
* libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.17.2
* openmpi4-gnu-hpc-4.1.6-150600.3.2.1
* mpich-ofi-gnu-hpc-4.1.2-150600.3.2.1
* mpich-gnu-hpc-devel-4.1.2-150600.3.2.1
* libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1
* libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1
* lua53-luaterm-debuginfo-0.07-150000.5.5.1
* libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.17.2
* libpmix2-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich_4_1_2-gnu-hpc-debuginfo-4.1.2-150600.3.2.1
* mpich_4_1_2-gnu-hpc-devel-static-4.1.2-150600.3.2.1
* hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-plugins-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* openmpi_4_1_6-gnu-hpc-debuginfo-4.1.6-150600.3.2.1
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-doc-2.3.7-150600.9.2.1
* libhdf5-gnu-hpc-1.10.11-150400.3.17.1
* openmpi_4_1_6-gnu-hpc-devel-4.1.6-150600.3.2.1
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* lua53-luaterm-debugsource-0.07-150000.5.5.1
* libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* mpich-gnu-hpc-4.1.2-150600.3.2.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* mpich-ofi_4_1_2-gnu-hpc-debuginfo-4.1.2-150600.3.2.1
* libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* mpich-gnu-hpc-devel-static-4.1.2-150600.3.2.1
* libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* lua53-luaposix-debuginfo-34.1.1-150200.3.5.1
* libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich_4_1_2-gnu-hpc-debugsource-4.1.2-150600.3.2.1
* mpich-ofi-gnu-hpc-devel-static-4.1.2-150600.3.2.1
* pmix-debugsource-3.2.3-150300.3.10.1
* mvapich2_2_3_7-gnu-hpc-2.3.7-150600.9.2.1
* mpich-ofi-gnu-hpc-devel-4.1.2-150600.3.2.1
* HPC Module 15-SP6 (x86_64)
* mvapich2-psm2_2_3_7-gnu-hpc-debugsource-2.3.7-150600.9.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-devel-2.3.7-150600.9.2.1
* pmix-devel-3.2.3-150300.3.10.1
* mvapich2-psm2_2_3_7-gnu-hpc-doc-2.3.7-150600.9.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-debuginfo-2.3.7-150600.9.2.1
* mvapich2-psm2-gnu-hpc-2.3.7-150600.9.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-devel-static-2.3.7-150600.9.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-macros-devel-2.3.7-150600.9.2.1
* mvapich2-psm2_2_3_7-gnu-hpc-2.3.7-150600.9.2.1
* mvapich2-psm2-gnu-hpc-devel-2.3.7-150600.9.2.1
* SUSE Package Hub 15 15-SP5 (noarch)
* hdf5-hpc-examples-1.10.11-150400.3.17.1
* openmpi4-gnu-hpc-docs-4.1.4-150500.3.2.1
* hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1
* mpich-ofi-gnu-hpc-macros-devel-4.0.2-150500.3.2.1
* mvapich2-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* mpich-gnu-hpc-macros-devel-4.0.2-150500.3.2.1
* mvapich2-gnu-hpc-doc-2.3.7-150500.3.2.1
* hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* pmix-mca-params-3.2.3-150300.3.10.1
* hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-hpc-1.10.11-150400.3.17.1
* openmpi4-gnu-hpc-devel-4.1.4-150500.3.2.1
* hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* openmpi4-gnu-hpc-macros-devel-4.1.4-150500.3.2.1
* SUSE Package Hub 15 15-SP5 (ppc64le s390x)
* mvapich2-gnu-hpc-2.3.7-150500.3.2.1
* libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-2.3.7-150500.3.2.1
* pmix-plugin-munge-3.2.3-150300.3.10.1
* mvapich2-gnu-hpc-devel-2.3.7-150500.3.2.1
* mpich-gnu-hpc-devel-4.0.2-150500.3.2.1
* libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* pmix-plugins-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* openmpi_4_1_4-gnu-hpc-debuginfo-4.1.4-150500.3.2.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1
* libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* pmix-3.2.3-150300.3.10.1
* openmpi_4_1_4-gnu-hpc-docs-4.1.4-150500.3.2.1
* hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libpmix2-3.2.3-150300.3.10.1
* mpich-ofi_4_0_2-gnu-hpc-debugsource-4.0.2-150500.3.2.1
* libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich-ofi_4_0_2-gnu-hpc-macros-devel-4.0.2-150500.3.2.1
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* mpich-ofi-gnu-hpc-4.0.2-150500.3.2.1
* hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-test-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1
* hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openmpi4-gnu-hpc-devel-static-4.1.4-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* mpich_4_0_2-gnu-hpc-4.0.2-150500.3.2.1
* hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_4-gnu-hpc-devel-debuginfo-4.1.4-150500.3.2.1
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* lua53-luaterm-0.07-150000.5.5.1
* libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* lua53-luafilesystem-1.7.0-150000.3.5.1
* hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich_4_0_2-gnu-hpc-debuginfo-4.0.2-150500.3.2.1
* libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1
* pmix-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_4-gnu-hpc-devel-4.1.4-150500.3.2.1
* hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2
* lua53-luaposix-34.1.1-150200.3.5.1
* libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2
* mpich_4_0_2-gnu-hpc-debugsource-4.0.2-150500.3.2.1
* libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openmpi4-gnu-hpc-4.1.4-150500.3.2.1
* libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-test-3.2.3-150300.3.10.1
* openmpi_4_1_4-gnu-hpc-macros-devel-4.1.4-150500.3.2.1
* libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* mpich-ofi-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* mpich-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1
* libmca_common_dstore1-3.2.3-150300.3.10.1
* libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libopenmpi4-gnu-hpc-4.1.4-150500.3.2.1
* mpich-ofi_4_0_2-gnu-hpc-4.0.2-150500.3.2.1
* libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1
* mpich_4_0_2-gnu-hpc-macros-devel-4.0.2-150500.3.2.1
* libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-debuginfo-2.3.7-150500.3.2.1
* pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1
* libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libopenmpi_4_1_4-gnu-hpc-debuginfo-4.1.4-150500.3.2.1
* mpich_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1
* libpmix2-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-debugsource-2.3.7-150500.3.2.1
* hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-plugins-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2
* libopenmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1
* libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* openmpi_4_1_4-gnu-hpc-debugsource-4.1.4-150500.3.2.1
* mpich-gnu-hpc-4.0.2-150500.3.2.1
* hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5-gnu-hpc-1.10.11-150400.3.17.1
* mvapich2_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* mpich-ofi_4_0_2-gnu-hpc-debuginfo-4.0.2-150500.3.2.1
* libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich-ofi-gnu-hpc-devel-4.0.2-150500.3.2.1
* openmpi_4_1_4-gnu-hpc-devel-static-4.1.4-150500.3.2.1
* libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* pmix-debugsource-3.2.3-150300.3.10.1
* SUSE Package Hub 15 15-SP6 (noarch)
* hdf5-hpc-examples-1.10.11-150400.3.17.1
* hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1
* mpich-ofi-gnu-hpc-macros-devel-4.1.2-150600.3.2.1
* hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* mpich-gnu-hpc-macros-devel-4.1.2-150600.3.2.1
* openmpi4-gnu-hpc-devel-4.1.6-150600.3.2.1
* openmpi4-gnu-hpc-docs-4.1.6-150600.3.2.1
* hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* pmix-mca-params-3.2.3-150300.3.10.1
* openmpi4-gnu-hpc-macros-devel-4.1.6-150600.3.2.1
* hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-hpc-1.10.11-150400.3.17.1
* mvapich2-gnu-hpc-macros-devel-2.3.7-150600.9.2.1
* mvapich2-gnu-hpc-doc-2.3.7-150600.9.2.1
* hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* SUSE Package Hub 15 15-SP6 (ppc64le s390x)
* openmpi_4_1_6-gnu-hpc-docs-4.1.6-150600.3.2.1
* libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* pmix-plugin-munge-3.2.3-150300.3.10.1
* libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* mvapich2-gnu-hpc-devel-2.3.7-150600.9.2.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* mpich-ofi_4_1_2-gnu-hpc-debugsource-4.1.2-150600.3.2.1
* libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* pmix-plugins-3.2.3-150300.3.10.1
* libopenmpi4-gnu-hpc-4.1.6-150600.3.2.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-macros-devel-2.3.7-150600.9.2.1
* libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_6-gnu-hpc-devel-debuginfo-4.1.6-150600.3.2.1
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* pmix-3.2.3-150300.3.10.1
* openmpi_4_1_6-gnu-hpc-macros-devel-4.1.6-150600.3.2.1
* hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libpmix2-3.2.3-150300.3.10.1
* libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-test-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-devel-2.3.7-150600.9.2.1
* libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1
* openmpi_4_1_6-gnu-hpc-4.1.6-150600.3.2.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-devel-static-2.3.7-150600.9.2.1
* libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich_4_1_2-gnu-hpc-macros-devel-4.1.2-150600.3.2.1
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-debuginfo-2.3.7-150600.9.2.1
* hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* lua53-luaterm-0.07-150000.5.5.1
* openmpi4-gnu-hpc-devel-static-4.1.6-150600.3.2.1
* libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libopenmpi_4_1_6-gnu-hpc-debuginfo-4.1.6-150600.3.2.1
* lua53-luafilesystem-1.7.0-150000.3.5.1
* hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2
* mpich_4_1_2-gnu-hpc-devel-4.1.2-150600.3.2.1
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* openmpi_4_1_6-gnu-hpc-debugsource-4.1.6-150600.3.2.1
* pmix-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2
* lua53-luaposix-34.1.1-150200.3.5.1
* mvapich2-gnu-hpc-2.3.7-150600.9.2.1
* libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2
* mpich-ofi_4_1_2-gnu-hpc-devel-4.1.2-150600.3.2.1
* libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-test-3.2.3-150300.3.10.1
* mpich_4_1_2-gnu-hpc-4.1.2-150600.3.2.1
* libopenmpi_4_1_6-gnu-hpc-4.1.6-150600.3.2.1
* openmpi_4_1_6-gnu-hpc-devel-static-4.1.6-150600.3.2.1
* mvapich2_2_3_7-gnu-hpc-debugsource-2.3.7-150600.9.2.1
* libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* mpich-ofi_4_1_2-gnu-hpc-4.1.2-150600.3.2.1
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libmca_common_dstore1-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* mpich-ofi_4_1_2-gnu-hpc-devel-static-4.1.2-150600.3.2.1
* libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* openmpi4-gnu-hpc-4.1.6-150600.3.2.1
* mpich-ofi-gnu-hpc-4.1.2-150600.3.2.1
* mpich-gnu-hpc-devel-4.1.2-150600.3.2.1
* libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1
* libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1
* libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libpmix2-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* mpich_4_1_2-gnu-hpc-debuginfo-4.1.2-150600.3.2.1
* mpich_4_1_2-gnu-hpc-devel-static-4.1.2-150600.3.2.1
* hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-plugins-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* mpich-ofi_4_1_2-gnu-hpc-macros-devel-4.1.2-150600.3.2.1
* openmpi_4_1_6-gnu-hpc-debuginfo-4.1.6-150600.3.2.1
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* mvapich2_2_3_7-gnu-hpc-doc-2.3.7-150600.9.2.1
* libhdf5-gnu-hpc-1.10.11-150400.3.17.1
* openmpi_4_1_6-gnu-hpc-devel-4.1.6-150600.3.2.1
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* mpich-gnu-hpc-4.1.2-150600.3.2.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* mpich-ofi_4_1_2-gnu-hpc-debuginfo-4.1.2-150600.3.2.1
* libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* mpich-gnu-hpc-devel-static-4.1.2-150600.3.2.1
* libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* mpich_4_1_2-gnu-hpc-debugsource-4.1.2-150600.3.2.1
* mpich-ofi-gnu-hpc-devel-static-4.1.2-150600.3.2.1
* pmix-debugsource-3.2.3-150300.3.10.1
* mvapich2_2_3_7-gnu-hpc-2.3.7-150600.9.2.1
* mpich-ofi-gnu-hpc-devel-4.1.2-150600.3.2.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* openmpi4-debugsource-4.1.4-150500.3.2.1
* openmpi4-libs-debuginfo-4.1.4-150500.3.2.1
* openmpi4-devel-4.1.4-150500.3.2.1
* openmpi4-devel-debuginfo-4.1.4-150500.3.2.1
* mpich-ofi-4.0.2-150500.3.2.1
* mpich-ofi-debugsource-4.0.2-150500.3.2.1
* mpich-debuginfo-4.0.2-150500.3.2.1
* openmpi4-config-4.1.4-150500.3.2.1
* mvapich2-devel-static-2.3.7-150500.3.2.1
* mvapich2-debugsource-2.3.7-150500.3.2.1
* mpich-ofi-devel-4.0.2-150500.3.2.1
* openmpi4-debuginfo-4.1.4-150500.3.2.1
* mvapich2-2.3.7-150500.3.2.1
* mpich-debugsource-4.0.2-150500.3.2.1
* mpich-devel-4.0.2-150500.3.2.1
* mvapich2-debuginfo-2.3.7-150500.3.2.1
* openmpi4-docs-4.1.4-150500.3.2.1
* mvapich2-devel-2.3.7-150500.3.2.1
* openmpi4-4.1.4-150500.3.2.1
* openmpi4-libs-4.1.4-150500.3.2.1
* mpich-4.0.2-150500.3.2.1
* mpich-ofi-debuginfo-4.0.2-150500.3.2.1
* mvapich2-doc-2.3.7-150500.3.2.1
* Server Applications Module 15-SP5 (x86_64)
* mvapich2-psm-debuginfo-2.3.7-150500.3.2.1
* mvapich2-psm-2.3.7-150500.3.2.1
* mvapich2-psm-devel-2.3.7-150500.3.2.1
* mvapich2-psm2-debugsource-2.3.7-150500.3.2.1
* mvapich2-psm-debugsource-2.3.7-150500.3.2.1
* mvapich2-psm2-2.3.7-150500.3.2.1
* mvapich2-psm2-devel-2.3.7-150500.3.2.1
* mvapich2-psm2-debuginfo-2.3.7-150500.3.2.1
* Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* mpich-4.1.2-150600.3.2.1
* openmpi4-docs-4.1.6-150600.3.2.1
* openmpi4-libs-debuginfo-4.1.6-150600.3.2.1
* mpich-ofi-debugsource-4.1.2-150600.3.2.1
* mpich-debugsource-4.1.2-150600.3.2.1
* openmpi4-config-4.1.6-150600.3.2.1
* mvapich2-devel-2.3.7-150600.9.2.1
* mpich-devel-4.1.2-150600.3.2.1
* openmpi4-debuginfo-4.1.6-150600.3.2.1
* openmpi4-debugsource-4.1.6-150600.3.2.1
* mvapich2-devel-static-2.3.7-150600.9.2.1
* mpich-debuginfo-4.1.2-150600.3.2.1
* mpich-ofi-4.1.2-150600.3.2.1
* mpich-ofi-devel-4.1.2-150600.3.2.1
* mvapich2-2.3.7-150600.9.2.1
* openmpi4-devel-debuginfo-4.1.6-150600.3.2.1
* mpich-ofi-debuginfo-4.1.2-150600.3.2.1
* openmpi4-libs-4.1.6-150600.3.2.1
* mvapich2-doc-2.3.7-150600.9.2.1
* mvapich2-debugsource-2.3.7-150600.9.2.1
* mvapich2-debuginfo-2.3.7-150600.9.2.1
* openmpi4-4.1.6-150600.3.2.1
* openmpi4-devel-4.1.6-150600.3.2.1
* Server Applications Module 15-SP6 (x86_64)
* mvapich2-psm2-2.3.7-150600.9.2.1
* mvapich2-psm2-debuginfo-2.3.7-150600.9.2.1
* mvapich2-psm2-devel-2.3.7-150600.9.2.1
* mvapich2-psm2-debugsource-2.3.7-150600.9.2.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* lua53-luaterm-debugsource-0.07-150000.5.5.1
* lua53-luaposix-debuginfo-34.1.1-150200.3.5.1
* lua53-luafilesystem-debuginfo-1.7.0-150000.3.5.1
* lua53-luaposix-34.1.1-150200.3.5.1
* lua53-luaterm-0.07-150000.5.5.1
* lua53-luafilesystem-debugsource-1.7.0-150000.3.5.1
* lua53-luaterm-debuginfo-0.07-150000.5.5.1
* lua53-luafilesystem-1.7.0-150000.3.5.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* luaposix-doc-34.1.1-150200.3.5.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* pmix-plugin-munge-3.2.3-150300.3.10.1
* lua53-luaterm-0.07-150000.5.5.1
* pmix-plugins-3.2.3-150300.3.10.1
* libmca_common_dstore1-3.2.3-150300.3.10.1
* lua53-luafilesystem-1.7.0-150000.3.5.1
* pmix-3.2.3-150300.3.10.1
* lua53-luafilesystem-debuginfo-1.7.0-150000.3.5.1
* lua53-luafilesystem-debugsource-1.7.0-150000.3.5.1
* libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1
* libpmix2-3.2.3-150300.3.10.1
* pmix-debuginfo-3.2.3-150300.3.10.1
* lua53-luaterm-debugsource-0.07-150000.5.5.1
* lua53-luaposix-34.1.1-150200.3.5.1
* pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1
* lua53-luaterm-debuginfo-0.07-150000.5.5.1
* pmix-test-debuginfo-3.2.3-150300.3.10.1
* libpmix2-debuginfo-3.2.3-150300.3.10.1
* lua53-luaposix-debuginfo-34.1.1-150200.3.5.1
* pmix-test-3.2.3-150300.3.10.1
* pmix-debugsource-3.2.3-150300.3.10.1
* pmix-plugins-debuginfo-3.2.3-150300.3.10.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* pmix-headers-3.2.3-150300.3.10.1
* pmix-mca-params-3.2.3-150300.3.10.1
* luaposix-doc-34.1.1-150200.3.5.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* pmix-devel-3.2.3-150300.3.10.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* hdf5-hpc-examples-1.10.11-150400.3.17.1
* hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1
* hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-headers-3.2.3-150300.3.10.1
* luaposix-doc-34.1.1-150200.3.5.1
* hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* pmix-mca-params-3.2.3-150300.3.10.1
* hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-hpc-1.10.11-150400.3.17.1
* hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* pmix-plugin-munge-3.2.3-150300.3.10.1
* libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* pmix-plugins-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* pmix-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libpmix2-3.2.3-150300.3.10.1
* libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-test-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* lua53-luaterm-0.07-150000.5.5.1
* libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* lua53-luafilesystem-1.7.0-150000.3.5.1
* hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* lua53-luafilesystem-debuginfo-1.7.0-150000.3.5.1
* hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* lua53-luafilesystem-debugsource-1.7.0-150000.3.5.1
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2
* lua53-luaposix-34.1.1-150200.3.5.1
* libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2
* libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-test-3.2.3-150300.3.10.1
* libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libmca_common_dstore1-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.17.2
* libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1
* libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1
* lua53-luaterm-debuginfo-0.07-150000.5.5.1
* libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.17.2
* libpmix2-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-plugins-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* lua53-luaterm-debugsource-0.07-150000.5.5.1
* libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* lua53-luaposix-debuginfo-34.1.1-150200.3.5.1
* libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* pmix-debugsource-3.2.3-150300.3.10.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* pmix-devel-3.2.3-150300.3.10.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* hdf5-hpc-examples-1.10.11-150400.3.17.1
* hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1
* hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-headers-3.2.3-150300.3.10.1
* luaposix-doc-34.1.1-150200.3.5.1
* hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* pmix-mca-params-3.2.3-150300.3.10.1
* hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* hdf5-gnu-hpc-1.10.11-150400.3.17.1
* hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* pmix-plugin-munge-3.2.3-150300.3.10.1
* libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2
* pmix-plugins-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* pmix-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libpmix2-3.2.3-150300.3.10.1
* libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-test-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* lua53-luaterm-0.07-150000.5.5.1
* libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2
* lua53-luafilesystem-1.7.0-150000.3.5.1
* hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* lua53-luafilesystem-debuginfo-1.7.0-150000.3.5.1
* hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* lua53-luafilesystem-debugsource-1.7.0-150000.3.5.1
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-debuginfo-3.2.3-150300.3.10.1
* hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2
* lua53-luaposix-34.1.1-150200.3.5.1
* libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2
* libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-test-3.2.3-150300.3.10.1
* libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libmca_common_dstore1-3.2.3-150300.3.10.1
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.17.2
* libmca_common_dstore1-debuginfo-3.2.3-150300.3.10.1
* libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* pmix-plugin-munge-debuginfo-3.2.3-150300.3.10.1
* lua53-luaterm-debuginfo-0.07-150000.5.5.1
* libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.17.2
* libpmix2-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* pmix-plugins-debuginfo-3.2.3-150300.3.10.1
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2
* libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.17.2
* libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.17.2
* hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2
* lua53-luaterm-debugsource-0.07-150000.5.5.1
* libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2
* libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.17.2
* libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.17.1
* lua53-luaposix-debuginfo-34.1.1-150200.3.5.1
* libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2
* pmix-debugsource-3.2.3-150300.3.10.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* pmix-devel-3.2.3-150300.3.10.1

## References:

* https://www.suse.com/security/cve/CVE-2017-17507.html
* https://www.suse.com/security/cve/CVE-2018-11205.html
* https://www.suse.com/security/cve/CVE-2024-29158.html
* https://www.suse.com/security/cve/CVE-2024-29161.html
* https://www.suse.com/security/cve/CVE-2024-29166.html
* https://www.suse.com/security/cve/CVE-2024-32608.html
* https://www.suse.com/security/cve/CVE-2024-32610.html
* https://www.suse.com/security/cve/CVE-2024-32614.html
* https://www.suse.com/security/cve/CVE-2024-32619.html
* https://www.suse.com/security/cve/CVE-2024-32620.html
* https://www.suse.com/security/cve/CVE-2024-33873.html
* https://www.suse.com/security/cve/CVE-2024-33874.html
* https://www.suse.com/security/cve/CVE-2024-33875.html
* https://bugzilla.suse.com/show_bug.cgi?id=1224158



SUSE-SU-2024:2198-1: important: Security update for ghostscript


# Security update for ghostscript

Announcement ID: SUSE-SU-2024:2198-1
Rating: important
References:

* bsc#1225491

Cross-References:

* CVE-2024-33871

CVSS scores:

* CVE-2024-33871 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:

* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves one vulnerability can now be installed.

## Description:

This update for ghostscript fixes the following issues:

* CVE-2024-33871: Prevent OPVP device arbitrary code execution via custom
Driver library. (bsc#1225491)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2198=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-2198=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2198=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2198=1

* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2198=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2198=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2198=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2198=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2198=1

* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2198=1

* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2198=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2198=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2198=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2198=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2198=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2198=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-2198=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2198=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-2198=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Manager Proxy 4.3 (x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* ghostscript-9.52-150000.191.1
* ghostscript-devel-9.52-150000.191.1
* ghostscript-x11-debuginfo-9.52-150000.191.1
* ghostscript-debugsource-9.52-150000.191.1
* ghostscript-debuginfo-9.52-150000.191.1
* ghostscript-x11-9.52-150000.191.1

## References:

* https://www.suse.com/security/cve/CVE-2024-33871.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225491



SUSE-SU-2024:2190-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:2190-1
Rating: important
References:

* bsc#1065729
* bsc#1141539
* bsc#1174585
* bsc#1181674
* bsc#1187716
* bsc#1190569
* bsc#1191949
* bsc#1192107
* bsc#1193983
* bsc#1194288
* bsc#1194869
* bsc#1196956
* bsc#1197915
* bsc#1200465
* bsc#1205205
* bsc#1207284
* bsc#1207361
* bsc#1207948
* bsc#1208149
* bsc#1209657
* bsc#1209799
* bsc#1209834
* bsc#1209980
* bsc#1210335
* bsc#1213863
* bsc#1214852
* bsc#1215322
* bsc#1215702
* bsc#1216358
* bsc#1216702
* bsc#1217169
* bsc#1217339
* bsc#1217515
* bsc#1218447
* bsc#1220021
* bsc#1220267
* bsc#1220363
* bsc#1220783
* bsc#1221044
* bsc#1221081
* bsc#1221615
* bsc#1221777
* bsc#1221816
* bsc#1221829
* bsc#1222011
* bsc#1222374
* bsc#1222385
* bsc#1222413
* bsc#1222464
* bsc#1222513
* bsc#1222559
* bsc#1222561
* bsc#1222608
* bsc#1222619
* bsc#1222627
* bsc#1222721
* bsc#1222765
* bsc#1222770
* bsc#1222783
* bsc#1222793
* bsc#1222870
* bsc#1222893
* bsc#1222960
* bsc#1222961
* bsc#1222974
* bsc#1222975
* bsc#1222976
* bsc#1223011
* bsc#1223023
* bsc#1223027
* bsc#1223031
* bsc#1223043
* bsc#1223046
* bsc#1223048
* bsc#1223049
* bsc#1223084
* bsc#1223113
* bsc#1223119
* bsc#1223137
* bsc#1223138
* bsc#1223140
* bsc#1223188
* bsc#1223203
* bsc#1223207
* bsc#1223315
* bsc#1223360
* bsc#1223384
* bsc#1223390
* bsc#1223432
* bsc#1223489
* bsc#1223505
* bsc#1223532
* bsc#1223575
* bsc#1223595
* bsc#1223626
* bsc#1223627
* bsc#1223628
* bsc#1223631
* bsc#1223633
* bsc#1223638
* bsc#1223650
* bsc#1223653
* bsc#1223666
* bsc#1223670
* bsc#1223671
* bsc#1223675
* bsc#1223677
* bsc#1223678
* bsc#1223679
* bsc#1223698
* bsc#1223712
* bsc#1223715
* bsc#1223717
* bsc#1223718
* bsc#1223737
* bsc#1223738
* bsc#1223741
* bsc#1223744
* bsc#1223747
* bsc#1223748
* bsc#1223750
* bsc#1223752
* bsc#1223754
* bsc#1223756
* bsc#1223757
* bsc#1223762
* bsc#1223769
* bsc#1223770
* bsc#1223779
* bsc#1223780
* bsc#1223781
* bsc#1223788
* bsc#1223802
* bsc#1223819
* bsc#1223823
* bsc#1223826
* bsc#1223828
* bsc#1223829
* bsc#1223837
* bsc#1223842
* bsc#1223843
* bsc#1223844
* bsc#1223847
* bsc#1223858
* bsc#1223875
* bsc#1223879
* bsc#1223895
* bsc#1223959
* bsc#1223961
* bsc#1223991
* bsc#1223996
* bsc#1224020
* bsc#1224076
* bsc#1224096
* bsc#1224098
* bsc#1224099
* bsc#1224137
* bsc#1224166
* bsc#1224174
* bsc#1224177
* bsc#1224180
* bsc#1224181
* bsc#1224187
* bsc#1224331
* bsc#1224346
* bsc#1224423
* bsc#1224432
* bsc#1224437
* bsc#1224438
* bsc#1224442
* bsc#1224443
* bsc#1224445
* bsc#1224449
* bsc#1224479
* bsc#1224482
* bsc#1224487
* bsc#1224488
* bsc#1224492
* bsc#1224494
* bsc#1224495
* bsc#1224502
* bsc#1224508
* bsc#1224509
* bsc#1224511
* bsc#1224519
* bsc#1224524
* bsc#1224525
* bsc#1224530
* bsc#1224531
* bsc#1224534
* bsc#1224535
* bsc#1224537
* bsc#1224541
* bsc#1224543
* bsc#1224549
* bsc#1224550
* bsc#1224558
* bsc#1224559
* bsc#1224566
* bsc#1224567
* bsc#1224571
* bsc#1224575
* bsc#1224576
* bsc#1224579
* bsc#1224580
* bsc#1224581
* bsc#1224582
* bsc#1224586
* bsc#1224587
* bsc#1224592
* bsc#1224598
* bsc#1224601
* bsc#1224607
* bsc#1224608
* bsc#1224611
* bsc#1224615
* bsc#1224617
* bsc#1224618
* bsc#1224621
* bsc#1224622
* bsc#1224624
* bsc#1224627
* bsc#1224628
* bsc#1224629
* bsc#1224632
* bsc#1224636
* bsc#1224637
* bsc#1224638
* bsc#1224640
* bsc#1224643
* bsc#1224644
* bsc#1224645
* bsc#1224647
* bsc#1224648
* bsc#1224649
* bsc#1224650
* bsc#1224651
* bsc#1224657
* bsc#1224659
* bsc#1224660
* bsc#1224663
* bsc#1224664
* bsc#1224665
* bsc#1224666
* bsc#1224667
* bsc#1224668
* bsc#1224671
* bsc#1224672
* bsc#1224676
* bsc#1224678
* bsc#1224679
* bsc#1224680
* bsc#1224681
* bsc#1224682
* bsc#1224685
* bsc#1224686
* bsc#1224692
* bsc#1224697
* bsc#1224699
* bsc#1224701
* bsc#1224703
* bsc#1224705
* bsc#1224707
* bsc#1224717
* bsc#1224718
* bsc#1224721
* bsc#1224722
* bsc#1224723
* bsc#1224725
* bsc#1224727
* bsc#1224728
* bsc#1224729
* bsc#1224730
* bsc#1224731
* bsc#1224732
* bsc#1224733
* bsc#1224736
* bsc#1224738
* bsc#1224739
* bsc#1224740
* bsc#1224747
* bsc#1224749
* bsc#1224759
* bsc#1224763
* bsc#1224764
* bsc#1224765
* bsc#1224766
* bsc#1224794
* bsc#1224795
* bsc#1224796
* bsc#1224803
* bsc#1224816
* bsc#1224895
* bsc#1224898
* bsc#1224900
* bsc#1224901
* bsc#1224902
* bsc#1224903
* bsc#1224904
* bsc#1224905
* bsc#1224907
* bsc#1224909
* bsc#1224910
* bsc#1224911
* bsc#1224912
* bsc#1224913
* bsc#1224914
* bsc#1224915
* bsc#1224920
* bsc#1224928
* bsc#1224929
* bsc#1224930
* bsc#1224931
* bsc#1224932
* bsc#1224936
* bsc#1224937
* bsc#1224941
* bsc#1224942
* bsc#1224944
* bsc#1224945
* bsc#1224947
* bsc#1224956
* bsc#1224988
* bsc#1224992
* bsc#1225000
* bsc#1225003
* bsc#1225005
* bsc#1225008
* bsc#1225009
* bsc#1225022
* bsc#1225031
* bsc#1225032
* bsc#1225036
* bsc#1225041
* bsc#1225044
* bsc#1225053
* bsc#1225076
* bsc#1225077
* bsc#1225082
* bsc#1225085
* bsc#1225086
* bsc#1225092
* bsc#1225095
* bsc#1225096
* bsc#1225097
* bsc#1225106
* bsc#1225108
* bsc#1225109
* bsc#1225114
* bsc#1225118
* bsc#1225121
* bsc#1225122
* bsc#1225123
* bsc#1225125
* bsc#1225126
* bsc#1225127
* bsc#1225129
* bsc#1225131
* bsc#1225132
* bsc#1225138
* bsc#1225139
* bsc#1225145
* bsc#1225151
* bsc#1225153
* bsc#1225156
* bsc#1225158
* bsc#1225160
* bsc#1225161
* bsc#1225164
* bsc#1225167
* bsc#1225180
* bsc#1225183
* bsc#1225184
* bsc#1225186
* bsc#1225187
* bsc#1225189
* bsc#1225190
* bsc#1225191
* bsc#1225192
* bsc#1225193
* bsc#1225195
* bsc#1225198
* bsc#1225201
* bsc#1225203
* bsc#1225205
* bsc#1225206
* bsc#1225207
* bsc#1225208
* bsc#1225209
* bsc#1225210
* bsc#1225214
* bsc#1225222
* bsc#1225223
* bsc#1225224
* bsc#1225225
* bsc#1225227
* bsc#1225228
* bsc#1225229
* bsc#1225230
* bsc#1225232
* bsc#1225233
* bsc#1225235
* bsc#1225236
* bsc#1225237
* bsc#1225238
* bsc#1225239
* bsc#1225240
* bsc#1225241
* bsc#1225242
* bsc#1225243
* bsc#1225244
* bsc#1225245
* bsc#1225246
* bsc#1225247
* bsc#1225248
* bsc#1225249
* bsc#1225250
* bsc#1225251
* bsc#1225252
* bsc#1225253
* bsc#1225254
* bsc#1225255
* bsc#1225256
* bsc#1225257
* bsc#1225258
* bsc#1225259
* bsc#1225260
* bsc#1225261
* bsc#1225262
* bsc#1225263
* bsc#1225268
* bsc#1225301
* bsc#1225303
* bsc#1225304
* bsc#1225306
* bsc#1225316
* bsc#1225318
* bsc#1225320
* bsc#1225321
* bsc#1225322
* bsc#1225323
* bsc#1225326
* bsc#1225327
* bsc#1225328
* bsc#1225329
* bsc#1225330
* bsc#1225331
* bsc#1225332
* bsc#1225333
* bsc#1225334
* bsc#1225335
* bsc#1225336
* bsc#1225337
* bsc#1225338
* bsc#1225339
* bsc#1225341
* bsc#1225342
* bsc#1225344
* bsc#1225346
* bsc#1225347
* bsc#1225351
* bsc#1225353
* bsc#1225354
* bsc#1225355
* bsc#1225357
* bsc#1225358
* bsc#1225360
* bsc#1225361
* bsc#1225366
* bsc#1225367
* bsc#1225368
* bsc#1225369
* bsc#1225370
* bsc#1225372
* bsc#1225373
* bsc#1225374
* bsc#1225375
* bsc#1225376
* bsc#1225377
* bsc#1225379
* bsc#1225380
* bsc#1225382
* bsc#1225383
* bsc#1225384
* bsc#1225386
* bsc#1225387
* bsc#1225388
* bsc#1225390
* bsc#1225392
* bsc#1225393
* bsc#1225396
* bsc#1225400
* bsc#1225404
* bsc#1225405
* bsc#1225408
* bsc#1225409
* bsc#1225410
* bsc#1225411
* bsc#1225424
* bsc#1225425
* bsc#1225427
* bsc#1225431
* bsc#1225435
* bsc#1225436
* bsc#1225437
* bsc#1225438
* bsc#1225439
* bsc#1225441
* bsc#1225442
* bsc#1225443
* bsc#1225444
* bsc#1225445
* bsc#1225446
* bsc#1225447
* bsc#1225450
* bsc#1225453
* bsc#1225455
* bsc#1225461
* bsc#1225463
* bsc#1225464
* bsc#1225466
* bsc#1225467
* bsc#1225468
* bsc#1225471
* bsc#1225472
* bsc#1225478
* bsc#1225479
* bsc#1225480
* bsc#1225482
* bsc#1225483
* bsc#1225486
* bsc#1225488
* bsc#1225490
* bsc#1225492
* bsc#1225495
* bsc#1225499
* bsc#1225500
* bsc#1225501
* bsc#1225502
* bsc#1225506
* bsc#1225508
* bsc#1225510
* bsc#1225513
* bsc#1225515
* bsc#1225529
* bsc#1225530
* bsc#1225532
* bsc#1225534
* bsc#1225535
* bsc#1225548
* bsc#1225549
* bsc#1225550
* bsc#1225553
* bsc#1225554
* bsc#1225555
* bsc#1225556
* bsc#1225557
* bsc#1225559
* bsc#1225560
* bsc#1225565
* bsc#1225566
* bsc#1225568
* bsc#1225569
* bsc#1225570
* bsc#1225571
* bsc#1225572
* bsc#1225577
* bsc#1225583
* bsc#1225584
* bsc#1225587
* bsc#1225588
* bsc#1225589
* bsc#1225590
* bsc#1225591
* bsc#1225592
* bsc#1225593
* bsc#1225595
* bsc#1225599
* bsc#1225616
* bsc#1225640
* bsc#1225642
* bsc#1225705
* bsc#1225708
* bsc#1225715
* bsc#1225720
* bsc#1225722
* bsc#1225734
* bsc#1225735
* bsc#1225747
* bsc#1225748
* bsc#1225756
* bsc#1225761
* bsc#1225766
* bsc#1225775
* bsc#1225810
* bsc#1225820
* bsc#1225829
* bsc#1225835
* bsc#1225842
* jsc#PED-3259
* jsc#PED-7167

Cross-References:

* CVE-2020-36788
* CVE-2021-4148
* CVE-2021-47358
* CVE-2021-47359
* CVE-2021-47360
* CVE-2021-47361
* CVE-2021-47362
* CVE-2021-47363
* CVE-2021-47364
* CVE-2021-47365
* CVE-2021-47366
* CVE-2021-47367
* CVE-2021-47368
* CVE-2021-47369
* CVE-2021-47370
* CVE-2021-47371
* CVE-2021-47372
* CVE-2021-47373
* CVE-2021-47374
* CVE-2021-47375
* CVE-2021-47376
* CVE-2021-47378
* CVE-2021-47379
* CVE-2021-47380
* CVE-2021-47381
* CVE-2021-47382
* CVE-2021-47383
* CVE-2021-47384
* CVE-2021-47385
* CVE-2021-47386
* CVE-2021-47387
* CVE-2021-47388
* CVE-2021-47389
* CVE-2021-47390
* CVE-2021-47391
* CVE-2021-47392
* CVE-2021-47393
* CVE-2021-47394
* CVE-2021-47395
* CVE-2021-47396
* CVE-2021-47397
* CVE-2021-47398
* CVE-2021-47399
* CVE-2021-47400
* CVE-2021-47401
* CVE-2021-47402
* CVE-2021-47403
* CVE-2021-47404
* CVE-2021-47405
* CVE-2021-47406
* CVE-2021-47407
* CVE-2021-47408
* CVE-2021-47409
* CVE-2021-47410
* CVE-2021-47412
* CVE-2021-47413
* CVE-2021-47414
* CVE-2021-47415
* CVE-2021-47416
* CVE-2021-47417
* CVE-2021-47418
* CVE-2021-47419
* CVE-2021-47420
* CVE-2021-47421
* CVE-2021-47422
* CVE-2021-47423
* CVE-2021-47424
* CVE-2021-47425
* CVE-2021-47426
* CVE-2021-47427
* CVE-2021-47428
* CVE-2021-47429
* CVE-2021-47430
* CVE-2021-47431
* CVE-2021-47433
* CVE-2021-47434
* CVE-2021-47435
* CVE-2021-47436
* CVE-2021-47437
* CVE-2021-47438
* CVE-2021-47439
* CVE-2021-47440
* CVE-2021-47441
* CVE-2021-47442
* CVE-2021-47443
* CVE-2021-47444
* CVE-2021-47445
* CVE-2021-47446
* CVE-2021-47447
* CVE-2021-47448
* CVE-2021-47449
* CVE-2021-47450
* CVE-2021-47451
* CVE-2021-47452
* CVE-2021-47453
* CVE-2021-47454
* CVE-2021-47455
* CVE-2021-47456
* CVE-2021-47457
* CVE-2021-47458
* CVE-2021-47459
* CVE-2021-47460
* CVE-2021-47461
* CVE-2021-47462
* CVE-2021-47463
* CVE-2021-47464
* CVE-2021-47465
* CVE-2021-47466
* CVE-2021-47467
* CVE-2021-47468
* CVE-2021-47469
* CVE-2021-47470
* CVE-2021-47471
* CVE-2021-47472
* CVE-2021-47473
* CVE-2021-47474
* CVE-2021-47475
* CVE-2021-47476
* CVE-2021-47477
* CVE-2021-47478
* CVE-2021-47479
* CVE-2021-47480
* CVE-2021-47481
* CVE-2021-47482
* CVE-2021-47483
* CVE-2021-47484
* CVE-2021-47485
* CVE-2021-47486
* CVE-2021-47488
* CVE-2021-47489
* CVE-2021-47490
* CVE-2021-47491
* CVE-2021-47492
* CVE-2021-47493
* CVE-2021-47494
* CVE-2021-47495
* CVE-2021-47496
* CVE-2021-47497
* CVE-2021-47498
* CVE-2021-47499
* CVE-2021-47500
* CVE-2021-47501
* CVE-2021-47502
* CVE-2021-47503
* CVE-2021-47504
* CVE-2021-47505
* CVE-2021-47506
* CVE-2021-47507
* CVE-2021-47508
* CVE-2021-47509
* CVE-2021-47510
* CVE-2021-47511
* CVE-2021-47512
* CVE-2021-47513
* CVE-2021-47514
* CVE-2021-47516
* CVE-2021-47518
* CVE-2021-47520
* CVE-2021-47521
* CVE-2021-47522
* CVE-2021-47523
* CVE-2021-47524
* CVE-2021-47525
* CVE-2021-47526
* CVE-2021-47527
* CVE-2021-47528
* CVE-2021-47529
* CVE-2021-47530
* CVE-2021-47531
* CVE-2021-47532
* CVE-2021-47533
* CVE-2021-47534
* CVE-2021-47535
* CVE-2021-47536
* CVE-2021-47537
* CVE-2021-47540
* CVE-2021-47541
* CVE-2021-47542
* CVE-2021-47544
* CVE-2021-47548
* CVE-2021-47549
* CVE-2021-47550
* CVE-2021-47551
* CVE-2021-47552
* CVE-2021-47553
* CVE-2021-47554
* CVE-2021-47555
* CVE-2021-47556
* CVE-2021-47557
* CVE-2021-47558
* CVE-2021-47559
* CVE-2021-47560
* CVE-2021-47562
* CVE-2021-47563
* CVE-2021-47564
* CVE-2021-47565
* CVE-2021-47569
* CVE-2022-48633
* CVE-2022-48662
* CVE-2022-48669
* CVE-2022-48689
* CVE-2022-48691
* CVE-2022-48699
* CVE-2022-48705
* CVE-2022-48708
* CVE-2022-48709
* CVE-2022-48710
* CVE-2023-0160
* CVE-2023-1829
* CVE-2023-42755
* CVE-2023-47233
* CVE-2023-52586
* CVE-2023-52591
* CVE-2023-52618
* CVE-2023-52642
* CVE-2023-52643
* CVE-2023-52644
* CVE-2023-52646
* CVE-2023-52650
* CVE-2023-52653
* CVE-2023-52654
* CVE-2023-52655
* CVE-2023-52656
* CVE-2023-52657
* CVE-2023-52659
* CVE-2023-52660
* CVE-2023-52661
* CVE-2023-52662
* CVE-2023-52664
* CVE-2023-52669
* CVE-2023-52671
* CVE-2023-52674
* CVE-2023-52676
* CVE-2023-52678
* CVE-2023-52679
* CVE-2023-52680
* CVE-2023-52683
* CVE-2023-52685
* CVE-2023-52686
* CVE-2023-52690
* CVE-2023-52691
* CVE-2023-52692
* CVE-2023-52693
* CVE-2023-52694
* CVE-2023-52696
* CVE-2023-52698
* CVE-2023-52699
* CVE-2023-52702
* CVE-2023-52703
* CVE-2023-52705
* CVE-2023-52707
* CVE-2023-52708
* CVE-2023-52730
* CVE-2023-52731
* CVE-2023-52732
* CVE-2023-52733
* CVE-2023-52736
* CVE-2023-52738
* CVE-2023-52739
* CVE-2023-52740
* CVE-2023-52741
* CVE-2023-52742
* CVE-2023-52743
* CVE-2023-52744
* CVE-2023-52745
* CVE-2023-52746
* CVE-2023-52747
* CVE-2023-52753
* CVE-2023-52754
* CVE-2023-52756
* CVE-2023-52757
* CVE-2023-52759
* CVE-2023-52763
* CVE-2023-52764
* CVE-2023-52766
* CVE-2023-52773
* CVE-2023-52774
* CVE-2023-52777
* CVE-2023-52781
* CVE-2023-52788
* CVE-2023-52789
* CVE-2023-52791
* CVE-2023-52795
* CVE-2023-52796
* CVE-2023-52798
* CVE-2023-52799
* CVE-2023-52800
* CVE-2023-52803
* CVE-2023-52804
* CVE-2023-52805
* CVE-2023-52806
* CVE-2023-52807
* CVE-2023-52808
* CVE-2023-52809
* CVE-2023-52810
* CVE-2023-52811
* CVE-2023-52814
* CVE-2023-52815
* CVE-2023-52816
* CVE-2023-52817
* CVE-2023-52818
* CVE-2023-52819
* CVE-2023-52821
* CVE-2023-52825
* CVE-2023-52826
* CVE-2023-52832
* CVE-2023-52833
* CVE-2023-52834
* CVE-2023-52838
* CVE-2023-52840
* CVE-2023-52841
* CVE-2023-52844
* CVE-2023-52847
* CVE-2023-52851
* CVE-2023-52853
* CVE-2023-52854
* CVE-2023-52855
* CVE-2023-52856
* CVE-2023-52858
* CVE-2023-52860
* CVE-2023-52861
* CVE-2023-52864
* CVE-2023-52865
* CVE-2023-52867
* CVE-2023-52868
* CVE-2023-52870
* CVE-2023-52871
* CVE-2023-52872
* CVE-2023-52873
* CVE-2023-52875
* CVE-2023-52876
* CVE-2023-52877
* CVE-2023-52878
* CVE-2023-52880
* CVE-2023-6531
* CVE-2024-2201
* CVE-2024-26597
* CVE-2024-26643
* CVE-2024-26679
* CVE-2024-26692
* CVE-2024-26698
* CVE-2024-26700
* CVE-2024-26715
* CVE-2024-26739
* CVE-2024-26742
* CVE-2024-26748
* CVE-2024-26758
* CVE-2024-26764
* CVE-2024-26775
* CVE-2024-26777
* CVE-2024-26778
* CVE-2024-26788
* CVE-2024-26791
* CVE-2024-26801
* CVE-2024-26822
* CVE-2024-26828
* CVE-2024-26829
* CVE-2024-26838
* CVE-2024-26839
* CVE-2024-26840
* CVE-2024-26846
* CVE-2024-26859
* CVE-2024-26870
* CVE-2024-26874
* CVE-2024-26876
* CVE-2024-26877
* CVE-2024-26880
* CVE-2024-26889
* CVE-2024-26894
* CVE-2024-26900
* CVE-2024-26907
* CVE-2024-26915
* CVE-2024-26916
* CVE-2024-26919
* CVE-2024-26920
* CVE-2024-26921
* CVE-2024-26922
* CVE-2024-26925
* CVE-2024-26928
* CVE-2024-26929
* CVE-2024-26930
* CVE-2024-26931
* CVE-2024-26933
* CVE-2024-26934
* CVE-2024-26935
* CVE-2024-26937
* CVE-2024-26938
* CVE-2024-26939
* CVE-2024-26940
* CVE-2024-26943
* CVE-2024-26957
* CVE-2024-26958
* CVE-2024-26964
* CVE-2024-26974
* CVE-2024-26977
* CVE-2024-26979
* CVE-2024-26984
* CVE-2024-26988
* CVE-2024-26989
* CVE-2024-26994
* CVE-2024-26996
* CVE-2024-26997
* CVE-2024-26999
* CVE-2024-27000
* CVE-2024-27001
* CVE-2024-27004
* CVE-2024-27008
* CVE-2024-27028
* CVE-2024-27037
* CVE-2024-27042
* CVE-2024-27045
* CVE-2024-27047
* CVE-2024-27051
* CVE-2024-27052
* CVE-2024-27053
* CVE-2024-27054
* CVE-2024-27059
* CVE-2024-27072
* CVE-2024-27073
* CVE-2024-27074
* CVE-2024-27075
* CVE-2024-27076
* CVE-2024-27077
* CVE-2024-27078
* CVE-2024-27388
* CVE-2024-27393
* CVE-2024-27395
* CVE-2024-27396
* CVE-2024-27398
* CVE-2024-27399
* CVE-2024-27400
* CVE-2024-27401
* CVE-2024-27405
* CVE-2024-27410
* CVE-2024-27412
* CVE-2024-27413
* CVE-2024-27416
* CVE-2024-27417
* CVE-2024-27419
* CVE-2024-27431
* CVE-2024-27435
* CVE-2024-27436
* CVE-2024-35789
* CVE-2024-35791
* CVE-2024-35796
* CVE-2024-35799
* CVE-2024-35801
* CVE-2024-35804
* CVE-2024-35806
* CVE-2024-35809
* CVE-2024-35811
* CVE-2024-35812
* CVE-2024-35813
* CVE-2024-35815
* CVE-2024-35817
* CVE-2024-35821
* CVE-2024-35822
* CVE-2024-35823
* CVE-2024-35825
* CVE-2024-35828
* CVE-2024-35829
* CVE-2024-35830
* CVE-2024-35833
* CVE-2024-35845
* CVE-2024-35847
* CVE-2024-35849
* CVE-2024-35851
* CVE-2024-35852
* CVE-2024-35854
* CVE-2024-35860
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35863
* CVE-2024-35864
* CVE-2024-35865
* CVE-2024-35866
* CVE-2024-35867
* CVE-2024-35868
* CVE-2024-35869
* CVE-2024-35870
* CVE-2024-35872
* CVE-2024-35875
* CVE-2024-35877
* CVE-2024-35878
* CVE-2024-35879
* CVE-2024-35885
* CVE-2024-35887
* CVE-2024-35895
* CVE-2024-35901
* CVE-2024-35904
* CVE-2024-35905
* CVE-2024-35907
* CVE-2024-35912
* CVE-2024-35914
* CVE-2024-35915
* CVE-2024-35922
* CVE-2024-35924
* CVE-2024-35930
* CVE-2024-35932
* CVE-2024-35933
* CVE-2024-35935
* CVE-2024-35936
* CVE-2024-35938
* CVE-2024-35939
* CVE-2024-35940
* CVE-2024-35943
* CVE-2024-35944
* CVE-2024-35947
* CVE-2024-35950
* CVE-2024-35951
* CVE-2024-35952
* CVE-2024-35955
* CVE-2024-35959
* CVE-2024-35963
* CVE-2024-35964
* CVE-2024-35965
* CVE-2024-35966
* CVE-2024-35967
* CVE-2024-35969
* CVE-2024-35973
* CVE-2024-35976
* CVE-2024-35978
* CVE-2024-35982
* CVE-2024-35984
* CVE-2024-35989
* CVE-2024-35990
* CVE-2024-35998
* CVE-2024-35999
* CVE-2024-36006
* CVE-2024-36007
* CVE-2024-36012
* CVE-2024-36014
* CVE-2024-36015
* CVE-2024-36016
* CVE-2024-36026
* CVE-2024-36029
* CVE-2024-36032
* CVE-2024-36880
* CVE-2024-36893
* CVE-2024-36896
* CVE-2024-36897
* CVE-2024-36906
* CVE-2024-36918
* CVE-2024-36924
* CVE-2024-36926
* CVE-2024-36928
* CVE-2024-36931
* CVE-2024-36938
* CVE-2024-36940
* CVE-2024-36941
* CVE-2024-36942
* CVE-2024-36944
* CVE-2024-36947
* CVE-2024-36950
* CVE-2024-36952
* CVE-2024-36955
* CVE-2024-36959

CVSS scores:

* CVE-2020-36788 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-4148 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-4148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47358 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47359 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47361 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-47362 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47363 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47364 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47365 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47366 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2021-47367 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47368 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-47369 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47370 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47371 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47372 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47373 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47374 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47375 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47379 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47380 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47382 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47387 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47388 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47389 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2021-47390 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47392 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47394 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47398 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47401 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47404 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47405 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47407 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47408 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47413 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47414 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47415 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47418 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47420 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47421 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47423 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47426 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47427 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47428 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47429 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47430 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2021-47434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47439 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47440 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47447 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47448 ( SUSE ): 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2021-47449 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47450 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47452 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47453 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47454 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47455 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47461 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47462 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47465 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47466 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47467 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2021-47468 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47469 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47470 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47471 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47472 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47473 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47474 ( SUSE ): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47475 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47476 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47477 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2021-47478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47479 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47480 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47481 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47482 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47488 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47489 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47490 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47491 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47492 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47496 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47497 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47499 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47502 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2021-47503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47504 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47505 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47506 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47508 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47510 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47512 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47513 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47513 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47514 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47516 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47518 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47518 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47520 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47520 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47521 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47521 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47522 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47523 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47524 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47525 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47525 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47526 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47526 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47528 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47528 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47529 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47529 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47530 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47531 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47532 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47533 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47534 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47535 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2021-47536 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2021-47537 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47537 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47540 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47540 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47541 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47544 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2021-47548 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
* CVE-2021-47549 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47550 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47550 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47552 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47553 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47554 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47555 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47556 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47559 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47565 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47569 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48689 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48691 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48708 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48709 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-42755 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2023-42755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52586 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52618 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-52642 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52644 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52656 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52661 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2023-52662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2023-52664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52671 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52702 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52703 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-52705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52707 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52730 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52731 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52738 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52739 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52743 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52744 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52745 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52746 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-52747 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52756 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-52757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52773 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52777 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52781 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52795 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52798 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52803 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52804 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52805 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52807 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52815 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52818 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52819 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52825 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52834 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52838 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52840 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52847 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52853 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52856 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52860 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52861 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52865 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52867 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52868 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52870 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52871 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-52872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52875 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52876 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-2201 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26597 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-26597 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-26643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26700 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26715 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26839 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26840 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26846 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26877 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26880 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26907 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-26907 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26933 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26935 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26938 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26939 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26940 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26979 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-26979 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26988 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26989 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26996 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27000 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27004 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27008 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-27028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-27045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-27047 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27051 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-27052 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27053 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27401 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-27405 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27419 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-27431 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35789 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35809 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35822 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-35823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-35851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35869 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35875 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-35877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-35930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35938 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-35939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-35940 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-35943 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35944 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-35947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35963 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-35964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35998 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35999 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-36006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36012 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36016 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36032 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-36880 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L
* CVE-2024-36893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36906 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-36918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36924 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36928 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36931 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L
* CVE-2024-36938 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36940 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-36941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36942 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-36944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36947 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-36950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36952 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36955 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36959 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP5
* Development Tools Module 15-SP5
* Legacy Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Availability Extension 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Workstation Extension 15 SP5

An update that solves 557 vulnerabilities, contains two features and has 42
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

* CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)
* CVE-2022-48689: Fixed data-race in lru_add_fn (bsc#1223959)
* CVE-2022-48691: Fixed memory leak in netfilter (bsc#1223961)
* CVE-2023-1829: Fixed a use-after-free vulnerability in the control index
filter (tcindex) (bsc#1210335).
* CVE-2023-42755: Check user supplied offsets (bsc#1215702).
* CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081).
* CVE-2023-52618: Fixed string overflow in block/rnbd-srv (bsc#1221615).
* CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
* CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187).
* CVE-2023-52660: Fiedx IRQ handling due to shared interrupts (bsc#1224443).
* CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).
* CVE-2023-52671: Fixed hang/underflow when transitioning to ODM4:1
(bsc#1224729).
* CVE-2023-52674: Add clamp() in scarlett2_mixer_ctl_put() (bsc#1224727).
* CVE-2023-52680: Fixed missing error checks to *_ctl_get() (bsc#1224608).
* CVE-2023-52692: Fixed missing error check to scarlett2_usb_set_config()
(bsc#1224628).
* CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621)
* CVE-2023-52746: Prevent potential spectre v1 gadget in xfrm_xlate32_attr()
(bsc#1225114)
* CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548).
* CVE-2023-52795: Fixed use after free in vhost_vdpa_probe() (bsc#1225085).
* CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
* CVE-2023-52807: Fixed out-of-bounds access may occur when coalesce info is
read via debugfs (bsc#1225097).
* CVE-2023-52860: Fixed null pointer dereference in hisi_hns3 (bsc#1224936).
* CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix
garbage collector's deletion of SKB races with unix_stream_read_generic()on
the socket that the SKB is queued on (bsc#1218447).
* CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
* CVE-2024-26643: Fixed mark set as dead when unbinding anonymous set with
timeout (bsc#1221829).
* CVE-2024-26679: Fixed read sk->sk_family once in inet_recv_error()
(bsc#1222385).
* CVE-2024-26692: Fixed regression in writes when non-standard maximum write
size negotiated (bsc#1222464).
* CVE-2024-26700: Fixed drm/amd/display: Fix MST Null Ptr for RV (bsc#1222870)
* CVE-2024-26715: Fixed NULL pointer dereference in dwc3_gadget_suspend
(bsc#1222561).
* CVE-2024-26742: Fixed disable_managed_interrupts (git-fixes bsc#1222608).
* CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).
* CVE-2024-26777: Error out if pixclock equals zero in fbdev/sis (bsc#1222765)
* CVE-2024-26778: Error out if pixclock equals zero in fbdev/savage
(bsc#1222770)
* CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)
* CVE-2024-26822: Set correct id, uid and cruid for multiuser automounts
(bsc#1223011).
* CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
* CVE-2024-26839: Fixed a memleak in init_credit_return() (bsc#1222975)
* CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119).
* CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046).
* CVE-2024-26907: Fixed a fortify source warning while accessing Eth segment
in mlx5 (bsc#1223203).
* CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)
* CVE-2024-26919: Fixed debugfs directory leak (bsc#1223847).
* CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
* CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path
(bsc#1223390).
* CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show()
(bsc#1223532).
* CVE-2024-26939: Fixed UAF on destroy against retire race (bsc#1223679).
* CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).
* CVE-2024-27042: Fixed potential out-of-bounds access in
'amdgpu_discovery_reg_base_init()' (bsc#1223823).
* CVE-2024-27395: Fixed Use-After-Free in ovs_ct_exit (bsc#1224098).
* CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1224174).
* CVE-2024-27401: Fixed user_length taken into account when fetching packet
contents (bsc#1224181).
* CVE-2024-27413: Fixed incorrect allocation size (bsc#1224438).
* CVE-2024-27417: Fixed potential "struct net" leak in inet6_rtm_getaddr()
(bsc#1224721)
* CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759)
* CVE-2024-27431: Zero-initialise xdp_rxq_info struct before running XDP
program (bsc#1224718).
* CVE-2024-35791: Flush pages under kvm->lock to fix UAF in
svm_register_enc_region() (bsc#1224725).
* CVE-2024-35799: Prevent crash when disable stream (bsc#1224740).
* CVE-2024-35804: Mark target gfn of emulated atomic instruction as dirty
(bsc#1224638).
* CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1224736).
* CVE-2024-35852: Fixed memory leak when canceling rehash work (bsc#1224502).
* CVE-2024-35854: Fixed possible use-after-free during rehash (bsc#1224636).
* CVE-2024-35860: Struct bpf_link and bpf_link_ops kABI workaround
(bsc#1224531).
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1224766).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1224764).
* CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break()
(bsc#1224763).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1224765,).
* CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break()
(bsc#1224668).
* CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key() (bsc#1224667).
* CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664).
* CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write()
(bsc#1224678).
* CVE-2024-35869: Guarantee refcounted children from parent session
(bsc#1224679).
* CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224020,
bsc#1224672).
* CVE-2024-35872: Fixed GUP-fast succeeding on secretmem folios (bsc#1224530).
* CVE-2024-35875: Require seeding RNG with RDRAND on CoCo systems
(bsc#1224665).
* CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
* CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf()
(bsc#1224671).
* CVE-2024-35879: kABI workaround for drivers/of/dynamic.c (bsc#1224524).
* CVE-2024-35885: Stop interface during shutdown (bsc#1224519).
* CVE-2024-35904: Fixed dereference of garbage after mount failure
(bsc#1224494).
* CVE-2024-35905: Fixed int overflow for stack access size (bsc#1224488).
* CVE-2024-35907: Call request_irq() after NAPI initialized (bsc#1224492).
* CVE-2024-35924: Limit read size on v1.2 (bsc#1224657).
* CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure
(bsc#1224535).
* CVE-2024-35943: Fixed a null pointer dereference in omap_prm_domain_init
(bsc#1224649).
* CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host()
(bsc#1224648).
* CVE-2024-35951: Fixed the error path in panfrost_mmu_map_fault_addr()
(bsc#1224701).
* CVE-2024-35959: Fixed mlx5e_priv_init() cleanup flow (bsc#1224666).
* CVE-2024-35964: Fixed not validating setsockopt user input (bsc#1224581).
* CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and
ipv6_del_addr (bsc#1224580).
* CVE-2024-35973: Fixed header validation in geneve[6]_xmit_skb (bsc#1224586).
* CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING
(bsc#1224575).
* CVE-2024-35998: Fixed lock ordering potential deadlock in
cifs_sync_mid_result (bsc#1224549).
* CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550).
* CVE-2024-36006: Fixed incorrect list API usage (bsc#1224541).
* CVE-2024-36007: Fixed warning during rehash (bsc#1224543).
* CVE-2024-36938: Fixed NULL pointer dereference in
sk_psock_skb_ingress_enqueue (bsc#1225761).

The following non-security bugs were fixed:

* 9p: explicitly deny setlease attempts (git-fixes).
* ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes).
* ACPI: disable -Wstringop-truncation (git-fixes).
* ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes).
* ACPI: LPSS: Advertise number of chip selects via property (git-fixes).
* admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET
(git-fixes).
* af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress
(bsc#1223384).
* af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
* af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
* ALSA: core: Fix NULL module pointer assignment at card init (git-fixes).
* ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes).
* ALSA: line6: Zero-initialize message buffers (stable-fixes).
* ARM: 9381/1: kasan: clear stale stack poison (git-fixes).
* ASoC: Intel: avs: Fix ASRC module initialization (git-fixes).
* ASoC: Intel: avs: Fix potential integer overflow (git-fixes).
* ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes).
* ASoC: Intel: Disable route checks for Skylake boards (git-fixes).
* ASoC: kirkwood: Fix potential NULL dereference (git-fixes).
* ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes).
* ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes).
* ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes).
* ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes).
* ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).
* ata: pata_legacy: make legacy_exit() work again (git-fixes).
* ata: sata_gemini: Check clk_enable() result (stable-fixes).
* autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166).
* Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes).
* Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor()
(git-fixes).
* Bluetooth: hci_sync: Do not double print name in add/remove adv_monitor
(bsc#1216358).
* Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes).
* Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes).
* Bluetooth: qca: add missing firmware sanity checks (git-fixes).
* Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes).
* Bluetooth: qca: fix firmware check error path (git-fixes).
* Bluetooth: qca: fix info leak when fetching fw build id (git-fixes).
* Bluetooth: qca: fix NVM configuration parsing (git-fixes).
* bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git-
fixes)
* bpf: decouple prune and jump points (bsc#1225756).
* bpf: fix precision backtracking instruction iteration (bsc#1225756).
* bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes).
* bpf: handle ldimm64 properly in check_cfg() (bsc#1225756).
* bpf: mostly decouple jump history management from is_state_visited()
(bsc#1225756).
* bpf: remove unnecessary prune and jump points (bsc#1225756).
* btrfs: add error messages to all unrecognized mount options (git-fixes)
* btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes)
* btrfs: export: handle invalid inode or root reference in btrfs_get_parent()
(git-fixes)
* btrfs: extend locking to all space_info members accesses (git-fixes)
* btrfs: fix btrfs_submit_compressed_write cgroup attribution (git-fixes)
* btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes)
* btrfs: fix missing blkdev_put() call in btrfs_scan_one_device() (git-fixes)
* btrfs: fix off-by-one chunk length calculation at contains_pending_extent()
(git-fixes)
* btrfs: fix qgroup reserve overflow the qgroup limit (git-fixes)
* btrfs: fix silent failure when deleting root reference (git-fixes)
* btrfs: fix use-after-free after failure to create a snapshot (git-fixes)
* btrfs: free exchange changeset on failures (git-fixes)
* btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git-
fixes)
* btrfs: make search_csum_tree return 0 if we get -EFBIG (git-fixes)
* btrfs: prevent copying too big compressed lzo segment (git-fixes)
* btrfs: remove BUG_ON(!eie) in find_parent_nodes (git-fixes)
* btrfs: remove BUG_ON() in find_parent_nodes() (git-fixes)
* btrfs: repair super block num_devices automatically (git-fixes)
* btrfs: replace the BUG_ON in btrfs_del_root_ref with proper error handling
(git-fixes)
* btrfs: send: ensure send_fd is writable (git-fixes)
* btrfs: send: handle path ref underflow in header iterate_inode_ref() (git-
fixes)
* btrfs: send: in case of IO error log it (git-fixes)
* btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes)
* btrfs: tree-checker: check item_size for dev_item (git-fixes)
* btrfs: tree-checker: check item_size for inode_item (git-fixes)
* cifs: account for primary channel in the interface list (bsc#1224020).
* cifs: cifs_chan_is_iface_active should be called with chan_lock held
(bsc#1224020).
* cifs: distribute channels across interfaces based on speed (bsc#1224020).
* cifs: do not pass cifs_sb when trying to add channels (bsc#1224020).
* cifs: failure to add channel on iface should bump up weight (git-fixes,
bsc#1224020).
* cifs: fix charset issue in reconnection (bsc#1224020).
* cifs: fix leak of iface for primary channel (git-fixes, bsc#1224020).
* cifs: handle cases where a channel is closed (bsc#1224020).
* cifs: handle cases where multiple sessions share connection (bsc#1224020).
* cifs: reconnect work should have reference on server struct (bsc#1224020).
* clk: Do not hold prepare_lock when calling kref_put() (stable-fixes).
* clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes).
* counter: stm32-lptimer-cnt: Provide defines for clock polarities (git-
fixes).
* counter: stm32-timer-cnt: Provide defines for slave mode selection (git-
fixes).
* cppc_cpufreq: Fix possible null pointer dereference (git-fixes).
* cpu/hotplug: Remove the 'cpu' member of cpuhp_cpu_state (git-fixes).
* cpumask: Add for_each_cpu_from() (bsc#1225053).
* crypto: bcm - Fix pointer arithmetic (git-fixes).
* crypto: ccp - drop platform ifdef checks (git-fixes).
* crypto: ecdsa - Fix module auto-load on add-key (git-fixes).
* crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes).
* crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes).
* crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes).
* dmaengine: axi-dmac: fix possible race in remove() (git-fixes).
* dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes).
* dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11
users (git-fixes).
* dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575).
* docs: kernel_include.py: Cope with docutils 0.21 (stable-fixes).
* drivers/nvme: Add quirks for device 126f:2262 (git-fixes).
* drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes).
* drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes).
* drm/amd/display: Fix potential index out of bounds in color transformation
function (git-fixes).
* drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes).
* drm/amd: Flush GFXOFF requests in prepare stage (git-fixes).
* drm/amdgpu: Refine IB schedule error logging (stable-fixes).
* drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git-
fixes).
* drm/arm/malidp: fix a possible null pointer dereference (git-fixes).
* drm/bridge: anx7625: Do not log an error when DSI host can't be found (git-
fixes).
* drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git-
fixes).
* drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: icn6211: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: lt9611: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: tc358775: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes).
* drm/connector: Add \n to message about demoting connector force-probes (git-
fixes).
* drm/i915/bios: Fix parsing backlight BDB data (git-fixes).
* drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes).
* drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes).
* drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes).
* drm/meson: dw-hdmi: power up phy on device init (git-fixes).
* drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes).
* drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes).
* drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes).
* drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk
(git-fixes).
* drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes).
* drm/panel: atna33xc20: Fix unbalanced regulator in the case HPD does not
assert (git-fixes).
* drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found
(git-fixes).
* drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector
(git-fixes).
* drm: vc4: Fix possible null pointer dereference (git-fixes).
* dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes)
* dyndbg: fix old BUG_ON in >control parser (stable-fixes).
* efi: libstub: only free priv.runtime_map when allocated (git-fixes).
* extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes).
* fail_function: fix wrong use of fei_attr_remove().
* fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes).
* fbdev: shmobile: fix snprintf truncation (git-fixes).
* fbdev: sisfb: hide unused variables (git-fixes).
* firewire: ohci: mask bus reset interrupts between ISR and bottom half
(stable-fixes).
* firmware: dmi-id: add a release callback function (git-fixes).
* firmware: raspberrypi: Use correct device for DMA mappings (git-fixes).
* fs/9p: drop inodes immediately on non-.L too (git-fixes).
* fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes).
* fs/9p: translate O_TRUNC into OTRUNC (git-fixes).
* gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes).
* gpio: wcove: Use -ENOTSUPP consistently (stable-fixes).
* gpu: host1x: Do not setup DMA for virtual devices (stable-fixes).
* HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes).
* hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock (git-
fixes).
* hwmon: (corsair-cpro) Use a separate buffer for sending commands (git-
fixes).
* hwmon: (corsair-cpro) Use complete_all() instead of complete() in
ccp_raw_event() (git-fixes).
* hwmon: (lm70) fix links in doc and comments (git-fixes).
* hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes).
* i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame
(git-fixes).
* i3c: master: svc: fix invalidate IBI type and miss call client IBI handler
(git-fixes).
* IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes)
* idpf: extend tx watchdog timeout (bsc#1224137).
* iio: core: Leave private pointer NULL when no private data supplied (git-
fixes).
* iio: pressure: dps310: support negative temperature values (git-fixes).
* Input: cyapa - add missing input core locking to suspend/resume functions
(git-fixes).
* Input: ims-pcu - fix printf string overflow (git-fixes).
* Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes).
* iomap: Fix inline extent handling in iomap_readpage (git-fixes)
* iomap: iomap: fix memory corruption when recording errors during writeback
(git-fixes)
* iomap: Support partial direct I/O on user copy failures (git-fixes)
* iommu/dma: Force swiotlb_max_mapping_size on an untrusted device
(bsc#1224331)
* io_uring/unix: drop usage of io_uring socket (git-fixes).
* irqchip/gic-v3-its: Prevent double free on error (git-fixes).
* jffs2: prevent xattr node from overflowing the eraseblock (git-fixes).
* kABI: bpf: struct bpf_insn_aux_data kABI workaround (bsc#1225756).
* kcm: do not sense pfmemalloc status in kcm_sendpage() (git-fixes
bsc#1223959)
* KEYS: trusted: Do not use WARN when encode fails (git-fixes).
* KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes).
* KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes
bsc#1224794).
* leds: pwm: Disable PWM when going to suspend (git-fixes).
* libsubcmd: Fix parse-options memory leak (git-fixes).
* locking/atomic: Make test_and_*_bit() ordered on failure (git-fixes).
* media: atomisp: ssh_css: Fix a null-pointer dereference in
load_video_binaries (git-fixes).
* media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes).
* media: mc: mark the media devnode as registered from the, start (git-fixes).
* media: ngene: Add dvb_ca_en50221_init return value check (git-fixes).
* media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes).
* mei: me: add lunar lake point M DID (stable-fixes).
* mfd: intel-lpss: Revert "Add missing check for platform_get_resource" (git-
fixes).
* mfd: ti_am335x_tscadc: Support the correctly spelled DT property (git-
fixes).
* mfd: tqmx86: Specify IO port register range more precisely (git-fixes).
* mlxbf_gige: Enable the GigE port in mlxbf_gige_open (git-fixes).
* mlxbf_gige: Fix intermittent no ip issue (git-fixes).
* mlxbf_gige: stop PHY during open() error paths (git-fixes).
* mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes).
* mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes).
* Move upstreamed patches into sorted section
* mtd: core: Report error if first mtd_otp_size() call fails in
mtd_otp_nvmem_add() (git-fixes).
* mtd: rawnand: hynix: fixed typo (git-fixes).
* net: do not sense pfmemalloc status in skb_append_pagefrags() (git-fixes
bsc#1223959)
* netfilter: nf_tables: bail out early if hardware offload is not supported
(git-fixes bsc#1223961)
* net: introduce __skb_fill_page_desc_noacc (git-fixes bsc#1223959)
* net: nfc: remove inappropriate attrs check (stable-fixes).
* net: qualcomm: rmnet: fix global oob in rmnet_policy (git-fixes).
* net: usb: ax88179_178a: fix link status when link is set to down/up (git-
fixes).
* net:usb:qmi_wwan: support Rolling modules (stable-fixes).
* net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).
* net: usb: sr9700: stop lying about skb->truesize (git-fixes).
* net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete()
(bsc#1223360).
* nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git-
fixes).
* nfc: nci: Fix uninit-value in nci_rx_work (git-fixes).
* nilfs2: fix out-of-range warning (git-fixes).
* nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes).
* nilfs2: fix use-after-free of timer for log writer thread (git-fixes).
* nilfs2: make superblock data array index computation sparse friendly (git-
fixes).
* nvme: ensure disabling pairs with unquiesce (bsc#1224534).
* nvme: fix miss command type check (git-fixes).
* nvme: fix multipath batched completion accounting (git-fixes).
* nvme-multipath: fix io accounting on failover (git-fixes).
* nvmet: fix ns enable/disable possible hang (git-fixes).
* PCI: dwc: Detect iATU settings after getting "addr_space" resource (git-
fixes).
* PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host
(git-fixes).
* PCI: dwc: Use the bitmap API to allocate bitmaps (git-fixes).
* PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes).
* PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes).
* PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes).
* PCI: tegra194: Fix probe path for Endpoint mode (git-fixes).
* pinctrl: armada-37xx: remove an unused variable (git-fixes).
* pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes).
* pinctrl: core: handle radix_tree_insert() errors in
pinctrl_register_one_pin() (stable-fixes).
* pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes).
* pinctrl/meson: fix typo in PDM's pin name (git-fixes).
* pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git-
fixes).
* platform/x86/intel-uncore-freq: Do not present root domain on error (git-
fixes).
* platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git-
fixes).
* powerpc/eeh: Permanently disable the removed device (bsc#1223991
ltc#205740).
* powerpc/eeh: Small refactor of eeh_handle_normal_event() (bsc#1223991
ltc#205740).
* powerpc/eeh: Use a goto for recovery failures (bsc#1223991 ltc#205740).
* powerpc/powernv: Add a null pointer check in opal_event_init()
(bsc#1065729).
* powerpc/pseries/lparcfg: drop error message from guest name lookup
(bsc#1187716 ltc#193451 git-fixes).
* powerpc/pseries/vio: Do not return ENODEV if node or compatible missing
(bsc#1220783).
* powerpc/uaccess: Fix build errors seen with GCC 13/14 (bsc#1194869).
* powerpc/uaccess: Use YZ asm constraint for ld (bsc#1194869).
* power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes).
* ppdev: Add an error check in register_device (git-fixes).
* printk: Update @console_may_schedule in console_trylock_spinning()
(bsc#1225616).
* qibfs: fix dentry leak (git-fixes)
* RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git-
fixes)
* RDMA/hns: Fix deadlock on SRQ async events. (git-fixes)
* RDMA/hns: Fix GMV table pagesize (git-fixes)
* RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes)
* RDMA/hns: Fix UAF for cq async event (git-fixes)
* RDMA/hns: Modify the print level of CQE error (git-fixes)
* RDMA/hns: Use complete parentheses in macros (git-fixes)
* RDMA/IPoIB: Fix format truncation compilation errors (git-fixes)
* RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes)
* RDMA/mlx5: Fix port number for counter query in multi-port configuration
(git-fixes)
* RDMA/rxe: Add ibdev_dbg macros for rxe (git-fixes)
* RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes)
* RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes)
* RDMA/rxe: Fix the problem "mutex_destroy missing" (git-fixes)
* RDMA/rxe: Replace pr_xxx by rxe_dbg_xxx in rxe_net.c (git-fixes)
* RDMA/rxe: Split rxe_run_task() into two subroutines (git-fixes)
* regulator: bd71828: Do not overwrite runtime voltages (git-fixes).
* regulator: core: fix debugfs creation regression (git-fixes).
* regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes).
* remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes).
* Revert "cifs: reconnect work should have reference on server struct" (git-
fixes, bsc#1224020).
* Revert "drm/bridge: ti-sn65dsi83: Fix enable error path" (git-fixes).
* ring-buffer: Fix a race between readers and resize checks (git-fixes).
* s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224795).
* s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224796).
* s390/cpum_cf: make crypto counters upward compatible across machine types
(bsc#1224346).
* s390/ipl: Fix incorrect initialization of len fields in nvme reipl block
(git-fixes bsc#1225139).
* s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes
bsc#1225138).
* sched/topology: Optimize topology_span_sane() (bsc#1225053).
* scsi: arcmsr: Support new PCI device IDs 1883 and 1886 (git-fixes).
* scsi: bfa: Fix function pointer type mismatch for hcb_qe->cbfn (git-fixes).
* scsi: core: Consult supported VPD page list prior to fetching page (git-
fixes).
* scsi: core: Fix unremoved procfs host directory regression (git-fixes).
* scsi: csiostor: Avoid function pointer casts (git-fixes).
* scsi: libfc: Do not schedule abort twice (git-fixes).
* scsi: libfc: Fix up timeout error in fc_fcp_rec_error() (git-fixes).
* scsi: lpfc: Add support for 32 byte CDBs (bsc#1225842).
* scsi: lpfc: Change default logging level for unsolicited CT MIB commands
(bsc#1225842).
* scsi: lpfc: Change lpfc_hba hba_flag member into a bitmask (bsc#1225842).
* scsi: lpfc: Clear deferred RSCN processing flag when driver is unloading
(bsc#1225842).
* scsi: lpfc: Copyright updates for 14.4.0.2 patches (bsc#1225842).
* scsi: lpfc: Introduce rrq_list_lock to protect active_rrq_list
(bsc#1225842).
* scsi: lpfc: Update logging of protection type for T10 DIF I/O (bsc#1225842).
* scsi: lpfc: Update lpfc version to 14.4.0.2 (bsc#1225842).
* scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git-
fixes).
* scsi: mylex: Fix sysfs buffer lengths (git-fixes).
* scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes).
* scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git-
fixes).
* selftests/pidfd: Fix config for pidfd_setns_test (git-fixes).
* serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes).
* serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable-
fixes).
* serial: max3100: Fix bitwise types (git-fixes).
* serial: max3100: Lock port->lock when calling uart_handle_cts_change() (git-
fixes).
* serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git-
fixes).
* serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler
(git-fixes).
* serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes).
* smb3: show beginning time for per share stats (bsc#1224020).
* smb: client: ensure to try all targets when finding nested links
(bsc#1224020).
* smb: client: fix mount when dns_resolver key is not available (git-fixes,
bsc#1224020).
* smb: client: get rid of dfs code dep in namespace.c (bsc#1224020).
* smb: client: get rid of dfs naming in automount code (bsc#1224020).
* smb: client: introduce DFS_CACHE_TGT_LIST() (bsc#1224020).
* smb: client: reduce stack usage in cifs_try_adding_channels() (bsc#1224020).
* smb: client: remove extra @chan_count check in __cifs_put_smb_ses()
(bsc#1224020).
* smb: client: rename cifs_dfs_ref.c to namespace.c (bsc#1224020).
* soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes).
* soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes).
* Sort recent BHI patches
* speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes).
* spmi: Add a check for remove callback when removing a SPMI driver (git-
fixes).
* spmi: hisi-spmi-controller: Do not override device identifier (git-fixes).
* swiotlb: extend buffer pre-padding to alloc_align_mask if necessary
(bsc#1224331).
* swiotlb: Fix alignment checks when both allocation and DMA masks are
(bsc#1224331)
* swiotlb: Fix double-allocation of slots due to broken alignment
(bsc#1224331)
* swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc()
(bsc#1224331)
* sysv: do not call sb_bread() with pointers_lock held (git-fixes).
* thermal/drivers/tsens: Fix null pointer dereference (git-fixes).
* tools/latency-collector: Fix -Wformat-security compile warns (git-fixes).
* tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer
(bsc#1225535)
* tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer
(git-fixes).
* tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes).
* tracing: hide unused ftrace_event_id_fops (git-fixes).
* tty: n_gsm: fix missing receive state reset after mode switch (git-fixes).
* tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes).
* usb: aqc111: stop lying about skb->truesize (git-fixes).
* USB: core: Add hub_get() and hub_put() routines (git-fixes).
* USB: core: Fix access violation during port device removal (git-fixes).
* USB: core: Fix deadlock in port "disable" sysfs attribute (git-fixes).
* usb: dwc3: core: Prevent phy suspend during init (Git-fixes).
* usb: gadget: u_audio: Clear uac pointer when freed (git-fixes).
* usb: typec: tipd: fix event checking for tps6598x (git-fixes).
* usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes).
* VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes).
* VMCI: Fix possible memcpy() run-time warning in
vmci_datagram_invoke_guest_handler() (stable-fixes).
* vmci: prevent speculation leaks by sanitizing event in event_deliver() (git-
fixes).
* watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git-
fixes).
* watchdog: ixp4xx: Make sure restart always works (git-fixes).
* watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin
(git-fixes).
* wifi: ar5523: enable proper endpoint verification (git-fixes).
* wifi: ath10k: Fix an error code problem in
ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes).
* wifi: ath10k: poll service ready message before failing (git-fixes).
* wifi: ath10k: populate board data for WCN3990 (git-fixes).
* wifi: ath11k: do not force enable power save on non-running vdevs (git-
fixes).
* wifi: carl9170: add a proper sanity check for endpoints (git-fixes).
* wifi: carl9170: re-fix fortified-memset warning (git-fixes).
* wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes).
* wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes).
* wifi: mwl8k: initialize cmd->addr[] properly (git-fixes).
* x86/boot: Ignore NMIs during very early boot (git-fixes).
* x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes).
* x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file (git-
fixes).
* x86/bugs: Fix BHI documentation (git-fixes).
* x86/bugs: Fix BHI handling of RRSBA (git-fixes).
* x86/bugs: Fix BHI retpoline check (git-fixes).
* x86/bugs: Fix return type of spectre_bhi_state() (git-fixes).
* x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-
fixes).
* x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr' (git-
fixes).
* x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with
CONFIG_MITIGATION_SPECTRE_BHI (git-fixes).
* x86: Fix CPUIDLE_FLAG_IRQ_ENABLE leaking timer reprogram (git-fixes).
* x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes).
* x86/lib: Fix overflow when counting digits (git-fixes).
* x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes).
* x86/nmi: Drop unused declaration of proc_nmi_enabled() (git-fixes).
* x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for
!SRSO (git-fixes).
* x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git-
fixes).
* x86/sme: Fix memory encryption setting if enabled by default and not
overridden (git-fixes).
* x86/tdx: Preserve shared bit on mprotect() (git-fixes).
* xfs: fix exception caused by unexpected illegal bestcount in leaf dir (git-
fixes).
* xfs: Fix false ENOSPC when performing direct write on a delalloc extent in
cow fork (git-fixes).
* xfs: fix imprecise logic in xchk_btree_check_block_owner (git-fixes).
* xfs: fix inode reservation space for removing transaction (git-fixes).
* xfs: shrink failure needs to hold AGI buffer (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-2190=1

* Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-2190=1

* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-2190=1
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.

* SUSE Linux Enterprise High Availability Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-2190=1

* SUSE Linux Enterprise Workstation Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-2190=1

* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-2190=1 openSUSE-SLE-15.5-2024-2190=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-2190=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2190=1

## Package List:

* Development Tools Module 15-SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.68.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kernel-syms-5.14.21-150500.55.68.1
* kernel-obs-build-5.14.21-150500.55.68.1
* kernel-obs-build-debugsource-5.14.21-150500.55.68.1
* Development Tools Module 15-SP5 (noarch)
* kernel-source-5.14.21-150500.55.68.1
* Legacy Module 15-SP5 (nosrc)
* kernel-default-5.14.21-150500.55.68.1
* Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* reiserfs-kmp-default-5.14.21-150500.55.68.1
* kernel-default-debugsource-5.14.21-150500.55.68.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.68.1
* kernel-default-debuginfo-5.14.21-150500.55.68.1
* SUSE Linux Enterprise Live Patching 15-SP5 (nosrc)
* kernel-default-5.14.21-150500.55.68.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_15-debugsource-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1
* kernel-default-livepatch-devel-5.14.21-150500.55.68.1
* kernel-default-debuginfo-5.14.21-150500.55.68.1
* kernel-livepatch-5_14_21-150500_55_68-default-debuginfo-1-150500.11.3.1
* kernel-default-debugsource-5.14.21-150500.55.68.1
* kernel-default-livepatch-5.14.21-150500.55.68.1
* SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le
s390x x86_64)
* gfs2-kmp-default-5.14.21-150500.55.68.1
* kernel-default-debuginfo-5.14.21-150500.55.68.1
* cluster-md-kmp-default-5.14.21-150500.55.68.1
* ocfs2-kmp-default-5.14.21-150500.55.68.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.68.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.68.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.68.1
* kernel-default-debugsource-5.14.21-150500.55.68.1
* dlm-kmp-default-5.14.21-150500.55.68.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.68.1
* SUSE Linux Enterprise High Availability Extension 15 SP5 (nosrc)
* kernel-default-5.14.21-150500.55.68.1
* SUSE Linux Enterprise Workstation Extension 15 SP5 (nosrc)
* kernel-default-5.14.21-150500.55.68.1
* SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64)
* kernel-default-extra-debuginfo-5.14.21-150500.55.68.1
* kernel-default-debugsource-5.14.21-150500.55.68.1
* kernel-default-extra-5.14.21-150500.55.68.1
* kernel-default-debuginfo-5.14.21-150500.55.68.1
* openSUSE Leap 15.5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.68.1
* openSUSE Leap 15.5 (noarch)
* kernel-macros-5.14.21-150500.55.68.1
* kernel-docs-html-5.14.21-150500.55.68.1
* kernel-devel-5.14.21-150500.55.68.1
* kernel-source-5.14.21-150500.55.68.1
* kernel-source-vanilla-5.14.21-150500.55.68.1
* openSUSE Leap 15.5 (nosrc ppc64le x86_64)
* kernel-debug-5.14.21-150500.55.68.1
* openSUSE Leap 15.5 (ppc64le x86_64)
* kernel-debug-debugsource-5.14.21-150500.55.68.1
* kernel-debug-devel-5.14.21-150500.55.68.1
* kernel-debug-debuginfo-5.14.21-150500.55.68.1
* kernel-debug-livepatch-devel-5.14.21-150500.55.68.1
* kernel-debug-devel-debuginfo-5.14.21-150500.55.68.1
* openSUSE Leap 15.5 (x86_64)
* kernel-default-vdso-5.14.21-150500.55.68.1
* kernel-debug-vdso-debuginfo-5.14.21-150500.55.68.1
* kernel-debug-vdso-5.14.21-150500.55.68.1
* kernel-kvmsmall-vdso-debuginfo-5.14.21-150500.55.68.1
* kernel-kvmsmall-vdso-5.14.21-150500.55.68.1
* kernel-default-vdso-debuginfo-5.14.21-150500.55.68.1
* openSUSE Leap 15.5 (aarch64 ppc64le x86_64)
* kernel-default-base-rebuild-5.14.21-150500.55.68.1.150500.6.31.1
* kernel-kvmsmall-debuginfo-5.14.21-150500.55.68.1
* kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.68.1
* kernel-kvmsmall-debugsource-5.14.21-150500.55.68.1
* kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1
* kernel-kvmsmall-devel-debuginfo-5.14.21-150500.55.68.1
* kernel-kvmsmall-devel-5.14.21-150500.55.68.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kernel-default-extra-debuginfo-5.14.21-150500.55.68.1
* cluster-md-kmp-default-5.14.21-150500.55.68.1
* kernel-default-devel-5.14.21-150500.55.68.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.68.1
* kernel-obs-build-5.14.21-150500.55.68.1
* kernel-default-debugsource-5.14.21-150500.55.68.1
* kernel-default-livepatch-5.14.21-150500.55.68.1
* kernel-syms-5.14.21-150500.55.68.1
* kernel-default-optional-debuginfo-5.14.21-150500.55.68.1
* kernel-default-debuginfo-5.14.21-150500.55.68.1
* kernel-default-extra-5.14.21-150500.55.68.1
* kernel-default-livepatch-devel-5.14.21-150500.55.68.1
* kselftests-kmp-default-debuginfo-5.14.21-150500.55.68.1
* kernel-obs-build-debugsource-5.14.21-150500.55.68.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.68.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.68.1
* dlm-kmp-default-5.14.21-150500.55.68.1
* kselftests-kmp-default-5.14.21-150500.55.68.1
* kernel-default-optional-5.14.21-150500.55.68.1
* ocfs2-kmp-default-5.14.21-150500.55.68.1
* kernel-obs-qa-5.14.21-150500.55.68.1
* reiserfs-kmp-default-5.14.21-150500.55.68.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.68.1
* gfs2-kmp-default-5.14.21-150500.55.68.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.68.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.68.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.68.1
* openSUSE Leap 15.5 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150500.55.68.1
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_15-debugsource-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_55_68-default-debuginfo-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1
* openSUSE Leap 15.5 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150500.55.68.1
* openSUSE Leap 15.5 (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150500.55.68.1
* kernel-zfcpdump-debugsource-5.14.21-150500.55.68.1
* openSUSE Leap 15.5 (nosrc)
* dtb-aarch64-5.14.21-150500.55.68.1
* openSUSE Leap 15.5 (aarch64)
* kernel-64kb-optional-debuginfo-5.14.21-150500.55.68.1
* reiserfs-kmp-64kb-5.14.21-150500.55.68.1
* kernel-64kb-optional-5.14.21-150500.55.68.1
* dlm-kmp-64kb-5.14.21-150500.55.68.1
* dtb-apple-5.14.21-150500.55.68.1
* dtb-lg-5.14.21-150500.55.68.1
* dtb-broadcom-5.14.21-150500.55.68.1
* dtb-amd-5.14.21-150500.55.68.1
* cluster-md-kmp-64kb-debuginfo-5.14.21-150500.55.68.1
* dtb-nvidia-5.14.21-150500.55.68.1
* kernel-64kb-debuginfo-5.14.21-150500.55.68.1
* dtb-renesas-5.14.21-150500.55.68.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.68.1
* dtb-sprd-5.14.21-150500.55.68.1
* dtb-arm-5.14.21-150500.55.68.1
* reiserfs-kmp-64kb-debuginfo-5.14.21-150500.55.68.1
* dtb-xilinx-5.14.21-150500.55.68.1
* dtb-apm-5.14.21-150500.55.68.1
* dtb-hisilicon-5.14.21-150500.55.68.1
* gfs2-kmp-64kb-5.14.21-150500.55.68.1
* dtb-rockchip-5.14.21-150500.55.68.1
* kselftests-kmp-64kb-5.14.21-150500.55.68.1
* dlm-kmp-64kb-debuginfo-5.14.21-150500.55.68.1
* gfs2-kmp-64kb-debuginfo-5.14.21-150500.55.68.1
* kernel-64kb-extra-5.14.21-150500.55.68.1
* cluster-md-kmp-64kb-5.14.21-150500.55.68.1
* ocfs2-kmp-64kb-debuginfo-5.14.21-150500.55.68.1
* dtb-altera-5.14.21-150500.55.68.1
* dtb-qcom-5.14.21-150500.55.68.1
* dtb-socionext-5.14.21-150500.55.68.1
* kernel-64kb-devel-5.14.21-150500.55.68.1
* dtb-mediatek-5.14.21-150500.55.68.1
* dtb-marvell-5.14.21-150500.55.68.1
* kselftests-kmp-64kb-debuginfo-5.14.21-150500.55.68.1
* kernel-64kb-debugsource-5.14.21-150500.55.68.1
* kernel-64kb-livepatch-devel-5.14.21-150500.55.68.1
* dtb-allwinner-5.14.21-150500.55.68.1
* dtb-cavium-5.14.21-150500.55.68.1
* dtb-amlogic-5.14.21-150500.55.68.1
* ocfs2-kmp-64kb-5.14.21-150500.55.68.1
* kernel-64kb-extra-debuginfo-5.14.21-150500.55.68.1
* dtb-amazon-5.14.21-150500.55.68.1
* dtb-freescale-5.14.21-150500.55.68.1
* dtb-exynos-5.14.21-150500.55.68.1
* openSUSE Leap 15.5 (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.68.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150500.55.68.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150500.55.68.1
* kernel-default-debuginfo-5.14.21-150500.55.68.1
* Basesystem Module 15-SP5 (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.68.1
* Basesystem Module 15-SP5 (aarch64)
* kernel-64kb-debugsource-5.14.21-150500.55.68.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.68.1
* kernel-64kb-devel-5.14.21-150500.55.68.1
* kernel-64kb-debuginfo-5.14.21-150500.55.68.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.68.1
* Basesystem Module 15-SP5 (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kernel-default-devel-debuginfo-5.14.21-150500.55.68.1
* kernel-default-debugsource-5.14.21-150500.55.68.1
* kernel-default-devel-5.14.21-150500.55.68.1
* kernel-default-debuginfo-5.14.21-150500.55.68.1
* Basesystem Module 15-SP5 (noarch)
* kernel-macros-5.14.21-150500.55.68.1
* kernel-devel-5.14.21-150500.55.68.1
* Basesystem Module 15-SP5 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150500.55.68.1
* Basesystem Module 15-SP5 (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150500.55.68.1
* kernel-zfcpdump-debugsource-5.14.21-150500.55.68.1

## References:

* https://www.suse.com/security/cve/CVE-2020-36788.html
* https://www.suse.com/security/cve/CVE-2021-4148.html
* https://www.suse.com/security/cve/CVE-2021-47358.html
* https://www.suse.com/security/cve/CVE-2021-47359.html
* https://www.suse.com/security/cve/CVE-2021-47360.html
* https://www.suse.com/security/cve/CVE-2021-47361.html
* https://www.suse.com/security/cve/CVE-2021-47362.html
* https://www.suse.com/security/cve/CVE-2021-47363.html
* https://www.suse.com/security/cve/CVE-2021-47364.html
* https://www.suse.com/security/cve/CVE-2021-47365.html
* https://www.suse.com/security/cve/CVE-2021-47366.html
* https://www.suse.com/security/cve/CVE-2021-47367.html
* https://www.suse.com/security/cve/CVE-2021-47368.html
* https://www.suse.com/security/cve/CVE-2021-47369.html
* https://www.suse.com/security/cve/CVE-2021-47370.html
* https://www.suse.com/security/cve/CVE-2021-47371.html
* https://www.suse.com/security/cve/CVE-2021-47372.html
* https://www.suse.com/security/cve/CVE-2021-47373.html
* https://www.suse.com/security/cve/CVE-2021-47374.html
* https://www.suse.com/security/cve/CVE-2021-47375.html
* https://www.suse.com/security/cve/CVE-2021-47376.html
* https://www.suse.com/security/cve/CVE-2021-47378.html
* https://www.suse.com/security/cve/CVE-2021-47379.html
* https://www.suse.com/security/cve/CVE-2021-47380.html
* https://www.suse.com/security/cve/CVE-2021-47381.html
* https://www.suse.com/security/cve/CVE-2021-47382.html
* https://www.suse.com/security/cve/CVE-2021-47383.html
* https://www.suse.com/security/cve/CVE-2021-47384.html
* https://www.suse.com/security/cve/CVE-2021-47385.html
* https://www.suse.com/security/cve/CVE-2021-47386.html
* https://www.suse.com/security/cve/CVE-2021-47387.html
* https://www.suse.com/security/cve/CVE-2021-47388.html
* https://www.suse.com/security/cve/CVE-2021-47389.html
* https://www.suse.com/security/cve/CVE-2021-47390.html
* https://www.suse.com/security/cve/CVE-2021-47391.html
* https://www.suse.com/security/cve/CVE-2021-47392.html
* https://www.suse.com/security/cve/CVE-2021-47393.html
* https://www.suse.com/security/cve/CVE-2021-47394.html
* https://www.suse.com/security/cve/CVE-2021-47395.html
* https://www.suse.com/security/cve/CVE-2021-47396.html
* https://www.suse.com/security/cve/CVE-2021-47397.html
* https://www.suse.com/security/cve/CVE-2021-47398.html
* https://www.suse.com/security/cve/CVE-2021-47399.html
* https://www.suse.com/security/cve/CVE-2021-47400.html
* https://www.suse.com/security/cve/CVE-2021-47401.html
* https://www.suse.com/security/cve/CVE-2021-47402.html
* https://www.suse.com/security/cve/CVE-2021-47403.html
* https://www.suse.com/security/cve/CVE-2021-47404.html
* https://www.suse.com/security/cve/CVE-2021-47405.html
* https://www.suse.com/security/cve/CVE-2021-47406.html
* https://www.suse.com/security/cve/CVE-2021-47407.html
* https://www.suse.com/security/cve/CVE-2021-47408.html
* https://www.suse.com/security/cve/CVE-2021-47409.html
* https://www.suse.com/security/cve/CVE-2021-47410.html
* https://www.suse.com/security/cve/CVE-2021-47412.html
* https://www.suse.com/security/cve/CVE-2021-47413.html
* https://www.suse.com/security/cve/CVE-2021-47414.html
* https://www.suse.com/security/cve/CVE-2021-47415.html
* https://www.suse.com/security/cve/CVE-2021-47416.html
* https://www.suse.com/security/cve/CVE-2021-47417.html
* https://www.suse.com/security/cve/CVE-2021-47418.html
* https://www.suse.com/security/cve/CVE-2021-47419.html
* https://www.suse.com/security/cve/CVE-2021-47420.html
* https://www.suse.com/security/cve/CVE-2021-47421.html
* https://www.suse.com/security/cve/CVE-2021-47422.html
* https://www.suse.com/security/cve/CVE-2021-47423.html
* https://www.suse.com/security/cve/CVE-2021-47424.html
* https://www.suse.com/security/cve/CVE-2021-47425.html
* https://www.suse.com/security/cve/CVE-2021-47426.html
* https://www.suse.com/security/cve/CVE-2021-47427.html
* https://www.suse.com/security/cve/CVE-2021-47428.html
* https://www.suse.com/security/cve/CVE-2021-47429.html
* https://www.suse.com/security/cve/CVE-2021-47430.html
* https://www.suse.com/security/cve/CVE-2021-47431.html
* https://www.suse.com/security/cve/CVE-2021-47433.html
* https://www.suse.com/security/cve/CVE-2021-47434.html
* https://www.suse.com/security/cve/CVE-2021-47435.html
* https://www.suse.com/security/cve/CVE-2021-47436.html
* https://www.suse.com/security/cve/CVE-2021-47437.html
* https://www.suse.com/security/cve/CVE-2021-47438.html
* https://www.suse.com/security/cve/CVE-2021-47439.html
* https://www.suse.com/security/cve/CVE-2021-47440.html
* https://www.suse.com/security/cve/CVE-2021-47441.html
* https://www.suse.com/security/cve/CVE-2021-47442.html
* https://www.suse.com/security/cve/CVE-2021-47443.html
* https://www.suse.com/security/cve/CVE-2021-47444.html
* https://www.suse.com/security/cve/CVE-2021-47445.html
* https://www.suse.com/security/cve/CVE-2021-47446.html
* https://www.suse.com/security/cve/CVE-2021-47447.html
* https://www.suse.com/security/cve/CVE-2021-47448.html
* https://www.suse.com/security/cve/CVE-2021-47449.html
* https://www.suse.com/security/cve/CVE-2021-47450.html
* https://www.suse.com/security/cve/CVE-2021-47451.html
* https://www.suse.com/security/cve/CVE-2021-47452.html
* https://www.suse.com/security/cve/CVE-2021-47453.html
* https://www.suse.com/security/cve/CVE-2021-47454.html
* https://www.suse.com/security/cve/CVE-2021-47455.html
* https://www.suse.com/security/cve/CVE-2021-47456.html
* https://www.suse.com/security/cve/CVE-2021-47457.html
* https://www.suse.com/security/cve/CVE-2021-47458.html
* https://www.suse.com/security/cve/CVE-2021-47459.html
* https://www.suse.com/security/cve/CVE-2021-47460.html
* https://www.suse.com/security/cve/CVE-2021-47461.html
* https://www.suse.com/security/cve/CVE-2021-47462.html
* https://www.suse.com/security/cve/CVE-2021-47463.html
* https://www.suse.com/security/cve/CVE-2021-47464.html
* https://www.suse.com/security/cve/CVE-2021-47465.html
* https://www.suse.com/security/cve/CVE-2021-47466.html
* https://www.suse.com/security/cve/CVE-2021-47467.html
* https://www.suse.com/security/cve/CVE-2021-47468.html
* https://www.suse.com/security/cve/CVE-2021-47469.html
* https://www.suse.com/security/cve/CVE-2021-47470.html
* https://www.suse.com/security/cve/CVE-2021-47471.html
* https://www.suse.com/security/cve/CVE-2021-47472.html
* https://www.suse.com/security/cve/CVE-2021-47473.html
* https://www.suse.com/security/cve/CVE-2021-47474.html
* https://www.suse.com/security/cve/CVE-2021-47475.html
* https://www.suse.com/security/cve/CVE-2021-47476.html
* https://www.suse.com/security/cve/CVE-2021-47477.html
* https://www.suse.com/security/cve/CVE-2021-47478.html
* https://www.suse.com/security/cve/CVE-2021-47479.html
* https://www.suse.com/security/cve/CVE-2021-47480.html
* https://www.suse.com/security/cve/CVE-2021-47481.html
* https://www.suse.com/security/cve/CVE-2021-47482.html
* https://www.suse.com/security/cve/CVE-2021-47483.html
* https://www.suse.com/security/cve/CVE-2021-47484.html
* https://www.suse.com/security/cve/CVE-2021-47485.html
* https://www.suse.com/security/cve/CVE-2021-47486.html
* https://www.suse.com/security/cve/CVE-2021-47488.html
* https://www.suse.com/security/cve/CVE-2021-47489.html
* https://www.suse.com/security/cve/CVE-2021-47490.html
* https://www.suse.com/security/cve/CVE-2021-47491.html
* https://www.suse.com/security/cve/CVE-2021-47492.html
* https://www.suse.com/security/cve/CVE-2021-47493.html
* https://www.suse.com/security/cve/CVE-2021-47494.html
* https://www.suse.com/security/cve/CVE-2021-47495.html
* https://www.suse.com/security/cve/CVE-2021-47496.html
* https://www.suse.com/security/cve/CVE-2021-47497.html
* https://www.suse.com/security/cve/CVE-2021-47498.html
* https://www.suse.com/security/cve/CVE-2021-47499.html
* https://www.suse.com/security/cve/CVE-2021-47500.html
* https://www.suse.com/security/cve/CVE-2021-47501.html
* https://www.suse.com/security/cve/CVE-2021-47502.html
* https://www.suse.com/security/cve/CVE-2021-47503.html
* https://www.suse.com/security/cve/CVE-2021-47504.html
* https://www.suse.com/security/cve/CVE-2021-47505.html
* https://www.suse.com/security/cve/CVE-2021-47506.html
* https://www.suse.com/security/cve/CVE-2021-47507.html
* https://www.suse.com/security/cve/CVE-2021-47508.html
* https://www.suse.com/security/cve/CVE-2021-47509.html
* https://www.suse.com/security/cve/CVE-2021-47510.html
* https://www.suse.com/security/cve/CVE-2021-47511.html
* https://www.suse.com/security/cve/CVE-2021-47512.html
* https://www.suse.com/security/cve/CVE-2021-47513.html
* https://www.suse.com/security/cve/CVE-2021-47514.html
* https://www.suse.com/security/cve/CVE-2021-47516.html
* https://www.suse.com/security/cve/CVE-2021-47518.html
* https://www.suse.com/security/cve/CVE-2021-47520.html
* https://www.suse.com/security/cve/CVE-2021-47521.html
* https://www.suse.com/security/cve/CVE-2021-47522.html
* https://www.suse.com/security/cve/CVE-2021-47523.html
* https://www.suse.com/security/cve/CVE-2021-47524.html
* https://www.suse.com/security/cve/CVE-2021-47525.html
* https://www.suse.com/security/cve/CVE-2021-47526.html
* https://www.suse.com/security/cve/CVE-2021-47527.html
* https://www.suse.com/security/cve/CVE-2021-47528.html
* https://www.suse.com/security/cve/CVE-2021-47529.html
* https://www.suse.com/security/cve/CVE-2021-47530.html
* https://www.suse.com/security/cve/CVE-2021-47531.html
* https://www.suse.com/security/cve/CVE-2021-47532.html
* https://www.suse.com/security/cve/CVE-2021-47533.html
* https://www.suse.com/security/cve/CVE-2021-47534.html
* https://www.suse.com/security/cve/CVE-2021-47535.html
* https://www.suse.com/security/cve/CVE-2021-47536.html
* https://www.suse.com/security/cve/CVE-2021-47537.html
* https://www.suse.com/security/cve/CVE-2021-47540.html
* https://www.suse.com/security/cve/CVE-2021-47541.html
* https://www.suse.com/security/cve/CVE-2021-47542.html
* https://www.suse.com/security/cve/CVE-2021-47544.html
* https://www.suse.com/security/cve/CVE-2021-47548.html
* https://www.suse.com/security/cve/CVE-2021-47549.html
* https://www.suse.com/security/cve/CVE-2021-47550.html
* https://www.suse.com/security/cve/CVE-2021-47551.html
* https://www.suse.com/security/cve/CVE-2021-47552.html
* https://www.suse.com/security/cve/CVE-2021-47553.html
* https://www.suse.com/security/cve/CVE-2021-47554.html
* https://www.suse.com/security/cve/CVE-2021-47555.html
* https://www.suse.com/security/cve/CVE-2021-47556.html
* https://www.suse.com/security/cve/CVE-2021-47557.html
* https://www.suse.com/security/cve/CVE-2021-47558.html
* https://www.suse.com/security/cve/CVE-2021-47559.html
* https://www.suse.com/security/cve/CVE-2021-47560.html
* https://www.suse.com/security/cve/CVE-2021-47562.html
* https://www.suse.com/security/cve/CVE-2021-47563.html
* https://www.suse.com/security/cve/CVE-2021-47564.html
* https://www.suse.com/security/cve/CVE-2021-47565.html
* https://www.suse.com/security/cve/CVE-2021-47569.html
* https://www.suse.com/security/cve/CVE-2022-48633.html
* https://www.suse.com/security/cve/CVE-2022-48662.html
* https://www.suse.com/security/cve/CVE-2022-48669.html
* https://www.suse.com/security/cve/CVE-2022-48689.html
* https://www.suse.com/security/cve/CVE-2022-48691.html
* https://www.suse.com/security/cve/CVE-2022-48699.html
* https://www.suse.com/security/cve/CVE-2022-48705.html
* https://www.suse.com/security/cve/CVE-2022-48708.html
* https://www.suse.com/security/cve/CVE-2022-48709.html
* https://www.suse.com/security/cve/CVE-2022-48710.html
* https://www.suse.com/security/cve/CVE-2023-0160.html
* https://www.suse.com/security/cve/CVE-2023-1829.html
* https://www.suse.com/security/cve/CVE-2023-42755.html
* https://www.suse.com/security/cve/CVE-2023-47233.html
* https://www.suse.com/security/cve/CVE-2023-52586.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52618.html
* https://www.suse.com/security/cve/CVE-2023-52642.html
* https://www.suse.com/security/cve/CVE-2023-52643.html
* https://www.suse.com/security/cve/CVE-2023-52644.html
* https://www.suse.com/security/cve/CVE-2023-52646.html
* https://www.suse.com/security/cve/CVE-2023-52650.html
* https://www.suse.com/security/cve/CVE-2023-52653.html
* https://www.suse.com/security/cve/CVE-2023-52654.html
* https://www.suse.com/security/cve/CVE-2023-52655.html
* https://www.suse.com/security/cve/CVE-2023-52656.html
* https://www.suse.com/security/cve/CVE-2023-52657.html
* https://www.suse.com/security/cve/CVE-2023-52659.html
* https://www.suse.com/security/cve/CVE-2023-52660.html
* https://www.suse.com/security/cve/CVE-2023-52661.html
* https://www.suse.com/security/cve/CVE-2023-52662.html
* https://www.suse.com/security/cve/CVE-2023-52664.html
* https://www.suse.com/security/cve/CVE-2023-52669.html
* https://www.suse.com/security/cve/CVE-2023-52671.html
* https://www.suse.com/security/cve/CVE-2023-52674.html
* https://www.suse.com/security/cve/CVE-2023-52676.html
* https://www.suse.com/security/cve/CVE-2023-52678.html
* https://www.suse.com/security/cve/CVE-2023-52679.html
* https://www.suse.com/security/cve/CVE-2023-52680.html
* https://www.suse.com/security/cve/CVE-2023-52683.html
* https://www.suse.com/security/cve/CVE-2023-52685.html
* https://www.suse.com/security/cve/CVE-2023-52686.html
* https://www.suse.com/security/cve/CVE-2023-52690.html
* https://www.suse.com/security/cve/CVE-2023-52691.html
* https://www.suse.com/security/cve/CVE-2023-52692.html
* https://www.suse.com/security/cve/CVE-2023-52693.html
* https://www.suse.com/security/cve/CVE-2023-52694.html
* https://www.suse.com/security/cve/CVE-2023-52696.html
* https://www.suse.com/security/cve/CVE-2023-52698.html
* https://www.suse.com/security/cve/CVE-2023-52699.html
* https://www.suse.com/security/cve/CVE-2023-52702.html
* https://www.suse.com/security/cve/CVE-2023-52703.html
* https://www.suse.com/security/cve/CVE-2023-52705.html
* https://www.suse.com/security/cve/CVE-2023-52707.html
* https://www.suse.com/security/cve/CVE-2023-52708.html
* https://www.suse.com/security/cve/CVE-2023-52730.html
* https://www.suse.com/security/cve/CVE-2023-52731.html
* https://www.suse.com/security/cve/CVE-2023-52732.html
* https://www.suse.com/security/cve/CVE-2023-52733.html
* https://www.suse.com/security/cve/CVE-2023-52736.html
* https://www.suse.com/security/cve/CVE-2023-52738.html
* https://www.suse.com/security/cve/CVE-2023-52739.html
* https://www.suse.com/security/cve/CVE-2023-52740.html
* https://www.suse.com/security/cve/CVE-2023-52741.html
* https://www.suse.com/security/cve/CVE-2023-52742.html
* https://www.suse.com/security/cve/CVE-2023-52743.html
* https://www.suse.com/security/cve/CVE-2023-52744.html
* https://www.suse.com/security/cve/CVE-2023-52745.html
* https://www.suse.com/security/cve/CVE-2023-52746.html
* https://www.suse.com/security/cve/CVE-2023-52747.html
* https://www.suse.com/security/cve/CVE-2023-52753.html
* https://www.suse.com/security/cve/CVE-2023-52754.html
* https://www.suse.com/security/cve/CVE-2023-52756.html
* https://www.suse.com/security/cve/CVE-2023-52757.html
* https://www.suse.com/security/cve/CVE-2023-52759.html
* https://www.suse.com/security/cve/CVE-2023-52763.html
* https://www.suse.com/security/cve/CVE-2023-52764.html
* https://www.suse.com/security/cve/CVE-2023-52766.html
* https://www.suse.com/security/cve/CVE-2023-52773.html
* https://www.suse.com/security/cve/CVE-2023-52774.html
* https://www.suse.com/security/cve/CVE-2023-52777.html
* https://www.suse.com/security/cve/CVE-2023-52781.html
* https://www.suse.com/security/cve/CVE-2023-52788.html
* https://www.suse.com/security/cve/CVE-2023-52789.html
* https://www.suse.com/security/cve/CVE-2023-52791.html
* https://www.suse.com/security/cve/CVE-2023-52795.html
* https://www.suse.com/security/cve/CVE-2023-52796.html
* https://www.suse.com/security/cve/CVE-2023-52798.html
* https://www.suse.com/security/cve/CVE-2023-52799.html
* https://www.suse.com/security/cve/CVE-2023-52800.html
* https://www.suse.com/security/cve/CVE-2023-52803.html
* https://www.suse.com/security/cve/CVE-2023-52804.html
* https://www.suse.com/security/cve/CVE-2023-52805.html
* https://www.suse.com/security/cve/CVE-2023-52806.html
* https://www.suse.com/security/cve/CVE-2023-52807.html
* https://www.suse.com/security/cve/CVE-2023-52808.html
* https://www.suse.com/security/cve/CVE-2023-52809.html
* https://www.suse.com/security/cve/CVE-2023-52810.html
* https://www.suse.com/security/cve/CVE-2023-52811.html
* https://www.suse.com/security/cve/CVE-2023-52814.html
* https://www.suse.com/security/cve/CVE-2023-52815.html
* https://www.suse.com/security/cve/CVE-2023-52816.html
* https://www.suse.com/security/cve/CVE-2023-52817.html
* https://www.suse.com/security/cve/CVE-2023-52818.html
* https://www.suse.com/security/cve/CVE-2023-52819.html
* https://www.suse.com/security/cve/CVE-2023-52821.html
* https://www.suse.com/security/cve/CVE-2023-52825.html
* https://www.suse.com/security/cve/CVE-2023-52826.html
* https://www.suse.com/security/cve/CVE-2023-52832.html
* https://www.suse.com/security/cve/CVE-2023-52833.html
* https://www.suse.com/security/cve/CVE-2023-52834.html
* https://www.suse.com/security/cve/CVE-2023-52838.html
* https://www.suse.com/security/cve/CVE-2023-52840.html
* https://www.suse.com/security/cve/CVE-2023-52841.html
* https://www.suse.com/security/cve/CVE-2023-52844.html
* https://www.suse.com/security/cve/CVE-2023-52847.html
* https://www.suse.com/security/cve/CVE-2023-52851.html
* https://www.suse.com/security/cve/CVE-2023-52853.html
* https://www.suse.com/security/cve/CVE-2023-52854.html
* https://www.suse.com/security/cve/CVE-2023-52855.html
* https://www.suse.com/security/cve/CVE-2023-52856.html
* https://www.suse.com/security/cve/CVE-2023-52858.html
* https://www.suse.com/security/cve/CVE-2023-52860.html
* https://www.suse.com/security/cve/CVE-2023-52861.html
* https://www.suse.com/security/cve/CVE-2023-52864.html
* https://www.suse.com/security/cve/CVE-2023-52865.html
* https://www.suse.com/security/cve/CVE-2023-52867.html
* https://www.suse.com/security/cve/CVE-2023-52868.html
* https://www.suse.com/security/cve/CVE-2023-52870.html
* https://www.suse.com/security/cve/CVE-2023-52871.html
* https://www.suse.com/security/cve/CVE-2023-52872.html
* https://www.suse.com/security/cve/CVE-2023-52873.html
* https://www.suse.com/security/cve/CVE-2023-52875.html
* https://www.suse.com/security/cve/CVE-2023-52876.html
* https://www.suse.com/security/cve/CVE-2023-52877.html
* https://www.suse.com/security/cve/CVE-2023-52878.html
* https://www.suse.com/security/cve/CVE-2023-52880.html
* https://www.suse.com/security/cve/CVE-2023-6531.html
* https://www.suse.com/security/cve/CVE-2024-2201.html
* https://www.suse.com/security/cve/CVE-2024-26597.html
* https://www.suse.com/security/cve/CVE-2024-26643.html
* https://www.suse.com/security/cve/CVE-2024-26679.html
* https://www.suse.com/security/cve/CVE-2024-26692.html
* https://www.suse.com/security/cve/CVE-2024-26698.html
* https://www.suse.com/security/cve/CVE-2024-26700.html
* https://www.suse.com/security/cve/CVE-2024-26715.html
* https://www.suse.com/security/cve/CVE-2024-26739.html
* https://www.suse.com/security/cve/CVE-2024-26742.html
* https://www.suse.com/security/cve/CVE-2024-26748.html
* https://www.suse.com/security/cve/CVE-2024-26758.html
* https://www.suse.com/security/cve/CVE-2024-26764.html
* https://www.suse.com/security/cve/CVE-2024-26775.html
* https://www.suse.com/security/cve/CVE-2024-26777.html
* https://www.suse.com/security/cve/CVE-2024-26778.html
* https://www.suse.com/security/cve/CVE-2024-26788.html
* https://www.suse.com/security/cve/CVE-2024-26791.html
* https://www.suse.com/security/cve/CVE-2024-26801.html
* https://www.suse.com/security/cve/CVE-2024-26822.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26829.html
* https://www.suse.com/security/cve/CVE-2024-26838.html
* https://www.suse.com/security/cve/CVE-2024-26839.html
* https://www.suse.com/security/cve/CVE-2024-26840.html
* https://www.suse.com/security/cve/CVE-2024-26846.html
* https://www.suse.com/security/cve/CVE-2024-26859.html
* https://www.suse.com/security/cve/CVE-2024-26870.html
* https://www.suse.com/security/cve/CVE-2024-26874.html
* https://www.suse.com/security/cve/CVE-2024-26876.html
* https://www.suse.com/security/cve/CVE-2024-26877.html
* https://www.suse.com/security/cve/CVE-2024-26880.html
* https://www.suse.com/security/cve/CVE-2024-26889.html
* https://www.suse.com/security/cve/CVE-2024-26894.html
* https://www.suse.com/security/cve/CVE-2024-26900.html
* https://www.suse.com/security/cve/CVE-2024-26907.html
* https://www.suse.com/security/cve/CVE-2024-26915.html
* https://www.suse.com/security/cve/CVE-2024-26916.html
* https://www.suse.com/security/cve/CVE-2024-26919.html
* https://www.suse.com/security/cve/CVE-2024-26920.html
* https://www.suse.com/security/cve/CVE-2024-26921.html
* https://www.suse.com/security/cve/CVE-2024-26922.html
* https://www.suse.com/security/cve/CVE-2024-26925.html
* https://www.suse.com/security/cve/CVE-2024-26928.html
* https://www.suse.com/security/cve/CVE-2024-26929.html
* https://www.suse.com/security/cve/CVE-2024-26930.html
* https://www.suse.com/security/cve/CVE-2024-26931.html
* https://www.suse.com/security/cve/CVE-2024-26933.html
* https://www.suse.com/security/cve/CVE-2024-26934.html
* https://www.suse.com/security/cve/CVE-2024-26935.html
* https://www.suse.com/security/cve/CVE-2024-26937.html
* https://www.suse.com/security/cve/CVE-2024-26938.html
* https://www.suse.com/security/cve/CVE-2024-26939.html
* https://www.suse.com/security/cve/CVE-2024-26940.html
* https://www.suse.com/security/cve/CVE-2024-26943.html
* https://www.suse.com/security/cve/CVE-2024-26957.html
* https://www.suse.com/security/cve/CVE-2024-26958.html
* https://www.suse.com/security/cve/CVE-2024-26964.html
* https://www.suse.com/security/cve/CVE-2024-26974.html
* https://www.suse.com/security/cve/CVE-2024-26977.html
* https://www.suse.com/security/cve/CVE-2024-26979.html
* https://www.suse.com/security/cve/CVE-2024-26984.html
* https://www.suse.com/security/cve/CVE-2024-26988.html
* https://www.suse.com/security/cve/CVE-2024-26989.html
* https://www.suse.com/security/cve/CVE-2024-26994.html
* https://www.suse.com/security/cve/CVE-2024-26996.html
* https://www.suse.com/security/cve/CVE-2024-26997.html
* https://www.suse.com/security/cve/CVE-2024-26999.html
* https://www.suse.com/security/cve/CVE-2024-27000.html
* https://www.suse.com/security/cve/CVE-2024-27001.html
* https://www.suse.com/security/cve/CVE-2024-27004.html
* https://www.suse.com/security/cve/CVE-2024-27008.html
* https://www.suse.com/security/cve/CVE-2024-27028.html
* https://www.suse.com/security/cve/CVE-2024-27037.html
* https://www.suse.com/security/cve/CVE-2024-27042.html
* https://www.suse.com/security/cve/CVE-2024-27045.html
* https://www.suse.com/security/cve/CVE-2024-27047.html
* https://www.suse.com/security/cve/CVE-2024-27051.html
* https://www.suse.com/security/cve/CVE-2024-27052.html
* https://www.suse.com/security/cve/CVE-2024-27053.html
* https://www.suse.com/security/cve/CVE-2024-27054.html
* https://www.suse.com/security/cve/CVE-2024-27059.html
* https://www.suse.com/security/cve/CVE-2024-27072.html
* https://www.suse.com/security/cve/CVE-2024-27073.html
* https://www.suse.com/security/cve/CVE-2024-27074.html
* https://www.suse.com/security/cve/CVE-2024-27075.html
* https://www.suse.com/security/cve/CVE-2024-27076.html
* https://www.suse.com/security/cve/CVE-2024-27077.html
* https://www.suse.com/security/cve/CVE-2024-27078.html
* https://www.suse.com/security/cve/CVE-2024-27388.html
* https://www.suse.com/security/cve/CVE-2024-27393.html
* https://www.suse.com/security/cve/CVE-2024-27395.html
* https://www.suse.com/security/cve/CVE-2024-27396.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-27399.html
* https://www.suse.com/security/cve/CVE-2024-27400.html
* https://www.suse.com/security/cve/CVE-2024-27401.html
* https://www.suse.com/security/cve/CVE-2024-27405.html
* https://www.suse.com/security/cve/CVE-2024-27410.html
* https://www.suse.com/security/cve/CVE-2024-27412.html
* https://www.suse.com/security/cve/CVE-2024-27413.html
* https://www.suse.com/security/cve/CVE-2024-27416.html
* https://www.suse.com/security/cve/CVE-2024-27417.html
* https://www.suse.com/security/cve/CVE-2024-27419.html
* https://www.suse.com/security/cve/CVE-2024-27431.html
* https://www.suse.com/security/cve/CVE-2024-27435.html
* https://www.suse.com/security/cve/CVE-2024-27436.html
* https://www.suse.com/security/cve/CVE-2024-35789.html
* https://www.suse.com/security/cve/CVE-2024-35791.html
* https://www.suse.com/security/cve/CVE-2024-35796.html
* https://www.suse.com/security/cve/CVE-2024-35799.html
* https://www.suse.com/security/cve/CVE-2024-35801.html
* https://www.suse.com/security/cve/CVE-2024-35804.html
* https://www.suse.com/security/cve/CVE-2024-35806.html
* https://www.suse.com/security/cve/CVE-2024-35809.html
* https://www.suse.com/security/cve/CVE-2024-35811.html
* https://www.suse.com/security/cve/CVE-2024-35812.html
* https://www.suse.com/security/cve/CVE-2024-35813.html
* https://www.suse.com/security/cve/CVE-2024-35815.html
* https://www.suse.com/security/cve/CVE-2024-35817.html
* https://www.suse.com/security/cve/CVE-2024-35821.html
* https://www.suse.com/security/cve/CVE-2024-35822.html
* https://www.suse.com/security/cve/CVE-2024-35823.html
* https://www.suse.com/security/cve/CVE-2024-35825.html
* https://www.suse.com/security/cve/CVE-2024-35828.html
* https://www.suse.com/security/cve/CVE-2024-35829.html
* https://www.suse.com/security/cve/CVE-2024-35830.html
* https://www.suse.com/security/cve/CVE-2024-35833.html
* https://www.suse.com/security/cve/CVE-2024-35845.html
* https://www.suse.com/security/cve/CVE-2024-35847.html
* https://www.suse.com/security/cve/CVE-2024-35849.html
* https://www.suse.com/security/cve/CVE-2024-35851.html
* https://www.suse.com/security/cve/CVE-2024-35852.html
* https://www.suse.com/security/cve/CVE-2024-35854.html
* https://www.suse.com/security/cve/CVE-2024-35860.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35863.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35865.html
* https://www.suse.com/security/cve/CVE-2024-35866.html
* https://www.suse.com/security/cve/CVE-2024-35867.html
* https://www.suse.com/security/cve/CVE-2024-35868.html
* https://www.suse.com/security/cve/CVE-2024-35869.html
* https://www.suse.com/security/cve/CVE-2024-35870.html
* https://www.suse.com/security/cve/CVE-2024-35872.html
* https://www.suse.com/security/cve/CVE-2024-35875.html
* https://www.suse.com/security/cve/CVE-2024-35877.html
* https://www.suse.com/security/cve/CVE-2024-35878.html
* https://www.suse.com/security/cve/CVE-2024-35879.html
* https://www.suse.com/security/cve/CVE-2024-35885.html
* https://www.suse.com/security/cve/CVE-2024-35887.html
* https://www.suse.com/security/cve/CVE-2024-35895.html
* https://www.suse.com/security/cve/CVE-2024-35901.html
* https://www.suse.com/security/cve/CVE-2024-35904.html
* https://www.suse.com/security/cve/CVE-2024-35905.html
* https://www.suse.com/security/cve/CVE-2024-35907.html
* https://www.suse.com/security/cve/CVE-2024-35912.html
* https://www.suse.com/security/cve/CVE-2024-35914.html
* https://www.suse.com/security/cve/CVE-2024-35915.html
* https://www.suse.com/security/cve/CVE-2024-35922.html
* https://www.suse.com/security/cve/CVE-2024-35924.html
* https://www.suse.com/security/cve/CVE-2024-35930.html
* https://www.suse.com/security/cve/CVE-2024-35932.html
* https://www.suse.com/security/cve/CVE-2024-35933.html
* https://www.suse.com/security/cve/CVE-2024-35935.html
* https://www.suse.com/security/cve/CVE-2024-35936.html
* https://www.suse.com/security/cve/CVE-2024-35938.html
* https://www.suse.com/security/cve/CVE-2024-35939.html
* https://www.suse.com/security/cve/CVE-2024-35940.html
* https://www.suse.com/security/cve/CVE-2024-35943.html
* https://www.suse.com/security/cve/CVE-2024-35944.html
* https://www.suse.com/security/cve/CVE-2024-35947.html
* https://www.suse.com/security/cve/CVE-2024-35950.html
* https://www.suse.com/security/cve/CVE-2024-35951.html
* https://www.suse.com/security/cve/CVE-2024-35952.html
* https://www.suse.com/security/cve/CVE-2024-35955.html
* https://www.suse.com/security/cve/CVE-2024-35959.html
* https://www.suse.com/security/cve/CVE-2024-35963.html
* https://www.suse.com/security/cve/CVE-2024-35964.html
* https://www.suse.com/security/cve/CVE-2024-35965.html
* https://www.suse.com/security/cve/CVE-2024-35966.html
* https://www.suse.com/security/cve/CVE-2024-35967.html
* https://www.suse.com/security/cve/CVE-2024-35969.html
* https://www.suse.com/security/cve/CVE-2024-35973.html
* https://www.suse.com/security/cve/CVE-2024-35976.html
* https://www.suse.com/security/cve/CVE-2024-35978.html
* https://www.suse.com/security/cve/CVE-2024-35982.html
* https://www.suse.com/security/cve/CVE-2024-35984.html
* https://www.suse.com/security/cve/CVE-2024-35989.html
* https://www.suse.com/security/cve/CVE-2024-35990.html
* https://www.suse.com/security/cve/CVE-2024-35998.html
* https://www.suse.com/security/cve/CVE-2024-35999.html
* https://www.suse.com/security/cve/CVE-2024-36006.html
* https://www.suse.com/security/cve/CVE-2024-36007.html
* https://www.suse.com/security/cve/CVE-2024-36012.html
* https://www.suse.com/security/cve/CVE-2024-36014.html
* https://www.suse.com/security/cve/CVE-2024-36015.html
* https://www.suse.com/security/cve/CVE-2024-36016.html
* https://www.suse.com/security/cve/CVE-2024-36026.html
* https://www.suse.com/security/cve/CVE-2024-36029.html
* https://www.suse.com/security/cve/CVE-2024-36032.html
* https://www.suse.com/security/cve/CVE-2024-36880.html
* https://www.suse.com/security/cve/CVE-2024-36893.html
* https://www.suse.com/security/cve/CVE-2024-36896.html
* https://www.suse.com/security/cve/CVE-2024-36897.html
* https://www.suse.com/security/cve/CVE-2024-36906.html
* https://www.suse.com/security/cve/CVE-2024-36918.html
* https://www.suse.com/security/cve/CVE-2024-36924.html
* https://www.suse.com/security/cve/CVE-2024-36926.html
* https://www.suse.com/security/cve/CVE-2024-36928.html
* https://www.suse.com/security/cve/CVE-2024-36931.html
* https://www.suse.com/security/cve/CVE-2024-36938.html
* https://www.suse.com/security/cve/CVE-2024-36940.html
* https://www.suse.com/security/cve/CVE-2024-36941.html
* https://www.suse.com/security/cve/CVE-2024-36942.html
* https://www.suse.com/security/cve/CVE-2024-36944.html
* https://www.suse.com/security/cve/CVE-2024-36947.html
* https://www.suse.com/security/cve/CVE-2024-36950.html
* https://www.suse.com/security/cve/CVE-2024-36952.html
* https://www.suse.com/security/cve/CVE-2024-36955.html
* https://www.suse.com/security/cve/CVE-2024-36959.html
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1141539
* https://bugzilla.suse.com/show_bug.cgi?id=1174585
* https://bugzilla.suse.com/show_bug.cgi?id=1181674
* https://bugzilla.suse.com/show_bug.cgi?id=1187716
* https://bugzilla.suse.com/show_bug.cgi?id=1190569
* https://bugzilla.suse.com/show_bug.cgi?id=1191949
* https://bugzilla.suse.com/show_bug.cgi?id=1192107
* https://bugzilla.suse.com/show_bug.cgi?id=1193983
* https://bugzilla.suse.com/show_bug.cgi?id=1194288
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1196956
* https://bugzilla.suse.com/show_bug.cgi?id=1197915
* https://bugzilla.suse.com/show_bug.cgi?id=1200465
* https://bugzilla.suse.com/show_bug.cgi?id=1205205
* https://bugzilla.suse.com/show_bug.cgi?id=1207284
* https://bugzilla.suse.com/show_bug.cgi?id=1207361
* https://bugzilla.suse.com/show_bug.cgi?id=1207948
* https://bugzilla.suse.com/show_bug.cgi?id=1208149
* https://bugzilla.suse.com/show_bug.cgi?id=1209657
* https://bugzilla.suse.com/show_bug.cgi?id=1209799
* https://bugzilla.suse.com/show_bug.cgi?id=1209834
* https://bugzilla.suse.com/show_bug.cgi?id=1209980
* https://bugzilla.suse.com/show_bug.cgi?id=1210335
* https://bugzilla.suse.com/show_bug.cgi?id=1213863
* https://bugzilla.suse.com/show_bug.cgi?id=1214852
* https://bugzilla.suse.com/show_bug.cgi?id=1215322
* https://bugzilla.suse.com/show_bug.cgi?id=1215702
* https://bugzilla.suse.com/show_bug.cgi?id=1216358
* https://bugzilla.suse.com/show_bug.cgi?id=1216702
* https://bugzilla.suse.com/show_bug.cgi?id=1217169
* https://bugzilla.suse.com/show_bug.cgi?id=1217339
* https://bugzilla.suse.com/show_bug.cgi?id=1217515
* https://bugzilla.suse.com/show_bug.cgi?id=1218447
* https://bugzilla.suse.com/show_bug.cgi?id=1220021
* https://bugzilla.suse.com/show_bug.cgi?id=1220267
* https://bugzilla.suse.com/show_bug.cgi?id=1220363
* https://bugzilla.suse.com/show_bug.cgi?id=1220783
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221081
* https://bugzilla.suse.com/show_bug.cgi?id=1221615
* https://bugzilla.suse.com/show_bug.cgi?id=1221777
* https://bugzilla.suse.com/show_bug.cgi?id=1221816
* https://bugzilla.suse.com/show_bug.cgi?id=1221829
* https://bugzilla.suse.com/show_bug.cgi?id=1222011
* https://bugzilla.suse.com/show_bug.cgi?id=1222374
* https://bugzilla.suse.com/show_bug.cgi?id=1222385
* https://bugzilla.suse.com/show_bug.cgi?id=1222413
* https://bugzilla.suse.com/show_bug.cgi?id=1222464
* https://bugzilla.suse.com/show_bug.cgi?id=1222513
* https://bugzilla.suse.com/show_bug.cgi?id=1222559
* https://bugzilla.suse.com/show_bug.cgi?id=1222561
* https://bugzilla.suse.com/show_bug.cgi?id=1222608
* https://bugzilla.suse.com/show_bug.cgi?id=1222619
* https://bugzilla.suse.com/show_bug.cgi?id=1222627
* https://bugzilla.suse.com/show_bug.cgi?id=1222721
* https://bugzilla.suse.com/show_bug.cgi?id=1222765
* https://bugzilla.suse.com/show_bug.cgi?id=1222770
* https://bugzilla.suse.com/show_bug.cgi?id=1222783
* https://bugzilla.suse.com/show_bug.cgi?id=1222793
* https://bugzilla.suse.com/show_bug.cgi?id=1222870
* https://bugzilla.suse.com/show_bug.cgi?id=1222893
* https://bugzilla.suse.com/show_bug.cgi?id=1222960
* https://bugzilla.suse.com/show_bug.cgi?id=1222961
* https://bugzilla.suse.com/show_bug.cgi?id=1222974
* https://bugzilla.suse.com/show_bug.cgi?id=1222975
* https://bugzilla.suse.com/show_bug.cgi?id=1222976
* https://bugzilla.suse.com/show_bug.cgi?id=1223011
* https://bugzilla.suse.com/show_bug.cgi?id=1223023
* https://bugzilla.suse.com/show_bug.cgi?id=1223027
* https://bugzilla.suse.com/show_bug.cgi?id=1223031
* https://bugzilla.suse.com/show_bug.cgi?id=1223043
* https://bugzilla.suse.com/show_bug.cgi?id=1223046
* https://bugzilla.suse.com/show_bug.cgi?id=1223048
* https://bugzilla.suse.com/show_bug.cgi?id=1223049
* https://bugzilla.suse.com/show_bug.cgi?id=1223084
* https://bugzilla.suse.com/show_bug.cgi?id=1223113
* https://bugzilla.suse.com/show_bug.cgi?id=1223119
* https://bugzilla.suse.com/show_bug.cgi?id=1223137
* https://bugzilla.suse.com/show_bug.cgi?id=1223138
* https://bugzilla.suse.com/show_bug.cgi?id=1223140
* https://bugzilla.suse.com/show_bug.cgi?id=1223188
* https://bugzilla.suse.com/show_bug.cgi?id=1223203
* https://bugzilla.suse.com/show_bug.cgi?id=1223207
* https://bugzilla.suse.com/show_bug.cgi?id=1223315
* https://bugzilla.suse.com/show_bug.cgi?id=1223360
* https://bugzilla.suse.com/show_bug.cgi?id=1223384
* https://bugzilla.suse.com/show_bug.cgi?id=1223390
* https://bugzilla.suse.com/show_bug.cgi?id=1223432
* https://bugzilla.suse.com/show_bug.cgi?id=1223489
* https://bugzilla.suse.com/show_bug.cgi?id=1223505
* https://bugzilla.suse.com/show_bug.cgi?id=1223532
* https://bugzilla.suse.com/show_bug.cgi?id=1223575
* https://bugzilla.suse.com/show_bug.cgi?id=1223595
* https://bugzilla.suse.com/show_bug.cgi?id=1223626
* https://bugzilla.suse.com/show_bug.cgi?id=1223627
* https://bugzilla.suse.com/show_bug.cgi?id=1223628
* https://bugzilla.suse.com/show_bug.cgi?id=1223631
* https://bugzilla.suse.com/show_bug.cgi?id=1223633
* https://bugzilla.suse.com/show_bug.cgi?id=1223638
* https://bugzilla.suse.com/show_bug.cgi?id=1223650
* https://bugzilla.suse.com/show_bug.cgi?id=1223653
* https://bugzilla.suse.com/show_bug.cgi?id=1223666
* https://bugzilla.suse.com/show_bug.cgi?id=1223670
* https://bugzilla.suse.com/show_bug.cgi?id=1223671
* https://bugzilla.suse.com/show_bug.cgi?id=1223675
* https://bugzilla.suse.com/show_bug.cgi?id=1223677
* https://bugzilla.suse.com/show_bug.cgi?id=1223678
* https://bugzilla.suse.com/show_bug.cgi?id=1223679
* https://bugzilla.suse.com/show_bug.cgi?id=1223698
* https://bugzilla.suse.com/show_bug.cgi?id=1223712
* https://bugzilla.suse.com/show_bug.cgi?id=1223715
* https://bugzilla.suse.com/show_bug.cgi?id=1223717
* https://bugzilla.suse.com/show_bug.cgi?id=1223718
* https://bugzilla.suse.com/show_bug.cgi?id=1223737
* https://bugzilla.suse.com/show_bug.cgi?id=1223738
* https://bugzilla.suse.com/show_bug.cgi?id=1223741
* https://bugzilla.suse.com/show_bug.cgi?id=1223744
* https://bugzilla.suse.com/show_bug.cgi?id=1223747
* https://bugzilla.suse.com/show_bug.cgi?id=1223748
* https://bugzilla.suse.com/show_bug.cgi?id=1223750
* https://bugzilla.suse.com/show_bug.cgi?id=1223752
* https://bugzilla.suse.com/show_bug.cgi?id=1223754
* https://bugzilla.suse.com/show_bug.cgi?id=1223756
* https://bugzilla.suse.com/show_bug.cgi?id=1223757
* https://bugzilla.suse.com/show_bug.cgi?id=1223762
* https://bugzilla.suse.com/show_bug.cgi?id=1223769
* https://bugzilla.suse.com/show_bug.cgi?id=1223770
* https://bugzilla.suse.com/show_bug.cgi?id=1223779
* https://bugzilla.suse.com/show_bug.cgi?id=1223780
* https://bugzilla.suse.com/show_bug.cgi?id=1223781
* https://bugzilla.suse.com/show_bug.cgi?id=1223788
* https://bugzilla.suse.com/show_bug.cgi?id=1223802
* https://bugzilla.suse.com/show_bug.cgi?id=1223819
* https://bugzilla.suse.com/show_bug.cgi?id=1223823
* https://bugzilla.suse.com/show_bug.cgi?id=1223826
* https://bugzilla.suse.com/show_bug.cgi?id=1223828
* https://bugzilla.suse.com/show_bug.cgi?id=1223829
* https://bugzilla.suse.com/show_bug.cgi?id=1223837
* https://bugzilla.suse.com/show_bug.cgi?id=1223842
* https://bugzilla.suse.com/show_bug.cgi?id=1223843
* https://bugzilla.suse.com/show_bug.cgi?id=1223844
* https://bugzilla.suse.com/show_bug.cgi?id=1223847
* https://bugzilla.suse.com/show_bug.cgi?id=1223858
* https://bugzilla.suse.com/show_bug.cgi?id=1223875
* https://bugzilla.suse.com/show_bug.cgi?id=1223879
* https://bugzilla.suse.com/show_bug.cgi?id=1223895
* https://bugzilla.suse.com/show_bug.cgi?id=1223959
* https://bugzilla.suse.com/show_bug.cgi?id=1223961
* https://bugzilla.suse.com/show_bug.cgi?id=1223991
* https://bugzilla.suse.com/show_bug.cgi?id=1223996
* https://bugzilla.suse.com/show_bug.cgi?id=1224020
* https://bugzilla.suse.com/show_bug.cgi?id=1224076
* https://bugzilla.suse.com/show_bug.cgi?id=1224096
* https://bugzilla.suse.com/show_bug.cgi?id=1224098
* https://bugzilla.suse.com/show_bug.cgi?id=1224099
* https://bugzilla.suse.com/show_bug.cgi?id=1224137
* https://bugzilla.suse.com/show_bug.cgi?id=1224166
* https://bugzilla.suse.com/show_bug.cgi?id=1224174
* https://bugzilla.suse.com/show_bug.cgi?id=1224177
* https://bugzilla.suse.com/show_bug.cgi?id=1224180
* https://bugzilla.suse.com/show_bug.cgi?id=1224181
* https://bugzilla.suse.com/show_bug.cgi?id=1224187
* https://bugzilla.suse.com/show_bug.cgi?id=1224331
* https://bugzilla.suse.com/show_bug.cgi?id=1224346
* https://bugzilla.suse.com/show_bug.cgi?id=1224423
* https://bugzilla.suse.com/show_bug.cgi?id=1224432
* https://bugzilla.suse.com/show_bug.cgi?id=1224437
* https://bugzilla.suse.com/show_bug.cgi?id=1224438
* https://bugzilla.suse.com/show_bug.cgi?id=1224442
* https://bugzilla.suse.com/show_bug.cgi?id=1224443
* https://bugzilla.suse.com/show_bug.cgi?id=1224445
* https://bugzilla.suse.com/show_bug.cgi?id=1224449
* https://bugzilla.suse.com/show_bug.cgi?id=1224479
* https://bugzilla.suse.com/show_bug.cgi?id=1224482
* https://bugzilla.suse.com/show_bug.cgi?id=1224487
* https://bugzilla.suse.com/show_bug.cgi?id=1224488
* https://bugzilla.suse.com/show_bug.cgi?id=1224492
* https://bugzilla.suse.com/show_bug.cgi?id=1224494
* https://bugzilla.suse.com/show_bug.cgi?id=1224495
* https://bugzilla.suse.com/show_bug.cgi?id=1224502
* https://bugzilla.suse.com/show_bug.cgi?id=1224508
* https://bugzilla.suse.com/show_bug.cgi?id=1224509
* https://bugzilla.suse.com/show_bug.cgi?id=1224511
* https://bugzilla.suse.com/show_bug.cgi?id=1224519
* https://bugzilla.suse.com/show_bug.cgi?id=1224524
* https://bugzilla.suse.com/show_bug.cgi?id=1224525
* https://bugzilla.suse.com/show_bug.cgi?id=1224530
* https://bugzilla.suse.com/show_bug.cgi?id=1224531
* https://bugzilla.suse.com/show_bug.cgi?id=1224534
* https://bugzilla.suse.com/show_bug.cgi?id=1224535
* https://bugzilla.suse.com/show_bug.cgi?id=1224537
* https://bugzilla.suse.com/show_bug.cgi?id=1224541
* https://bugzilla.suse.com/show_bug.cgi?id=1224543
* https://bugzilla.suse.com/show_bug.cgi?id=1224549
* https://bugzilla.suse.com/show_bug.cgi?id=1224550
* https://bugzilla.suse.com/show_bug.cgi?id=1224558
* https://bugzilla.suse.com/show_bug.cgi?id=1224559
* https://bugzilla.suse.com/show_bug.cgi?id=1224566
* https://bugzilla.suse.com/show_bug.cgi?id=1224567
* https://bugzilla.suse.com/show_bug.cgi?id=1224571
* https://bugzilla.suse.com/show_bug.cgi?id=1224575
* https://bugzilla.suse.com/show_bug.cgi?id=1224576
* https://bugzilla.suse.com/show_bug.cgi?id=1224579
* https://bugzilla.suse.com/show_bug.cgi?id=1224580
* https://bugzilla.suse.com/show_bug.cgi?id=1224581
* https://bugzilla.suse.com/show_bug.cgi?id=1224582
* https://bugzilla.suse.com/show_bug.cgi?id=1224586
* https://bugzilla.suse.com/show_bug.cgi?id=1224587
* https://bugzilla.suse.com/show_bug.cgi?id=1224592
* https://bugzilla.suse.com/show_bug.cgi?id=1224598
* https://bugzilla.suse.com/show_bug.cgi?id=1224601
* https://bugzilla.suse.com/show_bug.cgi?id=1224607
* https://bugzilla.suse.com/show_bug.cgi?id=1224608
* https://bugzilla.suse.com/show_bug.cgi?id=1224611
* https://bugzilla.suse.com/show_bug.cgi?id=1224615
* https://bugzilla.suse.com/show_bug.cgi?id=1224617
* https://bugzilla.suse.com/show_bug.cgi?id=1224618
* https://bugzilla.suse.com/show_bug.cgi?id=1224621
* https://bugzilla.suse.com/show_bug.cgi?id=1224622
* https://bugzilla.suse.com/show_bug.cgi?id=1224624
* https://bugzilla.suse.com/show_bug.cgi?id=1224627
* https://bugzilla.suse.com/show_bug.cgi?id=1224628
* https://bugzilla.suse.com/show_bug.cgi?id=1224629
* https://bugzilla.suse.com/show_bug.cgi?id=1224632
* https://bugzilla.suse.com/show_bug.cgi?id=1224636
* https://bugzilla.suse.com/show_bug.cgi?id=1224637
* https://bugzilla.suse.com/show_bug.cgi?id=1224638
* https://bugzilla.suse.com/show_bug.cgi?id=1224640
* https://bugzilla.suse.com/show_bug.cgi?id=1224643
* https://bugzilla.suse.com/show_bug.cgi?id=1224644
* https://bugzilla.suse.com/show_bug.cgi?id=1224645
* https://bugzilla.suse.com/show_bug.cgi?id=1224647
* https://bugzilla.suse.com/show_bug.cgi?id=1224648
* https://bugzilla.suse.com/show_bug.cgi?id=1224649
* https://bugzilla.suse.com/show_bug.cgi?id=1224650
* https://bugzilla.suse.com/show_bug.cgi?id=1224651
* https://bugzilla.suse.com/show_bug.cgi?id=1224657
* https://bugzilla.suse.com/show_bug.cgi?id=1224659
* https://bugzilla.suse.com/show_bug.cgi?id=1224660
* https://bugzilla.suse.com/show_bug.cgi?id=1224663
* https://bugzilla.suse.com/show_bug.cgi?id=1224664
* https://bugzilla.suse.com/show_bug.cgi?id=1224665
* https://bugzilla.suse.com/show_bug.cgi?id=1224666
* https://bugzilla.suse.com/show_bug.cgi?id=1224667
* https://bugzilla.suse.com/show_bug.cgi?id=1224668
* https://bugzilla.suse.com/show_bug.cgi?id=1224671
* https://bugzilla.suse.com/show_bug.cgi?id=1224672
* https://bugzilla.suse.com/show_bug.cgi?id=1224676
* https://bugzilla.suse.com/show_bug.cgi?id=1224678
* https://bugzilla.suse.com/show_bug.cgi?id=1224679
* https://bugzilla.suse.com/show_bug.cgi?id=1224680
* https://bugzilla.suse.com/show_bug.cgi?id=1224681
* https://bugzilla.suse.com/show_bug.cgi?id=1224682
* https://bugzilla.suse.com/show_bug.cgi?id=1224685
* https://bugzilla.suse.com/show_bug.cgi?id=1224686
* https://bugzilla.suse.com/show_bug.cgi?id=1224692
* https://bugzilla.suse.com/show_bug.cgi?id=1224697
* https://bugzilla.suse.com/show_bug.cgi?id=1224699
* https://bugzilla.suse.com/show_bug.cgi?id=1224701
* https://bugzilla.suse.com/show_bug.cgi?id=1224703
* https://bugzilla.suse.com/show_bug.cgi?id=1224705
* https://bugzilla.suse.com/show_bug.cgi?id=1224707
* https://bugzilla.suse.com/show_bug.cgi?id=1224717
* https://bugzilla.suse.com/show_bug.cgi?id=1224718
* https://bugzilla.suse.com/show_bug.cgi?id=1224721
* https://bugzilla.suse.com/show_bug.cgi?id=1224722
* https://bugzilla.suse.com/show_bug.cgi?id=1224723
* https://bugzilla.suse.com/show_bug.cgi?id=1224725
* https://bugzilla.suse.com/show_bug.cgi?id=1224727
* https://bugzilla.suse.com/show_bug.cgi?id=1224728
* https://bugzilla.suse.com/show_bug.cgi?id=1224729
* https://bugzilla.suse.com/show_bug.cgi?id=1224730
* https://bugzilla.suse.com/show_bug.cgi?id=1224731
* https://bugzilla.suse.com/show_bug.cgi?id=1224732
* https://bugzilla.suse.com/show_bug.cgi?id=1224733
* https://bugzilla.suse.com/show_bug.cgi?id=1224736
* https://bugzilla.suse.com/show_bug.cgi?id=1224738
* https://bugzilla.suse.com/show_bug.cgi?id=1224739
* https://bugzilla.suse.com/show_bug.cgi?id=1224740
* https://bugzilla.suse.com/show_bug.cgi?id=1224747
* https://bugzilla.suse.com/show_bug.cgi?id=1224749
* https://bugzilla.suse.com/show_bug.cgi?id=1224759
* https://bugzilla.suse.com/show_bug.cgi?id=1224763
* https://bugzilla.suse.com/show_bug.cgi?id=1224764
* https://bugzilla.suse.com/show_bug.cgi?id=1224765
* https://bugzilla.suse.com/show_bug.cgi?id=1224766
* https://bugzilla.suse.com/show_bug.cgi?id=1224794
* https://bugzilla.suse.com/show_bug.cgi?id=1224795
* https://bugzilla.suse.com/show_bug.cgi?id=1224796
* https://bugzilla.suse.com/show_bug.cgi?id=1224803
* https://bugzilla.suse.com/show_bug.cgi?id=1224816
* https://bugzilla.suse.com/show_bug.cgi?id=1224895
* https://bugzilla.suse.com/show_bug.cgi?id=1224898
* https://bugzilla.suse.com/show_bug.cgi?id=1224900
* https://bugzilla.suse.com/show_bug.cgi?id=1224901
* https://bugzilla.suse.com/show_bug.cgi?id=1224902
* https://bugzilla.suse.com/show_bug.cgi?id=1224903
* https://bugzilla.suse.com/show_bug.cgi?id=1224904
* https://bugzilla.suse.com/show_bug.cgi?id=1224905
* https://bugzilla.suse.com/show_bug.cgi?id=1224907
* https://bugzilla.suse.com/show_bug.cgi?id=1224909
* https://bugzilla.suse.com/show_bug.cgi?id=1224910
* https://bugzilla.suse.com/show_bug.cgi?id=1224911
* https://bugzilla.suse.com/show_bug.cgi?id=1224912
* https://bugzilla.suse.com/show_bug.cgi?id=1224913
* https://bugzilla.suse.com/show_bug.cgi?id=1224914
* https://bugzilla.suse.com/show_bug.cgi?id=1224915
* https://bugzilla.suse.com/show_bug.cgi?id=1224920
* https://bugzilla.suse.com/show_bug.cgi?id=1224928
* https://bugzilla.suse.com/show_bug.cgi?id=1224929
* https://bugzilla.suse.com/show_bug.cgi?id=1224930
* https://bugzilla.suse.com/show_bug.cgi?id=1224931
* https://bugzilla.suse.com/show_bug.cgi?id=1224932
* https://bugzilla.suse.com/show_bug.cgi?id=1224936
* https://bugzilla.suse.com/show_bug.cgi?id=1224937
* https://bugzilla.suse.com/show_bug.cgi?id=1224941
* https://bugzilla.suse.com/show_bug.cgi?id=1224942
* https://bugzilla.suse.com/show_bug.cgi?id=1224944
* https://bugzilla.suse.com/show_bug.cgi?id=1224945
* https://bugzilla.suse.com/show_bug.cgi?id=1224947
* https://bugzilla.suse.com/show_bug.cgi?id=1224956
* https://bugzilla.suse.com/show_bug.cgi?id=1224988
* https://bugzilla.suse.com/show_bug.cgi?id=1224992
* https://bugzilla.suse.com/show_bug.cgi?id=1225000
* https://bugzilla.suse.com/show_bug.cgi?id=1225003
* https://bugzilla.suse.com/show_bug.cgi?id=1225005
* https://bugzilla.suse.com/show_bug.cgi?id=1225008
* https://bugzilla.suse.com/show_bug.cgi?id=1225009
* https://bugzilla.suse.com/show_bug.cgi?id=1225022
* https://bugzilla.suse.com/show_bug.cgi?id=1225031
* https://bugzilla.suse.com/show_bug.cgi?id=1225032
* https://bugzilla.suse.com/show_bug.cgi?id=1225036
* https://bugzilla.suse.com/show_bug.cgi?id=1225041
* https://bugzilla.suse.com/show_bug.cgi?id=1225044
* https://bugzilla.suse.com/show_bug.cgi?id=1225053
* https://bugzilla.suse.com/show_bug.cgi?id=1225076
* https://bugzilla.suse.com/show_bug.cgi?id=1225077
* https://bugzilla.suse.com/show_bug.cgi?id=1225082
* https://bugzilla.suse.com/show_bug.cgi?id=1225085
* https://bugzilla.suse.com/show_bug.cgi?id=1225086
* https://bugzilla.suse.com/show_bug.cgi?id=1225092
* https://bugzilla.suse.com/show_bug.cgi?id=1225095
* https://bugzilla.suse.com/show_bug.cgi?id=1225096
* https://bugzilla.suse.com/show_bug.cgi?id=1225097
* https://bugzilla.suse.com/show_bug.cgi?id=1225106
* https://bugzilla.suse.com/show_bug.cgi?id=1225108
* https://bugzilla.suse.com/show_bug.cgi?id=1225109
* https://bugzilla.suse.com/show_bug.cgi?id=1225114
* https://bugzilla.suse.com/show_bug.cgi?id=1225118
* https://bugzilla.suse.com/show_bug.cgi?id=1225121
* https://bugzilla.suse.com/show_bug.cgi?id=1225122
* https://bugzilla.suse.com/show_bug.cgi?id=1225123
* https://bugzilla.suse.com/show_bug.cgi?id=1225125
* https://bugzilla.suse.com/show_bug.cgi?id=1225126
* https://bugzilla.suse.com/show_bug.cgi?id=1225127
* https://bugzilla.suse.com/show_bug.cgi?id=1225129
* https://bugzilla.suse.com/show_bug.cgi?id=1225131
* https://bugzilla.suse.com/show_bug.cgi?id=1225132
* https://bugzilla.suse.com/show_bug.cgi?id=1225138
* https://bugzilla.suse.com/show_bug.cgi?id=1225139
* https://bugzilla.suse.com/show_bug.cgi?id=1225145
* https://bugzilla.suse.com/show_bug.cgi?id=1225151
* https://bugzilla.suse.com/show_bug.cgi?id=1225153
* https://bugzilla.suse.com/show_bug.cgi?id=1225156
* https://bugzilla.suse.com/show_bug.cgi?id=1225158
* https://bugzilla.suse.com/show_bug.cgi?id=1225160
* https://bugzilla.suse.com/show_bug.cgi?id=1225161
* https://bugzilla.suse.com/show_bug.cgi?id=1225164
* https://bugzilla.suse.com/show_bug.cgi?id=1225167
* https://bugzilla.suse.com/show_bug.cgi?id=1225180
* https://bugzilla.suse.com/show_bug.cgi?id=1225183
* https://bugzilla.suse.com/show_bug.cgi?id=1225184
* https://bugzilla.suse.com/show_bug.cgi?id=1225186
* https://bugzilla.suse.com/show_bug.cgi?id=1225187
* https://bugzilla.suse.com/show_bug.cgi?id=1225189
* https://bugzilla.suse.com/show_bug.cgi?id=1225190
* https://bugzilla.suse.com/show_bug.cgi?id=1225191
* https://bugzilla.suse.com/show_bug.cgi?id=1225192
* https://bugzilla.suse.com/show_bug.cgi?id=1225193
* https://bugzilla.suse.com/show_bug.cgi?id=1225195
* https://bugzilla.suse.com/show_bug.cgi?id=1225198
* https://bugzilla.suse.com/show_bug.cgi?id=1225201
* https://bugzilla.suse.com/show_bug.cgi?id=1225203
* https://bugzilla.suse.com/show_bug.cgi?id=1225205
* https://bugzilla.suse.com/show_bug.cgi?id=1225206
* https://bugzilla.suse.com/show_bug.cgi?id=1225207
* https://bugzilla.suse.com/show_bug.cgi?id=1225208
* https://bugzilla.suse.com/show_bug.cgi?id=1225209
* https://bugzilla.suse.com/show_bug.cgi?id=1225210
* https://bugzilla.suse.com/show_bug.cgi?id=1225214
* https://bugzilla.suse.com/show_bug.cgi?id=1225222
* https://bugzilla.suse.com/show_bug.cgi?id=1225223
* https://bugzilla.suse.com/show_bug.cgi?id=1225224
* https://bugzilla.suse.com/show_bug.cgi?id=1225225
* https://bugzilla.suse.com/show_bug.cgi?id=1225227
* https://bugzilla.suse.com/show_bug.cgi?id=1225228
* https://bugzilla.suse.com/show_bug.cgi?id=1225229
* https://bugzilla.suse.com/show_bug.cgi?id=1225230
* https://bugzilla.suse.com/show_bug.cgi?id=1225232
* https://bugzilla.suse.com/show_bug.cgi?id=1225233
* https://bugzilla.suse.com/show_bug.cgi?id=1225235
* https://bugzilla.suse.com/show_bug.cgi?id=1225236
* https://bugzilla.suse.com/show_bug.cgi?id=1225237
* https://bugzilla.suse.com/show_bug.cgi?id=1225238
* https://bugzilla.suse.com/show_bug.cgi?id=1225239
* https://bugzilla.suse.com/show_bug.cgi?id=1225240
* https://bugzilla.suse.com/show_bug.cgi?id=1225241
* https://bugzilla.suse.com/show_bug.cgi?id=1225242
* https://bugzilla.suse.com/show_bug.cgi?id=1225243
* https://bugzilla.suse.com/show_bug.cgi?id=1225244
* https://bugzilla.suse.com/show_bug.cgi?id=1225245
* https://bugzilla.suse.com/show_bug.cgi?id=1225246
* https://bugzilla.suse.com/show_bug.cgi?id=1225247
* https://bugzilla.suse.com/show_bug.cgi?id=1225248
* https://bugzilla.suse.com/show_bug.cgi?id=1225249
* https://bugzilla.suse.com/show_bug.cgi?id=1225250
* https://bugzilla.suse.com/show_bug.cgi?id=1225251
* https://bugzilla.suse.com/show_bug.cgi?id=1225252
* https://bugzilla.suse.com/show_bug.cgi?id=1225253
* https://bugzilla.suse.com/show_bug.cgi?id=1225254
* https://bugzilla.suse.com/show_bug.cgi?id=1225255
* https://bugzilla.suse.com/show_bug.cgi?id=1225256
* https://bugzilla.suse.com/show_bug.cgi?id=1225257
* https://bugzilla.suse.com/show_bug.cgi?id=1225258
* https://bugzilla.suse.com/show_bug.cgi?id=1225259
* https://bugzilla.suse.com/show_bug.cgi?id=1225260
* https://bugzilla.suse.com/show_bug.cgi?id=1225261
* https://bugzilla.suse.com/show_bug.cgi?id=1225262
* https://bugzilla.suse.com/show_bug.cgi?id=1225263
* https://bugzilla.suse.com/show_bug.cgi?id=1225268
* https://bugzilla.suse.com/show_bug.cgi?id=1225301
* https://bugzilla.suse.com/show_bug.cgi?id=1225303
* https://bugzilla.suse.com/show_bug.cgi?id=1225304
* https://bugzilla.suse.com/show_bug.cgi?id=1225306
* https://bugzilla.suse.com/show_bug.cgi?id=1225316
* https://bugzilla.suse.com/show_bug.cgi?id=1225318
* https://bugzilla.suse.com/show_bug.cgi?id=1225320
* https://bugzilla.suse.com/show_bug.cgi?id=1225321
* https://bugzilla.suse.com/show_bug.cgi?id=1225322
* https://bugzilla.suse.com/show_bug.cgi?id=1225323
* https://bugzilla.suse.com/show_bug.cgi?id=1225326
* https://bugzilla.suse.com/show_bug.cgi?id=1225327
* https://bugzilla.suse.com/show_bug.cgi?id=1225328
* https://bugzilla.suse.com/show_bug.cgi?id=1225329
* https://bugzilla.suse.com/show_bug.cgi?id=1225330
* https://bugzilla.suse.com/show_bug.cgi?id=1225331
* https://bugzilla.suse.com/show_bug.cgi?id=1225332
* https://bugzilla.suse.com/show_bug.cgi?id=1225333
* https://bugzilla.suse.com/show_bug.cgi?id=1225334
* https://bugzilla.suse.com/show_bug.cgi?id=1225335
* https://bugzilla.suse.com/show_bug.cgi?id=1225336
* https://bugzilla.suse.com/show_bug.cgi?id=1225337
* https://bugzilla.suse.com/show_bug.cgi?id=1225338
* https://bugzilla.suse.com/show_bug.cgi?id=1225339
* https://bugzilla.suse.com/show_bug.cgi?id=1225341
* https://bugzilla.suse.com/show_bug.cgi?id=1225342
* https://bugzilla.suse.com/show_bug.cgi?id=1225344
* https://bugzilla.suse.com/show_bug.cgi?id=1225346
* https://bugzilla.suse.com/show_bug.cgi?id=1225347
* https://bugzilla.suse.com/show_bug.cgi?id=1225351
* https://bugzilla.suse.com/show_bug.cgi?id=1225353
* https://bugzilla.suse.com/show_bug.cgi?id=1225354
* https://bugzilla.suse.com/show_bug.cgi?id=1225355
* https://bugzilla.suse.com/show_bug.cgi?id=1225357
* https://bugzilla.suse.com/show_bug.cgi?id=1225358
* https://bugzilla.suse.com/show_bug.cgi?id=1225360
* https://bugzilla.suse.com/show_bug.cgi?id=1225361
* https://bugzilla.suse.com/show_bug.cgi?id=1225366
* https://bugzilla.suse.com/show_bug.cgi?id=1225367
* https://bugzilla.suse.com/show_bug.cgi?id=1225368
* https://bugzilla.suse.com/show_bug.cgi?id=1225369
* https://bugzilla.suse.com/show_bug.cgi?id=1225370
* https://bugzilla.suse.com/show_bug.cgi?id=1225372
* https://bugzilla.suse.com/show_bug.cgi?id=1225373
* https://bugzilla.suse.com/show_bug.cgi?id=1225374
* https://bugzilla.suse.com/show_bug.cgi?id=1225375
* https://bugzilla.suse.com/show_bug.cgi?id=1225376
* https://bugzilla.suse.com/show_bug.cgi?id=1225377
* https://bugzilla.suse.com/show_bug.cgi?id=1225379
* https://bugzilla.suse.com/show_bug.cgi?id=1225380
* https://bugzilla.suse.com/show_bug.cgi?id=1225382
* https://bugzilla.suse.com/show_bug.cgi?id=1225383
* https://bugzilla.suse.com/show_bug.cgi?id=1225384
* https://bugzilla.suse.com/show_bug.cgi?id=1225386
* https://bugzilla.suse.com/show_bug.cgi?id=1225387
* https://bugzilla.suse.com/show_bug.cgi?id=1225388
* https://bugzilla.suse.com/show_bug.cgi?id=1225390
* https://bugzilla.suse.com/show_bug.cgi?id=1225392
* https://bugzilla.suse.com/show_bug.cgi?id=1225393
* https://bugzilla.suse.com/show_bug.cgi?id=1225396
* https://bugzilla.suse.com/show_bug.cgi?id=1225400
* https://bugzilla.suse.com/show_bug.cgi?id=1225404
* https://bugzilla.suse.com/show_bug.cgi?id=1225405
* https://bugzilla.suse.com/show_bug.cgi?id=1225408
* https://bugzilla.suse.com/show_bug.cgi?id=1225409
* https://bugzilla.suse.com/show_bug.cgi?id=1225410
* https://bugzilla.suse.com/show_bug.cgi?id=1225411
* https://bugzilla.suse.com/show_bug.cgi?id=1225424
* https://bugzilla.suse.com/show_bug.cgi?id=1225425
* https://bugzilla.suse.com/show_bug.cgi?id=1225427
* https://bugzilla.suse.com/show_bug.cgi?id=1225431
* https://bugzilla.suse.com/show_bug.cgi?id=1225435
* https://bugzilla.suse.com/show_bug.cgi?id=1225436
* https://bugzilla.suse.com/show_bug.cgi?id=1225437
* https://bugzilla.suse.com/show_bug.cgi?id=1225438
* https://bugzilla.suse.com/show_bug.cgi?id=1225439
* https://bugzilla.suse.com/show_bug.cgi?id=1225441
* https://bugzilla.suse.com/show_bug.cgi?id=1225442
* https://bugzilla.suse.com/show_bug.cgi?id=1225443
* https://bugzilla.suse.com/show_bug.cgi?id=1225444
* https://bugzilla.suse.com/show_bug.cgi?id=1225445
* https://bugzilla.suse.com/show_bug.cgi?id=1225446
* https://bugzilla.suse.com/show_bug.cgi?id=1225447
* https://bugzilla.suse.com/show_bug.cgi?id=1225450
* https://bugzilla.suse.com/show_bug.cgi?id=1225453
* https://bugzilla.suse.com/show_bug.cgi?id=1225455
* https://bugzilla.suse.com/show_bug.cgi?id=1225461
* https://bugzilla.suse.com/show_bug.cgi?id=1225463
* https://bugzilla.suse.com/show_bug.cgi?id=1225464
* https://bugzilla.suse.com/show_bug.cgi?id=1225466
* https://bugzilla.suse.com/show_bug.cgi?id=1225467
* https://bugzilla.suse.com/show_bug.cgi?id=1225468
* https://bugzilla.suse.com/show_bug.cgi?id=1225471
* https://bugzilla.suse.com/show_bug.cgi?id=1225472
* https://bugzilla.suse.com/show_bug.cgi?id=1225478
* https://bugzilla.suse.com/show_bug.cgi?id=1225479
* https://bugzilla.suse.com/show_bug.cgi?id=1225480
* https://bugzilla.suse.com/show_bug.cgi?id=1225482
* https://bugzilla.suse.com/show_bug.cgi?id=1225483
* https://bugzilla.suse.com/show_bug.cgi?id=1225486
* https://bugzilla.suse.com/show_bug.cgi?id=1225488
* https://bugzilla.suse.com/show_bug.cgi?id=1225490
* https://bugzilla.suse.com/show_bug.cgi?id=1225492
* https://bugzilla.suse.com/show_bug.cgi?id=1225495
* https://bugzilla.suse.com/show_bug.cgi?id=1225499
* https://bugzilla.suse.com/show_bug.cgi?id=1225500
* https://bugzilla.suse.com/show_bug.cgi?id=1225501
* https://bugzilla.suse.com/show_bug.cgi?id=1225502
* https://bugzilla.suse.com/show_bug.cgi?id=1225506
* https://bugzilla.suse.com/show_bug.cgi?id=1225508
* https://bugzilla.suse.com/show_bug.cgi?id=1225510
* https://bugzilla.suse.com/show_bug.cgi?id=1225513
* https://bugzilla.suse.com/show_bug.cgi?id=1225515
* https://bugzilla.suse.com/show_bug.cgi?id=1225529
* https://bugzilla.suse.com/show_bug.cgi?id=1225530
* https://bugzilla.suse.com/show_bug.cgi?id=1225532
* https://bugzilla.suse.com/show_bug.cgi?id=1225534
* https://bugzilla.suse.com/show_bug.cgi?id=1225535
* https://bugzilla.suse.com/show_bug.cgi?id=1225548
* https://bugzilla.suse.com/show_bug.cgi?id=1225549
* https://bugzilla.suse.com/show_bug.cgi?id=1225550
* https://bugzilla.suse.com/show_bug.cgi?id=1225553
* https://bugzilla.suse.com/show_bug.cgi?id=1225554
* https://bugzilla.suse.com/show_bug.cgi?id=1225555
* https://bugzilla.suse.com/show_bug.cgi?id=1225556
* https://bugzilla.suse.com/show_bug.cgi?id=1225557
* https://bugzilla.suse.com/show_bug.cgi?id=1225559
* https://bugzilla.suse.com/show_bug.cgi?id=1225560
* https://bugzilla.suse.com/show_bug.cgi?id=1225565
* https://bugzilla.suse.com/show_bug.cgi?id=1225566
* https://bugzilla.suse.com/show_bug.cgi?id=1225568
* https://bugzilla.suse.com/show_bug.cgi?id=1225569
* https://bugzilla.suse.com/show_bug.cgi?id=1225570
* https://bugzilla.suse.com/show_bug.cgi?id=1225571
* https://bugzilla.suse.com/show_bug.cgi?id=1225572
* https://bugzilla.suse.com/show_bug.cgi?id=1225577
* https://bugzilla.suse.com/show_bug.cgi?id=1225583
* https://bugzilla.suse.com/show_bug.cgi?id=1225584
* https://bugzilla.suse.com/show_bug.cgi?id=1225587
* https://bugzilla.suse.com/show_bug.cgi?id=1225588
* https://bugzilla.suse.com/show_bug.cgi?id=1225589
* https://bugzilla.suse.com/show_bug.cgi?id=1225590
* https://bugzilla.suse.com/show_bug.cgi?id=1225591
* https://bugzilla.suse.com/show_bug.cgi?id=1225592
* https://bugzilla.suse.com/show_bug.cgi?id=1225593
* https://bugzilla.suse.com/show_bug.cgi?id=1225595
* https://bugzilla.suse.com/show_bug.cgi?id=1225599
* https://bugzilla.suse.com/show_bug.cgi?id=1225616
* https://bugzilla.suse.com/show_bug.cgi?id=1225640
* https://bugzilla.suse.com/show_bug.cgi?id=1225642
* https://bugzilla.suse.com/show_bug.cgi?id=1225705
* https://bugzilla.suse.com/show_bug.cgi?id=1225708
* https://bugzilla.suse.com/show_bug.cgi?id=1225715
* https://bugzilla.suse.com/show_bug.cgi?id=1225720
* https://bugzilla.suse.com/show_bug.cgi?id=1225722
* https://bugzilla.suse.com/show_bug.cgi?id=1225734
* https://bugzilla.suse.com/show_bug.cgi?id=1225735
* https://bugzilla.suse.com/show_bug.cgi?id=1225747
* https://bugzilla.suse.com/show_bug.cgi?id=1225748
* https://bugzilla.suse.com/show_bug.cgi?id=1225756
* https://bugzilla.suse.com/show_bug.cgi?id=1225761
* https://bugzilla.suse.com/show_bug.cgi?id=1225766
* https://bugzilla.suse.com/show_bug.cgi?id=1225775
* https://bugzilla.suse.com/show_bug.cgi?id=1225810
* https://bugzilla.suse.com/show_bug.cgi?id=1225820
* https://bugzilla.suse.com/show_bug.cgi?id=1225829
* https://bugzilla.suse.com/show_bug.cgi?id=1225835
* https://bugzilla.suse.com/show_bug.cgi?id=1225842
* https://jira.suse.com/browse/PED-3259
* https://jira.suse.com/browse/PED-7167



SUSE-SU-2024:2180-1: important: Security update for vte


# Security update for vte

Announcement ID: SUSE-SU-2024:2180-1
Rating: important
References:

* bsc#1226134

Cross-References:

* CVE-2024-37535

CVSS scores:

* CVE-2024-37535 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP5
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves one vulnerability can now be installed.

## Description:

This update for vte fixes the following issues:

* CVE-2024-37535: Fixed a bug that allowed an attacker to cause a denial of
service (memory consumption) via a window resize escape. (bsc#1226134)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2180=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2180=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2180=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-2180=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2180=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2180=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2180=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2180=1

* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-2180=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2180=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2180=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2180=1

## Package List:

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* vte-debugsource-0.66.2-150400.3.5.1
* libvte-2_91-0-0.66.2-150400.3.5.1
* vte-devel-0.66.2-150400.3.5.1
* vte-debuginfo-0.66.2-150400.3.5.1
* typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1
* libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* vte-lang-0.66.2-150400.3.5.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* vte-debugsource-0.66.2-150400.3.5.1
* libvte-2_91-0-0.66.2-150400.3.5.1
* vte-devel-0.66.2-150400.3.5.1
* vte-debuginfo-0.66.2-150400.3.5.1
* typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1
* libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* vte-lang-0.66.2-150400.3.5.1
* SUSE Manager Proxy 4.3 (x86_64)
* vte-debugsource-0.66.2-150400.3.5.1
* libvte-2_91-0-0.66.2-150400.3.5.1
* vte-debuginfo-0.66.2-150400.3.5.1
* typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1
* libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* vte-debugsource-0.66.2-150400.3.5.1
* libvte-2_91-0-0.66.2-150400.3.5.1
* vte-debuginfo-0.66.2-150400.3.5.1
* typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1
* libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* vte-debugsource-0.66.2-150400.3.5.1
* libvte-2_91-0-0.66.2-150400.3.5.1
* vte-debuginfo-0.66.2-150400.3.5.1
* typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1
* libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* vte-debugsource-0.66.2-150400.3.5.1
* vte-tools-0.66.2-150400.3.5.1
* libvte-2_91-0-0.66.2-150400.3.5.1
* vte-devel-0.66.2-150400.3.5.1
* glade-catalog-vte-0.66.2-150400.3.5.1
* vte-debuginfo-0.66.2-150400.3.5.1
* typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1
* vte-tools-debuginfo-0.66.2-150400.3.5.1
* libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1
* openSUSE Leap 15.4 (noarch)
* vte-lang-0.66.2-150400.3.5.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* vte-debugsource-0.66.2-150400.3.5.1
* vte-tools-0.66.2-150400.3.5.1
* libvte-2_91-0-0.66.2-150400.3.5.1
* vte-devel-0.66.2-150400.3.5.1
* glade-catalog-vte-0.66.2-150400.3.5.1
* vte-debuginfo-0.66.2-150400.3.5.1
* typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1
* vte-tools-debuginfo-0.66.2-150400.3.5.1
* libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1
* openSUSE Leap 15.5 (noarch)
* vte-lang-0.66.2-150400.3.5.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* vte-debugsource-0.66.2-150400.3.5.1
* libvte-2_91-0-0.66.2-150400.3.5.1
* vte-debuginfo-0.66.2-150400.3.5.1
* typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1
* libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* vte-debugsource-0.66.2-150400.3.5.1
* vte-debuginfo-0.66.2-150400.3.5.1
* vte-devel-0.66.2-150400.3.5.1
* Desktop Applications Module 15-SP5 (noarch)
* vte-lang-0.66.2-150400.3.5.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* vte-debugsource-0.66.2-150400.3.5.1
* libvte-2_91-0-0.66.2-150400.3.5.1
* vte-devel-0.66.2-150400.3.5.1
* vte-debuginfo-0.66.2-150400.3.5.1
* typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1
* libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* vte-lang-0.66.2-150400.3.5.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* vte-debugsource-0.66.2-150400.3.5.1
* libvte-2_91-0-0.66.2-150400.3.5.1
* vte-devel-0.66.2-150400.3.5.1
* vte-debuginfo-0.66.2-150400.3.5.1
* typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1
* libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* vte-lang-0.66.2-150400.3.5.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* vte-debugsource-0.66.2-150400.3.5.1
* libvte-2_91-0-0.66.2-150400.3.5.1
* vte-devel-0.66.2-150400.3.5.1
* vte-debuginfo-0.66.2-150400.3.5.1
* typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1
* libvte-2_91-0-debuginfo-0.66.2-150400.3.5.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* vte-lang-0.66.2-150400.3.5.1

## References:

* https://www.suse.com/security/cve/CVE-2024-37535.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226134



SUSE-SU-2024:2201-1: moderate: Security update for wget


# Security update for wget

Announcement ID: SUSE-SU-2024:2201-1
Rating: moderate
References:

* bsc#1226419

Cross-References:

* CVE-2024-38428

CVSS scores:

* CVE-2024-38428 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves one vulnerability can now be installed.

## Description:

This update for wget fixes the following issues:

* CVE-2024-38428: Fix mishandled semicolons in the userinfo subcomponent of a
URI. (bsc#1226419)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2201=1 openSUSE-SLE-15.6-2024-2201=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2201=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* wget-1.20.3-150600.19.3.1
* wget-debugsource-1.20.3-150600.19.3.1
* wget-debuginfo-1.20.3-150600.19.3.1
* openSUSE Leap 15.6 (noarch)
* wget-lang-1.20.3-150600.19.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* wget-1.20.3-150600.19.3.1
* wget-debugsource-1.20.3-150600.19.3.1
* wget-debuginfo-1.20.3-150600.19.3.1

## References:

* https://www.suse.com/security/cve/CVE-2024-38428.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226419



SUSE-SU-2024:2170-1: important: Security update for gnome-settings-daemon


# Security update for gnome-settings-daemon

Announcement ID: SUSE-SU-2024:2170-1
Rating: important
References:

* bsc#1226423

Cross-References:

* CVE-2024-38394

CVSS scores:

* CVE-2024-38394 ( SUSE ): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4

An update that solves one vulnerability can now be installed.

## Description:

This update for gnome-settings-daemon fixes the following issues:

* CVE-2024-38394: Fixed mismatches in interpreting USB authorization policy
(bsc#1226423).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2170=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2170=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2170=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2170=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2170=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2170=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* gnome-settings-daemon-41.0-150400.3.3.1
* gnome-settings-daemon-debuginfo-41.0-150400.3.3.1
* gnome-settings-daemon-debugsource-41.0-150400.3.3.1
* gnome-settings-daemon-devel-41.0-150400.3.3.1
* openSUSE Leap 15.4 (noarch)
* gnome-settings-daemon-lang-41.0-150400.3.3.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* gnome-settings-daemon-41.0-150400.3.3.1
* gnome-settings-daemon-debuginfo-41.0-150400.3.3.1
* gnome-settings-daemon-debugsource-41.0-150400.3.3.1
* gnome-settings-daemon-devel-41.0-150400.3.3.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* gnome-settings-daemon-lang-41.0-150400.3.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* gnome-settings-daemon-41.0-150400.3.3.1
* gnome-settings-daemon-debuginfo-41.0-150400.3.3.1
* gnome-settings-daemon-debugsource-41.0-150400.3.3.1
* gnome-settings-daemon-devel-41.0-150400.3.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* gnome-settings-daemon-lang-41.0-150400.3.3.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* gnome-settings-daemon-41.0-150400.3.3.1
* gnome-settings-daemon-debuginfo-41.0-150400.3.3.1
* gnome-settings-daemon-debugsource-41.0-150400.3.3.1
* gnome-settings-daemon-devel-41.0-150400.3.3.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* gnome-settings-daemon-lang-41.0-150400.3.3.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* gnome-settings-daemon-41.0-150400.3.3.1
* gnome-settings-daemon-debuginfo-41.0-150400.3.3.1
* gnome-settings-daemon-debugsource-41.0-150400.3.3.1
* gnome-settings-daemon-devel-41.0-150400.3.3.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* gnome-settings-daemon-lang-41.0-150400.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* gnome-settings-daemon-41.0-150400.3.3.1
* gnome-settings-daemon-debuginfo-41.0-150400.3.3.1
* gnome-settings-daemon-debugsource-41.0-150400.3.3.1
* gnome-settings-daemon-devel-41.0-150400.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* gnome-settings-daemon-lang-41.0-150400.3.3.1

## References:

* https://www.suse.com/security/cve/CVE-2024-38394.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226423



SUSE-SU-2024:2171-1: important: Security update for libarchive


# Security update for libarchive

Announcement ID: SUSE-SU-2024:2171-1
Rating: important
References:

* bsc#1225971

Cross-References:

* CVE-2024-20696

CVSS scores:

* CVE-2024-20696 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Affected Products:

* Basesystem Module 15-SP5
* Development Tools Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves one vulnerability can now be installed.

## Description:

This update for libarchive fixes the following issues:

* CVE-2024-20696: Fixed heap based out-of-bounds write (bsc#1225971).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2171=1

* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2171=1

* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2171=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2171=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2171=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2171=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2171=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2171=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-2171=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2171=1

* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-2171=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2171=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2171=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2171=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2171=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2171=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2171=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-2171=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2171=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* bsdtar-debuginfo-3.5.1-150400.3.15.1
* libarchive-devel-3.5.1-150400.3.15.1
* bsdtar-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* openSUSE Leap 15.4 (x86_64)
* libarchive13-32bit-3.5.1-150400.3.15.1
* libarchive13-32bit-debuginfo-3.5.1-150400.3.15.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libarchive13-64bit-3.5.1-150400.3.15.1
* libarchive13-64bit-debuginfo-3.5.1-150400.3.15.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* bsdtar-debuginfo-3.5.1-150400.3.15.1
* libarchive-devel-3.5.1-150400.3.15.1
* bsdtar-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* openSUSE Leap 15.5 (x86_64)
* libarchive13-32bit-3.5.1-150400.3.15.1
* libarchive13-32bit-debuginfo-3.5.1-150400.3.15.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libarchive-devel-3.5.1-150400.3.15.1
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* bsdtar-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* bsdtar-debuginfo-3.5.1-150400.3.15.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* bsdtar-debuginfo-3.5.1-150400.3.15.1
* libarchive-devel-3.5.1-150400.3.15.1
* bsdtar-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* bsdtar-debuginfo-3.5.1-150400.3.15.1
* libarchive-devel-3.5.1-150400.3.15.1
* bsdtar-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* bsdtar-debuginfo-3.5.1-150400.3.15.1
* libarchive-devel-3.5.1-150400.3.15.1
* bsdtar-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* bsdtar-debuginfo-3.5.1-150400.3.15.1
* libarchive-devel-3.5.1-150400.3.15.1
* bsdtar-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* bsdtar-debuginfo-3.5.1-150400.3.15.1
* libarchive-devel-3.5.1-150400.3.15.1
* bsdtar-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* SUSE Manager Proxy 4.3 (x86_64)
* libarchive-devel-3.5.1-150400.3.15.1
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libarchive-devel-3.5.1-150400.3.15.1
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libarchive-devel-3.5.1-150400.3.15.1
* libarchive13-debuginfo-3.5.1-150400.3.15.1
* libarchive-debugsource-3.5.1-150400.3.15.1
* libarchive13-3.5.1-150400.3.15.1

## References:

* https://www.suse.com/security/cve/CVE-2024-20696.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225971



SUSE-SU-2024:2189-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:2189-1
Rating: important
References:

* bsc#1065729
* bsc#1174585
* bsc#1190569
* bsc#1191949
* bsc#1192107
* bsc#1193983
* bsc#1194288
* bsc#1194869
* bsc#1196869
* bsc#1196956
* bsc#1197915
* bsc#1200313
* bsc#1201308
* bsc#1201489
* bsc#1208149
* bsc#1209657
* bsc#1209799
* bsc#1209834
* bsc#1210335
* bsc#1211592
* bsc#1213863
* bsc#1216702
* bsc#1217169
* bsc#1217515
* bsc#1218447
* bsc#1218917
* bsc#1220492
* bsc#1220783
* bsc#1221044
* bsc#1221645
* bsc#1221958
* bsc#1222011
* bsc#1222559
* bsc#1222619
* bsc#1222721
* bsc#1222976
* bsc#1223057
* bsc#1223084
* bsc#1223111
* bsc#1223138
* bsc#1223191
* bsc#1223384
* bsc#1223390
* bsc#1223481
* bsc#1223501
* bsc#1223505
* bsc#1223512
* bsc#1223520
* bsc#1223532
* bsc#1223626
* bsc#1223715
* bsc#1223894
* bsc#1223921
* bsc#1223922
* bsc#1223923
* bsc#1223924
* bsc#1223929
* bsc#1223931
* bsc#1223932
* bsc#1223934
* bsc#1223941
* bsc#1223948
* bsc#1223952
* bsc#1223953
* bsc#1223957
* bsc#1223962
* bsc#1223963
* bsc#1223964
* bsc#1223996
* bsc#1224085
* bsc#1224099
* bsc#1224137
* bsc#1224174
* bsc#1224438
* bsc#1224482
* bsc#1224488
* bsc#1224494
* bsc#1224511
* bsc#1224592
* bsc#1224611
* bsc#1224664
* bsc#1224678
* bsc#1224682
* bsc#1224685
* bsc#1224730
* bsc#1224736
* bsc#1224763
* bsc#1224816
* bsc#1224895
* bsc#1224898
* bsc#1224900
* bsc#1224901
* bsc#1224902
* bsc#1224903
* bsc#1224904
* bsc#1224905
* bsc#1224907
* bsc#1224909
* bsc#1224910
* bsc#1224911
* bsc#1224912
* bsc#1224913
* bsc#1224914
* bsc#1224915
* bsc#1224920
* bsc#1224928
* bsc#1224931
* bsc#1224932
* bsc#1224937
* bsc#1224942
* bsc#1224944
* bsc#1224945
* bsc#1224947
* bsc#1224956
* bsc#1224988
* bsc#1225000
* bsc#1225003
* bsc#1225005
* bsc#1225009
* bsc#1225022
* bsc#1225031
* bsc#1225032
* bsc#1225036
* bsc#1225044
* bsc#1225076
* bsc#1225077
* bsc#1225082
* bsc#1225086
* bsc#1225092
* bsc#1225095
* bsc#1225096
* bsc#1225106
* bsc#1225108
* bsc#1225109
* bsc#1225118
* bsc#1225121
* bsc#1225122
* bsc#1225123
* bsc#1225125
* bsc#1225126
* bsc#1225127
* bsc#1225129
* bsc#1225131
* bsc#1225132
* bsc#1225145
* bsc#1225151
* bsc#1225153
* bsc#1225156
* bsc#1225158
* bsc#1225160
* bsc#1225161
* bsc#1225164
* bsc#1225167
* bsc#1225180
* bsc#1225183
* bsc#1225184
* bsc#1225186
* bsc#1225187
* bsc#1225189
* bsc#1225190
* bsc#1225191
* bsc#1225192
* bsc#1225193
* bsc#1225195
* bsc#1225198
* bsc#1225201
* bsc#1225203
* bsc#1225205
* bsc#1225206
* bsc#1225207
* bsc#1225208
* bsc#1225209
* bsc#1225210
* bsc#1225214
* bsc#1225223
* bsc#1225224
* bsc#1225225
* bsc#1225227
* bsc#1225228
* bsc#1225229
* bsc#1225230
* bsc#1225232
* bsc#1225233
* bsc#1225235
* bsc#1225236
* bsc#1225237
* bsc#1225238
* bsc#1225239
* bsc#1225240
* bsc#1225241
* bsc#1225242
* bsc#1225243
* bsc#1225244
* bsc#1225245
* bsc#1225246
* bsc#1225247
* bsc#1225248
* bsc#1225249
* bsc#1225250
* bsc#1225251
* bsc#1225252
* bsc#1225253
* bsc#1225254
* bsc#1225255
* bsc#1225256
* bsc#1225257
* bsc#1225258
* bsc#1225259
* bsc#1225260
* bsc#1225261
* bsc#1225262
* bsc#1225263
* bsc#1225268
* bsc#1225301
* bsc#1225303
* bsc#1225304
* bsc#1225306
* bsc#1225316
* bsc#1225318
* bsc#1225320
* bsc#1225321
* bsc#1225322
* bsc#1225323
* bsc#1225326
* bsc#1225327
* bsc#1225328
* bsc#1225329
* bsc#1225330
* bsc#1225331
* bsc#1225332
* bsc#1225333
* bsc#1225334
* bsc#1225335
* bsc#1225336
* bsc#1225337
* bsc#1225338
* bsc#1225339
* bsc#1225341
* bsc#1225342
* bsc#1225344
* bsc#1225346
* bsc#1225347
* bsc#1225351
* bsc#1225353
* bsc#1225354
* bsc#1225355
* bsc#1225357
* bsc#1225358
* bsc#1225360
* bsc#1225361
* bsc#1225366
* bsc#1225367
* bsc#1225368
* bsc#1225369
* bsc#1225370
* bsc#1225372
* bsc#1225373
* bsc#1225374
* bsc#1225375
* bsc#1225376
* bsc#1225377
* bsc#1225379
* bsc#1225380
* bsc#1225383
* bsc#1225384
* bsc#1225386
* bsc#1225387
* bsc#1225388
* bsc#1225390
* bsc#1225392
* bsc#1225393
* bsc#1225396
* bsc#1225400
* bsc#1225404
* bsc#1225405
* bsc#1225409
* bsc#1225410
* bsc#1225411
* bsc#1225425
* bsc#1225427
* bsc#1225431
* bsc#1225435
* bsc#1225436
* bsc#1225437
* bsc#1225438
* bsc#1225439
* bsc#1225441
* bsc#1225445
* bsc#1225446
* bsc#1225447
* bsc#1225450
* bsc#1225453
* bsc#1225455
* bsc#1225461
* bsc#1225463
* bsc#1225464
* bsc#1225466
* bsc#1225471
* bsc#1225472
* bsc#1225478
* bsc#1225479
* bsc#1225482
* bsc#1225483
* bsc#1225486
* bsc#1225488
* bsc#1225490
* bsc#1225492
* bsc#1225495
* bsc#1225499
* bsc#1225500
* bsc#1225501
* bsc#1225508
* bsc#1225510
* bsc#1225529
* bsc#1225530
* bsc#1225532
* bsc#1225534
* bsc#1225549
* bsc#1225550
* bsc#1225553
* bsc#1225554
* bsc#1225557
* bsc#1225559
* bsc#1225560
* bsc#1225565
* bsc#1225566
* bsc#1225569
* bsc#1225570
* bsc#1225571
* bsc#1225572
* bsc#1225577
* bsc#1225583
* bsc#1225584
* bsc#1225588
* bsc#1225589
* bsc#1225590
* bsc#1225591
* bsc#1225592
* bsc#1225595
* bsc#1225599
* jsc#PED-8111

Cross-References:

* CVE-2020-36788
* CVE-2021-39698
* CVE-2021-4148
* CVE-2021-43056
* CVE-2021-47358
* CVE-2021-47359
* CVE-2021-47360
* CVE-2021-47361
* CVE-2021-47362
* CVE-2021-47363
* CVE-2021-47364
* CVE-2021-47365
* CVE-2021-47366
* CVE-2021-47367
* CVE-2021-47368
* CVE-2021-47369
* CVE-2021-47370
* CVE-2021-47371
* CVE-2021-47372
* CVE-2021-47373
* CVE-2021-47374
* CVE-2021-47375
* CVE-2021-47376
* CVE-2021-47378
* CVE-2021-47379
* CVE-2021-47380
* CVE-2021-47381
* CVE-2021-47382
* CVE-2021-47383
* CVE-2021-47384
* CVE-2021-47385
* CVE-2021-47386
* CVE-2021-47387
* CVE-2021-47388
* CVE-2021-47389
* CVE-2021-47390
* CVE-2021-47391
* CVE-2021-47392
* CVE-2021-47393
* CVE-2021-47394
* CVE-2021-47395
* CVE-2021-47396
* CVE-2021-47397
* CVE-2021-47398
* CVE-2021-47399
* CVE-2021-47400
* CVE-2021-47401
* CVE-2021-47402
* CVE-2021-47403
* CVE-2021-47404
* CVE-2021-47405
* CVE-2021-47406
* CVE-2021-47407
* CVE-2021-47408
* CVE-2021-47409
* CVE-2021-47410
* CVE-2021-47412
* CVE-2021-47413
* CVE-2021-47414
* CVE-2021-47415
* CVE-2021-47416
* CVE-2021-47417
* CVE-2021-47418
* CVE-2021-47419
* CVE-2021-47420
* CVE-2021-47421
* CVE-2021-47422
* CVE-2021-47423
* CVE-2021-47424
* CVE-2021-47425
* CVE-2021-47426
* CVE-2021-47427
* CVE-2021-47428
* CVE-2021-47429
* CVE-2021-47430
* CVE-2021-47431
* CVE-2021-47433
* CVE-2021-47434
* CVE-2021-47435
* CVE-2021-47436
* CVE-2021-47437
* CVE-2021-47438
* CVE-2021-47439
* CVE-2021-47440
* CVE-2021-47441
* CVE-2021-47442
* CVE-2021-47443
* CVE-2021-47444
* CVE-2021-47445
* CVE-2021-47446
* CVE-2021-47447
* CVE-2021-47448
* CVE-2021-47449
* CVE-2021-47450
* CVE-2021-47451
* CVE-2021-47452
* CVE-2021-47453
* CVE-2021-47454
* CVE-2021-47455
* CVE-2021-47456
* CVE-2021-47457
* CVE-2021-47458
* CVE-2021-47459
* CVE-2021-47460
* CVE-2021-47461
* CVE-2021-47462
* CVE-2021-47463
* CVE-2021-47464
* CVE-2021-47465
* CVE-2021-47466
* CVE-2021-47467
* CVE-2021-47468
* CVE-2021-47469
* CVE-2021-47470
* CVE-2021-47471
* CVE-2021-47472
* CVE-2021-47473
* CVE-2021-47474
* CVE-2021-47475
* CVE-2021-47476
* CVE-2021-47477
* CVE-2021-47478
* CVE-2021-47479
* CVE-2021-47480
* CVE-2021-47481
* CVE-2021-47482
* CVE-2021-47483
* CVE-2021-47484
* CVE-2021-47485
* CVE-2021-47486
* CVE-2021-47488
* CVE-2021-47489
* CVE-2021-47490
* CVE-2021-47491
* CVE-2021-47492
* CVE-2021-47493
* CVE-2021-47494
* CVE-2021-47495
* CVE-2021-47496
* CVE-2021-47497
* CVE-2021-47498
* CVE-2021-47499
* CVE-2021-47500
* CVE-2021-47501
* CVE-2021-47502
* CVE-2021-47503
* CVE-2021-47505
* CVE-2021-47506
* CVE-2021-47507
* CVE-2021-47509
* CVE-2021-47510
* CVE-2021-47511
* CVE-2021-47513
* CVE-2021-47514
* CVE-2021-47516
* CVE-2021-47518
* CVE-2021-47520
* CVE-2021-47521
* CVE-2021-47522
* CVE-2021-47523
* CVE-2021-47524
* CVE-2021-47525
* CVE-2021-47526
* CVE-2021-47527
* CVE-2021-47528
* CVE-2021-47529
* CVE-2021-47533
* CVE-2021-47534
* CVE-2021-47535
* CVE-2021-47536
* CVE-2021-47537
* CVE-2021-47540
* CVE-2021-47541
* CVE-2021-47542
* CVE-2021-47544
* CVE-2021-47549
* CVE-2021-47550
* CVE-2021-47551
* CVE-2021-47553
* CVE-2021-47554
* CVE-2021-47556
* CVE-2021-47558
* CVE-2021-47559
* CVE-2021-47560
* CVE-2021-47562
* CVE-2021-47563
* CVE-2021-47564
* CVE-2021-47565
* CVE-2022-48632
* CVE-2022-48634
* CVE-2022-48636
* CVE-2022-48652
* CVE-2022-48662
* CVE-2022-48671
* CVE-2022-48672
* CVE-2022-48673
* CVE-2022-48675
* CVE-2022-48686
* CVE-2022-48687
* CVE-2022-48688
* CVE-2022-48692
* CVE-2022-48693
* CVE-2022-48694
* CVE-2022-48695
* CVE-2022-48697
* CVE-2022-48699
* CVE-2022-48700
* CVE-2022-48701
* CVE-2022-48702
* CVE-2022-48703
* CVE-2022-48704
* CVE-2022-48708
* CVE-2022-48709
* CVE-2022-48710
* CVE-2023-0160
* CVE-2023-1829
* CVE-2023-2860
* CVE-2023-47233
* CVE-2023-52591
* CVE-2023-52654
* CVE-2023-52655
* CVE-2023-52676
* CVE-2023-52686
* CVE-2023-52690
* CVE-2023-52702
* CVE-2023-52703
* CVE-2023-52707
* CVE-2023-52708
* CVE-2023-52730
* CVE-2023-52733
* CVE-2023-52736
* CVE-2023-52738
* CVE-2023-52739
* CVE-2023-52740
* CVE-2023-52741
* CVE-2023-52742
* CVE-2023-52743
* CVE-2023-52744
* CVE-2023-52745
* CVE-2023-52747
* CVE-2023-52753
* CVE-2023-52754
* CVE-2023-52756
* CVE-2023-52759
* CVE-2023-52763
* CVE-2023-52764
* CVE-2023-52766
* CVE-2023-52774
* CVE-2023-52781
* CVE-2023-52788
* CVE-2023-52789
* CVE-2023-52791
* CVE-2023-52798
* CVE-2023-52799
* CVE-2023-52800
* CVE-2023-52804
* CVE-2023-52805
* CVE-2023-52806
* CVE-2023-52810
* CVE-2023-52811
* CVE-2023-52814
* CVE-2023-52816
* CVE-2023-52817
* CVE-2023-52818
* CVE-2023-52819
* CVE-2023-52821
* CVE-2023-52825
* CVE-2023-52826
* CVE-2023-52832
* CVE-2023-52833
* CVE-2023-52834
* CVE-2023-52838
* CVE-2023-52840
* CVE-2023-52841
* CVE-2023-52844
* CVE-2023-52847
* CVE-2023-52853
* CVE-2023-52854
* CVE-2023-52855
* CVE-2023-52856
* CVE-2023-52858
* CVE-2023-52864
* CVE-2023-52865
* CVE-2023-52867
* CVE-2023-52868
* CVE-2023-52870
* CVE-2023-52871
* CVE-2023-52872
* CVE-2023-52873
* CVE-2023-52875
* CVE-2023-52876
* CVE-2023-52877
* CVE-2023-52878
* CVE-2023-52880
* CVE-2023-6531
* CVE-2024-0639
* CVE-2024-26739
* CVE-2024-26764
* CVE-2024-26828
* CVE-2024-26840
* CVE-2024-26852
* CVE-2024-26862
* CVE-2024-26921
* CVE-2024-26925
* CVE-2024-26928
* CVE-2024-26929
* CVE-2024-26930
* CVE-2024-27398
* CVE-2024-27413
* CVE-2024-35811
* CVE-2024-35815
* CVE-2024-35817
* CVE-2024-35863
* CVE-2024-35867
* CVE-2024-35868
* CVE-2024-35895
* CVE-2024-35904
* CVE-2024-35905
* CVE-2024-35914
* CVE-2024-36926

CVSS scores:

* CVE-2020-36788 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-39698 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-39698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-4148 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-4148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-43056 ( SUSE ): 6.8 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2021-43056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47358 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47359 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47361 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-47362 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47363 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47364 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47365 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47366 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2021-47367 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47368 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-47369 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47370 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47371 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47372 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47373 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47374 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47375 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47379 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47380 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47382 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47387 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47388 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47389 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2021-47390 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47392 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47394 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47398 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47401 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47404 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47405 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47407 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47408 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47413 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47414 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47415 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47418 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47420 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47421 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47423 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47426 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47427 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47428 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47429 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47430 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2021-47434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47439 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47440 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47447 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47448 ( SUSE ): 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2021-47449 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47450 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47452 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47453 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47454 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47455 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47461 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47462 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47465 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47466 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47467 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2021-47468 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47469 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47470 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47471 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47472 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47473 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47474 ( SUSE ): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47475 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47476 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47477 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2021-47478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47479 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47480 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47481 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47482 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47488 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47489 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47490 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47491 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47492 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47496 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47497 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47499 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47502 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2021-47503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47505 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47506 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47510 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47513 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47513 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47514 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47516 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47518 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47518 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47520 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47520 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47521 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47521 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47522 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47523 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47524 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47525 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47525 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47526 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47526 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47528 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47528 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47529 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47529 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47533 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47534 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47535 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2021-47536 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2021-47537 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47537 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47540 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47540 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47541 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47544 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2021-47549 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47550 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47550 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47553 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47554 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47556 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47559 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47565 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48672 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-48672 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48675 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48686 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48686 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48687 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48692 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48693 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48694 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48697 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2022-48699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48700 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48701 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48702 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48708 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48709 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-2860 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-2860 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52702 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52703 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-52707 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52730 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52738 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52739 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52743 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52744 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52745 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52747 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52756 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-52759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52781 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52798 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52804 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52805 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52818 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52819 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52825 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52834 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52838 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52840 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52847 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52853 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52856 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52865 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52867 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52868 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52870 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52871 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-52872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52875 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52876 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-0639 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26840 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Availability Extension 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves 320 vulnerabilities, contains one feature and has 20
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

* CVE-2024-35905: Fixed int overflow for stack access size (bsc#1224488).
* CVE-2024-26828: Fix underflow in parse_server_interfaces() (bsc#1223084).
* CVE-2024-35863: Fix potential UAF in is_valid_oplock_break() (bsc#1224763).
* CVE-2024-35867: Fix potential UAF in cifs_stats_proc_show() (bsc#1224664).
* CVE-2024-35868: Fix potential UAF in cifs_stats_proc_write() (bsc#1224678).
* CVE-2024-26928: Fix potential UAF in cifs_debug_files_proc_show()
(bsc#1223532).
* CVE-2024-36926: Fixed LPAR panics during boot up with a frozen PE
(bsc#1222011).
* CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path
(bsc#1223390).
* CVE-2024-27413: Fix incorrect allocation size (bsc#1224438).
* CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1224736).
* CVE-2024-35904: Avoid dereference of garbage after mount failure
(bsc#1224494).
* CVE-2024-26929: Fixed double free of fcport (bsc#1223715).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1224174).
* CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223626).
* CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache() (bsc#1222976).
* CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing
(bsc#1223111).
* CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock
found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
* CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
* CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify()
(bsc#1223057).
* CVE-2023-1829: Fixed a use-after-free vulnerability in the control index
filter (tcindex) (bsc#1210335).

The following non-security bugs were fixed:

* af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
* af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
* af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress
(bsc#1223384).
* filemap: remove use of wait bookmarks (bsc#1224085).
* idpf: extend tx watchdog timeout (bsc#1224137).
* ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958)
* powerpc/kasan: Do not instrument non-maskable or raw interrupts
(bsc#1223191).
* powerpc/powernv: Add a null pointer check in opal_event_init()
(bsc#1065729).
* powerpc/powernv: Add a null pointer check to scom_debug_init_one()
(bsc#1194869).
* powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV
(bsc#1220492 ltc#205270).
* powerpc/pseries/vio: Do not return ENODEV if node or compatible missing
(bsc#1220783).
* powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645
ltc#205739 bsc#1223191).
* powerpc: Refactor verification of MSR_RI (bsc#1223191).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2189=1

* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2189=1

* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2189=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2189=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2189=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2189=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2189=1

* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-2189=1
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.

* SUSE Linux Enterprise High Availability Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-2189=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2189=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2189=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2189=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2189=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2189=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2189=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-2189=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2189=1

## Package List:

* openSUSE Leap 15.4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-docs-html-5.14.21-150400.24.122.2
* kernel-source-vanilla-5.14.21-150400.24.122.1
* kernel-source-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* openSUSE Leap 15.4 (nosrc ppc64le x86_64)
* kernel-debug-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (ppc64le x86_64)
* kernel-debug-livepatch-devel-5.14.21-150400.24.122.2
* kernel-debug-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-debug-debugsource-5.14.21-150400.24.122.2
* kernel-debug-devel-5.14.21-150400.24.122.2
* kernel-debug-debuginfo-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.122.2
* kernel-kvmsmall-debuginfo-5.14.21-150400.24.122.2
* kernel-kvmsmall-devel-5.14.21-150400.24.122.2
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-default-base-rebuild-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-kvmsmall-debugsource-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* reiserfs-kmp-default-5.14.21-150400.24.122.2
* kernel-obs-build-5.14.21-150400.24.122.2
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.122.2
* dlm-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kselftests-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-syms-5.14.21-150400.24.122.1
* dlm-kmp-default-5.14.21-150400.24.122.2
* kernel-default-optional-5.14.21-150400.24.122.2
* kernel-obs-qa-5.14.21-150400.24.122.1
* cluster-md-kmp-default-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-optional-debuginfo-5.14.21-150400.24.122.2
* kernel-default-devel-5.14.21-150400.24.122.2
* gfs2-kmp-default-5.14.21-150400.24.122.2
* kernel-default-livepatch-devel-5.14.21-150400.24.122.2
* kselftests-kmp-default-5.14.21-150400.24.122.2
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-extra-5.14.21-150400.24.122.2
* kernel-obs-build-debugsource-5.14.21-150400.24.122.2
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.122.2
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-livepatch-5.14.21-150400.24.122.2
* kernel-default-extra-debuginfo-5.14.21-150400.24.122.2
* ocfs2-kmp-default-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_122-default-1-150400.9.3.2
* kernel-livepatch-5_14_21-150400_24_122-default-debuginfo-1-150400.9.3.2
* kernel-livepatch-SLE15-SP4_Update_27-debugsource-1-150400.9.3.2
* openSUSE Leap 15.4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.122.2
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.122.2
* openSUSE Leap 15.4 (nosrc)
* dtb-aarch64-5.14.21-150400.24.122.1
* openSUSE Leap 15.4 (aarch64)
* dtb-socionext-5.14.21-150400.24.122.1
* dtb-allwinner-5.14.21-150400.24.122.1
* kernel-64kb-devel-5.14.21-150400.24.122.2
* gfs2-kmp-64kb-5.14.21-150400.24.122.2
* cluster-md-kmp-64kb-5.14.21-150400.24.122.2
* dtb-rockchip-5.14.21-150400.24.122.1
* dtb-hisilicon-5.14.21-150400.24.122.1
* dtb-qcom-5.14.21-150400.24.122.1
* dtb-apple-5.14.21-150400.24.122.1
* dtb-sprd-5.14.21-150400.24.122.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.122.2
* kselftests-kmp-64kb-5.14.21-150400.24.122.2
* dtb-nvidia-5.14.21-150400.24.122.1
* kernel-64kb-optional-debuginfo-5.14.21-150400.24.122.2
* reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.122.2
* dtb-exynos-5.14.21-150400.24.122.1
* kernel-64kb-livepatch-devel-5.14.21-150400.24.122.2
* dtb-amazon-5.14.21-150400.24.122.1
* kernel-64kb-extra-5.14.21-150400.24.122.2
* kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-optional-5.14.21-150400.24.122.2
* ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-debuginfo-5.14.21-150400.24.122.2
* dtb-broadcom-5.14.21-150400.24.122.1
* dtb-freescale-5.14.21-150400.24.122.1
* dtb-cavium-5.14.21-150400.24.122.1
* dtb-altera-5.14.21-150400.24.122.1
* dtb-xilinx-5.14.21-150400.24.122.1
* dtb-amd-5.14.21-150400.24.122.1
* dlm-kmp-64kb-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-extra-debuginfo-5.14.21-150400.24.122.2
* gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.122.2
* reiserfs-kmp-64kb-5.14.21-150400.24.122.2
* cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.122.2
* dtb-mediatek-5.14.21-150400.24.122.1
* dtb-amlogic-5.14.21-150400.24.122.1
* dtb-apm-5.14.21-150400.24.122.1
* dlm-kmp-64kb-5.14.21-150400.24.122.2
* dtb-arm-5.14.21-150400.24.122.1
* ocfs2-kmp-64kb-5.14.21-150400.24.122.2
* dtb-lg-5.14.21-150400.24.122.1
* dtb-renesas-5.14.21-150400.24.122.1
* kernel-64kb-debugsource-5.14.21-150400.24.122.2
* dtb-marvell-5.14.21-150400.24.122.1
* openSUSE Leap 15.4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.122.2
* openSUSE Leap Micro 5.3 (aarch64 nosrc x86_64)
* kernel-default-5.14.21-150400.24.122.2
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* openSUSE Leap Micro 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.122.2
* openSUSE Leap Micro 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Live Patching 15-SP4 (nosrc)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_122-default-1-150400.9.3.2
* kernel-livepatch-5_14_21-150400_24_122-default-debuginfo-1-150400.9.3.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-livepatch-devel-5.14.21-150400.24.122.2
* kernel-default-livepatch-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-livepatch-SLE15-SP4_Update_27-debugsource-1-150400.9.3.2
* SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le
s390x x86_64)
* dlm-kmp-default-5.14.21-150400.24.122.2
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* dlm-kmp-default-debuginfo-5.14.21-150400.24.122.2
* cluster-md-kmp-default-5.14.21-150400.24.122.2
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* gfs2-kmp-default-5.14.21-150400.24.122.2
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.122.2
* ocfs2-kmp-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
nosrc)
* kernel-64kb-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* kernel-64kb-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-debugsource-5.14.21-150400.24.122.2
* kernel-64kb-devel-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* reiserfs-kmp-default-5.14.21-150400.24.122.2
* kernel-obs-build-5.14.21-150400.24.122.2
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-syms-5.14.21-150400.24.122.1
* kernel-default-devel-5.14.21-150400.24.122.2
* kernel-obs-build-debugsource-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-source-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* kernel-64kb-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-debugsource-5.14.21-150400.24.122.2
* kernel-64kb-devel-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* reiserfs-kmp-default-5.14.21-150400.24.122.2
* kernel-obs-build-5.14.21-150400.24.122.2
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-syms-5.14.21-150400.24.122.1
* kernel-default-devel-5.14.21-150400.24.122.2
* kernel-obs-build-debugsource-5.14.21-150400.24.122.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-source-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* kernel-obs-build-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-default-extra-5.14.21-150400.24.122.2
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-syms-5.14.21-150400.24.122.1
* kernel-default-devel-5.14.21-150400.24.122.2
* kernel-obs-build-debugsource-5.14.21-150400.24.122.2
* kernel-default-extra-debuginfo-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-source-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64)
* kernel-64kb-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-64kb-debugsource-5.14.21-150400.24.122.2
* kernel-64kb-devel-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64 nosrc)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* reiserfs-kmp-default-5.14.21-150400.24.122.2
* kernel-obs-build-5.14.21-150400.24.122.2
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-syms-5.14.21-150400.24.122.1
* kernel-default-devel-5.14.21-150400.24.122.2
* kernel-obs-build-debugsource-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-source-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.122.2
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le
x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* reiserfs-kmp-default-5.14.21-150400.24.122.2
* kernel-obs-build-5.14.21-150400.24.122.2
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-syms-5.14.21-150400.24.122.1
* kernel-default-devel-5.14.21-150400.24.122.2
* kernel-obs-build-debugsource-5.14.21-150400.24.122.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-source-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.122.2
* SUSE Manager Proxy 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Manager Proxy 4.3 (x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-syms-5.14.21-150400.24.122.1
* kernel-default-devel-5.14.21-150400.24.122.2
* SUSE Manager Proxy 4.3 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-source-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* SUSE Manager Retail Branch Server 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* kernel-default-devel-5.14.21-150400.24.122.2
* SUSE Manager Retail Branch Server 4.3 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64)
* kernel-default-5.14.21-150400.24.122.2
* SUSE Manager Server 4.3 (ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.122.2
* kernel-default-debugsource-5.14.21-150400.24.122.2
* kernel-default-devel-debuginfo-5.14.21-150400.24.122.2
* kernel-syms-5.14.21-150400.24.122.1
* kernel-default-devel-5.14.21-150400.24.122.2
* SUSE Manager Server 4.3 (noarch)
* kernel-devel-5.14.21-150400.24.122.1
* kernel-source-5.14.21-150400.24.122.1
* kernel-macros-5.14.21-150400.24.122.1
* SUSE Manager Server 4.3 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.122.2
* SUSE Manager Server 4.3 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.122.2
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.122.2

## References:

* https://www.suse.com/security/cve/CVE-2020-36788.html
* https://www.suse.com/security/cve/CVE-2021-39698.html
* https://www.suse.com/security/cve/CVE-2021-4148.html
* https://www.suse.com/security/cve/CVE-2021-43056.html
* https://www.suse.com/security/cve/CVE-2021-47358.html
* https://www.suse.com/security/cve/CVE-2021-47359.html
* https://www.suse.com/security/cve/CVE-2021-47360.html
* https://www.suse.com/security/cve/CVE-2021-47361.html
* https://www.suse.com/security/cve/CVE-2021-47362.html
* https://www.suse.com/security/cve/CVE-2021-47363.html
* https://www.suse.com/security/cve/CVE-2021-47364.html
* https://www.suse.com/security/cve/CVE-2021-47365.html
* https://www.suse.com/security/cve/CVE-2021-47366.html
* https://www.suse.com/security/cve/CVE-2021-47367.html
* https://www.suse.com/security/cve/CVE-2021-47368.html
* https://www.suse.com/security/cve/CVE-2021-47369.html
* https://www.suse.com/security/cve/CVE-2021-47370.html
* https://www.suse.com/security/cve/CVE-2021-47371.html
* https://www.suse.com/security/cve/CVE-2021-47372.html
* https://www.suse.com/security/cve/CVE-2021-47373.html
* https://www.suse.com/security/cve/CVE-2021-47374.html
* https://www.suse.com/security/cve/CVE-2021-47375.html
* https://www.suse.com/security/cve/CVE-2021-47376.html
* https://www.suse.com/security/cve/CVE-2021-47378.html
* https://www.suse.com/security/cve/CVE-2021-47379.html
* https://www.suse.com/security/cve/CVE-2021-47380.html
* https://www.suse.com/security/cve/CVE-2021-47381.html
* https://www.suse.com/security/cve/CVE-2021-47382.html
* https://www.suse.com/security/cve/CVE-2021-47383.html
* https://www.suse.com/security/cve/CVE-2021-47384.html
* https://www.suse.com/security/cve/CVE-2021-47385.html
* https://www.suse.com/security/cve/CVE-2021-47386.html
* https://www.suse.com/security/cve/CVE-2021-47387.html
* https://www.suse.com/security/cve/CVE-2021-47388.html
* https://www.suse.com/security/cve/CVE-2021-47389.html
* https://www.suse.com/security/cve/CVE-2021-47390.html
* https://www.suse.com/security/cve/CVE-2021-47391.html
* https://www.suse.com/security/cve/CVE-2021-47392.html
* https://www.suse.com/security/cve/CVE-2021-47393.html
* https://www.suse.com/security/cve/CVE-2021-47394.html
* https://www.suse.com/security/cve/CVE-2021-47395.html
* https://www.suse.com/security/cve/CVE-2021-47396.html
* https://www.suse.com/security/cve/CVE-2021-47397.html
* https://www.suse.com/security/cve/CVE-2021-47398.html
* https://www.suse.com/security/cve/CVE-2021-47399.html
* https://www.suse.com/security/cve/CVE-2021-47400.html
* https://www.suse.com/security/cve/CVE-2021-47401.html
* https://www.suse.com/security/cve/CVE-2021-47402.html
* https://www.suse.com/security/cve/CVE-2021-47403.html
* https://www.suse.com/security/cve/CVE-2021-47404.html
* https://www.suse.com/security/cve/CVE-2021-47405.html
* https://www.suse.com/security/cve/CVE-2021-47406.html
* https://www.suse.com/security/cve/CVE-2021-47407.html
* https://www.suse.com/security/cve/CVE-2021-47408.html
* https://www.suse.com/security/cve/CVE-2021-47409.html
* https://www.suse.com/security/cve/CVE-2021-47410.html
* https://www.suse.com/security/cve/CVE-2021-47412.html
* https://www.suse.com/security/cve/CVE-2021-47413.html
* https://www.suse.com/security/cve/CVE-2021-47414.html
* https://www.suse.com/security/cve/CVE-2021-47415.html
* https://www.suse.com/security/cve/CVE-2021-47416.html
* https://www.suse.com/security/cve/CVE-2021-47417.html
* https://www.suse.com/security/cve/CVE-2021-47418.html
* https://www.suse.com/security/cve/CVE-2021-47419.html
* https://www.suse.com/security/cve/CVE-2021-47420.html
* https://www.suse.com/security/cve/CVE-2021-47421.html
* https://www.suse.com/security/cve/CVE-2021-47422.html
* https://www.suse.com/security/cve/CVE-2021-47423.html
* https://www.suse.com/security/cve/CVE-2021-47424.html
* https://www.suse.com/security/cve/CVE-2021-47425.html
* https://www.suse.com/security/cve/CVE-2021-47426.html
* https://www.suse.com/security/cve/CVE-2021-47427.html
* https://www.suse.com/security/cve/CVE-2021-47428.html
* https://www.suse.com/security/cve/CVE-2021-47429.html
* https://www.suse.com/security/cve/CVE-2021-47430.html
* https://www.suse.com/security/cve/CVE-2021-47431.html
* https://www.suse.com/security/cve/CVE-2021-47433.html
* https://www.suse.com/security/cve/CVE-2021-47434.html
* https://www.suse.com/security/cve/CVE-2021-47435.html
* https://www.suse.com/security/cve/CVE-2021-47436.html
* https://www.suse.com/security/cve/CVE-2021-47437.html
* https://www.suse.com/security/cve/CVE-2021-47438.html
* https://www.suse.com/security/cve/CVE-2021-47439.html
* https://www.suse.com/security/cve/CVE-2021-47440.html
* https://www.suse.com/security/cve/CVE-2021-47441.html
* https://www.suse.com/security/cve/CVE-2021-47442.html
* https://www.suse.com/security/cve/CVE-2021-47443.html
* https://www.suse.com/security/cve/CVE-2021-47444.html
* https://www.suse.com/security/cve/CVE-2021-47445.html
* https://www.suse.com/security/cve/CVE-2021-47446.html
* https://www.suse.com/security/cve/CVE-2021-47447.html
* https://www.suse.com/security/cve/CVE-2021-47448.html
* https://www.suse.com/security/cve/CVE-2021-47449.html
* https://www.suse.com/security/cve/CVE-2021-47450.html
* https://www.suse.com/security/cve/CVE-2021-47451.html
* https://www.suse.com/security/cve/CVE-2021-47452.html
* https://www.suse.com/security/cve/CVE-2021-47453.html
* https://www.suse.com/security/cve/CVE-2021-47454.html
* https://www.suse.com/security/cve/CVE-2021-47455.html
* https://www.suse.com/security/cve/CVE-2021-47456.html
* https://www.suse.com/security/cve/CVE-2021-47457.html
* https://www.suse.com/security/cve/CVE-2021-47458.html
* https://www.suse.com/security/cve/CVE-2021-47459.html
* https://www.suse.com/security/cve/CVE-2021-47460.html
* https://www.suse.com/security/cve/CVE-2021-47461.html
* https://www.suse.com/security/cve/CVE-2021-47462.html
* https://www.suse.com/security/cve/CVE-2021-47463.html
* https://www.suse.com/security/cve/CVE-2021-47464.html
* https://www.suse.com/security/cve/CVE-2021-47465.html
* https://www.suse.com/security/cve/CVE-2021-47466.html
* https://www.suse.com/security/cve/CVE-2021-47467.html
* https://www.suse.com/security/cve/CVE-2021-47468.html
* https://www.suse.com/security/cve/CVE-2021-47469.html
* https://www.suse.com/security/cve/CVE-2021-47470.html
* https://www.suse.com/security/cve/CVE-2021-47471.html
* https://www.suse.com/security/cve/CVE-2021-47472.html
* https://www.suse.com/security/cve/CVE-2021-47473.html
* https://www.suse.com/security/cve/CVE-2021-47474.html
* https://www.suse.com/security/cve/CVE-2021-47475.html
* https://www.suse.com/security/cve/CVE-2021-47476.html
* https://www.suse.com/security/cve/CVE-2021-47477.html
* https://www.suse.com/security/cve/CVE-2021-47478.html
* https://www.suse.com/security/cve/CVE-2021-47479.html
* https://www.suse.com/security/cve/CVE-2021-47480.html
* https://www.suse.com/security/cve/CVE-2021-47481.html
* https://www.suse.com/security/cve/CVE-2021-47482.html
* https://www.suse.com/security/cve/CVE-2021-47483.html
* https://www.suse.com/security/cve/CVE-2021-47484.html
* https://www.suse.com/security/cve/CVE-2021-47485.html
* https://www.suse.com/security/cve/CVE-2021-47486.html
* https://www.suse.com/security/cve/CVE-2021-47488.html
* https://www.suse.com/security/cve/CVE-2021-47489.html
* https://www.suse.com/security/cve/CVE-2021-47490.html
* https://www.suse.com/security/cve/CVE-2021-47491.html
* https://www.suse.com/security/cve/CVE-2021-47492.html
* https://www.suse.com/security/cve/CVE-2021-47493.html
* https://www.suse.com/security/cve/CVE-2021-47494.html
* https://www.suse.com/security/cve/CVE-2021-47495.html
* https://www.suse.com/security/cve/CVE-2021-47496.html
* https://www.suse.com/security/cve/CVE-2021-47497.html
* https://www.suse.com/security/cve/CVE-2021-47498.html
* https://www.suse.com/security/cve/CVE-2021-47499.html
* https://www.suse.com/security/cve/CVE-2021-47500.html
* https://www.suse.com/security/cve/CVE-2021-47501.html
* https://www.suse.com/security/cve/CVE-2021-47502.html
* https://www.suse.com/security/cve/CVE-2021-47503.html
* https://www.suse.com/security/cve/CVE-2021-47505.html
* https://www.suse.com/security/cve/CVE-2021-47506.html
* https://www.suse.com/security/cve/CVE-2021-47507.html
* https://www.suse.com/security/cve/CVE-2021-47509.html
* https://www.suse.com/security/cve/CVE-2021-47510.html
* https://www.suse.com/security/cve/CVE-2021-47511.html
* https://www.suse.com/security/cve/CVE-2021-47513.html
* https://www.suse.com/security/cve/CVE-2021-47514.html
* https://www.suse.com/security/cve/CVE-2021-47516.html
* https://www.suse.com/security/cve/CVE-2021-47518.html
* https://www.suse.com/security/cve/CVE-2021-47520.html
* https://www.suse.com/security/cve/CVE-2021-47521.html
* https://www.suse.com/security/cve/CVE-2021-47522.html
* https://www.suse.com/security/cve/CVE-2021-47523.html
* https://www.suse.com/security/cve/CVE-2021-47524.html
* https://www.suse.com/security/cve/CVE-2021-47525.html
* https://www.suse.com/security/cve/CVE-2021-47526.html
* https://www.suse.com/security/cve/CVE-2021-47527.html
* https://www.suse.com/security/cve/CVE-2021-47528.html
* https://www.suse.com/security/cve/CVE-2021-47529.html
* https://www.suse.com/security/cve/CVE-2021-47533.html
* https://www.suse.com/security/cve/CVE-2021-47534.html
* https://www.suse.com/security/cve/CVE-2021-47535.html
* https://www.suse.com/security/cve/CVE-2021-47536.html
* https://www.suse.com/security/cve/CVE-2021-47537.html
* https://www.suse.com/security/cve/CVE-2021-47540.html
* https://www.suse.com/security/cve/CVE-2021-47541.html
* https://www.suse.com/security/cve/CVE-2021-47542.html
* https://www.suse.com/security/cve/CVE-2021-47544.html
* https://www.suse.com/security/cve/CVE-2021-47549.html
* https://www.suse.com/security/cve/CVE-2021-47550.html
* https://www.suse.com/security/cve/CVE-2021-47551.html
* https://www.suse.com/security/cve/CVE-2021-47553.html
* https://www.suse.com/security/cve/CVE-2021-47554.html
* https://www.suse.com/security/cve/CVE-2021-47556.html
* https://www.suse.com/security/cve/CVE-2021-47558.html
* https://www.suse.com/security/cve/CVE-2021-47559.html
* https://www.suse.com/security/cve/CVE-2021-47560.html
* https://www.suse.com/security/cve/CVE-2021-47562.html
* https://www.suse.com/security/cve/CVE-2021-47563.html
* https://www.suse.com/security/cve/CVE-2021-47564.html
* https://www.suse.com/security/cve/CVE-2021-47565.html
* https://www.suse.com/security/cve/CVE-2022-48632.html
* https://www.suse.com/security/cve/CVE-2022-48634.html
* https://www.suse.com/security/cve/CVE-2022-48636.html
* https://www.suse.com/security/cve/CVE-2022-48652.html
* https://www.suse.com/security/cve/CVE-2022-48662.html
* https://www.suse.com/security/cve/CVE-2022-48671.html
* https://www.suse.com/security/cve/CVE-2022-48672.html
* https://www.suse.com/security/cve/CVE-2022-48673.html
* https://www.suse.com/security/cve/CVE-2022-48675.html
* https://www.suse.com/security/cve/CVE-2022-48686.html
* https://www.suse.com/security/cve/CVE-2022-48687.html
* https://www.suse.com/security/cve/CVE-2022-48688.html
* https://www.suse.com/security/cve/CVE-2022-48692.html
* https://www.suse.com/security/cve/CVE-2022-48693.html
* https://www.suse.com/security/cve/CVE-2022-48694.html
* https://www.suse.com/security/cve/CVE-2022-48695.html
* https://www.suse.com/security/cve/CVE-2022-48697.html
* https://www.suse.com/security/cve/CVE-2022-48699.html
* https://www.suse.com/security/cve/CVE-2022-48700.html
* https://www.suse.com/security/cve/CVE-2022-48701.html
* https://www.suse.com/security/cve/CVE-2022-48702.html
* https://www.suse.com/security/cve/CVE-2022-48703.html
* https://www.suse.com/security/cve/CVE-2022-48704.html
* https://www.suse.com/security/cve/CVE-2022-48708.html
* https://www.suse.com/security/cve/CVE-2022-48709.html
* https://www.suse.com/security/cve/CVE-2022-48710.html
* https://www.suse.com/security/cve/CVE-2023-0160.html
* https://www.suse.com/security/cve/CVE-2023-1829.html
* https://www.suse.com/security/cve/CVE-2023-2860.html
* https://www.suse.com/security/cve/CVE-2023-47233.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52654.html
* https://www.suse.com/security/cve/CVE-2023-52655.html
* https://www.suse.com/security/cve/CVE-2023-52676.html
* https://www.suse.com/security/cve/CVE-2023-52686.html
* https://www.suse.com/security/cve/CVE-2023-52690.html
* https://www.suse.com/security/cve/CVE-2023-52702.html
* https://www.suse.com/security/cve/CVE-2023-52703.html
* https://www.suse.com/security/cve/CVE-2023-52707.html
* https://www.suse.com/security/cve/CVE-2023-52708.html
* https://www.suse.com/security/cve/CVE-2023-52730.html
* https://www.suse.com/security/cve/CVE-2023-52733.html
* https://www.suse.com/security/cve/CVE-2023-52736.html
* https://www.suse.com/security/cve/CVE-2023-52738.html
* https://www.suse.com/security/cve/CVE-2023-52739.html
* https://www.suse.com/security/cve/CVE-2023-52740.html
* https://www.suse.com/security/cve/CVE-2023-52741.html
* https://www.suse.com/security/cve/CVE-2023-52742.html
* https://www.suse.com/security/cve/CVE-2023-52743.html
* https://www.suse.com/security/cve/CVE-2023-52744.html
* https://www.suse.com/security/cve/CVE-2023-52745.html
* https://www.suse.com/security/cve/CVE-2023-52747.html
* https://www.suse.com/security/cve/CVE-2023-52753.html
* https://www.suse.com/security/cve/CVE-2023-52754.html
* https://www.suse.com/security/cve/CVE-2023-52756.html
* https://www.suse.com/security/cve/CVE-2023-52759.html
* https://www.suse.com/security/cve/CVE-2023-52763.html
* https://www.suse.com/security/cve/CVE-2023-52764.html
* https://www.suse.com/security/cve/CVE-2023-52766.html
* https://www.suse.com/security/cve/CVE-2023-52774.html
* https://www.suse.com/security/cve/CVE-2023-52781.html
* https://www.suse.com/security/cve/CVE-2023-52788.html
* https://www.suse.com/security/cve/CVE-2023-52789.html
* https://www.suse.com/security/cve/CVE-2023-52791.html
* https://www.suse.com/security/cve/CVE-2023-52798.html
* https://www.suse.com/security/cve/CVE-2023-52799.html
* https://www.suse.com/security/cve/CVE-2023-52800.html
* https://www.suse.com/security/cve/CVE-2023-52804.html
* https://www.suse.com/security/cve/CVE-2023-52805.html
* https://www.suse.com/security/cve/CVE-2023-52806.html
* https://www.suse.com/security/cve/CVE-2023-52810.html
* https://www.suse.com/security/cve/CVE-2023-52811.html
* https://www.suse.com/security/cve/CVE-2023-52814.html
* https://www.suse.com/security/cve/CVE-2023-52816.html
* https://www.suse.com/security/cve/CVE-2023-52817.html
* https://www.suse.com/security/cve/CVE-2023-52818.html
* https://www.suse.com/security/cve/CVE-2023-52819.html
* https://www.suse.com/security/cve/CVE-2023-52821.html
* https://www.suse.com/security/cve/CVE-2023-52825.html
* https://www.suse.com/security/cve/CVE-2023-52826.html
* https://www.suse.com/security/cve/CVE-2023-52832.html
* https://www.suse.com/security/cve/CVE-2023-52833.html
* https://www.suse.com/security/cve/CVE-2023-52834.html
* https://www.suse.com/security/cve/CVE-2023-52838.html
* https://www.suse.com/security/cve/CVE-2023-52840.html
* https://www.suse.com/security/cve/CVE-2023-52841.html
* https://www.suse.com/security/cve/CVE-2023-52844.html
* https://www.suse.com/security/cve/CVE-2023-52847.html
* https://www.suse.com/security/cve/CVE-2023-52853.html
* https://www.suse.com/security/cve/CVE-2023-52854.html
* https://www.suse.com/security/cve/CVE-2023-52855.html
* https://www.suse.com/security/cve/CVE-2023-52856.html
* https://www.suse.com/security/cve/CVE-2023-52858.html
* https://www.suse.com/security/cve/CVE-2023-52864.html
* https://www.suse.com/security/cve/CVE-2023-52865.html
* https://www.suse.com/security/cve/CVE-2023-52867.html
* https://www.suse.com/security/cve/CVE-2023-52868.html
* https://www.suse.com/security/cve/CVE-2023-52870.html
* https://www.suse.com/security/cve/CVE-2023-52871.html
* https://www.suse.com/security/cve/CVE-2023-52872.html
* https://www.suse.com/security/cve/CVE-2023-52873.html
* https://www.suse.com/security/cve/CVE-2023-52875.html
* https://www.suse.com/security/cve/CVE-2023-52876.html
* https://www.suse.com/security/cve/CVE-2023-52877.html
* https://www.suse.com/security/cve/CVE-2023-52878.html
* https://www.suse.com/security/cve/CVE-2023-52880.html
* https://www.suse.com/security/cve/CVE-2023-6531.html
* https://www.suse.com/security/cve/CVE-2024-0639.html
* https://www.suse.com/security/cve/CVE-2024-26739.html
* https://www.suse.com/security/cve/CVE-2024-26764.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26840.html
* https://www.suse.com/security/cve/CVE-2024-26852.html
* https://www.suse.com/security/cve/CVE-2024-26862.html
* https://www.suse.com/security/cve/CVE-2024-26921.html
* https://www.suse.com/security/cve/CVE-2024-26925.html
* https://www.suse.com/security/cve/CVE-2024-26928.html
* https://www.suse.com/security/cve/CVE-2024-26929.html
* https://www.suse.com/security/cve/CVE-2024-26930.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-27413.html
* https://www.suse.com/security/cve/CVE-2024-35811.html
* https://www.suse.com/security/cve/CVE-2024-35815.html
* https://www.suse.com/security/cve/CVE-2024-35817.html
* https://www.suse.com/security/cve/CVE-2024-35863.html
* https://www.suse.com/security/cve/CVE-2024-35867.html
* https://www.suse.com/security/cve/CVE-2024-35868.html
* https://www.suse.com/security/cve/CVE-2024-35895.html
* https://www.suse.com/security/cve/CVE-2024-35904.html
* https://www.suse.com/security/cve/CVE-2024-35905.html
* https://www.suse.com/security/cve/CVE-2024-35914.html
* https://www.suse.com/security/cve/CVE-2024-36926.html
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1174585
* https://bugzilla.suse.com/show_bug.cgi?id=1190569
* https://bugzilla.suse.com/show_bug.cgi?id=1191949
* https://bugzilla.suse.com/show_bug.cgi?id=1192107
* https://bugzilla.suse.com/show_bug.cgi?id=1193983
* https://bugzilla.suse.com/show_bug.cgi?id=1194288
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1196869
* https://bugzilla.suse.com/show_bug.cgi?id=1196956
* https://bugzilla.suse.com/show_bug.cgi?id=1197915
* https://bugzilla.suse.com/show_bug.cgi?id=1200313
* https://bugzilla.suse.com/show_bug.cgi?id=1201308
* https://bugzilla.suse.com/show_bug.cgi?id=1201489
* https://bugzilla.suse.com/show_bug.cgi?id=1208149
* https://bugzilla.suse.com/show_bug.cgi?id=1209657
* https://bugzilla.suse.com/show_bug.cgi?id=1209799
* https://bugzilla.suse.com/show_bug.cgi?id=1209834
* https://bugzilla.suse.com/show_bug.cgi?id=1210335
* https://bugzilla.suse.com/show_bug.cgi?id=1211592
* https://bugzilla.suse.com/show_bug.cgi?id=1213863
* https://bugzilla.suse.com/show_bug.cgi?id=1216702
* https://bugzilla.suse.com/show_bug.cgi?id=1217169
* https://bugzilla.suse.com/show_bug.cgi?id=1217515
* https://bugzilla.suse.com/show_bug.cgi?id=1218447
* https://bugzilla.suse.com/show_bug.cgi?id=1218917
* https://bugzilla.suse.com/show_bug.cgi?id=1220492
* https://bugzilla.suse.com/show_bug.cgi?id=1220783
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221645
* https://bugzilla.suse.com/show_bug.cgi?id=1221958
* https://bugzilla.suse.com/show_bug.cgi?id=1222011
* https://bugzilla.suse.com/show_bug.cgi?id=1222559
* https://bugzilla.suse.com/show_bug.cgi?id=1222619
* https://bugzilla.suse.com/show_bug.cgi?id=1222721
* https://bugzilla.suse.com/show_bug.cgi?id=1222976
* https://bugzilla.suse.com/show_bug.cgi?id=1223057
* https://bugzilla.suse.com/show_bug.cgi?id=1223084
* https://bugzilla.suse.com/show_bug.cgi?id=1223111
* https://bugzilla.suse.com/show_bug.cgi?id=1223138
* https://bugzilla.suse.com/show_bug.cgi?id=1223191
* https://bugzilla.suse.com/show_bug.cgi?id=1223384
* https://bugzilla.suse.com/show_bug.cgi?id=1223390
* https://bugzilla.suse.com/show_bug.cgi?id=1223481
* https://bugzilla.suse.com/show_bug.cgi?id=1223501
* https://bugzilla.suse.com/show_bug.cgi?id=1223505
* https://bugzilla.suse.com/show_bug.cgi?id=1223512
* https://bugzilla.suse.com/show_bug.cgi?id=1223520
* https://bugzilla.suse.com/show_bug.cgi?id=1223532
* https://bugzilla.suse.com/show_bug.cgi?id=1223626
* https://bugzilla.suse.com/show_bug.cgi?id=1223715
* https://bugzilla.suse.com/show_bug.cgi?id=1223894
* https://bugzilla.suse.com/show_bug.cgi?id=1223921
* https://bugzilla.suse.com/show_bug.cgi?id=1223922
* https://bugzilla.suse.com/show_bug.cgi?id=1223923
* https://bugzilla.suse.com/show_bug.cgi?id=1223924
* https://bugzilla.suse.com/show_bug.cgi?id=1223929
* https://bugzilla.suse.com/show_bug.cgi?id=1223931
* https://bugzilla.suse.com/show_bug.cgi?id=1223932
* https://bugzilla.suse.com/show_bug.cgi?id=1223934
* https://bugzilla.suse.com/show_bug.cgi?id=1223941
* https://bugzilla.suse.com/show_bug.cgi?id=1223948
* https://bugzilla.suse.com/show_bug.cgi?id=1223952
* https://bugzilla.suse.com/show_bug.cgi?id=1223953
* https://bugzilla.suse.com/show_bug.cgi?id=1223957
* https://bugzilla.suse.com/show_bug.cgi?id=1223962
* https://bugzilla.suse.com/show_bug.cgi?id=1223963
* https://bugzilla.suse.com/show_bug.cgi?id=1223964
* https://bugzilla.suse.com/show_bug.cgi?id=1223996
* https://bugzilla.suse.com/show_bug.cgi?id=1224085
* https://bugzilla.suse.com/show_bug.cgi?id=1224099
* https://bugzilla.suse.com/show_bug.cgi?id=1224137
* https://bugzilla.suse.com/show_bug.cgi?id=1224174
* https://bugzilla.suse.com/show_bug.cgi?id=1224438
* https://bugzilla.suse.com/show_bug.cgi?id=1224482
* https://bugzilla.suse.com/show_bug.cgi?id=1224488
* https://bugzilla.suse.com/show_bug.cgi?id=1224494
* https://bugzilla.suse.com/show_bug.cgi?id=1224511
* https://bugzilla.suse.com/show_bug.cgi?id=1224592
* https://bugzilla.suse.com/show_bug.cgi?id=1224611
* https://bugzilla.suse.com/show_bug.cgi?id=1224664
* https://bugzilla.suse.com/show_bug.cgi?id=1224678
* https://bugzilla.suse.com/show_bug.cgi?id=1224682
* https://bugzilla.suse.com/show_bug.cgi?id=1224685
* https://bugzilla.suse.com/show_bug.cgi?id=1224730
* https://bugzilla.suse.com/show_bug.cgi?id=1224736
* https://bugzilla.suse.com/show_bug.cgi?id=1224763
* https://bugzilla.suse.com/show_bug.cgi?id=1224816
* https://bugzilla.suse.com/show_bug.cgi?id=1224895
* https://bugzilla.suse.com/show_bug.cgi?id=1224898
* https://bugzilla.suse.com/show_bug.cgi?id=1224900
* https://bugzilla.suse.com/show_bug.cgi?id=1224901
* https://bugzilla.suse.com/show_bug.cgi?id=1224902
* https://bugzilla.suse.com/show_bug.cgi?id=1224903
* https://bugzilla.suse.com/show_bug.cgi?id=1224904
* https://bugzilla.suse.com/show_bug.cgi?id=1224905
* https://bugzilla.suse.com/show_bug.cgi?id=1224907
* https://bugzilla.suse.com/show_bug.cgi?id=1224909
* https://bugzilla.suse.com/show_bug.cgi?id=1224910
* https://bugzilla.suse.com/show_bug.cgi?id=1224911
* https://bugzilla.suse.com/show_bug.cgi?id=1224912
* https://bugzilla.suse.com/show_bug.cgi?id=1224913
* https://bugzilla.suse.com/show_bug.cgi?id=1224914
* https://bugzilla.suse.com/show_bug.cgi?id=1224915
* https://bugzilla.suse.com/show_bug.cgi?id=1224920
* https://bugzilla.suse.com/show_bug.cgi?id=1224928
* https://bugzilla.suse.com/show_bug.cgi?id=1224931
* https://bugzilla.suse.com/show_bug.cgi?id=1224932
* https://bugzilla.suse.com/show_bug.cgi?id=1224937
* https://bugzilla.suse.com/show_bug.cgi?id=1224942
* https://bugzilla.suse.com/show_bug.cgi?id=1224944
* https://bugzilla.suse.com/show_bug.cgi?id=1224945
* https://bugzilla.suse.com/show_bug.cgi?id=1224947
* https://bugzilla.suse.com/show_bug.cgi?id=1224956
* https://bugzilla.suse.com/show_bug.cgi?id=1224988
* https://bugzilla.suse.com/show_bug.cgi?id=1225000
* https://bugzilla.suse.com/show_bug.cgi?id=1225003
* https://bugzilla.suse.com/show_bug.cgi?id=1225005
* https://bugzilla.suse.com/show_bug.cgi?id=1225009
* https://bugzilla.suse.com/show_bug.cgi?id=1225022
* https://bugzilla.suse.com/show_bug.cgi?id=1225031
* https://bugzilla.suse.com/show_bug.cgi?id=1225032
* https://bugzilla.suse.com/show_bug.cgi?id=1225036
* https://bugzilla.suse.com/show_bug.cgi?id=1225044
* https://bugzilla.suse.com/show_bug.cgi?id=1225076
* https://bugzilla.suse.com/show_bug.cgi?id=1225077
* https://bugzilla.suse.com/show_bug.cgi?id=1225082
* https://bugzilla.suse.com/show_bug.cgi?id=1225086
* https://bugzilla.suse.com/show_bug.cgi?id=1225092
* https://bugzilla.suse.com/show_bug.cgi?id=1225095
* https://bugzilla.suse.com/show_bug.cgi?id=1225096
* https://bugzilla.suse.com/show_bug.cgi?id=1225106
* https://bugzilla.suse.com/show_bug.cgi?id=1225108
* https://bugzilla.suse.com/show_bug.cgi?id=1225109
* https://bugzilla.suse.com/show_bug.cgi?id=1225118
* https://bugzilla.suse.com/show_bug.cgi?id=1225121
* https://bugzilla.suse.com/show_bug.cgi?id=1225122
* https://bugzilla.suse.com/show_bug.cgi?id=1225123
* https://bugzilla.suse.com/show_bug.cgi?id=1225125
* https://bugzilla.suse.com/show_bug.cgi?id=1225126
* https://bugzilla.suse.com/show_bug.cgi?id=1225127
* https://bugzilla.suse.com/show_bug.cgi?id=1225129
* https://bugzilla.suse.com/show_bug.cgi?id=1225131
* https://bugzilla.suse.com/show_bug.cgi?id=1225132
* https://bugzilla.suse.com/show_bug.cgi?id=1225145
* https://bugzilla.suse.com/show_bug.cgi?id=1225151
* https://bugzilla.suse.com/show_bug.cgi?id=1225153
* https://bugzilla.suse.com/show_bug.cgi?id=1225156
* https://bugzilla.suse.com/show_bug.cgi?id=1225158
* https://bugzilla.suse.com/show_bug.cgi?id=1225160
* https://bugzilla.suse.com/show_bug.cgi?id=1225161
* https://bugzilla.suse.com/show_bug.cgi?id=1225164
* https://bugzilla.suse.com/show_bug.cgi?id=1225167
* https://bugzilla.suse.com/show_bug.cgi?id=1225180
* https://bugzilla.suse.com/show_bug.cgi?id=1225183
* https://bugzilla.suse.com/show_bug.cgi?id=1225184
* https://bugzilla.suse.com/show_bug.cgi?id=1225186
* https://bugzilla.suse.com/show_bug.cgi?id=1225187
* https://bugzilla.suse.com/show_bug.cgi?id=1225189
* https://bugzilla.suse.com/show_bug.cgi?id=1225190
* https://bugzilla.suse.com/show_bug.cgi?id=1225191
* https://bugzilla.suse.com/show_bug.cgi?id=1225192
* https://bugzilla.suse.com/show_bug.cgi?id=1225193
* https://bugzilla.suse.com/show_bug.cgi?id=1225195
* https://bugzilla.suse.com/show_bug.cgi?id=1225198
* https://bugzilla.suse.com/show_bug.cgi?id=1225201
* https://bugzilla.suse.com/show_bug.cgi?id=1225203
* https://bugzilla.suse.com/show_bug.cgi?id=1225205
* https://bugzilla.suse.com/show_bug.cgi?id=1225206
* https://bugzilla.suse.com/show_bug.cgi?id=1225207
* https://bugzilla.suse.com/show_bug.cgi?id=1225208
* https://bugzilla.suse.com/show_bug.cgi?id=1225209
* https://bugzilla.suse.com/show_bug.cgi?id=1225210
* https://bugzilla.suse.com/show_bug.cgi?id=1225214
* https://bugzilla.suse.com/show_bug.cgi?id=1225223
* https://bugzilla.suse.com/show_bug.cgi?id=1225224
* https://bugzilla.suse.com/show_bug.cgi?id=1225225
* https://bugzilla.suse.com/show_bug.cgi?id=1225227
* https://bugzilla.suse.com/show_bug.cgi?id=1225228
* https://bugzilla.suse.com/show_bug.cgi?id=1225229
* https://bugzilla.suse.com/show_bug.cgi?id=1225230
* https://bugzilla.suse.com/show_bug.cgi?id=1225232
* https://bugzilla.suse.com/show_bug.cgi?id=1225233
* https://bugzilla.suse.com/show_bug.cgi?id=1225235
* https://bugzilla.suse.com/show_bug.cgi?id=1225236
* https://bugzilla.suse.com/show_bug.cgi?id=1225237
* https://bugzilla.suse.com/show_bug.cgi?id=1225238
* https://bugzilla.suse.com/show_bug.cgi?id=1225239
* https://bugzilla.suse.com/show_bug.cgi?id=1225240
* https://bugzilla.suse.com/show_bug.cgi?id=1225241
* https://bugzilla.suse.com/show_bug.cgi?id=1225242
* https://bugzilla.suse.com/show_bug.cgi?id=1225243
* https://bugzilla.suse.com/show_bug.cgi?id=1225244
* https://bugzilla.suse.com/show_bug.cgi?id=1225245
* https://bugzilla.suse.com/show_bug.cgi?id=1225246
* https://bugzilla.suse.com/show_bug.cgi?id=1225247
* https://bugzilla.suse.com/show_bug.cgi?id=1225248
* https://bugzilla.suse.com/show_bug.cgi?id=1225249
* https://bugzilla.suse.com/show_bug.cgi?id=1225250
* https://bugzilla.suse.com/show_bug.cgi?id=1225251
* https://bugzilla.suse.com/show_bug.cgi?id=1225252
* https://bugzilla.suse.com/show_bug.cgi?id=1225253
* https://bugzilla.suse.com/show_bug.cgi?id=1225254
* https://bugzilla.suse.com/show_bug.cgi?id=1225255
* https://bugzilla.suse.com/show_bug.cgi?id=1225256
* https://bugzilla.suse.com/show_bug.cgi?id=1225257
* https://bugzilla.suse.com/show_bug.cgi?id=1225258
* https://bugzilla.suse.com/show_bug.cgi?id=1225259
* https://bugzilla.suse.com/show_bug.cgi?id=1225260
* https://bugzilla.suse.com/show_bug.cgi?id=1225261
* https://bugzilla.suse.com/show_bug.cgi?id=1225262
* https://bugzilla.suse.com/show_bug.cgi?id=1225263
* https://bugzilla.suse.com/show_bug.cgi?id=1225268
* https://bugzilla.suse.com/show_bug.cgi?id=1225301
* https://bugzilla.suse.com/show_bug.cgi?id=1225303
* https://bugzilla.suse.com/show_bug.cgi?id=1225304
* https://bugzilla.suse.com/show_bug.cgi?id=1225306
* https://bugzilla.suse.com/show_bug.cgi?id=1225316
* https://bugzilla.suse.com/show_bug.cgi?id=1225318
* https://bugzilla.suse.com/show_bug.cgi?id=1225320
* https://bugzilla.suse.com/show_bug.cgi?id=1225321
* https://bugzilla.suse.com/show_bug.cgi?id=1225322
* https://bugzilla.suse.com/show_bug.cgi?id=1225323
* https://bugzilla.suse.com/show_bug.cgi?id=1225326
* https://bugzilla.suse.com/show_bug.cgi?id=1225327
* https://bugzilla.suse.com/show_bug.cgi?id=1225328
* https://bugzilla.suse.com/show_bug.cgi?id=1225329
* https://bugzilla.suse.com/show_bug.cgi?id=1225330
* https://bugzilla.suse.com/show_bug.cgi?id=1225331
* https://bugzilla.suse.com/show_bug.cgi?id=1225332
* https://bugzilla.suse.com/show_bug.cgi?id=1225333
* https://bugzilla.suse.com/show_bug.cgi?id=1225334
* https://bugzilla.suse.com/show_bug.cgi?id=1225335
* https://bugzilla.suse.com/show_bug.cgi?id=1225336
* https://bugzilla.suse.com/show_bug.cgi?id=1225337
* https://bugzilla.suse.com/show_bug.cgi?id=1225338
* https://bugzilla.suse.com/show_bug.cgi?id=1225339
* https://bugzilla.suse.com/show_bug.cgi?id=1225341
* https://bugzilla.suse.com/show_bug.cgi?id=1225342
* https://bugzilla.suse.com/show_bug.cgi?id=1225344
* https://bugzilla.suse.com/show_bug.cgi?id=1225346
* https://bugzilla.suse.com/show_bug.cgi?id=1225347
* https://bugzilla.suse.com/show_bug.cgi?id=1225351
* https://bugzilla.suse.com/show_bug.cgi?id=1225353
* https://bugzilla.suse.com/show_bug.cgi?id=1225354
* https://bugzilla.suse.com/show_bug.cgi?id=1225355
* https://bugzilla.suse.com/show_bug.cgi?id=1225357
* https://bugzilla.suse.com/show_bug.cgi?id=1225358
* https://bugzilla.suse.com/show_bug.cgi?id=1225360
* https://bugzilla.suse.com/show_bug.cgi?id=1225361
* https://bugzilla.suse.com/show_bug.cgi?id=1225366
* https://bugzilla.suse.com/show_bug.cgi?id=1225367
* https://bugzilla.suse.com/show_bug.cgi?id=1225368
* https://bugzilla.suse.com/show_bug.cgi?id=1225369
* https://bugzilla.suse.com/show_bug.cgi?id=1225370
* https://bugzilla.suse.com/show_bug.cgi?id=1225372
* https://bugzilla.suse.com/show_bug.cgi?id=1225373
* https://bugzilla.suse.com/show_bug.cgi?id=1225374
* https://bugzilla.suse.com/show_bug.cgi?id=1225375
* https://bugzilla.suse.com/show_bug.cgi?id=1225376
* https://bugzilla.suse.com/show_bug.cgi?id=1225377
* https://bugzilla.suse.com/show_bug.cgi?id=1225379
* https://bugzilla.suse.com/show_bug.cgi?id=1225380
* https://bugzilla.suse.com/show_bug.cgi?id=1225383
* https://bugzilla.suse.com/show_bug.cgi?id=1225384
* https://bugzilla.suse.com/show_bug.cgi?id=1225386
* https://bugzilla.suse.com/show_bug.cgi?id=1225387
* https://bugzilla.suse.com/show_bug.cgi?id=1225388
* https://bugzilla.suse.com/show_bug.cgi?id=1225390
* https://bugzilla.suse.com/show_bug.cgi?id=1225392
* https://bugzilla.suse.com/show_bug.cgi?id=1225393
* https://bugzilla.suse.com/show_bug.cgi?id=1225396
* https://bugzilla.suse.com/show_bug.cgi?id=1225400
* https://bugzilla.suse.com/show_bug.cgi?id=1225404
* https://bugzilla.suse.com/show_bug.cgi?id=1225405
* https://bugzilla.suse.com/show_bug.cgi?id=1225409
* https://bugzilla.suse.com/show_bug.cgi?id=1225410
* https://bugzilla.suse.com/show_bug.cgi?id=1225411
* https://bugzilla.suse.com/show_bug.cgi?id=1225425
* https://bugzilla.suse.com/show_bug.cgi?id=1225427
* https://bugzilla.suse.com/show_bug.cgi?id=1225431
* https://bugzilla.suse.com/show_bug.cgi?id=1225435
* https://bugzilla.suse.com/show_bug.cgi?id=1225436
* https://bugzilla.suse.com/show_bug.cgi?id=1225437
* https://bugzilla.suse.com/show_bug.cgi?id=1225438
* https://bugzilla.suse.com/show_bug.cgi?id=1225439
* https://bugzilla.suse.com/show_bug.cgi?id=1225441
* https://bugzilla.suse.com/show_bug.cgi?id=1225445
* https://bugzilla.suse.com/show_bug.cgi?id=1225446
* https://bugzilla.suse.com/show_bug.cgi?id=1225447
* https://bugzilla.suse.com/show_bug.cgi?id=1225450
* https://bugzilla.suse.com/show_bug.cgi?id=1225453
* https://bugzilla.suse.com/show_bug.cgi?id=1225455
* https://bugzilla.suse.com/show_bug.cgi?id=1225461
* https://bugzilla.suse.com/show_bug.cgi?id=1225463
* https://bugzilla.suse.com/show_bug.cgi?id=1225464
* https://bugzilla.suse.com/show_bug.cgi?id=1225466
* https://bugzilla.suse.com/show_bug.cgi?id=1225471
* https://bugzilla.suse.com/show_bug.cgi?id=1225472
* https://bugzilla.suse.com/show_bug.cgi?id=1225478
* https://bugzilla.suse.com/show_bug.cgi?id=1225479
* https://bugzilla.suse.com/show_bug.cgi?id=1225482
* https://bugzilla.suse.com/show_bug.cgi?id=1225483
* https://bugzilla.suse.com/show_bug.cgi?id=1225486
* https://bugzilla.suse.com/show_bug.cgi?id=1225488
* https://bugzilla.suse.com/show_bug.cgi?id=1225490
* https://bugzilla.suse.com/show_bug.cgi?id=1225492
* https://bugzilla.suse.com/show_bug.cgi?id=1225495
* https://bugzilla.suse.com/show_bug.cgi?id=1225499
* https://bugzilla.suse.com/show_bug.cgi?id=1225500
* https://bugzilla.suse.com/show_bug.cgi?id=1225501
* https://bugzilla.suse.com/show_bug.cgi?id=1225508
* https://bugzilla.suse.com/show_bug.cgi?id=1225510
* https://bugzilla.suse.com/show_bug.cgi?id=1225529
* https://bugzilla.suse.com/show_bug.cgi?id=1225530
* https://bugzilla.suse.com/show_bug.cgi?id=1225532
* https://bugzilla.suse.com/show_bug.cgi?id=1225534
* https://bugzilla.suse.com/show_bug.cgi?id=1225549
* https://bugzilla.suse.com/show_bug.cgi?id=1225550
* https://bugzilla.suse.com/show_bug.cgi?id=1225553
* https://bugzilla.suse.com/show_bug.cgi?id=1225554
* https://bugzilla.suse.com/show_bug.cgi?id=1225557
* https://bugzilla.suse.com/show_bug.cgi?id=1225559
* https://bugzilla.suse.com/show_bug.cgi?id=1225560
* https://bugzilla.suse.com/show_bug.cgi?id=1225565
* https://bugzilla.suse.com/show_bug.cgi?id=1225566
* https://bugzilla.suse.com/show_bug.cgi?id=1225569
* https://bugzilla.suse.com/show_bug.cgi?id=1225570
* https://bugzilla.suse.com/show_bug.cgi?id=1225571
* https://bugzilla.suse.com/show_bug.cgi?id=1225572
* https://bugzilla.suse.com/show_bug.cgi?id=1225577
* https://bugzilla.suse.com/show_bug.cgi?id=1225583
* https://bugzilla.suse.com/show_bug.cgi?id=1225584
* https://bugzilla.suse.com/show_bug.cgi?id=1225588
* https://bugzilla.suse.com/show_bug.cgi?id=1225589
* https://bugzilla.suse.com/show_bug.cgi?id=1225590
* https://bugzilla.suse.com/show_bug.cgi?id=1225591
* https://bugzilla.suse.com/show_bug.cgi?id=1225592
* https://bugzilla.suse.com/show_bug.cgi?id=1225595
* https://bugzilla.suse.com/show_bug.cgi?id=1225599
* https://jira.suse.com/browse/PED-8111



SUSE-SU-2024:2168-1: important: Security update for gnome-settings-daemon


# Security update for gnome-settings-daemon

Announcement ID: SUSE-SU-2024:2168-1
Rating: important
References:

* bsc#1226423

Cross-References:

* CVE-2024-38394

CVSS scores:

* CVE-2024-38394 ( SUSE ): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* Desktop Applications Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves one vulnerability can now be installed.

## Description:

This update for gnome-settings-daemon fixes the following issues:

* CVE-2024-38394: Fixed mismatches in interpreting USB authorization policy
(bsc#1226423).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2168=1 SUSE-2024-2168=1

* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-2168=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* gnome-settings-daemon-debugsource-41.0-150500.4.3.1
* gnome-settings-daemon-devel-41.0-150500.4.3.1
* gnome-settings-daemon-41.0-150500.4.3.1
* gnome-settings-daemon-debuginfo-41.0-150500.4.3.1
* openSUSE Leap 15.5 (noarch)
* gnome-settings-daemon-lang-41.0-150500.4.3.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* gnome-settings-daemon-debugsource-41.0-150500.4.3.1
* gnome-settings-daemon-devel-41.0-150500.4.3.1
* gnome-settings-daemon-41.0-150500.4.3.1
* gnome-settings-daemon-debuginfo-41.0-150500.4.3.1
* Desktop Applications Module 15-SP5 (noarch)
* gnome-settings-daemon-lang-41.0-150500.4.3.1

## References:

* https://www.suse.com/security/cve/CVE-2024-38394.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226423



SUSE-SU-2024:2185-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:2185-1
Rating: important
References:

* bsc#1065729
* bsc#1151927
* bsc#1152472
* bsc#1154353
* bsc#1156395
* bsc#1174585
* bsc#1176447
* bsc#1176774
* bsc#1176869
* bsc#1178134
* bsc#1181147
* bsc#1184631
* bsc#1185570
* bsc#1185589
* bsc#1185902
* bsc#1186885
* bsc#1187357
* bsc#1188616
* bsc#1188772
* bsc#1189883
* bsc#1190795
* bsc#1191452
* bsc#1192107
* bsc#1194288
* bsc#1194591
* bsc#1196956
* bsc#1197760
* bsc#1198029
* bsc#1199304
* bsc#1200619
* bsc#1203389
* bsc#1206646
* bsc#1209657
* bsc#1210335
* bsc#1210629
* bsc#1213476
* bsc#1215420
* bsc#1216702
* bsc#1217169
* bsc#1220137
* bsc#1220144
* bsc#1220754
* bsc#1220877
* bsc#1220960
* bsc#1221044
* bsc#1221113
* bsc#1221829
* bsc#1222251
* bsc#1222619
* bsc#1222838
* bsc#1222867
* bsc#1223084
* bsc#1223138
* bsc#1223384
* bsc#1223390
* bsc#1223512
* bsc#1223932
* bsc#1223934
* bsc#1224099
* bsc#1224174
* bsc#1224438
* bsc#1224482
* bsc#1224511
* bsc#1224592
* bsc#1224816
* bsc#1224826
* bsc#1224830
* bsc#1224831
* bsc#1224832
* bsc#1224834
* bsc#1224841
* bsc#1224842
* bsc#1224843
* bsc#1224844
* bsc#1224846
* bsc#1224849
* bsc#1224852
* bsc#1224853
* bsc#1224854
* bsc#1224859
* bsc#1224882
* bsc#1224886
* bsc#1224888
* bsc#1224889
* bsc#1224891
* bsc#1224892
* bsc#1224893
* bsc#1224899
* bsc#1224904
* bsc#1224907
* bsc#1224909
* bsc#1224916
* bsc#1224917
* bsc#1224922
* bsc#1224923
* bsc#1224924
* bsc#1224926
* bsc#1224928
* bsc#1224953
* bsc#1224954
* bsc#1224955
* bsc#1224957
* bsc#1224961
* bsc#1224963
* bsc#1224965
* bsc#1224966
* bsc#1224968
* bsc#1224981
* bsc#1224982
* bsc#1224983
* bsc#1224984
* bsc#1224987
* bsc#1224990
* bsc#1224993
* bsc#1224996
* bsc#1224997
* bsc#1225026
* bsc#1225030
* bsc#1225058
* bsc#1225060
* bsc#1225083
* bsc#1225084
* bsc#1225091
* bsc#1225112
* bsc#1225113
* bsc#1225128
* bsc#1225140
* bsc#1225143
* bsc#1225148
* bsc#1225155
* bsc#1225164
* bsc#1225177
* bsc#1225178
* bsc#1225181
* bsc#1225192
* bsc#1225193
* bsc#1225198
* bsc#1225201
* bsc#1225206
* bsc#1225207
* bsc#1225208
* bsc#1225214
* bsc#1225223
* bsc#1225224
* bsc#1225230
* bsc#1225232
* bsc#1225233
* bsc#1225237
* bsc#1225238
* bsc#1225243
* bsc#1225244
* bsc#1225247
* bsc#1225251
* bsc#1225252
* bsc#1225256
* bsc#1225261
* bsc#1225262
* bsc#1225263
* bsc#1225301
* bsc#1225303
* bsc#1225316
* bsc#1225318
* bsc#1225320
* bsc#1225321
* bsc#1225322
* bsc#1225326
* bsc#1225327
* bsc#1225328
* bsc#1225330
* bsc#1225333
* bsc#1225336
* bsc#1225341
* bsc#1225346
* bsc#1225351
* bsc#1225354
* bsc#1225355
* bsc#1225357
* bsc#1225358
* bsc#1225360
* bsc#1225361
* bsc#1225366
* bsc#1225367
* bsc#1225369
* bsc#1225370
* bsc#1225372
* bsc#1225374
* bsc#1225384
* bsc#1225386
* bsc#1225387
* bsc#1225390
* bsc#1225393
* bsc#1225400
* bsc#1225404
* bsc#1225405
* bsc#1225409
* bsc#1225411
* bsc#1225424
* bsc#1225427
* bsc#1225435
* bsc#1225437
* bsc#1225438
* bsc#1225439
* bsc#1225446
* bsc#1225447
* bsc#1225448
* bsc#1225450
* bsc#1225453
* bsc#1225455
* bsc#1225468
* bsc#1225499
* bsc#1225500
* bsc#1225508
* bsc#1225534

Cross-References:

* CVE-2020-36788
* CVE-2021-3743
* CVE-2021-39698
* CVE-2021-43056
* CVE-2021-47104
* CVE-2021-47192
* CVE-2021-47200
* CVE-2021-47220
* CVE-2021-47227
* CVE-2021-47228
* CVE-2021-47229
* CVE-2021-47230
* CVE-2021-47231
* CVE-2021-47235
* CVE-2021-47236
* CVE-2021-47237
* CVE-2021-47239
* CVE-2021-47240
* CVE-2021-47241
* CVE-2021-47246
* CVE-2021-47252
* CVE-2021-47253
* CVE-2021-47254
* CVE-2021-47255
* CVE-2021-47258
* CVE-2021-47259
* CVE-2021-47260
* CVE-2021-47261
* CVE-2021-47263
* CVE-2021-47265
* CVE-2021-47267
* CVE-2021-47269
* CVE-2021-47270
* CVE-2021-47274
* CVE-2021-47275
* CVE-2021-47276
* CVE-2021-47280
* CVE-2021-47281
* CVE-2021-47284
* CVE-2021-47285
* CVE-2021-47288
* CVE-2021-47289
* CVE-2021-47296
* CVE-2021-47301
* CVE-2021-47302
* CVE-2021-47305
* CVE-2021-47307
* CVE-2021-47308
* CVE-2021-47314
* CVE-2021-47315
* CVE-2021-47320
* CVE-2021-47321
* CVE-2021-47323
* CVE-2021-47324
* CVE-2021-47329
* CVE-2021-47330
* CVE-2021-47332
* CVE-2021-47333
* CVE-2021-47334
* CVE-2021-47337
* CVE-2021-47338
* CVE-2021-47340
* CVE-2021-47341
* CVE-2021-47343
* CVE-2021-47344
* CVE-2021-47347
* CVE-2021-47348
* CVE-2021-47350
* CVE-2021-47353
* CVE-2021-47354
* CVE-2021-47356
* CVE-2021-47369
* CVE-2021-47375
* CVE-2021-47378
* CVE-2021-47381
* CVE-2021-47382
* CVE-2021-47383
* CVE-2021-47387
* CVE-2021-47388
* CVE-2021-47391
* CVE-2021-47392
* CVE-2021-47393
* CVE-2021-47395
* CVE-2021-47396
* CVE-2021-47399
* CVE-2021-47402
* CVE-2021-47404
* CVE-2021-47405
* CVE-2021-47409
* CVE-2021-47413
* CVE-2021-47416
* CVE-2021-47422
* CVE-2021-47423
* CVE-2021-47424
* CVE-2021-47425
* CVE-2021-47426
* CVE-2021-47428
* CVE-2021-47431
* CVE-2021-47434
* CVE-2021-47435
* CVE-2021-47436
* CVE-2021-47441
* CVE-2021-47442
* CVE-2021-47443
* CVE-2021-47444
* CVE-2021-47445
* CVE-2021-47451
* CVE-2021-47456
* CVE-2021-47458
* CVE-2021-47460
* CVE-2021-47464
* CVE-2021-47465
* CVE-2021-47468
* CVE-2021-47473
* CVE-2021-47478
* CVE-2021-47480
* CVE-2021-47482
* CVE-2021-47483
* CVE-2021-47485
* CVE-2021-47493
* CVE-2021-47494
* CVE-2021-47495
* CVE-2021-47496
* CVE-2021-47497
* CVE-2021-47498
* CVE-2021-47499
* CVE-2021-47500
* CVE-2021-47501
* CVE-2021-47502
* CVE-2021-47503
* CVE-2021-47505
* CVE-2021-47506
* CVE-2021-47507
* CVE-2021-47509
* CVE-2021-47511
* CVE-2021-47512
* CVE-2021-47516
* CVE-2021-47518
* CVE-2021-47521
* CVE-2021-47522
* CVE-2021-47523
* CVE-2021-47527
* CVE-2021-47535
* CVE-2021-47536
* CVE-2021-47538
* CVE-2021-47540
* CVE-2021-47541
* CVE-2021-47542
* CVE-2021-47549
* CVE-2021-47557
* CVE-2021-47562
* CVE-2021-47563
* CVE-2021-47565
* CVE-2022-1195
* CVE-2022-20132
* CVE-2022-48636
* CVE-2022-48673
* CVE-2022-48704
* CVE-2022-48710
* CVE-2023-0160
* CVE-2023-1829
* CVE-2023-2176
* CVE-2023-424
* CVE-2023-4244
* CVE-2023-47233
* CVE-2023-52433
* CVE-2023-52581
* CVE-2023-52591
* CVE-2023-52654
* CVE-2023-52655
* CVE-2023-52686
* CVE-2023-52840
* CVE-2023-52871
* CVE-2023-52880
* CVE-2023-6531
* CVE-2024-26581
* CVE-2024-26643
* CVE-2024-26828
* CVE-2024-26921
* CVE-2024-26925
* CVE-2024-26929
* CVE-2024-26930
* CVE-2024-27398
* CVE-2024-27413
* CVE-2024-35811
* CVE-2024-35895
* CVE-2024-35914

CVSS scores:

* CVE-2020-36788 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-3743 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-3743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2021-39698 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-39698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-43056 ( SUSE ): 6.8 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2021-43056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47220 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47228 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47236 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47237 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47246 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47252 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2021-47253 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47254 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47258 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47259 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47260 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47261 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2021-47265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47267 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47288 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2021-47289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47296 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47302 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47314 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47315 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47320 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47321 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47323 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47324 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47329 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47330 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47333 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47334 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-47337 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47338 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2021-47340 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47341 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47343 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-47344 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47347 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47348 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-47350 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47353 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47354 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2021-47356 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-47369 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47375 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47382 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47387 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47388 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47392 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47404 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47405 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47413 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47423 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47426 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47428 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47465 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47468 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47473 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47480 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47482 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47496 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47497 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47499 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47502 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2021-47503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47505 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47506 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47512 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47516 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47518 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47518 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47521 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47521 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47522 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47523 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47535 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2021-47536 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2021-47538 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47540 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47540 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47541 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47549 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47565 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-1195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-1195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-20132 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
* CVE-2022-20132 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-2176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-2176 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-4244 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-4244 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52433 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52840 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52871 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26581 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26581 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Availability Extension 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Manager Proxy 4.2
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Server 4.2

An update that solves 187 vulnerabilities and has 26 security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

* CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free
(bsc#1225201).
* CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
* CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301)
* CVE-2022-48673: kABI workarounds for struct smc_link (bsc#1223934).
* CVE-2023-52871: Handle a second device without data corruption (bsc#1225534)
* CVE-2024-26828: Fix underflow in parse_server_interfaces() (bsc#1223084).
* CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells
(bsc#1225355).
* CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).
* CVE-2024-27413: Fix incorrect allocation size (bsc#1224438).
* CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit
(bsc#1225208).
* CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
* CVE-2023-52840: Fix use after free in rmi_unregister_function()
(bsc#1224928).
* CVE-2021-47261: Fix initializing CQ fragments buffer (bsc#1224954)
* CVE-2021-47254: Fix use-after-free in gfs2_glock_shrink_scan (bsc#1224888).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1224174).
* CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
* CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
* CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which
could be exploited to achieve local privilege escalation (bsc#1215420).
* CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which
could be exploited to achieve local privilege escalation (bsc#1215420).
* CVE-2023-1829: Fixed a use-after-free vulnerability in the control index
filter (tcindex) (bsc#1210335).
* CVE-2023-52686: Fix a null pointer in opal_event_init() (bsc#1065729).

The following non-security bugs were fixed:

* af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress
(bsc#1223384).
* af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
* af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
* btrfs: do not start relocation until in progress drops are done
(bsc#1222251).
* btrfs: do not start relocation until in progress drops are done
(bsc#1222251).
* cifs: add missing spinlock around tcon refcount (bsc#1213476).
* cifs: avoid dup prefix path in dfs_get_automount_devname() (bsc#1213476).
* cifs: avoid race conditions with parallel reconnects (bsc#1213476).
* cifs: avoid re-lookups in dfs_cache_find() (bsc#1213476).
* cifs: avoid use of global locks for high contention data (bsc#1213476).
* cifs: check only tcon status on tcon related functions (bsc#1213476).
* cifs: do all necessary checks for credits within or before locking
(bsc#1213476).
* cifs: do not block in dfs_cache_noreq_update_tgthint() (bsc#1213476).
* cifs: do not refresh cached referrals from unactive mounts (bsc#1213476).
* cifs: do not take exclusive lock for updating target hints (bsc#1213476).
* cifs: fix confusing debug message (bsc#1213476).
* cifs: fix missing unload_nls() in smb2_reconnect() (bsc#1213476).
* cifs: fix potential deadlock in cache_refresh_path() (bsc#1213476).
* cifs: fix refresh of cached referrals (bsc#1213476).
* cifs: fix return of uninitialized rc in dfs_cache_update_tgthint()
(bsc#1213476).
* cifs: fix source pathname comparison of dfs supers (bsc#1213476).
* cifs: fix status checks in cifs_tree_connect (bsc#1213476).
* cifs: fix use-after-free bug in refresh_cache_worker() (bsc#1213476).
* cifs: get rid of dns resolve worker (bsc#1213476).
* cifs: get rid of mount options string parsing (bsc#1213476).
* cifs: handle cache lookup errors different than -ENOENT (bsc#1213476).
* cifs: ignore ipc reconnect failures during dfs failover (bsc#1213476).
* cifs: match even the scope id for ipv6 addresses (bsc#1213476).
* cifs: optimize reconnect of nested links (bsc#1213476).
* cifs: prevent data race in smb2_reconnect() (bsc#1213476).
* cifs: refresh root referrals (bsc#1213476).
* cifs: remove duplicate code in __refresh_tcon() (bsc#1213476).
* cifs: remove unused function (bsc#1213476).
* cifs: remove unused smb3_fs_context::mount_options (bsc#1213476).
* cifs: return DFS root session id in DebugData (bsc#1213476).
* cifs: reuse cifs_match_ipaddr for comparison of dstaddr too (bsc#1213476).
* cifs: set correct ipc status after initial tree connect (bsc#1213476).
* cifs: set correct status of tcon ipc when reconnecting (bsc#1213476).
* cifs: set correct tcon status after initial tree connect (bsc#1213476).
* cifs: set DFS root session in cifs_get_smb_ses() (bsc#1213476).
* cifs: set resolved ip in sockaddr (bsc#1213476).
* cifs: share dfs connections and supers (bsc#1213476).
* cifs: split out ses and tcon retrieval from mount_get_conns() (bsc#1213476).
* cifs: use fs_context for automounts (bsc#1213476).
* cifs: use origin fullpath for automounts (bsc#1213476).
* cifs: use tcon allocation functions even for dummy tcon (bsc#1213476).
* netfilter: nf_tables: defer gc run if previous batch is still pending (git-
fixes).
* netfilter: nf_tables: fix GC transaction races with netns and netlink event
exit path (git-fixes).
* netfilter: nf_tables: fix kdoc warnings after gc rework (git-fixes).
* netfilter: nf_tables: fix memleak when more than 255 elements expired (git-
fixes).
* netfilter: nf_tables: GC transaction race with abort path (git-fixes).
* netfilter: nf_tables: GC transaction race with netns dismantle (git-fixes).
* netfilter: nf_tables: mark newset as dead on transaction abort (git-fixes).
* netfilter: nf_tables: mark set as dead when unbinding anonymous set with
timeout (git-fixes).
* netfilter: nf_tables: nft_set_rbtree: fix spurious insertion failure (git-
fixes).
* netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path
(git-fixes).
* netfilter: nf_tables: skip dead set elements in netlink dump (git-fixes).
* netfilter: nf_tables: use correct lock to protect gc_list (git-fixes).
* netfilter: nft_set_hash: try later when GC hits EAGAIN on iteration (git-
fixes).
* netfilter: nft_set_rbtree: Add missing expired checks (git-fixes).
* netfilter: nft_set_rbtree: bogus lookup/get on consecutive elements in named
sets (git-fixes).
* netfilter: nft_set_rbtree: Detect partial overlap with start endpoint match
(git-fixes).
* netfilter: nft_set_rbtree: Detect partial overlaps on insertion (git-fixes).
* netfilter: nft_set_rbtree: Do not account for expired elements on insertion
(git-fixes).
* netfilter: nft_set_rbtree: Drop spurious condition for overlap detection on
insertion (git-fixes).
* netfilter: nft_set_rbtree: fix null deref on element insertion (git-fixes).
* netfilter: nft_set_rbtree: fix overlap expiration walk (git-fixes).
* netfilter: nft_set_rbtree: Handle outcomes of tree rotations in overlap
detection (git-fixes).
* netfilter: nft_set_rbtree: Introduce and use nft_rbtree_interval_start()
(git-fixes).
* netfilter: nft_set_rbtree: overlap detection with element re-addition after
deletion (git-fixes).
* netfilter: nft_set_rbtree: skip elements in transaction from garbage
collection (git-fixes).
* netfilter: nft_set_rbtree: skip end interval element from gc (git-fixes).
* netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction
(git-fixes).
* netfilter: nft_set_rbtree: Switch to node list walk for overlap detection
(git-fixes).
* netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention
(git-fixes).
* NFC: nxp: add NXP1002 (bsc#1185589).
* PCI: rpaphp: Add MODULE_DESCRIPTION (bsc#1176869 ltc#188243).
* smb: client: fix dfs link mount against w2k8 (git-fixes).
* smb: client: fix null auth (bsc#1213476).
* smb: client: set correct id, uid and cruid for multiuser automounts (git-
fixes).
* x86/xen: Drop USERGS_SYSRET64 paravirt call (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-2185=1

* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-2185=1

* SUSE Linux Enterprise High Availability Extension 15 SP3
zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-2185=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2185=1

* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2185=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2185=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-2185=1

* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-2185=1

* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2185=1

* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2185=1

## Package List:

* openSUSE Leap 15.3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.164.1
* openSUSE Leap 15.3 (noarch)
* kernel-macros-5.3.18-150300.59.164.1
* kernel-source-5.3.18-150300.59.164.1
* kernel-source-vanilla-5.3.18-150300.59.164.1
* kernel-devel-5.3.18-150300.59.164.1
* kernel-docs-html-5.3.18-150300.59.164.1
* openSUSE Leap 15.3 (nosrc ppc64le x86_64)
* kernel-kvmsmall-5.3.18-150300.59.164.1
* kernel-debug-5.3.18-150300.59.164.1
* openSUSE Leap 15.3 (ppc64le x86_64)
* kernel-kvmsmall-devel-5.3.18-150300.59.164.1
* kernel-debug-devel-5.3.18-150300.59.164.1
* kernel-debug-livepatch-devel-5.3.18-150300.59.164.1
* kernel-kvmsmall-debugsource-5.3.18-150300.59.164.1
* kernel-debug-debugsource-5.3.18-150300.59.164.1
* kernel-debug-debuginfo-5.3.18-150300.59.164.1
* kernel-debug-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.164.1
* kernel-kvmsmall-debuginfo-5.3.18-150300.59.164.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64)
* cluster-md-kmp-default-debuginfo-5.3.18-150300.59.164.1
* kernel-obs-build-5.3.18-150300.59.164.1
* dlm-kmp-default-debuginfo-5.3.18-150300.59.164.1
* kernel-default-debugsource-5.3.18-150300.59.164.1
* cluster-md-kmp-default-5.3.18-150300.59.164.1
* ocfs2-kmp-default-5.3.18-150300.59.164.1
* ocfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1
* gfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1
* kernel-obs-build-debugsource-5.3.18-150300.59.164.1
* kernel-default-debuginfo-5.3.18-150300.59.164.1
* kernel-default-livepatch-devel-5.3.18-150300.59.164.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
* dlm-kmp-default-5.3.18-150300.59.164.1
* kernel-default-livepatch-5.3.18-150300.59.164.1
* kernel-default-extra-5.3.18-150300.59.164.1
* kernel-default-optional-5.3.18-150300.59.164.1
* kernel-syms-5.3.18-150300.59.164.1
* kselftests-kmp-default-5.3.18-150300.59.164.1
* gfs2-kmp-default-5.3.18-150300.59.164.1
* kernel-default-optional-debuginfo-5.3.18-150300.59.164.1
* kselftests-kmp-default-debuginfo-5.3.18-150300.59.164.1
* reiserfs-kmp-default-5.3.18-150300.59.164.1
* kernel-default-devel-5.3.18-150300.59.164.1
* kernel-default-base-rebuild-5.3.18-150300.59.164.1.150300.18.96.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
* kernel-default-extra-debuginfo-5.3.18-150300.59.164.1
* kernel-obs-qa-5.3.18-150300.59.164.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.3.18-150300.59.164.1
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP3_Update_45-debugsource-1-150300.7.3.1
* kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1
* kernel-livepatch-5_3_18-150300_59_164-default-debuginfo-1-150300.7.3.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_164-preempt-debuginfo-1-150300.7.3.1
* kernel-livepatch-5_3_18-150300_59_164-preempt-1-150300.7.3.1
* openSUSE Leap 15.3 (aarch64 x86_64)
* cluster-md-kmp-preempt-5.3.18-150300.59.164.1
* gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
* ocfs2-kmp-preempt-5.3.18-150300.59.164.1
* kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
* kernel-preempt-debugsource-5.3.18-150300.59.164.1
* gfs2-kmp-preempt-5.3.18-150300.59.164.1
* kselftests-kmp-preempt-5.3.18-150300.59.164.1
* cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
* kernel-preempt-debuginfo-5.3.18-150300.59.164.1
* reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
* kernel-preempt-optional-5.3.18-150300.59.164.1
* kernel-preempt-extra-5.3.18-150300.59.164.1
* dlm-kmp-preempt-5.3.18-150300.59.164.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-preempt-optional-debuginfo-5.3.18-150300.59.164.1
* kernel-preempt-devel-5.3.18-150300.59.164.1
* kernel-preempt-livepatch-devel-5.3.18-150300.59.164.1
* reiserfs-kmp-preempt-5.3.18-150300.59.164.1
* ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
* dlm-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
* kernel-preempt-extra-debuginfo-5.3.18-150300.59.164.1
* openSUSE Leap 15.3 (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.164.1
* openSUSE Leap 15.3 (nosrc s390x)
* kernel-zfcpdump-5.3.18-150300.59.164.1
* openSUSE Leap 15.3 (s390x)
* kernel-zfcpdump-debugsource-5.3.18-150300.59.164.1
* kernel-zfcpdump-debuginfo-5.3.18-150300.59.164.1
* openSUSE Leap 15.3 (nosrc)
* dtb-aarch64-5.3.18-150300.59.164.1
* openSUSE Leap 15.3 (aarch64)
* dtb-rockchip-5.3.18-150300.59.164.1
* dtb-sprd-5.3.18-150300.59.164.1
* dtb-hisilicon-5.3.18-150300.59.164.1
* dtb-arm-5.3.18-150300.59.164.1
* kernel-64kb-debugsource-5.3.18-150300.59.164.1
* kernel-64kb-livepatch-devel-5.3.18-150300.59.164.1
* reiserfs-kmp-64kb-5.3.18-150300.59.164.1
* dtb-freescale-5.3.18-150300.59.164.1
* kernel-64kb-optional-5.3.18-150300.59.164.1
* ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
* dtb-apm-5.3.18-150300.59.164.1
* dtb-exynos-5.3.18-150300.59.164.1
* dtb-socionext-5.3.18-150300.59.164.1
* kernel-64kb-optional-debuginfo-5.3.18-150300.59.164.1
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1
* dtb-amd-5.3.18-150300.59.164.1
* dlm-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
* dtb-qcom-5.3.18-150300.59.164.1
* dtb-marvell-5.3.18-150300.59.164.1
* dtb-mediatek-5.3.18-150300.59.164.1
* dtb-altera-5.3.18-150300.59.164.1
* dtb-broadcom-5.3.18-150300.59.164.1
* dtb-zte-5.3.18-150300.59.164.1
* kernel-64kb-debuginfo-5.3.18-150300.59.164.1
* ocfs2-kmp-64kb-5.3.18-150300.59.164.1
* kselftests-kmp-64kb-5.3.18-150300.59.164.1
* dlm-kmp-64kb-5.3.18-150300.59.164.1
* gfs2-kmp-64kb-5.3.18-150300.59.164.1
* kernel-64kb-devel-5.3.18-150300.59.164.1
* dtb-cavium-5.3.18-150300.59.164.1
* kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
* dtb-renesas-5.3.18-150300.59.164.1
* dtb-xilinx-5.3.18-150300.59.164.1
* reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
* cluster-md-kmp-64kb-5.3.18-150300.59.164.1
* kernel-64kb-extra-5.3.18-150300.59.164.1
* gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
* cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
* dtb-nvidia-5.3.18-150300.59.164.1
* dtb-amlogic-5.3.18-150300.59.164.1
* kernel-64kb-extra-debuginfo-5.3.18-150300.59.164.1
* dtb-al-5.3.18-150300.59.164.1
* dtb-lg-5.3.18-150300.59.164.1
* dtb-allwinner-5.3.18-150300.59.164.1
* openSUSE Leap 15.3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Live Patching 15-SP3 (nosrc)
* kernel-default-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-default-debuginfo-5.3.18-150300.59.164.1
* kernel-default-livepatch-devel-5.3.18-150300.59.164.1
* kernel-default-debugsource-5.3.18-150300.59.164.1
* kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1
* kernel-default-livepatch-5.3.18-150300.59.164.1
* SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le
s390x x86_64)
* cluster-md-kmp-default-debuginfo-5.3.18-150300.59.164.1
* kernel-default-debuginfo-5.3.18-150300.59.164.1
* dlm-kmp-default-debuginfo-5.3.18-150300.59.164.1
* dlm-kmp-default-5.3.18-150300.59.164.1
* kernel-default-debugsource-5.3.18-150300.59.164.1
* cluster-md-kmp-default-5.3.18-150300.59.164.1
* gfs2-kmp-default-5.3.18-150300.59.164.1
* ocfs2-kmp-default-5.3.18-150300.59.164.1
* ocfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1
* gfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1
* SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc)
* kernel-default-5.3.18-150300.59.164.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.164.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64)
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-64kb-debuginfo-5.3.18-150300.59.164.1
* kernel-64kb-debugsource-5.3.18-150300.59.164.1
* kernel-64kb-devel-5.3.18-150300.59.164.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc
x86_64)
* kernel-preempt-5.3.18-150300.59.164.1
* kernel-default-5.3.18-150300.59.164.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* kernel-obs-build-5.3.18-150300.59.164.1
* kernel-default-debuginfo-5.3.18-150300.59.164.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
* kernel-default-debugsource-5.3.18-150300.59.164.1
* kernel-preempt-debuginfo-5.3.18-150300.59.164.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
* kernel-preempt-devel-5.3.18-150300.59.164.1
* kernel-syms-5.3.18-150300.59.164.1
* reiserfs-kmp-default-5.3.18-150300.59.164.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-default-devel-5.3.18-150300.59.164.1
* kernel-preempt-debugsource-5.3.18-150300.59.164.1
* kernel-obs-build-debugsource-5.3.18-150300.59.164.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* kernel-source-5.3.18-150300.59.164.1
* kernel-macros-5.3.18-150300.59.164.1
* kernel-devel-5.3.18-150300.59.164.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64)
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-64kb-debuginfo-5.3.18-150300.59.164.1
* kernel-64kb-debugsource-5.3.18-150300.59.164.1
* kernel-64kb-devel-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64 nosrc)
* kernel-default-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* kernel-obs-build-5.3.18-150300.59.164.1
* kernel-default-debuginfo-5.3.18-150300.59.164.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
* kernel-default-debugsource-5.3.18-150300.59.164.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
* kernel-syms-5.3.18-150300.59.164.1
* reiserfs-kmp-default-5.3.18-150300.59.164.1
* kernel-default-devel-5.3.18-150300.59.164.1
* kernel-obs-build-debugsource-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* kernel-source-5.3.18-150300.59.164.1
* kernel-macros-5.3.18-150300.59.164.1
* kernel-devel-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64)
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-preempt-debuginfo-5.3.18-150300.59.164.1
* kernel-preempt-debugsource-5.3.18-150300.59.164.1
* kernel-preempt-devel-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (nosrc s390x)
* kernel-zfcpdump-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (s390x)
* kernel-zfcpdump-debugsource-5.3.18-150300.59.164.1
* kernel-zfcpdump-debuginfo-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le
x86_64)
* kernel-default-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* kernel-obs-build-5.3.18-150300.59.164.1
* kernel-default-debuginfo-5.3.18-150300.59.164.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
* kernel-default-debugsource-5.3.18-150300.59.164.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
* kernel-syms-5.3.18-150300.59.164.1
* reiserfs-kmp-default-5.3.18-150300.59.164.1
* kernel-default-devel-5.3.18-150300.59.164.1
* kernel-obs-build-debugsource-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* kernel-source-5.3.18-150300.59.164.1
* kernel-macros-5.3.18-150300.59.164.1
* kernel-devel-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-preempt-debuginfo-5.3.18-150300.59.164.1
* kernel-preempt-debugsource-5.3.18-150300.59.164.1
* kernel-preempt-devel-5.3.18-150300.59.164.1
* SUSE Enterprise Storage 7.1 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.164.1
* SUSE Enterprise Storage 7.1 (aarch64)
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-64kb-debuginfo-5.3.18-150300.59.164.1
* kernel-64kb-debugsource-5.3.18-150300.59.164.1
* kernel-64kb-devel-5.3.18-150300.59.164.1
* SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.164.1
* kernel-default-5.3.18-150300.59.164.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* kernel-obs-build-5.3.18-150300.59.164.1
* kernel-default-debuginfo-5.3.18-150300.59.164.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
* kernel-default-debugsource-5.3.18-150300.59.164.1
* kernel-preempt-debuginfo-5.3.18-150300.59.164.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
* kernel-preempt-devel-5.3.18-150300.59.164.1
* kernel-syms-5.3.18-150300.59.164.1
* reiserfs-kmp-default-5.3.18-150300.59.164.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
* kernel-default-devel-5.3.18-150300.59.164.1
* kernel-preempt-debugsource-5.3.18-150300.59.164.1
* kernel-obs-build-debugsource-5.3.18-150300.59.164.1
* SUSE Enterprise Storage 7.1 (noarch)
* kernel-source-5.3.18-150300.59.164.1
* kernel-macros-5.3.18-150300.59.164.1
* kernel-devel-5.3.18-150300.59.164.1
* SUSE Enterprise Storage 7.1 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.3.18-150300.59.164.1
* kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
* kernel-default-debugsource-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64)
* kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.3.18-150300.59.164.1
* kernel-default-debugsource-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.164.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64)
* kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.3.18-150300.59.164.1
* kernel-default-debugsource-5.3.18-150300.59.164.1

## References:

* https://www.suse.com/security/cve/CVE-2020-36788.html
* https://www.suse.com/security/cve/CVE-2021-3743.html
* https://www.suse.com/security/cve/CVE-2021-39698.html
* https://www.suse.com/security/cve/CVE-2021-43056.html
* https://www.suse.com/security/cve/CVE-2021-47104.html
* https://www.suse.com/security/cve/CVE-2021-47192.html
* https://www.suse.com/security/cve/CVE-2021-47200.html
* https://www.suse.com/security/cve/CVE-2021-47220.html
* https://www.suse.com/security/cve/CVE-2021-47227.html
* https://www.suse.com/security/cve/CVE-2021-47228.html
* https://www.suse.com/security/cve/CVE-2021-47229.html
* https://www.suse.com/security/cve/CVE-2021-47230.html
* https://www.suse.com/security/cve/CVE-2021-47231.html
* https://www.suse.com/security/cve/CVE-2021-47235.html
* https://www.suse.com/security/cve/CVE-2021-47236.html
* https://www.suse.com/security/cve/CVE-2021-47237.html
* https://www.suse.com/security/cve/CVE-2021-47239.html
* https://www.suse.com/security/cve/CVE-2021-47240.html
* https://www.suse.com/security/cve/CVE-2021-47241.html
* https://www.suse.com/security/cve/CVE-2021-47246.html
* https://www.suse.com/security/cve/CVE-2021-47252.html
* https://www.suse.com/security/cve/CVE-2021-47253.html
* https://www.suse.com/security/cve/CVE-2021-47254.html
* https://www.suse.com/security/cve/CVE-2021-47255.html
* https://www.suse.com/security/cve/CVE-2021-47258.html
* https://www.suse.com/security/cve/CVE-2021-47259.html
* https://www.suse.com/security/cve/CVE-2021-47260.html
* https://www.suse.com/security/cve/CVE-2021-47261.html
* https://www.suse.com/security/cve/CVE-2021-47263.html
* https://www.suse.com/security/cve/CVE-2021-47265.html
* https://www.suse.com/security/cve/CVE-2021-47267.html
* https://www.suse.com/security/cve/CVE-2021-47269.html
* https://www.suse.com/security/cve/CVE-2021-47270.html
* https://www.suse.com/security/cve/CVE-2021-47274.html
* https://www.suse.com/security/cve/CVE-2021-47275.html
* https://www.suse.com/security/cve/CVE-2021-47276.html
* https://www.suse.com/security/cve/CVE-2021-47280.html
* https://www.suse.com/security/cve/CVE-2021-47281.html
* https://www.suse.com/security/cve/CVE-2021-47284.html
* https://www.suse.com/security/cve/CVE-2021-47285.html
* https://www.suse.com/security/cve/CVE-2021-47288.html
* https://www.suse.com/security/cve/CVE-2021-47289.html
* https://www.suse.com/security/cve/CVE-2021-47296.html
* https://www.suse.com/security/cve/CVE-2021-47301.html
* https://www.suse.com/security/cve/CVE-2021-47302.html
* https://www.suse.com/security/cve/CVE-2021-47305.html
* https://www.suse.com/security/cve/CVE-2021-47307.html
* https://www.suse.com/security/cve/CVE-2021-47308.html
* https://www.suse.com/security/cve/CVE-2021-47314.html
* https://www.suse.com/security/cve/CVE-2021-47315.html
* https://www.suse.com/security/cve/CVE-2021-47320.html
* https://www.suse.com/security/cve/CVE-2021-47321.html
* https://www.suse.com/security/cve/CVE-2021-47323.html
* https://www.suse.com/security/cve/CVE-2021-47324.html
* https://www.suse.com/security/cve/CVE-2021-47329.html
* https://www.suse.com/security/cve/CVE-2021-47330.html
* https://www.suse.com/security/cve/CVE-2021-47332.html
* https://www.suse.com/security/cve/CVE-2021-47333.html
* https://www.suse.com/security/cve/CVE-2021-47334.html
* https://www.suse.com/security/cve/CVE-2021-47337.html
* https://www.suse.com/security/cve/CVE-2021-47338.html
* https://www.suse.com/security/cve/CVE-2021-47340.html
* https://www.suse.com/security/cve/CVE-2021-47341.html
* https://www.suse.com/security/cve/CVE-2021-47343.html
* https://www.suse.com/security/cve/CVE-2021-47344.html
* https://www.suse.com/security/cve/CVE-2021-47347.html
* https://www.suse.com/security/cve/CVE-2021-47348.html
* https://www.suse.com/security/cve/CVE-2021-47350.html
* https://www.suse.com/security/cve/CVE-2021-47353.html
* https://www.suse.com/security/cve/CVE-2021-47354.html
* https://www.suse.com/security/cve/CVE-2021-47356.html
* https://www.suse.com/security/cve/CVE-2021-47369.html
* https://www.suse.com/security/cve/CVE-2021-47375.html
* https://www.suse.com/security/cve/CVE-2021-47378.html
* https://www.suse.com/security/cve/CVE-2021-47381.html
* https://www.suse.com/security/cve/CVE-2021-47382.html
* https://www.suse.com/security/cve/CVE-2021-47383.html
* https://www.suse.com/security/cve/CVE-2021-47387.html
* https://www.suse.com/security/cve/CVE-2021-47388.html
* https://www.suse.com/security/cve/CVE-2021-47391.html
* https://www.suse.com/security/cve/CVE-2021-47392.html
* https://www.suse.com/security/cve/CVE-2021-47393.html
* https://www.suse.com/security/cve/CVE-2021-47395.html
* https://www.suse.com/security/cve/CVE-2021-47396.html
* https://www.suse.com/security/cve/CVE-2021-47399.html
* https://www.suse.com/security/cve/CVE-2021-47402.html
* https://www.suse.com/security/cve/CVE-2021-47404.html
* https://www.suse.com/security/cve/CVE-2021-47405.html
* https://www.suse.com/security/cve/CVE-2021-47409.html
* https://www.suse.com/security/cve/CVE-2021-47413.html
* https://www.suse.com/security/cve/CVE-2021-47416.html
* https://www.suse.com/security/cve/CVE-2021-47422.html
* https://www.suse.com/security/cve/CVE-2021-47423.html
* https://www.suse.com/security/cve/CVE-2021-47424.html
* https://www.suse.com/security/cve/CVE-2021-47425.html
* https://www.suse.com/security/cve/CVE-2021-47426.html
* https://www.suse.com/security/cve/CVE-2021-47428.html
* https://www.suse.com/security/cve/CVE-2021-47431.html
* https://www.suse.com/security/cve/CVE-2021-47434.html
* https://www.suse.com/security/cve/CVE-2021-47435.html
* https://www.suse.com/security/cve/CVE-2021-47436.html
* https://www.suse.com/security/cve/CVE-2021-47441.html
* https://www.suse.com/security/cve/CVE-2021-47442.html
* https://www.suse.com/security/cve/CVE-2021-47443.html
* https://www.suse.com/security/cve/CVE-2021-47444.html
* https://www.suse.com/security/cve/CVE-2021-47445.html
* https://www.suse.com/security/cve/CVE-2021-47451.html
* https://www.suse.com/security/cve/CVE-2021-47456.html
* https://www.suse.com/security/cve/CVE-2021-47458.html
* https://www.suse.com/security/cve/CVE-2021-47460.html
* https://www.suse.com/security/cve/CVE-2021-47464.html
* https://www.suse.com/security/cve/CVE-2021-47465.html
* https://www.suse.com/security/cve/CVE-2021-47468.html
* https://www.suse.com/security/cve/CVE-2021-47473.html
* https://www.suse.com/security/cve/CVE-2021-47478.html
* https://www.suse.com/security/cve/CVE-2021-47480.html
* https://www.suse.com/security/cve/CVE-2021-47482.html
* https://www.suse.com/security/cve/CVE-2021-47483.html
* https://www.suse.com/security/cve/CVE-2021-47485.html
* https://www.suse.com/security/cve/CVE-2021-47493.html
* https://www.suse.com/security/cve/CVE-2021-47494.html
* https://www.suse.com/security/cve/CVE-2021-47495.html
* https://www.suse.com/security/cve/CVE-2021-47496.html
* https://www.suse.com/security/cve/CVE-2021-47497.html
* https://www.suse.com/security/cve/CVE-2021-47498.html
* https://www.suse.com/security/cve/CVE-2021-47499.html
* https://www.suse.com/security/cve/CVE-2021-47500.html
* https://www.suse.com/security/cve/CVE-2021-47501.html
* https://www.suse.com/security/cve/CVE-2021-47502.html
* https://www.suse.com/security/cve/CVE-2021-47503.html
* https://www.suse.com/security/cve/CVE-2021-47505.html
* https://www.suse.com/security/cve/CVE-2021-47506.html
* https://www.suse.com/security/cve/CVE-2021-47507.html
* https://www.suse.com/security/cve/CVE-2021-47509.html
* https://www.suse.com/security/cve/CVE-2021-47511.html
* https://www.suse.com/security/cve/CVE-2021-47512.html
* https://www.suse.com/security/cve/CVE-2021-47516.html
* https://www.suse.com/security/cve/CVE-2021-47518.html
* https://www.suse.com/security/cve/CVE-2021-47521.html
* https://www.suse.com/security/cve/CVE-2021-47522.html
* https://www.suse.com/security/cve/CVE-2021-47523.html
* https://www.suse.com/security/cve/CVE-2021-47527.html
* https://www.suse.com/security/cve/CVE-2021-47535.html
* https://www.suse.com/security/cve/CVE-2021-47536.html
* https://www.suse.com/security/cve/CVE-2021-47538.html
* https://www.suse.com/security/cve/CVE-2021-47540.html
* https://www.suse.com/security/cve/CVE-2021-47541.html
* https://www.suse.com/security/cve/CVE-2021-47542.html
* https://www.suse.com/security/cve/CVE-2021-47549.html
* https://www.suse.com/security/cve/CVE-2021-47557.html
* https://www.suse.com/security/cve/CVE-2021-47562.html
* https://www.suse.com/security/cve/CVE-2021-47563.html
* https://www.suse.com/security/cve/CVE-2021-47565.html
* https://www.suse.com/security/cve/CVE-2022-1195.html
* https://www.suse.com/security/cve/CVE-2022-20132.html
* https://www.suse.com/security/cve/CVE-2022-48636.html
* https://www.suse.com/security/cve/CVE-2022-48673.html
* https://www.suse.com/security/cve/CVE-2022-48704.html
* https://www.suse.com/security/cve/CVE-2022-48710.html
* https://www.suse.com/security/cve/CVE-2023-0160.html
* https://www.suse.com/security/cve/CVE-2023-1829.html
* https://www.suse.com/security/cve/CVE-2023-2176.html
* https://www.suse.com/security/cve/CVE-2023-424.html
* https://www.suse.com/security/cve/CVE-2023-4244.html
* https://www.suse.com/security/cve/CVE-2023-47233.html
* https://www.suse.com/security/cve/CVE-2023-52433.html
* https://www.suse.com/security/cve/CVE-2023-52581.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52654.html
* https://www.suse.com/security/cve/CVE-2023-52655.html
* https://www.suse.com/security/cve/CVE-2023-52686.html
* https://www.suse.com/security/cve/CVE-2023-52840.html
* https://www.suse.com/security/cve/CVE-2023-52871.html
* https://www.suse.com/security/cve/CVE-2023-52880.html
* https://www.suse.com/security/cve/CVE-2023-6531.html
* https://www.suse.com/security/cve/CVE-2024-26581.html
* https://www.suse.com/security/cve/CVE-2024-26643.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26921.html
* https://www.suse.com/security/cve/CVE-2024-26925.html
* https://www.suse.com/security/cve/CVE-2024-26929.html
* https://www.suse.com/security/cve/CVE-2024-26930.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-27413.html
* https://www.suse.com/security/cve/CVE-2024-35811.html
* https://www.suse.com/security/cve/CVE-2024-35895.html
* https://www.suse.com/security/cve/CVE-2024-35914.html
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1151927
* https://bugzilla.suse.com/show_bug.cgi?id=1152472
* https://bugzilla.suse.com/show_bug.cgi?id=1154353
* https://bugzilla.suse.com/show_bug.cgi?id=1156395
* https://bugzilla.suse.com/show_bug.cgi?id=1174585
* https://bugzilla.suse.com/show_bug.cgi?id=1176447
* https://bugzilla.suse.com/show_bug.cgi?id=1176774
* https://bugzilla.suse.com/show_bug.cgi?id=1176869
* https://bugzilla.suse.com/show_bug.cgi?id=1178134
* https://bugzilla.suse.com/show_bug.cgi?id=1181147
* https://bugzilla.suse.com/show_bug.cgi?id=1184631
* https://bugzilla.suse.com/show_bug.cgi?id=1185570
* https://bugzilla.suse.com/show_bug.cgi?id=1185589
* https://bugzilla.suse.com/show_bug.cgi?id=1185902
* https://bugzilla.suse.com/show_bug.cgi?id=1186885
* https://bugzilla.suse.com/show_bug.cgi?id=1187357
* https://bugzilla.suse.com/show_bug.cgi?id=1188616
* https://bugzilla.suse.com/show_bug.cgi?id=1188772
* https://bugzilla.suse.com/show_bug.cgi?id=1189883
* https://bugzilla.suse.com/show_bug.cgi?id=1190795
* https://bugzilla.suse.com/show_bug.cgi?id=1191452
* https://bugzilla.suse.com/show_bug.cgi?id=1192107
* https://bugzilla.suse.com/show_bug.cgi?id=1194288
* https://bugzilla.suse.com/show_bug.cgi?id=1194591
* https://bugzilla.suse.com/show_bug.cgi?id=1196956
* https://bugzilla.suse.com/show_bug.cgi?id=1197760
* https://bugzilla.suse.com/show_bug.cgi?id=1198029
* https://bugzilla.suse.com/show_bug.cgi?id=1199304
* https://bugzilla.suse.com/show_bug.cgi?id=1200619
* https://bugzilla.suse.com/show_bug.cgi?id=1203389
* https://bugzilla.suse.com/show_bug.cgi?id=1206646
* https://bugzilla.suse.com/show_bug.cgi?id=1209657
* https://bugzilla.suse.com/show_bug.cgi?id=1210335
* https://bugzilla.suse.com/show_bug.cgi?id=1210629
* https://bugzilla.suse.com/show_bug.cgi?id=1213476
* https://bugzilla.suse.com/show_bug.cgi?id=1215420
* https://bugzilla.suse.com/show_bug.cgi?id=1216702
* https://bugzilla.suse.com/show_bug.cgi?id=1217169
* https://bugzilla.suse.com/show_bug.cgi?id=1220137
* https://bugzilla.suse.com/show_bug.cgi?id=1220144
* https://bugzilla.suse.com/show_bug.cgi?id=1220754
* https://bugzilla.suse.com/show_bug.cgi?id=1220877
* https://bugzilla.suse.com/show_bug.cgi?id=1220960
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221113
* https://bugzilla.suse.com/show_bug.cgi?id=1221829
* https://bugzilla.suse.com/show_bug.cgi?id=1222251
* https://bugzilla.suse.com/show_bug.cgi?id=1222619
* https://bugzilla.suse.com/show_bug.cgi?id=1222838
* https://bugzilla.suse.com/show_bug.cgi?id=1222867
* https://bugzilla.suse.com/show_bug.cgi?id=1223084
* https://bugzilla.suse.com/show_bug.cgi?id=1223138
* https://bugzilla.suse.com/show_bug.cgi?id=1223384
* https://bugzilla.suse.com/show_bug.cgi?id=1223390
* https://bugzilla.suse.com/show_bug.cgi?id=1223512
* https://bugzilla.suse.com/show_bug.cgi?id=1223932
* https://bugzilla.suse.com/show_bug.cgi?id=1223934
* https://bugzilla.suse.com/show_bug.cgi?id=1224099
* https://bugzilla.suse.com/show_bug.cgi?id=1224174
* https://bugzilla.suse.com/show_bug.cgi?id=1224438
* https://bugzilla.suse.com/show_bug.cgi?id=1224482
* https://bugzilla.suse.com/show_bug.cgi?id=1224511
* https://bugzilla.suse.com/show_bug.cgi?id=1224592
* https://bugzilla.suse.com/show_bug.cgi?id=1224816
* https://bugzilla.suse.com/show_bug.cgi?id=1224826
* https://bugzilla.suse.com/show_bug.cgi?id=1224830
* https://bugzilla.suse.com/show_bug.cgi?id=1224831
* https://bugzilla.suse.com/show_bug.cgi?id=1224832
* https://bugzilla.suse.com/show_bug.cgi?id=1224834
* https://bugzilla.suse.com/show_bug.cgi?id=1224841
* https://bugzilla.suse.com/show_bug.cgi?id=1224842
* https://bugzilla.suse.com/show_bug.cgi?id=1224843
* https://bugzilla.suse.com/show_bug.cgi?id=1224844
* https://bugzilla.suse.com/show_bug.cgi?id=1224846
* https://bugzilla.suse.com/show_bug.cgi?id=1224849
* https://bugzilla.suse.com/show_bug.cgi?id=1224852
* https://bugzilla.suse.com/show_bug.cgi?id=1224853
* https://bugzilla.suse.com/show_bug.cgi?id=1224854
* https://bugzilla.suse.com/show_bug.cgi?id=1224859
* https://bugzilla.suse.com/show_bug.cgi?id=1224882
* https://bugzilla.suse.com/show_bug.cgi?id=1224886
* https://bugzilla.suse.com/show_bug.cgi?id=1224888
* https://bugzilla.suse.com/show_bug.cgi?id=1224889
* https://bugzilla.suse.com/show_bug.cgi?id=1224891
* https://bugzilla.suse.com/show_bug.cgi?id=1224892
* https://bugzilla.suse.com/show_bug.cgi?id=1224893
* https://bugzilla.suse.com/show_bug.cgi?id=1224899
* https://bugzilla.suse.com/show_bug.cgi?id=1224904
* https://bugzilla.suse.com/show_bug.cgi?id=1224907
* https://bugzilla.suse.com/show_bug.cgi?id=1224909
* https://bugzilla.suse.com/show_bug.cgi?id=1224916
* https://bugzilla.suse.com/show_bug.cgi?id=1224917
* https://bugzilla.suse.com/show_bug.cgi?id=1224922
* https://bugzilla.suse.com/show_bug.cgi?id=1224923
* https://bugzilla.suse.com/show_bug.cgi?id=1224924
* https://bugzilla.suse.com/show_bug.cgi?id=1224926
* https://bugzilla.suse.com/show_bug.cgi?id=1224928
* https://bugzilla.suse.com/show_bug.cgi?id=1224953
* https://bugzilla.suse.com/show_bug.cgi?id=1224954
* https://bugzilla.suse.com/show_bug.cgi?id=1224955
* https://bugzilla.suse.com/show_bug.cgi?id=1224957
* https://bugzilla.suse.com/show_bug.cgi?id=1224961
* https://bugzilla.suse.com/show_bug.cgi?id=1224963
* https://bugzilla.suse.com/show_bug.cgi?id=1224965
* https://bugzilla.suse.com/show_bug.cgi?id=1224966
* https://bugzilla.suse.com/show_bug.cgi?id=1224968
* https://bugzilla.suse.com/show_bug.cgi?id=1224981
* https://bugzilla.suse.com/show_bug.cgi?id=1224982
* https://bugzilla.suse.com/show_bug.cgi?id=1224983
* https://bugzilla.suse.com/show_bug.cgi?id=1224984
* https://bugzilla.suse.com/show_bug.cgi?id=1224987
* https://bugzilla.suse.com/show_bug.cgi?id=1224990
* https://bugzilla.suse.com/show_bug.cgi?id=1224993
* https://bugzilla.suse.com/show_bug.cgi?id=1224996
* https://bugzilla.suse.com/show_bug.cgi?id=1224997
* https://bugzilla.suse.com/show_bug.cgi?id=1225026
* https://bugzilla.suse.com/show_bug.cgi?id=1225030
* https://bugzilla.suse.com/show_bug.cgi?id=1225058
* https://bugzilla.suse.com/show_bug.cgi?id=1225060
* https://bugzilla.suse.com/show_bug.cgi?id=1225083
* https://bugzilla.suse.com/show_bug.cgi?id=1225084
* https://bugzilla.suse.com/show_bug.cgi?id=1225091
* https://bugzilla.suse.com/show_bug.cgi?id=1225112
* https://bugzilla.suse.com/show_bug.cgi?id=1225113
* https://bugzilla.suse.com/show_bug.cgi?id=1225128
* https://bugzilla.suse.com/show_bug.cgi?id=1225140
* https://bugzilla.suse.com/show_bug.cgi?id=1225143
* https://bugzilla.suse.com/show_bug.cgi?id=1225148
* https://bugzilla.suse.com/show_bug.cgi?id=1225155
* https://bugzilla.suse.com/show_bug.cgi?id=1225164
* https://bugzilla.suse.com/show_bug.cgi?id=1225177
* https://bugzilla.suse.com/show_bug.cgi?id=1225178
* https://bugzilla.suse.com/show_bug.cgi?id=1225181
* https://bugzilla.suse.com/show_bug.cgi?id=1225192
* https://bugzilla.suse.com/show_bug.cgi?id=1225193
* https://bugzilla.suse.com/show_bug.cgi?id=1225198
* https://bugzilla.suse.com/show_bug.cgi?id=1225201
* https://bugzilla.suse.com/show_bug.cgi?id=1225206
* https://bugzilla.suse.com/show_bug.cgi?id=1225207
* https://bugzilla.suse.com/show_bug.cgi?id=1225208
* https://bugzilla.suse.com/show_bug.cgi?id=1225214
* https://bugzilla.suse.com/show_bug.cgi?id=1225223
* https://bugzilla.suse.com/show_bug.cgi?id=1225224
* https://bugzilla.suse.com/show_bug.cgi?id=1225230
* https://bugzilla.suse.com/show_bug.cgi?id=1225232
* https://bugzilla.suse.com/show_bug.cgi?id=1225233
* https://bugzilla.suse.com/show_bug.cgi?id=1225237
* https://bugzilla.suse.com/show_bug.cgi?id=1225238
* https://bugzilla.suse.com/show_bug.cgi?id=1225243
* https://bugzilla.suse.com/show_bug.cgi?id=1225244
* https://bugzilla.suse.com/show_bug.cgi?id=1225247
* https://bugzilla.suse.com/show_bug.cgi?id=1225251
* https://bugzilla.suse.com/show_bug.cgi?id=1225252
* https://bugzilla.suse.com/show_bug.cgi?id=1225256
* https://bugzilla.suse.com/show_bug.cgi?id=1225261
* https://bugzilla.suse.com/show_bug.cgi?id=1225262
* https://bugzilla.suse.com/show_bug.cgi?id=1225263
* https://bugzilla.suse.com/show_bug.cgi?id=1225301
* https://bugzilla.suse.com/show_bug.cgi?id=1225303
* https://bugzilla.suse.com/show_bug.cgi?id=1225316
* https://bugzilla.suse.com/show_bug.cgi?id=1225318
* https://bugzilla.suse.com/show_bug.cgi?id=1225320
* https://bugzilla.suse.com/show_bug.cgi?id=1225321
* https://bugzilla.suse.com/show_bug.cgi?id=1225322
* https://bugzilla.suse.com/show_bug.cgi?id=1225326
* https://bugzilla.suse.com/show_bug.cgi?id=1225327
* https://bugzilla.suse.com/show_bug.cgi?id=1225328
* https://bugzilla.suse.com/show_bug.cgi?id=1225330
* https://bugzilla.suse.com/show_bug.cgi?id=1225333
* https://bugzilla.suse.com/show_bug.cgi?id=1225336
* https://bugzilla.suse.com/show_bug.cgi?id=1225341
* https://bugzilla.suse.com/show_bug.cgi?id=1225346
* https://bugzilla.suse.com/show_bug.cgi?id=1225351
* https://bugzilla.suse.com/show_bug.cgi?id=1225354
* https://bugzilla.suse.com/show_bug.cgi?id=1225355
* https://bugzilla.suse.com/show_bug.cgi?id=1225357
* https://bugzilla.suse.com/show_bug.cgi?id=1225358
* https://bugzilla.suse.com/show_bug.cgi?id=1225360
* https://bugzilla.suse.com/show_bug.cgi?id=1225361
* https://bugzilla.suse.com/show_bug.cgi?id=1225366
* https://bugzilla.suse.com/show_bug.cgi?id=1225367
* https://bugzilla.suse.com/show_bug.cgi?id=1225369
* https://bugzilla.suse.com/show_bug.cgi?id=1225370
* https://bugzilla.suse.com/show_bug.cgi?id=1225372
* https://bugzilla.suse.com/show_bug.cgi?id=1225374
* https://bugzilla.suse.com/show_bug.cgi?id=1225384
* https://bugzilla.suse.com/show_bug.cgi?id=1225386
* https://bugzilla.suse.com/show_bug.cgi?id=1225387
* https://bugzilla.suse.com/show_bug.cgi?id=1225390
* https://bugzilla.suse.com/show_bug.cgi?id=1225393
* https://bugzilla.suse.com/show_bug.cgi?id=1225400
* https://bugzilla.suse.com/show_bug.cgi?id=1225404
* https://bugzilla.suse.com/show_bug.cgi?id=1225405
* https://bugzilla.suse.com/show_bug.cgi?id=1225409
* https://bugzilla.suse.com/show_bug.cgi?id=1225411
* https://bugzilla.suse.com/show_bug.cgi?id=1225424
* https://bugzilla.suse.com/show_bug.cgi?id=1225427
* https://bugzilla.suse.com/show_bug.cgi?id=1225435
* https://bugzilla.suse.com/show_bug.cgi?id=1225437
* https://bugzilla.suse.com/show_bug.cgi?id=1225438
* https://bugzilla.suse.com/show_bug.cgi?id=1225439
* https://bugzilla.suse.com/show_bug.cgi?id=1225446
* https://bugzilla.suse.com/show_bug.cgi?id=1225447
* https://bugzilla.suse.com/show_bug.cgi?id=1225448
* https://bugzilla.suse.com/show_bug.cgi?id=1225450
* https://bugzilla.suse.com/show_bug.cgi?id=1225453
* https://bugzilla.suse.com/show_bug.cgi?id=1225455
* https://bugzilla.suse.com/show_bug.cgi?id=1225468
* https://bugzilla.suse.com/show_bug.cgi?id=1225499
* https://bugzilla.suse.com/show_bug.cgi?id=1225500
* https://bugzilla.suse.com/show_bug.cgi?id=1225508
* https://bugzilla.suse.com/show_bug.cgi?id=1225534



SUSE-SU-2024:1530-2: moderate: Security update for grafana and mybatis


# Security update for grafana and mybatis

Announcement ID: SUSE-SU-2024:1530-2
Rating: moderate
References:

* bsc#1219912
* bsc#1222155
* jsc#MSQA-760

Cross-References:

* CVE-2023-6152
* CVE-2024-1313

CVSS scores:

* CVE-2023-6152 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-1313 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6

An update that solves two vulnerabilities and contains one feature can now be
installed.

## Description:

This update for grafana and mybatis fixes the following issues:

grafana was updated to version 9.5.18:

* Grafana now requires Go 1.20
* Security issues fixed:

* CVE-2024-1313: Require same organisation when deleting snapshots
(bsc#1222155)

* CVE-2023-6152: Add email verification when updating user email (bsc#1219912)

* Other non-security related changes:

* Version 9.5.17:

* [FEATURE] Alerting: Backport use Alertmanager API v2
* Version 9.5.16:

* [BUGFIX] Annotations: Split cleanup into separate queries and deletes to avoid deadlocks on MySQL
* Version 9.5.15:

* [FEATURE] Alerting: Attempt to retry retryable errors
* Version 9.5.14:

* [BUGFIX] Alerting: Fix state manager to not keep datasource_uid and ref_id labels in state after Error
* [BUGFIX] Transformations: Config overrides being lost when config from query transform is applied
* [BUGFIX] LDAP: Fix enable users on successfull login
* Version 9.5.13:

* [BUGFIX] BrowseDashboards: Only remember the most recent expanded folder
* [BUGFIX] Licensing: Pass func to update env variables when starting plugin
* Version 9.5.12:

* [FEATURE] Azure: Add support for Workload Identity authentication
* Version 9.5.9:

* [FEATURE] SSE: Fix DSNode to not panic when response has empty response
* [FEATURE] Prometheus: Handle the response with different field key order
* [BUGFIX] LDAP: Fix user disabling

mybatis:

* `apache-commons-ognl` is now a non-optional dependency
* Fixed building with log4j v1 and v2 dependencies

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-1530=1

* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1530=1

## Package List:

* openSUSE Leap 15.6 (noarch)
* mybatis-javadoc-3.5.6-150200.5.6.1
* mybatis-3.5.6-150200.5.6.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* grafana-9.5.18-150200.3.56.1
* grafana-debuginfo-9.5.18-150200.3.56.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* grafana-9.5.18-150200.3.56.1
* grafana-debuginfo-9.5.18-150200.3.56.1

## References:

* https://www.suse.com/security/cve/CVE-2023-6152.html
* https://www.suse.com/security/cve/CVE-2024-1313.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219912
* https://bugzilla.suse.com/show_bug.cgi?id=1222155
* https://jira.suse.com/browse/MSQA-760



SUSE-SU-2024:2174-1: moderate: Security update for wget


# Security update for wget

Announcement ID: SUSE-SU-2024:2174-1
Rating: moderate
References:

* bsc#1226419

Cross-References:

* CVE-2024-38428

CVSS scores:

* CVE-2024-38428 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves one vulnerability can now be installed.

## Description:

This update for wget fixes the following issues:

* CVE-2024-38428: Fix mishandled semicolons in the userinfo subcomponent of a
URI. (bsc#1226419)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2174=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2174=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-2174=1

## Package List:

* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* wget-debugsource-1.20.3-150000.3.20.1
* wget-debuginfo-1.20.3-150000.3.20.1
* wget-1.20.3-150000.3.20.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* wget-debugsource-1.20.3-150000.3.20.1
* wget-debuginfo-1.20.3-150000.3.20.1
* wget-1.20.3-150000.3.20.1
* openSUSE Leap 15.5 (noarch)
* wget-lang-1.20.3-150000.3.20.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* wget-debugsource-1.20.3-150000.3.20.1
* wget-debuginfo-1.20.3-150000.3.20.1
* wget-1.20.3-150000.3.20.1

## References:

* https://www.suse.com/security/cve/CVE-2024-38428.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226419



SUSE-SU-2024:2153-1: important: Security update for vte


# Security update for vte

Announcement ID: SUSE-SU-2024:2153-1
Rating: important
References:

* bsc#1226134

Cross-References:

* CVE-2024-37535

CVSS scores:

* CVE-2024-37535 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP6
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves one vulnerability can now be installed.

## Description:

This update for vte fixes the following issues:

* CVE-2024-37535: Fixed a bug that allowed an attacker to cause a denial of
service (memory consumption) via a window resize escape. (bsc#1226134)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-2153=1 SUSE-2024-2153=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2153=1

* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2153=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* typelib-1_0-Vte-3_91-0.74.2-150600.3.3.1
* typelib-1_0-Vte-2_91-0.74.2-150600.3.3.1
* libvte-2_91-0-0.74.2-150600.3.3.1
* vte-tools-gtk4-0.74.2-150600.3.3.1
* vte-devel-0.74.2-150600.3.3.1
* vte-tools-0.74.2-150600.3.3.1
* libvte-2_91-0-debuginfo-0.74.2-150600.3.3.1
* vte-debuginfo-0.74.2-150600.3.3.1
* vte-tools-debuginfo-0.74.2-150600.3.3.1
* vte-tools-gtk4-debuginfo-0.74.2-150600.3.3.1
* vte-debugsource-0.74.2-150600.3.3.1
* openSUSE Leap 15.6 (noarch)
* vte-lang-0.74.2-150600.3.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* typelib-1_0-Vte-2_91-0.74.2-150600.3.3.1
* libvte-2_91-0-0.74.2-150600.3.3.1
* libvte-2_91-0-debuginfo-0.74.2-150600.3.3.1
* vte-debuginfo-0.74.2-150600.3.3.1
* vte-debugsource-0.74.2-150600.3.3.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* vte-debuginfo-0.74.2-150600.3.3.1
* vte-devel-0.74.2-150600.3.3.1
* typelib-1_0-Vte-3_91-0.74.2-150600.3.3.1
* vte-debugsource-0.74.2-150600.3.3.1
* Desktop Applications Module 15-SP6 (noarch)
* vte-lang-0.74.2-150600.3.3.1

## References:

* https://www.suse.com/security/cve/CVE-2024-37535.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226134



SUSE-SU-2024:2135-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:2135-1
Rating: important
References:

* bsc#1012628
* bsc#1065729
* bsc#1181674
* bsc#1187716
* bsc#1193599
* bsc#1194869
* bsc#1207948
* bsc#1208593
* bsc#1209657
* bsc#1213573
* bsc#1214852
* bsc#1215199
* bsc#1216196
* bsc#1216358
* bsc#1216702
* bsc#1217169
* bsc#1217384
* bsc#1217408
* bsc#1217489
* bsc#1217750
* bsc#1217959
* bsc#1218205
* bsc#1218336
* bsc#1218447
* bsc#1218562
* bsc#1218779
* bsc#1218917
* bsc#1219104
* bsc#1219170
* bsc#1219596
* bsc#1219623
* bsc#1219834
* bsc#1220021
* bsc#1220045
* bsc#1220120
* bsc#1220148
* bsc#1220328
* bsc#1220342
* bsc#1220428
* bsc#1220430
* bsc#1220569
* bsc#1220587
* bsc#1220738
* bsc#1220783
* bsc#1220915
* bsc#1221044
* bsc#1221276
* bsc#1221293
* bsc#1221303
* bsc#1221375
* bsc#1221504
* bsc#1221612
* bsc#1221615
* bsc#1221635
* bsc#1221645
* bsc#1221649
* bsc#1221765
* bsc#1221777
* bsc#1221783
* bsc#1221816
* bsc#1221829
* bsc#1221830
* bsc#1221858
* bsc#1222115
* bsc#1222173
* bsc#1222264
* bsc#1222273
* bsc#1222294
* bsc#1222301
* bsc#1222303
* bsc#1222304
* bsc#1222307
* bsc#1222357
* bsc#1222366
* bsc#1222368
* bsc#1222371
* bsc#1222378
* bsc#1222379
* bsc#1222385
* bsc#1222422
* bsc#1222426
* bsc#1222428
* bsc#1222437
* bsc#1222445
* bsc#1222459
* bsc#1222464
* bsc#1222489
* bsc#1222522
* bsc#1222525
* bsc#1222527
* bsc#1222531
* bsc#1222532
* bsc#1222549
* bsc#1222550
* bsc#1222557
* bsc#1222559
* bsc#1222563
* bsc#1222585
* bsc#1222586
* bsc#1222596
* bsc#1222606
* bsc#1222608
* bsc#1222613
* bsc#1222615
* bsc#1222618
* bsc#1222622
* bsc#1222624
* bsc#1222627
* bsc#1222630
* bsc#1222635
* bsc#1222721
* bsc#1222727
* bsc#1222769
* bsc#1222771
* bsc#1222772
* bsc#1222775
* bsc#1222777
* bsc#1222780
* bsc#1222782
* bsc#1222793
* bsc#1222799
* bsc#1222801
* bsc#1222968
* bsc#1223007
* bsc#1223011
* bsc#1223015
* bsc#1223016
* bsc#1223020
* bsc#1223023
* bsc#1223024
* bsc#1223030
* bsc#1223033
* bsc#1223034
* bsc#1223035
* bsc#1223038
* bsc#1223039
* bsc#1223041
* bsc#1223045
* bsc#1223046
* bsc#1223051
* bsc#1223052
* bsc#1223058
* bsc#1223060
* bsc#1223061
* bsc#1223076
* bsc#1223077
* bsc#1223084
* bsc#1223111
* bsc#1223113
* bsc#1223138
* bsc#1223143
* bsc#1223187
* bsc#1223189
* bsc#1223190
* bsc#1223191
* bsc#1223198
* bsc#1223202
* bsc#1223285
* bsc#1223315
* bsc#1223338
* bsc#1223369
* bsc#1223380
* bsc#1223384
* bsc#1223390
* bsc#1223439
* bsc#1223462
* bsc#1223532
* bsc#1223539
* bsc#1223575
* bsc#1223590
* bsc#1223591
* bsc#1223592
* bsc#1223593
* bsc#1223625
* bsc#1223628
* bsc#1223629
* bsc#1223633
* bsc#1223634
* bsc#1223637
* bsc#1223641
* bsc#1223643
* bsc#1223649
* bsc#1223650
* bsc#1223651
* bsc#1223652
* bsc#1223653
* bsc#1223654
* bsc#1223655
* bsc#1223660
* bsc#1223661
* bsc#1223663
* bsc#1223664
* bsc#1223665
* bsc#1223666
* bsc#1223668
* bsc#1223669
* bsc#1223670
* bsc#1223671
* bsc#1223675
* bsc#1223677
* bsc#1223678
* bsc#1223686
* bsc#1223692
* bsc#1223693
* bsc#1223695
* bsc#1223696
* bsc#1223698
* bsc#1223705
* bsc#1223712
* bsc#1223718
* bsc#1223728
* bsc#1223732
* bsc#1223735
* bsc#1223739
* bsc#1223741
* bsc#1223744
* bsc#1223745
* bsc#1223747
* bsc#1223748
* bsc#1223749
* bsc#1223750
* bsc#1223752
* bsc#1223754
* bsc#1223757
* bsc#1223759
* bsc#1223761
* bsc#1223762
* bsc#1223774
* bsc#1223782
* bsc#1223787
* bsc#1223788
* bsc#1223789
* bsc#1223790
* bsc#1223802
* bsc#1223805
* bsc#1223810
* bsc#1223822
* bsc#1223827
* bsc#1223831
* bsc#1223834
* bsc#1223838
* bsc#1223869
* bsc#1223870
* bsc#1223871
* bsc#1223872
* bsc#1223874
* bsc#1223944
* bsc#1223945
* bsc#1223946
* bsc#1223991
* bsc#1224076
* bsc#1224096
* bsc#1224098
* bsc#1224099
* bsc#1224137
* bsc#1224166
* bsc#1224174
* bsc#1224177
* bsc#1224180
* bsc#1224181
* bsc#1224331
* bsc#1224348
* bsc#1224423
* bsc#1224429
* bsc#1224430
* bsc#1224432
* bsc#1224433
* bsc#1224437
* bsc#1224438
* bsc#1224442
* bsc#1224443
* bsc#1224445
* bsc#1224449
* bsc#1224477
* bsc#1224479
* bsc#1224480
* bsc#1224481
* bsc#1224482
* bsc#1224486
* bsc#1224487
* bsc#1224488
* bsc#1224491
* bsc#1224492
* bsc#1224493
* bsc#1224494
* bsc#1224495
* bsc#1224500
* bsc#1224501
* bsc#1224502
* bsc#1224504
* bsc#1224505
* bsc#1224506
* bsc#1224507
* bsc#1224508
* bsc#1224509
* bsc#1224511
* bsc#1224513
* bsc#1224517
* bsc#1224519
* bsc#1224521
* bsc#1224524
* bsc#1224525
* bsc#1224526
* bsc#1224530
* bsc#1224531
* bsc#1224534
* bsc#1224537
* bsc#1224541
* bsc#1224542
* bsc#1224543
* bsc#1224546
* bsc#1224550
* bsc#1224552
* bsc#1224553
* bsc#1224555
* bsc#1224557
* bsc#1224558
* bsc#1224559
* bsc#1224562
* bsc#1224565
* bsc#1224566
* bsc#1224567
* bsc#1224568
* bsc#1224569
* bsc#1224571
* bsc#1224573
* bsc#1224576
* bsc#1224577
* bsc#1224578
* bsc#1224579
* bsc#1224580
* bsc#1224581
* bsc#1224582
* bsc#1224585
* bsc#1224586
* bsc#1224587
* bsc#1224588
* bsc#1224592
* bsc#1224596
* bsc#1224598
* bsc#1224600
* bsc#1224601
* bsc#1224602
* bsc#1224603
* bsc#1224605
* bsc#1224607
* bsc#1224608
* bsc#1224609
* bsc#1224611
* bsc#1224613
* bsc#1224615
* bsc#1224617
* bsc#1224618
* bsc#1224620
* bsc#1224621
* bsc#1224622
* bsc#1224623
* bsc#1224624
* bsc#1224626
* bsc#1224627
* bsc#1224628
* bsc#1224629
* bsc#1224630
* bsc#1224632
* bsc#1224633
* bsc#1224634
* bsc#1224636
* bsc#1224637
* bsc#1224638
* bsc#1224639
* bsc#1224640
* bsc#1224643
* bsc#1224644
* bsc#1224645
* bsc#1224646
* bsc#1224647
* bsc#1224648
* bsc#1224649
* bsc#1224650
* bsc#1224651
* bsc#1224652
* bsc#1224653
* bsc#1224654
* bsc#1224657
* bsc#1224660
* bsc#1224663
* bsc#1224664
* bsc#1224665
* bsc#1224666
* bsc#1224667
* bsc#1224668
* bsc#1224671
* bsc#1224672
* bsc#1224674
* bsc#1224675
* bsc#1224676
* bsc#1224677
* bsc#1224678
* bsc#1224679
* bsc#1224680
* bsc#1224681
* bsc#1224682
* bsc#1224683
* bsc#1224685
* bsc#1224686
* bsc#1224687
* bsc#1224688
* bsc#1224692
* bsc#1224696
* bsc#1224697
* bsc#1224699
* bsc#1224701
* bsc#1224703
* bsc#1224704
* bsc#1224705
* bsc#1224706
* bsc#1224707
* bsc#1224709
* bsc#1224710
* bsc#1224712
* bsc#1224714
* bsc#1224716
* bsc#1224717
* bsc#1224718
* bsc#1224719
* bsc#1224720
* bsc#1224721
* bsc#1224722
* bsc#1224723
* bsc#1224725
* bsc#1224727
* bsc#1224728
* bsc#1224729
* bsc#1224730
* bsc#1224731
* bsc#1224732
* bsc#1224733
* bsc#1224736
* bsc#1224738
* bsc#1224739
* bsc#1224740
* bsc#1224741
* bsc#1224742
* bsc#1224747
* bsc#1224749
* bsc#1224763
* bsc#1224764
* bsc#1224765
* bsc#1224766
* bsc#1224790
* bsc#1224792
* bsc#1224793
* bsc#1224803
* bsc#1224804
* bsc#1224866
* bsc#1224936
* bsc#1224989
* bsc#1225007
* bsc#1225053
* bsc#1225133
* bsc#1225134
* bsc#1225136
* bsc#1225172
* bsc#1225502
* bsc#1225578
* bsc#1225579
* bsc#1225580
* bsc#1225593
* bsc#1225605
* bsc#1225607
* bsc#1225610
* bsc#1225616
* bsc#1225618
* bsc#1225640
* bsc#1225642
* bsc#1225692
* bsc#1225694
* bsc#1225695
* bsc#1225696
* bsc#1225698
* bsc#1225699
* bsc#1225704
* bsc#1225705
* bsc#1225708
* bsc#1225710
* bsc#1225712
* bsc#1225714
* bsc#1225715
* bsc#1225720
* bsc#1225722
* bsc#1225728
* bsc#1225734
* bsc#1225735
* bsc#1225736
* bsc#1225747
* bsc#1225748
* bsc#1225749
* bsc#1225750
* bsc#1225756
* bsc#1225765
* bsc#1225766
* bsc#1225769
* bsc#1225773
* bsc#1225775
* bsc#1225842
* bsc#1225945
* jsc#PED-3184
* jsc#PED-3311
* jsc#PED-3535
* jsc#PED-4486
* jsc#PED-4593
* jsc#PED-5062
* jsc#PED-542
* jsc#PED-5728
* jsc#PED-5853
* jsc#PED-6079
* jsc#PED-6252
* jsc#PED-7542
* jsc#PED-7619
* jsc#PED-8111
* jsc#PED-8240

Cross-References:

* CVE-2023-0160
* CVE-2023-47233
* CVE-2023-52434
* CVE-2023-52458
* CVE-2023-52463
* CVE-2023-52472
* CVE-2023-52483
* CVE-2023-52492
* CVE-2023-52503
* CVE-2023-52591
* CVE-2023-52608
* CVE-2023-52616
* CVE-2023-52618
* CVE-2023-52631
* CVE-2023-52635
* CVE-2023-52640
* CVE-2023-52641
* CVE-2023-52645
* CVE-2023-52652
* CVE-2023-52653
* CVE-2023-52654
* CVE-2023-52655
* CVE-2023-52657
* CVE-2023-52658
* CVE-2023-52659
* CVE-2023-52660
* CVE-2023-52661
* CVE-2023-52662
* CVE-2023-52663
* CVE-2023-52664
* CVE-2023-52667
* CVE-2023-52669
* CVE-2023-52670
* CVE-2023-52671
* CVE-2023-52673
* CVE-2023-52674
* CVE-2023-52675
* CVE-2023-52676
* CVE-2023-52678
* CVE-2023-52679
* CVE-2023-52680
* CVE-2023-52681
* CVE-2023-52683
* CVE-2023-52685
* CVE-2023-52686
* CVE-2023-52687
* CVE-2023-52690
* CVE-2023-52691
* CVE-2023-52692
* CVE-2023-52693
* CVE-2023-52694
* CVE-2023-52695
* CVE-2023-52696
* CVE-2023-52697
* CVE-2023-52698
* CVE-2023-52771
* CVE-2023-52772
* CVE-2023-52860
* CVE-2023-52882
* CVE-2023-6238
* CVE-2023-6270
* CVE-2023-6531
* CVE-2023-7042
* CVE-2024-0639
* CVE-2024-21823
* CVE-2024-22099
* CVE-2024-23848
* CVE-2024-24861
* CVE-2024-25739
* CVE-2024-26601
* CVE-2024-26611
* CVE-2024-26614
* CVE-2024-26632
* CVE-2024-26638
* CVE-2024-26642
* CVE-2024-26643
* CVE-2024-26652
* CVE-2024-26654
* CVE-2024-26656
* CVE-2024-26657
* CVE-2024-26671
* CVE-2024-26673
* CVE-2024-26674
* CVE-2024-26675
* CVE-2024-26679
* CVE-2024-26684
* CVE-2024-26685
* CVE-2024-26692
* CVE-2024-26696
* CVE-2024-26697
* CVE-2024-26704
* CVE-2024-26714
* CVE-2024-26726
* CVE-2024-26731
* CVE-2024-26733
* CVE-2024-26736
* CVE-2024-26737
* CVE-2024-26739
* CVE-2024-26740
* CVE-2024-26742
* CVE-2024-26756
* CVE-2024-26757
* CVE-2024-26760
* CVE-2024-267600
* CVE-2024-26761
* CVE-2024-26764
* CVE-2024-26769
* CVE-2024-26772
* CVE-2024-26773
* CVE-2024-26774
* CVE-2024-26775
* CVE-2024-26779
* CVE-2024-26783
* CVE-2024-26786
* CVE-2024-26791
* CVE-2024-26793
* CVE-2024-26794
* CVE-2024-26802
* CVE-2024-26805
* CVE-2024-26807
* CVE-2024-26815
* CVE-2024-26816
* CVE-2024-26822
* CVE-2024-26828
* CVE-2024-26832
* CVE-2024-26836
* CVE-2024-26844
* CVE-2024-26846
* CVE-2024-26848
* CVE-2024-26853
* CVE-2024-26854
* CVE-2024-26855
* CVE-2024-26856
* CVE-2024-26857
* CVE-2024-26858
* CVE-2024-26860
* CVE-2024-26861
* CVE-2024-26862
* CVE-2024-26866
* CVE-2024-26868
* CVE-2024-26870
* CVE-2024-26878
* CVE-2024-26881
* CVE-2024-26882
* CVE-2024-26883
* CVE-2024-26884
* CVE-2024-26885
* CVE-2024-26898
* CVE-2024-26899
* CVE-2024-26900
* CVE-2024-26901
* CVE-2024-26903
* CVE-2024-26906
* CVE-2024-26909
* CVE-2024-26921
* CVE-2024-26922
* CVE-2024-26923
* CVE-2024-26925
* CVE-2024-26928
* CVE-2024-26932
* CVE-2024-26933
* CVE-2024-26934
* CVE-2024-26935
* CVE-2024-26937
* CVE-2024-26938
* CVE-2024-26940
* CVE-2024-26943
* CVE-2024-26945
* CVE-2024-26946
* CVE-2024-26948
* CVE-2024-26949
* CVE-2024-26950
* CVE-2024-26951
* CVE-2024-26956
* CVE-2024-26957
* CVE-2024-26958
* CVE-2024-26960
* CVE-2024-26961
* CVE-2024-26962
* CVE-2024-26963
* CVE-2024-26964
* CVE-2024-26972
* CVE-2024-26973
* CVE-2024-26978
* CVE-2024-26979
* CVE-2024-26981
* CVE-2024-26982
* CVE-2024-26983
* CVE-2024-26984
* CVE-2024-26986
* CVE-2024-26988
* CVE-2024-26989
* CVE-2024-26990
* CVE-2024-26991
* CVE-2024-26992
* CVE-2024-26993
* CVE-2024-26994
* CVE-2024-26995
* CVE-2024-26996
* CVE-2024-26997
* CVE-2024-26999
* CVE-2024-27000
* CVE-2024-27001
* CVE-2024-27002
* CVE-2024-27003
* CVE-2024-27004
* CVE-2024-27008
* CVE-2024-27013
* CVE-2024-27014
* CVE-2024-27022
* CVE-2024-27027
* CVE-2024-27028
* CVE-2024-27029
* CVE-2024-27030
* CVE-2024-27031
* CVE-2024-27036
* CVE-2024-27046
* CVE-2024-27056
* CVE-2024-27057
* CVE-2024-27062
* CVE-2024-27067
* CVE-2024-27080
* CVE-2024-27388
* CVE-2024-27389
* CVE-2024-27393
* CVE-2024-27395
* CVE-2024-27396
* CVE-2024-27398
* CVE-2024-27399
* CVE-2024-27400
* CVE-2024-27401
* CVE-2024-27405
* CVE-2024-27408
* CVE-2024-27410
* CVE-2024-27411
* CVE-2024-27412
* CVE-2024-27413
* CVE-2024-27416
* CVE-2024-27417
* CVE-2024-27418
* CVE-2024-27431
* CVE-2024-27432
* CVE-2024-27434
* CVE-2024-27435
* CVE-2024-27436
* CVE-2024-35784
* CVE-2024-35786
* CVE-2024-35788
* CVE-2024-35789
* CVE-2024-35790
* CVE-2024-35791
* CVE-2024-35794
* CVE-2024-35795
* CVE-2024-35796
* CVE-2024-35799
* CVE-2024-35800
* CVE-2024-35801
* CVE-2024-35803
* CVE-2024-35804
* CVE-2024-35806
* CVE-2024-35808
* CVE-2024-35809
* CVE-2024-35810
* CVE-2024-35811
* CVE-2024-35812
* CVE-2024-35813
* CVE-2024-35814
* CVE-2024-35815
* CVE-2024-35817
* CVE-2024-35819
* CVE-2024-35821
* CVE-2024-35822
* CVE-2024-35823
* CVE-2024-35824
* CVE-2024-35825
* CVE-2024-35828
* CVE-2024-35829
* CVE-2024-35830
* CVE-2024-35833
* CVE-2024-35834
* CVE-2024-35835
* CVE-2024-35836
* CVE-2024-35837
* CVE-2024-35838
* CVE-2024-35841
* CVE-2024-35842
* CVE-2024-35845
* CVE-2024-35847
* CVE-2024-35849
* CVE-2024-35850
* CVE-2024-35851
* CVE-2024-35852
* CVE-2024-35854
* CVE-2024-35860
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35863
* CVE-2024-35864
* CVE-2024-35865
* CVE-2024-35866
* CVE-2024-35867
* CVE-2024-35868
* CVE-2024-35869
* CVE-2024-35870
* CVE-2024-35872
* CVE-2024-35875
* CVE-2024-35877
* CVE-2024-35878
* CVE-2024-35879
* CVE-2024-35883
* CVE-2024-35885
* CVE-2024-35887
* CVE-2024-35889
* CVE-2024-35891
* CVE-2024-35895
* CVE-2024-35901
* CVE-2024-35903
* CVE-2024-35904
* CVE-2024-35905
* CVE-2024-35907
* CVE-2024-35909
* CVE-2024-35911
* CVE-2024-35912
* CVE-2024-35914
* CVE-2024-35915
* CVE-2024-35916
* CVE-2024-35917
* CVE-2024-35921
* CVE-2024-35922
* CVE-2024-35924
* CVE-2024-35927
* CVE-2024-35928
* CVE-2024-35930
* CVE-2024-35931
* CVE-2024-35932
* CVE-2024-35933
* CVE-2024-35935
* CVE-2024-35936
* CVE-2024-35937
* CVE-2024-35938
* CVE-2024-35940
* CVE-2024-35943
* CVE-2024-35944
* CVE-2024-35945
* CVE-2024-35946
* CVE-2024-35947
* CVE-2024-35950
* CVE-2024-35951
* CVE-2024-35952
* CVE-2024-35953
* CVE-2024-35954
* CVE-2024-35955
* CVE-2024-35956
* CVE-2024-35958
* CVE-2024-35959
* CVE-2024-35960
* CVE-2024-35961
* CVE-2024-35963
* CVE-2024-35964
* CVE-2024-35965
* CVE-2024-35966
* CVE-2024-35967
* CVE-2024-35969
* CVE-2024-35971
* CVE-2024-35972
* CVE-2024-35973
* CVE-2024-35974
* CVE-2024-35975
* CVE-2024-35977
* CVE-2024-35978
* CVE-2024-35981
* CVE-2024-35982
* CVE-2024-35984
* CVE-2024-35986
* CVE-2024-35989
* CVE-2024-35990
* CVE-2024-35991
* CVE-2024-35992
* CVE-2024-35995
* CVE-2024-35997
* CVE-2024-35999
* CVE-2024-36002
* CVE-2024-36006
* CVE-2024-36007
* CVE-2024-36009
* CVE-2024-36011
* CVE-2024-36012
* CVE-2024-36013
* CVE-2024-36014
* CVE-2024-36015
* CVE-2024-36016
* CVE-2024-36018
* CVE-2024-36019
* CVE-2024-36020
* CVE-2024-36021
* CVE-2024-36025
* CVE-2024-36026
* CVE-2024-36029
* CVE-2024-36030
* CVE-2024-36032
* CVE-2024-36880
* CVE-2024-36885
* CVE-2024-36890
* CVE-2024-36891
* CVE-2024-36893
* CVE-2024-36894
* CVE-2024-36895
* CVE-2024-36896
* CVE-2024-36897
* CVE-2024-36898
* CVE-2024-36906
* CVE-2024-36918
* CVE-2024-36921
* CVE-2024-36922
* CVE-2024-36928
* CVE-2024-36930
* CVE-2024-36931
* CVE-2024-36936
* CVE-2024-36940
* CVE-2024-36941
* CVE-2024-36942
* CVE-2024-36944
* CVE-2024-36947
* CVE-2024-36949
* CVE-2024-36950
* CVE-2024-36951
* CVE-2024-36955
* CVE-2024-36959

CVSS scores:

* CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52434 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-52434 ( NVD ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52458 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52463 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52472 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52472 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52492 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52503 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52608 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52618 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-52631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52645 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52652 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52661 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2023-52662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2023-52663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52671 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52697 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52771 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52772 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52772 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52860 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6238 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6238 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-7042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0639 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-21823 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23848 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-23848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-24861 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-24861 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-25739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-25739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26601 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26614 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26632 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26638 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-26642 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26652 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26697 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26737 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26836 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26844 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26846 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26848 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26885 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26898 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26901 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-26901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26932 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26933 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26935 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26938 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26940 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26956 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26979 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-26979 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26986 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26988 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26989 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-26991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26992 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-26993 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-26994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26996 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27000 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27003 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27004 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27008 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-27013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27022 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27022 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27027 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-27028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27029 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27030 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-27031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-27046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27080 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-27388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27401 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-27405 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27408 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-27410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27411 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27418 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27431 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27432 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35789 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35803 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35809 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35822 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-35823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-35850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35869 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35875 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-35877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-35927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-35938 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-35940 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-35943 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35944 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-35945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35956 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35963 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-35964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35992 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35995 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-35997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35999 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-36002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36012 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36016 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36018 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-36019 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
* CVE-2024-36020 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36025 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-36026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36030 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36032 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-36880 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L
* CVE-2024-36885 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36894 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36898 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
* CVE-2024-36906 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-36918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36921 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-36922 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36928 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36931 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L
* CVE-2024-36936 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36940 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-36941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36942 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-36944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36947 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-36949 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36955 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36959 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.6
* Public Cloud Module 15-SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves 428 vulnerabilities, contains 15 features and has 78
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

* CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security
(bsc#1219170).
* CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct
aio_kiocb conversion (bsc#1222721).
* CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing
(bsc#1223111).
* CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization
(bsc#1222368).
* CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to
potentially crash the system (bsc#1209657).
* CVE-2024-26993: Fixed fs/sysfs reference leak in
sysfs_break_active_protection() (bsc#1223693).
* CVE-2024-27013: Fixed tun limit printing rate when illegal packet received
by tun device (bsc#1223745).
* CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS
(bsc#1223735).
* CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in
dc_state_release (bsc#1223664).
* CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue exists
(bsc#1223822).
* CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and
swapoff() (bsc#1223655).
* CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device()
(bsc#1223686).
* CVE-2024-23848: Fixed media/cec for possible use-after-free in
cec_queue_msg_fh (bsc#1219104).
* CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value
of zero (bsc#1223634).
* CVE-2024-26878: Fixed quota for potential NULL pointer dereference
(bsc#1223060).
* CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent
kernel-infoleak (bsc#1223198).
* CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357).
* CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group
in ext4_mb_find_by_goal() (bsc#1222613).
* CVE-2024-26906: Disallowed vsyscall page read for copy_from_kernel_nofault()
(bsc#1223202).
* CVE-2024-26816: Ignore relocations in .notes section when building with
CONFIG_XEN_PV=y (bsc#1222624).
* CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a
wrong zone index (bsc#1222615).
* CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches
(bsc#1223035).
* CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches
(bsc#1223189).
* CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches
(bsc#1223190).
* CVE-2024-26882: Fixed net/ip_tunnel to make sure to pull inner header in
ip_tunnel_rcv() (bsc#1223034).
* CVE-2023-52645: Fixed pmdomain/mediatek race conditions with genpd
(bsc#1223033).
* CVE-2024-26836: Fixed platform/x86/think-lmi password opcode ordering for
workstations (bsc#1222968).
* CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay
(bsc#1220342).
* CVE-2024-26773: Fixed ext4 block allocation from corrupted group in
ext4_mb_try_best_found() (bsc#1222618).
* CVE-2024-26807: Fixed spi/cadence-qspi NULL pointer reference in runtime PM
hooks (bsc#1222801).
* CVE-2024-26737: Fixed selftests/bpf racing between bpf_timer_cancel_and_free
and bpf_timer_cancel (bsc#1222557).
* CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
* CVE-2024-26684: Fixed net/stmmac/xgmac handling of DPP safety error for DMA
channels (bsc#1222445).
* CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len
in ext4 (bsc#1222422).
* CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via
directory renaming (bsc#1221044).
* CVE-2023-52503: Fixed tee/amdtee use-after-free vulnerability in
amdtee_close_session (bsc#1220915).
* CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter
nf_tables (bsc#1221830).
* CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks
(bsc#1221293).
* CVE-2024-25739: Fixed possible crash in create_empty_lvol() in
drivers/mtd/ubi/vtbl.c (bsc#1219834).
* CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts
(bsc#1218562).
* CVE-2024-36030: Fix the double free in rvu_npc_freemem() (bsc#1225712)
* CVE-2023-52698: Fix memory leak in netlbl_calipso_add_pass() (bsc#1224621)
* CVE-2024-26860: Fix a memory leak when rechecking the data (bsc#1223077).
* CVE-2023-52772: Fix use-after-free in unix_stream_read_actor()
(bsc#1224989).
* CVE-2024-27431: Zero-initialise xdp_rxq_info struct before running XDP
program (bsc#1224718).
* CVE-2024-35860: Support deferring bpf_link dealloc to after RCU grace period
BPF link for some program types (bsc#1224531).
* CVE-2024-35964: Fix not validating setsockopt user input Check user input
length before copying data (bsc#1224581).
* CVE-2023-0160: Prevent lock inversion deadlock in map delete elem
(bsc#1209657).
* CVE-2024-35903: Fix IP after emitting call depth accounting Adjust the IP
passed to `emit_patch` so it calculates the correct offset for the CALL
instruction if `x86_call_depth_emit_accounting` emits code (bsc#1224493).
* CVE-2024-35931: Skip do PCI error slot reset during RAS recovery
(bsc#1224652).
* CVE-2024-35877: Fix VM_PAT handling in COW mappings (bsc#1224525).
* CVE-2024-35969: Fix race condition between ipv6_get_ifaddr and ipv6_del_addr
(bsc#1224580)
* CVE-2024-35852: Fix memory leak when canceling rehash work The rehash
delayed work is rescheduled with a delay if the number of credits at end of
the work is not negative as supposedly it means that the migration ended
(bsc#1224502).
* CVE-2024-36006: Fix incorrect list API usage (bsc#1224541).
* CVE-2024-36007: Fix warning during rehash (bsc#1224543).
* CVE-2024-35872: Fix GUP-fast succeeding on secretmem folios (bsc#1224530).
* CVE-2024-35956: Fix qgroup prealloc rsv leak in subvolume operations
(bsc#1224674)
* CVE-2023-52771: Fix delete_endpoint() vs parent unregistration race
(bsc#1225007).
* CVE-2024-27408: Add sync read before starting the DMA transfer in remote
setup (bsc#1224430).
* CVE-2024-35943: Add a null pointer check to the omap_prm_domain_init
devm_kasprintf()returns a pointer to dynamically allocated memory which can
be NULL upon failure (bsc#1224649).
* CVE-2024-35921: Fix oops when HEVC init fails (bsc#1224477).
* CVE-2023-52860: Use cpuhp_state_remove_instance_nocalls() for hisi_hns3_pmu
uninit process (bsc#1224936).
* CVE-2024-35991: kABI workaround for struct idxd_evl (bsc#1224553).
* CVE-2024-35854: Fix possible use-after-free during rehash (bsc#1224636).
* CVE-2024-27418: Take ownership of skb in mctp_local_output (bsc#1224720)
* CVE-2024-27417: Fix potential "struct net" leak in inet6_rtm_getaddr()
(bsc#1224721).
* CVE-2024-35905: Protect against int overflow for stack access size
(bsc#1224488).
* CVE-2024-35917: Fix bpf_plt pointer arithmetic (bsc#1224481).
* CVE-2023-52674: Add clamp() in scarlett2_mixer_ctl_put() to nsure the value
passed to scarlett2_mixer_ctl_put() is between 0 and
SCARLETT2_MIXER_MAX_VALUE so we don't attempt to access outside
scarlett2_mixer_values[] (bsc#1224727).
* CVE-2023-52680: Add missing error checks to __ctl_get() because the_
_ctl_get() functions which call scarlett2_update_ *() were not checking the
return value (bsc#1224608).
* CVE-2023-52692: Add missing error check to scarlett2_usb_set_config()
scarlett2_usb_set_config() calls scarlett2_usb_get() but was not checking
the result (bsc#1224628).
* CVE-2024-35944: Fix memcpy() run-time warning in dg_dispatch_as_host()
Syzkaller hit 'WARNING in dg_dispatch_as_host' bug (bsc#1224648).
* CVE-2024-26923: Suppress false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223384).
* CVE-2023-52659: Ensure input to pfn_to_kaddr() is treated as a 64-bit type
(bsc#1224442).
* CVE-2024-21823: Hardware logic with insecure de-synchronization in Intel(R)
DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R)
processors may have allowed an authorized user to potentially enable denial
of service via local access (bsc#1223625).
* CVE-2024-26828: Fix underflow in parse_server_interfaces() (bsc#1223084).
* CVE-2024-27395: Fix Use-After-Free in ovs_ct_exit Since kfree_rcu
(bsc#1224098).
* CVE-2023-52483: Perform route lookups under a RCU read-side lock
(bsc#1220738).
* CVE-2024-27396: Fix Use-After-Free in gtp_dellink (bsc#1224096).
* CVE-2024-26632: Fix iterating over an empty bio with bio_for_each_folio_all
(bsc#1221635).
* CVE-2024-27401: Ensure that packet_buffer_get respects the user_length
provided. (bsc#1224181).
* CVE-2024-26775: Avoid potential deadlock at set_capacity (bsc#1222627).
* CVE-2024-26958: Fix UAF in direct writes (bsc#1223653).
* CVE-2024-26643: Mark set as dead when unbinding anonymous set with timeout
While the rhashtable set gc runs asynchronously, a race allowed it to
collect elements from anonymous sets with timeouts while it is being
released from the commit path. (bsc#1221829).
* CVE-2023-52618: Check for unlikely string overflow (bsc#1221615).
* CVE-2023-6238: Only privileged user could specify a small meta buffer and
let the device perform larger Direct Memory Access (DMA) into the same
buffer, overwriting unrelated kernel memory, causing random kernel crashes
and memory corruption (bsc#1217384).
* CVE-2024-26946: Use copy_from_kernel_nofault() to read from unsafe address
Read from an unsafe address with copy_from_kernel_nofault() in
arch_adjust_kprobe_addr() because this function is used before checking the
address is in text or not (bsc#1223669).
* CVE-2024-26945: Fix nr_cpus nr_iaa case If nr_cpus nr_iaa, the calculated
cpus_per_iaa will be 0, which causes a divide-by-0 in rebalance_wq_table()
(bsc#1223732).
* CVE-2024-26679: Read sk->sk_family once in inet_recv_error()
inet_recv_error() is called without holding the socket lock. IPv6 socket
could mutate to IPv4 with IPV6_ADDRFORM socket option and trigger a KCSAN
warning (bsc#1222385).
* CVE-2024-26791: Properly validate device names (bsc#1222793)
* CVE-2023-52641: Add NULL ptr dereference checking at the end of
attr_allocate_frame() (bsc#1222303)
* CVE-2024-26726: Do not drop extent_map for free space inode on write error
(bsc#1222532)
* CVE-2024-27022: Defer linking file vma until vma is fully initialized
(bsc#1223774).
* CVE-2024-26899: Fix deadlock between bd_link_disk_holder and partition scan
(bsc#1223045).
* CVE-2024-26638: Always initialize struct msghdr completely (bsc#1221649).
* CVE-2024-26909: Fix drm bridge use-after-free A recent DRM series purporting
to simplify support (bsc#1223143).
* CVE-2024-26674: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups
(bsc#1222378).
* CVE-2024-26832: Fix missing folio cleanup in writeback race path
(bsc#1223007).
* CVE-2024-26844: Fix WARNING in _copy_from_iter (bsc#1223015).
* CVE-2024-26774: Avoid dividing by 0 in mb_update_avg_fragment_size() when
block bitmap corrupt (bsc#1222622).
* CVE-2024-26815: Properly check TCA_TAPRIO_TC_ENTRY_INDEX (bsc#1222635).
* cve-2024-267600: Fix bio_put() for error case (bsc#1222596).
* CVE-2024-26731: Fix NULL pointer dereference in
sk_psock_verdict_data_ready() (bsc#1222371).
* CVE-2024-26740: Use the backlog for mirred ingress (bsc#1222563).
* CVE-2023-52640: Fix oob in ntfs_listxattr The length of name cannot exceed
the space occupied by ea (bsc#1222301).
* CVE-2023-52631: Fix a NULL dereference bug (bsc#1222264).
* CVE-2023-52458: Add check that partition length needs to be aligned with
block size (bsc#1220428).
* CVE-2023-6270: Fix the potential use-after-free problem in aoecmd_cfg_pkts
(bsc#1218562).
* CVE-2024-26805: Fix kernel-infoleak-after-free in __skb_datagram_iter
(bsc#1222630).
* CVE-2024-26991: Do not overflow lpage_info when checking attributes
(bsc#1223695).

* CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).

* CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path
(bsc#1223390).
* CVE-2024-26822: Set correct id, uid and cruid for multiuser automounts
(bsc#1223011).
* CVE-2023-52434: Fixed potential OOBs in smb2_parse_contexts() (bsc#1220148).
* CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show()
(bsc#1223532).
* CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550).
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1224766).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1224764).
* CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break()
(bsc#1224763).
* CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break()
(bsc#1224668).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1224765).
* CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664).
* CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write()
(bsc#1224678).
* CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key() (bsc#1224667).
* CVE-2024-35869: Guarantee refcounted children from parent session
(bsc#1224679).
* CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224672).
* CVE-2024-26692: Fixed regression in writes when non-standard maximum write
size negotiated (bsc#1222464).
* CVE-2024-27036: Fixed writeback data corruption (bsc#1223810).

The following non-security bugs were fixed:

* 9p: add missing locking around taking dentry fid list (git-fixes)
* ACPI: CPPC: Fix access width used for PCC registers (git-fixes).
* ACPI: CPPC: Fix bit_offset shift in MASK_VAL() macro (git-fixes).
* ACPI: CPPC: Use access_width over bit_width for system memory accesses
(stable-fixes).
* ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes).
* ACPI: LPSS: Advertise number of chip selects via property (git-fixes).
* ACPI: bus: Indicate support for IRQ ResourceSource thru _OSC (git-fixes).
* ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes).
* ACPI: bus: Indicate support for the Generic Event Device thru _OSC (git-
fixes).
* ACPI: disable -Wstringop-truncation (git-fixes).
* ACPI: resource: Add Infinity laptops to irq1_edge_low_force_override
(stable-fixes).
* ACPI: resource: Do IRQ override on Lunnen Ground laptops (stable-fixes).
* ACPI: scan: Do not increase dep_unmet for already met dependencies (git-
fixes).
* ACPI: video: Add backlight=native quirk for Lenovo Slim 7 16ARH7
(bsc#1217750).
* ACPI: x86: Move acpi_quirk_skip_serdev_enumeration() out of
CONFIG_X86_ANDROID_TABLETS (stable-fixes).
* ACPICA: debugger: check status of acpi_evaluate_object() in
acpi_db_walk_for_fields() (git-fixes).
* ALSA/hda: intel-dsp-config: reduce log verbosity (git-fixes).
* ALSA: Fix deadlocks with kctl removals at disconnection (stable-fixes).
* ALSA: aoa: avoid false-positive format truncation warning (git-fixes).
* ALSA: core: Fix NULL module pointer assignment at card init (git-fixes).
* ALSA: core: Remove debugfs at disconnection (git-fixes).
* ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block
counter (stable-fixes).
* ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes).
* ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC
(stable-fixes).
* ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes).
* ALSA: hda/realtek - Set GPIO3 to default at S4 state for Thinkpad with
ALC1318 (stable-fixes).
* ALSA: hda/realtek - fixed headset Mic not show (stable-fixes).
* ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes).
* ALSA: hda/realtek: Add quirk for HP Spectre x360 14 eu0000 (stable-fixes).
* ALSA: hda/realtek: Add quirks for ASUS Laptops using CS35L56 (stable-fixes).
* ALSA: hda/realtek: Add quirks for HP Omen models using CS35L41 (stable-
fixes).
* ALSA: hda/realtek: Add quirks for Huawei Matebook D14 NBLB-WAX9N (stable-
fixes).
* ALSA: hda/realtek: Add quirks for Lenovo 13X (stable-fixes).
* ALSA: hda/realtek: Add quirks for some Clevo laptops (stable-fixes).
* ALSA: hda/realtek: Add sound quirks for Lenovo Legion slim 7 16ARHA7 models
(stable-fixes).
* ALSA: hda/realtek: Add support for ASUS Zenbook 2024 HN7306W (stable-fixes).
* ALSA: hda/realtek: Adjust G814JZR to use SPI init for amp (git-fixes).
* ALSA: hda/realtek: Drop doubly quirk entry for 103c:8a2e (git-fixes).
* ALSA: hda/realtek: Enable headset mic of JP-IK LEAP W502 with ALC897
(stable-fixes).
* ALSA: hda/realtek: Fix build error without CONFIG_PM (stable-fixes).
* ALSA: hda/realtek: Fix conflicting PCI SSID 17aa:386f for Lenovo Legion
models (bsc#1223462).
* ALSA: hda/realtek: Fix internal speakers for Legion Y9000X 2022 IAH7
(stable-fixes).
* ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes).
* ALSA: hda/realtek: Fix volumn control of ThinkBook 16P Gen4 (git-fixes).
* ALSA: hda/realtek: Fixes for Asus GU605M and GA403U sound (stable-fixes).
* ALSA: hda/realtek: Update Panasonic CF-SZ6 quirk to support headset with
microphone (git-fixes).
* ALSA: hda/realtek: cs35l41: Support ASUS ROG G634JYR (stable-fixes).
* ALSA: hda/realtek: fix mute/micmute LEDs do not work for ProBook 440/460 G11
(stable-fixes).
* ALSA: hda/realtek: fix the hp playback volume issue for LG machines (stable-
fixes).
* ALSA: hda/tas2781: Add new vendor_id and subsystem_id to support ThinkPad
ICE-1 (stable-fixes).
* ALSA: hda/tas2781: add locks to kcontrols (git-fixes).
* ALSA: hda/tas2781: correct the register for pow calibrated data (git-fixes).
* ALSA: hda/tas2781: remove digital gain kcontrol (git-fixes).
* ALSA: hda: Add Intel BMG PCI ID and HDMI codec vid (stable-fixes).
* ALSA: hda: clarify Copyright information (stable-fixes).
* ALSA: hda: cs35l41: Add support for ASUS ROG 2024 Laptops (stable-fixes).
* ALSA: hda: cs35l41: Ignore errors when configuring IRQs (stable-fixes).
* ALSA: hda: cs35l41: Remove Speaker ID for Lenovo Legion slim 7 16ARHA7 (git-
fixes).
* ALSA: hda: cs35l41: Remove redundant argument to
cs35l41_request_firmware_file() (stable-fixes).
* ALSA: hda: cs35l41: Set the max PCM Gain using tuning setting (stable-
fixes).
* ALSA: hda: cs35l41: Support HP Omen models without _DSD (stable-fixes).
* ALSA: hda: cs35l41: Support Lenovo 13X laptop without _DSD (stable-fixes).
* ALSA: hda: cs35l41: Update DSP1RX5/6 Sources for DSP config (stable-fixes).
* ALSA: hda: cs35l56: Add ACPI device match tables (git-fixes).
* ALSA: hda: cs35l56: Exit cache-only after cs35l56_wait_for_firmware_boot()
(stable-fixes).
* ALSA: hda: cs35l56: Fix lifetime of cs_dsp instance (git-fixes).
* ALSA: hda: cs35l56: Set the init_done flag before component_add() (git-
fixes).
* ALSA: hda: hda_cs_dsp_ctl: Remove notification of driver write (stable-
fixes).
* ALSA: hda: intel-dsp-config: harden I2C/I2S codec detection (stable-fixes).
* ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git-
fixes).
* ALSA: line6: Zero-initialize message buffers (stable-fixes).
* ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable-
fixes).
* ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable-
fixes).
* ALSA: scarlett2: Add correct product series name to messages (stable-fixes).
* ALSA: scarlett2: Add missing error check to scarlett2_config_save() (git-
fixes).
* ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes).
* ALSA: scarlett2: Default mixer driver to enabled (stable-fixes).
* ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes).
* ALSA: seq: Do not clear bank selection at event -> UMP MIDI2 conversion
(git-fixes).
* ALSA: seq: Fix incorrect UMP type for system messages (git-fixes).
* ALSA: seq: Fix missing bank setup between MIDI1/MIDI2 UMP conversion (git-
fixes).
* ALSA: seq: Fix yet another spot for system message conversion (git-fixes).
* ALSA: seq: ump: Fix conversion from MIDI2 to MIDI1 UMP messages (git-fixes).
* ALSA: seq: ump: Fix swapped song position pointer data (git-fixes).
* ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs (git-fixes).
* ALSA: timer: Set lower bound of start tick time (stable-fixes).
* ALSA: ump: Do not accept an invalid UMP protocol number (git-fixes).
* ALSA: ump: Do not clear bank selection after sending a program change (git-
fixes).
* ALSA: ump: Set default protocol when not given explicitly (git-fixes).
* ALSA: usb-audio: Add sampling rates support for Mbox3 (stable-fixes).
* ALSA: usb-audio: Fix for sampling rates support for Mbox3 (stable-fixes).
* ARM: 9381/1: kasan: clear stale stack poison (git-fixes).
* ARM: OMAP2+: fix N810 MMC gpiod table (git-fixes).
* ARM: OMAP2+: fix USB regression on Nokia N8x0 (git-fixes).
* ARM: imx: Check return value of devm_kasprintf in imx_mmdc_perf_init (git-
fixes).
* ARM: imx_v6_v7_defconfig: Restore CONFIG_BACKLIGHT_CLASS_DEVICE (git-fixes).
* ARM: prctl: reject PR_SET_MDWE on pre-ARMv6 (stable-fixes).
* ARM: s5pv210: fix pm.c kernel-doc warning (git-fixes).
* ASoC: Intel: Disable route checks for Skylake boards (git-fixes).
* ASoC: Intel: avs: Fix ASRC module initialization (git-fixes).
* ASoC: Intel: avs: Fix potential integer overflow (git-fixes).
* ASoC: Intel: avs: Populate board selection with new I2S entries (stable-
fixes).
* ASoC: Intel: avs: Set name of control as in topology (git-fixes).
* ASoC: Intel: avs: Test result of avs_get_module_entry() (git-fixes).
* ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes).
* ASoC: Intel: bytcr_rt5640: Apply Asus T100TA quirk to Asus T100TAM too (git-
fixes).
* ASoC: Intel: common: DMI remap for rebranded Intel NUC M15 (LAPRC710)
laptops (stable-fixes).
* ASoC: SOF: Intel: add default firmware library path for LNL (git-fixes).
* ASoC: SOF: Intel: hda-dsp: Skip IMR boot on ACE platforms in case of S3
suspend (stable-fixes).
* ASoC: SOF: Intel: lnl: Correct rom_status_reg (git-fixes).
* ASoC: SOF: Intel: mtl: Correct rom_status_reg (git-fixes).
* ASoC: SOF: Intel: mtl: Disable interrupts when firmware boot failed (git-
fixes).
* ASoC: SOF: Intel: mtl: Implement firmware boot state check (git-fixes).
* ASoC: SOF: Intel: mtl: call dsp dump when boot retry fails (stable-fixes).
* ASoC: SOF: amd: Optimize quirk for Valve Galileo (stable-fixes).
* ASoC: SOF: ipc4-pcm: Workaround for crashed firmware on system suspend
(stable-fixes).
* ASoC: SOF: ipc4-topology: Fix input format query of process modules without
base extension (git-fixes).
* ASoC: acp: Support microphone from device Acer 315-24p (git-fixes).
* ASoC: amd: acp: fix for acp_init function error handling (git-fixes).
* ASoC: amd: yc: Add Lenovo ThinkBook 21J0 into DMI quirk table (stable-
fixes).
* ASoC: amd: yc: Fix non-functional mic on ASUS M7600RE (stable-fixes).
* ASoC: amd: yc: Fix non-functional mic on Lenovo 21J2 (stable-fixes).
* ASoC: amd: yc: Revert "Fix non-functional mic on Lenovo 21J2" (stable-
fixes).
* ASoC: codecs: wsa881x: set clk_stop_mode1 flag (git-fixes).
* ASoC: cs35l41: Update DSP1RX5/6 Sources for DSP config (git-fixes).
* ASoC: cs35l56: Fix unintended bus access while resetting amp (git-fixes).
* ASoC: cs35l56: Prevent overwriting firmware ASP config (git-fixes).
* ASoC: da7219-aad: fix usage of device_get_named_child_node() (git-fixes).
* ASoC: kirkwood: Fix potential NULL dereference (git-fixes).
* ASoC: mediatek: Assign dummy when codec not specified for a DAI link (git-
fixes).
* ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes).
* ASoC: meson: axg-card: make links nonatomic (git-fixes).
* ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes).
* ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes).
* ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes).
* ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes).
* ASoC: ops: Fix wraparound for mask in snd_soc_get_volsw (git-fixes).
* ASoC: rockchip: i2s-tdm: Fix inaccurate sampling rates (git-fixes).
* ASoC: rt5645: Fix the electric noise due to the CBJ contacts floating (git-
fixes).
* ASoC: rt5645: Make LattePanda board DMI match more precise (stable-fixes).
* ASoC: rt5682-sdw: fix locking sequence (git-fixes).
* ASoC: rt711-sdca: fix locking sequence (git-fixes).
* ASoC: rt711-sdw: fix locking sequence (git-fixes).
* ASoC: rt712-sdca-sdw: fix locking sequence (git-fixes).
* ASoC: rt715-sdca: volume step modification (git-fixes).
* ASoC: rt715: add vendor clear control register (git-fixes).
* ASoC: rt722-sdca-sdw: fix locking sequence (git-fixes).
* ASoC: rt722-sdca: add headset microphone vrefo setting (git-fixes).
* ASoC: rt722-sdca: modify channel number to support 4 channels (git-fixes).
* ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes).
* ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes).
* ASoC: tas2781: Fix a warning reported by robot kernel test (git-fixes).
* ASoC: tas2781: Fix wrong loading calibrated data sequence (git-fixes).
* ASoC: tas2781: mark dvc_tlv with __maybe_unused (git-fixes).
* ASoC: tegra: Fix DSPK 16-bit playback (git-fixes).
* ASoC: ti: Convert Pandora ASoC to GPIO descriptors (stable-fixes).
* ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes).
* ASoC: tlv320adc3xxx: Do not strip remove function when driver is builtin
(git-fixes).
* ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).
* ASoC: wm_adsp: Add missing MODULE_DESCRIPTION() (git-fixes).
* ASoC: wm_adsp: Fix missing mutex_lock in wm_adsp_write_ctl() (git-fixes).
* Add alt-commit to a nouveau patch
* Add cherry-picked id to amdgpu patch
* Add cherry-picked id to amdgpu patch (git-fixes)
* Add cherry-picked patch references to amdgpu patches
* Add reference to L3 bsc#1225765 in BPF control flow graph and precision
backtrack fixes (bsc#1225756) The L3 bsc#1225765 was created seperately
since our customer requires PTF.
* Bluetooth: Add new quirk for broken read key length on ATS2851 (stable-
fixes).
* Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes).
* Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes).
* Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable-
fixes).
* Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes).
* Bluetooth: HCI: Fix potential null-ptr-deref (git-fixes).
* Bluetooth: ISO: Align broadcast sync_timeout with connection timeout
(stable-fixes).
* Bluetooth: ISO: Do not reject BT_ISO_QOS if parameters are unset (git-
fixes).
* Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes).
* Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect() (git-fixes).
* Bluetooth: MGMT: Fix failing to MGMT_OP_ADD_UUID/MGMT_OP_REMOVE_UUID
(bsc#1221504).
* Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes).
* Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes).
* Bluetooth: add quirk for broken address properties (git-fixes).
* Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable-
fixes).
* Bluetooth: btintel: Fixe build regression (git-fixes).
* Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable-
fixes).
* Bluetooth: btusb: Fix triggering coredump implementation for QCA (git-
fixes).
* Bluetooth: hci_core: Cancel request on command timeout (stable-fixes).
* Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes).
* Bluetooth: hci_event: set the conn encrypted before conn establishes
(stable-fixes).
* Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes).
* Bluetooth: hci_sync: Fix not checking error on hci_cmd_sync_cancel_sync
(git-fixes).
* Bluetooth: hci_sync: Fix using the same interval and window for Coded PHY
(git-fixes).
* Bluetooth: hci_sync: Use QoS to determine which PHY to scan (stable-fixes).
* Bluetooth: l2cap: Do not double set the HCI_CONN_MGMT_CONNECTED bit (git-
fixes).
* Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes).
* Bluetooth: mgmt: Fix limited discoverable off timeout (stable-fixes).
* Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes).
* Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes).
* Bluetooth: qca: add missing firmware sanity checks (git-fixes).
* Bluetooth: qca: fix NULL-deref on non-serdev setup (git-fixes).
* Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes).
* Bluetooth: qca: fix NVM configuration parsing (git-fixes).
* Bluetooth: qca: fix device-address endianness (git-fixes).
* Bluetooth: qca: fix firmware check error path (git-fixes).
* Bluetooth: qca: fix info leak when fetching fw build id (git-fixes).
* Delete patches.suse/btrfs-qgroup-fix-qgroup-prealloc-rsv-leak-in-
subvolu.patch. Quoting bsc#1225945#c11: "So the upstream 6.5 kernel commit
(1b53e51a4a8f ("btrfs: do not commit transaction for every subvol create") )
was never backported to SLE, so that fix eb96e221937a ("btrfs: fix unwritten
extent buffer after snapshotting a new subvolume") was never backported."
* Docs/admin-guide/mm/damon/usage: fix wrong example of DAMOS filter matching
sysfs file (git-fixes).
* Drop usb gadget patch that was taken mistakenly and reverted (git-fixes)
* EDAC/synopsys: Fix ECC status and IRQ control race condition (git-fixes).
* Edit "amdkfd: use calloc instead of kzalloc to avoid integer overflow"
Reference CVE and bug numbers.
* Enable CONFIG_FIPS_SIGNATURE_SELFTEST (bsc#1222771)
* Enable new CONFIG_FIPS_SIGNATURE_SELFTEST_ECDSA.
* Enable new CONFIG_FIPS_SIGNATURE_SELFTEST_RSA.
* Fix a potential infinite loop in extract_user_to_sg() (git-fixes).
* Fix build errors due to new UIO_MEM_DMA_COHERENT mess (git-fixes).
* Fix patches.suse/coresight-etm4x-Add-ACPI-support-in-platform-driver.patch
(bsc#1218779 bsc#1220587) Put back patch hunk which where missed because
file rename drivers/acpi/acpi_amba.c -> drivers/acpi/arm64/amba.c
* HID: amd_sfh: Handle "no sensors" in PM operations (git-fixes).
* HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up (git-
fixes).
* HID: input: avoid polling stylus battery on Chromebook Pompom (stable-
fixes).
* HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes).
* HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev->devc
(git-fixes).
* HID: logitech-dj: allow mice to use all types of reports (git-fixes).
* HID: multitouch: Add required quirk for Synaptics 0xcddc device (stable-
fixes).
* IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes)
* Input: cyapa - add missing input core locking to suspend/resume functions
(git-fixes).
* Input: gpio_keys_polled - suppress deferred probe error for gpio (stable-
fixes).
* Input: imagis - use FIELD_GET where applicable (stable-fixes).
* Input: ims-pcu - fix printf string overflow (git-fixes).
* Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes).
* Input: synaptics-rmi4 - fail probing if memory allocation for "phys" fails
(stable-fixes).
* Input: xpad - add additional HyperX Controller Identifiers (stable-fixes).
* Input: xpad - add support for Snakebyte GAMEPADs (stable-fixes).
* KEYS: trusted: Do not use WARN when encode fails (git-fixes).
* KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes).
* KVM: SVM: Add support for allowing zero SEV ASIDs (git-fixes).
* KVM: SVM: Flush pages under kvm->lock to fix UAF in
svm_register_enc_region() (git-fixes).
* KVM: SVM: Use unsigned integers when dealing with ASIDs (git-fixes).
* KVM: VMX: Disable LBR virtualization if the CPU does not support LBR
callstacks (git-fixes).
* KVM: VMX: Report up-to-date exit qualification to userspace (git-fixes).
* KVM: nVMX: Clear EXIT_QUALIFICATION when injecting an EPT Misconfig (git-
fixes).
* KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes
bsc#1224790).
* KVM: x86/mmu: Do not force emulation of L2 accesses to non-APIC internal
slots (git-fixes).
* KVM: x86/mmu: Move private vs. shared check above slot validity checks (git-
fixes).
* KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU (git-fixes).
* KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status
(git-fixes).
* KVM: x86/pmu: Allow programming events that match unsupported arch events
(git-fixes).
* KVM: x86/pmu: Always treat Fixed counters as available when supported (git-
fixes).
* KVM: x86/pmu: Apply "fast" RDPMC only to Intel PMUs (git-fixes).
* KVM: x86/pmu: Disable support for adaptive PEBS (git-fixes).
* KVM: x86/pmu: Disallow "fast" RDPMC for architectural Intel PMUs (git-
fixes).
* KVM: x86/pmu: Do not ignore bits 31:30 for RDPMC index on AMD (git-fixes).
* KVM: x86/pmu: Do not mask LVTPC when handling a PMI on AMD platforms (git-
fixes).
* KVM: x86/pmu: Explicitly check NMI from guest to reducee false positives
(git-fixes).
* KVM: x86/pmu: Prioritize VMX interception over #GP on RDPMC due to bad index
(git-fixes).
* KVM: x86/pmu: Set enable bits for GP counters in PERF_GLOBAL_CTRL at "RESET"
(git-fixes).
* KVM: x86/pmu: Zero out PMU metadata on AMD if PMU is disabled (git-fixes).
* KVM: x86/xen: fix recursive deadlock in timer injection (git-fixes).
* KVM: x86/xen: improve accuracy of Xen timers (git-fixes).
* KVM: x86/xen: inject vCPU upcall vector when local APIC is enabled (git-
fixes).
* KVM: x86/xen: remove WARN_ON_ONCE() with false positives in evtchn delivery
(git-fixes).
* KVM: x86: Allow, do not ignore, same-value writes to immutable MSRs (git-
fixes).
* KVM: x86: Fix broken debugregs ABI for 32 bit kernels (git-fixes).
* KVM: x86: Fully re-initialize supported_mce_cap on vendor module load (git-
fixes).
* KVM: x86: Introduce __kvm_get_hypervisor_cpuid() helper (git-fixes).
* KVM: x86: Mark target gfn of emulated atomic instruction as dirty (git-
fixes).
* KVM: x86: Only set APICV_INHIBIT_REASON_ABSENT if APICv is enabled (git-
fixes).
* KVM: x86: Snapshot if a vCPU's vendor model is AMD vs. Intel compatible
(git-fixes).
* KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP
(git-fixes).
* KVM: x86: Use actual kvm_cpuid.base for clearing KVM_FEATURE_PV_UNHALT (git-
fixes).
* Move out-of-tree powerpc patch to the right section
* Move the upstreamed BT fix patch to sorted section
* Move the upstreamed BT patch into sorted section
* Move upstreamed ACPI patch into sorted section
* Move upstreamed HD-audio patch into sorted section
* Move upstreamed USB fix into sorted section
* Move upstreamed media patches into sorted section
* Move upstreamed mm patches into sorted section
* Move upstreamed patches into sorted section
* Move upstreamed patches into sorted section
* Move upstreamed patches into sorted section
* Move upstreamed patches into sorted section
* Move upstreamed powerpc patches into sorted section
* Move upstreamed powerpc patches into sorted section
* NFC: trf7970a: disable all regulators on removal (git-fixes).
* NFS: Fix an off by one in root_nfs_cat() (git-fixes).
* NFS: Fix nfs_netfs_issue_read() xarray locking for writeback interrupt (git-
fixes).
* NFS: Read unlock folio on nfs_page_create_from_folio() error (git-fixes).
* NFSD: Convert the callback workqueue to use delayed_work (git-fixes).
* NFSD: Fix nfsd_clid_class use of __string_len() macro (git-fixes).
* NFSD: Reschedule CB operations when backchannel rpc_clnt is shut down (git-
fixes).
* NFSD: Reset cb_seq_status after NFS4ERR_DELAY (git-fixes).
* NFSD: Retransmit callbacks after client reconnects (git-fixes).
* NFSD: change LISTXATTRS cookie encoding to big-endian (git-fixes).
* NFSD: fix LISTXATTRS returning a short list with eof=TRUE (git-fixes).
* NFSD: fix LISTXATTRS returning more bytes than maxcount (git-fixes).
* NFSD: fix nfsd4_listxattr_validate_cookie (git-fixes).
* NFSv4.1/pnfs: fix NFS with TLS in pnfs (git-fixes).
* NFSv4.2: fix listxattr maximum XDR buffer size (git-fixes).
* NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 (git-fixes).
* Octeontx2-af: fix pause frame configuration in GMP mode (git-fixes).
* PCI/AER: Block runtime suspend when handling errors (stable-fixes).
* PCI/ASPM: Use RMW accessors for changing LNKCTL (git-fixes).
* PCI/DPC: Quirk PIO log size for Intel Raptor Lake Root Ports (stable-fixes).
* PCI/DPC: Use FIELD_GET() (stable-fixes).
* PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes).
* PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes).
* PCI/PM: Drain runtime-idle callbacks before driver removal (stable-fixes).
* PCI: Delay after FLR of Solidigm P44 Pro NVMe (stable-fixes).
* PCI: Disable D3cold on Asus B1400 PCI-NVMe bridge (stable-fixes).
* PCI: Execute quirk_enable_clear_retrain_link() earlier (stable-fixes).
* PCI: Fix typos in docs and comments (stable-fixes).
* PCI: Make link retraining use RMW accessors for changing LNKCTL (git-fixes).
* PCI: Simplify pcie_capability_clear_and_set_word() to ..._clear_word()
(stable-fixes).
* PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host
(git-fixes).
* PCI: hv: Fix ring buffer size calculation (git-fixes).
* PCI: qcom: Add support for sa8775p SoC (git-fixes).
* PCI: qcom: Disable ASPM L0s for sc8280xp, sa8540p and sa8295p (git-fixes).
* PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes).
* PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369
ltc#205888).
* PCI: switchtec: Add support for PCIe Gen5 devices (stable-fixes).
* PCI: switchtec: Use normal comment style (stable-fixes).
* PCI: tegra194: Fix probe path for Endpoint mode (git-fixes).
* PM / devfreq: Synchronize devfreq_monitor_[start/stop] (stable-fixes).
* PM: s2idle: Make sure CPUs will wakeup directly on resume (git-fixes).
* Port "certs: Add ECDSA signature verification self-test".
* Port "certs: Move RSA self-test data to separate file".
* RAS/AMD/FMPM: Avoid NULL ptr deref in get_saved_records() (jsc#PED-7619).
* RAS/AMD/FMPM: Fix build when debugfs is not enabled (jsc#PED-7619).
* RAS/AMD/FMPM: Safely handle saved records of various sizes (jsc#PED-7619).
* RDMA/IPoIB: Fix format truncation compilation errors (git-fixes)
* RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes)
* RDMA/cm: add timeout to cm_destroy_id wait (git-fixes)
* RDMA/cma: Fix kmemleak in rdma_core observed during blktests nvme/rdma use
siw (git-fixes)
* RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git-
fixes)
* RDMA/hns: Fix GMV table pagesize (git-fixes)
* RDMA/hns: Fix UAF for cq async event (git-fixes)
* RDMA/hns: Fix deadlock on SRQ async events. (git-fixes)
* RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes)
* RDMA/hns: Modify the print level of CQE error (git-fixes)
* RDMA/hns: Use complete parentheses in macros (git-fixes)
* RDMA/mana_ib: Fix bug in creation of dma regions (git-fixes).
* RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes)
* RDMA/mlx5: Change check for cacheable mkeys (git-fixes)
* RDMA/mlx5: Fix port number for counter query in multi-port configuration
(git-fixes)
* RDMA/mlx5: Uncacheable mkey has neither rb_key or cache_ent (git-fixes)
* RDMA/rxe: Allow good work requests to be executed (git-fixes)
* RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes)
* RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes)
* RDMA/rxe: Fix the problem "mutex_destroy missing" (git-fixes)
* README.BRANCH: Remove copy of branch name
* Reapply "drm/qxl: simplify qxl_fence_wait" (stable-fixes).
* Refresh patches.suse/0002-PKCS-7-Check-codeSigning-EKU-for-kernel-module-
and-k.patch (bsc#1222771). In preparation of enabling
CONFIG_FIPS_SIGNATURE_SELFTEST, amend the missing 'usage' argument in the
pkcs7_validate_trust() invocation from the PKCS#7 selftest.
* Refresh patches.suse/ASoC-SOF-Intel-mtl-Implement-firmware-boot-state-
che.patch.
* Remove NTFSv3 from configs (bsc#1224429) References: bsc#1224429 comment#3
We only support fuse version of the NTFS-3g driver. Disable NTFSv3 from all
configs. This was enabled in d016c04d731 ("Bump to 6.4 kernel
(jsc#PED-4593)")
* Rename patches.suse/Workaround-broken-chacha-crypto-fallback.patch to
patches.suse/powerpc-crypto-chacha-p10-Fix-failure-on-non-Power10.patch.
* Revert "ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default"
(stable-fixes).
* Revert "ASoC: SOF: Intel: hda-dai-ops: only allocate/release streams for
first CPU DAI" (stable-fixes).
* Revert "ASoC: SOF: Intel: hda-dai-ops: reset device count for SoundWire
DAIs" (stable-fixes).
* Revert "PCI/MSI: Provide IMS (Interrupt Message Store) support" (git-fixes).
* Revert "PCI/MSI: Provide pci_ims_alloc/free_irq()" (git-fixes).
* Revert "PCI/MSI: Provide stubs for IMS functions" (git-fixes).
* Revert "cifs: reconnect work should have reference on server struct" (git-
fixes, bsc#1225172).
* Revert "drm/amd/amdgpu: Fix potential ioremap() memory leaks in
amdgpu_device_init()" (stable-fixes).
* Revert "drm/amd/display: Fix sending VSC (+ colorimetry) packets for DP/eDP
displays without PSR" (stable-fixes).
* Revert "drm/amdkfd: fix gfx_target_version for certain 11.0.3 devices"
(stable-fixes).
* Revert "drm/bridge: ti-sn65dsi83: Fix enable error path" (git-fixes).
* Revert "drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor()"
(stable-fixes).
* Revert "drm/qxl: simplify qxl_fence_wait" (git-fixes).
* Revert "iommu/amd: Enable PCI/IMS" (git-fixes).
* Revert "iommu/vt-d: Enable PCI/IMS" (git-fixes).
* Revert "net/mlx5: Block entering switchdev mode with ns inconsistency" (git-
fixes).
* Revert "net/mlx5e: Check the number of elements before walk TC rhashtable"
(git-fixes).
* Revert "selinux: introduce an initial SID for early boot processes"
(bsc#1208593) It caused a regression on ALP-current branch, kernel-obs-qa
build failed.
* Revert "usb: cdc-wdm: close race between read and workqueue" (git-fixes).
* Revert "usb: phy: generic: Get the vbus supply" (git-fixes).
* SEV: disable SEV-ES DebugSwap by default (git-fixes).
* SUNRPC: fix a memleak in gss_import_v2_context (git-fixes).
* SUNRPC: fix some memleaks in gssx_dec_option_array (git-fixes).
* USB: UAS: return ENODEV when submit urbs fail with device not attached
(stable-fixes).
* USB: core: Add hub_get() and hub_put() routines (stable-fixes).
* USB: core: Fix access violation during port device removal (git-fixes).
* USB: core: Fix deadlock in port "disable" sysfs attribute (stable-fixes).
* USB: core: Fix deadlock in usb_deauthorize_interface() (git-fixes).
* USB: serial: add device ID for VeriFone adapter (stable-fixes).
* USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes).
* USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable-
fixes).
* USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable-
fixes).
* USB: serial: option: add Fibocom FM135-GL variants (stable-fixes).
* USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes).
* USB: serial: option: add MeiG Smart SLM320 product (stable-fixes).
* USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable-
fixes).
* USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes).
* USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes).
* USB: serial: option: support Quectel EM060K sub-models (stable-fixes).
* Update patches.suse/Bluetooth-hci_sync-Don-t-double-print-name-in-add-
re.patch (bsc#1216358). Added bugzilla reference
* Update patches.suse/nvme-ensure-disabling-pairs-with-unquiesce.patch
(jsc#PED-6252 jsc#PED-5728 jsc#PED-5062 jsc#PED-3535 bsc#1224534).
* Update ath11k suspend patches from the latest subsystem tree (bsc#1207948).
* Update config files. Disable N_GSM (jsc#PED-8240).
* Update patches.suse/gpio-tegra186-Fix-tegra186_gpio_is_accessible-
check.patch (git-fixes bsc#1223439)
* Update patches.suse/powerpc-pseries-vas-Hold-mmap_mutex-after-mmap-
lock-.patch (bsc#1012628 jsc#PED-542 git-fixes bsc#1213573 ltc#203238).
* Update patches.suse/scsi-qedf-Don-t-process-stag-work-during-unload.patch
(bsc#1214852)
* Update patches.suse/scsi-qedf-Wait-for-stag-work-during-unload.patch
(bsc#1214852)
* VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes).
* VMCI: Fix possible memcpy() run-time warning in
vmci_datagram_invoke_guest_handler() (stable-fixes).
* Workaround broken chacha crypto fallback (bsc#1218205).
* accel/ivpu: Fix deadlock in context_xa (git-fixes).
* admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET
(git-fixes).
* ahci: asm1064: asm1166: do not limit reported ports (git-fixes).
* ahci: asm1064: correct count of reported ports (stable-fixes).
* amd/amdkfd: sync all devices to wait all processes being evicted (stable-
fixes).
* amdkfd: use calloc instead of kzalloc to avoid integer overflow (stable-
fixes).
* arm64/head: Disable MMU at EL2 before clearing HCR_EL2.E2H (git-fixes).
* arm64/ptrace: Use saved floating point state type to determine SVE (git-
fixes)
* arm64/sve: Lower the maximum allocation for the SVE ptrace regset (git-
fixes)
* arm64: Add the arm64.no32bit_el0 command line option (jsc#PED-3184). Please
note that some adjustments were needed since the upstream commit is based on
kernel 6.9 which has idreg-override.c moved under arch/arm64/kernel/pi/.
* arm64: bpf: fix 32bit unconditional bswap (git-fixes).
* arm64: dts: Fix dtc interrupt_provider warnings (git-fixes)
* arm64: dts: allwinner: Pine H64: correctly remove reg_gmac_3v3 (git-fixes)
* arm64: dts: allwinner: h616: Fix I2C0 pins (git-fixes)
* arm64: dts: broadcom: bcmbca: bcm4908: drop invalid switch cells (git-fixes)
* arm64: dts: hi3798cv200: fix the size of GICR (git-fixes)
* arm64: dts: imx8-ss-conn: fix usb lpcg indices (git-fixes)
* arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes)
* arm64: dts: imx8-ss-dma: fix adc lpcg indices (git-fixes)
* arm64: dts: imx8-ss-dma: fix can lpcg indices (git-fixes)
* arm64: dts: imx8-ss-dma: fix spi lpcg indices (git-fixes)
* arm64: dts: imx8-ss-lsio: fix pwm lpcg indices (git-fixes)
* arm64: dts: imx8qm-ss-dma: fix can lpcg indices (git-fixes)
* arm64: dts: marvell: reorder crypto interrupts on Armada SoCs (git-fixes)
* arm64: dts: microchip: sparx5: fix mdio reg (git-fixes)
* arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git-
fixes)
* arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git-
fixes)
* arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git-
fixes)
* arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git-
fixes)
* arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes)
* arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git-
fixes)
* arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes)
* arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes)
* arm64: dts: rockchip: regulator for sd needs to be always on for (git-fixes)
* arm64: dts: rockchip: set PHY address of MT7531 switch to 0x1f (git-fixes)
* arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes).
* arm64: tegra: Correct Tegra132 I2C alias (git-fixes)
* arm64: tegra: Set the correct PHY mode for MGBE (git-fixes)
* arm_pmu: acpi: Add a representative platform device for TRBE (bsc#1220587)
* arm_pmu: acpi: Refactor arm_spe_acpi_register_device() (bsc#1220587)
* asm-generic: make sparse happy with odd-sized put_unaligned_*() (stable-
fixes).
* ata: libata-core: Allow command duration limits detection for ACS-4 drives
(git-fixes).
* ata: pata_legacy: make legacy_exit() work again (git-fixes).
* ata: sata_gemini: Check clk_enable() result (stable-fixes).
* ata: sata_mv: Fix PCI device ID table declaration compilation warning (git-
fixes).
* ata: sata_sx4: fix pdc20621_get_from_dimm() on 64-bit (git-fixes).
* autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166).
* ax25: Fix netdev refcount issue (git-fixes).
* ax25: Fix reference count leak issue of net_device (git-fixes).
* ax25: Fix reference count leak issues of ax25_dev (git-fixes).
* ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes).
* batman-adv: Avoid infinite loop trying to resize local TT (git-fixes).
* bitops: add missing prototype check (git-fixes).
* blacklist.conf: workqueues: system-wide nr_active enforcement patchset; not
worth the risk (bsc#1225580)
* blk-cgroup: fix list corruption from reorder of WRITE ->lqueued
(bsc#1225605).
* blk-cgroup: fix list corruption from resetting io stat (bsc#1225605).
* block: fix q->blkg_list corruption during disk rebind (bsc#1223591).
* bnx2x: Fix firmware version string character counts (git-fixes).
* bnxt_en: Fix error recovery for RoCE ulp client (git-fixes).
* bnxt_en: Fix possible memory leak in bnxt_rdma_aux_device_init() (git-
fixes).
* bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes).
* bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git-
fixes)
* bootconfig: Fix the kerneldoc of _xbc_exit() (git-fixes).
* bootconfig: use memblock_free_late to free xbc memory to buddy (git-fixes).
* bootmem: use kmemleak_free_part_phys in free_bootmem_page (git-fixes).
* bootmem: use kmemleak_free_part_phys in put_page_bootmem (git-fixes).
* bpf, arm64: Fix incorrect runtime stats (git-fixes)
* bpf, arm64: fix bug in BPF_LDX_MEMSX (git-fixes)
* bpf, scripts: Correct GPL license name (git-fixes).
* bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes).
* bpf: fix precision backtracking instruction iteration (bsc#1225756).
* bpf: handle ldimm64 properly in check_cfg() (bsc#1225756).
* btrfs: add a helper to read the superblock metadata_uuid (git-fixes)
* btrfs: add and use helper to check if block group is used (bsc#1220120).
* btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes)
* btrfs: add new unused block groups to the list of unused block groups
(bsc#1220120).
* btrfs: allow to run delayed refs by bytes to be released instead of count
(bsc#1220120).
* btrfs: always clear PERTRANS metadata during commit (git-fixes)
* btrfs: always print transaction aborted messages with an error level (git-
fixes)
* btrfs: always reserve space for delayed refs when starting transaction
(bsc#1220120).
* btrfs: assert correct lock is held at btrfs_select_ref_head() (bsc#1220120).
* btrfs: assert delayed node locked when removing delayed item (git-fixes)
* btrfs: avoid start and commit empty transaction when flushing qgroups
(bsc#1220120).
* btrfs: avoid start and commit empty transaction when starting qgroup rescan
(bsc#1220120).
* btrfs: avoid starting and committing empty transaction when flushing space
(bsc#1220120).
* btrfs: avoid starting new transaction when flushing delayed items and refs
(bsc#1220120).
* btrfs: check for BTRFS_FS_ERROR in pending ordered assert (git-fixes)
* btrfs: compare the correct fsid/metadata_uuid in btrfs_validate_super (git-
fixes)
* btrfs: defrag: avoid unnecessary defrag caused by incorrect extent size
(git-fixes)
* btrfs: defrag: reject unknown flags of btrfs_ioctl_defrag_range_args (git-
fixes)
* btrfs: do not allow non subvolume root targets for snapshot (git-fixes)
* btrfs: do not arbitrarily slow down delalloc if we're committing (git-fixes)
* btrfs: do not delete unused block group if it may be used soon
(bsc#1220120).
* btrfs: do not refill whole delayed refs block reserve when starting
transaction (bsc#1220120).
* btrfs: do not start transaction when joining with TRANS_JOIN_NOSTART (git-
fixes)
* btrfs: do not steal space from global rsv after a transaction abort
(bsc#1220120).
* btrfs: do not warn if discard range is not aligned to sector (git-fixes)
* btrfs: ensure fiemap does not race with writes when FIEMAP_FLAG_SYNC is
given (bsc#1223285).
* btrfs: error out when COWing block using a stale transaction (git-fixes)
* btrfs: error out when reallocating block for defrag using a stale
transaction (git-fixes)
* btrfs: export: handle invalid inode or root reference in btrfs_get_parent()
(git-fixes)
* btrfs: fail priority metadata ticket with real fs error (bsc#1220120).
* btrfs: file_remove_privs needs an exclusive lock in direct io write (git-
fixes)
* btrfs: fix 64bit compat send ioctl arguments not initializing version member
(git-fixes)
* btrfs: fix deadlock with fiemap and extent locking (bsc#1223285).
* btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes)
* btrfs: fix kvcalloc() arguments order in btrfs_ioctl_send() (git-fixes)
* btrfs: fix lockdep splat and potential deadlock after failure running
delayed items (git-fixes)
* btrfs: fix off-by-one chunk length calculation at contains_pending_extent()
(git-fixes)
* btrfs: fix off-by-one when checking chunk map includes logical address (git-
fixes)
* btrfs: fix race between ordered extent completion and fiemap (bsc#1223285).
* btrfs: fix race when detecting delalloc ranges during fiemap (bsc#1223285).
* btrfs: fix race when refilling delayed refs block reserve (git-fixes)
* btrfs: fix start transaction qgroup rsv double free (git-fixes)
* btrfs: fix stripe length calculation for non-zoned data chunk allocation
(bsc#1217489).
* btrfs: fix wrong block_start calculation for btrfs_drop_extent_map_range()
(git-fixes) Dropped hunk in selftests (test_case_7), 92e1229b204d6.
* btrfs: free qgroup rsv on io failure (git-fixes)
* btrfs: free the allocated memory if btrfs_alloc_page_array() fails (git-
fixes)
* btrfs: get rid of label and goto at insert_delayed_ref() (bsc#1220120).
* btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git-
fixes)
* btrfs: handle errors properly in update_inline_extent_backref() (git-fixes)
* btrfs: initialize key where it's used when running delayed data ref
(bsc#1220120).
* btrfs: log message if extent item not found when running delayed extent op
(bsc#1220120).
* btrfs: make btrfs_cleanup_fs_roots() static (bsc#1220120).
* btrfs: make btrfs_destroy_delayed_refs() return void (bsc#1220120).
* btrfs: make btrfs_destroy_marked_extents() return void (bsc#1220120).
* btrfs: make btrfs_destroy_pinned_extent() return void (bsc#1220120).
* btrfs: make error messages more clear when getting a chunk map (git-fixes)
* btrfs: make find_first_extent_bit() return a boolean (bsc#1220120).
* btrfs: make find_free_dev_extent() static (bsc#1220120).
* btrfs: make insert_delayed_ref() return a bool instead of an int
(bsc#1220120).
* btrfs: merge find_free_dev_extent() and find_free_dev_extent_start()
(bsc#1220120).
* btrfs: move btrfs_free_excluded_extents() into block-group.c (bsc#1220120).
* btrfs: open code trivial btrfs_add_excluded_extent() (bsc#1220120).
* btrfs: output extra debug info if we failed to find an inline backref (git-
fixes)
* btrfs: pass a space_info argument to btrfs_reserve_metadata_bytes()
(bsc#1220120).
* btrfs: prevent transaction block reserve underflow when starting transaction
(git-fixes)
* btrfs: print available space across all block groups when dumping space info
(bsc#1220120).
* btrfs: print available space for a block group when dumping a space info
(bsc#1220120).
* btrfs: print block group super and delalloc bytes when dumping space info
(bsc#1220120).
* btrfs: print target number of bytes when dumping free space (bsc#1220120).
* btrfs: qgroup: always free reserved space for extent records (bsc#1216196).
* btrfs: qgroup: convert PREALLOC to PERTRANS after record_root_in_trans (git-
fixes)
* btrfs: record delayed inode root in transaction (git-fixes)
* btrfs: reject encoded write if inode has nodatasum flag set (git-fixes)
* btrfs: release path before inode lookup during the ino lookup ioctl (git-
fixes)
* btrfs: remove pointless 'ref_root' variable from run_delayed_data_ref()
(bsc#1220120).
* btrfs: remove pointless in_tree field from struct btrfs_delayed_ref_node
(bsc#1220120).
* btrfs: remove pointless initialization at btrfs_delayed_refs_rsv_release()
(bsc#1220120).
* btrfs: remove redundant BUG_ON() from __btrfs_inc_extent_ref()
(bsc#1220120).
* btrfs: remove refs_to_add argument from __btrfs_inc_extent_ref()
(bsc#1220120).
* btrfs: remove refs_to_drop argument from __btrfs_free_extent()
(bsc#1220120).
* btrfs: remove the refcount warning/check at btrfs_put_delayed_ref()
(bsc#1220120).
* btrfs: remove unnecessary logic when running new delayed references
(bsc#1220120).
* btrfs: remove unnecessary prototype declarations at disk-io.c (bsc#1220120).
* btrfs: remove unused is_head field from struct btrfs_delayed_ref_node
(bsc#1220120).
* btrfs: rename add_new_free_space() to btrfs_add_new_free_space()
(bsc#1220120).
* btrfs: reorder some members of struct btrfs_delayed_ref_head (bsc#1220120).
* btrfs: reserve space for delayed refs on a per ref basis (bsc#1220120).
* btrfs: reset destination buffer when read_extent_buffer() gets invalid range
(git-fixes)
* btrfs: return -EUCLEAN for delayed tree ref with a ref count not equals to 1
(git-fixes)
* btrfs: return -EUCLEAN if extent item is missing when searching inline
backref (bsc#1220120).
* btrfs: return real error when orphan cleanup fails due to a transaction
abort (bsc#1220120).
* btrfs: send: do not issue unnecessary zero writes for trailing hole
(bsc#1222459).
* btrfs: send: ensure send_fd is writable (git-fixes)
* btrfs: send: handle path ref underflow in header iterate_inode_ref() (git-
fixes)
* btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes)
* btrfs: set page extent mapped after read_folio in relocate_one_page (git-
fixes)
* btrfs: simplify check for extent item overrun at
lookup_inline_extent_backref() (bsc#1220120).
* btrfs: stop doing excessive space reservation for csum deletion
(bsc#1220120).
* btrfs: store the error that turned the fs into error state (bsc#1220120).
* btrfs: sysfs: validate scrub_speed_max value (git-fixes)
* btrfs: tree-checker: fix inline ref size in error messages (git-fixes)
* btrfs: update comment for btrfs_join_transaction_nostart() (bsc#1220120).
* btrfs: update documentation for add_new_free_space() (bsc#1220120).
* btrfs: use a bool to track qgroup record insertion when adding ref head
(bsc#1220120).
* btrfs: use a single switch statement when initializing delayed ref head
(bsc#1220120).
* btrfs: use a single variable for return value at
lookup_inline_extent_backref() (bsc#1220120).
* btrfs: use a single variable for return value at run_delayed_extent_op()
(bsc#1220120).
* btrfs: use bool type for delayed ref head fields that are used as booleans
(bsc#1220120).
* btrfs: use the correct superblock to compare fsid in btrfs_validate_super
(git-fixes)
* btrfs: use u64 for buffer sizes in the tree search ioctls (git-fixes)
* btrfs: zoned: do not skip block groups with 100% zone unusable
(bsc#1220120).
* bus: mhi: ep: check the correct variable in mhi_ep_register_controller()
(git-fixes).
* ceph: redirty page before returning AOP_WRITEPAGE_ACTIVATE (bsc#1224866).
* ceph: stop copying to iter at EOF on sync reads (bsc#1222606).
* certs: Add ECDSA signature verification self-test (bsc#1222777).
* certs: Move RSA self-test data to separate file (bsc#1222777).
* cifs: Do not use certain unnecessary folio_*() functions (bsc#1225172).
* cifs: account for primary channel in the interface list (bsc#1225172).
* cifs: cifs_chan_is_iface_active should be called with chan_lock held
(bsc#1225172).
* cifs: distribute channels across interfaces based on speed (bsc#1225172).
* cifs: do not pass cifs_sb when trying to add channels (bsc#1225172).
* cifs: failure to add channel on iface should bump up weight (git-fixes,
bsc#1225172).
* cifs: fix charset issue in reconnection (bsc#1225172).
* cifs: fix leak of iface for primary channel (git-fixes, bsc#1225172).
* cifs: handle cases where a channel is closed (bsc#1225172).
* cifs: handle cases where multiple sessions share connection (bsc#1225172).
* cifs: reconnect work should have reference on server struct (bsc#1225172).
* clk: Do not hold prepare_lock when calling kref_put() (stable-fixes).
* clk: Get runtime PM before walking tree during disable_unused (git-fixes).
* clk: Get runtime PM before walking tree for clk_summary (git-fixes).
* clk: Initialize struct clk_core kref earlier (stable-fixes).
* clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes).
* clk: Show active consumers of clocks in debugfs (stable-fixes).
* clk: mediatek: Do a runtime PM get on controllers during probe (git-fixes).
* clk: mediatek: mt8365-mm: fix DPI0 parent (git-fixes).
* clk: mediatek: pllfh: Do not log error for missing fhctl node (git-fixes).
* clk: qcom: clk-alpha-pll: fix rate setting for Stromer PLLs (git-fixes).
* clk: qcom: clk-alpha-pll: remove invalid Stromer register offset (git-
fixes).
* clk: qcom: dispcc-sm6350: fix DisplayPort clocks (git-fixes).
* clk: qcom: dispcc-sm8450: fix DisplayPort clocks (git-fixes).
* clk: qcom: dispcc-sm8550: fix DisplayPort clocks (git-fixes).
* clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes).
* clk: qcom: reset: Commonize the de/assert functions (stable-fixes).
* clk: qcom: reset: Ensure write completion on reset de/assertion (git-fixes).
* clk: renesas: r8a779a0: Fix CANFD parent clock (git-fixes).
* clk: renesas: r9a07g043: Add clock and reset entry for PLIC (git-fixes).
* clk: rs9: fix wrong default value for clock amplitude (git-fixes).
* clk: samsung: exynosautov9: fix wrong pll clock id value (git-fixes).
* clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change (git-fixes).
* clocksource/drivers/arm_global_timer: Fix maximum prescaler value (git-
fixes).
* clocksource/drivers/imx: Fix -Wunused-but-set-variable warning (git-fixes).
* comedi: vmk80xx: fix incomplete endpoint checking (git-fixes).
* coresight: trbe: Add a representative coresight_platform_data for
(bsc#1220587)
* coresight: trbe: Allocate platform data per device (bsc#1220587)
* coresight: trbe: Enable ACPI based TRBE devices (bsc#1220587)
* counter: linux/counter.h: fix Excess kernel-doc description warning (git-
fixes).
* cppc_cpufreq: Fix possible null pointer dereference (git-fixes).
* cpufreq: brcmstb-avs-cpufreq: ISO C90 forbids mixed declarations (git-
fixes).
* cpufreq: exit() callback is optional (git-fixes).
* cpumask: Add for_each_cpu_from() (bsc#1225053).
* crypto: bcm - Fix pointer arithmetic (git-fixes).
* crypto: ccp - Add support for PCI device 0x156E (bsc#1223338).
* crypto: ccp - Add support for PCI device 0x17E0 (bsc#1223338).
* crypto: ccp - drop platform ifdef checks (git-fixes).
* crypto: ecc - update ecc_gen_privkey for FIPS 186-5 (bsc#1222782).
* crypto: ecdsa - Fix module auto-load on add-key (git-fixes).
* crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init (git-fixes).
* crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak (git-fixes).
* crypto: qat - fix ring to service map for dcc in 4xxx (git-fixes).
* crypto: qat - improve error logging to be consistent across features (git-
fixes).
* crypto: qat - relocate and rename get_service_enabled() (stable-fixes).
* crypto: qat - specify firmware files for 402xx (git-fixes).
* crypto: rsa - add a check for allocation failure (bsc#1222775).
* crypto: rsa - allow only odd e and restrict value in FIPS mode
(bsc#1222775).
* crypto: testmgr - remove unused xts4096 and xts512 algorithms from testmgr.c
(bsc#1222769).
* crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes).
* crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes).
* crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes).
* cxl/acpi: Fix load failures due to single window creation failure (git-
fixes).
* cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS
window (git-fixes).
* cxl/trace: Properly initialize cxl_poison region name (git-fixes).
* dax/bus.c: replace driver-core lock usage by a local rwsem (jsc#PED-5853).
* dax/bus.c: replace several sprintf() with sysfs_emit() (jsc#PED-5853).
* dax: alloc_dax() return ERR_PTR(-EOPNOTSUPP) for CONFIG_DAX=n
(jsc#PED-5853).
* device-dax: make dax_bus_type const (jsc#PED-5853).
* dlm: fix user space lkb refcounting (git-fixes).
* dm crypt: remove redundant state settings after waking up (jsc#PED-7542).
* dm thin: add braces around conditional code that spans lines (jsc#PED-7542).
* dm verity: set DM_TARGET_SINGLETON feature flag (jsc#PED-7542).
* dm-integrity: set max_integrity_segments in dm_integrity_io_hints
(jsc#PED-7542).
* dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575).
* dm-raid456, md/raid456: fix a deadlock for dm-raid456 while io concurrent
with reshape (bsc#1219596) Also update diff context in patches.suse/dm-raid-
fix-false-positive-for-requeue-needed-during-b25b.patch
* dm-raid: add a new helper prepare_suspend() in md_personality
(jsc#PED-7542).
* dm-raid: really frozen sync_thread during suspend (jsc#PED-7542).
* dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11
users (git-fixes).
* dm: update relevant MODULE_AUTHOR entries to latest dm-devel mailing list
(jsc#PED-7542).
* dma-buf/sw-sync: do not enable IRQ from sync_print_obj() (git-fixes).
* dma-buf: Fix NULL pointer dereference in sanitycheck() (git-fixes).
* dma-mapping: benchmark: fix node id validation (git-fixes).
* dma-mapping: benchmark: handle NUMA_NO_NODE correctly (git-fixes).
* dma: xilinx_dpdma: Fix locking (git-fixes).
* dmaengine: axi-dmac: fix possible race in remove() (git-fixes).
* dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes).
* dmaengine: idxd: Avoid unnecessary destruction of file_ida (git-fixes).
* dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes).
* dmaengine: owl: fix register access functions (git-fixes).
* dmaengine: tegra186: Fix residual calculation (git-fixes).
* docs: Restore "smart quotes" for quotes (stable-fixes).
* docs: kernel_include.py: Cope with docutils 0.21 (stable-fixes).
* docs: netdev: Fix typo in Signed-off-by tag (git-fixes).
* driver core: Introduce device_link_wait_removal() (stable-fixes).
* drivers/nvme: Add quirks for device 126f:2262 (git-fixes).
* drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init()
(stable-fixes).
* drm/amd/display: Add dml2 copy functions (stable-fixes).
* drm/amd/display: Allow dirty rects to be sent to dmub when abm is active
(stable-fixes).
* drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes).
* drm/amd/display: Change default size for dummy plane in DML2 (stable-fixes).
* drm/amd/display: Do not recursively call manual trigger programming (stable-
fixes).
* drm/amd/display: Enable colorspace property for MST connectors (git-fixes).
* drm/amd/display: Fix bounds check for dcn35 DcfClocks (git-fixes).
* drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes).
* drm/amd/display: Fix idle check for shared firmware state (stable-fixes).
* drm/amd/display: Fix incorrect DSC instance for MST (stable-fixes).
* drm/amd/display: Fix nanosec stat overflow (stable-fixes).
* drm/amd/display: Fix noise issue on HDMI AV mute (stable-fixes).
* drm/amd/display: Fix potential index out of bounds in color transformation
function (git-fixes).
* drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes).
* drm/amd/display: Init DPPCLK from SMU on dcn32 (stable-fixes).
* drm/amd/display: Override min required DCFCLK in dml1_validate (stable-
fixes).
* drm/amd/display: Prevent crash when disable stream (stable-fixes).
* drm/amd/display: Program VSC SDP colorimetry for all DP sinks >= 1.4
(stable-fixes).
* drm/amd/display: Remove MPC rate control logic from DCN30 and above (stable-
fixes).
* drm/amd/display: Remove redundant condition in dcn35_calc_blocks_to_gate()
(git-fixes).
* drm/amd/display: Return the correct HDCP error code (stable-fixes).
* drm/amd/display: Send DTBCLK disable message on first commit (git-fixes).
* drm/amd/display: Set DCN351 BB and IP the same as DCN35 (stable-fixes).
* drm/amd/display: Set VSC SDP Colorimetry same way for MST and SST (stable-
fixes).
* drm/amd/display: Update odm when ODM combine is changed on an otg master
pipe with no plane (stable-fixes).
* drm/amd/display: Use freesync when `DRM_EDID_FEATURE_CONTINUOUS_FREQ` found
(stable-fixes).
* drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes).
* drm/amd/display: fix input states translation error for dcn35 & dcn351
(stable-fixes).
* drm/amd/display: handle range offsets in VRR ranges (stable-fixes).
* drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes).
* drm/amd/swsmu: modify the gfx activity scaling (stable-fixes).
* drm/amd: Flush GFXOFF requests in prepare stage (git-fixes).
* drm/amdgpu/display: Address kdoc for 'is_psr_su' in 'fill_dc_dirty_rects'
(git-fixes).
* drm/amdgpu/pm: Check the validity of overdiver power limit (git-fixes).
* drm/amdgpu/pm: Fix NULL pointer dereference when get power limit (git-
fixes).
* drm/amdgpu/pm: Fix the error of pwm1_enable setting (stable-fixes).
* drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes).
* drm/amdgpu: Assign correct bits for SDMA HDP flush (stable-fixes).
* drm/amdgpu: Enable gpu reset for S3 abort cases on Raven series (stable-
fixes).
* drm/amdgpu: Fix VCN allocation in CPX partition (stable-fixes).
* drm/amdgpu: Fix comparison in amdgpu_res_cpu_visible (git-fixes).
* drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes).
* drm/amdgpu: Refine IB schedule error logging (stable-fixes).
* drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes).
* drm/amdgpu: always force full reset for SOC21 (stable-fixes).
* drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag (stable-fixes).
* drm/amdgpu: drop setting buffer funcs in sdma442 (git-fixes).
* drm/amdgpu: fix deadlock while reading mqd from debugfs (git-fixes).
* drm/amdgpu: fix doorbell regression (git-fixes).
* drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes).
* drm/amdgpu: fix mmhub client id out-of-bounds access (git-fixes).
* drm/amdgpu: fix use-after-free bug (stable-fixes).
* drm/amdgpu: fix visible VRAM handling during faults (git-fixes).
* drm/amdgpu: implement IRQ_STATE_ENABLE for SDMA v4.4.2 (stable-fixes).
* drm/amdgpu: make damage clips support configurable (stable-fixes).
* drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes).
* drm/amdgpu: remove invalid resource->start check v2 (git-fixes).
* drm/amdgpu: validate the parameters of bo mapping operations more clearly
(git-fixes).
* drm/amdkfd: Check cgroup when returning DMABuf info (stable-fixes).
* drm/amdkfd: Fix memory leak in create_process failure (git-fixes).
* drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes).
* drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git-
fixes).
* drm/amdkfd: fix TLB flush after unmap for GFX9.4.2 (stable-fixes).
* drm/amdkfd: range check cp bad op exception interrupts (stable-fixes).
* drm/arm/malidp: fix a possible null pointer dereference (git-fixes).
* drm/ast: Fix soft lockup (git-fixes).
* drm/bridge: Fix improper bridge init order with pre_enable_prev_first (git-
fixes).
* drm/bridge: anx7625: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: anx7625: Update audio status while detecting (git-fixes).
* drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: icn6211: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: lt9611: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: lt9611uxc: Do not log an error when DSI host can't be found
(git-fixes).
* drm/bridge: tc358775: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes).
* drm/buddy: check range allocation matches alignment (stable-fixes).
* drm/client: Fully protect modes[] with dev->mode_config.mutex (stable-
fixes).
* drm/connector: Add \n to message about demoting connector force-probes (git-
fixes).
* drm/display: fix typo (git-fixes).
* drm/exynos: do not return negative values from .get_modes() (stable-fixes).
* drm/fbdev-generic: Do not set physical framebuffer address (git-fixes).
* drm/gma500: Remove lid code (git-fixes).
* drm/i915/audio: Fix audio time stamp programming for DP (stable-fixes).
* drm/i915/bios: Fix parsing backlight BDB data (git-fixes).
* drm/i915/bios: Tolerate devdata==NULL in
intel_bios_encoder_supports_dp_dual_mode() (stable-fixes).
* drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git-
fixes).
* drm/i915/display: Use i915_gem_object_get_dma_address to get dma address
(stable-fixes).
* drm/i915/dp: Fix the computation for compressed_bpp for DISPLAY < 13
(git-fixes).
* drm/i915/dp: Remove support for UHBR13.5 (git-fixes).
* drm/i915/dpt: Make DPT object unshrinkable (git-fixes).
* drm/i915/dsb: Fix DSB vblank waits when using VRR (git-fixes).
* drm/i915/dsi: Go back to the previous INIT_OTP/DISPLAY_ON order, mostly
(git-fixes).
* drm/i915/gt: Automate CCS Mode setting during engine resets (git-fixes).
* drm/i915/gt: Disable HW load balancing for CCS (git-fixes).
* drm/i915/gt: Disarm breadcrumbs if engines are already idle (git-fixes).
* drm/i915/gt: Do not generate the command streamer for all the CCS (git-
fixes).
* drm/i915/gt: Enable only one CCS for compute workload (git-fixes).
* drm/i915/gt: Fix CCS id's calculation for CCS mode setting (git-fixes).
* drm/i915/gt: Reset queue_priority_hint on parking (git-fixes).
* drm/i915/guc: avoid FIELD_PREP warning (git-fixes).
* drm/i915/hwmon: Fix locking inversion in sysfs getter (git-fixes).
* drm/i915/lspcon: Separate function to set expected mode (bsc#1193599).
* drm/i915/lspcon: Separate lspcon probe and lspcon init (bsc#1193599).
* drm/i915/mst: Limit MST+DSC to TGL+ (git-fixes).
* drm/i915/mst: Reject FEC+MST on ICL (git-fixes).
* drm/i915/mtl: Update workaround 14018575942 (git-fixes).
* drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes).
* drm/i915/vrr: Generate VRR "safe window" for DSB (git-fixes).
* drm/i915: Disable port sync when bigjoiner is used (stable-fixes).
* drm/i915: Do not match JSL in ehl_combo_pll_div_frac_wa_needed() (git-
fixes).
* drm/i915: Fix audio component initialization (git-fixes).
* drm/i915: Include the PLL name in the debug messages (stable-fixes).
* drm/i915: Pre-populate the cursor physical dma address (git-fixes).
* drm/i915: Replace a memset() with zero initialization (stable-fixes).
* drm/i915: Stop printing pipe name as hex (stable-fixes).
* drm/i915: Suppress old PLL pipe_mask checks for MG/TC/TBT PLLs (stable-
fixes).
* drm/i915: Try to preserve the current shared_dpll for fastset on type-c
ports (stable-fixes).
* drm/i915: Use named initializers for DPLL info (stable-fixes).
* drm/imx/ipuv3: do not return negative values from .get_modes() (stable-
fixes).
* drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes).
* drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes).
* drm/mediatek: Init `ddp_comp` with devm_kcalloc() (git-fixes).
* drm/mediatek: dp: Fix mtk_dp_aux_transfer return value (git-fixes).
* drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes).
* drm/meson: dw-hdmi: power up phy on device init (git-fixes).
* drm/meson: gate px_clk when setting rate (git-fixes).
* drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes).
* drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails (git-
fixes).
* drm/msm/adreno: fix CP cycles stat retrieval on a7xx (git-fixes).
* drm/msm/dp: Avoid a long timeout for AUX transfer if nothing connected (git-
fixes).
* drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes).
* drm/msm/dp: fix typo in dp_display_handle_port_status_changed() (git-fixes).
* drm/msm/dpu: Add callback function pointer check before its call (git-
fixes).
* drm/msm/dpu: Allow configuring multiple active DSC blocks (git-fixes).
* drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes).
* drm/msm/dpu: do not allow overriding data from catalog (git-fixes).
* drm/msm/dpu: make error messages at dpu_core_irq_register_callback() more
sensible (git-fixes).
* drm/msm/dpu: use devres-managed allocation for MDP TOP (stable-fixes).
* drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk
(git-fixes).
* drm/msm: Add newlines to some debug prints (git-fixes).
* drm/nouveau/disp: Fix missing backlight control on Macbook 5, 1
(bsc#1223838).
* drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes).
* drm/nouveau/dp: Fix incorrect return code in r535_dp_aux_xfer() (git-fixes).
* drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor() (stable-
fixes).
* drm/nouveau: use tile_mode and pte_kind for VM_BIND bo allocations (git-
fixes).
* drm/omapdrm: Fix console by implementing fb_dirty (git-fixes).
* drm/panel: do not return negative error codes from drm_panel_get_modes()
(stable-fixes).
* drm/panel: ili9341: Respect deferred probe (git-fixes).
* drm/panel: ili9341: Use predefined error codes (git-fixes).
* drm/panel: ltk050h3146w: add MIPI_DSI_MODE_VIDEO to LTK050H3148W flags (git-
fixes).
* drm/panel: ltk050h3146w: drop duplicate commands from LTK050H3148W init
(git-fixes).
* drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found
(git-fixes).
* drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector
(git-fixes).
* drm/panel: sitronix-st7789v: fix display size for jt240mhqs_hwt_ek_e3 panel
(git-fixes).
* drm/panel: sitronix-st7789v: fix timing for jt240mhqs_hwt_ek_e3 panel (git-
fixes).
* drm/panel: sitronix-st7789v: tweak timing for jt240mhqs_hwt_ek_e3 panel
(git-fixes).
* drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes).
* drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr() (git-
fixes).
* drm/panfrost: fix power transition timeout warnings (git-fixes).
* drm/prime: Unbreak virtgpu dma-buf export (git-fixes).
* drm/probe-helper: warn about negative .get_modes() (stable-fixes).
* drm/qxl: remove unused `count` variable from `qxl_surface_id_alloc()` (git-
fixes).
* drm/qxl: remove unused variable from `qxl_process_single_command()` (git-
fixes).
* drm/radeon: make -fstrict-flex-arrays=3 happy (git-fixes).
* drm/radeon: silence UBSAN warning (v3) (stable-fixes).
* drm/rockchip: vop2: Do not divide height twice for YUV (git-fixes).
* drm/rockchip: vop2: Remove AR30 and AB30 format support (git-fixes).
* drm/sched: fix null-ptr-deref in init entity (git-fixes).
* drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) (git-fixes).
* drm/ttm: return ENOSPC from ttm_bo_mem_space v3 (stable-fixes).
* drm/ttm: stop pooling cached NUMA pages v2 (git-fixes).
* drm/vc4: do not check if plane->state->fb == state->fb (stable-fixes).
* drm/vc4: hdmi: do not return negative values from .get_modes() (stable-
fixes).
* drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed (git-
fixes).
* drm/vmwgfx: Enable DMA mappings with SEV (git-fixes).
* drm/vmwgfx: Fix Legacy Display Unit (git-fixes).
* drm/vmwgfx: Fix crtc's atomic check conditional (git-fixes).
* drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes).
* drm/vmwgfx: Fix prime import/export (git-fixes).
* drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes).
* drm: Check output polling initialized before disabling (stable-fixes).
* drm: Check polling initialized before enabling in
drm_helper_probe_single_connector_modes (stable-fixes).
* drm: Fix drm_fixp2int_round() making it add 0.5 (git-fixes).
* drm: add drm_gem_object_is_shared_for_memory_stats() helper (stable-fixes).
* drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git-
fixes).
* drm: nv04: Fix out of bounds access (git-fixes).
* drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes).
* drm: vc4: Fix possible null pointer dereference (git-fixes).
* drm: zynqmp_dpsub: Always register bridge (git-fixes).
* dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes)
* dump_stack: Do not get cpu_sync for panic CPU (bsc#1225607).
* dyndbg: fix old BUG_ON in >control parser (stable-fixes).
* e1000e: Minor flow correction in e1000_shutdown function (git-fixes).
* e1000e: Workaround for sporadic MDI error on Meteor Lake systems (git-
fixes).
* e1000e: move force SMBUS from enable ulp function to avoid PHY loss issue
(git-fixes).
* ecryptfs: Fix buffer size for tag 66 packet (git-fixes)
* ecryptfs: Reject casefold directory inodes (git-fixes)
* efi/unaccepted: do not let /proc/vmcore try to access unaccepted memory
(git-fixes).
* efi/unaccepted: touch soft lockup during memory accept (git-fixes).
* efi: disable mirror feature during crashkernel (stable-fixes).
* efi: fix panic in kdump kernel (git-fixes).
* efi: libstub: only free priv.runtime_map when allocated (git-fixes).
* extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes).
* fast_dput(): handle underflows gracefully (git-fixes)
* fat: fix uninitialized field in nostale filehandles (git-fixes)
* fbdev: fix incorrect address computation in deferred IO (git-fixes).
* fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes).
* fbdev: sh7760fb: allow modular build (git-fixes).
* fbdev: shmobile: fix snprintf truncation (git-fixes).
* fbdev: sisfb: hide unused variables (git-fixes).
* fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes).
* fbmon: prevent division by zero in fb_videomode_from_videomode() (stable-
fixes).
* firewire: core: use long bus reset on gap count error (stable-fixes).
* firewire: ohci: mask bus reset interrupts between ISR and bottom half
(stable-fixes).
* firmware: arm_scmi: Make raw debugfs entries non-seekable (git-fixes).
* firmware: dmi-id: add a release callback function (git-fixes).
* firmware: raspberrypi: Use correct device for DMA mappings (git-fixes).
* firmware: tegra: bpmp: Return directly after a failed kzalloc() in
get_filename() (stable-fixes).
* fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes)
* fs/9p: translate O_TRUNC into OTRUNC (git-fixes)
* fs: Fix error checking for d_hash_and_lookup() (git-fixes)
* fs: indicate request originates from old mount API (git-fixes)
* fs: relax mount_setattr() permission checks (git-fixes)
* fsverity: skip PKCS#7 parser when keyring is empty (git-fixes)
* ftrace: Fix possible use-after-free issue in ftrace_location() (git-fixes).
* fuse: do not unhash root (bsc#1223946).
* fuse: fix root lookup with nonzero generation (bsc#1223945).
* geneve: fix header validation in geneve[6]_xmit_skb (git-fixes).
* geneve: make sure to pull inner header in geneve_rx() (git-fixes).
* gpio: cdev: check for NULL labels when sanitizing them for irqs (git-fixes).
* gpio: cdev: fix missed label sanitizing in debounce_setup() (git-fixes).
* gpio: cdev: sanitize the label before requesting the interrupt (stable-
fixes).
* gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes).
* gpio: tangier: Use correct type for the IRQ chip data (git-fixes).
* gpio: tegra186: Fix tegra186_gpio_is_accessible() check (git-fixes).
* gpio: wcove: Use -ENOTSUPP consistently (stable-fixes).
* gpiolib: cdev: fix uninitialised kfifo (git-fixes).
* gpiolib: cdev: relocate debounce_period_us from struct gpio_desc (stable-
fixes).
* gpiolib: swnode: Remove wrong header inclusion (git-fixes).
* gpu: host1x: Do not setup DMA for virtual devices (stable-fixes).
* gtp: fix use-after-free and null-ptr-deref in gtp_newlink() (git-fixes).
* hwmon: (amc6821) add of_match table (stable-fixes).
* hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock (git-
fixes).
* hwmon: (corsair-cpro) Use a separate buffer for sending commands (git-
fixes).
* hwmon: (corsair-cpro) Use complete_all() instead of complete() in
ccp_raw_event() (git-fixes).
* hwmon: (intel-m10-bmc-hwmon) Fix multiplier for N6000 board power sensor
(git-fixes).
* hwmon: (lm70) fix links in doc and comments (git-fixes).
* hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes).
* hwmon: (shtc1) Fix property misspelling (git-fixes).
* hwtracing: hisi_ptt: Move type check to the beginning of
hisi_ptt_pmu_event_init() (git-fixes).
* i2c: cadence: Avoid fifo clear after start (git-fixes).
* i2c: pxa: hide unused icr_bits[] variable (git-fixes).
* i2c: smbus: fix NULL function pointer dereference (git-fixes).
* i2c: synquacer: Fix an error handling path in synquacer_i2c_probe() (git-
fixes).
* i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame
(git-fixes).
* i3c: master: svc: fix invalidate IBI type and miss call client IBI handler
(git-fixes).
* i40e: Enforce software interrupt during busy-poll exit (git-fixes).
* i40e: Fix VF MAC filter removal (git-fixes).
* i40e: Fix firmware version comparison function (git-fixes).
* i40e: disable NAPI right after disabling irqs when handling xsk_pool (git-
fixes).
* i40e: fix i40e_count_filters() to count only active/new filters (git-fixes).
* i40e: fix vf may be used uninitialized in this function warning (git-fixes).
* i915: make inject_virtual_interrupt() void (stable-fixes).
* ice: Refactor FW data type and fix bitmap casting issue (git-fixes).
* ice: fix enabling RX VLAN filtering (git-fixes).
* ice: fix memory corruption bug with suspend and rebuild (git-fixes).
* ice: fix stats being updated by way too large values (git-fixes).
* ice: fix typo in assignment (git-fixes).
* ice: fix uninitialized dplls mutex usage (git-fixes).
* ice: reconfig host after changing MSI-X on VF (git-fixes).
* ice: reorder disabling IRQ and NAPI in ice_qp_dis (git-fixes).
* ice: use relative VSI index for VFs instead of PF VSI number (git-fixes).
* ice: virtchnl: stop pretending to support RSS over AQ or registers (git-
fixes).
* ida: make 'ida_dump' static (git-fixes).
* idma64: Do not try to serve interrupts when device is powered off (git-
fixes).
* idpf: disable local BH when scheduling napi for marker packets (git-fixes).
* idpf: extend tx watchdog timeout (bsc#1224137).
* idpf: fix kernel panic on unknown packet types (git-fixes).
* igb: Fix missing time sync events (git-fixes).
* igb: extend PTP timestamp adjustments to i211 (git-fixes).
* igc: Fix missing time sync events (git-fixes).
* igc: Remove stale comment about Tx timestamping (git-fixes).
* igc: avoid returning frame twice in XDP_REDIRECT (git-fixes).
* iio: accel: mxc4005: Interrupt handling fixes (git-fixes).
* iio: adc: stm32: Fixing err code to not indicate success (git-fixes).
* iio: core: Leave private pointer NULL when no private data supplied (git-
fixes).
* iio: dummy_evgen: remove Excess kernel-doc comments (git-fixes).
* iio: gts-helper: Fix division loop (git-fixes).
* iio: pressure: Fixes BME280 SPI driver data (git-fixes).
* iio: pressure: dps310: support negative temperature values (git-fixes).
* iio:imu: adis16475: Fix sync mode setting (git-fixes).
* inet: frags: eliminate kernel-doc warning (git-fixes).
* inet_diag: annotate data-races around inet_diag_table[] (git-fixes).
* init/main.c: Fix potential static_command_line memory overflow (git-fixes).
* init: open /initrd.image with O_LARGEFILE (stable-fixes).
* input/touchscreen: imagis: Correct the maximum touch area value (stable-
fixes).
* intel: legacy: Partial revert of field get conversion (git-fixes).
* interconnect: qcom: osm-l3: Replace custom implementation of COUNT_ARGS()
(git-fixes).
* interconnect: qcom: qcm2290: Fix mas_snoc_bimc QoS port assignment (git-
fixes).
* interconnect: qcom: sc8180x: Mark CO0 BCM keepalive (git-fixes).
* interconnect: qcom: sm8550: Enable sync_state (git-fixes).
* io_uring: kabi cookie remove (bsc#1217384).
* iomap: clear the per-folio dirty bits on all writeback failures (git-fixes)
* iommu/arm-smmu-v3: Check that the RID domain is S1 in SVA (git-fixes).
* iommu/dma: Force swiotlb_max_mapping_size on an untrusted device
(bsc#1224331)
* iommu/dma: Trace bounce buffer usage when mapping buffers (git-fixes).
* iommu/vt-d: Allocate local memory for page request queue (git-fixes).
* iommu/vt-d: Fix wrong use of pasid config (git-fixes).
* iommu/vt-d: Set SSADE when attaching to a parent with dirty tracking (git-
fixes).
* iommu: Map reserved memory as cacheable if device is coherent (git-fixes).
* iommufd/iova_bitmap: Bounds check mapped::pages access (git-fixes).
* iommufd/iova_bitmap: Consider page offset for the pages to be pinned (git-
fixes).
* iommufd/iova_bitmap: Switch iova_bitmap::bitmap to an u8 array (git-fixes).
* iommufd: Add missing IOMMUFD_DRIVER kconfig for the selftest (git-fixes).
* iommufd: Fix iopt_access_list_id overwrite bug (git-fixes).
* iommufd: Reject non-zero data_type if no data_len is provided (git-fixes).
* ionic: set adminq irq affinity (git-fixes).
* ipv4: annotate data-races around fi->fib_dead (git-fixes).
* irqchip/alpine-msi: Fix off-by-one in allocation error path (git-fixes).
* irqchip/armada-370-xp: Suppress unused-function warning (git-fixes).
* irqchip/gic-v3-its: Do not assume vPE tables are preallocated (git-fixes).
* irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git-
fixes).
* irqchip/gic-v3-its: Prevent double free on error (git-fixes).
* irqchip/loongson-pch-msi: Fix off-by-one on allocation error path (git-
fixes).
* irqchip/mbigen: Do not use bus_get_dev_root() to find the parent (git-
fixes).
* irqchip/renesas-rzg2l: Add macro to retrieve TITSR register offset based on
register's index (stable-fixes).
* irqchip/renesas-rzg2l: Flush posted write in irq_eoi() (git-fixes).
* irqchip/renesas-rzg2l: Implement restriction when writing ISCR register
(stable-fixes).
* irqchip/renesas-rzg2l: Prevent spurious interrupts when setting trigger type
(git-fixes).
* irqchip/renesas-rzg2l: Rename rzg2l_irq_eoi() (stable-fixes).
* irqchip/renesas-rzg2l: Rename rzg2l_tint_eoi() (stable-fixes).
* ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes).
* ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes).
* jffs2: prevent xattr node from overflowing the eraseblock (git-fixes).
* kABI fix of KVM: x86/pmu: Allow programming events that match unsupported
arch events (bsc#1225696).
* kABI fix of KVM: x86: Snapshot if a vCPU's vendor model is AMD vs. Intel
compatible (git-fixes).
* kABI workaround for cs35l56 (git-fixes).
* kABI workaround for of driver changes (git-fixes).
* kABI: Adjust trace_iterator.wait_index (git-fixes).
* kabi fix of perf/x86/intel: Expose existence of callback support to KVM (git
fixes).
* kabi/severities: Remove mitigation-related symbols Those are used by the
core kernel to implement CPU vulnerabilities mitigation and are not expected
to be consumed by 3rd party users.
* kabi/severities: ignore IMS functions They were dropped in previous patches.
Noone is supposed to use them.
* kabi/severities: ignore TAS2781 symbol drop, it's only locally used
* kabi/severities: ignore Wangxun ethernet driver local symbols
* kabi/severities: ignore brcmfmac-specific local symbols
* kasan, fortify: properly rename memintrinsics (git-fixes).
* kasan/test: avoid gcc warning for intentional overflow (git-fixes).
* kasan: disable kasan_non_canonical_hook() for HW tags (git-fixes).
* kasan: print the original fault addr when access invalid shadow (git-fixes).
* kbuild: Move -Wenum-{compare-conditional,enum-conversion} into W=1 (stable-
fixes).
* kconfig: fix infinite loop when expanding a macro at the end of file (git-
fixes).
* kexec: do syscore_shutdown() in kernel_kexec (git-fixes).
* kprobes: Fix possible use-after-free issue on kprobe registration (git-
fixes).
* kselftest: Add a ksft_perror() helper (stable-fixes).
* kunit/fortify: Fix mismatched kvalloc()/vfree() usage (git-fixes).
* leds: pwm: Disable PWM when going to suspend (git-fixes).
* lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure (git-fixes).
* libnvdimm: Fix ACPI_NFIT in BLK_DEV_PMEM help (jsc#PED-5853).
* libperf evlist: Avoid out-of-bounds access (git-fixes).
* libsubcmd: Fix parse-options memory leak (git-fixes).
* livepatch: Fix missing newline character in klp_resolve_symbols()
(bsc#1223539).
* locks: fix KASAN: use-after-free in trace_event_raw_event_filelock_lock
(git-fixes)
* lsm: fix the logic in security_inode_getsecctx() (git-fixes).
* mac802154: fix llsec key resources release in mac802154_llsec_key_del (git-
fixes).
* maple_tree: fix mas_empty_area_rev() null pointer dereference (git-fixes).
* md/dm-raid: do not call md_reap_sync_thread() directly (jsc#PED-7542).
* md/raid1-10: add a helper raid1_check_read_range() (jsc#PED-7542).
* md/raid1-10: factor out a new helper raid1_should_read_first()
(jsc#PED-7542).
* md/raid1: factor out choose_bb_rdev() from read_balance() (jsc#PED-7542).
* md/raid1: factor out choose_slow_rdev() from read_balance() (jsc#PED-7542).
* md/raid1: factor out helpers to add rdev to conf (jsc#PED-7542).
* md/raid1: factor out helpers to choose the best rdev from read_balance()
(jsc#PED-7542).
* md/raid1: factor out read_first_rdev() from read_balance() (jsc#PED-7542).
* md/raid1: factor out the code to manage sequential IO (jsc#PED-7542).
* md/raid1: fix choose next idle in read_balance() (jsc#PED-7542).
* md/raid1: record nonrot rdevs while adding/removing rdevs to conf
(jsc#PED-7542).
* md: Do not clear MD_CLOSING when the raid is about to stop (jsc#PED-7542).
* md: add a new helper rdev_has_badblock() (jsc#PED-7542).
* md: add a new helper reshape_interrupted() (jsc#PED-7542).
* md: changed the switch of RAID_VERSION to if (jsc#PED-7542).
* md: check mddev->pers before calling md_set_readonly() (jsc#PED-7542).
* md: clean up invalid BUG_ON in md_ioctl (jsc#PED-7542).
* md: clean up openers check in do_md_stop() and md_set_readonly()
(jsc#PED-7542).
* md: do not clear MD_RECOVERY_FROZEN for new dm-raid until resume
(jsc#PED-7542).
* md: export helper md_is_rdwr() (jsc#PED-7542).
* md: export helpers to stop sync_thread (jsc#PED-7542).
* md: factor out a helper to sync mddev (jsc#PED-7542).
* md: fix kmemleak of rdev->serial (jsc#PED-7542).
* md: get rdev->mddev with READ_ONCE() (jsc#PED-7542).
* md: merge the check of capabilities into md_ioctl_valid() (jsc#PED-7542).
* md: preserve KABI in struct md_personality (jsc#PED-7542).
* md: remove redundant check of 'mddev->sync_thread' (jsc#PED-7542).
* md: remove redundant md_wakeup_thread() (jsc#PED-7542).
* md: return directly before setting did_set_md_closing (jsc#PED-7542).
* md: sync blockdev before stopping raid or setting readonly (jsc#PED-7542).
* md: use RCU lock to protect traversal in md_spares_need_change()
(jsc#PED-7542).
* media: atomisp: ssh_css: Fix a null-pointer dereference in
load_video_binaries (git-fixes).
* media: cadence: csi2rx: use match fwnode for media link (git-fixes).
* media: cec: core: remove length check of Timer Status (stable-fixes).
* media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes).
* media: flexcop-usb: fix sanity check of bNumEndpoints (git-fixes).
* media: i2c: et8ek8: Do not strip remove function when driver is builtin
(git-fixes).
* media: ipu3-cio2: Request IRQ earlier (git-fixes).
* media: mc: Fix flags handling when creating pad links (stable-fixes).
* media: mc: Fix graph walk in media_pipeline_start (git-fixes).
* media: mc: Rename pad variable to clarify intent (stable-fixes).
* media: mc: mark the media devnode as registered from the, start (git-fixes).
* media: ngene: Add dvb_ca_en50221_init return value check (git-fixes).
* media: rcar-vin: work around -Wenum-compare-conditional warning (git-fixes).
* media: rkisp1: Fix IRQ handling due to shared interrupts (stable-fixes).
* media: sta2x11: fix irq handler cast (stable-fixes).
* media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes).
* media: sunxi: a83-mips-csi2: also select GENERIC_PHY (git-fixes).
* media: uvcvideo: Add quirk for Logitech Rally Bar (git-fixes).
* media: v4l2-subdev: Fix stream handling for crop API (git-fixes).
* media: v4l: Do not turn on privacy LED if streamon fails (git-fixes).
* mei: me: add arrow lake point H DID (stable-fixes).
* mei: me: add arrow lake point S DID (stable-fixes).
* mei: me: add lunar lake point M DID (stable-fixes).
* mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes).
* mlxbf_gige: call request_irq() after NAPI initialized (git-fixes).
* mlxbf_gige: stop PHY during open() error paths (git-fixes).
* mlxbf_gige: stop interface during shutdown (git-fixes).
* mlxsw: Use refcount_t for reference counting (git-fixes).
* mm,page_owner: Defer enablement of static branch (bsc#1222366).
* mm,page_owner: Fix accounting of pages when migrating (bsc#1222366).
* mm,page_owner: Fix printing of stack records (bsc#1222366).
* mm,page_owner: Fix refcount imbalance (bsc#1222366).
* mm,page_owner: Update metadata for tail pages (bsc#1222366).
* mm,page_owner: check for null stack_record before bumping its refcount
(bsc#1222366).
* mm,page_owner: drop unnecessary check (bsc#1222366).
* mm,page_owner: fix recursion (bsc#1222366).
* mm/slab: make __free(kfree) accept error pointers (git-fixes).
* mm: memcg: do not periodically flush stats when memcg is disabled
(bsc#1222525).
* mm: memcg: use larger batches for proactive reclaim (bsc#1222522).
* mm: page_owner: fix wrong information in dump_page_owner (git-fixes).
* mm_init kABI workaround (git-fixes).
* mmc: core: Add HS400 tuning in HS400es initialization (stable-fixes).
* mmc: core: Avoid negative index with array access (git-fixes).
* mmc: core: Initialize mmc_blk_ioc_data (git-fixes).
* mmc: davinci: Do not strip remove function when driver is builtin (git-
fixes).
* mmc: omap: fix broken slot switch lookup (git-fixes).
* mmc: omap: fix deferred probe (git-fixes).
* mmc: omap: restore original power up/down steps (git-fixes).
* mmc: sdhci-msm: pervent access to suspended controller (git-fixes).
* mmc: sdhci-omap: re-tuning is needed after a pm transition to support emmc
HS200 mode (git-fixes).
* mmc: sdhci_am654: Add ITAPDLYSEL in sdhci_j721e_4bit_set_clock (git-fixes).
* mmc: sdhci_am654: Add OTAP/ITAP delay enable (git-fixes).
* mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes).
* mmc: sdhci_am654: Fix ITAPDLY for HS400 timing (git-fixes).
* mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes).
* modpost: Add '.ltext' and '.ltext.*' to TEXT_SECTIONS (stable-fixes).
* mptcp: Remove unnecessary test for __mptcp_init_sock() (git-fixes).
* mptcp: annotate data-races around msk->rmem_fwd_alloc (git-fixes).
* mptcp: fix bogus receive window shrinkage with multiple subflows (git-
fixes).
* mptcp: move __mptcp_error_report in protocol.c (git-fixes).
* mptcp: process pending subflow error on close (git-fixes).
* mtd: core: Report error if first mtd_otp_size() call fails in
mtd_otp_nvmem_add() (git-fixes).
* mtd: diskonchip: work around ubsan link failure (stable-fixes).
* mtd: rawnand: hynix: fixed typo (git-fixes).
* mtd: spinand: Add support for 5-byte IDs (stable-fixes).
* net/mlx5: Correctly compare pkt reformat ids (git-fixes).
* net/mlx5: E-switch, Change flow rule destination checking (git-fixes).
* net/mlx5: E-switch, store eswitch pointer before registering devlink_param
(git-fixes).
* net/mlx5: Fix fw reporter diagnose output (git-fixes).
* net/mlx5: Fix peer devlink set for SF representor devlink port (git-fixes).
* net/mlx5: Lag, restore buckets number to default after hash LAG deactivation
(git-fixes).
* net/mlx5: Properly link new fs rules into the tree (git-fixes).
* net/mlx5: Register devlink first under devlink lock (git-fixes).
* net/mlx5: Restore mistakenly dropped parts in register devlink flow (git-
fixes).
* net/mlx5: SF, Stop waiting for FW as teardown was called (git-fixes).
* net/mlx5: offset comp irq index in name by one (git-fixes).
* net/mlx5e: Change the warning when ignore_flow_level is not supported (git-
fixes).
* net/mlx5e: Do not produce metadata freelist entries in Tx port ts WQE xmit
(git-fixes).
* net/mlx5e: Fix mlx5e_priv_init() cleanup flow (git-fixes).
* net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes).
* net/mlx5e: RSS, Block XOR hash with over 128 channels (git-fixes).
* net/mlx5e: RSS, Block changing channels number when RXFH is configured (git-
fixes).
* net/mlx5e: Switch to using _bh variant of of spinlock API in port
timestamping NAPI poll context (git-fixes).
* net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking
occurs after populating the metadata_map (git-fixes).
* net/smc: bugfix for smcr v2 server connect success statistic (git-fixes).
* net/smc: fix documentation of buffer sizes (git-fixes).
* net/smc: use smc_lgr_list.lock to protect smc_lgr_list.list iterate in
smcr_port_add (git-fixes).
* net/x25: fix incorrect parameter validation in the x25_getsockopt() function
(git-fixes).
* net: NSH: fix kernel-doc notation warning (git-fixes).
* net: Use sockaddr_storage for getsockopt(SO_PEERNAME) (git-fixes).
* net: add netdev_lockdep_set_classes() to virtual drivers (git-fixes).
* net: annotate data-races around sk->sk_bind_phc (git-fixes).
* net: annotate data-races around sk->sk_forward_alloc (git-fixes).
* net: annotate data-races around sk->sk_lingertime (git-fixes).
* net: annotate data-races around sk->sk_tsflags (git-fixes).
* net: bonding: remove kernel-doc comment marker (git-fixes).
* net: cfg802154: fix kernel-doc notation warnings (git-fixes).
* net: dsa: microchip: fix register write order in ksz8_ind_write8() (git-
fixes).
* net: dsa: mt7530: fix handling of all link-local frames (git-fixes).
* net: dsa: mt7530: fix link-local frames that ingress vlan filtering ports
(git-fixes).
* net: dsa: mt7530: prevent possible incorrect XTAL frequency selection (git-
fixes).
* net: dsa: mt7530: trap link-local frames regardless of ST Port State (git-
fixes).
* net: dsa: sja1105: Fix parameters order in sja1110_pcs_mdio_write_c45()
(git-fixes).
* net: ena: Fix incorrect descriptor free behavior (git-fixes).
* net: ena: Fix potential sign extension issue (git-fixes).
* net: ena: Move XDP code to its new files (git-fixes).
* net: ena: Pass ena_adapter instead of net_device to ena_xmit_common() (git-
fixes).
* net: ena: Remove ena_select_queue (git-fixes).
* net: ena: Set tx_info->xdpf value to NULL (git-fixes).
* net: ena: Use tx_ring instead of xdp_ring for XDP channel TX (git-fixes).
* net: ena: Wrong missing IO completions check order (git-fixes).
* net: ethernet: mtk_eth_soc: fix PPE hanging issue (git-fixes).
* net: ethernet: ti: cpsw: enable mac_managed_pm to fix mdio (git-fixes).
* net: fec: Set mac_managed_pm during probe (git-fixes).
* net: hns3: fix index limit to support all queue stats (git-fixes).
* net: hns3: fix kernel crash when 1588 is received on HIP08 devices (git-
fixes).
* net: hns3: fix kernel crash when devlink reload during pf initialization
(git-fixes).
* net: hns3: fix port duplex configure error in IMP reset (git-fixes).
* net: hns3: fix wrong judgment condition issue (git-fixes).
* net: hns3: mark unexcuted loopback test result as UNEXECUTED (git-fixes).
* net: hns3: tracing: fix hclgevf trace event strings (git-fixes).
* net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()
(git-fixes).
* net: ks8851: Handle softirqs at the end of IRQ thread to fix hang (git-
fixes).
* net: ks8851: Inline ks8851_rx_skb() (git-fixes).
* net: ks8851: Queue RX packets in IRQ handler instead of disabling BHs (git-
fixes).
* net: lan743x: Add set RFE read fifo threshold for PCI1x1x chips (git-fixes).
* net: libwx: fix memory leak on free page (git-fixes).
* net: ll_temac: platform_get_resource replaced by wrong function (git-fixes).
* net: llc: fix kernel-doc notation warnings (git-fixes).
* net: mana: Fix Rx DMA datasize and skb_over_panic (git-fixes).
* net: mediatek: mtk_eth_soc: clear MAC_MCR_FORCE_LINK only when MAC is up
(git-fixes).
* net: nfc: remove inappropriate attrs check (stable-fixes).
* net: pcs: xpcs: Return EINVAL in the internal methods (git-fixes).
* net: phy: fix phy_read_poll_timeout argument type in genphy_loopback (git-
fixes).
* net: phy: micrel: Fix potential null pointer dereference (git-fixes).
* net: phy: micrel: lan8814: Fix when enabling/disabling 1-step timestamping
(git-fixes).
* net: phy: micrel: set soft_reset callback to genphy_soft_reset for KSZ8061
(git-fixes).
* net: phy: phy_device: Prevent nullptr exceptions on ISR (git-fixes).
* net: phy: phy_device: Prevent nullptr exceptions on ISR (stable-fixes).
* net: ravb: Always process TX descriptor ring (git-fixes).
* net: ravb: Let IP-specific receive function to interrogate descriptors (git-
fixes).
* net: smsc95xx: add support for SYS TEC USB-SPEmodule1 (git-fixes).
* net: sparx5: Fix use after free inside sparx5_del_mact_entry (git-fixes).
* net: sparx5: fix wrong config being used when reconfiguring PCS (git-fixes).
* net: sparx5: flower: fix fragment flags handling (git-fixes).
* net: stmmac: Fix incorrect dereference in interrupt handlers (git-fixes).
* net: stmmac: dwmac-starfive: Add support for JH7100 SoC (git-fixes).
* net: stmmac: fix rx queue priority assignment (git-fixes).
* net: sunrpc: Fix an off by one in rpc_sockaddr2uaddr() (git-fixes).
* net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes).
* net: tls, fix WARNIING in __sk_msg_free (bsc#1221858).
* net: tls: fix returned read length with async decrypt (bsc#1221858).
* net: tls: fix use-after-free with partial reads and async (bsc#1221858).
* net: usb: ax88179_178a: avoid the interface always configured as random
address (git-fixes).
* net: usb: ax88179_178a: avoid writing the mac address before first reading
(git-fixes).
* net: usb: ax88179_178a: fix link status when link is set to down/up (git-
fixes).
* net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).
* net: usb: smsc95xx: fix changing LED_SEL bit value updated from EEPROM (git-
fixes).
* net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).
* net: usb: sr9700: stop lying about skb->truesize (git-fixes).
* net: veth: do not manipulate GRO when using XDP (git-fixes).
* net: wwan: t7xx: Split 64bit accesses to fix alignment issues (git-fixes).
* net:usb:qmi_wwan: support Rolling modules (stable-fixes).
* netfilter: nf_tables: disable toggling dormant table state more than once
(git-fixes).
* netfilter: nf_tables: uapi: Describe NFTA_RULE_CHAIN_ID (git-fixes).
* netfilter: nft_ct: fix l3num expectations with inet pseudo family (git-
fixes).
* netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention
(git-fixes).
* nf_conntrack: fix -Wunused-const-variable= (git-fixes).
* nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git-
fixes).
* nfc: nci: Fix kcov check in nci_rx_work() (git-fixes).
* nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet (git-fixes).
* nfc: nci: Fix uninit-value in nci_rx_work (git-fixes).
* nfp: flower: handle acti_netdevs allocation failure (git-fixes).
* nfs: fix panic when nfs4_ff_layout_prepare_ds() fails (git-fixes).
* nfsd: Fix a regression in nfsd_setattr() (git-fixes).
* nfsd: do not call locks_release_private() twice concurrently (git-fixes).
* nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380
bsc#1217408).
* nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
* nilfs2: fix out-of-range warning (git-fixes).
* nilfs2: fix potential bug in end_buffer_async_write (git-fixes).
* nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes).
* nilfs2: fix use-after-free of timer for log writer thread (git-fixes).
* nilfs2: make superblock data array index computation sparse friendly (git-
fixes).
* nouveau/dmem: handle kcalloc() allocation failure (git-fixes).
* nouveau/gsp: do not check devinit disable on GSP (git-fixes).
* nouveau/uvmm: fix addr/range calcs for remap operations (git-fixes).
* nouveau: fix devinit paths to only handle display on GSP (git-fixes).
* nouveau: fix function cast warning (git-fixes).
* nouveau: fix instmem race condition around ptr stores (git-fixes).
* nouveau: lock the client object tree (stable-fixes).
* nouveau: reset the bo resource bus info after an eviction (git-fixes).
* nvdimm/pmem: Treat alloc_dax() -EOPNOTSUPP failure as non-fatal
(jsc#PED-5853).
* nvdimm/pmem: fix leak on dax_add_host() failure (jsc#PED-5853).
* nvdimm: make nvdimm_bus_type const (jsc#PED-5853).
* nvme-fc: do not wait in vain when unloading module (git-fixes).
* nvme-multipath: fix io accounting on failover (git-fixes).
* nvme-pci: Add quirk for broken MSIs (git-fixes).
* nvme-tcp: strict pdu pacing to avoid send stalls on TLS (bsc#1221858).
* nvme: fix multipath batched completion accounting (git-fixes).
* nvme: fix reconnection fail due to reserved tag allocation (git-fixes).
* nvme: fix warn output about shared namespaces without CONFIG_NVME_MULTIPATH
(git-fixes).
* nvmet-fc: abort command when there is no binding (git-fixes).
* nvmet-fc: defer cleanup using RCU properly (git-fixes).
* nvmet-fc: hold reference on hostport match (git-fixes).
* nvmet-fc: release reference on target port (git-fixes).
* nvmet-fcloop: swap the list_add_tail arguments (git-fixes).
* nvmet-tcp: fix nvme tcp ida memory leak (git-fixes).++ kernel-source-
azure.spec (revision 4)%define git_commit
ba2f81d0ba1ad117dc6a5494a21d358f354126d7Release: <RELEASE>.gba2f81d
* nvmet: fix ns enable/disable possible hang (git-fixes).
* octeontx2-af: Add array index check (git-fixes).
* octeontx2-af: Fix NIX SQ mode and BP config (git-fixes).
* octeontx2-af: Fix devlink params (git-fixes).
* octeontx2-af: Fix issue with loading coalesced KPU profiles (git-fixes).
* octeontx2-af: Use matching wake_up API variant in CGX command interface
(git-fixes).
* octeontx2-af: Use separate handlers for interrupts (git-fixes).
* octeontx2-pf: Fix transmit scheduler resource leak (git-fixes).
* octeontx2-pf: Send UP messages to VF only when VF is up (git-fixes).
* octeontx2-pf: Use default max_active works instead of one (git-fixes).
* octeontx2-pf: Wait till detach_resources msg is complete (git-fixes).
* octeontx2-pf: check negative error code in otx2_open() (git-fixes).
* octeontx2-pf: fix FLOW_DIS_IS_FRAGMENT implementation (git-fixes).
* octeontx2: Detect the mbox up or down message via register (git-fixes).
* of: dynamic: Synchronize of_changeset_destroy() with the devlink removals
(git-fixes).
* of: module: add buffer overflow check in of_modalias() (git-fixes).
* of: module: prevent NULL pointer dereference in vsnprintf() (stable-fixes).
* of: property: Add in-ports/out-ports support to of_graph_get_port_parent()
(stable-fixes).
* of: property: Improve finding the consumer of a remote-endpoint property
(git-fixes).
* of: property: Improve finding the supplier of a remote-endpoint property
(git-fixes).
* of: property: fix typo in io-channels (git-fixes).
* of: property: fw_devlink: Fix stupid bug in remote-endpoint parsing (git-
fixes).
* of: unittest: Fix compile in the non-dynamic case (git-fixes).
* overflow: Allow non-type arg to type_max() and type_min() (stable-fixes).
* peci: linux/peci.h: fix Excess kernel-doc description warning (git-fixes).
* perf annotate: Fix annotation_calc_lines() to pass correct address to
get_srcline() (git-fixes).
* perf annotate: Get rid of duplicate --group option item (git-fixes).
* perf auxtrace: Fix multiple use of --itrace option (git-fixes).
* perf bench internals inject-build-id: Fix trap divide when collecting just
one DSO (git-fixes).
* perf bench uprobe: Remove lib64 from libc.so.6 binary path (git-fixes).
* perf bpf: Clean up the generated/copied vmlinux.h (git-fixes).
* perf daemon: Fix file leak in daemon_session__control (git-fixes).
* perf docs: Document bpf event modifier (git-fixes).
* perf evsel: Fix duplicate initialization of data->id in
evsel__parse_sample() (git-fixes).
* perf expr: Fix "has_event" function for metric style events (git-fixes).
* perf intel-pt: Fix unassigned instruction op (discovered by MemorySanitizer)
(git-fixes).
* perf jevents: Drop or simplify small integer values (git-fixes).
* perf list: fix short description for some cache events (git-fixes).
* perf lock contention: Add a missing NULL check (git-fixes).
* perf metric: Do not remove scale from counts (git-fixes).
* perf pmu: Count sys and cpuid JSON events separately (git fixes).
* perf pmu: Fix a potential memory leak in perf_pmu__lookup() (git-fixes).
* perf pmu: Treat the msr pmu as software (git-fixes).
* perf print-events: make is_event_supported() more robust (git-fixes).
* perf probe: Add missing libgen.h header needed for using basename() (git-
fixes).
* perf record: Check conflict between '\--timestamp-filename' option and pipe
mode before recording (git-fixes).
* perf record: Fix debug message placement for test consumption (git-fixes).
* perf record: Fix possible incorrect free in record__switch_output() (git-
fixes).
* perf report: Avoid SEGV in report__setup_sample_type() (git-fixes).
* perf sched timehist: Fix -g/--call-graph option failure (git-fixes).
* perf script: Show also errors for --insn-trace option (git-fixes).
* perf srcline: Add missed addr2line closes (git-fixes).
* perf stat: Avoid metric-only segv (git-fixes).
* perf stat: Do not display metric header for non-leader uncore events (git-
fixes).
* perf stat: Do not fail on metrics on s390 z/VM systems (git-fixes).
* perf symbols: Fix ownership of string in dso__load_vmlinux() (git-fixes).
* perf test shell arm_coresight: Increase buffer size for Coresight basic
tests (git-fixes).
* perf tests: Apply attributes to all events in object code reading test (git-
fixes).
* perf tests: Make "test data symbol" more robust on Neoverse N1 (git-fixes).
* perf tests: Make data symbol test wait for perf to start (bsc#1220045).
* perf tests: Skip data symbol test if buf1 symbol is missing (bsc#1220045).
* perf thread: Fixes to thread__new() related to initializing comm (git-
fixes).
* perf thread_map: Free strlist on normal path in thread_map__new_by_tid_str()
(git-fixes).
* perf top: Uniform the event name for the hybrid machine (git-fixes).
* perf top: Use evsel's cpus to replace user_requested_cpus (git-fixes).
* perf ui browser: Avoid SEGV on title (git fixes).
* perf ui browser: Do not save pointer to stack memory (git-fixes).
* perf vendor events amd: Add Zen 4 memory controller events (git-fixes).
* perf vendor events amd: Fix Zen 4 cache latency events (git-fixes).
* perf/x86/amd/core: Avoid register reset when CPU is dead (git-fixes).
* perf/x86/amd/core: Update and fix stalled-cycles-* events for Zen 2 and
later (git-fixes).
* perf/x86/amd/lbr: Discard erroneous branch entries (git-fixes).
* perf/x86/amd/lbr: Use freeze based on availability (git-fixes).
* perf/x86/intel/ds: Do not clear ->pebs_data_cfg for the last PEBS event
(git-fixes).
* perf/x86/intel: Expose existence of callback support to KVM (git-fixes).
* perf/x86: Fix out of range data (git-fixes).
* phy: freescale: imx8m-pcie: fix pcie link-up instability (git-fixes).
* phy: marvell: a3700-comphy: Fix hardcoded array size (git-fixes).
* phy: marvell: a3700-comphy: Fix out of bounds read (git-fixes).
* phy: rockchip-snps-pcie3: fix bifurcation on rk3588 (git-fixes).
* phy: rockchip-snps-pcie3: fix clearing PHP_GRF_PCIESEL_CON bits (git-fixes).
* phy: rockchip: naneng-combphy: Fix mux on rk3588 (git-fixes).
* phy: ti: tusb1210: Resolve charger-det crash if charger psy is unregistered
(git-fixes).
* pinctrl/meson: fix typo in PDM's pin name (git-fixes).
* pinctrl: armada-37xx: remove an unused variable (git-fixes).
* pinctrl: baytrail: Fix selecting gpio pinctrl state (git-fixes).
* pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes).
* pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes).
* pinctrl: mediatek: paris: Fix PIN_CONFIG_INPUT_SCHMITT_ENABLE readback (git-
fixes).
* pinctrl: mediatek: paris: Rework support for
PIN_CONFIG_{INPUT,OUTPUT}_ENABLE (git-fixes).
* pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git-
fixes).
* pinctrl: qcom: pinctrl-sm7150: Fix sdc1 and ufs special pins regs (git-
fixes).
* pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs
(stable-fixes).
* platform/chrome: cros_ec_uart: properly fix race condition (git-fixes).
* platform/x86/amd/pmc: Extend Framework 13 quirk to more BIOSes (stable-
fixes).
* platform/x86/intel-uncore-freq: Do not present root domain on error (git-
fixes).
* platform/x86: ISST: Add Granite Rapids-D to HPM CPU list (stable-fixes).
* platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi
Vi8 tablet (stable-fixes).
* platform/x86: x86-android-tablets: Fix acer_b1_750_goodix_gpios name
(stable-fixes).
* platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git-
fixes).
* power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes).
* power: supply: mt6360_charger: Fix of_match for usb-otg-vbus regulator (git-
fixes).
* powerpc/crypto/chacha-p10: Fix failure on non Power10 (bsc#1218205).
* powerpc/eeh: Permanently disable the removed device (bsc#1223991
ltc#205740).
* powerpc/hv-gpci: Fix the H_GET_PERF_COUNTER_INFO hcall return value checks
(git-fixes).
* powerpc/pseries/lparcfg: drop error message from guest name lookup
(bsc#1187716 ltc#193451 git-fixes).
* powerpc/pseries/vio: Do not return ENODEV if node or compatible missing
(bsc#1220783).
* powerpc/pseries: make max polling consistent for longer H_CALLs
(bsc#1215199).
* powerpc/uaccess: Fix build errors seen with GCC 13/14 (bsc#1194869).
* powerpc/uaccess: Use YZ asm constraint for ld (bsc#1194869).
* powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645
ltc#205739 bsc#1223191).
* ppdev: Add an error check in register_device (git-fixes).
* prctl: generalize PR_SET_MDWE support check to be per-arch (bsc#1225610).
* printk: Add this_cpu_in_panic() (bsc#1225607).
* printk: Adjust mapping for 32bit seq macros (bsc#1225607).
* printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1225607).
* printk: Consolidate console deferred printing (bsc#1225607).
* printk: Disable passing console lock owner completely during panic()
(bsc#1225607).
* printk: Do not take console lock for console_flush_on_panic() (bsc#1225607).
* printk: For @suppress_panic_printk check for other CPU in panic
(bsc#1225607).
* printk: Keep non-panic-CPUs out of console lock (bsc#1225607).
* printk: Let no_printk() use _printk() (bsc#1225618).
* printk: Reduce console_unblank() usage in unsafe scenarios (bsc#1225607).
* printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic()
(bsc#1225607).
* printk: Update @console_may_schedule in console_trylock_spinning()
(bsc#1225616).
* printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1225607).
* printk: Wait for all reserved records with pr_flush() (bsc#1225607).
* printk: nbcon: Relocate 32bit seq macros (bsc#1225607).
* printk: ringbuffer: Clarify special lpos values (bsc#1225607).
* printk: ringbuffer: Cleanup reader terminology (bsc#1225607).
* printk: ringbuffer: Do not skip non-finalized records with prb_next_seq()
(bsc#1225607).
* printk: ringbuffer: Skip non-finalized records in panic (bsc#1225607).
* proc/kcore: do not try to access unaccepted memory (git-fixes).
* pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes).
* pstore: inode: Convert mutex usage to guard(mutex) (stable-fixes).
* pstore: inode: Only d_invalidate() is needed (git-fixes).
* pwm: img: fix pwm clock lookup (git-fixes).
* qibfs: fix dentry leak (git-fixes)
* r8169: fix issue caused by buggy BIOS on certain boards with RTL8168d (git-
fixes).
* r8169: skip DASH fw status checks when DASH is disabled (git-fixes).
* random: handle creditable entropy from atomic process context (git-fixes).
* regmap: Add regmap_read_bypassed() (git-fixes).
* regmap: kunit: Ensure that changed bytes are actually different (stable-
fixes).
* regmap: maple: Fix cache corruption in regcache_maple_drop() (git-fixes).
* regmap: maple: Fix uninitialized symbol 'ret' warnings (git-fixes).
* regulator: bd71828: Do not overwrite runtime voltages (git-fixes).
* regulator: change devm_regulator_get_enable_optional() stub to return Ok
(git-fixes).
* regulator: change stubbed devm_regulator_get_enable to return Ok (git-
fixes).
* regulator: core: fix debugfs creation regression (git-fixes).
* regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes).
* regulator: tps65132: Add of_match table (stable-fixes).
* remoteproc: k3-r5: Do not allow core1 to power up before core0 via sysfs
(git-fixes).
* remoteproc: k3-r5: Jump to error handling labels in start/stop errors (git-
fixes).
* remoteproc: k3-r5: Wait for core0 power-up before powering up core1 (git-
fixes).
* remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes).
* remoteproc: stm32: Fix incorrect type assignment returned by
stm32_rproc_get_loaded_rsc_tablef (git-fixes).
* remoteproc: virtio: Fix wdg cannot recovery remote processor (git-fixes).
* ring-buffer: Do not set shortest_full when full target is hit (git-fixes).
* ring-buffer: Fix a race between readers and resize checks (git-fixes).
* ring-buffer: Fix full_waiters_pending in poll (git-fixes).
* ring-buffer: Fix resetting of shortest_full (git-fixes).
* ring-buffer: Fix waking up ring buffer readers (git-fixes).
* ring-buffer: Make wake once of ring_buffer_wait() more robust (git-fixes).
* ring-buffer: Use wait_event_interruptible() in ring_buffer_wait() (git-
fixes).
* ring-buffer: use READ_ONCE() to read cpu_buffer->commit_page in concurrent
environment (git-fixes).
* rtc: mt6397: select IRQ_DOMAIN instead of depending on it (git-fixes).
* s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224792).
* s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223869).
* s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224793).
* s390/cpacf: Split and rework cpacf query functions (git-fixes bsc#1225133).
* s390/cpum_cf: make crypto counters upward compatible across machine types
(bsc#1224348).
* s390/ipl: Fix incorrect initialization of len fields in nvme reipl block
(git-fixes bsc#1225136).
* s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes
bsc#1225134).
* s390/ism: Properly fix receive message buffer allocation (git-fixes
bsc#1223590).
* s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223871).
* s390/mm: Fix storage key clearing for guest huge pages (git-fixes
bsc#1223872).
* s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223874).
* s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes
bsc#1223870).
* s390/vdso: drop '-fPIC' from LDFLAGS (git-fixes bsc#1223593).
* s390/vtime: fix average steal time calculation (git-fixes bsc#1221783).
* s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes
bsc#1223592).
* sched-fair-Add-EAS-checks-before-updating-root_domain-overutilized.patch.
* sched-fair-Combine-EAS-check-with-overutilized-access.patch.
* sched-fair-Introduce-is_rd_overutilized-helper-function-to-access-
root_domain-overutilized.patch.
* sched/balancing: Rename newidle_balance() => sched_balance_newidle()
(bsc#1222173).
* sched/fair: Check root_domain::overload value before update (bsc#1222173).
* sched/fair: Use helper functions to access root_domain::overload
(bsc#1222173).
* sched/psi: Select KERNFS as needed (git-fixes).
* sched/topology: Optimize topology_span_sane() (bsc#1225053).
* scsi: bfa: Fix function pointer type mismatch for hcb_qe->cbfn (git-fixes).
* scsi: core: Consult supported VPD page list prior to fetching page (git-
fixes).
* scsi: core: Fix unremoved procfs host directory regression (git-fixes).
* scsi: csiostor: Avoid function pointer casts (git-fixes).
* scsi: hisi_sas: Modify the deadline for ata_wait_after_reset() (git-fixes).
* scsi: libsas: Add a helper sas_get_sas_addr_and_dev_type() (git-fixes).
* scsi: libsas: Fix disk not being scanned in after being removed (git-fixes).
* scsi: lpfc: Add support for 32 byte CDBs (bsc#1225842).
* scsi: lpfc: Change default logging level for unsolicited CT MIB commands
(bsc#1225842).
* scsi: lpfc: Change lpfc_hba hba_flag member into a bitmask (bsc#1225842).
Refresh: - patches.suse/lpfc-reintroduce-old-irq-probe-logic.patch
* scsi: lpfc: Clear deferred RSCN processing flag when driver is unloading
(bsc#1225842).
* scsi: lpfc: Copyright updates for 14.4.0.1 patches (bsc#1221777).
* scsi: lpfc: Copyright updates for 14.4.0.2 patches (bsc#1225842).
* scsi: lpfc: Correct size for cmdwqe/rspwqe for memset() (bsc#1221777).
* scsi: lpfc: Correct size for wqe for memset() (bsc#1221777).
* scsi: lpfc: Define lpfc_dmabuf type for ctx_buf ptr (bsc#1221777).
* scsi: lpfc: Define lpfc_nodelist type for ctx_ndlp ptr (bsc#1221777).
* scsi: lpfc: Define types in a union for generic void *context3 ptr
(bsc#1221777).
* scsi: lpfc: Introduce rrq_list_lock to protect active_rrq_list
(bsc#1225842).
* scsi: lpfc: Move NPIV's transport unregistration to after resource clean up
(bsc#1221777).
* scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()
(bsc#1221777).
* scsi: lpfc: Remove IRQF_ONESHOT flag from threaded IRQ handling (bsc#1221777
bsc#1217959).
* scsi: lpfc: Remove unnecessary log message in queuecommand path
(bsc#1221777).
* scsi: lpfc: Replace hbalock with ndlp lock in lpfc_nvme_unregister_port()
(bsc#1221777).
* scsi: lpfc: Update logging of protection type for T10 DIF I/O (bsc#1225842).
* scsi: lpfc: Update lpfc version to 14.4.0.1 (bsc#1221777).
* scsi: lpfc: Update lpfc version to 14.4.0.2 (bsc#1225842).
* scsi: lpfc: Update lpfc_ramp_down_queue_handler() logic (bsc#1221777).
* scsi: lpfc: Use a dedicated lock for ras_fwlog state (bsc#1221777).
* scsi: mpi3mr: Reduce stack usage in mpi3mr_refresh_sas_ports() (git-fixes).
* scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git-
fixes).
* scsi: mylex: Fix sysfs buffer lengths (git-fixes).
* scsi: qla2xxx: Change debug message during driver unload (bsc1221816).
* scsi: qla2xxx: Delay I/O Abort on PCI error (bsc1221816).
* scsi: qla2xxx: Fix N2N stuck connection (bsc1221816).
* scsi: qla2xxx: Fix command flush on cable pull (bsc1221816).
* scsi: qla2xxx: Fix double free of fcport (bsc1221816).
* scsi: qla2xxx: Fix double free of the ha->vp_map pointer (bsc1221816).
* scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes).
* scsi: qla2xxx: NVME|FCP prefer flag not being honored (bsc1221816).
* scsi: qla2xxx: Prevent command send on chip reset (bsc1221816).
* scsi: qla2xxx: Split FCE|EFT trace control (bsc1221816).
* scsi: qla2xxx: Update manufacturer detail (bsc1221816).
* scsi: qla2xxx: Update version to 10.02.09.200-k (bsc1221816).
* scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git-
fixes).
* scsi: sg: Avoid race in error handling & drop bogus warn (git-fixes).
* scsi: sg: Avoid sg device teardown race (git-fixes).
* scsi: smartpqi: Fix disable_managed_interrupts (git-fixes).
* sctp: annotate data-races around sk->sk_wmem_queued (git-fixes).
* sdhci-of-dwcmshc: disable PM runtime in dwcmshc_remove() (git-fixes).
* selftests/binderfs: use the Makefile's rules, not Make's implicit rules
(git-fixes).
* selftests/bpf: add edge case backtracking logic test (bsc#1225756).
* selftests/bpf: precision tracking test for BPF_NEG and BPF_END
(bsc#1225756).
* selftests/ftrace: Fix event filter target_func selection (stable-fixes).
* selftests/ftrace: Limit length in subsystem-enable tests (git-fixes).
* selftests/kcmp: remove unused open mode (git-fixes).
* selftests/net: convert test_bridge_neigh_suppress.sh to run it in unique
namespace (stable-fixes).
* selftests/pidfd: Fix config for pidfd_setns_test (git-fixes).
* selftests/powerpc/dexcr: Add -no-pie to hashchk tests (git-fixes).
* selftests/powerpc/papr-vpd: Fix missing variable initialization
(jsc#PED-4486 git-fixes).
* selftests/resctrl: fix clang build failure: use LOCAL_HDRS (git-fixes).
* selftests/timers/posix_timers: Reimplement check_timer_distribution() (git-
fixes).
* selftests: default to host arch for LLVM builds (git-fixes).
* selftests: forwarding: Fix ping failure due to short timeout (git-fixes).
* selftests: kselftest: Fix build failure with NOLIBC (git-fixes).
* selftests: kselftest: Mark functions that unconditionally call exit() as
__noreturn (git-fixes).
* selftests: net: bridge: increase IGMP/MLD exclude timeout membership
interval (git-fixes).
* selftests: net: kill smcrouted in the cleanup logic in amt.sh (git-fixes).
* selftests: net: move amt to socat for better compatibility (git-fixes).
* selftests: test_bridge_neigh_suppress.sh: Fix failures due to duplicate MAC
(git-fixes).
* selftests: timers: Convert posix_timers test to generate KTAP output
(stable-fixes).
* selftests: timers: Fix abs() warning in posix_timers test (git-fixes).
* selftests: timers: Fix posix_timers ksft_print_msg() warning (git-fixes).
* selftests: timers: Fix valid-adjtimex signed left-shift undefined behavior
(stable-fixes).
* selftests: vxlan_mdb: Fix failures with old libnet (git-fixes).
* selinux: avoid dereference of garbage after mount failure (git-fixes).
* selinux: introduce an initial SID for early boot processes (bsc#1208593).
* serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes).
* serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes).
* serial: 8250_dw: Revert: Do not reclock if already at correct rate (git-
fixes).
* serial: 8250_exar: Do not remove GPIO device on suspend (git-fixes).
* serial: 8520_mtk: Set RTS on shutdown for Rx in-band wakeup (git-fixes).
* serial: Lock console when calling into driver before registration (git-
fixes).
* serial: core: Fix atomicity violation in uart_tiocmget (git-fixes).
* serial: core: only stop transmit when HW fifo is empty (git-fixes).
* serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable-
fixes).
* serial: max3100: Fix bitwise types (git-fixes).
* serial: max3100: Lock port->lock when calling uart_handle_cts_change() (git-
fixes).
* serial: max310x: fix NULL pointer dereference in I2C instantiation (git-
fixes).
* serial: max310x: fix syntax error in IRQ error message (git-fixes).
* serial: mxs-auart: add spinlock around changing cts state (git-fixes).
* serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git-
fixes).
* serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler
(git-fixes).
* serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes).
* serial: stm32: Reset .throttled state in .startup() (git-fixes).
* series.conf: cleanup Fix subsection header to silence series_insert error.
* slimbus: core: Remove usage of the deprecated ida_simple_xx() API (git-
fixes).
* slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes).
* smb3: show beginning time for per share stats (bsc#1225172).
* smb: client: ensure to try all targets when finding nested links
(bsc#1225172).
* smb: client: fix mount when dns_resolver key is not available (git-fixes,
bsc#1225172).
* smb: client: fix parsing of SMB3.1.1 POSIX create context (git-fixes,
bsc#1225172).
* smb: client: get rid of dfs code dep in namespace.c (bsc#1225172).
* smb: client: get rid of dfs naming in automount code (bsc#1225172).
* smb: client: introduce DFS_CACHE_TGT_LIST() (bsc#1225172).
* smb: client: reduce stack usage in cifs_try_adding_channels() (bsc#1225172).
* smb: client: remove extra @chan_count check in __cifs_put_smb_ses()
(bsc#1225172).
* smb: client: rename cifs_dfs_ref.c to namespace.c (bsc#1225172).
* soc: fsl: qbman: Always disable interrupts when taking cgr_lock (git-fixes).
* soc: fsl: qbman: Use raw spinlock for cgr_lock (git-fixes).
* soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes).
* soc: microchip: Fix POLARFIRE_SOC_SYS_CTRL input prompt (stable-fixes).
* soc: qcom: pmic_glink: Make client-lock non-sleeping (git-fixes).
* soc: qcom: pmic_glink: do not traverse clients list without a lock (git-
fixes).
* soc: qcom: pmic_glink: notify clients about the current state (git-fixes).
* soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes).
* sock_diag: annotate data-races around sock_diag_handlers[family] (git-
fixes).
* soundwire: amd: fix for wake interrupt handling for clockstop mode (git-
fixes).
* speakup: Avoid crash on very long word (git-fixes).
* speakup: Fix 8bit characters from direct synth (git-fixes).
* speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes).
* spi: Do not mark message DMA mapped when no transfer in it is (git-fixes).
* spi: fix null pointer dereference within spi_sync (git-fixes).
* spi: hisi-kunpeng: Delete the dump interface of data registers in debugfs
(git-fixes).
* spi: intel-pci: Add support for Lunar Lake-M SPI serial flash (stable-
fixes).
* spi: lm70llp: fix links in doc and comments (git-fixes).
* spi: lpspi: Avoid potential use-after-free in probe() (git-fixes).
* spi: mchp-pci1xxx: Fix a possible null pointer dereference in
pci1xxx_spi_probe (git-fixes).
* spi: microchip-core-qspi: fix setting spi bus clock rate (git-fixes).
* spi: spi-fsl-lpspi: remove redundant spi_controller_put call (git-fixes).
* spi: spi-mt65xx: Fix NULL pointer access in interrupt handler (git-fixes).
* spi: stm32: Do not warn about spurious interrupts (git-fixes).
* spi: xilinx: Fix kernel documentation in the xilinx_spi.h (git-fixes).
* spmi: hisi-spmi-controller: Do not override device identifier (git-fixes).
* staging: vc04_services: changen strncpy() to strscpy_pad() (stable-fixes).
* staging: vc04_services: fix information leak in create_component() (git-
fixes).
* staging: vt6655: Remove unused declaration of
RFbAL7230SelectChannelPostProcess() (git-fixes).
* stmmac: Clear variable when destroying workqueue (git-fixes).
* supported.conf: support tcp_dctcp module (jsc#PED-8111)
* swiotlb: Fix alignment checks when both allocation and DMA masks are
(bsc#1224331)
* swiotlb: Fix double-allocation of slots due to broken alignment
(bsc#1224331)
* swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc()
(bsc#1224331)
* swiotlb: extend buffer pre-padding to alloc_align_mask if necessary
(bsc#1224331)
* swiotlb: use the calculated number of areas (git-fixes).
* thermal/drivers/qcom/lmh: Check for SCM availability at probe (git-fixes).
* thermal/drivers/tsens: Fix null pointer dereference (git-fixes).
* thermal/of: Assume polling-delay(-passive) 0 when absent (stable-fixes).
* thermal: devfreq_cooling: Fix perf state when calculate dfc res_util (git-
fixes).
* thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes).
* thunderbolt: Do not create DisplayPort tunnels on adapters of the same
router (git-fixes).
* thunderbolt: Fix wake configurations after device unplug (stable-fixes).
* thunderbolt: Introduce tb_path_deactivate_hop() (stable-fixes).
* thunderbolt: Introduce tb_port_reset() (stable-fixes).
* thunderbolt: Make tb_switch_reset() support Thunderbolt 2, 3 and USB4
routers (stable-fixes).
* thunderbolt: Reset only non-USB4 host routers in resume (git-fixes).
* tls: break out of main loop when PEEK gets a non-data record (bsc#1221858).
* tls: do not skip over different type records from the rx_list (bsc#1221858).
* tls: fix peeking with sync+async decryption (bsc#1221858).
* tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1221858).
* tools/arch/x86/intel_sdsi: Fix maximum meter bundle length (git-fixes).
* tools/arch/x86/intel_sdsi: Fix meter_certificate decoding (git-fixes).
* tools/arch/x86/intel_sdsi: Fix meter_show display (git-fixes).
* tools/latency-collector: Fix -Wformat-security compile warns (git-fixes).
* tools/power turbostat: Expand probe_intel_uncore_frequency() (bsc#1221765).
* tools/power/turbostat: Fix uncore frequency file string (bsc#1221765).
* tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer
(git-fixes).
* tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git-
fixes).
* tracing/ring-buffer: Fix wait_on_pipe() race (git-fixes).
* tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes).
* tracing: Have saved_cmdlines arrays all in one allocation (git-fixes).
* tracing: Remove precision vsnprintf() check from print event (git-fixes).
* tracing: Use .flush() call to wake up readers (git-fixes).
* tracing: hide unused ftrace_event_id_fops (git-fixes).
* tty: n_gsm: fix missing receive state reset after mode switch (git-fixes).
* tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes).
* tty: serial: samsung: fix tx_empty() to return TIOCSER_TEMT (git-fixes).
* tty: vt: fix 20 vs 0x20 typo in EScsiignore (git-fixes).
* ubifs: Queue up space reservation tasks if retrying many times (git-fixes).
* ubifs: Remove unreachable code in dbg_check_ltab_lnum (git-fixes).
* ubifs: Set page uptodate in the correct place (git-fixes).
* ubifs: dbg_check_idx_size: Fix kmemleak if loading znode failed (git-fixes).
* ubifs: fix sort function prototype (git-fixes).
* usb: Disable USB3 LPM at shutdown (stable-fixes).
* usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed
device (bsc#1220569).
* usb: aqc111: stop lying about skb->truesize (git-fixes).
* usb: audio-v2: Correct comments for struct uac_clock_selector_descriptor
(git-fixes).
* usb: cdc-wdm: close race between read and workqueue (git-fixes).
* usb: dwc2: gadget: Fix exiting from clock gating (git-fixes).
* usb: dwc2: gadget: LPM flow fix (git-fixes).
* usb: dwc2: host: Fix ISOC flow in DDMA mode (git-fixes).
* usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes).
* usb: dwc2: host: Fix hibernation flow (git-fixes).
* usb: dwc2: host: Fix remote wakeup from hibernation (git-fixes).
* usb: dwc3-am62: Disable wakeup at remove (git-fixes).
* usb: dwc3-am62: Rename private data (git-fixes).
* usb: dwc3-am62: fix module unload/reload behavior (git-fixes).
* usb: dwc3: Properly set system wakeup (git-fixes).
* usb: dwc3: Wait unconditionally after issuing EndXfer command (git-fixes).
* usb: dwc3: core: Prevent phy suspend during init (Git-fixes).
* usb: dwc3: pci: Drop duplicate ID (git-fixes).
* usb: fotg210: Add missing kernel doc description (git-fixes).
* usb: gadget: composite: fix OS descriptors w_value logic (git-fixes).
* usb: gadget: f_fs: Fix a race condition when processing setup packets (git-
fixes).
* usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete
(git-fixes).
* usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport
error (stable-fixes).
* usb: gadget: net2272: Use irqflags in the call to net2272_probe_fin (git-
fixes).
* usb: gadget: u_audio: Clear uac pointer when freed (git-fixes).
* usb: gadget: u_audio: Fix race condition use of controls after free during
gadget unbind (git-fixes).
* usb: gadget: uvc: mark incomplete frames with UVC_STREAM_ERR (stable-fixes).
* usb: gadget: uvc: use correct buffer size when parsing configfs lists (git-
fixes).
* usb: ohci: Prevent missed ohci interrupts (git-fixes).
* usb: phy: generic: Get the vbus supply (git-fixes).
* usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined
(stable-fixes).
* usb: typec: Return size of buffer if pd_set operation succeeds (git-fixes).
* usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes).
* usb: typec: tcpm: Check for port partner validity before consuming it (git-
fixes).
* usb: typec: tcpm: Correct port source pdo array in pd_set callback (git-
fixes).
* usb: typec: tcpm: Correct the PDO counting in pd_set (git-fixes).
* usb: typec: tcpm: Update PD of Type-C port upon pd_set (git-fixes).
* usb: typec: tcpm: clear pd_event queue in PORT_RESET (git-fixes).
* usb: typec: tcpm: fix double-free issue in tcpm_port_unregister_pd() (git-
fixes).
* usb: typec: tcpm: unregister existing source caps before re-registration
(git-fixes).
* usb: typec: tipd: fix event checking for tps6598x (git-fixes).
* usb: typec: ucsi: Ack unsupported commands (stable-fixes).
* usb: typec: ucsi: Check for notifications after init (git-fixes).
* usb: typec: ucsi: Clean up UCSI_CABLE_PROP macros (git-fixes).
* usb: typec: ucsi: Clear EVENT_PENDING under PPM lock (git-fixes).
* usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset (stable-fixes).
* usb: typec: ucsi: Fix connector check on init (git-fixes).
* usb: typec: ucsi: Fix race between typec_switch and role_switch (git-fixes).
* usb: typec: ucsi: Limit read size on v1.2 (stable-fixes).
* usb: typec: ucsi: always register a link to USB PD device (git-fixes).
* usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes).
* usb: typec: ucsi: simplify partner's PD caps registration (git-fixes).
* usb: typec: ucsi_acpi: Refactor and fix DELL quirk (git-fixes).
* usb: udc: remove warning when queue disabled ep (stable-fixes).
* usb: xhci-plat: Do not include xhci.h (stable-fixes).
* usb: xhci: Add error handling in xhci_map_urb_for_dma (git-fixes).
* usb: xhci: Implement xhci_handshake_check_state() helper.
* usb: xhci: correct return value in case of STS_HCE (git-fixes).
* vboxsf: Avoid an spurious warning if load_nls_xxx() fails (git-fixes).
* vboxsf: explicitly deny setlease attempts (stable-fixes).
* vdpa/mlx5: Allow CVQ size changes (git-fixes).
* vdpa_sim: reset must not run (git-fixes).
* veth: try harder when allocating queue memory (git-fixes).
* vhost: Add smp_rmb() in vhost_enable_notify() (git-fixes).
* vhost: Add smp_rmb() in vhost_vq_avail_empty() (git-fixes).
* virtio-blk: Ensure no requests in virtqueues before deleting vqs (git-
fixes).
* virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223944).
* virtio_net: Do not send RSS key if it is not supported (git-fixes).
* vmci: prevent speculation leaks by sanitizing event in event_deliver() (git-
fixes).
* vsock/virtio: fix packet delivery to tap device (git-fixes).
* watchdog: bd9576: Drop "always-running" property (git-fixes).
* watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git-
fixes).
* watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin
(git-fixes).
* watchdog: sa1100: Fix PTR_ERR_OR_ZERO() vs NULL check in sa1100dog_probe()
(git-fixes).
* wifi: ar5523: enable proper endpoint verification (git-fixes).
* wifi: ath10k: Fix an error code problem in
ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes).
* wifi: ath10k: poll service ready message before failing (git-fixes).
* wifi: ath10k: populate board data for WCN3990 (git-fixes).
* wifi: ath11k: decrease MHI channel buffer length to 8KB (bsc#1207948).
* wifi: ath11k: do not force enable power save on non-running vdevs (git-
fixes).
* wifi: ath12k: fix out-of-bound access of qmi_invoke_handler() (git-fixes).
* wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes).
* wifi: brcmfmac: Add DMI nvram filename quirk for ACEPC W5 Pro (stable-
fixes).
* wifi: brcmfmac: Demote vendor-specific attach/detach messages to info (git-
fixes).
* wifi: brcmfmac: add per-vendor feature detection callback (stable-fixes).
* wifi: brcmfmac: cfg80211: Use WSEC to set SAE password (stable-fixes).
* wifi: brcmfmac: pcie: handle randbuf allocation failure (git-fixes).
* wifi: carl9170: add a proper sanity check for endpoints (git-fixes).
* wifi: carl9170: re-fix fortified-memset warning (git-fixes).
* wifi: cfg80211: check A-MSDU format more carefully (stable-fixes).
* wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes).
* wifi: ieee80211: fix ieee80211_mle_basic_sta_prof_size_ok() (git-fixes).
* wifi: iwlwifi: fw: do not always use FW dump trig (git-fixes).
* wifi: iwlwifi: fw: fix compile w/o CONFIG_ACPI (git-fixes).
* wifi: iwlwifi: mvm: allocate STA links only for active links (git-fixes).
* wifi: iwlwifi: mvm: fix active link counting during recovery (git-fixes).
* wifi: iwlwifi: mvm: fix check in iwl_mvm_sta_fw_id_mask (git-fixes).
* wifi: iwlwifi: mvm: guard against invalid STA ID on removal (stable-fixes).
* wifi: iwlwifi: mvm: include link ID when releasing frames (git-fixes).
* wifi: iwlwifi: mvm: init vif works only once (git-fixes).
* wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git-
fixes).
* wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes).
* wifi: iwlwifi: mvm: rfi: fix potential response leaks (git-fixes).
* wifi: iwlwifi: mvm: select STA mask only for active links (git-fixes).
* wifi: iwlwifi: mvm: use correct address 3 in A-MSDU (stable-fixes).
* wifi: iwlwifi: pcie: Add the PCI device id for new hardware (stable-fixes).
* wifi: iwlwifi: pcie: fix RB status reading (stable-fixes).
* wifi: iwlwifi: read txq->read_ptr under lock (stable-fixes).
* wifi: iwlwifi: reconfigure TLC during HW restart (git-fixes).
* wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable-
fixes).
* wifi: mac80211: clean up assignments to pointer cache (stable-fixes).
* wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes).
* wifi: mac80211: fix prep_connection error path (stable-fixes).
* wifi: mac80211: fix unaligned le16 access (git-fixes).
* wifi: mac80211: only call drv_sta_rc_update for uploaded stations (stable-
fixes).
* wifi: mac80211: remove link before AP (git-fixes).
* wifi: mac80211_hwsim: init peer measurement result (git-fixes).
* wifi: mt76: mt7603: add wpdma tx eof flag for PSE client reset (git-fixes).
* wifi: mt76: mt7603: fix tx queue of loopback packets (git-fixes).
* wifi: mt76: mt7915: workaround too long expansion sparse warnings (git-
fixes).
* wifi: mt76: mt7996: add locking for accessing mapped registers (stable-
fixes).
* wifi: mt76: mt7996: disable AMSDU for non-data frames (stable-fixes).
* wifi: mwl8k: initialize cmd->addr[] properly (git-fixes).
* wifi: nl80211: do not free NULL coalescing rule (git-fixes).
* wifi: rtw88: 8821cu: Fix connection failure (stable-fixes).
* wifi: rtw88: Add missing VID/PIDs for 8811CU and 8821CU (stable-fixes).
* wifi: rtw89: fix null pointer access when abort scan (stable-fixes).
* wifi: rtw89: pci: correct TX resource checking for PCI DMA channel of
firmware command (git-fixes).
* wifi: rtw89: pci: enlarge RX DMA buffer to consider size of RX descriptor
(stable-fixes).
* wireguard: netlink: access device through ctx instead of peer (git-fixes).
* wireguard: netlink: check for dangling peer via is_dead instead of empty
list (git-fixes).
* wireguard: receive: annotate data-race around receiving_counter.counter
(git-fixes).
* x86/CPU/AMD: Add models 0x10-0x1f to the Zen5 range (git-fixes).
* x86/Kconfig: Remove CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT (git-fixes).
* x86/bugs: Fix BHI retpoline check (git-fixes).
* x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes).
* x86/bugs: Remove default case for fully switched enums (git-fixes).
* x86/calldepth: Rename __x86_return_skl() to call_depth_return_thunk() (git-
fixes).
* x86/coco: Require seeding RNG with RDRAND on CoCo systems (git-fixes).
* x86/cpu: Add model number for Intel Arrow Lake mobile processor (git-fixes).
* x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git-
fixes).
* x86/efistub: Add missing boot_params for mixed mode compat entry (git-
fixes).
* x86/efistub: Call mixed mode boot services on the firmware's stack (git-
fixes).
* x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (git-fixes).
* x86/hyperv: Allow 15-bit APIC IDs for VTL platforms (git-fixes).
* x86/hyperv: Use per cpu initial stack for vtl context (git-fixes).
* x86/kconfig: Select ARCH_WANT_FRAME_POINTERS again when
UNWINDER_FRAME_POINTER=y (git-fixes).
* x86/kvm/Kconfig: Have KVM_AMD_SEV select ARCH_HAS_CC_PLATFORM (git-fixes).
* x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes).
* x86/nmi: Fix the inverse "in NMI handler" check (git-fixes).
* x86/nospec: Refactor UNTRAIN_RET[_*] (git-fixes).
* x86/pm: Work around false positive kmemleak report in msr_build_context()
(git-fixes).
* x86/purgatory: Switch to the position-independent small code model (git-
fixes).
* x86/rethunk: Use SYM_CODE_START[_LOCAL]_NOALIGN macros (git-fixes).
* x86/retpoline: Add NOENDBR annotation to the SRSO dummy return thunk (git-
fixes).
* x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for
!SRSO (git-fixes).
* x86/srso: Disentangle rethunk-dependent options (git-fixes).
* x86/srso: Fix unret validation dependencies (git-fixes).
* x86/srso: Improve i-cache locality for alias mitigation (git-fixes).
* x86/srso: Print actual mitigation if requested mitigation isn't possible
(git-fixes).
* x86/srso: Remove 'pred_cmd' label (git-fixes).
* x86/srso: Unexport untraining functions (git-fixes).
* x86/xen: Add some null pointer checking to smp.c (git-fixes).
* x86/xen: attempt to inflate the memory balloon on PVH (git-fixes).
* xdp, bonding: Fix feature flags when there are no slave devs anymore (git-
fixes).
* xen-netfront: Add missing skb_mark_for_recycle (git-fixes).
* xen/events: drop xen_allocate_irqs_dynamic() (git-fixes).
* xen/events: fix error code in xen_bind_pirq_msi_to_irq() (git-fixes).
* xen/events: increment refcnt only if event channel is refcounted (git-
fixes).
* xen/events: modify internal [un]bind interfaces (git-fixes).
* xen/events: reduce externally visible helper functions (git-fixes).
* xen/events: remove some simple helpers from events_base.c (git-fixes).
* xen/evtchn: avoid WARN() when unbinding an event channel (git-fixes).
* xen: evtchn: Allow shared registration of IRQ handers (git-fixes).
* xfs: add lock protection when remove perag from radix tree (git-fixes).
* xfs: allow extent free intents to be retried (git-fixes).
* xfs: fix perag leak when growfs fails (git-fixes).
* xfs: force all buffers to be written during btree bulk load (git-fixes).
* xfs: make xchk_iget safer in the presence of corrupt inode btrees (git-
fixes).
* xfs: pass the xfs_defer_pending object to iop_recover (git-fixes).
* xfs: recompute growfsrtfree transaction reservation while growing rt volume
(git-fixes).
* xfs: transfer recovered intent item ownership in ->iop_recover (git-fixes).
* xfs: use xfs_defer_pending objects to recover intent items (git-fixes).
* xhci: Simplify event ring dequeue pointer update for port change events
(git-fixes).
* xhci: add helper that checks for unhandled events on a event ring (git-
fixes).
* xhci: remove unnecessary event_ring_deq parameter from xhci_handle_event()
(git-fixes).
* xhci: simplify event ring dequeue tracking for transfer events (git-fixes).
* 9p: add missing locking around taking dentry fid list (git-fixes)
* accel/ivpu: Fix deadlock in context_xa (git-fixes).
* ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes).
* ACPI: bus: Indicate support for IRQ ResourceSource thru _OSC (git-fixes).
* ACPI: bus: Indicate support for the Generic Event Device thru _OSC (git-
fixes).
* ACPI: CPPC: Fix access width used for PCC registers (git-fixes).
* ACPI: CPPC: Fix bit_offset shift in MASK_VAL() macro (git-fixes).
* ACPI: CPPC: Use access_width over bit_width for system memory accesses
(stable-fixes).
* ACPI: disable -Wstringop-truncation (git-fixes).
* ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes).
* ACPI: LPSS: Advertise number of chip selects via property (git-fixes).
* ACPI: resource: Add Infinity laptops to irq1_edge_low_force_override
(stable-fixes).
* ACPI: resource: Do IRQ override on Lunnen Ground laptops (stable-fixes).
* ACPI: scan: Do not increase dep_unmet for already met dependencies (git-
fixes).
* ACPI: video: Add backlight=native quirk for Lenovo Slim 7 16ARH7
(bsc#1217750).
* ACPI: x86: Move acpi_quirk_skip_serdev_enumeration() out of
CONFIG_X86_ANDROID_TABLETS (stable-fixes).
* ACPICA: debugger: check status of acpi_evaluate_object() in
acpi_db_walk_for_fields() (git-fixes).
* admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET
(git-fixes).
* ahci: asm1064: asm1166: do not limit reported ports (git-fixes).
* ahci: asm1064: correct count of reported ports (stable-fixes).
* ALSA: aoa: avoid false-positive format truncation warning (git-fixes).
* ALSA: core: Fix NULL module pointer assignment at card init (git-fixes).
* ALSA: core: Remove debugfs at disconnection (git-fixes).
* ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block
counter (stable-fixes).
* ALSA: Fix deadlocks with kctl removals at disconnection (stable-fixes).
* ALSA: hda: Add Intel BMG PCI ID and HDMI codec vid (stable-fixes).
* ALSA: hda: clarify Copyright information (stable-fixes).
* ALSA: hda: cs35l41: Add support for ASUS ROG 2024 Laptops (stable-fixes).
* ALSA: hda: cs35l41: Ignore errors when configuring IRQs (stable-fixes).
* ALSA: hda: cs35l41: Remove redundant argument to
cs35l41_request_firmware_file() (stable-fixes).
* ALSA: hda: cs35l41: Remove Speaker ID for Lenovo Legion slim 7 16ARHA7 (git-
fixes).
* ALSA: hda: cs35l41: Set the max PCM Gain using tuning setting (stable-
fixes).
* ALSA: hda: cs35l41: Support HP Omen models without _DSD (stable-fixes).
* ALSA: hda: cs35l41: Support Lenovo 13X laptop without _DSD (stable-fixes).
* ALSA: hda: cs35l41: Update DSP1RX5/6 Sources for DSP config (stable-fixes).
* ALSA: hda: cs35l56: Add ACPI device match tables (git-fixes).
* ALSA: hda: cs35l56: Exit cache-only after cs35l56_wait_for_firmware_boot()
(stable-fixes).
* ALSA: hda: cs35l56: Fix lifetime of cs_dsp instance (git-fixes).
* ALSA: hda: cs35l56: Set the init_done flag before component_add() (git-
fixes).
* ALSA: hda: hda_cs_dsp_ctl: Remove notification of driver write (stable-
fixes).
* ALSA: hda: intel-dsp-config: harden I2C/I2S codec detection (stable-fixes).
* ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git-
fixes).
* ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes).
* ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC
(stable-fixes).
* ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes).
* ALSA: hda/realtek - fixed headset Mic not show (stable-fixes).
* ALSA: hda/realtek - Set GPIO3 to default at S4 state for Thinkpad with
ALC1318 (stable-fixes).
* ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes).
* ALSA: hda/realtek: Add quirk for HP Spectre x360 14 eu0000 (stable-fixes).
* ALSA: hda/realtek: Add quirks for ASUS Laptops using CS35L56 (stable-fixes).
* ALSA: hda/realtek: Add quirks for HP Omen models using CS35L41 (stable-
fixes).
* ALSA: hda/realtek: Add quirks for Huawei Matebook D14 NBLB-WAX9N (stable-
fixes).
* ALSA: hda/realtek: Add quirks for Lenovo 13X (stable-fixes).
* ALSA: hda/realtek: Add quirks for some Clevo laptops (stable-fixes).
* ALSA: hda/realtek: Add sound quirks for Lenovo Legion slim 7 16ARHA7 models
(stable-fixes).
* ALSA: hda/realtek: Add support for ASUS Zenbook 2024 HN7306W (stable-fixes).
* ALSA: hda/realtek: Adjust G814JZR to use SPI init for amp (git-fixes).
* ALSA: hda/realtek: cs35l41: Support ASUS ROG G634JYR (stable-fixes).
* ALSA: hda/realtek: Drop doubly quirk entry for 103c:8a2e (git-fixes).
* ALSA: hda/realtek: Enable headset mic of JP-IK LEAP W502 with ALC897
(stable-fixes).
* ALSA: hda/realtek: Fix build error without CONFIG_PM (stable-fixes).
* ALSA: hda/realtek: Fix conflicting PCI SSID 17aa:386f for Lenovo Legion
models (bsc#1223462).
* ALSA: hda/realtek: Fix internal speakers for Legion Y9000X 2022 IAH7
(stable-fixes).
* ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes).
* ALSA: hda/realtek: fix mute/micmute LEDs do not work for ProBook 440/460 G11
(stable-fixes).
* ALSA: hda/realtek: fix the hp playback volume issue for LG machines (stable-
fixes).
* ALSA: hda/realtek: Fix volumn control of ThinkBook 16P Gen4 (git-fixes).
* ALSA: hda/realtek: Fixes for Asus GU605M and GA403U sound (stable-fixes).
* ALSA: hda/realtek: Update Panasonic CF-SZ6 quirk to support headset with
microphone (git-fixes).
* ALSA: hda/tas2781: add locks to kcontrols (git-fixes).
* ALSA: hda/tas2781: Add new vendor_id and subsystem_id to support ThinkPad
ICE-1 (stable-fixes).
* ALSA: hda/tas2781: correct the register for pow calibrated data (git-fixes).
* ALSA: hda/tas2781: remove digital gain kcontrol (git-fixes).
* ALSA: line6: Zero-initialize message buffers (stable-fixes).
* ALSA: scarlett2: Add correct product series name to messages (stable-fixes).
* ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable-
fixes).
* ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable-
fixes).
* ALSA: scarlett2: Add missing error check to scarlett2_config_save() (git-
fixes).
* ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes).
* ALSA: scarlett2: Default mixer driver to enabled (stable-fixes).
* ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes).
* ALSA: seq: Do not clear bank selection at event -> UMP MIDI2 conversion
(git-fixes).
* ALSA: seq: Fix incorrect UMP type for system messages (git-fixes).
* ALSA: seq: Fix missing bank setup between MIDI1/MIDI2 UMP conversion (git-
fixes).
* ALSA: seq: Fix yet another spot for system message conversion (git-fixes).
* ALSA: seq: ump: Fix conversion from MIDI2 to MIDI1 UMP messages (git-fixes).
* ALSA: seq: ump: Fix swapped song position pointer data (git-fixes).
* ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs (git-fixes).
* ALSA: timer: Set lower bound of start tick time (stable-fixes).
* ALSA: ump: Do not accept an invalid UMP protocol number (git-fixes).
* ALSA: ump: Do not clear bank selection after sending a program change (git-
fixes).
* ALSA: ump: Set default protocol when not given explicitly (git-fixes).
* ALSA: usb-audio: Add sampling rates support for Mbox3 (stable-fixes).
* ALSA: usb-audio: Fix for sampling rates support for Mbox3 (stable-fixes).
* ALSA/hda: intel-dsp-config: reduce log verbosity (git-fixes).
* amd/amdkfd: sync all devices to wait all processes being evicted (stable-
fixes).
* amdkfd: use calloc instead of kzalloc to avoid integer overflow (stable-
fixes).
* arm_pmu: acpi: Add a representative platform device for TRBE (bsc#1220587)
* arm_pmu: acpi: Refactor arm_spe_acpi_register_device() (bsc#1220587)
* ARM: 9381/1: kasan: clear stale stack poison (git-fixes).
* ARM: imx_v6_v7_defconfig: Restore CONFIG_BACKLIGHT_CLASS_DEVICE (git-fixes).
* ARM: imx: Check return value of devm_kasprintf in imx_mmdc_perf_init (git-
fixes).
* ARM: OMAP2+: fix N810 MMC gpiod table (git-fixes).
* ARM: OMAP2+: fix USB regression on Nokia N8x0 (git-fixes).
* ARM: prctl: reject PR_SET_MDWE on pre-ARMv6 (stable-fixes).
* ARM: s5pv210: fix pm.c kernel-doc warning (git-fixes).
* arm64: Add the arm64.no32bit_el0 command line option (jsc#PED-3184).
* arm64: bpf: fix 32bit unconditional bswap (git-fixes).
* arm64: dts: allwinner: h616: Fix I2C0 pins (git-fixes)
* arm64: dts: allwinner: Pine H64: correctly remove reg_gmac_3v3 (git-fixes)
* arm64: dts: broadcom: bcmbca: bcm4908: drop invalid switch cells (git-fixes)
* arm64: dts: Fix dtc interrupt_provider warnings (git-fixes)
* arm64: dts: hi3798cv200: fix the size of GICR (git-fixes)
* arm64: dts: imx8-ss-conn: fix usb lpcg indices (git-fixes)
* arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes)
* arm64: dts: imx8-ss-dma: fix adc lpcg indices (git-fixes)
* arm64: dts: imx8-ss-dma: fix can lpcg indices (git-fixes)
* arm64: dts: imx8-ss-dma: fix spi lpcg indices (git-fixes)
* arm64: dts: imx8-ss-lsio: fix pwm lpcg indices (git-fixes)
* arm64: dts: imx8qm-ss-dma: fix can lpcg indices (git-fixes)
* arm64: dts: marvell: reorder crypto interrupts on Armada SoCs (git-fixes)
* arm64: dts: microchip: sparx5: fix mdio reg (git-fixes)
* arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git-
fixes)
* arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git-
fixes)
* arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git-
fixes)
* arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes)
* arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git-
fixes)
* arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes)
* arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes)
* arm64: dts: rockchip: regulator for sd needs to be always on for (git-fixes)
* arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git-
fixes)
* arm64: dts: rockchip: set PHY address of MT7531 switch to 0x1f (git-fixes)
* arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes).
* arm64: tegra: Correct Tegra132 I2C alias (git-fixes)
* arm64: tegra: Set the correct PHY mode for MGBE (git-fixes)
* arm64/head: Disable MMU at EL2 before clearing HCR_EL2.E2H (git-fixes).
* arm64/ptrace: Use saved floating point state type to determine SVE (git-
fixes)
* arm64/sve: Lower the maximum allocation for the SVE ptrace regset (git-
fixes)
* asm-generic: make sparse happy with odd-sized put_unaligned_*() (stable-
fixes).
* ASoC: acp: Support microphone from device Acer 315-24p (git-fixes).
* ASoC: amd: acp: fix for acp_init function error handling (git-fixes).
* ASoC: amd: yc: Add Lenovo ThinkBook 21J0 into DMI quirk table (stable-
fixes).
* ASoC: amd: yc: Fix non-functional mic on ASUS M7600RE (stable-fixes).
* ASoC: amd: yc: Fix non-functional mic on Lenovo 21J2 (stable-fixes).
* ASoC: amd: yc: Revert "Fix non-functional mic on Lenovo 21J2" (stable-
fixes).
* ASoC: codecs: wsa881x: set clk_stop_mode1 flag (git-fixes).
* ASoC: cs35l41: Update DSP1RX5/6 Sources for DSP config (git-fixes).
* ASoC: cs35l56: Fix unintended bus access while resetting amp (git-fixes).
* ASoC: cs35l56: Prevent overwriting firmware ASP config (git-fixes).
* ASoC: da7219-aad: fix usage of device_get_named_child_node() (git-fixes).
* ASoC: Intel: avs: Fix ASRC module initialization (git-fixes).
* ASoC: Intel: avs: Fix potential integer overflow (git-fixes).
* ASoC: Intel: avs: Populate board selection with new I2S entries (stable-
fixes).
* ASoC: Intel: avs: Set name of control as in topology (git-fixes).
* ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes).
* ASoC: Intel: avs: Test result of avs_get_module_entry() (git-fixes).
* ASoC: Intel: bytcr_rt5640: Apply Asus T100TA quirk to Asus T100TAM too (git-
fixes).
* ASoC: Intel: common: DMI remap for rebranded Intel NUC M15 (LAPRC710)
laptops (stable-fixes).
* ASoC: Intel: Disable route checks for Skylake boards (git-fixes).
* ASoC: kirkwood: Fix potential NULL dereference (git-fixes).
* ASoC: mediatek: Assign dummy when codec not specified for a DAI link (git-
fixes).
* ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes).
* ASoC: meson: axg-card: make links nonatomic (git-fixes).
* ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes).
* ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes).
* ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes).
* ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes).
* ASoC: ops: Fix wraparound for mask in snd_soc_get_volsw (git-fixes).
* ASoC: rockchip: i2s-tdm: Fix inaccurate sampling rates (git-fixes).
* ASoC: rt5645: Fix the electric noise due to the CBJ contacts floating (git-
fixes).
* ASoC: rt5645: Make LattePanda board DMI match more precise (stable-fixes).
* ASoC: rt5682-sdw: fix locking sequence (git-fixes).
* ASoC: rt711-sdca: fix locking sequence (git-fixes).
* ASoC: rt711-sdw: fix locking sequence (git-fixes).
* ASoC: rt712-sdca-sdw: fix locking sequence (git-fixes).
* ASoC: rt715-sdca: volume step modification (git-fixes).
* ASoC: rt715: add vendor clear control register (git-fixes).
* ASoC: rt722-sdca-sdw: fix locking sequence (git-fixes).
* ASoC: rt722-sdca: add headset microphone vrefo setting (git-fixes).
* ASoC: rt722-sdca: modify channel number to support 4 channels (git-fixes).
* ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes).
* ASoC: SOF: amd: Optimize quirk for Valve Galileo (stable-fixes).
* ASoC: SOF: Intel: add default firmware library path for LNL (git-fixes).
* ASoC: SOF: Intel: hda-dsp: Skip IMR boot on ACE platforms in case of S3
suspend (stable-fixes).
* ASoC: SOF: Intel: lnl: Correct rom_status_reg (git-fixes).
* ASoC: SOF: Intel: mtl: call dsp dump when boot retry fails (stable-fixes).
* ASoC: SOF: Intel: mtl: Correct rom_status_reg (git-fixes).
* ASoC: SOF: Intel: mtl: Disable interrupts when firmware boot failed (git-
fixes).
* ASoC: SOF: Intel: mtl: Implement firmware boot state check (git-fixes).
* ASoC: SOF: ipc4-pcm: Workaround for crashed firmware on system suspend
(stable-fixes).
* ASoC: SOF: ipc4-topology: Fix input format query of process modules without
base extension (git-fixes).
* ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes).
* ASoC: tas2781: Fix a warning reported by robot kernel test (git-fixes).
* ASoC: tas2781: Fix wrong loading calibrated data sequence (git-fixes).
* ASoC: tas2781: mark dvc_tlv with __maybe_unused (git-fixes).
* ASoC: tegra: Fix DSPK 16-bit playback (git-fixes).
* ASoC: ti: Convert Pandora ASoC to GPIO descriptors (stable-fixes).
* ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes).
* ASoC: tlv320adc3xxx: Do not strip remove function when driver is builtin
(git-fixes).
* ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).
* ASoC: wm_adsp: Add missing MODULE_DESCRIPTION() (git-fixes).
* ASoC: wm_adsp: Fix missing mutex_lock in wm_adsp_write_ctl() (git-fixes).
* ata: libata-core: Allow command duration limits detection for ACS-4 drives
(git-fixes).
* ata: pata_legacy: make legacy_exit() work again (git-fixes).
* ata: sata_gemini: Check clk_enable() result (stable-fixes).
* ata: sata_mv: Fix PCI device ID table declaration compilation warning (git-
fixes).
* ata: sata_sx4: fix pdc20621_get_from_dimm() on 64-bit (git-fixes).
* autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166).
* ax25: Fix netdev refcount issue (git-fixes).
* ax25: Fix reference count leak issue of net_device (git-fixes).
* ax25: Fix reference count leak issues of ax25_dev (git-fixes).
* ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes).
* batman-adv: Avoid infinite loop trying to resize local TT (git-fixes).
* bitops: add missing prototype check (git-fixes).
* blk-cgroup: fix list corruption from reorder of WRITE ->lqueued
(bsc#1225605).
* blk-cgroup: fix list corruption from resetting io stat (bsc#1225605).
* block: fix q->blkg_list corruption during disk rebind (bsc#1223591).
* Bluetooth: Add new quirk for broken read key length on ATS2851 (stable-
fixes).
* Bluetooth: add quirk for broken address properties (git-fixes).
* Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable-
fixes).
* Bluetooth: btintel: Fixe build regression (git-fixes).
* Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable-
fixes).
* Bluetooth: btusb: Fix triggering coredump implementation for QCA (git-
fixes).
* Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes).
* Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes).
* Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable-
fixes).
* Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes).
* Bluetooth: hci_core: Cancel request on command timeout (stable-fixes).
* Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes).
* Bluetooth: hci_event: set the conn encrypted before conn establishes
(stable-fixes).
* Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes).
* Bluetooth: hci_sync: Fix not checking error on hci_cmd_sync_cancel_sync
(git-fixes).
* Bluetooth: hci_sync: Fix using the same interval and window for Coded PHY
(git-fixes).
* Bluetooth: hci_sync: Use QoS to determine which PHY to scan (stable-fixes).
* Bluetooth: HCI: Fix potential null-ptr-deref (git-fixes).
* Bluetooth: ISO: Align broadcast sync_timeout with connection timeout
(stable-fixes).
* Bluetooth: ISO: Do not reject BT_ISO_QOS if parameters are unset (git-
fixes).
* Bluetooth: l2cap: Do not double set the HCI_CONN_MGMT_CONNECTED bit (git-
fixes).
* Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes).
* Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes).
* Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect() (git-fixes).
* Bluetooth: MGMT: Fix failing to MGMT_OP_ADD_UUID/MGMT_OP_REMOVE_UUID
(bsc#1221504).
* Bluetooth: mgmt: Fix limited discoverable off timeout (stable-fixes).
* Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes).
* Bluetooth: qca: add missing firmware sanity checks (git-fixes).
* Bluetooth: qca: fix device-address endianness (git-fixes).
* Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes).
* Bluetooth: qca: fix firmware check error path (git-fixes).
* Bluetooth: qca: fix info leak when fetching fw build id (git-fixes).
* Bluetooth: qca: fix NULL-deref on non-serdev setup (git-fixes).
* Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes).
* Bluetooth: qca: fix NVM configuration parsing (git-fixes).
* Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes).
* Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes).
* bnx2x: Fix firmware version string character counts (git-fixes).
* bnxt_en: Fix error recovery for RoCE ulp client (git-fixes).
* bnxt_en: Fix possible memory leak in bnxt_rdma_aux_device_init() (git-
fixes).
* bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes).
* bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git-
fixes)
* bootconfig: Fix the kerneldoc of _xbc_exit() (git-fixes).
* bootconfig: use memblock_free_late to free xbc memory to buddy (git-fixes).
* bootmem: use kmemleak_free_part_phys in free_bootmem_page (git-fixes).
* bootmem: use kmemleak_free_part_phys in put_page_bootmem (git-fixes).
* bpf, arm64: fix bug in BPF_LDX_MEMSX (git-fixes)
* bpf, arm64: Fix incorrect runtime stats (git-fixes)
* bpf, scripts: Correct GPL license name (git-fixes).
* bpf: fix precision backtracking instruction iteration (bsc#1225756).
* bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes).
* bpf: handle ldimm64 properly in check_cfg() (bsc#1225756).
* btrfs: add a helper to read the superblock metadata_uuid (git-fixes)
* btrfs: add and use helper to check if block group is used (bsc#1220120).
* btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes)
* btrfs: add new unused block groups to the list of unused block groups
(bsc#1220120).
* btrfs: allow to run delayed refs by bytes to be released instead of count
(bsc#1220120).
* btrfs: always clear PERTRANS metadata during commit (git-fixes)
* btrfs: always print transaction aborted messages with an error level (git-
fixes)
* btrfs: always reserve space for delayed refs when starting transaction
(bsc#1220120).
* btrfs: assert correct lock is held at btrfs_select_ref_head() (bsc#1220120).
* btrfs: assert delayed node locked when removing delayed item (git-fixes)
* btrfs: avoid start and commit empty transaction when flushing qgroups
(bsc#1220120).
* btrfs: avoid start and commit empty transaction when starting qgroup rescan
(bsc#1220120).
* btrfs: avoid starting and committing empty transaction when flushing space
(bsc#1220120).
* btrfs: avoid starting new transaction when flushing delayed items and refs
(bsc#1220120).
* btrfs: check for BTRFS_FS_ERROR in pending ordered assert (git-fixes)
* btrfs: compare the correct fsid/metadata_uuid in btrfs_validate_super (git-
fixes)
* btrfs: defrag: avoid unnecessary defrag caused by incorrect extent size
(git-fixes)
* btrfs: defrag: reject unknown flags of btrfs_ioctl_defrag_range_args (git-
fixes)
* btrfs: do not allow non subvolume root targets for snapshot (git-fixes)
* btrfs: do not arbitrarily slow down delalloc if we're committing (git-fixes)
* btrfs: do not delete unused block group if it may be used soon
(bsc#1220120).
* btrfs: do not refill whole delayed refs block reserve when starting
transaction (bsc#1220120).
* btrfs: do not start transaction when joining with TRANS_JOIN_NOSTART (git-
fixes)
* btrfs: do not steal space from global rsv after a transaction abort
(bsc#1220120).
* btrfs: do not warn if discard range is not aligned to sector (git-fixes)
* btrfs: ensure fiemap does not race with writes when FIEMAP_FLAG_SYNC is
given (bsc#1223285).
* btrfs: error out when COWing block using a stale transaction (git-fixes)
* btrfs: error out when reallocating block for defrag using a stale
transaction (git-fixes)
* btrfs: error when COWing block from a root that is being deleted (git-fixes)
* btrfs: export: handle invalid inode or root reference in btrfs_get_parent()
(git-fixes)
* btrfs: fail priority metadata ticket with real fs error (bsc#1220120).
* btrfs: file_remove_privs needs an exclusive lock in direct io write (git-
fixes)
* btrfs: fix 64bit compat send ioctl arguments not initializing version member
(git-fixes)
* btrfs: fix deadlock with fiemap and extent locking (bsc#1223285).
* btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes)
* btrfs: fix kvcalloc() arguments order in btrfs_ioctl_send() (git-fixes)
* btrfs: fix lockdep splat and potential deadlock after failure running
delayed items (git-fixes)
* btrfs: fix off-by-one chunk length calculation at contains_pending_extent()
(git-fixes)
* btrfs: fix off-by-one when checking chunk map includes logical address (git-
fixes)
* btrfs: fix race between ordered extent completion and fiemap (bsc#1223285).
* btrfs: fix race when detecting delalloc ranges during fiemap (bsc#1223285).
* btrfs: fix race when refilling delayed refs block reserve (git-fixes)
* btrfs: fix start transaction qgroup rsv double free (git-fixes)
* btrfs: fix stripe length calculation for non-zoned data chunk allocation
(bsc#1217489).
* btrfs: fix wrong block_start calculation for btrfs_drop_extent_map_range()
(git-fixes) Dropped hunk in selftests (test_case_7), 92e1229b204d6.
* btrfs: free qgroup rsv on io failure (git-fixes)
* btrfs: free the allocated memory if btrfs_alloc_page_array() fails (git-
fixes)
* btrfs: get rid of label and goto at insert_delayed_ref() (bsc#1220120).
* btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git-
fixes)
* btrfs: handle errors properly in update_inline_extent_backref() (git-fixes)
* btrfs: initialize key where it's used when running delayed data ref
(bsc#1220120).
* btrfs: log message if extent item not found when running delayed extent op
(bsc#1220120).
* btrfs: make btrfs_cleanup_fs_roots() static (bsc#1220120).
* btrfs: make btrfs_destroy_delayed_refs() return void (bsc#1220120).
* btrfs: make btrfs_destroy_marked_extents() return void (bsc#1220120).
* btrfs: make btrfs_destroy_pinned_extent() return void (bsc#1220120).
* btrfs: make error messages more clear when getting a chunk map (git-fixes)
* btrfs: make find_first_extent_bit() return a boolean (bsc#1220120).
* btrfs: make find_free_dev_extent() static (bsc#1220120).
* btrfs: make insert_delayed_ref() return a bool instead of an int
(bsc#1220120).
* btrfs: merge find_free_dev_extent() and find_free_dev_extent_start()
(bsc#1220120).
* btrfs: move btrfs_free_excluded_extents() into block-group.c (bsc#1220120).
* btrfs: open code trivial btrfs_add_excluded_extent() (bsc#1220120).
* btrfs: output extra debug info if we failed to find an inline backref (git-
fixes)
* btrfs: pass a space_info argument to btrfs_reserve_metadata_bytes()
(bsc#1220120).
* btrfs: prevent transaction block reserve underflow when starting transaction
(git-fixes)
* btrfs: print available space across all block groups when dumping space info
(bsc#1220120).
* btrfs: print available space for a block group when dumping a space info
(bsc#1220120).
* btrfs: print block group super and delalloc bytes when dumping space info
(bsc#1220120).
* btrfs: print target number of bytes when dumping free space (bsc#1220120).
* btrfs: qgroup: always free reserved space for extent records (bsc#1216196).
* btrfs: qgroup: convert PREALLOC to PERTRANS after record_root_in_trans (git-
fixes)
* btrfs: record delayed inode root in transaction (git-fixes)
* btrfs: reject encoded write if inode has nodatasum flag set (git-fixes)
* btrfs: release path before inode lookup during the ino lookup ioctl (git-
fixes)
* btrfs: remove pointless 'ref_root' variable from run_delayed_data_ref()
(bsc#1220120).
* btrfs: remove pointless in_tree field from struct btrfs_delayed_ref_node
(bsc#1220120).
* btrfs: remove pointless initialization at btrfs_delayed_refs_rsv_release()
(bsc#1220120).
* btrfs: remove redundant BUG_ON() from __btrfs_inc_extent_ref()
(bsc#1220120).
* btrfs: remove refs_to_add argument from __btrfs_inc_extent_ref()
(bsc#1220120).
* btrfs: remove refs_to_drop argument from __btrfs_free_extent()
(bsc#1220120).
* btrfs: remove the refcount warning/check at btrfs_put_delayed_ref()
(bsc#1220120).
* btrfs: remove unnecessary logic when running new delayed references
(bsc#1220120).
* btrfs: remove unnecessary prototype declarations at disk-io.c (bsc#1220120).
* btrfs: remove unused is_head field from struct btrfs_delayed_ref_node
(bsc#1220120).
* btrfs: rename add_new_free_space() to btrfs_add_new_free_space()
(bsc#1220120).
* btrfs: reorder some members of struct btrfs_delayed_ref_head (bsc#1220120).
* btrfs: reserve space for delayed refs on a per ref basis (bsc#1220120).
* btrfs: reset destination buffer when read_extent_buffer() gets invalid range
(git-fixes)
* btrfs: return -EUCLEAN for delayed tree ref with a ref count not equals to 1
(git-fixes)
* btrfs: return -EUCLEAN if extent item is missing when searching inline
backref (bsc#1220120).
* btrfs: return real error when orphan cleanup fails due to a transaction
abort (bsc#1220120).
* btrfs: send: do not issue unnecessary zero writes for trailing hole
(bsc#1222459).
* btrfs: send: ensure send_fd is writable (git-fixes)
* btrfs: send: handle path ref underflow in header iterate_inode_ref() (git-
fixes)
* btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes)
* btrfs: set page extent mapped after read_folio in relocate_one_page (git-
fixes)
* btrfs: simplify check for extent item overrun at
lookup_inline_extent_backref() (bsc#1220120).
* btrfs: stop doing excessive space reservation for csum deletion
(bsc#1220120).
* btrfs: store the error that turned the fs into error state (bsc#1220120).
* btrfs: sysfs: validate scrub_speed_max value (git-fixes)
* btrfs: tree-checker: fix inline ref size in error messages (git-fixes)
* btrfs: update comment for btrfs_join_transaction_nostart() (bsc#1220120).
* btrfs: update documentation for add_new_free_space() (bsc#1220120).
* btrfs: use a bool to track qgroup record insertion when adding ref head
(bsc#1220120).
* btrfs: use a single switch statement when initializing delayed ref head
(bsc#1220120).
* btrfs: use a single variable for return value at
lookup_inline_extent_backref() (bsc#1220120).
* btrfs: use a single variable for return value at run_delayed_extent_op()
(bsc#1220120).
* btrfs: use bool type for delayed ref head fields that are used as booleans
(bsc#1220120).
* btrfs: use the correct superblock to compare fsid in btrfs_validate_super
(git-fixes)
* btrfs: use u64 for buffer sizes in the tree search ioctls (git-fixes)
* btrfs: zoned: do not skip block groups with 100% zone unusable
(bsc#1220120).
* bus: mhi: ep: check the correct variable in mhi_ep_register_controller()
(git-fixes).
* ceph: redirty page before returning AOP_WRITEPAGE_ACTIVATE (bsc#1224866).
* ceph: stop copying to iter at EOF on sync reads (bsc#1222606).
* certs: Add ECDSA signature verification self-test (bsc#1222777).
* certs: Move RSA self-test data to separate file (bsc#1222777).
* clk: Do not hold prepare_lock when calling kref_put() (stable-fixes).
* clk: Get runtime PM before walking tree during disable_unused (git-fixes).
* clk: Get runtime PM before walking tree for clk_summary (git-fixes).
* clk: Initialize struct clk_core kref earlier (stable-fixes).
* clk: mediatek: Do a runtime PM get on controllers during probe (git-fixes).
* clk: mediatek: mt8365-mm: fix DPI0 parent (git-fixes).
* clk: mediatek: pllfh: Do not log error for missing fhctl node (git-fixes).
* clk: qcom: clk-alpha-pll: fix rate setting for Stromer PLLs (git-fixes).
* clk: qcom: clk-alpha-pll: remove invalid Stromer register offset (git-
fixes).
* clk: qcom: dispcc-sm6350: fix DisplayPort clocks (git-fixes).
* clk: qcom: dispcc-sm8450: fix DisplayPort clocks (git-fixes).
* clk: qcom: dispcc-sm8550: fix DisplayPort clocks (git-fixes).
* clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes).
* clk: qcom: reset: Commonize the de/assert functions (stable-fixes).
* clk: qcom: reset: Ensure write completion on reset de/assertion (git-fixes).
* clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes).
* clk: renesas: r8a779a0: Fix CANFD parent clock (git-fixes).
* clk: renesas: r9a07g043: Add clock and reset entry for PLIC (git-fixes).
* clk: rs9: fix wrong default value for clock amplitude (git-fixes).
* clk: samsung: exynosautov9: fix wrong pll clock id value (git-fixes).
* clk: Show active consumers of clocks in debugfs (stable-fixes).
* clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change (git-fixes).
* clocksource/drivers/arm_global_timer: Fix maximum prescaler value (git-
fixes).
* clocksource/drivers/imx: Fix -Wunused-but-set-variable warning (git-fixes).
* comedi: vmk80xx: fix incomplete endpoint checking (git-fixes).
* coresight: trbe: Add a representative coresight_platform_data for
(bsc#1220587)
* coresight: trbe: Allocate platform data per device (bsc#1220587)
* coresight: trbe: Enable ACPI based TRBE devices (bsc#1220587)
* counter: linux/counter.h: fix Excess kernel-doc description warning (git-
fixes).
* cppc_cpufreq: Fix possible null pointer dereference (git-fixes).
* cpufreq: brcmstb-avs-cpufreq: ISO C90 forbids mixed declarations (git-
fixes).
* cpufreq: exit() callback is optional (git-fixes).
* cpumask: Add for_each_cpu_from() (bsc#1225053).
* crypto: bcm - Fix pointer arithmetic (git-fixes).
* crypto: ccp - Add support for PCI device 0x156E (bsc#1223338).
* crypto: ccp - Add support for PCI device 0x17E0 (bsc#1223338).
* crypto: ccp - drop platform ifdef checks (git-fixes).
* crypto: ecc - update ecc_gen_privkey for FIPS 186-5 (bsc#1222782).
* crypto: ecdsa - Fix module auto-load on add-key (git-fixes).
* crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init (git-fixes).
* crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak (git-fixes).
* crypto: qat - fix ring to service map for dcc in 4xxx (git-fixes).
* crypto: qat - improve error logging to be consistent across features (git-
fixes).
* crypto: qat - relocate and rename get_service_enabled() (stable-fixes).
* crypto: qat - specify firmware files for 402xx (git-fixes).
* crypto: rsa - add a check for allocation failure (bsc#1222775).
* crypto: rsa - allow only odd e and restrict value in FIPS mode
(bsc#1222775).
* crypto: testmgr - remove unused xts4096 and xts512 algorithms from testmgr.c
(bsc#1222769).
* crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes).
* crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes).
* crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes).
* cxl/acpi: Fix load failures due to single window creation failure (git-
fixes).
* cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS
window (git-fixes).
* cxl/trace: Properly initialize cxl_poison region name (git-fixes).
* dax: alloc_dax() return ERR_PTR(-EOPNOTSUPP) for CONFIG_DAX=n
(jsc#PED-5853).
* dax/bus.c: replace driver-core lock usage by a local rwsem (jsc#PED-5853).
* dax/bus.c: replace several sprintf() with sysfs_emit() (jsc#PED-5853).
* device-dax: make dax_bus_type const (jsc#PED-5853).
* dlm: fix user space lkb refcounting (git-fixes).
* dm crypt: remove redundant state settings after waking up (jsc#PED-7542).
* dm thin: add braces around conditional code that spans lines (jsc#PED-7542).
* dm verity: set DM_TARGET_SINGLETON feature flag (jsc#PED-7542).
* dm-integrity: set max_integrity_segments in dm_integrity_io_hints
(jsc#PED-7542).
* dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575).
* dm-raid: add a new helper prepare_suspend() in md_personality
(jsc#PED-7542).
* dm-raid: really frozen sync_thread during suspend (jsc#PED-7542).
* dm-raid456, md/raid456: fix a deadlock for dm-raid456 while io concurrent
with reshape (bsc#1219596)
* dm: update relevant MODULE_AUTHOR entries to latest dm-devel mailing list
(jsc#PED-7542).
* dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11
users (git-fixes).
* dma-buf: Fix NULL pointer dereference in sanitycheck() (git-fixes).
* dma-buf/sw-sync: do not enable IRQ from sync_print_obj() (git-fixes).
* dma-mapping: benchmark: fix node id validation (git-fixes).
* dma-mapping: benchmark: handle NUMA_NO_NODE correctly (git-fixes).
* dma: xilinx_dpdma: Fix locking (git-fixes).
* dmaengine: axi-dmac: fix possible race in remove() (git-fixes).
* dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes).
* dmaengine: idxd: Avoid unnecessary destruction of file_ida (git-fixes).
* dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes).
* dmaengine: owl: fix register access functions (git-fixes).
* dmaengine: tegra186: Fix residual calculation (git-fixes).
* driver core: Introduce device_link_wait_removal() (stable-fixes).
* drivers/nvme: Add quirks for device 126f:2262 (git-fixes).
* drm: add drm_gem_object_is_shared_for_memory_stats() helper (stable-fixes).
* drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git-
fixes).
* drm: Check output polling initialized before disabling (stable-fixes).
* drm: Check polling initialized before enabling in
drm_helper_probe_single_connector_modes (stable-fixes).
* drm: Fix drm_fixp2int_round() making it add 0.5 (git-fixes).
* drm: nv04: Fix out of bounds access (git-fixes).
* drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes).
* drm: vc4: Fix possible null pointer dereference (git-fixes).
* drm: zynqmp_dpsub: Always register bridge (git-fixes).
* drm/amd: Flush GFXOFF requests in prepare stage (git-fixes).
* drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init()
(stable-fixes).
* drm/amd/display: Add dml2 copy functions (stable-fixes).
* drm/amd/display: Allow dirty rects to be sent to dmub when abm is active
(stable-fixes).
* drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes).
* drm/amd/display: Change default size for dummy plane in DML2 (stable-fixes).
* drm/amd/display: Do not recursively call manual trigger programming (stable-
fixes).
* drm/amd/display: Enable colorspace property for MST connectors (git-fixes).
* drm/amd/display: Fix bounds check for dcn35 DcfClocks (git-fixes).
* drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes).
* drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes).
* drm/amd/display: Fix idle check for shared firmware state (stable-fixes).
* drm/amd/display: Fix incorrect DSC instance for MST (stable-fixes).
* drm/amd/display: fix input states translation error for dcn35 & dcn351
(stable-fixes).
* drm/amd/display: Fix nanosec stat overflow (stable-fixes).
* drm/amd/display: Fix noise issue on HDMI AV mute (stable-fixes).
* drm/amd/display: Fix potential index out of bounds in color transformation
function (git-fixes).
* drm/amd/display: handle range offsets in VRR ranges (stable-fixes).
* drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes).
* drm/amd/display: Init DPPCLK from SMU on dcn32 (stable-fixes).
* drm/amd/display: Override min required DCFCLK in dml1_validate (stable-
fixes).
* drm/amd/display: Prevent crash when disable stream (stable-fixes).
* drm/amd/display: Program VSC SDP colorimetry for all DP sinks >= 1.4
(stable-fixes).
* drm/amd/display: Remove MPC rate control logic from DCN30 and above (stable-
fixes).
* drm/amd/display: Remove redundant condition in dcn35_calc_blocks_to_gate()
(git-fixes).
* drm/amd/display: Return the correct HDCP error code (stable-fixes).
* drm/amd/display: Send DTBCLK disable message on first commit (git-fixes).
* drm/amd/display: Set DCN351 BB and IP the same as DCN35 (stable-fixes).
* drm/amd/display: Set VSC SDP Colorimetry same way for MST and SST (stable-
fixes).
* drm/amd/display: Update odm when ODM combine is changed on an otg master
pipe with no plane (stable-fixes).
* drm/amd/display: Use freesync when `DRM_EDID_FEATURE_CONTINUOUS_FREQ` found
(stable-fixes).
* drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes).
* drm/amd/swsmu: modify the gfx activity scaling (stable-fixes).
* drm/amdgpu: always force full reset for SOC21 (stable-fixes).
* drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag (stable-fixes).
* drm/amdgpu: Assign correct bits for SDMA HDP flush (stable-fixes).
* drm/amdgpu: drop setting buffer funcs in sdma442 (git-fixes).
* drm/amdgpu: Enable gpu reset for S3 abort cases on Raven series (stable-
fixes).
* drm/amdgpu: Fix comparison in amdgpu_res_cpu_visible (git-fixes).
* drm/amdgpu: fix deadlock while reading mqd from debugfs (git-fixes).
* drm/amdgpu: fix doorbell regression (git-fixes).
* drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes).
* drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes).
* drm/amdgpu: fix mmhub client id out-of-bounds access (git-fixes).
* drm/amdgpu: fix use-after-free bug (stable-fixes).
* drm/amdgpu: Fix VCN allocation in CPX partition (stable-fixes).
* drm/amdgpu: fix visible VRAM handling during faults (git-fixes).
* drm/amdgpu: implement IRQ_STATE_ENABLE for SDMA v4.4.2 (stable-fixes).
* drm/amdgpu: make damage clips support configurable (stable-fixes).
* drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes).
* drm/amdgpu: Refine IB schedule error logging (stable-fixes).
* drm/amdgpu: remove invalid resource->start check v2 (git-fixes).
* drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes).
* drm/amdgpu: validate the parameters of bo mapping operations more clearly
(git-fixes).
* drm/amdgpu/display: Address kdoc for 'is_psr_su' in 'fill_dc_dirty_rects'
(git-fixes).
* drm/amdgpu/pm: Check the validity of overdiver power limit (git-fixes).
* drm/amdgpu/pm: Fix NULL pointer dereference when get power limit (git-
fixes).
* drm/amdgpu/pm: Fix the error of pwm1_enable setting (stable-fixes).
* drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes).
* drm/amdkfd: Check cgroup when returning DMABuf info (stable-fixes).
* drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git-
fixes).
* drm/amdkfd: Fix memory leak in create_process failure (git-fixes).
* drm/amdkfd: fix TLB flush after unmap for GFX9.4.2 (stable-fixes).
* drm/amdkfd: range check cp bad op exception interrupts (stable-fixes).
* drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes).
* drm/arm/malidp: fix a possible null pointer dereference (git-fixes).
* drm/ast: Fix soft lockup (git-fixes).
* drm/bridge: anx7625: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: anx7625: Update audio status while detecting (git-fixes).
* drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: Fix improper bridge init order with pre_enable_prev_first (git-
fixes).
* drm/bridge: icn6211: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: lt9611: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: lt9611uxc: Do not log an error when DSI host can't be found
(git-fixes).
* drm/bridge: tc358775: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes).
* drm/buddy: check range allocation matches alignment (stable-fixes).
* drm/ci: update device type for volteer devices (git-fixes).
* drm/client: Fully protect modes[] with dev->mode_config.mutex (stable-
fixes).
* drm/connector: Add \n to message about demoting connector force-probes (git-
fixes).
* drm/display: fix typo (git-fixes).
* drm/exynos: do not return negative values from .get_modes() (stable-fixes).
* drm/fbdev-generic: Do not set physical framebuffer address (git-fixes).
* drm/gma500: Remove lid code (git-fixes).
* drm/i915: Disable live M/N updates when using bigjoiner (stable-fixes).
* drm/i915: Disable port sync when bigjoiner is used (stable-fixes).
* drm/i915: Do not match JSL in ehl_combo_pll_div_frac_wa_needed() (git-
fixes).
* drm/i915: Fix audio component initialization (git-fixes).
* drm/i915: Include the PLL name in the debug messages (stable-fixes).
* drm/i915: Pre-populate the cursor physical dma address (git-fixes).
* drm/i915: Replace a memset() with zero initialization (stable-fixes).
* drm/i915: Stop printing pipe name as hex (stable-fixes).
* drm/i915: Suppress old PLL pipe_mask checks for MG/TC/TBT PLLs (stable-
fixes).
* drm/i915: Try to preserve the current shared_dpll for fastset on type-c
ports (stable-fixes).
* drm/i915: Use named initializers for DPLL info (stable-fixes).
* drm/i915/audio: Fix audio time stamp programming for DP (stable-fixes).
* drm/i915/bios: Fix parsing backlight BDB data (git-fixes).
* drm/i915/bios: Tolerate devdata==NULL in
intel_bios_encoder_supports_dp_dual_mode() (stable-fixes).
* drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git-
fixes).
* drm/i915/display: Use i915_gem_object_get_dma_address to get dma address
(stable-fixes).
* drm/i915/dp: Fix the computation for compressed_bpp for DISPLAY < 13
(git-fixes).
* drm/i915/dp: Remove support for UHBR13.5 (git-fixes).
* drm/i915/dpt: Make DPT object unshrinkable (git-fixes).
* drm/i915/dsb: Fix DSB vblank waits when using VRR (git-fixes).
* drm/i915/dsi: Go back to the previous INIT_OTP/DISPLAY_ON order, mostly
(git-fixes).
* drm/i915/gt: Automate CCS Mode setting during engine resets (git-fixes).
* drm/i915/gt: Disable HW load balancing for CCS (git-fixes).
* drm/i915/gt: Disarm breadcrumbs if engines are already idle (git-fixes).
* drm/i915/gt: Do not generate the command streamer for all the CCS (git-
fixes).
* drm/i915/gt: Enable only one CCS for compute workload (git-fixes).
* drm/i915/gt: Fix CCS id's calculation for CCS mode setting (git-fixes).
* drm/i915/gt: Reset queue_priority_hint on parking (git-fixes).
* drm/i915/guc: avoid FIELD_PREP warning (git-fixes).
* drm/i915/hwmon: Fix locking inversion in sysfs getter (git-fixes).
* drm/i915/lspcon: Separate function to set expected mode (bsc#1193599).
* drm/i915/lspcon: Separate lspcon probe and lspcon init (bsc#1193599).
* drm/i915/mst: Limit MST+DSC to TGL+ (git-fixes).
* drm/i915/mst: Reject FEC+MST on ICL (git-fixes).
* drm/i915/mtl: Update workaround 14018575942 (git-fixes).
* drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes).
* drm/i915/vrr: Generate VRR "safe window" for DSB (git-fixes).
* drm/imx/ipuv3: do not return negative values from .get_modes() (stable-
fixes).
* drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes).
* drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes).
* drm/mediatek: dp: Fix mtk_dp_aux_transfer return value (git-fixes).
* drm/mediatek: Init `ddp_comp` with devm_kcalloc() (git-fixes).
* drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes).
* drm/meson: dw-hdmi: power up phy on device init (git-fixes).
* drm/meson: gate px_clk when setting rate (git-fixes).
* drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes).
* drm/msm: Add newlines to some debug prints (git-fixes).
* drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails (git-
fixes).
* drm/msm/adreno: fix CP cycles stat retrieval on a7xx (git-fixes).
* drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes).
* drm/msm/dp: Avoid a long timeout for AUX transfer if nothing connected (git-
fixes).
* drm/msm/dp: fix typo in dp_display_handle_port_status_changed() (git-fixes).
* drm/msm/dpu: Add callback function pointer check before its call (git-
fixes).
* drm/msm/dpu: Allow configuring multiple active DSC blocks (git-fixes).
* drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes).
* drm/msm/dpu: do not allow overriding data from catalog (git-fixes).
* drm/msm/dpu: make error messages at dpu_core_irq_register_callback() more
sensible (git-fixes).
* drm/msm/dpu: use devres-managed allocation for MDP TOP (stable-fixes).
* drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk
(git-fixes).
* drm/nouveau: use tile_mode and pte_kind for VM_BIND bo allocations (git-
fixes).
* drm/nouveau/disp: Fix missing backlight control on Macbook 5, 1
(bsc#1223838).
* drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes).
* drm/nouveau/dp: Fix incorrect return code in r535_dp_aux_xfer() (git-fixes).
* drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor() (stable-
fixes).
* drm/omapdrm: Fix console by implementing fb_dirty (git-fixes).
* drm/panel: do not return negative error codes from drm_panel_get_modes()
(stable-fixes).
* drm/panel: ili9341: Respect deferred probe (git-fixes).
* drm/panel: ili9341: Use predefined error codes (git-fixes).
* drm/panel: ltk050h3146w: add MIPI_DSI_MODE_VIDEO to LTK050H3148W flags (git-
fixes).
* drm/panel: ltk050h3146w: drop duplicate commands from LTK050H3148W init
(git-fixes).
* drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found
(git-fixes).
* drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector
(git-fixes).
* drm/panel: sitronix-st7789v: fix display size for jt240mhqs_hwt_ek_e3 panel
(git-fixes).
* drm/panel: sitronix-st7789v: fix timing for jt240mhqs_hwt_ek_e3 panel (git-
fixes).
* drm/panel: sitronix-st7789v: tweak timing for jt240mhqs_hwt_ek_e3 panel
(git-fixes).
* drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes).
* drm/panfrost: fix power transition timeout warnings (git-fixes).
* drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr() (git-
fixes).
* drm/prime: Unbreak virtgpu dma-buf export (git-fixes).
* drm/probe-helper: warn about negative .get_modes() (stable-fixes).
* drm/qxl: remove unused `count` variable from `qxl_surface_id_alloc()` (git-
fixes).
* drm/qxl: remove unused variable from `qxl_process_single_command()` (git-
fixes).
* drm/radeon: make -fstrict-flex-arrays=3 happy (git-fixes).
* drm/radeon: silence UBSAN warning (v3) (stable-fixes).
* drm/rockchip: vop2: Do not divide height twice for YUV (git-fixes).
* drm/rockchip: vop2: Remove AR30 and AB30 format support (git-fixes).
* drm/sched: fix null-ptr-deref in init entity (git-fixes).
* drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) (git-fixes).
* drm/ttm: return ENOSPC from ttm_bo_mem_space v3 (stable-fixes).
* drm/ttm: stop pooling cached NUMA pages v2 (git-fixes).
* drm/vc4: do not check if plane->state->fb == state->fb (stable-fixes).
* drm/vc4: hdmi: do not return negative values from .get_modes() (stable-
fixes).
* drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed (git-
fixes).
* drm/vmwgfx: Enable DMA mappings with SEV (git-fixes).
* drm/vmwgfx: Fix crtc's atomic check conditional (git-fixes).
* drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes).
* drm/vmwgfx: Fix Legacy Display Unit (git-fixes).
* drm/vmwgfx: Fix prime import/export (git-fixes).
* drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes).
* dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes)
* dump_stack: Do not get cpu_sync for panic CPU (bsc#1225607).
* dyndbg: fix old BUG_ON in >control parser (stable-fixes).
* e1000e: Minor flow correction in e1000_shutdown function (git-fixes).
* e1000e: move force SMBUS from enable ulp function to avoid PHY loss issue
(git-fixes).
* e1000e: Workaround for sporadic MDI error on Meteor Lake systems (git-
fixes).
* ecryptfs: Fix buffer size for tag 66 packet (git-fixes)
* ecryptfs: Reject casefold directory inodes (git-fixes)
* EDAC/synopsys: Fix ECC status and IRQ control race condition (git-fixes).
* efi: disable mirror feature during crashkernel (stable-fixes).
* efi: fix panic in kdump kernel (git-fixes).
* efi: libstub: only free priv.runtime_map when allocated (git-fixes).
* efi/unaccepted: do not let /proc/vmcore try to access unaccepted memory
(git-fixes).
* efi/unaccepted: touch soft lockup during memory accept (git-fixes).
* extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes).
* fast_dput(): handle underflows gracefully (git-fixes)
* fat: fix uninitialized field in nostale filehandles (git-fixes)
* fbdev: fix incorrect address computation in deferred IO (git-fixes).
* fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes).
* fbdev: sh7760fb: allow modular build (git-fixes).
* fbdev: shmobile: fix snprintf truncation (git-fixes).
* fbdev: sisfb: hide unused variables (git-fixes).
* fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes).
* fbmon: prevent division by zero in fb_videomode_from_videomode() (stable-
fixes).
* firewire: core: use long bus reset on gap count error (stable-fixes).
* firewire: ohci: mask bus reset interrupts between ISR and bottom half
(stable-fixes).
* firmware: arm_scmi: Make raw debugfs entries non-seekable (git-fixes).
* firmware: dmi-id: add a release callback function (git-fixes).
* firmware: raspberrypi: Use correct device for DMA mappings (git-fixes).
* firmware: tegra: bpmp: Return directly after a failed kzalloc() in
get_filename() (stable-fixes).
* fs: Fix error checking for d_hash_and_lookup() (git-fixes)
* fs: indicate request originates from old mount API (git-fixes)
* fs: relax mount_setattr() permission checks (git-fixes)
* fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes)
* fs/9p: translate O_TRUNC into OTRUNC (git-fixes)
* fsverity: skip PKCS#7 parser when keyring is empty (git-fixes)
* ftrace: Fix possible use-after-free issue in ftrace_location() (git-fixes).
* fuse: do not unhash root (bsc#1223946).
* fuse: fix root lookup with nonzero generation (bsc#1223945).
* geneve: fix header validation in geneve[6]_xmit_skb (git-fixes).
* geneve: make sure to pull inner header in geneve_rx() (git-fixes).
* gpio: cdev: check for NULL labels when sanitizing them for irqs (git-fixes).
* gpio: cdev: fix missed label sanitizing in debounce_setup() (git-fixes).
* gpio: cdev: sanitize the label before requesting the interrupt (stable-
fixes).
* gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes).
* gpio: tangier: Use correct type for the IRQ chip data (git-fixes).
* gpio: tegra186: Fix tegra186_gpio_is_accessible() check (git-fixes).
* gpio: wcove: Use -ENOTSUPP consistently (stable-fixes).
* gpiolib: cdev: fix uninitialised kfifo (git-fixes).
* gpiolib: cdev: relocate debounce_period_us from struct gpio_desc (stable-
fixes).
* gpiolib: swnode: Remove wrong header inclusion (git-fixes).
* gpu: host1x: Do not setup DMA for virtual devices (stable-fixes).
* gtp: fix use-after-free and null-ptr-deref in gtp_newlink() (git-fixes).
* HID: amd_sfh: Handle "no sensors" in PM operations (git-fixes).
* HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up (git-
fixes).
* HID: input: avoid polling stylus battery on Chromebook Pompom (stable-
fixes).
* HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes).
* HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev->devc
(git-fixes).
* HID: logitech-dj: allow mice to use all types of reports (git-fixes).
* HID: multitouch: Add required quirk for Synaptics 0xcddc device (stable-
fixes).
* hwmon: (amc6821) add of_match table (stable-fixes).
* hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock (git-
fixes).
* hwmon: (corsair-cpro) Use a separate buffer for sending commands (git-
fixes).
* hwmon: (corsair-cpro) Use complete_all() instead of complete() in
ccp_raw_event() (git-fixes).
* hwmon: (intel-m10-bmc-hwmon) Fix multiplier for N6000 board power sensor
(git-fixes).
* hwmon: (lm70) fix links in doc and comments (git-fixes).
* hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes).
* hwmon: (shtc1) Fix property misspelling (git-fixes).
* hwtracing: hisi_ptt: Move type check to the beginning of
hisi_ptt_pmu_event_init() (git-fixes).
* i2c: acpi: Unbind mux adapters before delete (git-fixes).
* i2c: cadence: Avoid fifo clear after start (git-fixes).
* i2c: pxa: hide unused icr_bits[] variable (git-fixes).
* i2c: smbus: fix NULL function pointer dereference (git-fixes).
* i2c: synquacer: Fix an error handling path in synquacer_i2c_probe() (git-
fixes).
* i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame
(git-fixes).
* i3c: master: svc: fix invalidate IBI type and miss call client IBI handler
(git-fixes).
* i40e: disable NAPI right after disabling irqs when handling xsk_pool (git-
fixes).
* i40e: Enforce software interrupt during busy-poll exit (git-fixes).
* i40e: Fix firmware version comparison function (git-fixes).
* i40e: fix i40e_count_filters() to count only active/new filters (git-fixes).
* i40e: Fix VF MAC filter removal (git-fixes).
* i40e: fix vf may be used uninitialized in this function warning (git-fixes).
* i915: make inject_virtual_interrupt() void (stable-fixes).
* IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes)
* ice: fix enabling RX VLAN filtering (git-fixes).
* ice: fix memory corruption bug with suspend and rebuild (git-fixes).
* ice: fix stats being updated by way too large values (git-fixes).
* ice: fix typo in assignment (git-fixes).
* ice: fix uninitialized dplls mutex usage (git-fixes).
* ice: reconfig host after changing MSI-X on VF (git-fixes).
* ice: Refactor FW data type and fix bitmap casting issue (git-fixes).
* ice: reorder disabling IRQ and NAPI in ice_qp_dis (git-fixes).
* ice: use relative VSI index for VFs instead of PF VSI number (git-fixes).
* ice: virtchnl: stop pretending to support RSS over AQ or registers (git-
fixes).
* ida: make 'ida_dump' static (git-fixes).
* idma64: Do not try to serve interrupts when device is powered off (git-
fixes).
* idpf: disable local BH when scheduling napi for marker packets (git-fixes).
* idpf: extend tx watchdog timeout (bsc#1224137).
* idpf: fix kernel panic on unknown packet types (git-fixes).
* igb: extend PTP timestamp adjustments to i211 (git-fixes).
* igb: Fix missing time sync events (git-fixes).
* igc: avoid returning frame twice in XDP_REDIRECT (git-fixes).
* igc: Fix missing time sync events (git-fixes).
* igc: Remove stale comment about Tx timestamping (git-fixes).
* iio: accel: mxc4005: Interrupt handling fixes (git-fixes).
* iio: adc: stm32: Fixing err code to not indicate success (git-fixes).
* iio: core: Leave private pointer NULL when no private data supplied (git-
fixes).
* iio: dummy_evgen: remove Excess kernel-doc comments (git-fixes).
* iio: gts-helper: Fix division loop (git-fixes).
* iio: pressure: dps310: support negative temperature values (git-fixes).
* iio: pressure: Fixes BME280 SPI driver data (git-fixes).
* iio:imu: adis16475: Fix sync mode setting (git-fixes).
* inet_diag: annotate data-races around inet_diag_table[] (git-fixes).
* inet: frags: eliminate kernel-doc warning (git-fixes).
* init: open /initrd.image with O_LARGEFILE (stable-fixes).
* init/main.c: Fix potential static_command_line memory overflow (git-fixes).
* Input: allocate keycode for Display refresh rate toggle (stable-fixes).
* Input: cyapa - add missing input core locking to suspend/resume functions
(git-fixes).
* Input: gpio_keys_polled - suppress deferred probe error for gpio (stable-
fixes).
* Input: imagis - use FIELD_GET where applicable (stable-fixes).
* Input: ims-pcu - fix printf string overflow (git-fixes).
* Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes).
* Input: synaptics-rmi4 - fail probing if memory allocation for "phys" fails
(stable-fixes).
* Input: xpad - add additional HyperX Controller Identifiers (stable-fixes).
* Input: xpad - add support for Snakebyte GAMEPADs (stable-fixes).
* input/touchscreen: imagis: Correct the maximum touch area value (stable-
fixes).
* intel: legacy: Partial revert of field get conversion (git-fixes).
* interconnect: qcom: osm-l3: Replace custom implementation of COUNT_ARGS()
(git-fixes).
* interconnect: qcom: qcm2290: Fix mas_snoc_bimc QoS port assignment (git-
fixes).
* interconnect: qcom: sc8180x: Mark CO0 BCM keepalive (git-fixes).
* interconnect: qcom: sm8550: Enable sync_state (git-fixes).
* io_uring: kabi cookie remove (bsc#1217384).
* iomap: clear the per-folio dirty bits on all writeback failures (git-fixes)
* iommu: Map reserved memory as cacheable if device is coherent (git-fixes).
* iommu/arm-smmu-v3: Check that the RID domain is S1 in SVA (git-fixes).
* iommu/dma: Force swiotlb_max_mapping_size on an untrusted device
(bsc#1224331)
* iommu/dma: Trace bounce buffer usage when mapping buffers (git-fixes).
* iommu/vt-d: Allocate local memory for page request queue (git-fixes).
* iommu/vt-d: Fix wrong use of pasid config (git-fixes).
* iommu/vt-d: Set SSADE when attaching to a parent with dirty tracking (git-
fixes).
* iommu/vt-d: Update iotlb in nested domain attach (git-fixes).
* iommufd: Add missing IOMMUFD_DRIVER kconfig for the selftest (git-fixes).
* iommufd: Fix iopt_access_list_id overwrite bug (git-fixes).
* iommufd: Reject non-zero data_type if no data_len is provided (git-fixes).
* iommufd/iova_bitmap: Bounds check mapped::pages access (git-fixes).
* iommufd/iova_bitmap: Consider page offset for the pages to be pinned (git-
fixes).
* iommufd/iova_bitmap: Switch iova_bitmap::bitmap to an u8 array (git-fixes).
* ionic: set adminq irq affinity (git-fixes).
* ipv4: annotate data-races around fi->fib_dead (git-fixes).
* irqchip/alpine-msi: Fix off-by-one in allocation error path (git-fixes).
* irqchip/armada-370-xp: Suppress unused-function warning (git-fixes).
* irqchip/gic-v3-its: Do not assume vPE tables are preallocated (git-fixes).
* irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git-
fixes).
* irqchip/gic-v3-its: Prevent double free on error (git-fixes).
* irqchip/loongson-pch-msi: Fix off-by-one on allocation error path (git-
fixes).
* irqchip/mbigen: Do not use bus_get_dev_root() to find the parent (git-
fixes).
* irqchip/renesas-rzg2l: Add macro to retrieve TITSR register offset based on
register's index (stable-fixes).
* irqchip/renesas-rzg2l: Flush posted write in irq_eoi() (git-fixes).
* irqchip/renesas-rzg2l: Implement restriction when writing ISCR register
(stable-fixes).
* irqchip/renesas-rzg2l: Prevent spurious interrupts when setting trigger type
(git-fixes).
* irqchip/renesas-rzg2l: Rename rzg2l_irq_eoi() (stable-fixes).
* irqchip/renesas-rzg2l: Rename rzg2l_tint_eoi() (stable-fixes).
* ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes).
* ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes).
* jffs2: prevent xattr node from overflowing the eraseblock (git-fixes).
* kabi/severities: ignore brcmfmac-specific local symbols
* kabi/severities: ignore IMS functions They were dropped in previous patches.
Noone is supposed to use them.
* kabi/severities: ignore TAS2781 symbol drop, it's only locally used
* kabi/severities: ignore Wangxun ethernet driver local symbols
* kabi/severities: Remove mitigation-related symbols Those are used by the
core kernel to implement CPU vulnerabilities mitigation and are not expected
to be consumed by 3rd party users.
* kasan, fortify: properly rename memintrinsics (git-fixes).
* kasan: disable kasan_non_canonical_hook() for HW tags (git-fixes).
* kasan: print the original fault addr when access invalid shadow (git-fixes).
* kasan/test: avoid gcc warning for intentional overflow (git-fixes).
* kexec: do syscore_shutdown() in kernel_kexec (git-fixes).
* KEYS: trusted: Do not use WARN when encode fails (git-fixes).
* KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes).
* kprobes: Fix possible use-after-free issue on kprobe registration (git-
fixes).
* kselftest: Add a ksft_perror() helper (stable-fixes).
* kunit/fortify: Fix mismatched kvalloc()/vfree() usage (git-fixes).
* KVM: nVMX: Clear EXIT_QUALIFICATION when injecting an EPT Misconfig (git-
fixes).
* KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes
bsc#1224790).
* KVM: SVM: Add support for allowing zero SEV ASIDs (git-fixes).
* KVM: SVM: Flush pages under kvm->lock to fix UAF in
svm_register_enc_region() (git-fixes).
* KVM: SVM: Use unsigned integers when dealing with ASIDs (git-fixes).
* KVM: VMX: Disable LBR virtualization if the CPU does not support LBR
callstacks (git-fixes).
* KVM: VMX: Report up-to-date exit qualification to userspace (git-fixes).
* KVM: x86: Allow, do not ignore, same-value writes to immutable MSRs (git-
fixes).
* KVM: x86: Fix broken debugregs ABI for 32 bit kernels (git-fixes).
* KVM: x86: Fully re-initialize supported_mce_cap on vendor module load (git-
fixes).
* KVM: x86: Introduce __kvm_get_hypervisor_cpuid() helper (git-fixes).
* KVM: x86: Mark target gfn of emulated atomic instruction as dirty (git-
fixes).
* KVM: x86: Only set APICV_INHIBIT_REASON_ABSENT if APICv is enabled (git-
fixes).
* KVM: x86: Snapshot if a vCPU's vendor model is AMD vs. Intel compatible
(git-fixes).
* KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP
(git-fixes).
* KVM: x86: Use actual kvm_cpuid.base for clearing KVM_FEATURE_PV_UNHALT (git-
fixes).
* KVM: x86/mmu: Do not force emulation of L2 accesses to non-APIC internal
slots (git-fixes).
* KVM: x86/mmu: Move private vs. shared check above slot validity checks (git-
fixes).
* KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU (git-fixes).
* KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status
(git-fixes).
* KVM: x86/pmu: Allow programming events that match unsupported arch events
(git-fixes).
* KVM: x86/pmu: Always treat Fixed counters as available when supported (git-
fixes).
* KVM: x86/pmu: Apply "fast" RDPMC only to Intel PMUs (git-fixes).
* KVM: x86/pmu: Disable support for adaptive PEBS (git-fixes).
* KVM: x86/pmu: Disallow "fast" RDPMC for architectural Intel PMUs (git-
fixes).
* KVM: x86/pmu: Do not ignore bits 31:30 for RDPMC index on AMD (git-fixes).
* KVM: x86/pmu: Do not mask LVTPC when handling a PMI on AMD platforms (git-
fixes).
* KVM: x86/pmu: Explicitly check NMI from guest to reducee false positives
(git-fixes).
* KVM: x86/pmu: Prioritize VMX interception over #GP on RDPMC due to bad index
(git-fixes).
* KVM: x86/pmu: Set enable bits for GP counters in PERF_GLOBAL_CTRL at "RESET"
(git-fixes).
* KVM: x86/pmu: Zero out PMU metadata on AMD if PMU is disabled (git-fixes).
* KVM: x86/xen: fix recursive deadlock in timer injection (git-fixes).
* KVM: x86/xen: improve accuracy of Xen timers (git-fixes).
* KVM: x86/xen: inject vCPU upcall vector when local APIC is enabled (git-
fixes).
* KVM: x86/xen: remove WARN_ON_ONCE() with false positives in evtchn delivery
(git-fixes).
* leds: pwm: Disable PWM when going to suspend (git-fixes).
* lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure (git-fixes).
* libnvdimm: Fix ACPI_NFIT in BLK_DEV_PMEM help (jsc#PED-5853).
* libsubcmd: Fix parse-options memory leak (git-fixes).
* livepatch: Fix missing newline character in klp_resolve_symbols()
(bsc#1223539).
* locks: fix KASAN: use-after-free in trace_event_raw_event_filelock_lock
(git-fixes)
* lsm: fix the logic in security_inode_getsecctx() (git-fixes).
* mac802154: fix llsec key resources release in mac802154_llsec_key_del (git-
fixes).
* maple_tree: fix mas_empty_area_rev() null pointer dereference (git-fixes).
* md: add a new helper rdev_has_badblock() (jsc#PED-7542).
* md: add a new helper reshape_interrupted() (jsc#PED-7542).
* md: changed the switch of RAID_VERSION to if (jsc#PED-7542).
* md: check mddev->pers before calling md_set_readonly() (jsc#PED-7542).
* md: clean up invalid BUG_ON in md_ioctl (jsc#PED-7542).
* md: clean up openers check in do_md_stop() and md_set_readonly()
(jsc#PED-7542).
* md: Do not clear MD_CLOSING when the raid is about to stop (jsc#PED-7542).
* md: do not clear MD_RECOVERY_FROZEN for new dm-raid until resume
(jsc#PED-7542).
* md: export helper md_is_rdwr() (jsc#PED-7542).
* md: export helpers to stop sync_thread (jsc#PED-7542).
* md: factor out a helper to sync mddev (jsc#PED-7542).
* md: fix kmemleak of rdev->serial (jsc#PED-7542).
* md: get rdev->mddev with READ_ONCE() (jsc#PED-7542).
* md: merge the check of capabilities into md_ioctl_valid() (jsc#PED-7542).
* md: preserve KABI in struct md_personality (jsc#PED-7542).
* md: remove redundant check of 'mddev->sync_thread' (jsc#PED-7542).
* md: remove redundant md_wakeup_thread() (jsc#PED-7542).
* md: return directly before setting did_set_md_closing (jsc#PED-7542).
* md: sync blockdev before stopping raid or setting readonly (jsc#PED-7542).
* md: use RCU lock to protect traversal in md_spares_need_change()
(jsc#PED-7542).
* md/dm-raid: do not call md_reap_sync_thread() directly (jsc#PED-7542).
* md/raid1-10: add a helper raid1_check_read_range() (jsc#PED-7542).
* md/raid1-10: factor out a new helper raid1_should_read_first()
(jsc#PED-7542).
* md/raid1: factor out choose_bb_rdev() from read_balance() (jsc#PED-7542).
* md/raid1: factor out choose_slow_rdev() from read_balance() (jsc#PED-7542).
* md/raid1: factor out helpers to add rdev to conf (jsc#PED-7542).
* md/raid1: factor out helpers to choose the best rdev from read_balance()
(jsc#PED-7542).
* md/raid1: factor out read_first_rdev() from read_balance() (jsc#PED-7542).
* md/raid1: factor out the code to manage sequential IO (jsc#PED-7542).
* md/raid1: fix choose next idle in read_balance() (jsc#PED-7542).
* md/raid1: record nonrot rdevs while adding/removing rdevs to conf
(jsc#PED-7542).
* media: atomisp: ssh_css: Fix a null-pointer dereference in
load_video_binaries (git-fixes).
* media: cadence: csi2rx: use match fwnode for media link (git-fixes).
* media: cec: core: remove length check of Timer Status (stable-fixes).
* media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes).
* media: flexcop-usb: fix sanity check of bNumEndpoints (git-fixes).
* media: i2c: et8ek8: Do not strip remove function when driver is builtin
(git-fixes).
* media: ipu3-cio2: Request IRQ earlier (git-fixes).
* media: mc: Fix flags handling when creating pad links (stable-fixes).
* media: mc: Fix graph walk in media_pipeline_start (git-fixes).
* media: mc: mark the media devnode as registered from the, start (git-fixes).
* media: mc: Rename pad variable to clarify intent (stable-fixes).
* media: ngene: Add dvb_ca_en50221_init return value check (git-fixes).
* media: rcar-vin: work around -Wenum-compare-conditional warning (git-fixes).
* media: rkisp1: Fix IRQ handling due to shared interrupts (stable-fixes).
* media: sta2x11: fix irq handler cast (stable-fixes).
* media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes).
* media: sunxi: a83-mips-csi2: also select GENERIC_PHY (git-fixes).
* media: uvcvideo: Add quirk for Logitech Rally Bar (git-fixes).
* media: v4l: Do not turn on privacy LED if streamon fails (git-fixes).
* media: v4l2-subdev: Fix stream handling for crop API (git-fixes).
* mei: me: add arrow lake point H DID (stable-fixes).
* mei: me: add arrow lake point S DID (stable-fixes).
* mei: me: add lunar lake point M DID (stable-fixes).
* mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes).
* mlxbf_gige: call request_irq() after NAPI initialized (git-fixes).
* mlxbf_gige: stop interface during shutdown (git-fixes).
* mlxbf_gige: stop PHY during open() error paths (git-fixes).
* mlxsw: Use refcount_t for reference counting (git-fixes).
* mm_init kABI workaround (git-fixes).
* mm,page_owner: check for null stack_record before bumping its refcount
(bsc#1222366).
* mm,page_owner: Defer enablement of static branch (bsc#1222366).
* mm,page_owner: drop unnecessary check (bsc#1222366).
* mm,page_owner: Fix accounting of pages when migrating (bsc#1222366).
* mm,page_owner: Fix printing of stack records (bsc#1222366).
* mm,page_owner: fix recursion (bsc#1222366).
* mm,page_owner: Fix refcount imbalance (bsc#1222366).
* mm,page_owner: Update metadata for tail pages (bsc#1222366).
* mm: memcg: do not periodically flush stats when memcg is disabled
(bsc#1222525).
* mm: memcg: use larger batches for proactive reclaim (bsc#1222522).
* mm: page_owner: fix wrong information in dump_page_owner (git-fixes).
* mm/slab: make __free(kfree) accept error pointers (git-fixes).
* mmc: core: Add HS400 tuning in HS400es initialization (stable-fixes).
* mmc: core: Avoid negative index with array access (git-fixes).
* mmc: core: Initialize mmc_blk_ioc_data (git-fixes).
* mmc: davinci: Do not strip remove function when driver is builtin (git-
fixes).
* mmc: omap: fix broken slot switch lookup (git-fixes).
* mmc: omap: fix deferred probe (git-fixes).
* mmc: omap: restore original power up/down steps (git-fixes).
* mmc: sdhci_am654: Add ITAPDLYSEL in sdhci_j721e_4bit_set_clock (git-fixes).
* mmc: sdhci_am654: Add OTAP/ITAP delay enable (git-fixes).
* mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes).
* mmc: sdhci_am654: Fix ITAPDLY for HS400 timing (git-fixes).
* mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes).
* mmc: sdhci-msm: pervent access to suspended controller (git-fixes).
* mmc: sdhci-omap: re-tuning is needed after a pm transition to support emmc
HS200 mode (git-fixes).
* modpost: Add '.ltext' and '.ltext.*' to TEXT_SECTIONS (stable-fixes).
* mptcp: annotate data-races around msk->rmem_fwd_alloc (git-fixes).
* mptcp: fix bogus receive window shrinkage with multiple subflows (git-
fixes).
* mptcp: move __mptcp_error_report in protocol.c (git-fixes).
* mptcp: process pending subflow error on close (git-fixes).
* mptcp: Remove unnecessary test for __mptcp_init_sock() (git-fixes).
* mtd: core: Report error if first mtd_otp_size() call fails in
mtd_otp_nvmem_add() (git-fixes).
* mtd: diskonchip: work around ubsan link failure (stable-fixes).
* mtd: rawnand: hynix: fixed typo (git-fixes).
* mtd: spinand: Add support for 5-byte IDs (stable-fixes).
* net: add netdev_lockdep_set_classes() to virtual drivers (git-fixes).
* net: annotate data-races around sk->sk_bind_phc (git-fixes).
* net: annotate data-races around sk->sk_forward_alloc (git-fixes).
* net: annotate data-races around sk->sk_lingertime (git-fixes).
* net: annotate data-races around sk->sk_tsflags (git-fixes).
* net: bonding: remove kernel-doc comment marker (git-fixes).
* net: cfg802154: fix kernel-doc notation warnings (git-fixes).
* net: dsa: microchip: fix register write order in ksz8_ind_write8() (git-
fixes).
* net: dsa: mt7530: fix handling of all link-local frames (git-fixes).
* net: dsa: mt7530: fix link-local frames that ingress vlan filtering ports
(git-fixes).
* net: dsa: mt7530: prevent possible incorrect XTAL frequency selection (git-
fixes).
* net: dsa: mt7530: trap link-local frames regardless of ST Port State (git-
fixes).
* net: dsa: sja1105: Fix parameters order in sja1110_pcs_mdio_write_c45()
(git-fixes).
* net: ena: Fix incorrect descriptor free behavior (git-fixes).
* net: ena: Fix potential sign extension issue (git-fixes).
* net: ena: Move XDP code to its new files (git-fixes).
* net: ena: Pass ena_adapter instead of net_device to ena_xmit_common() (git-
fixes).
* net: ena: Remove ena_select_queue (git-fixes).
* net: ena: Set tx_info->xdpf value to NULL (git-fixes).
* net: ena: Use tx_ring instead of xdp_ring for XDP channel TX (git-fixes).
* net: ena: Wrong missing IO completions check order (git-fixes).
* net: ethernet: mtk_eth_soc: fix PPE hanging issue (git-fixes).
* net: ethernet: ti: cpsw: enable mac_managed_pm to fix mdio (git-fixes).
* net: fec: Set mac_managed_pm during probe (git-fixes).
* net: hns3: fix index limit to support all queue stats (git-fixes).
* net: hns3: fix kernel crash when 1588 is received on HIP08 devices (git-
fixes).
* net: hns3: fix kernel crash when devlink reload during pf initialization
(git-fixes).
* net: hns3: fix port duplex configure error in IMP reset (git-fixes).
* net: hns3: fix wrong judgment condition issue (git-fixes).
* net: hns3: mark unexcuted loopback test result as UNEXECUTED (git-fixes).
* net: hns3: tracing: fix hclgevf trace event strings (git-fixes).
* net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()
(git-fixes).
* net: ks8851: Handle softirqs at the end of IRQ thread to fix hang (git-
fixes).
* net: ks8851: Inline ks8851_rx_skb() (git-fixes).
* net: ks8851: Queue RX packets in IRQ handler instead of disabling BHs (git-
fixes).
* net: lan743x: Add set RFE read fifo threshold for PCI1x1x chips (git-fixes).
* net: libwx: fix memory leak on free page (git-fixes).
* net: ll_temac: platform_get_resource replaced by wrong function (git-fixes).
* net: llc: fix kernel-doc notation warnings (git-fixes).
* net: mana: Fix Rx DMA datasize and skb_over_panic (git-fixes).
* net: mediatek: mtk_eth_soc: clear MAC_MCR_FORCE_LINK only when MAC is up
(git-fixes).
* net: nfc: remove inappropriate attrs check (stable-fixes).
* net: NSH: fix kernel-doc notation warning (git-fixes).
* net: pcs: xpcs: Return EINVAL in the internal methods (git-fixes).
* net: phy: fix phy_read_poll_timeout argument type in genphy_loopback (git-
fixes).
* net: phy: micrel: Fix potential null pointer dereference (git-fixes).
* net: phy: micrel: lan8814: Fix when enabling/disabling 1-step timestamping
(git-fixes).
* net: phy: micrel: set soft_reset callback to genphy_soft_reset for KSZ8061
(git-fixes).
* net: phy: phy_device: Prevent nullptr exceptions on ISR (git-fixes).
* net: phy: phy_device: Prevent nullptr exceptions on ISR (stable-fixes).
* net: ravb: Always process TX descriptor ring (git-fixes).
* net: ravb: Always update error counters (git-fixes).
* net: ravb: Let IP-specific receive function to interrogate descriptors (git-
fixes).
* net: smsc95xx: add support for SYS TEC USB-SPEmodule1 (git-fixes).
* net: sparx5: Fix use after free inside sparx5_del_mact_entry (git-fixes).
* net: sparx5: fix wrong config being used when reconfiguring PCS (git-fixes).
* net: sparx5: flower: fix fragment flags handling (git-fixes).
* net: stmmac: dwmac-starfive: Add support for JH7100 SoC (git-fixes).
* net: stmmac: Fix incorrect dereference in interrupt handlers (git-fixes).
* net: stmmac: fix rx queue priority assignment (git-fixes).
* net: sunrpc: Fix an off by one in rpc_sockaddr2uaddr() (git-fixes).
* net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes).
* net: tls, fix WARNIING in __sk_msg_free (bsc#1221858).
* net: tls: fix returned read length with async decrypt (bsc#1221858).
* net: tls: fix use-after-free with partial reads and async (bsc#1221858).
* net: usb: ax88179_178a: avoid the interface always configured as random
address (git-fixes).
* net: usb: ax88179_178a: avoid writing the mac address before first reading
(git-fixes).
* net: usb: ax88179_178a: fix link status when link is set to down/up (git-
fixes).
* net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).
* net: usb: smsc95xx: fix changing LED_SEL bit value updated from EEPROM (git-
fixes).
* net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).
* net: usb: sr9700: stop lying about skb->truesize (git-fixes).
* net: Use sockaddr_storage for getsockopt(SO_PEERNAME) (git-fixes).
* net: veth: do not manipulate GRO when using XDP (git-fixes).
* net: wwan: t7xx: Split 64bit accesses to fix alignment issues (git-fixes).
* net:usb:qmi_wwan: support Rolling modules (stable-fixes).
* net/mlx5: Correctly compare pkt reformat ids (git-fixes).
* net/mlx5: E-switch, Change flow rule destination checking (git-fixes).
* net/mlx5: E-switch, store eswitch pointer before registering devlink_param
(git-fixes).
* net/mlx5: Fix fw reporter diagnose output (git-fixes).
* net/mlx5: Fix peer devlink set for SF representor devlink port (git-fixes).
* net/mlx5: Lag, restore buckets number to default after hash LAG deactivation
(git-fixes).
* net/mlx5: offset comp irq index in name by one (git-fixes).
* net/mlx5: Properly link new fs rules into the tree (git-fixes).
* net/mlx5: Register devlink first under devlink lock (git-fixes).
* net/mlx5: Restore mistakenly dropped parts in register devlink flow (git-
fixes).
* net/mlx5: SF, Stop waiting for FW as teardown was called (git-fixes).
* net/mlx5e: Change the warning when ignore_flow_level is not supported (git-
fixes).
* net/mlx5e: Do not produce metadata freelist entries in Tx port ts WQE xmit
(git-fixes).
* net/mlx5e: Fix MACsec state loss upon state update in offload path (git-
fixes).
* net/mlx5e: Fix mlx5e_priv_init() cleanup flow (git-fixes).
* net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes).
* net/mlx5e: RSS, Block changing channels number when RXFH is configured (git-
fixes).
* net/mlx5e: RSS, Block XOR hash with over 128 channels (git-fixes).
* net/mlx5e: Switch to using _bh variant of of spinlock API in port
timestamping NAPI poll context (git-fixes).
* net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking
occurs after populating the metadata_map (git-fixes).
* net/smc: bugfix for smcr v2 server connect success statistic (git-fixes).
* net/smc: fix documentation of buffer sizes (git-fixes).
* net/smc: use smc_lgr_list.lock to protect smc_lgr_list.list iterate in
smcr_port_add (git-fixes).
* net/x25: fix incorrect parameter validation in the x25_getsockopt() function
(git-fixes).
* netfilter: nf_tables: disable toggling dormant table state more than once
(git-fixes).
* netfilter: nf_tables: uapi: Describe NFTA_RULE_CHAIN_ID (git-fixes).
* netfilter: nft_ct: fix l3num expectations with inet pseudo family (git-
fixes).
* netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention
(git-fixes).
* nf_conntrack: fix -Wunused-const-variable= (git-fixes).
* nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git-
fixes).
* nfc: nci: Fix kcov check in nci_rx_work() (git-fixes).
* nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet (git-fixes).
* nfc: nci: Fix uninit-value in nci_rx_work (git-fixes).
* NFC: trf7970a: disable all regulators on removal (git-fixes).
* nfp: flower: handle acti_netdevs allocation failure (git-fixes).
* NFS: Fix an off by one in root_nfs_cat() (git-fixes).
* NFS: Fix nfs_netfs_issue_read() xarray locking for writeback interrupt (git-
fixes).
* nfs: fix panic when nfs4_ff_layout_prepare_ds() fails (git-fixes).
* NFS: Read unlock folio on nfs_page_create_from_folio() error (git-fixes).
* NFSD: change LISTXATTRS cookie encoding to big-endian (git-fixes).
* NFSD: Convert the callback workqueue to use delayed_work (git-fixes).
* nfsd: do not call locks_release_private() twice concurrently (git-fixes).
* nfsd: Fix a regression in nfsd_setattr() (git-fixes).
* NFSD: fix LISTXATTRS returning a short list with eof=TRUE (git-fixes).
* NFSD: fix LISTXATTRS returning more bytes than maxcount (git-fixes).
* NFSD: Fix nfsd_clid_class use of __string_len() macro (git-fixes).
* NFSD: fix nfsd4_listxattr_validate_cookie (git-fixes).
* NFSD: Reschedule CB operations when backchannel rpc_clnt is shut down (git-
fixes).
* NFSD: Reset cb_seq_status after NFS4ERR_DELAY (git-fixes).
* NFSD: Retransmit callbacks after client reconnects (git-fixes).
* nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380
bsc#1217408).
* NFSv4.1/pnfs: fix NFS with TLS in pnfs (git-fixes).
* NFSv4.2: fix listxattr maximum XDR buffer size (git-fixes).
* NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 (git-fixes).
* nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
* nilfs2: fix out-of-range warning (git-fixes).
* nilfs2: fix potential bug in end_buffer_async_write (git-fixes).
* nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes).
* nilfs2: fix use-after-free of timer for log writer thread (git-fixes).
* nilfs2: make superblock data array index computation sparse friendly (git-
fixes).
* nouveau: fix devinit paths to only handle display on GSP (git-fixes).
* nouveau: fix function cast warning (git-fixes).
* nouveau: fix instmem race condition around ptr stores (git-fixes).
* nouveau: lock the client object tree (stable-fixes).
* nouveau: reset the bo resource bus info after an eviction (git-fixes).
* nouveau/dmem: handle kcalloc() allocation failure (git-fixes).
* nouveau/gsp: do not check devinit disable on GSP (git-fixes).
* nouveau/uvmm: fix addr/range calcs for remap operations (git-fixes).
* nvdimm: make nvdimm_bus_type const (jsc#PED-5853).
* nvdimm/pmem: fix leak on dax_add_host() failure (jsc#PED-5853).
* nvdimm/pmem: Treat alloc_dax() -EOPNOTSUPP failure as non-fatal
(jsc#PED-5853).
* nvme-fc: do not wait in vain when unloading module (git-fixes).
* nvme-pci: Add quirk for broken MSIs (git-fixes).
* nvme-tcp: strict pdu pacing to avoid send stalls on TLS (bsc#1221858).
* nvme: fix reconnection fail due to reserved tag allocation (git-fixes).
* nvme: fix warn output about shared namespaces without CONFIG_NVME_MULTIPATH
(git-fixes).
* nvmet-fc: abort command when there is no binding (git-fixes).
* nvmet-fc: avoid deadlock on delete association path (git-fixes).
* nvmet-fc: defer cleanup using RCU properly (git-fixes).
* nvmet-fc: hold reference on hostport match (git-fixes).
* nvmet-fc: release reference on target port (git-fixes).
* nvmet-fc: take ref count on tgtport before delete assoc (git-fixes).
* nvmet-fcloop: swap the list_add_tail arguments (git-fixes).
* nvmet-tcp: fix nvme tcp ida memory leak (git-fixes).
* octeontx2-af: Add array index check (git-fixes).
* octeontx2-af: Fix devlink params (git-fixes).
* octeontx2-af: Fix issue with loading coalesced KPU profiles (git-fixes).
* octeontx2-af: Fix NIX SQ mode and BP config (git-fixes).
* Octeontx2-af: fix pause frame configuration in GMP mode (git-fixes).
* octeontx2-af: Use matching wake_up API variant in CGX command interface
(git-fixes).
* octeontx2-af: Use separate handlers for interrupts (git-fixes).
* octeontx2-pf: check negative error code in otx2_open() (git-fixes).
* octeontx2-pf: fix FLOW_DIS_IS_FRAGMENT implementation (git-fixes).
* octeontx2-pf: Fix transmit scheduler resource leak (git-fixes).
* octeontx2-pf: Send UP messages to VF only when VF is up (git-fixes).
* octeontx2-pf: Use default max_active works instead of one (git-fixes).
* octeontx2-pf: Wait till detach_resources msg is complete (git-fixes).
* octeontx2: Detect the mbox up or down message via register (git-fixes).
* of: dynamic: Synchronize of_changeset_destroy() with the devlink removals
(git-fixes).
* of: module: add buffer overflow check in of_modalias() (git-fixes).
* of: module: prevent NULL pointer dereference in vsnprintf() (stable-fixes).
* of: property: Add in-ports/out-ports support to of_graph_get_port_parent()
(stable-fixes).
* of: property: fix typo in io-channels (git-fixes).
* of: property: fw_devlink: Fix stupid bug in remote-endpoint parsing (git-
fixes).
* of: property: Improve finding the consumer of a remote-endpoint property
(git-fixes).
* of: property: Improve finding the supplier of a remote-endpoint property
(git-fixes).
* of: unittest: Fix compile in the non-dynamic case (git-fixes).
* PCI: Delay after FLR of Solidigm P44 Pro NVMe (stable-fixes).
* PCI: Disable D3cold on Asus B1400 PCI-NVMe bridge (stable-fixes).
* PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host
(git-fixes).
* PCI: Execute quirk_enable_clear_retrain_link() earlier (stable-fixes).
* PCI: Fix typos in docs and comments (stable-fixes).
* PCI: hv: Fix ring buffer size calculation (git-fixes).
* PCI: Make link retraining use RMW accessors for changing LNKCTL (git-fixes).
* PCI: qcom: Add support for sa8775p SoC (git-fixes).
* PCI: qcom: Disable ASPM L0s for sc8280xp, sa8540p and sa8295p (git-fixes).
* PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes).
* PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369
ltc#205888).
* PCI: Simplify pcie_capability_clear_and_set_word() to ..._clear_word()
(stable-fixes).
* PCI: switchtec: Add support for PCIe Gen5 devices (stable-fixes).
* PCI: switchtec: Use normal comment style (stable-fixes).
* PCI: tegra194: Fix probe path for Endpoint mode (git-fixes).
* PCI/AER: Block runtime suspend when handling errors (stable-fixes).
* PCI/ASPM: Use RMW accessors for changing LNKCTL (git-fixes).
* PCI/DPC: Quirk PIO log size for Intel Raptor Lake Root Ports (stable-fixes).
* PCI/DPC: Use FIELD_GET() (stable-fixes).
* PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes).
* PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes).
* PCI/PM: Drain runtime-idle callbacks before driver removal (stable-fixes).
* peci: linux/peci.h: fix Excess kernel-doc description warning (git-fixes).
* perf tests: Make data symbol test wait for perf to start (bsc#1220045).
* perf tests: Skip data symbol test if buf1 symbol is missing (bsc#1220045).
* perf/x86/amd/core: Avoid register reset when CPU is dead (git-fixes).
* perf/x86/amd/core: Update and fix stalled-cycles-* events for Zen 2 and
later (git-fixes).
* perf/x86/amd/lbr: Use freeze based on availability (git-fixes).
* perf/x86/intel: Expose existence of callback support to KVM (git-fixes).
* phy: freescale: imx8m-pcie: fix pcie link-up instability (git-fixes).
* phy: marvell: a3700-comphy: Fix hardcoded array size (git-fixes).
* phy: marvell: a3700-comphy: Fix out of bounds read (git-fixes).
* phy: rockchip-snps-pcie3: fix bifurcation on rk3588 (git-fixes).
* phy: rockchip-snps-pcie3: fix clearing PHP_GRF_PCIESEL_CON bits (git-fixes).
* phy: rockchip: naneng-combphy: Fix mux on rk3588 (git-fixes).
* phy: ti: tusb1210: Resolve charger-det crash if charger psy is unregistered
(git-fixes).
* pinctrl: armada-37xx: remove an unused variable (git-fixes).
* pinctrl: baytrail: Fix selecting gpio pinctrl state (git-fixes).
* pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes).
* pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes).
* pinctrl: mediatek: paris: Fix PIN_CONFIG_INPUT_SCHMITT_ENABLE readback (git-
fixes).
* pinctrl: mediatek: paris: Rework support for
PIN_CONFIG_{INPUT,OUTPUT}_ENABLE (git-fixes).
* pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git-
fixes).
* pinctrl: qcom: pinctrl-sm7150: Fix sdc1 and ufs special pins regs (git-
fixes).
* pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs
(stable-fixes).
* pinctrl/meson: fix typo in PDM's pin name (git-fixes).
* platform/chrome: cros_ec_uart: properly fix race condition (git-fixes).
* platform/x86: intel-vbtn: Update tablet mode switch at end of probe (git-
fixes).
* platform/x86: ISST: Add Granite Rapids-D to HPM CPU list (stable-fixes).
* platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi
Vi8 tablet (stable-fixes).
* platform/x86: x86-android-tablets: Fix acer_b1_750_goodix_gpios name
(stable-fixes).
* platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git-
fixes).
* platform/x86/amd/pmc: Extend Framework 13 quirk to more BIOSes (stable-
fixes).
* platform/x86/intel-uncore-freq: Do not present root domain on error (git-
fixes).
* PM / devfreq: Synchronize devfreq_monitor_[start/stop] (stable-fixes).
* PM: s2idle: Make sure CPUs will wakeup directly on resume (git-fixes).
* power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes).
* power: supply: mt6360_charger: Fix of_match for usb-otg-vbus regulator (git-
fixes).
* powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645
ltc#205739 bsc#1223191).
* powerpc/crypto/chacha-p10: Fix failure on non Power10 (bsc#1218205).
* powerpc/eeh: Permanently disable the removed device (bsc#1223991
ltc#205740).
* powerpc/hv-gpci: Fix the H_GET_PERF_COUNTER_INFO hcall return value checks
(git-fixes).
* powerpc/pseries: make max polling consistent for longer H_CALLs
(bsc#1215199).
* powerpc/pseries/vio: Do not return ENODEV if node or compatible missing
(bsc#1220783).
* ppdev: Add an error check in register_device (git-fixes).
* prctl: generalize PR_SET_MDWE support check to be per-arch (bsc#1225610).
* printk: Add this_cpu_in_panic() (bsc#1225607).
* printk: Adjust mapping for 32bit seq macros (bsc#1225607).
* printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1225607).
* printk: Consolidate console deferred printing (bsc#1225607).
* printk: Disable passing console lock owner completely during panic()
(bsc#1225607).
* printk: Do not take console lock for console_flush_on_panic() (bsc#1225607).
* printk: For @suppress_panic_printk check for other CPU in panic
(bsc#1225607).
* printk: Keep non-panic-CPUs out of console lock (bsc#1225607).
* printk: Let no_printk() use _printk() (bsc#1225618).
* printk: nbcon: Relocate 32bit seq macros (bsc#1225607).
* printk: Reduce console_unblank() usage in unsafe scenarios (bsc#1225607).
* printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic()
(bsc#1225607).
* printk: ringbuffer: Clarify special lpos values (bsc#1225607).
* printk: ringbuffer: Cleanup reader terminology (bsc#1225607).
* printk: ringbuffer: Do not skip non-finalized records with prb_next_seq()
(bsc#1225607).
* printk: ringbuffer: Skip non-finalized records in panic (bsc#1225607).
* printk: Update @console_may_schedule in console_trylock_spinning()
(bsc#1225616).
* printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1225607).
* printk: Wait for all reserved records with pr_flush() (bsc#1225607).
* proc/kcore: do not try to access unaccepted memory (git-fixes).
* pstore: inode: Convert mutex usage to guard(mutex) (stable-fixes).
* pstore: inode: Only d_invalidate() is needed (git-fixes).
* pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes).
* pwm: img: fix pwm clock lookup (git-fixes).
* qibfs: fix dentry leak (git-fixes)
* r8169: fix issue caused by buggy BIOS on certain boards with RTL8168d (git-
fixes).
* r8169: skip DASH fw status checks when DASH is disabled (git-fixes).
* random: handle creditable entropy from atomic process context (git-fixes).
* RAS/AMD/FMPM: Avoid NULL ptr deref in get_saved_records() (jsc#PED-7619).
* RAS/AMD/FMPM: Fix build when debugfs is not enabled (jsc#PED-7619).
* RAS/AMD/FMPM: Safely handle saved records of various sizes (jsc#PED-7619).
* RDMA/cm: add timeout to cm_destroy_id wait (git-fixes)
* RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes)
* RDMA/cma: Fix kmemleak in rdma_core observed during blktests nvme/rdma use
siw (git-fixes)
* RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git-
fixes)
* RDMA/hns: Fix deadlock on SRQ async events. (git-fixes)
* RDMA/hns: Fix GMV table pagesize (git-fixes)
* RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes)
* RDMA/hns: Fix UAF for cq async event (git-fixes)
* RDMA/hns: Modify the print level of CQE error (git-fixes)
* RDMA/hns: Use complete parentheses in macros (git-fixes)
* RDMA/IPoIB: Fix format truncation compilation errors (git-fixes)
* RDMA/mana_ib: Fix bug in creation of dma regions (git-fixes).
* RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes)
* RDMA/mlx5: Change check for cacheable mkeys (git-fixes)
* RDMA/mlx5: Fix port number for counter query in multi-port configuration
(git-fixes)
* RDMA/mlx5: Uncacheable mkey has neither rb_key or cache_ent (git-fixes)
* RDMA/rxe: Allow good work requests to be executed (git-fixes)
* RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes)
* RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes)
* RDMA/rxe: Fix the problem "mutex_destroy missing" (git-fixes)
* regmap: Add regmap_read_bypassed() (git-fixes).
* regmap: kunit: Ensure that changed bytes are actually different (stable-
fixes).
* regmap: maple: Fix cache corruption in regcache_maple_drop() (git-fixes).
* regmap: maple: Fix uninitialized symbol 'ret' warnings (git-fixes).
* regulator: bd71828: Do not overwrite runtime voltages (git-fixes).
* regulator: change devm_regulator_get_enable_optional() stub to return Ok
(git-fixes).
* regulator: change stubbed devm_regulator_get_enable to return Ok (git-
fixes).
* regulator: core: fix debugfs creation regression (git-fixes).
* regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes).
* regulator: tps65132: Add of_match table (stable-fixes).
* remoteproc: k3-r5: Do not allow core1 to power up before core0 via sysfs
(git-fixes).
* remoteproc: k3-r5: Jump to error handling labels in start/stop errors (git-
fixes).
* remoteproc: k3-r5: Wait for core0 power-up before powering up core1 (git-
fixes).
* remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes).
* remoteproc: stm32: Fix incorrect type assignment returned by
stm32_rproc_get_loaded_rsc_tablef (git-fixes).
* remoteproc: virtio: Fix wdg cannot recovery remote processor (git-fixes).
* Revert "ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default"
(stable-fixes).
* Revert "ASoC: SOF: Intel: hda-dai-ops: only allocate/release streams for
first CPU DAI" (stable-fixes).
* Revert "ASoC: SOF: Intel: hda-dai-ops: reset device count for SoundWire
DAIs" (stable-fixes).
* Revert "drm/amd/amdgpu: Fix potential ioremap() memory leaks in
amdgpu_device_init()" (stable-fixes).
* Revert "drm/amd/display: Fix sending VSC (+ colorimetry) packets for DP/eDP
displays without PSR" (stable-fixes).
* Revert "drm/amd/display: fix USB-C flag update after enc10 feature init"
(stable-fixes).
* Revert "drm/amdkfd: fix gfx_target_version for certain 11.0.3 devices"
(stable-fixes).
* Revert "drm/bridge: ti-sn65dsi83: Fix enable error path" (git-fixes).
* Revert "drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor()"
(stable-fixes).
* Revert "drm/qxl: simplify qxl_fence_wait" (git-fixes).
* Revert "iommu/amd: Enable PCI/IMS" (git-fixes).
* Revert "iommu/vt-d: Enable PCI/IMS" (git-fixes).
* Revert "net/mlx5: Block entering switchdev mode with ns inconsistency" (git-
fixes).
* Revert "net/mlx5e: Check the number of elements before walk TC rhashtable"
(git-fixes).
* Revert "PCI/MSI: Provide IMS (Interrupt Message Store) support" (git-fixes).
* Revert "PCI/MSI: Provide pci_ims_alloc/free_irq()" (git-fixes).
* Revert "PCI/MSI: Provide stubs for IMS functions" (git-fixes).
* Revert "selinux: introduce an initial SID for early boot processes"
(bsc#1208593) It caused a regression on ALP-current branch, kernel-obs-qa
build failed.
* Revert "thermal: core: Do not update trip points inside the hysteresis
range" (git-fixes).
* Revert "usb: cdc-wdm: close race between read and workqueue" (git-fixes).
* Revert "usb: phy: generic: Get the vbus supply" (git-fixes).
* ring-buffer: Do not set shortest_full when full target is hit (git-fixes).
* ring-buffer: Fix a race between readers and resize checks (git-fixes).
* ring-buffer: Fix full_waiters_pending in poll (git-fixes).
* ring-buffer: Fix resetting of shortest_full (git-fixes).
* ring-buffer: Fix waking up ring buffer readers (git-fixes).
* ring-buffer: Make wake once of ring_buffer_wait() more robust (git-fixes).
* ring-buffer: Only update pages_touched when a new page is touched (git-
fixes).
* ring-buffer: use READ_ONCE() to read cpu_buffer->commit_page in concurrent
environment (git-fixes).
* ring-buffer: Use wait_event_interruptible() in ring_buffer_wait() (git-
fixes).
* rtc: mt6397: select IRQ_DOMAIN instead of depending on it (git-fixes).
* s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224792).
* s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223869).
* s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224793).
* s390/cpacf: Split and rework cpacf query functions (git-fixes bsc#1225133).
* s390/cpum_cf: make crypto counters upward compatible across machine types
(bsc#1224348).
* s390/ipl: Fix incorrect initialization of len fields in nvme reipl block
(git-fixes bsc#1225136).
* s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes
bsc#1225134).
* s390/ism: Properly fix receive message buffer allocation (git-fixes
bsc#1223590).
* s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223871).
* s390/mm: Fix storage key clearing for guest huge pages (git-fixes
bsc#1223872).
* s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223874).
* s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes
bsc#1223870).
* s390/vdso: drop '-fPIC' from LDFLAGS (git-fixes bsc#1223593).
* s390/vtime: fix average steal time calculation (git-fixes bsc#1221783).
* s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes
bsc#1223592).
* sched/balancing: Rename newidle_balance() => sched_balance_newidle()
(bsc#1222173).
* sched/fair: Check root_domain::overload value before update (bsc#1222173).
* sched/fair: Use helper functions to access root_domain::overload
(bsc#1222173).
* sched/psi: Select KERNFS as needed (git-fixes).
* sched/topology: Optimize topology_span_sane() (bsc#1225053).
* scsi: bfa: Fix function pointer type mismatch for hcb_qe->cbfn (git-fixes).
* scsi: core: Consult supported VPD page list prior to fetching page (git-
fixes).
* scsi: core: Fix unremoved procfs host directory regression (git-fixes).
* scsi: csiostor: Avoid function pointer casts (git-fixes).
* scsi: hisi_sas: Modify the deadline for ata_wait_after_reset() (git-fixes).
* scsi: libsas: Add a helper sas_get_sas_addr_and_dev_type() (git-fixes).
* scsi: libsas: Fix disk not being scanned in after being removed (git-fixes).
* scsi: lpfc: Copyright updates for 14.4.0.1 patches (bsc#1221777).
* scsi: lpfc: Correct size for cmdwqe/rspwqe for memset() (bsc#1221777).
* scsi: lpfc: Correct size for wqe for memset() (bsc#1221777).
* scsi: lpfc: Define lpfc_dmabuf type for ctx_buf ptr (bsc#1221777).
* scsi: lpfc: Define lpfc_nodelist type for ctx_ndlp ptr (bsc#1221777).
* scsi: lpfc: Define types in a union for generic void *context3 ptr
(bsc#1221777).
* scsi: lpfc: Move NPIV's transport unregistration to after resource clean up
(bsc#1221777).
* scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()
(bsc#1221777).
* scsi: lpfc: Remove IRQF_ONESHOT flag from threaded IRQ handling (bsc#1221777
bsc#1217959).
* scsi: lpfc: Remove unnecessary log message in queuecommand path
(bsc#1221777).
* scsi: lpfc: Replace hbalock with ndlp lock in lpfc_nvme_unregister_port()
(bsc#1221777).
* scsi: lpfc: Update lpfc version to 14.4.0.1 (bsc#1221777).
* scsi: lpfc: Update lpfc_ramp_down_queue_handler() logic (bsc#1221777).
* scsi: lpfc: Use a dedicated lock for ras_fwlog state (bsc#1221777).
* scsi: mpi3mr: Reduce stack usage in mpi3mr_refresh_sas_ports() (git-fixes).
* scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git-
fixes).
* scsi: mylex: Fix sysfs buffer lengths (git-fixes).
* scsi: qla2xxx: Change debug message during driver unload (bsc1221816).
* scsi: qla2xxx: Delay I/O Abort on PCI error (bsc1221816).
* scsi: qla2xxx: Fix command flush on cable pull (bsc1221816).
* scsi: qla2xxx: Fix double free of fcport (bsc1221816).
* scsi: qla2xxx: Fix double free of the ha->vp_map pointer (bsc1221816).
* scsi: qla2xxx: Fix N2N stuck connection (bsc1221816).
* scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes).
* scsi: qla2xxx: NVME|FCP prefer flag not being honored (bsc1221816).
* scsi: qla2xxx: Prevent command send on chip reset (bsc1221816).
* scsi: qla2xxx: Split FCE|EFT trace control (bsc1221816).
* scsi: qla2xxx: Update manufacturer detail (bsc1221816).
* scsi: qla2xxx: Update version to 10.02.09.200-k (bsc1221816).
* scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git-
fixes).
* scsi: sg: Avoid race in error handling & drop bogus warn (git-fixes).
* scsi: sg: Avoid sg device teardown race (git-fixes).
* scsi: smartpqi: Fix disable_managed_interrupts (git-fixes).
* sctp: annotate data-races around sk->sk_wmem_queued (git-fixes).
* sdhci-of-dwcmshc: disable PM runtime in dwcmshc_remove() (git-fixes).
* selftests: default to host arch for LLVM builds (git-fixes).
* selftests: forwarding: Fix ping failure due to short timeout (git-fixes).
* selftests: kselftest: Fix build failure with NOLIBC (git-fixes).
* selftests: kselftest: Mark functions that unconditionally call exit() as
__noreturn (git-fixes).
* selftests: net: bridge: increase IGMP/MLD exclude timeout membership
interval (git-fixes).
* selftests: net: kill smcrouted in the cleanup logic in amt.sh (git-fixes).
* selftests: net: move amt to socat for better compatibility (git-fixes).
* selftests: test_bridge_neigh_suppress.sh: Fix failures due to duplicate MAC
(git-fixes).
* selftests: timers: Convert posix_timers test to generate KTAP output
(stable-fixes).
* selftests: timers: Fix abs() warning in posix_timers test (git-fixes).
* selftests: timers: Fix posix_timers ksft_print_msg() warning (git-fixes).
* selftests: timers: Fix valid-adjtimex signed left-shift undefined behavior
(stable-fixes).
* selftests: vxlan_mdb: Fix failures with old libnet (git-fixes).
* selftests/binderfs: use the Makefile's rules, not Make's implicit rules
(git-fixes).
* selftests/bpf: add edge case backtracking logic test (bsc#1225756).
* selftests/bpf: precision tracking test for BPF_NEG and BPF_END
(bsc#1225756).
* selftests/ftrace: Fix event filter target_func selection (stable-fixes).
* selftests/ftrace: Limit length in subsystem-enable tests (git-fixes).
* selftests/kcmp: remove unused open mode (git-fixes).
* selftests/net: convert test_bridge_neigh_suppress.sh to run it in unique
namespace (stable-fixes).
* selftests/pidfd: Fix config for pidfd_setns_test (git-fixes).
* selftests/powerpc/dexcr: Add -no-pie to hashchk tests (git-fixes).
* selftests/powerpc/papr-vpd: Fix missing variable initialization
(jsc#PED-4486 git-fixes).
* selftests/resctrl: fix clang build failure: use LOCAL_HDRS (git-fixes).
* selftests/timers/posix_timers: Reimplement check_timer_distribution() (git-
fixes).
* selinux: avoid dereference of garbage after mount failure (git-fixes).
* selinux: introduce an initial SID for early boot processes (bsc#1208593).
* serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes).
* serial: 8250_dw: Revert: Do not reclock if already at correct rate (git-
fixes).
* serial: 8250_exar: Do not remove GPIO device on suspend (git-fixes).
* serial: 8520_mtk: Set RTS on shutdown for Rx in-band wakeup (git-fixes).
* serial: core: Fix atomicity violation in uart_tiocmget (git-fixes).
* serial: core: only stop transmit when HW fifo is empty (git-fixes).
* serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable-
fixes).
* serial: Lock console when calling into driver before registration (git-
fixes).
* serial: max3100: Fix bitwise types (git-fixes).
* serial: max3100: Lock port->lock when calling uart_handle_cts_change() (git-
fixes).
* serial: max3100: Update uart_driver_registered on driver removal (git-
fixes).
* serial: max310x: fix NULL pointer dereference in I2C instantiation (git-
fixes).
* serial: max310x: fix syntax error in IRQ error message (git-fixes).
* serial: mxs-auart: add spinlock around changing cts state (git-fixes).
* serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git-
fixes).
* serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler
(git-fixes).
* serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes).
* serial: stm32: Reset .throttled state in .startup() (git-fixes).
* serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes).
* SEV: disable SEV-ES DebugSwap by default (git-fixes).
* slimbus: core: Remove usage of the deprecated ida_simple_xx() API (git-
fixes).
* slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes).
* soc: fsl: qbman: Always disable interrupts when taking cgr_lock (git-fixes).
* soc: fsl: qbman: Use raw spinlock for cgr_lock (git-fixes).
* soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes).
* soc: microchip: Fix POLARFIRE_SOC_SYS_CTRL input prompt (stable-fixes).
* soc: qcom: pmic_glink: do not traverse clients list without a lock (git-
fixes).
* soc: qcom: pmic_glink: Make client-lock non-sleeping (git-fixes).
* soc: qcom: pmic_glink: notify clients about the current state (git-fixes).
* soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes).
* sock_diag: annotate data-races around sock_diag_handlers[family] (git-
fixes).
* soundwire: amd: fix for wake interrupt handling for clockstop mode (git-
fixes).
* speakup: Avoid crash on very long word (git-fixes).
* speakup: Fix 8bit characters from direct synth (git-fixes).
* speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes).
* spi: Do not mark message DMA mapped when no transfer in it is (git-fixes).
* spi: fix null pointer dereference within spi_sync (git-fixes).
* spi: hisi-kunpeng: Delete the dump interface of data registers in debugfs
(git-fixes).
* spi: intel-pci: Add support for Lunar Lake-M SPI serial flash (stable-
fixes).
* spi: lm70llp: fix links in doc and comments (git-fixes).
* spi: lpspi: Avoid potential use-after-free in probe() (git-fixes).
* spi: mchp-pci1xxx: Fix a possible null pointer dereference in
pci1xxx_spi_probe (git-fixes).
* spi: microchip-core-qspi: fix setting spi bus clock rate (git-fixes).
* spi: spi-fsl-lpspi: remove redundant spi_controller_put call (git-fixes).
* spi: spi-mt65xx: Fix NULL pointer access in interrupt handler (git-fixes).
* spi: stm32: Do not warn about spurious interrupts (git-fixes).
* spi: xilinx: Fix kernel documentation in the xilinx_spi.h (git-fixes).
* spmi: hisi-spmi-controller: Do not override device identifier (git-fixes).
* staging: vc04_services: changen strncpy() to strscpy_pad() (stable-fixes).
* staging: vc04_services: fix information leak in create_component() (git-
fixes).
* staging: vt6655: Remove unused declaration of
RFbAL7230SelectChannelPostProcess() (git-fixes).
* stmmac: Clear variable when destroying workqueue (git-fixes).
* SUNRPC: fix a memleak in gss_import_v2_context (git-fixes).
* SUNRPC: fix some memleaks in gssx_dec_option_array (git-fixes).
* supported.conf: support tcp_dctcp module (jsc#PED-8111)
* swiotlb: extend buffer pre-padding to alloc_align_mask if necessary
(bsc#1224331)
* swiotlb: Fix alignment checks when both allocation and DMA masks are
(bsc#1224331)
* swiotlb: Fix double-allocation of slots due to broken alignment
(bsc#1224331)
* swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc()
(bsc#1224331)
* swiotlb: use the calculated number of areas (git-fixes).
* thermal: devfreq_cooling: Fix perf state when calculate dfc res_util (git-
fixes).
* thermal/drivers/qcom/lmh: Check for SCM availability at probe (git-fixes).
* thermal/drivers/tsens: Fix null pointer dereference (git-fixes).
* thermal/of: Assume polling-delay(-passive) 0 when absent (stable-fixes).
* thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes).
* thunderbolt: Do not create DisplayPort tunnels on adapters of the same
router (git-fixes).
* thunderbolt: Fix wake configurations after device unplug (stable-fixes).
* thunderbolt: Introduce tb_path_deactivate_hop() (stable-fixes).
* thunderbolt: Introduce tb_port_reset() (stable-fixes).
* thunderbolt: Make tb_switch_reset() support Thunderbolt 2, 3 and USB4
routers (stable-fixes).
* thunderbolt: Reset only non-USB4 host routers in resume (git-fixes).
* tls: break out of main loop when PEEK gets a non-data record (bsc#1221858).
* tls: do not skip over different type records from the rx_list (bsc#1221858).
* tls: fix peeking with sync+async decryption (bsc#1221858).
* tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1221858).
* tools/arch/x86/intel_sdsi: Fix maximum meter bundle length (git-fixes).
* tools/arch/x86/intel_sdsi: Fix meter_certificate decoding (git-fixes).
* tools/arch/x86/intel_sdsi: Fix meter_show display (git-fixes).
* tools/latency-collector: Fix -Wformat-security compile warns (git-fixes).
* tools/power turbostat: Expand probe_intel_uncore_frequency() (bsc#1221765).
* tools/power/turbostat: Fix uncore frequency file string (bsc#1221765).
* tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer
(git-fixes).
* tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes).
* tracing: Have saved_cmdlines arrays all in one allocation (git-fixes).
* tracing: hide unused ftrace_event_id_fops (git-fixes).
* tracing: Remove precision vsnprintf() check from print event (git-fixes).
* tracing: Use .flush() call to wake up readers (git-fixes).
* tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git-
fixes).
* tracing/ring-buffer: Fix wait_on_pipe() race (git-fixes).
* tty: n_gsm: fix missing receive state reset after mode switch (git-fixes).
* tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes).
* tty: serial: samsung: fix tx_empty() to return TIOCSER_TEMT (git-fixes).
* tty: vt: fix 20 vs 0x20 typo in EScsiignore (git-fixes).
* ubifs: dbg_check_idx_size: Fix kmemleak if loading znode failed (git-fixes).
* ubifs: fix sort function prototype (git-fixes).
* ubifs: Queue up space reservation tasks if retrying many times (git-fixes).
* ubifs: Remove unreachable code in dbg_check_ltab_lnum (git-fixes).
* ubifs: Set page uptodate in the correct place (git-fixes).
* usb: aqc111: stop lying about skb->truesize (git-fixes).
* usb: audio-v2: Correct comments for struct uac_clock_selector_descriptor
(git-fixes).
* usb: cdc-wdm: close race between read and workqueue (git-fixes).
* USB: core: Add hub_get() and hub_put() routines (stable-fixes).
* USB: core: Fix access violation during port device removal (git-fixes).
* USB: core: Fix deadlock in port "disable" sysfs attribute (stable-fixes).
* USB: core: Fix deadlock in usb_deauthorize_interface() (git-fixes).
* usb: Disable USB3 LPM at shutdown (stable-fixes).
* usb: dwc2: gadget: Fix exiting from clock gating (git-fixes).
* usb: dwc2: gadget: LPM flow fix (git-fixes).
* usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes).
* usb: dwc2: host: Fix hibernation flow (git-fixes).
* usb: dwc2: host: Fix ISOC flow in DDMA mode (git-fixes).
* usb: dwc2: host: Fix remote wakeup from hibernation (git-fixes).
* usb: dwc3-am62: Disable wakeup at remove (git-fixes).
* usb: dwc3-am62: fix module unload/reload behavior (git-fixes).
* usb: dwc3-am62: Rename private data (git-fixes).
* usb: dwc3: core: Prevent phy suspend during init (Git-fixes).
* usb: dwc3: pci: Drop duplicate ID (git-fixes).
* usb: dwc3: Properly set system wakeup (git-fixes).
* usb: dwc3: Wait unconditionally after issuing EndXfer command (git-fixes).
* usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed
device (bsc#1220569).
* usb: fotg210: Add missing kernel doc description (git-fixes).
* usb: gadget: composite: fix OS descriptors w_value logic (git-fixes).
* usb: gadget: f_fs: Fix a race condition when processing setup packets (git-
fixes).
* usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete
(git-fixes).
* usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport
error (stable-fixes).
* usb: gadget: net2272: Use irqflags in the call to net2272_probe_fin (git-
fixes).
* usb: gadget: u_audio: Clear uac pointer when freed (git-fixes).
* usb: gadget: u_audio: Fix race condition use of controls after free during
gadget unbind (git-fixes).
* usb: gadget: uvc: mark incomplete frames with UVC_STREAM_ERR (stable-fixes).
* usb: gadget: uvc: use correct buffer size when parsing configfs lists (git-
fixes).
* usb: ohci: Prevent missed ohci interrupts (git-fixes).
* usb: phy: generic: Get the vbus supply (git-fixes).
* USB: serial: add device ID for VeriFone adapter (stable-fixes).
* USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes).
* USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable-
fixes).
* USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable-
fixes).
* USB: serial: option: add Fibocom FM135-GL variants (stable-fixes).
* USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes).
* USB: serial: option: add MeiG Smart SLM320 product (stable-fixes).
* USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable-
fixes).
* USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes).
* USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes).
* USB: serial: option: support Quectel EM060K sub-models (stable-fixes).
* usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined
(stable-fixes).
* usb: typec: Return size of buffer if pd_set operation succeeds (git-fixes).
* usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes).
* usb: typec: tcpm: Check for port partner validity before consuming it (git-
fixes).
* usb: typec: tcpm: clear pd_event queue in PORT_RESET (git-fixes).
* usb: typec: tcpm: Correct port source pdo array in pd_set callback (git-
fixes).
* usb: typec: tcpm: Correct the PDO counting in pd_set (git-fixes).
* usb: typec: tcpm: fix double-free issue in tcpm_port_unregister_pd() (git-
fixes).
* usb: typec: tcpm: unregister existing source caps before re-registration
(git-fixes).
* usb: typec: tcpm: Update PD of Type-C port upon pd_set (git-fixes).
* usb: typec: tipd: fix event checking for tps6598x (git-fixes).
* usb: typec: ucsi_acpi: Refactor and fix DELL quirk (git-fixes).
* usb: typec: ucsi: Ack unsupported commands (stable-fixes).
* usb: typec: ucsi: always register a link to USB PD device (git-fixes).
* usb: typec: ucsi: Check for notifications after init (git-fixes).
* usb: typec: ucsi: Clean up UCSI_CABLE_PROP macros (git-fixes).
* usb: typec: ucsi: Clear EVENT_PENDING under PPM lock (git-fixes).
* usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset (stable-fixes).
* usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes).
* usb: typec: ucsi: Fix connector check on init (git-fixes).
* usb: typec: ucsi: Fix race between typec_switch and role_switch (git-fixes).
* usb: typec: ucsi: Limit read size on v1.2 (stable-fixes).
* usb: typec: ucsi: simplify partner's PD caps registration (git-fixes).
* USB: UAS: return ENODEV when submit urbs fail with device not attached
(stable-fixes).
* usb: udc: remove warning when queue disabled ep (stable-fixes).
* usb: xhci-plat: Do not include xhci.h (stable-fixes).
* usb: xhci: Add error handling in xhci_map_urb_for_dma (git-fixes).
* usb: xhci: correct return value in case of STS_HCE (git-fixes).
* usb: xhci: Implement xhci_handshake_check_state() helper.
* vboxsf: Avoid an spurious warning if load_nls_xxx() fails (git-fixes).
* vboxsf: explicitly deny setlease attempts (stable-fixes).
* vdpa_sim: reset must not run (git-fixes).
* vdpa/mlx5: Allow CVQ size changes (git-fixes).
* veth: try harder when allocating queue memory (git-fixes).
* vhost: Add smp_rmb() in vhost_enable_notify() (git-fixes).
* vhost: Add smp_rmb() in vhost_vq_avail_empty() (git-fixes).
* virtio_net: Do not send RSS key if it is not supported (git-fixes).
* virtio-blk: Ensure no requests in virtqueues before deleting vqs (git-
fixes).
* virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223944).
* VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes).
* VMCI: Fix possible memcpy() run-time warning in
vmci_datagram_invoke_guest_handler() (stable-fixes).
* vmci: prevent speculation leaks by sanitizing event in event_deliver() (git-
fixes).
* vsock/virtio: fix packet delivery to tap device (git-fixes).
* watchdog: bd9576: Drop "always-running" property (git-fixes).
* watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git-
fixes).
* watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin
(git-fixes).
* watchdog: sa1100: Fix PTR_ERR_OR_ZERO() vs NULL check in sa1100dog_probe()
(git-fixes).
* wifi: ar5523: enable proper endpoint verification (git-fixes).
* wifi: ath10k: Fix an error code problem in
ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes).
* wifi: ath10k: poll service ready message before failing (git-fixes).
* wifi: ath10k: populate board data for WCN3990 (git-fixes).
* wifi: ath11k: decrease MHI channel buffer length to 8KB (bsc#1207948).
* wifi: ath11k: do not force enable power save on non-running vdevs (git-
fixes).
* wifi: ath12k: fix out-of-bound access of qmi_invoke_handler() (git-fixes).
* wifi: ath12k: Update Qualcomm Innovation Center, Inc. copyrights (stable-
fixes).
* wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes).
* wifi: brcmfmac: Add DMI nvram filename quirk for ACEPC W5 Pro (stable-
fixes).
* wifi: brcmfmac: add per-vendor feature detection callback (stable-fixes).
* wifi: brcmfmac: cfg80211: Use WSEC to set SAE password (stable-fixes).
* wifi: brcmfmac: Demote vendor-specific attach/detach messages to info (git-
fixes).
* wifi: brcmfmac: pcie: handle randbuf allocation failure (git-fixes).
* wifi: carl9170: add a proper sanity check for endpoints (git-fixes).
* wifi: carl9170: re-fix fortified-memset warning (git-fixes).
* wifi: cfg80211: check A-MSDU format more carefully (stable-fixes).
* wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes).
* wifi: ieee80211: fix ieee80211_mle_basic_sta_prof_size_ok() (git-fixes).
* wifi: iwlwifi: fw: do not always use FW dump trig (git-fixes).
* wifi: iwlwifi: fw: fix compile w/o CONFIG_ACPI (git-fixes).
* wifi: iwlwifi: mvm: allocate STA links only for active links (git-fixes).
* wifi: iwlwifi: mvm: fix active link counting during recovery (git-fixes).
* wifi: iwlwifi: mvm: fix check in iwl_mvm_sta_fw_id_mask (git-fixes).
* wifi: iwlwifi: mvm: guard against invalid STA ID on removal (stable-fixes).
* wifi: iwlwifi: mvm: include link ID when releasing frames (git-fixes).
* wifi: iwlwifi: mvm: init vif works only once (git-fixes).
* wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git-
fixes).
* wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes).
* wifi: iwlwifi: mvm: rfi: fix potential response leaks (git-fixes).
* wifi: iwlwifi: mvm: select STA mask only for active links (git-fixes).
* wifi: iwlwifi: mvm: use correct address 3 in A-MSDU (stable-fixes).
* wifi: iwlwifi: pcie: Add the PCI device id for new hardware (stable-fixes).
* wifi: iwlwifi: pcie: fix RB status reading (stable-fixes).
* wifi: iwlwifi: read txq->read_ptr under lock (stable-fixes).
* wifi: iwlwifi: reconfigure TLC during HW restart (git-fixes).
* wifi: mac80211_hwsim: init peer measurement result (git-fixes).
* wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable-
fixes).
* wifi: mac80211: clean up assignments to pointer cache (stable-fixes).
* wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes).
* wifi: mac80211: fix prep_connection error path (stable-fixes).
* wifi: mac80211: fix unaligned le16 access (git-fixes).
* wifi: mac80211: only call drv_sta_rc_update for uploaded stations (stable-
fixes).
* wifi: mac80211: remove link before AP (git-fixes).
* wifi: mt76: mt7603: add wpdma tx eof flag for PSE client reset (git-fixes).
* wifi: mt76: mt7603: fix tx queue of loopback packets (git-fixes).
* wifi: mt76: mt7915: workaround too long expansion sparse warnings (git-
fixes).
* wifi: mt76: mt7996: add locking for accessing mapped registers (stable-
fixes).
* wifi: mt76: mt7996: disable AMSDU for non-data frames (stable-fixes).
* wifi: mwl8k: initialize cmd->addr[] properly (git-fixes).
* wifi: nl80211: do not free NULL coalescing rule (git-fixes).
* wifi: rtw88: 8821cu: Fix connection failure (stable-fixes).
* wifi: rtw88: Add missing VID/PIDs for 8811CU and 8821CU (stable-fixes).
* wifi: rtw89: fix null pointer access when abort scan (stable-fixes).
* wifi: rtw89: pci: correct TX resource checking for PCI DMA channel of
firmware command (git-fixes).
* wifi: rtw89: pci: enlarge RX DMA buffer to consider size of RX descriptor
(stable-fixes).
* wireguard: netlink: access device through ctx instead of peer (git-fixes).
* wireguard: netlink: check for dangling peer via is_dead instead of empty
list (git-fixes).
* wireguard: receive: annotate data-race around receiving_counter.counter
(git-fixes).
* x86/bugs: Fix BHI retpoline check (git-fixes).
* x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes).
* x86/bugs: Remove default case for fully switched enums (git-fixes).
* x86/calldepth: Rename __x86_return_skl() to call_depth_return_thunk() (git-
fixes).
* x86/coco: Require seeding RNG with RDRAND on CoCo systems (git-fixes).
* x86/cpu: Add model number for Intel Arrow Lake mobile processor (git-fixes).
* x86/CPU/AMD: Add models 0x10-0x1f to the Zen5 range (git-fixes).
* x86/CPU/AMD: Update the Zenbleed microcode revisions (git-fixes).
* x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git-
fixes).
* x86/efistub: Add missing boot_params for mixed mode compat entry (git-
fixes).
* x86/efistub: Call mixed mode boot services on the firmware's stack (git-
fixes).
* x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (git-fixes).
* x86/hyperv: Allow 15-bit APIC IDs for VTL platforms (git-fixes).
* x86/hyperv: Use per cpu initial stack for vtl context (git-fixes).
* x86/Kconfig: Remove CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT (git-fixes).
* x86/kconfig: Select ARCH_WANT_FRAME_POINTERS again when
UNWINDER_FRAME_POINTER=y (git-fixes).
* x86/kvm/Kconfig: Have KVM_AMD_SEV select ARCH_HAS_CC_PLATFORM (git-fixes).
* x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes).
* x86/nmi: Fix the inverse "in NMI handler" check (git-fixes).
* x86/nospec: Refactor UNTRAIN_RET[_*] (git-fixes).
* x86/pm: Work around false positive kmemleak report in msr_build_context()
(git-fixes).
* x86/purgatory: Switch to the position-independent small code model (git-
fixes).
* x86/rethunk: Use SYM_CODE_START[_LOCAL]_NOALIGN macros (git-fixes).
* x86/retpoline: Add NOENDBR annotation to the SRSO dummy return thunk (git-
fixes).
* x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for
!SRSO (git-fixes).
* x86/srso: Disentangle rethunk-dependent options (git-fixes).
* x86/srso: Fix unret validation dependencies (git-fixes).
* x86/srso: Improve i-cache locality for alias mitigation (git-fixes).
* x86/srso: Print actual mitigation if requested mitigation isn't possible
(git-fixes).
* x86/srso: Remove 'pred_cmd' label (git-fixes).
* x86/srso: Unexport untraining functions (git-fixes).
* x86/xen: Add some null pointer checking to smp.c (git-fixes).
* x86/xen: attempt to inflate the memory balloon on PVH (git-fixes).
* xdp, bonding: Fix feature flags when there are no slave devs anymore (git-
fixes).
* xen-netfront: Add missing skb_mark_for_recycle (git-fixes).
* xen: evtchn: Allow shared registration of IRQ handers (git-fixes).
* xen/events: drop xen_allocate_irqs_dynamic() (git-fixes).
* xen/events: fix error code in xen_bind_pirq_msi_to_irq() (git-fixes).
* xen/events: increment refcnt only if event channel is refcounted (git-
fixes).
* xen/events: modify internal [un]bind interfaces (git-fixes).
* xen/events: reduce externally visible helper functions (git-fixes).
* xen/events: remove some simple helpers from events_base.c (git-fixes).
* xen/evtchn: avoid WARN() when unbinding an event channel (git-fixes).
* xfs: add lock protection when remove perag from radix tree (git-fixes).
* xfs: allow extent free intents to be retried (git-fixes).
* xfs: fix perag leak when growfs fails (git-fixes).
* xfs: force all buffers to be written during btree bulk load (git-fixes).
* xfs: make xchk_iget safer in the presence of corrupt inode btrees (git-
fixes).
* xfs: pass the xfs_defer_pending object to iop_recover (git-fixes).
* xfs: recompute growfsrtfree transaction reservation while growing rt volume
(git-fixes).
* xfs: transfer recovered intent item ownership in ->iop_recover (git-fixes).
* xfs: use xfs_defer_pending objects to recover intent items (git-fixes).
* xhci: add helper that checks for unhandled events on a event ring (git-
fixes).
* xhci: remove unnecessary event_ring_deq parameter from xhci_handle_event()
(git-fixes).
* xhci: Simplify event ring dequeue pointer update for port change events
(git-fixes).
* xhci: simplify event ring dequeue tracking for transfer events (git-fixes).
* xhci: update event ring dequeue pointer position to controller correctly
(git-fixes). Altered because we cannot take the multiple interrupter code

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2135=1 openSUSE-SLE-15.6-2024-2135=1

* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-2135=1

## Package List:

* openSUSE Leap 15.6 (aarch64 x86_64)
* reiserfs-kmp-azure-6.4.0-150600.8.5.4
* kernel-azure-extra-6.4.0-150600.8.5.4
* kernel-azure-debuginfo-6.4.0-150600.8.5.4
* kernel-azure-extra-debuginfo-6.4.0-150600.8.5.4
* dlm-kmp-azure-debuginfo-6.4.0-150600.8.5.4
* dlm-kmp-azure-6.4.0-150600.8.5.4
* kernel-azure-optional-6.4.0-150600.8.5.4
* ocfs2-kmp-azure-debuginfo-6.4.0-150600.8.5.4
* gfs2-kmp-azure-6.4.0-150600.8.5.4
* kselftests-kmp-azure-debuginfo-6.4.0-150600.8.5.4
* cluster-md-kmp-azure-debuginfo-6.4.0-150600.8.5.4
* kernel-syms-azure-6.4.0-150600.8.5.1
* kernel-azure-devel-debuginfo-6.4.0-150600.8.5.4
* gfs2-kmp-azure-debuginfo-6.4.0-150600.8.5.4
* cluster-md-kmp-azure-6.4.0-150600.8.5.4
* kernel-azure-livepatch-devel-6.4.0-150600.8.5.4
* ocfs2-kmp-azure-6.4.0-150600.8.5.4
* reiserfs-kmp-azure-debuginfo-6.4.0-150600.8.5.4
* kernel-azure-debugsource-6.4.0-150600.8.5.4
* kernel-azure-devel-6.4.0-150600.8.5.4
* kselftests-kmp-azure-6.4.0-150600.8.5.4
* kernel-azure-optional-debuginfo-6.4.0-150600.8.5.4
* openSUSE Leap 15.6 (aarch64 nosrc x86_64)
* kernel-azure-6.4.0-150600.8.5.4
* openSUSE Leap 15.6 (x86_64)
* kernel-azure-vdso-debuginfo-6.4.0-150600.8.5.4
* kernel-azure-vdso-6.4.0-150600.8.5.4
* openSUSE Leap 15.6 (noarch)
* kernel-devel-azure-6.4.0-150600.8.5.4
* kernel-source-azure-6.4.0-150600.8.5.4
* Public Cloud Module 15-SP6 (aarch64 nosrc x86_64)
* kernel-azure-6.4.0-150600.8.5.4
* Public Cloud Module 15-SP6 (aarch64 x86_64)
* kernel-syms-azure-6.4.0-150600.8.5.1
* kernel-azure-devel-debuginfo-6.4.0-150600.8.5.4
* kernel-azure-debugsource-6.4.0-150600.8.5.4
* kernel-azure-devel-6.4.0-150600.8.5.4
* kernel-azure-debuginfo-6.4.0-150600.8.5.4
* Public Cloud Module 15-SP6 (noarch)
* kernel-devel-azure-6.4.0-150600.8.5.4
* kernel-source-azure-6.4.0-150600.8.5.4

## References:

* https://www.suse.com/security/cve/CVE-2023-0160.html
* https://www.suse.com/security/cve/CVE-2023-47233.html
* https://www.suse.com/security/cve/CVE-2023-52434.html
* https://www.suse.com/security/cve/CVE-2023-52458.html
* https://www.suse.com/security/cve/CVE-2023-52463.html
* https://www.suse.com/security/cve/CVE-2023-52472.html
* https://www.suse.com/security/cve/CVE-2023-52483.html
* https://www.suse.com/security/cve/CVE-2023-52492.html
* https://www.suse.com/security/cve/CVE-2023-52503.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52608.html
* https://www.suse.com/security/cve/CVE-2023-52616.html
* https://www.suse.com/security/cve/CVE-2023-52618.html
* https://www.suse.com/security/cve/CVE-2023-52631.html
* https://www.suse.com/security/cve/CVE-2023-52635.html
* https://www.suse.com/security/cve/CVE-2023-52640.html
* https://www.suse.com/security/cve/CVE-2023-52641.html
* https://www.suse.com/security/cve/CVE-2023-52645.html
* https://www.suse.com/security/cve/CVE-2023-52652.html
* https://www.suse.com/security/cve/CVE-2023-52653.html
* https://www.suse.com/security/cve/CVE-2023-52654.html
* https://www.suse.com/security/cve/CVE-2023-52655.html
* https://www.suse.com/security/cve/CVE-2023-52657.html
* https://www.suse.com/security/cve/CVE-2023-52658.html
* https://www.suse.com/security/cve/CVE-2023-52659.html
* https://www.suse.com/security/cve/CVE-2023-52660.html
* https://www.suse.com/security/cve/CVE-2023-52661.html
* https://www.suse.com/security/cve/CVE-2023-52662.html
* https://www.suse.com/security/cve/CVE-2023-52663.html
* https://www.suse.com/security/cve/CVE-2023-52664.html
* https://www.suse.com/security/cve/CVE-2023-52667.html
* https://www.suse.com/security/cve/CVE-2023-52669.html
* https://www.suse.com/security/cve/CVE-2023-52670.html
* https://www.suse.com/security/cve/CVE-2023-52671.html
* https://www.suse.com/security/cve/CVE-2023-52673.html
* https://www.suse.com/security/cve/CVE-2023-52674.html
* https://www.suse.com/security/cve/CVE-2023-52675.html
* https://www.suse.com/security/cve/CVE-2023-52676.html
* https://www.suse.com/security/cve/CVE-2023-52678.html
* https://www.suse.com/security/cve/CVE-2023-52679.html
* https://www.suse.com/security/cve/CVE-2023-52680.html
* https://www.suse.com/security/cve/CVE-2023-52681.html
* https://www.suse.com/security/cve/CVE-2023-52683.html
* https://www.suse.com/security/cve/CVE-2023-52685.html
* https://www.suse.com/security/cve/CVE-2023-52686.html
* https://www.suse.com/security/cve/CVE-2023-52687.html
* https://www.suse.com/security/cve/CVE-2023-52690.html
* https://www.suse.com/security/cve/CVE-2023-52691.html
* https://www.suse.com/security/cve/CVE-2023-52692.html
* https://www.suse.com/security/cve/CVE-2023-52693.html
* https://www.suse.com/security/cve/CVE-2023-52694.html
* https://www.suse.com/security/cve/CVE-2023-52695.html
* https://www.suse.com/security/cve/CVE-2023-52696.html
* https://www.suse.com/security/cve/CVE-2023-52697.html
* https://www.suse.com/security/cve/CVE-2023-52698.html
* https://www.suse.com/security/cve/CVE-2023-52771.html
* https://www.suse.com/security/cve/CVE-2023-52772.html
* https://www.suse.com/security/cve/CVE-2023-52860.html
* https://www.suse.com/security/cve/CVE-2023-52882.html
* https://www.suse.com/security/cve/CVE-2023-6238.html
* https://www.suse.com/security/cve/CVE-2023-6270.html
* https://www.suse.com/security/cve/CVE-2023-6531.html
* https://www.suse.com/security/cve/CVE-2023-7042.html
* https://www.suse.com/security/cve/CVE-2024-0639.html
* https://www.suse.com/security/cve/CVE-2024-21823.html
* https://www.suse.com/security/cve/CVE-2024-22099.html
* https://www.suse.com/security/cve/CVE-2024-23848.html
* https://www.suse.com/security/cve/CVE-2024-24861.html
* https://www.suse.com/security/cve/CVE-2024-25739.html
* https://www.suse.com/security/cve/CVE-2024-26601.html
* https://www.suse.com/security/cve/CVE-2024-26611.html
* https://www.suse.com/security/cve/CVE-2024-26614.html
* https://www.suse.com/security/cve/CVE-2024-26632.html
* https://www.suse.com/security/cve/CVE-2024-26638.html
* https://www.suse.com/security/cve/CVE-2024-26642.html
* https://www.suse.com/security/cve/CVE-2024-26643.html
* https://www.suse.com/security/cve/CVE-2024-26652.html
* https://www.suse.com/security/cve/CVE-2024-26654.html
* https://www.suse.com/security/cve/CVE-2024-26656.html
* https://www.suse.com/security/cve/CVE-2024-26657.html
* https://www.suse.com/security/cve/CVE-2024-26671.html
* https://www.suse.com/security/cve/CVE-2024-26673.html
* https://www.suse.com/security/cve/CVE-2024-26674.html
* https://www.suse.com/security/cve/CVE-2024-26675.html
* https://www.suse.com/security/cve/CVE-2024-26679.html
* https://www.suse.com/security/cve/CVE-2024-26684.html
* https://www.suse.com/security/cve/CVE-2024-26685.html
* https://www.suse.com/security/cve/CVE-2024-26692.html
* https://www.suse.com/security/cve/CVE-2024-26696.html
* https://www.suse.com/security/cve/CVE-2024-26697.html
* https://www.suse.com/security/cve/CVE-2024-26704.html
* https://www.suse.com/security/cve/CVE-2024-26714.html
* https://www.suse.com/security/cve/CVE-2024-26726.html
* https://www.suse.com/security/cve/CVE-2024-26731.html
* https://www.suse.com/security/cve/CVE-2024-26733.html
* https://www.suse.com/security/cve/CVE-2024-26736.html
* https://www.suse.com/security/cve/CVE-2024-26737.html
* https://www.suse.com/security/cve/CVE-2024-26739.html
* https://www.suse.com/security/cve/CVE-2024-26740.html
* https://www.suse.com/security/cve/CVE-2024-26742.html
* https://www.suse.com/security/cve/CVE-2024-26756.html
* https://www.suse.com/security/cve/CVE-2024-26757.html
* https://www.suse.com/security/cve/CVE-2024-26760.html
* https://www.suse.com/security/cve/CVE-2024-267600.html
* https://www.suse.com/security/cve/CVE-2024-26761.html
* https://www.suse.com/security/cve/CVE-2024-26764.html
* https://www.suse.com/security/cve/CVE-2024-26769.html
* https://www.suse.com/security/cve/CVE-2024-26772.html
* https://www.suse.com/security/cve/CVE-2024-26773.html
* https://www.suse.com/security/cve/CVE-2024-26774.html
* https://www.suse.com/security/cve/CVE-2024-26775.html
* https://www.suse.com/security/cve/CVE-2024-26779.html
* https://www.suse.com/security/cve/CVE-2024-26783.html
* https://www.suse.com/security/cve/CVE-2024-26786.html
* https://www.suse.com/security/cve/CVE-2024-26791.html
* https://www.suse.com/security/cve/CVE-2024-26793.html
* https://www.suse.com/security/cve/CVE-2024-26794.html
* https://www.suse.com/security/cve/CVE-2024-26802.html
* https://www.suse.com/security/cve/CVE-2024-26805.html
* https://www.suse.com/security/cve/CVE-2024-26807.html
* https://www.suse.com/security/cve/CVE-2024-26815.html
* https://www.suse.com/security/cve/CVE-2024-26816.html
* https://www.suse.com/security/cve/CVE-2024-26822.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26832.html
* https://www.suse.com/security/cve/CVE-2024-26836.html
* https://www.suse.com/security/cve/CVE-2024-26844.html
* https://www.suse.com/security/cve/CVE-2024-26846.html
* https://www.suse.com/security/cve/CVE-2024-26848.html
* https://www.suse.com/security/cve/CVE-2024-26853.html
* https://www.suse.com/security/cve/CVE-2024-26854.html
* https://www.suse.com/security/cve/CVE-2024-26855.html
* https://www.suse.com/security/cve/CVE-2024-26856.html
* https://www.suse.com/security/cve/CVE-2024-26857.html
* https://www.suse.com/security/cve/CVE-2024-26858.html
* https://www.suse.com/security/cve/CVE-2024-26860.html
* https://www.suse.com/security/cve/CVE-2024-26861.html
* https://www.suse.com/security/cve/CVE-2024-26862.html
* https://www.suse.com/security/cve/CVE-2024-26866.html
* https://www.suse.com/security/cve/CVE-2024-26868.html
* https://www.suse.com/security/cve/CVE-2024-26870.html
* https://www.suse.com/security/cve/CVE-2024-26878.html
* https://www.suse.com/security/cve/CVE-2024-26881.html
* https://www.suse.com/security/cve/CVE-2024-26882.html
* https://www.suse.com/security/cve/CVE-2024-26883.html
* https://www.suse.com/security/cve/CVE-2024-26884.html
* https://www.suse.com/security/cve/CVE-2024-26885.html
* https://www.suse.com/security/cve/CVE-2024-26898.html
* https://www.suse.com/security/cve/CVE-2024-26899.html
* https://www.suse.com/security/cve/CVE-2024-26900.html
* https://www.suse.com/security/cve/CVE-2024-26901.html
* https://www.suse.com/security/cve/CVE-2024-26903.html
* https://www.suse.com/security/cve/CVE-2024-26906.html
* https://www.suse.com/security/cve/CVE-2024-26909.html
* https://www.suse.com/security/cve/CVE-2024-26921.html
* https://www.suse.com/security/cve/CVE-2024-26922.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-26925.html
* https://www.suse.com/security/cve/CVE-2024-26928.html
* https://www.suse.com/security/cve/CVE-2024-26932.html
* https://www.suse.com/security/cve/CVE-2024-26933.html
* https://www.suse.com/security/cve/CVE-2024-26934.html
* https://www.suse.com/security/cve/CVE-2024-26935.html
* https://www.suse.com/security/cve/CVE-2024-26937.html
* https://www.suse.com/security/cve/CVE-2024-26938.html
* https://www.suse.com/security/cve/CVE-2024-26940.html
* https://www.suse.com/security/cve/CVE-2024-26943.html
* https://www.suse.com/security/cve/CVE-2024-26945.html
* https://www.suse.com/security/cve/CVE-2024-26946.html
* https://www.suse.com/security/cve/CVE-2024-26948.html
* https://www.suse.com/security/cve/CVE-2024-26949.html
* https://www.suse.com/security/cve/CVE-2024-26950.html
* https://www.suse.com/security/cve/CVE-2024-26951.html
* https://www.suse.com/security/cve/CVE-2024-26956.html
* https://www.suse.com/security/cve/CVE-2024-26957.html
* https://www.suse.com/security/cve/CVE-2024-26958.html
* https://www.suse.com/security/cve/CVE-2024-26960.html
* https://www.suse.com/security/cve/CVE-2024-26961.html
* https://www.suse.com/security/cve/CVE-2024-26962.html
* https://www.suse.com/security/cve/CVE-2024-26963.html
* https://www.suse.com/security/cve/CVE-2024-26964.html
* https://www.suse.com/security/cve/CVE-2024-26972.html
* https://www.suse.com/security/cve/CVE-2024-26973.html
* https://www.suse.com/security/cve/CVE-2024-26978.html
* https://www.suse.com/security/cve/CVE-2024-26979.html
* https://www.suse.com/security/cve/CVE-2024-26981.html
* https://www.suse.com/security/cve/CVE-2024-26982.html
* https://www.suse.com/security/cve/CVE-2024-26983.html
* https://www.suse.com/security/cve/CVE-2024-26984.html
* https://www.suse.com/security/cve/CVE-2024-26986.html
* https://www.suse.com/security/cve/CVE-2024-26988.html
* https://www.suse.com/security/cve/CVE-2024-26989.html
* https://www.suse.com/security/cve/CVE-2024-26990.html
* https://www.suse.com/security/cve/CVE-2024-26991.html
* https://www.suse.com/security/cve/CVE-2024-26992.html
* https://www.suse.com/security/cve/CVE-2024-26993.html
* https://www.suse.com/security/cve/CVE-2024-26994.html
* https://www.suse.com/security/cve/CVE-2024-26995.html
* https://www.suse.com/security/cve/CVE-2024-26996.html
* https://www.suse.com/security/cve/CVE-2024-26997.html
* https://www.suse.com/security/cve/CVE-2024-26999.html
* https://www.suse.com/security/cve/CVE-2024-27000.html
* https://www.suse.com/security/cve/CVE-2024-27001.html
* https://www.suse.com/security/cve/CVE-2024-27002.html
* https://www.suse.com/security/cve/CVE-2024-27003.html
* https://www.suse.com/security/cve/CVE-2024-27004.html
* https://www.suse.com/security/cve/CVE-2024-27008.html
* https://www.suse.com/security/cve/CVE-2024-27013.html
* https://www.suse.com/security/cve/CVE-2024-27014.html
* https://www.suse.com/security/cve/CVE-2024-27022.html
* https://www.suse.com/security/cve/CVE-2024-27027.html
* https://www.suse.com/security/cve/CVE-2024-27028.html
* https://www.suse.com/security/cve/CVE-2024-27029.html
* https://www.suse.com/security/cve/CVE-2024-27030.html
* https://www.suse.com/security/cve/CVE-2024-27031.html
* https://www.suse.com/security/cve/CVE-2024-27036.html
* https://www.suse.com/security/cve/CVE-2024-27046.html
* https://www.suse.com/security/cve/CVE-2024-27056.html
* https://www.suse.com/security/cve/CVE-2024-27057.html
* https://www.suse.com/security/cve/CVE-2024-27062.html
* https://www.suse.com/security/cve/CVE-2024-27067.html
* https://www.suse.com/security/cve/CVE-2024-27080.html
* https://www.suse.com/security/cve/CVE-2024-27388.html
* https://www.suse.com/security/cve/CVE-2024-27389.html
* https://www.suse.com/security/cve/CVE-2024-27393.html
* https://www.suse.com/security/cve/CVE-2024-27395.html
* https://www.suse.com/security/cve/CVE-2024-27396.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-27399.html
* https://www.suse.com/security/cve/CVE-2024-27400.html
* https://www.suse.com/security/cve/CVE-2024-27401.html
* https://www.suse.com/security/cve/CVE-2024-27405.html
* https://www.suse.com/security/cve/CVE-2024-27408.html
* https://www.suse.com/security/cve/CVE-2024-27410.html
* https://www.suse.com/security/cve/CVE-2024-27411.html
* https://www.suse.com/security/cve/CVE-2024-27412.html
* https://www.suse.com/security/cve/CVE-2024-27413.html
* https://www.suse.com/security/cve/CVE-2024-27416.html
* https://www.suse.com/security/cve/CVE-2024-27417.html
* https://www.suse.com/security/cve/CVE-2024-27418.html
* https://www.suse.com/security/cve/CVE-2024-27431.html
* https://www.suse.com/security/cve/CVE-2024-27432.html
* https://www.suse.com/security/cve/CVE-2024-27434.html
* https://www.suse.com/security/cve/CVE-2024-27435.html
* https://www.suse.com/security/cve/CVE-2024-27436.html
* https://www.suse.com/security/cve/CVE-2024-35784.html
* https://www.suse.com/security/cve/CVE-2024-35786.html
* https://www.suse.com/security/cve/CVE-2024-35788.html
* https://www.suse.com/security/cve/CVE-2024-35789.html
* https://www.suse.com/security/cve/CVE-2024-35790.html
* https://www.suse.com/security/cve/CVE-2024-35791.html
* https://www.suse.com/security/cve/CVE-2024-35794.html
* https://www.suse.com/security/cve/CVE-2024-35795.html
* https://www.suse.com/security/cve/CVE-2024-35796.html
* https://www.suse.com/security/cve/CVE-2024-35799.html
* https://www.suse.com/security/cve/CVE-2024-35800.html
* https://www.suse.com/security/cve/CVE-2024-35801.html
* https://www.suse.com/security/cve/CVE-2024-35803.html
* https://www.suse.com/security/cve/CVE-2024-35804.html
* https://www.suse.com/security/cve/CVE-2024-35806.html
* https://www.suse.com/security/cve/CVE-2024-35808.html
* https://www.suse.com/security/cve/CVE-2024-35809.html
* https://www.suse.com/security/cve/CVE-2024-35810.html
* https://www.suse.com/security/cve/CVE-2024-35811.html
* https://www.suse.com/security/cve/CVE-2024-35812.html
* https://www.suse.com/security/cve/CVE-2024-35813.html
* https://www.suse.com/security/cve/CVE-2024-35814.html
* https://www.suse.com/security/cve/CVE-2024-35815.html
* https://www.suse.com/security/cve/CVE-2024-35817.html
* https://www.suse.com/security/cve/CVE-2024-35819.html
* https://www.suse.com/security/cve/CVE-2024-35821.html
* https://www.suse.com/security/cve/CVE-2024-35822.html
* https://www.suse.com/security/cve/CVE-2024-35823.html
* https://www.suse.com/security/cve/CVE-2024-35824.html
* https://www.suse.com/security/cve/CVE-2024-35825.html
* https://www.suse.com/security/cve/CVE-2024-35828.html
* https://www.suse.com/security/cve/CVE-2024-35829.html
* https://www.suse.com/security/cve/CVE-2024-35830.html
* https://www.suse.com/security/cve/CVE-2024-35833.html
* https://www.suse.com/security/cve/CVE-2024-35834.html
* https://www.suse.com/security/cve/CVE-2024-35835.html
* https://www.suse.com/security/cve/CVE-2024-35836.html
* https://www.suse.com/security/cve/CVE-2024-35837.html
* https://www.suse.com/security/cve/CVE-2024-35838.html
* https://www.suse.com/security/cve/CVE-2024-35841.html
* https://www.suse.com/security/cve/CVE-2024-35842.html
* https://www.suse.com/security/cve/CVE-2024-35845.html
* https://www.suse.com/security/cve/CVE-2024-35847.html
* https://www.suse.com/security/cve/CVE-2024-35849.html
* https://www.suse.com/security/cve/CVE-2024-35850.html
* https://www.suse.com/security/cve/CVE-2024-35851.html
* https://www.suse.com/security/cve/CVE-2024-35852.html
* https://www.suse.com/security/cve/CVE-2024-35854.html
* https://www.suse.com/security/cve/CVE-2024-35860.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35863.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35865.html
* https://www.suse.com/security/cve/CVE-2024-35866.html
* https://www.suse.com/security/cve/CVE-2024-35867.html
* https://www.suse.com/security/cve/CVE-2024-35868.html
* https://www.suse.com/security/cve/CVE-2024-35869.html
* https://www.suse.com/security/cve/CVE-2024-35870.html
* https://www.suse.com/security/cve/CVE-2024-35872.html
* https://www.suse.com/security/cve/CVE-2024-35875.html
* https://www.suse.com/security/cve/CVE-2024-35877.html
* https://www.suse.com/security/cve/CVE-2024-35878.html
* https://www.suse.com/security/cve/CVE-2024-35879.html
* https://www.suse.com/security/cve/CVE-2024-35883.html
* https://www.suse.com/security/cve/CVE-2024-35885.html
* https://www.suse.com/security/cve/CVE-2024-35887.html
* https://www.suse.com/security/cve/CVE-2024-35889.html
* https://www.suse.com/security/cve/CVE-2024-35891.html
* https://www.suse.com/security/cve/CVE-2024-35895.html
* https://www.suse.com/security/cve/CVE-2024-35901.html
* https://www.suse.com/security/cve/CVE-2024-35903.html
* https://www.suse.com/security/cve/CVE-2024-35904.html
* https://www.suse.com/security/cve/CVE-2024-35905.html
* https://www.suse.com/security/cve/CVE-2024-35907.html
* https://www.suse.com/security/cve/CVE-2024-35909.html
* https://www.suse.com/security/cve/CVE-2024-35911.html
* https://www.suse.com/security/cve/CVE-2024-35912.html
* https://www.suse.com/security/cve/CVE-2024-35914.html
* https://www.suse.com/security/cve/CVE-2024-35915.html
* https://www.suse.com/security/cve/CVE-2024-35916.html
* https://www.suse.com/security/cve/CVE-2024-35917.html
* https://www.suse.com/security/cve/CVE-2024-35921.html
* https://www.suse.com/security/cve/CVE-2024-35922.html
* https://www.suse.com/security/cve/CVE-2024-35924.html
* https://www.suse.com/security/cve/CVE-2024-35927.html
* https://www.suse.com/security/cve/CVE-2024-35928.html
* https://www.suse.com/security/cve/CVE-2024-35930.html
* https://www.suse.com/security/cve/CVE-2024-35931.html
* https://www.suse.com/security/cve/CVE-2024-35932.html
* https://www.suse.com/security/cve/CVE-2024-35933.html
* https://www.suse.com/security/cve/CVE-2024-35935.html
* https://www.suse.com/security/cve/CVE-2024-35936.html
* https://www.suse.com/security/cve/CVE-2024-35937.html
* https://www.suse.com/security/cve/CVE-2024-35938.html
* https://www.suse.com/security/cve/CVE-2024-35940.html
* https://www.suse.com/security/cve/CVE-2024-35943.html
* https://www.suse.com/security/cve/CVE-2024-35944.html
* https://www.suse.com/security/cve/CVE-2024-35945.html
* https://www.suse.com/security/cve/CVE-2024-35946.html
* https://www.suse.com/security/cve/CVE-2024-35947.html
* https://www.suse.com/security/cve/CVE-2024-35950.html
* https://www.suse.com/security/cve/CVE-2024-35951.html
* https://www.suse.com/security/cve/CVE-2024-35952.html
* https://www.suse.com/security/cve/CVE-2024-35953.html
* https://www.suse.com/security/cve/CVE-2024-35954.html
* https://www.suse.com/security/cve/CVE-2024-35955.html
* https://www.suse.com/security/cve/CVE-2024-35956.html
* https://www.suse.com/security/cve/CVE-2024-35958.html
* https://www.suse.com/security/cve/CVE-2024-35959.html
* https://www.suse.com/security/cve/CVE-2024-35960.html
* https://www.suse.com/security/cve/CVE-2024-35961.html
* https://www.suse.com/security/cve/CVE-2024-35963.html
* https://www.suse.com/security/cve/CVE-2024-35964.html
* https://www.suse.com/security/cve/CVE-2024-35965.html
* https://www.suse.com/security/cve/CVE-2024-35966.html
* https://www.suse.com/security/cve/CVE-2024-35967.html
* https://www.suse.com/security/cve/CVE-2024-35969.html
* https://www.suse.com/security/cve/CVE-2024-35971.html
* https://www.suse.com/security/cve/CVE-2024-35972.html
* https://www.suse.com/security/cve/CVE-2024-35973.html
* https://www.suse.com/security/cve/CVE-2024-35974.html
* https://www.suse.com/security/cve/CVE-2024-35975.html
* https://www.suse.com/security/cve/CVE-2024-35977.html
* https://www.suse.com/security/cve/CVE-2024-35978.html
* https://www.suse.com/security/cve/CVE-2024-35981.html
* https://www.suse.com/security/cve/CVE-2024-35982.html
* https://www.suse.com/security/cve/CVE-2024-35984.html
* https://www.suse.com/security/cve/CVE-2024-35986.html
* https://www.suse.com/security/cve/CVE-2024-35989.html
* https://www.suse.com/security/cve/CVE-2024-35990.html
* https://www.suse.com/security/cve/CVE-2024-35991.html
* https://www.suse.com/security/cve/CVE-2024-35992.html
* https://www.suse.com/security/cve/CVE-2024-35995.html
* https://www.suse.com/security/cve/CVE-2024-35997.html
* https://www.suse.com/security/cve/CVE-2024-35999.html
* https://www.suse.com/security/cve/CVE-2024-36002.html
* https://www.suse.com/security/cve/CVE-2024-36006.html
* https://www.suse.com/security/cve/CVE-2024-36007.html
* https://www.suse.com/security/cve/CVE-2024-36009.html
* https://www.suse.com/security/cve/CVE-2024-36011.html
* https://www.suse.com/security/cve/CVE-2024-36012.html
* https://www.suse.com/security/cve/CVE-2024-36013.html
* https://www.suse.com/security/cve/CVE-2024-36014.html
* https://www.suse.com/security/cve/CVE-2024-36015.html
* https://www.suse.com/security/cve/CVE-2024-36016.html
* https://www.suse.com/security/cve/CVE-2024-36018.html
* https://www.suse.com/security/cve/CVE-2024-36019.html
* https://www.suse.com/security/cve/CVE-2024-36020.html
* https://www.suse.com/security/cve/CVE-2024-36021.html
* https://www.suse.com/security/cve/CVE-2024-36025.html
* https://www.suse.com/security/cve/CVE-2024-36026.html
* https://www.suse.com/security/cve/CVE-2024-36029.html
* https://www.suse.com/security/cve/CVE-2024-36030.html
* https://www.suse.com/security/cve/CVE-2024-36032.html
* https://www.suse.com/security/cve/CVE-2024-36880.html
* https://www.suse.com/security/cve/CVE-2024-36885.html
* https://www.suse.com/security/cve/CVE-2024-36890.html
* https://www.suse.com/security/cve/CVE-2024-36891.html
* https://www.suse.com/security/cve/CVE-2024-36893.html
* https://www.suse.com/security/cve/CVE-2024-36894.html
* https://www.suse.com/security/cve/CVE-2024-36895.html
* https://www.suse.com/security/cve/CVE-2024-36896.html
* https://www.suse.com/security/cve/CVE-2024-36897.html
* https://www.suse.com/security/cve/CVE-2024-36898.html
* https://www.suse.com/security/cve/CVE-2024-36906.html
* https://www.suse.com/security/cve/CVE-2024-36918.html
* https://www.suse.com/security/cve/CVE-2024-36921.html
* https://www.suse.com/security/cve/CVE-2024-36922.html
* https://www.suse.com/security/cve/CVE-2024-36928.html
* https://www.suse.com/security/cve/CVE-2024-36930.html
* https://www.suse.com/security/cve/CVE-2024-36931.html
* https://www.suse.com/security/cve/CVE-2024-36936.html
* https://www.suse.com/security/cve/CVE-2024-36940.html
* https://www.suse.com/security/cve/CVE-2024-36941.html
* https://www.suse.com/security/cve/CVE-2024-36942.html
* https://www.suse.com/security/cve/CVE-2024-36944.html
* https://www.suse.com/security/cve/CVE-2024-36947.html
* https://www.suse.com/security/cve/CVE-2024-36949.html
* https://www.suse.com/security/cve/CVE-2024-36950.html
* https://www.suse.com/security/cve/CVE-2024-36951.html
* https://www.suse.com/security/cve/CVE-2024-36955.html
* https://www.suse.com/security/cve/CVE-2024-36959.html
* https://bugzilla.suse.com/show_bug.cgi?id=1012628
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1181674
* https://bugzilla.suse.com/show_bug.cgi?id=1187716
* https://bugzilla.suse.com/show_bug.cgi?id=1193599
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1207948
* https://bugzilla.suse.com/show_bug.cgi?id=1208593
* https://bugzilla.suse.com/show_bug.cgi?id=1209657
* https://bugzilla.suse.com/show_bug.cgi?id=1213573
* https://bugzilla.suse.com/show_bug.cgi?id=1214852
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1216196
* https://bugzilla.suse.com/show_bug.cgi?id=1216358
* https://bugzilla.suse.com/show_bug.cgi?id=1216702
* https://bugzilla.suse.com/show_bug.cgi?id=1217169
* https://bugzilla.suse.com/show_bug.cgi?id=1217384
* https://bugzilla.suse.com/show_bug.cgi?id=1217408
* https://bugzilla.suse.com/show_bug.cgi?id=1217489
* https://bugzilla.suse.com/show_bug.cgi?id=1217750
* https://bugzilla.suse.com/show_bug.cgi?id=1217959
* https://bugzilla.suse.com/show_bug.cgi?id=1218205
* https://bugzilla.suse.com/show_bug.cgi?id=1218336
* https://bugzilla.suse.com/show_bug.cgi?id=1218447
* https://bugzilla.suse.com/show_bug.cgi?id=1218562
* https://bugzilla.suse.com/show_bug.cgi?id=1218779
* https://bugzilla.suse.com/show_bug.cgi?id=1218917
* https://bugzilla.suse.com/show_bug.cgi?id=1219104
* https://bugzilla.suse.com/show_bug.cgi?id=1219170
* https://bugzilla.suse.com/show_bug.cgi?id=1219596
* https://bugzilla.suse.com/show_bug.cgi?id=1219623
* https://bugzilla.suse.com/show_bug.cgi?id=1219834
* https://bugzilla.suse.com/show_bug.cgi?id=1220021
* https://bugzilla.suse.com/show_bug.cgi?id=1220045
* https://bugzilla.suse.com/show_bug.cgi?id=1220120
* https://bugzilla.suse.com/show_bug.cgi?id=1220148
* https://bugzilla.suse.com/show_bug.cgi?id=1220328
* https://bugzilla.suse.com/show_bug.cgi?id=1220342
* https://bugzilla.suse.com/show_bug.cgi?id=1220428
* https://bugzilla.suse.com/show_bug.cgi?id=1220430
* https://bugzilla.suse.com/show_bug.cgi?id=1220569
* https://bugzilla.suse.com/show_bug.cgi?id=1220587
* https://bugzilla.suse.com/show_bug.cgi?id=1220738
* https://bugzilla.suse.com/show_bug.cgi?id=1220783
* https://bugzilla.suse.com/show_bug.cgi?id=1220915
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221276
* https://bugzilla.suse.com/show_bug.cgi?id=1221293
* https://bugzilla.suse.com/show_bug.cgi?id=1221303
* https://bugzilla.suse.com/show_bug.cgi?id=1221375
* https://bugzilla.suse.com/show_bug.cgi?id=1221504
* https://bugzilla.suse.com/show_bug.cgi?id=1221612
* https://bugzilla.suse.com/show_bug.cgi?id=1221615
* https://bugzilla.suse.com/show_bug.cgi?id=1221635
* https://bugzilla.suse.com/show_bug.cgi?id=1221645
* https://bugzilla.suse.com/show_bug.cgi?id=1221649
* https://bugzilla.suse.com/show_bug.cgi?id=1221765
* https://bugzilla.suse.com/show_bug.cgi?id=1221777
* https://bugzilla.suse.com/show_bug.cgi?id=1221783
* https://bugzilla.suse.com/show_bug.cgi?id=1221816
* https://bugzilla.suse.com/show_bug.cgi?id=1221829
* https://bugzilla.suse.com/show_bug.cgi?id=1221830
* https://bugzilla.suse.com/show_bug.cgi?id=1221858
* https://bugzilla.suse.com/show_bug.cgi?id=1222115
* https://bugzilla.suse.com/show_bug.cgi?id=1222173
* https://bugzilla.suse.com/show_bug.cgi?id=1222264
* https://bugzilla.suse.com/show_bug.cgi?id=1222273
* https://bugzilla.suse.com/show_bug.cgi?id=1222294
* https://bugzilla.suse.com/show_bug.cgi?id=1222301
* https://bugzilla.suse.com/show_bug.cgi?id=1222303
* https://bugzilla.suse.com/show_bug.cgi?id=1222304
* https://bugzilla.suse.com/show_bug.cgi?id=1222307
* https://bugzilla.suse.com/show_bug.cgi?id=1222357
* https://bugzilla.suse.com/show_bug.cgi?id=1222366
* https://bugzilla.suse.com/show_bug.cgi?id=1222368
* https://bugzilla.suse.com/show_bug.cgi?id=1222371
* https://bugzilla.suse.com/show_bug.cgi?id=1222378
* https://bugzilla.suse.com/show_bug.cgi?id=1222379
* https://bugzilla.suse.com/show_bug.cgi?id=1222385
* https://bugzilla.suse.com/show_bug.cgi?id=1222422
* https://bugzilla.suse.com/show_bug.cgi?id=1222426
* https://bugzilla.suse.com/show_bug.cgi?id=1222428
* https://bugzilla.suse.com/show_bug.cgi?id=1222437
* https://bugzilla.suse.com/show_bug.cgi?id=1222445
* https://bugzilla.suse.com/show_bug.cgi?id=1222459
* https://bugzilla.suse.com/show_bug.cgi?id=1222464
* https://bugzilla.suse.com/show_bug.cgi?id=1222489
* https://bugzilla.suse.com/show_bug.cgi?id=1222522
* https://bugzilla.suse.com/show_bug.cgi?id=1222525
* https://bugzilla.suse.com/show_bug.cgi?id=1222527
* https://bugzilla.suse.com/show_bug.cgi?id=1222531
* https://bugzilla.suse.com/show_bug.cgi?id=1222532
* https://bugzilla.suse.com/show_bug.cgi?id=1222549
* https://bugzilla.suse.com/show_bug.cgi?id=1222550
* https://bugzilla.suse.com/show_bug.cgi?id=1222557
* https://bugzilla.suse.com/show_bug.cgi?id=1222559
* https://bugzilla.suse.com/show_bug.cgi?id=1222563
* https://bugzilla.suse.com/show_bug.cgi?id=1222585
* https://bugzilla.suse.com/show_bug.cgi?id=1222586
* https://bugzilla.suse.com/show_bug.cgi?id=1222596
* https://bugzilla.suse.com/show_bug.cgi?id=1222606
* https://bugzilla.suse.com/show_bug.cgi?id=1222608
* https://bugzilla.suse.com/show_bug.cgi?id=1222613
* https://bugzilla.suse.com/show_bug.cgi?id=1222615
* https://bugzilla.suse.com/show_bug.cgi?id=1222618
* https://bugzilla.suse.com/show_bug.cgi?id=1222622
* https://bugzilla.suse.com/show_bug.cgi?id=1222624
* https://bugzilla.suse.com/show_bug.cgi?id=1222627
* https://bugzilla.suse.com/show_bug.cgi?id=1222630
* https://bugzilla.suse.com/show_bug.cgi?id=1222635
* https://bugzilla.suse.com/show_bug.cgi?id=1222721
* https://bugzilla.suse.com/show_bug.cgi?id=1222727
* https://bugzilla.suse.com/show_bug.cgi?id=1222769
* https://bugzilla.suse.com/show_bug.cgi?id=1222771
* https://bugzilla.suse.com/show_bug.cgi?id=1222772
* https://bugzilla.suse.com/show_bug.cgi?id=1222775
* https://bugzilla.suse.com/show_bug.cgi?id=1222777
* https://bugzilla.suse.com/show_bug.cgi?id=1222780
* https://bugzilla.suse.com/show_bug.cgi?id=1222782
* https://bugzilla.suse.com/show_bug.cgi?id=1222793
* https://bugzilla.suse.com/show_bug.cgi?id=1222799
* https://bugzilla.suse.com/show_bug.cgi?id=1222801
* https://bugzilla.suse.com/show_bug.cgi?id=1222968
* https://bugzilla.suse.com/show_bug.cgi?id=1223007
* https://bugzilla.suse.com/show_bug.cgi?id=1223011
* https://bugzilla.suse.com/show_bug.cgi?id=1223015
* https://bugzilla.suse.com/show_bug.cgi?id=1223016
* https://bugzilla.suse.com/show_bug.cgi?id=1223020
* https://bugzilla.suse.com/show_bug.cgi?id=1223023
* https://bugzilla.suse.com/show_bug.cgi?id=1223024
* https://bugzilla.suse.com/show_bug.cgi?id=1223030
* https://bugzilla.suse.com/show_bug.cgi?id=1223033
* https://bugzilla.suse.com/show_bug.cgi?id=1223034
* https://bugzilla.suse.com/show_bug.cgi?id=1223035
* https://bugzilla.suse.com/show_bug.cgi?id=1223038
* https://bugzilla.suse.com/show_bug.cgi?id=1223039
* https://bugzilla.suse.com/show_bug.cgi?id=1223041
* https://bugzilla.suse.com/show_bug.cgi?id=1223045
* https://bugzilla.suse.com/show_bug.cgi?id=1223046
* https://bugzilla.suse.com/show_bug.cgi?id=1223051
* https://bugzilla.suse.com/show_bug.cgi?id=1223052
* https://bugzilla.suse.com/show_bug.cgi?id=1223058
* https://bugzilla.suse.com/show_bug.cgi?id=1223060
* https://bugzilla.suse.com/show_bug.cgi?id=1223061
* https://bugzilla.suse.com/show_bug.cgi?id=1223076
* https://bugzilla.suse.com/show_bug.cgi?id=1223077
* https://bugzilla.suse.com/show_bug.cgi?id=1223084
* https://bugzilla.suse.com/show_bug.cgi?id=1223111
* https://bugzilla.suse.com/show_bug.cgi?id=1223113
* https://bugzilla.suse.com/show_bug.cgi?id=1223138
* https://bugzilla.suse.com/show_bug.cgi?id=1223143
* https://bugzilla.suse.com/show_bug.cgi?id=1223187
* https://bugzilla.suse.com/show_bug.cgi?id=1223189
* https://bugzilla.suse.com/show_bug.cgi?id=1223190
* https://bugzilla.suse.com/show_bug.cgi?id=1223191
* https://bugzilla.suse.com/show_bug.cgi?id=1223198
* https://bugzilla.suse.com/show_bug.cgi?id=1223202
* https://bugzilla.suse.com/show_bug.cgi?id=1223285
* https://bugzilla.suse.com/show_bug.cgi?id=1223315
* https://bugzilla.suse.com/show_bug.cgi?id=1223338
* https://bugzilla.suse.com/show_bug.cgi?id=1223369
* https://bugzilla.suse.com/show_bug.cgi?id=1223380
* https://bugzilla.suse.com/show_bug.cgi?id=1223384
* https://bugzilla.suse.com/show_bug.cgi?id=1223390
* https://bugzilla.suse.com/show_bug.cgi?id=1223439
* https://bugzilla.suse.com/show_bug.cgi?id=1223462
* https://bugzilla.suse.com/show_bug.cgi?id=1223532
* https://bugzilla.suse.com/show_bug.cgi?id=1223539
* https://bugzilla.suse.com/show_bug.cgi?id=1223575
* https://bugzilla.suse.com/show_bug.cgi?id=1223590
* https://bugzilla.suse.com/show_bug.cgi?id=1223591
* https://bugzilla.suse.com/show_bug.cgi?id=1223592
* https://bugzilla.suse.com/show_bug.cgi?id=1223593
* https://bugzilla.suse.com/show_bug.cgi?id=1223625
* https://bugzilla.suse.com/show_bug.cgi?id=1223628
* https://bugzilla.suse.com/show_bug.cgi?id=1223629
* https://bugzilla.suse.com/show_bug.cgi?id=1223633
* https://bugzilla.suse.com/show_bug.cgi?id=1223634
* https://bugzilla.suse.com/show_bug.cgi?id=1223637
* https://bugzilla.suse.com/show_bug.cgi?id=1223641
* https://bugzilla.suse.com/show_bug.cgi?id=1223643
* https://bugzilla.suse.com/show_bug.cgi?id=1223649
* https://bugzilla.suse.com/show_bug.cgi?id=1223650
* https://bugzilla.suse.com/show_bug.cgi?id=1223651
* https://bugzilla.suse.com/show_bug.cgi?id=1223652
* https://bugzilla.suse.com/show_bug.cgi?id=1223653
* https://bugzilla.suse.com/show_bug.cgi?id=1223654
* https://bugzilla.suse.com/show_bug.cgi?id=1223655
* https://bugzilla.suse.com/show_bug.cgi?id=1223660
* https://bugzilla.suse.com/show_bug.cgi?id=1223661
* https://bugzilla.suse.com/show_bug.cgi?id=1223663
* https://bugzilla.suse.com/show_bug.cgi?id=1223664
* https://bugzilla.suse.com/show_bug.cgi?id=1223665
* https://bugzilla.suse.com/show_bug.cgi?id=1223666
* https://bugzilla.suse.com/show_bug.cgi?id=1223668
* https://bugzilla.suse.com/show_bug.cgi?id=1223669
* https://bugzilla.suse.com/show_bug.cgi?id=1223670
* https://bugzilla.suse.com/show_bug.cgi?id=1223671
* https://bugzilla.suse.com/show_bug.cgi?id=1223675
* https://bugzilla.suse.com/show_bug.cgi?id=1223677
* https://bugzilla.suse.com/show_bug.cgi?id=1223678
* https://bugzilla.suse.com/show_bug.cgi?id=1223686
* https://bugzilla.suse.com/show_bug.cgi?id=1223692
* https://bugzilla.suse.com/show_bug.cgi?id=1223693
* https://bugzilla.suse.com/show_bug.cgi?id=1223695
* https://bugzilla.suse.com/show_bug.cgi?id=1223696
* https://bugzilla.suse.com/show_bug.cgi?id=1223698
* https://bugzilla.suse.com/show_bug.cgi?id=1223705
* https://bugzilla.suse.com/show_bug.cgi?id=1223712
* https://bugzilla.suse.com/show_bug.cgi?id=1223718
* https://bugzilla.suse.com/show_bug.cgi?id=1223728
* https://bugzilla.suse.com/show_bug.cgi?id=1223732
* https://bugzilla.suse.com/show_bug.cgi?id=1223735
* https://bugzilla.suse.com/show_bug.cgi?id=1223739
* https://bugzilla.suse.com/show_bug.cgi?id=1223741
* https://bugzilla.suse.com/show_bug.cgi?id=1223744
* https://bugzilla.suse.com/show_bug.cgi?id=1223745
* https://bugzilla.suse.com/show_bug.cgi?id=1223747
* https://bugzilla.suse.com/show_bug.cgi?id=1223748
* https://bugzilla.suse.com/show_bug.cgi?id=1223749
* https://bugzilla.suse.com/show_bug.cgi?id=1223750
* https://bugzilla.suse.com/show_bug.cgi?id=1223752
* https://bugzilla.suse.com/show_bug.cgi?id=1223754
* https://bugzilla.suse.com/show_bug.cgi?id=1223757
* https://bugzilla.suse.com/show_bug.cgi?id=1223759
* https://bugzilla.suse.com/show_bug.cgi?id=1223761
* https://bugzilla.suse.com/show_bug.cgi?id=1223762
* https://bugzilla.suse.com/show_bug.cgi?id=1223774
* https://bugzilla.suse.com/show_bug.cgi?id=1223782
* https://bugzilla.suse.com/show_bug.cgi?id=1223787
* https://bugzilla.suse.com/show_bug.cgi?id=1223788
* https://bugzilla.suse.com/show_bug.cgi?id=1223789
* https://bugzilla.suse.com/show_bug.cgi?id=1223790
* https://bugzilla.suse.com/show_bug.cgi?id=1223802
* https://bugzilla.suse.com/show_bug.cgi?id=1223805
* https://bugzilla.suse.com/show_bug.cgi?id=1223810
* https://bugzilla.suse.com/show_bug.cgi?id=1223822
* https://bugzilla.suse.com/show_bug.cgi?id=1223827
* https://bugzilla.suse.com/show_bug.cgi?id=1223831
* https://bugzilla.suse.com/show_bug.cgi?id=1223834
* https://bugzilla.suse.com/show_bug.cgi?id=1223838
* https://bugzilla.suse.com/show_bug.cgi?id=1223869
* https://bugzilla.suse.com/show_bug.cgi?id=1223870
* https://bugzilla.suse.com/show_bug.cgi?id=1223871
* https://bugzilla.suse.com/show_bug.cgi?id=1223872
* https://bugzilla.suse.com/show_bug.cgi?id=1223874
* https://bugzilla.suse.com/show_bug.cgi?id=1223944
* https://bugzilla.suse.com/show_bug.cgi?id=1223945
* https://bugzilla.suse.com/show_bug.cgi?id=1223946
* https://bugzilla.suse.com/show_bug.cgi?id=1223991
* https://bugzilla.suse.com/show_bug.cgi?id=1224076
* https://bugzilla.suse.com/show_bug.cgi?id=1224096
* https://bugzilla.suse.com/show_bug.cgi?id=1224098
* https://bugzilla.suse.com/show_bug.cgi?id=1224099
* https://bugzilla.suse.com/show_bug.cgi?id=1224137
* https://bugzilla.suse.com/show_bug.cgi?id=1224166
* https://bugzilla.suse.com/show_bug.cgi?id=1224174
* https://bugzilla.suse.com/show_bug.cgi?id=1224177
* https://bugzilla.suse.com/show_bug.cgi?id=1224180
* https://bugzilla.suse.com/show_bug.cgi?id=1224181
* https://bugzilla.suse.com/show_bug.cgi?id=1224331
* https://bugzilla.suse.com/show_bug.cgi?id=1224348
* https://bugzilla.suse.com/show_bug.cgi?id=1224423
* https://bugzilla.suse.com/show_bug.cgi?id=1224429
* https://bugzilla.suse.com/show_bug.cgi?id=1224430
* https://bugzilla.suse.com/show_bug.cgi?id=1224432
* https://bugzilla.suse.com/show_bug.cgi?id=1224433
* https://bugzilla.suse.com/show_bug.cgi?id=1224437
* https://bugzilla.suse.com/show_bug.cgi?id=1224438
* https://bugzilla.suse.com/show_bug.cgi?id=1224442
* https://bugzilla.suse.com/show_bug.cgi?id=1224443
* https://bugzilla.suse.com/show_bug.cgi?id=1224445
* https://bugzilla.suse.com/show_bug.cgi?id=1224449
* https://bugzilla.suse.com/show_bug.cgi?id=1224477
* https://bugzilla.suse.com/show_bug.cgi?id=1224479
* https://bugzilla.suse.com/show_bug.cgi?id=1224480
* https://bugzilla.suse.com/show_bug.cgi?id=1224481
* https://bugzilla.suse.com/show_bug.cgi?id=1224482
* https://bugzilla.suse.com/show_bug.cgi?id=1224486
* https://bugzilla.suse.com/show_bug.cgi?id=1224487
* https://bugzilla.suse.com/show_bug.cgi?id=1224488
* https://bugzilla.suse.com/show_bug.cgi?id=1224491
* https://bugzilla.suse.com/show_bug.cgi?id=1224492
* https://bugzilla.suse.com/show_bug.cgi?id=1224493
* https://bugzilla.suse.com/show_bug.cgi?id=1224494
* https://bugzilla.suse.com/show_bug.cgi?id=1224495
* https://bugzilla.suse.com/show_bug.cgi?id=1224500
* https://bugzilla.suse.com/show_bug.cgi?id=1224501
* https://bugzilla.suse.com/show_bug.cgi?id=1224502
* https://bugzilla.suse.com/show_bug.cgi?id=1224504
* https://bugzilla.suse.com/show_bug.cgi?id=1224505
* https://bugzilla.suse.com/show_bug.cgi?id=1224506
* https://bugzilla.suse.com/show_bug.cgi?id=1224507
* https://bugzilla.suse.com/show_bug.cgi?id=1224508
* https://bugzilla.suse.com/show_bug.cgi?id=1224509
* https://bugzilla.suse.com/show_bug.cgi?id=1224511
* https://bugzilla.suse.com/show_bug.cgi?id=1224513
* https://bugzilla.suse.com/show_bug.cgi?id=1224517
* https://bugzilla.suse.com/show_bug.cgi?id=1224519
* https://bugzilla.suse.com/show_bug.cgi?id=1224521
* https://bugzilla.suse.com/show_bug.cgi?id=1224524
* https://bugzilla.suse.com/show_bug.cgi?id=1224525
* https://bugzilla.suse.com/show_bug.cgi?id=1224526
* https://bugzilla.suse.com/show_bug.cgi?id=1224530
* https://bugzilla.suse.com/show_bug.cgi?id=1224531
* https://bugzilla.suse.com/show_bug.cgi?id=1224534
* https://bugzilla.suse.com/show_bug.cgi?id=1224537
* https://bugzilla.suse.com/show_bug.cgi?id=1224541
* https://bugzilla.suse.com/show_bug.cgi?id=1224542
* https://bugzilla.suse.com/show_bug.cgi?id=1224543
* https://bugzilla.suse.com/show_bug.cgi?id=1224546
* https://bugzilla.suse.com/show_bug.cgi?id=1224550
* https://bugzilla.suse.com/show_bug.cgi?id=1224552
* https://bugzilla.suse.com/show_bug.cgi?id=1224553
* https://bugzilla.suse.com/show_bug.cgi?id=1224555
* https://bugzilla.suse.com/show_bug.cgi?id=1224557
* https://bugzilla.suse.com/show_bug.cgi?id=1224558
* https://bugzilla.suse.com/show_bug.cgi?id=1224559
* https://bugzilla.suse.com/show_bug.cgi?id=1224562
* https://bugzilla.suse.com/show_bug.cgi?id=1224565
* https://bugzilla.suse.com/show_bug.cgi?id=1224566
* https://bugzilla.suse.com/show_bug.cgi?id=1224567
* https://bugzilla.suse.com/show_bug.cgi?id=1224568
* https://bugzilla.suse.com/show_bug.cgi?id=1224569
* https://bugzilla.suse.com/show_bug.cgi?id=1224571
* https://bugzilla.suse.com/show_bug.cgi?id=1224573
* https://bugzilla.suse.com/show_bug.cgi?id=1224576
* https://bugzilla.suse.com/show_bug.cgi?id=1224577
* https://bugzilla.suse.com/show_bug.cgi?id=1224578
* https://bugzilla.suse.com/show_bug.cgi?id=1224579
* https://bugzilla.suse.com/show_bug.cgi?id=1224580
* https://bugzilla.suse.com/show_bug.cgi?id=1224581
* https://bugzilla.suse.com/show_bug.cgi?id=1224582
* https://bugzilla.suse.com/show_bug.cgi?id=1224585
* https://bugzilla.suse.com/show_bug.cgi?id=1224586
* https://bugzilla.suse.com/show_bug.cgi?id=1224587
* https://bugzilla.suse.com/show_bug.cgi?id=1224588
* https://bugzilla.suse.com/show_bug.cgi?id=1224592
* https://bugzilla.suse.com/show_bug.cgi?id=1224596
* https://bugzilla.suse.com/show_bug.cgi?id=1224598
* https://bugzilla.suse.com/show_bug.cgi?id=1224600
* https://bugzilla.suse.com/show_bug.cgi?id=1224601
* https://bugzilla.suse.com/show_bug.cgi?id=1224602
* https://bugzilla.suse.com/show_bug.cgi?id=1224603
* https://bugzilla.suse.com/show_bug.cgi?id=1224605
* https://bugzilla.suse.com/show_bug.cgi?id=1224607
* https://bugzilla.suse.com/show_bug.cgi?id=1224608
* https://bugzilla.suse.com/show_bug.cgi?id=1224609
* https://bugzilla.suse.com/show_bug.cgi?id=1224611
* https://bugzilla.suse.com/show_bug.cgi?id=1224613
* https://bugzilla.suse.com/show_bug.cgi?id=1224615
* https://bugzilla.suse.com/show_bug.cgi?id=1224617
* https://bugzilla.suse.com/show_bug.cgi?id=1224618
* https://bugzilla.suse.com/show_bug.cgi?id=1224620
* https://bugzilla.suse.com/show_bug.cgi?id=1224621
* https://bugzilla.suse.com/show_bug.cgi?id=1224622
* https://bugzilla.suse.com/show_bug.cgi?id=1224623
* https://bugzilla.suse.com/show_bug.cgi?id=1224624
* https://bugzilla.suse.com/show_bug.cgi?id=1224626
* https://bugzilla.suse.com/show_bug.cgi?id=1224627
* https://bugzilla.suse.com/show_bug.cgi?id=1224628
* https://bugzilla.suse.com/show_bug.cgi?id=1224629
* https://bugzilla.suse.com/show_bug.cgi?id=1224630
* https://bugzilla.suse.com/show_bug.cgi?id=1224632
* https://bugzilla.suse.com/show_bug.cgi?id=1224633
* https://bugzilla.suse.com/show_bug.cgi?id=1224634
* https://bugzilla.suse.com/show_bug.cgi?id=1224636
* https://bugzilla.suse.com/show_bug.cgi?id=1224637
* https://bugzilla.suse.com/show_bug.cgi?id=1224638
* https://bugzilla.suse.com/show_bug.cgi?id=1224639
* https://bugzilla.suse.com/show_bug.cgi?id=1224640
* https://bugzilla.suse.com/show_bug.cgi?id=1224643
* https://bugzilla.suse.com/show_bug.cgi?id=1224644
* https://bugzilla.suse.com/show_bug.cgi?id=1224645
* https://bugzilla.suse.com/show_bug.cgi?id=1224646
* https://bugzilla.suse.com/show_bug.cgi?id=1224647
* https://bugzilla.suse.com/show_bug.cgi?id=1224648
* https://bugzilla.suse.com/show_bug.cgi?id=1224649
* https://bugzilla.suse.com/show_bug.cgi?id=1224650
* https://bugzilla.suse.com/show_bug.cgi?id=1224651
* https://bugzilla.suse.com/show_bug.cgi?id=1224652
* https://bugzilla.suse.com/show_bug.cgi?id=1224653
* https://bugzilla.suse.com/show_bug.cgi?id=1224654
* https://bugzilla.suse.com/show_bug.cgi?id=1224657
* https://bugzilla.suse.com/show_bug.cgi?id=1224660
* https://bugzilla.suse.com/show_bug.cgi?id=1224663
* https://bugzilla.suse.com/show_bug.cgi?id=1224664
* https://bugzilla.suse.com/show_bug.cgi?id=1224665
* https://bugzilla.suse.com/show_bug.cgi?id=1224666
* https://bugzilla.suse.com/show_bug.cgi?id=1224667
* https://bugzilla.suse.com/show_bug.cgi?id=1224668
* https://bugzilla.suse.com/show_bug.cgi?id=1224671
* https://bugzilla.suse.com/show_bug.cgi?id=1224672
* https://bugzilla.suse.com/show_bug.cgi?id=1224674
* https://bugzilla.suse.com/show_bug.cgi?id=1224675
* https://bugzilla.suse.com/show_bug.cgi?id=1224676
* https://bugzilla.suse.com/show_bug.cgi?id=1224677
* https://bugzilla.suse.com/show_bug.cgi?id=1224678
* https://bugzilla.suse.com/show_bug.cgi?id=1224679
* https://bugzilla.suse.com/show_bug.cgi?id=1224680
* https://bugzilla.suse.com/show_bug.cgi?id=1224681
* https://bugzilla.suse.com/show_bug.cgi?id=1224682
* https://bugzilla.suse.com/show_bug.cgi?id=1224683
* https://bugzilla.suse.com/show_bug.cgi?id=1224685
* https://bugzilla.suse.com/show_bug.cgi?id=1224686
* https://bugzilla.suse.com/show_bug.cgi?id=1224687
* https://bugzilla.suse.com/show_bug.cgi?id=1224688
* https://bugzilla.suse.com/show_bug.cgi?id=1224692
* https://bugzilla.suse.com/show_bug.cgi?id=1224696
* https://bugzilla.suse.com/show_bug.cgi?id=1224697
* https://bugzilla.suse.com/show_bug.cgi?id=1224699
* https://bugzilla.suse.com/show_bug.cgi?id=1224701
* https://bugzilla.suse.com/show_bug.cgi?id=1224703
* https://bugzilla.suse.com/show_bug.cgi?id=1224704
* https://bugzilla.suse.com/show_bug.cgi?id=1224705
* https://bugzilla.suse.com/show_bug.cgi?id=1224706
* https://bugzilla.suse.com/show_bug.cgi?id=1224707
* https://bugzilla.suse.com/show_bug.cgi?id=1224709
* https://bugzilla.suse.com/show_bug.cgi?id=1224710
* https://bugzilla.suse.com/show_bug.cgi?id=1224712
* https://bugzilla.suse.com/show_bug.cgi?id=1224714
* https://bugzilla.suse.com/show_bug.cgi?id=1224716
* https://bugzilla.suse.com/show_bug.cgi?id=1224717
* https://bugzilla.suse.com/show_bug.cgi?id=1224718
* https://bugzilla.suse.com/show_bug.cgi?id=1224719
* https://bugzilla.suse.com/show_bug.cgi?id=1224720
* https://bugzilla.suse.com/show_bug.cgi?id=1224721
* https://bugzilla.suse.com/show_bug.cgi?id=1224722
* https://bugzilla.suse.com/show_bug.cgi?id=1224723
* https://bugzilla.suse.com/show_bug.cgi?id=1224725
* https://bugzilla.suse.com/show_bug.cgi?id=1224727
* https://bugzilla.suse.com/show_bug.cgi?id=1224728
* https://bugzilla.suse.com/show_bug.cgi?id=1224729
* https://bugzilla.suse.com/show_bug.cgi?id=1224730
* https://bugzilla.suse.com/show_bug.cgi?id=1224731
* https://bugzilla.suse.com/show_bug.cgi?id=1224732
* https://bugzilla.suse.com/show_bug.cgi?id=1224733
* https://bugzilla.suse.com/show_bug.cgi?id=1224736
* https://bugzilla.suse.com/show_bug.cgi?id=1224738
* https://bugzilla.suse.com/show_bug.cgi?id=1224739
* https://bugzilla.suse.com/show_bug.cgi?id=1224740
* https://bugzilla.suse.com/show_bug.cgi?id=1224741
* https://bugzilla.suse.com/show_bug.cgi?id=1224742
* https://bugzilla.suse.com/show_bug.cgi?id=1224747
* https://bugzilla.suse.com/show_bug.cgi?id=1224749
* https://bugzilla.suse.com/show_bug.cgi?id=1224763
* https://bugzilla.suse.com/show_bug.cgi?id=1224764
* https://bugzilla.suse.com/show_bug.cgi?id=1224765
* https://bugzilla.suse.com/show_bug.cgi?id=1224766
* https://bugzilla.suse.com/show_bug.cgi?id=1224790
* https://bugzilla.suse.com/show_bug.cgi?id=1224792
* https://bugzilla.suse.com/show_bug.cgi?id=1224793
* https://bugzilla.suse.com/show_bug.cgi?id=1224803
* https://bugzilla.suse.com/show_bug.cgi?id=1224804
* https://bugzilla.suse.com/show_bug.cgi?id=1224866
* https://bugzilla.suse.com/show_bug.cgi?id=1224936
* https://bugzilla.suse.com/show_bug.cgi?id=1224989
* https://bugzilla.suse.com/show_bug.cgi?id=1225007
* https://bugzilla.suse.com/show_bug.cgi?id=1225053
* https://bugzilla.suse.com/show_bug.cgi?id=1225133
* https://bugzilla.suse.com/show_bug.cgi?id=1225134
* https://bugzilla.suse.com/show_bug.cgi?id=1225136
* https://bugzilla.suse.com/show_bug.cgi?id=1225172
* https://bugzilla.suse.com/show_bug.cgi?id=1225502
* https://bugzilla.suse.com/show_bug.cgi?id=1225578
* https://bugzilla.suse.com/show_bug.cgi?id=1225579
* https://bugzilla.suse.com/show_bug.cgi?id=1225580
* https://bugzilla.suse.com/show_bug.cgi?id=1225593
* https://bugzilla.suse.com/show_bug.cgi?id=1225605
* https://bugzilla.suse.com/show_bug.cgi?id=1225607
* https://bugzilla.suse.com/show_bug.cgi?id=1225610
* https://bugzilla.suse.com/show_bug.cgi?id=1225616
* https://bugzilla.suse.com/show_bug.cgi?id=1225618
* https://bugzilla.suse.com/show_bug.cgi?id=1225640
* https://bugzilla.suse.com/show_bug.cgi?id=1225642
* https://bugzilla.suse.com/show_bug.cgi?id=1225692
* https://bugzilla.suse.com/show_bug.cgi?id=1225694
* https://bugzilla.suse.com/show_bug.cgi?id=1225695
* https://bugzilla.suse.com/show_bug.cgi?id=1225696
* https://bugzilla.suse.com/show_bug.cgi?id=1225698
* https://bugzilla.suse.com/show_bug.cgi?id=1225699
* https://bugzilla.suse.com/show_bug.cgi?id=1225704
* https://bugzilla.suse.com/show_bug.cgi?id=1225705
* https://bugzilla.suse.com/show_bug.cgi?id=1225708
* https://bugzilla.suse.com/show_bug.cgi?id=1225710
* https://bugzilla.suse.com/show_bug.cgi?id=1225712
* https://bugzilla.suse.com/show_bug.cgi?id=1225714
* https://bugzilla.suse.com/show_bug.cgi?id=1225715
* https://bugzilla.suse.com/show_bug.cgi?id=1225720
* https://bugzilla.suse.com/show_bug.cgi?id=1225722
* https://bugzilla.suse.com/show_bug.cgi?id=1225728
* https://bugzilla.suse.com/show_bug.cgi?id=1225734
* https://bugzilla.suse.com/show_bug.cgi?id=1225735
* https://bugzilla.suse.com/show_bug.cgi?id=1225736
* https://bugzilla.suse.com/show_bug.cgi?id=1225747
* https://bugzilla.suse.com/show_bug.cgi?id=1225748
* https://bugzilla.suse.com/show_bug.cgi?id=1225749
* https://bugzilla.suse.com/show_bug.cgi?id=1225750
* https://bugzilla.suse.com/show_bug.cgi?id=1225756
* https://bugzilla.suse.com/show_bug.cgi?id=1225765
* https://bugzilla.suse.com/show_bug.cgi?id=1225766
* https://bugzilla.suse.com/show_bug.cgi?id=1225769
* https://bugzilla.suse.com/show_bug.cgi?id=1225773
* https://bugzilla.suse.com/show_bug.cgi?id=1225775
* https://bugzilla.suse.com/show_bug.cgi?id=1225842
* https://bugzilla.suse.com/show_bug.cgi?id=1225945
* https://jira.suse.com/browse/PED-3184
* https://jira.suse.com/browse/PED-3311
* https://jira.suse.com/browse/PED-3535
* https://jira.suse.com/browse/PED-4486
* https://jira.suse.com/browse/PED-4593
* https://jira.suse.com/browse/PED-5062
* https://jira.suse.com/browse/PED-542
* https://jira.suse.com/browse/PED-5728
* https://jira.suse.com/browse/PED-5853
* https://jira.suse.com/browse/PED-6079
* https://jira.suse.com/browse/PED-6252
* https://jira.suse.com/browse/PED-7542
* https://jira.suse.com/browse/PED-7619
* https://jira.suse.com/browse/PED-8111
* https://jira.suse.com/browse/PED-8240



SUSE-SU-2024:2137-1: moderate: Security update for podofo


# Security update for podofo

Announcement ID: SUSE-SU-2024:2137-1
Rating: moderate
References:

* bsc#1127514
* bsc#1127855
* bsc#1131544

Cross-References:

* CVE-2018-20797
* CVE-2019-10723
* CVE-2019-9199

CVSS scores:

* CVE-2018-20797 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2018-20797 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2019-10723 ( SUSE ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2019-10723 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2019-9199 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2019-9199 ( NVD ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.3
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6

An update that solves three vulnerabilities can now be installed.

## Description:

This update for podofo fixes the following issues:

* CVE-2019-9199: Fixed a NULL pointer dereference in podofoimpose
(bsc#1127855)
* CVE-2018-20797: Fixed an excessive memory allocation in PoDoFo:podofo_calloc
(bsc#1127514)
* CVE-2019-10723: Fixed a memory leak in PdfPagesTreeCache (bsc#1131544)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-2137=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2137=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-2137=1

* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2137=1

* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2137=1

## Package List:

* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* libpodofo0_9_6-debuginfo-0.9.6-150300.3.9.1
* libpodofo0_9_6-0.9.6-150300.3.9.1
* libpodofo-devel-0.9.6-150300.3.9.1
* podofo-0.9.6-150300.3.9.1
* podofo-debuginfo-0.9.6-150300.3.9.1
* podofo-debugsource-0.9.6-150300.3.9.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libpodofo0_9_6-debuginfo-0.9.6-150300.3.9.1
* libpodofo0_9_6-0.9.6-150300.3.9.1
* libpodofo-devel-0.9.6-150300.3.9.1
* podofo-0.9.6-150300.3.9.1
* podofo-debuginfo-0.9.6-150300.3.9.1
* podofo-debugsource-0.9.6-150300.3.9.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libpodofo0_9_6-debuginfo-0.9.6-150300.3.9.1
* libpodofo0_9_6-0.9.6-150300.3.9.1
* libpodofo-devel-0.9.6-150300.3.9.1
* podofo-0.9.6-150300.3.9.1
* podofo-debuginfo-0.9.6-150300.3.9.1
* podofo-debugsource-0.9.6-150300.3.9.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* libpodofo0_9_6-debuginfo-0.9.6-150300.3.9.1
* libpodofo0_9_6-0.9.6-150300.3.9.1
* libpodofo-devel-0.9.6-150300.3.9.1
* podofo-0.9.6-150300.3.9.1
* podofo-debuginfo-0.9.6-150300.3.9.1
* podofo-debugsource-0.9.6-150300.3.9.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* libpodofo0_9_6-debuginfo-0.9.6-150300.3.9.1
* libpodofo0_9_6-0.9.6-150300.3.9.1
* libpodofo-devel-0.9.6-150300.3.9.1
* podofo-0.9.6-150300.3.9.1
* podofo-debuginfo-0.9.6-150300.3.9.1
* podofo-debugsource-0.9.6-150300.3.9.1

## References:

* https://www.suse.com/security/cve/CVE-2018-20797.html
* https://www.suse.com/security/cve/CVE-2019-10723.html
* https://www.suse.com/security/cve/CVE-2019-9199.html
* https://bugzilla.suse.com/show_bug.cgi?id=1127514
* https://bugzilla.suse.com/show_bug.cgi?id=1127855
* https://bugzilla.suse.com/show_bug.cgi?id=1131544



SUSE-SU-2024:2138-1: moderate: Security update for python-cryptography


# Security update for python-cryptography

Announcement ID: SUSE-SU-2024:2138-1
Rating: moderate
References:

* bsc#1220210

Cross-References:

* CVE-2024-26130

CVSS scores:

* CVE-2024-26130 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.6
* Python 3 Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves one vulnerability can now be installed.

## Description:

This update for python-cryptography fixes the following issues:

* CVE-2024-26130: Fix a NULL pointer dereference in
pkcs12.serialize_key_and_certificates(). (bsc#1220210)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2138=1 openSUSE-SLE-15.6-2024-2138=1

* Python 3 Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-2138=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* python311-cryptography-41.0.3-150600.23.3.1
* Python 3 Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* python311-cryptography-41.0.3-150600.23.3.1

## References:

* https://www.suse.com/security/cve/CVE-2024-26130.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220210



SUSE-SU-2024:2106-1: important: Security update for php-composer2


# Security update for php-composer2

Announcement ID: SUSE-SU-2024:2106-1
Rating: important
References:

* bsc#1226181
* bsc#1226182

Cross-References:

* CVE-2024-35241
* CVE-2024-35242

CVSS scores:

* CVE-2024-35241 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-35242 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Server 4.3
* Web and Scripting Module 15-SP5

An update that solves two vulnerabilities can now be installed.

## Description:

This update for php-composer2 fixes the following issues:

* CVE-2024-35241: Fixed code execution when installing packages in repository
with specially crafted branch names (bsc#1226181).
* CVE-2024-35242: Fixed command injection via specially crafted branch names
during repository cloning (bsc#1226182).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2106=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2106=1

* Web and Scripting Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-2106=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2106=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2106=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2106=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2106=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2106=1

## Package List:

* openSUSE Leap 15.4 (noarch)
* php-composer2-2.2.3-150400.3.12.1
* openSUSE Leap 15.5 (noarch)
* php-composer2-2.2.3-150400.3.12.1
* Web and Scripting Module 15-SP5 (noarch)
* php-composer2-2.2.3-150400.3.12.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* php-composer2-2.2.3-150400.3.12.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* php-composer2-2.2.3-150400.3.12.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* php-composer2-2.2.3-150400.3.12.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* php-composer2-2.2.3-150400.3.12.1
* SUSE Manager Server 4.3 (noarch)
* php-composer2-2.2.3-150400.3.12.1

## References:

* https://www.suse.com/security/cve/CVE-2024-35241.html
* https://www.suse.com/security/cve/CVE-2024-35242.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226181
* https://bugzilla.suse.com/show_bug.cgi?id=1226182



SUSE-SU-2024:2107-1: important: Security update for php-composer2


# Security update for php-composer2

Announcement ID: SUSE-SU-2024:2107-1
Rating: important
References:

* bsc#1226181
* bsc#1226182

Cross-References:

* CVE-2024-35241
* CVE-2024-35242

CVSS scores:

* CVE-2024-35241 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-35242 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* Web and Scripting Module 15-SP6

An update that solves two vulnerabilities can now be installed.

## Description:

This update for php-composer2 fixes the following issues:

* CVE-2024-35241: Fixed code execution when installing packages in repository
with specially crafted branch names (bsc#1226181).
* CVE-2024-35242: Fixed command injection via specially crafted branch names
during repository cloning (bsc#1226182).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2107=1 openSUSE-SLE-15.6-2024-2107=1

* Web and Scripting Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2024-2107=1

## Package List:

* openSUSE Leap 15.6 (noarch)
* php-composer2-2.6.4-150600.3.3.1
* Web and Scripting Module 15-SP6 (noarch)
* php-composer2-2.6.4-150600.3.3.1

## References:

* https://www.suse.com/security/cve/CVE-2024-35241.html
* https://www.suse.com/security/cve/CVE-2024-35242.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226181
* https://bugzilla.suse.com/show_bug.cgi?id=1226182



SUSE-SU-2024:2102-1: moderate: Security update for opencc


# Security update for opencc

Announcement ID: SUSE-SU-2024:2102-1
Rating: moderate
References:

* bsc#1108310

Cross-References:

* CVE-2018-16982

CVSS scores:

* CVE-2018-16982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2018-16982 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2018-16982 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Affected Products:

* Desktop Applications Module 15-SP5
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves one vulnerability can now be installed.

## Description:

This update for opencc fixes the following issues:

* CVE-2018-16982: Check offset bounds in BinaryDict::NewFromFile method.
(bsc#1108310)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2102=1

* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-2102=1

* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2102=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* opencc-data-1.0.5-150000.5.3.1
* opencc-debuginfo-1.0.5-150000.5.3.1
* opencc-devel-1.0.5-150000.5.3.1
* libopencc2-1.0.5-150000.5.3.1
* libopencc2-debuginfo-1.0.5-150000.5.3.1
* opencc-1.0.5-150000.5.3.1
* opencc-debugsource-1.0.5-150000.5.3.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* opencc-data-1.0.5-150000.5.3.1
* opencc-debuginfo-1.0.5-150000.5.3.1
* opencc-devel-1.0.5-150000.5.3.1
* libopencc2-1.0.5-150000.5.3.1
* libopencc2-debuginfo-1.0.5-150000.5.3.1
* opencc-1.0.5-150000.5.3.1
* opencc-debugsource-1.0.5-150000.5.3.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libopencc2-1.0.5-150000.5.3.1
* opencc-debugsource-1.0.5-150000.5.3.1
* libopencc2-debuginfo-1.0.5-150000.5.3.1
* opencc-debuginfo-1.0.5-150000.5.3.1

## References:

* https://www.suse.com/security/cve/CVE-2018-16982.html
* https://bugzilla.suse.com/show_bug.cgi?id=1108310



SUSE-SU-2024:2088-1: important: Security update for openssl-3


# Security update for openssl-3

Announcement ID: SUSE-SU-2024:2088-1
Rating: important
References:

* bsc#1225551

Cross-References:

* CVE-2024-4741

CVSS scores:

* CVE-2024-4741 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves one vulnerability can now be installed.

## Description:

This update for openssl-3 fixes the following issues:

* CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2088=1

* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2088=1

* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2088=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2088=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2088=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2088=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2088=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2088=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2088=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2088=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2088=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2088=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2088=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-2088=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2088=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl-3-devel-3.0.8-150400.4.57.1
* openssl-3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-3.0.8-150400.4.57.1
* openSUSE Leap 15.4 (x86_64)
* libopenssl3-32bit-debuginfo-3.0.8-150400.4.57.1
* libopenssl-3-devel-32bit-3.0.8-150400.4.57.1
* libopenssl3-32bit-3.0.8-150400.4.57.1
* openSUSE Leap 15.4 (noarch)
* openssl-3-doc-3.0.8-150400.4.57.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libopenssl3-64bit-3.0.8-150400.4.57.1
* libopenssl-3-devel-64bit-3.0.8-150400.4.57.1
* libopenssl3-64bit-debuginfo-3.0.8-150400.4.57.1
* openSUSE Leap Micro 5.3 (aarch64 ppc64le s390x x86_64)
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* openSUSE Leap Micro 5.4 (aarch64 ppc64le s390x x86_64)
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl-3-devel-3.0.8-150400.4.57.1
* openssl-3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-3.0.8-150400.4.57.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl-3-devel-3.0.8-150400.4.57.1
* openssl-3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-3.0.8-150400.4.57.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl-3-devel-3.0.8-150400.4.57.1
* openssl-3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-3.0.8-150400.4.57.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl-3-devel-3.0.8-150400.4.57.1
* openssl-3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-3.0.8-150400.4.57.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl-3-devel-3.0.8-150400.4.57.1
* openssl-3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-3.0.8-150400.4.57.1
* SUSE Manager Proxy 4.3 (x86_64)
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl-3-devel-3.0.8-150400.4.57.1
* openssl-3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-3.0.8-150400.4.57.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl-3-devel-3.0.8-150400.4.57.1
* openssl-3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-3.0.8-150400.4.57.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* openssl-3-debugsource-3.0.8-150400.4.57.1
* libopenssl-3-devel-3.0.8-150400.4.57.1
* openssl-3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-debuginfo-3.0.8-150400.4.57.1
* libopenssl3-3.0.8-150400.4.57.1
* openssl-3-3.0.8-150400.4.57.1

## References:

* https://www.suse.com/security/cve/CVE-2024-4741.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225551



SUSE-SU-2024:2089-1: important: Security update for openssl-1_1


# Security update for openssl-1_1

Announcement ID: SUSE-SU-2024:2089-1
Rating: important
References:

* bsc#1225551

Cross-References:

* CVE-2024-4741

CVSS scores:

* CVE-2024-4741 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves one vulnerability can now be installed.

## Description:

This update for openssl-1_1 fixes the following issues:

* CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2089=1

* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2089=1

* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2089=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2089=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2089=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2089=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2089=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2089=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2089=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2089=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2089=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2089=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2089=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-2089=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2089=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* openSUSE Leap 15.4 (x86_64)
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1
* libopenssl1_1-32bit-1.1.1l-150400.7.69.1
* openSUSE Leap 15.4 (noarch)
* openssl-1_1-doc-1.1.1l-150400.7.69.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libopenssl-1_1-devel-64bit-1.1.1l-150400.7.69.1
* libopenssl1_1-64bit-1.1.1l-150400.7.69.1
* libopenssl1_1-64bit-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-64bit-1.1.1l-150400.7.69.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1
* libopenssl1_1-32bit-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1
* libopenssl1_1-32bit-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1
* libopenssl1_1-32bit-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1
* libopenssl1_1-32bit-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1
* libopenssl1_1-32bit-1.1.1l-150400.7.69.1
* SUSE Manager Proxy 4.3 (x86_64)
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1
* libopenssl1_1-32bit-1.1.1l-150400.7.69.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1
* libopenssl1_1-32bit-1.1.1l-150400.7.69.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libopenssl1_1-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-1.1.1l-150400.7.69.1
* openssl-1_1-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-1.1.1l-150400.7.69.1
* openssl-1_1-debugsource-1.1.1l-150400.7.69.1
* openssl-1_1-debuginfo-1.1.1l-150400.7.69.1
* SUSE Manager Server 4.3 (x86_64)
* libopenssl1_1-32bit-debuginfo-1.1.1l-150400.7.69.1
* libopenssl1_1-hmac-32bit-1.1.1l-150400.7.69.1
* libopenssl-1_1-devel-32bit-1.1.1l-150400.7.69.1
* libopenssl1_1-32bit-1.1.1l-150400.7.69.1

## References:

* https://www.suse.com/security/cve/CVE-2024-4741.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225551



SUSE-SU-2024:2090-1: important: Security update for podman


# Security update for podman

Announcement ID: SUSE-SU-2024:2090-1
Rating: important
References:

* bsc#1224122
* bsc#1226136

Cross-References:

* CVE-2024-24786
* CVE-2024-3727

CVSS scores:

* CVE-2024-24786 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-3727 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4

An update that solves two vulnerabilities can now be installed.

## Description:

This update for podman fixes the following issues:

* Update to version 4.9.5
* CVE-2024-3727: Fixed a flaw that allowed attackers to trigger unexpected
authenticated registry accesses on behalf of a victim user, causing resource
exhaustion, local path traversal, and other attacks. (bsc#1224122)
* CVE-2024-24786: Fixed an infinite loop in protojson. (bsc#1226136)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2090=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2090=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2090=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2090=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2090=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2090=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2090=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2090=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2090=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2090=1

* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2090=1

## Package List:

* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* podman-4.9.5-150400.4.27.1
* podman-debuginfo-4.9.5-150400.4.27.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* podman-4.9.5-150400.4.27.1
* podman-debuginfo-4.9.5-150400.4.27.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* podman-4.9.5-150400.4.27.1
* podman-debuginfo-4.9.5-150400.4.27.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* podman-4.9.5-150400.4.27.1
* podman-debuginfo-4.9.5-150400.4.27.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* podman-4.9.5-150400.4.27.1
* podman-debuginfo-4.9.5-150400.4.27.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* podman-remote-4.9.5-150400.4.27.1
* podman-4.9.5-150400.4.27.1
* podman-remote-debuginfo-4.9.5-150400.4.27.1
* podman-debuginfo-4.9.5-150400.4.27.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* podman-docker-4.9.5-150400.4.27.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* podman-remote-4.9.5-150400.4.27.1
* podman-4.9.5-150400.4.27.1
* podman-remote-debuginfo-4.9.5-150400.4.27.1
* podman-debuginfo-4.9.5-150400.4.27.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* podman-docker-4.9.5-150400.4.27.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* podman-remote-4.9.5-150400.4.27.1
* podman-4.9.5-150400.4.27.1
* podman-remote-debuginfo-4.9.5-150400.4.27.1
* podman-debuginfo-4.9.5-150400.4.27.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* podman-docker-4.9.5-150400.4.27.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* podman-remote-4.9.5-150400.4.27.1
* podman-4.9.5-150400.4.27.1
* podman-remote-debuginfo-4.9.5-150400.4.27.1
* podman-debuginfo-4.9.5-150400.4.27.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* podman-docker-4.9.5-150400.4.27.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* podman-4.9.5-150400.4.27.1
* podman-debuginfo-4.9.5-150400.4.27.1
* podman-remote-4.9.5-150400.4.27.1
* podman-remote-debuginfo-4.9.5-150400.4.27.1
* podmansh-4.9.5-150400.4.27.1
* openSUSE Leap 15.4 (noarch)
* podman-docker-4.9.5-150400.4.27.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* podman-4.9.5-150400.4.27.1
* podman-debuginfo-4.9.5-150400.4.27.1

## References:

* https://www.suse.com/security/cve/CVE-2024-24786.html
* https://www.suse.com/security/cve/CVE-2024-3727.html
* https://bugzilla.suse.com/show_bug.cgi?id=1224122
* https://bugzilla.suse.com/show_bug.cgi?id=1226136



SUSE-SU-2024:2077-1: important: Security update for gdk-pixbuf


# Security update for gdk-pixbuf

Announcement ID: SUSE-SU-2024:2077-1
Rating: important
References:

* bsc#1195391
* bsc#1219276
* bsc#1223903

Cross-References:

* CVE-2022-48622

CVSS scores:

* CVE-2022-48622 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-48622 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:

* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves one vulnerability and has two security fixes can now be
installed.

## Description:

This update for gdk-pixbuf fixes the following issues:

gdk-pixbuf was updated to version 2.42.12:

* Security issues fixed:

* CVE-2022-48622: Fixed heap memory corruption on gdk-pixbuf (bsc#1219276)

* Changes in version 2.42.12:

* ani: Reject files with multiple INA or IART chunks,

* ani: validate chunk size,
* Updated translations.

* Enable other image loaders such as xpm and xbm (bsc#1223903)

* Changes in version 2.42.11:

* Disable fringe loaders by default.

* Introspection fixes.
* Updated translations.

* Changes in version 2.42.10:

* Search for rst2man.py.

* Update the memory size limit for JPEG images.
* Updated translations.

* Fixed loading of larger images

* Avoid Bash specific syntax in baselibs postscript (bsc#1195391)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2077=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2077=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2077=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-2077=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2077=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2077=1

* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2077=1

* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2077=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2077=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2077=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2077=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2077=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2077=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-2077=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2077=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2077=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2077=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2077=1

## Package List:

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* gdk-pixbuf-devel-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.9.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* gdk-pixbuf-devel-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1
* SUSE Manager Proxy 4.3 (x86_64)
* gdk-pixbuf-devel-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* SUSE Manager Proxy 4.3 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.9.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* gdk-pixbuf-devel-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.9.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* gdk-pixbuf-devel-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* SUSE Manager Server 4.3 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.9.1
* SUSE Manager Server 4.3 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* gdk-pixbuf-devel-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* openSUSE Leap 15.4 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-32bit-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-32bit-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1
* openSUSE Leap 15.4 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.9.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* gdk-pixbuf-query-loaders-64bit-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-64bit-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-64bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-64bit-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-64bit-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-64bit-debuginfo-2.42.12-150400.5.9.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* gdk-pixbuf-devel-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* openSUSE Leap 15.5 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-32bit-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-32bit-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1
* openSUSE Leap 15.5 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.9.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* gdk-pixbuf-devel-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* Basesystem Module 15-SP5 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.9.1
* Basesystem Module 15-SP5 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* gdk-pixbuf-devel-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* gdk-pixbuf-devel-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* gdk-pixbuf-devel-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-debugsource-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150400.5.9.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150400.5.9.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* gdk-pixbuf-lang-2.42.12-150400.5.9.1

## References:

* https://www.suse.com/security/cve/CVE-2022-48622.html
* https://bugzilla.suse.com/show_bug.cgi?id=1195391
* https://bugzilla.suse.com/show_bug.cgi?id=1219276
* https://bugzilla.suse.com/show_bug.cgi?id=1223903



SUSE-SU-2024:2083-1: important: Security update for libarchive


# Security update for libarchive

Announcement ID: SUSE-SU-2024:2083-1
Rating: important
References:

* bsc#1225971
* bsc#1225972

Cross-References:

* CVE-2024-20696
* CVE-2024-20697

CVSS scores:

* CVE-2024-20696 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-20697 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Affected Products:

* Basesystem Module 15-SP6
* Development Tools Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves two vulnerabilities can now be installed.

## Description:

This update for libarchive fixes the following issues:

* CVE-2024-20697: Fixed Out of bounds Remote Code Execution Vulnerability
(bsc#1225972).
* CVE-2024-20696: Fixed heap based out-of-bounds write (bsc#1225971).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2083=1 openSUSE-SLE-15.6-2024-2083=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2083=1

* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-2083=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* bsdtar-debuginfo-3.7.2-150600.3.3.1
* libarchive13-debuginfo-3.7.2-150600.3.3.1
* libarchive-devel-3.7.2-150600.3.3.1
* libarchive-debugsource-3.7.2-150600.3.3.1
* libarchive13-3.7.2-150600.3.3.1
* bsdtar-3.7.2-150600.3.3.1
* openSUSE Leap 15.6 (x86_64)
* libarchive13-32bit-3.7.2-150600.3.3.1
* libarchive13-32bit-debuginfo-3.7.2-150600.3.3.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libarchive13-64bit-3.7.2-150600.3.3.1
* libarchive13-64bit-debuginfo-3.7.2-150600.3.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libarchive-devel-3.7.2-150600.3.3.1
* libarchive13-debuginfo-3.7.2-150600.3.3.1
* libarchive-debugsource-3.7.2-150600.3.3.1
* libarchive13-3.7.2-150600.3.3.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* bsdtar-debuginfo-3.7.2-150600.3.3.1
* libarchive-debugsource-3.7.2-150600.3.3.1
* bsdtar-3.7.2-150600.3.3.1

## References:

* https://www.suse.com/security/cve/CVE-2024-20696.html
* https://www.suse.com/security/cve/CVE-2024-20697.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225971
* https://bugzilla.suse.com/show_bug.cgi?id=1225972



SUSE-SU-2024:2076-1: important: Security update for gdk-pixbuf


# Security update for gdk-pixbuf

Announcement ID: SUSE-SU-2024:2076-1
Rating: important
References:

* bsc#1195391
* bsc#1219276
* bsc#1223903

Cross-References:

* CVE-2022-48622

CVSS scores:

* CVE-2022-48622 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-48622 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:

* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves one vulnerability and has two security fixes can now be
installed.

## Description:

This update for gdk-pixbuf fixes the following issues:

gdk-pixbuf was updated to version 2.42.12:

* Security issues fixed:

* CVE-2022-48622: Fixed vulnerability where a crafted .ani file could allow an
attacker to overwrite heap metadata, leading to a denial of service or code
execution attack to a denial of service or code execution attack
(bsc#1219276)

* Changes in version 2.42.12:

* ani: Reject files with multiple INA or IART chunks,

* ani: validate chunk size,
* Updated translations.

* Enable other image loaders such as xpm and xbm (bsc#1223903)

* Changes in version 2.42.11:

* Disable fringe loaders by default.

* Introspection fixes.
* Updated translations.

* Changes in version 2.42.10:

* Search for rst2man.py.

* Update the memory size limit for JPEG images.
* Updated translations.

* Fixed loading of larger images

* Avoid Bash specific syntax in baselibs postscript (bsc#1195391)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2076=1 openSUSE-SLE-15.6-2024-2076=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2076=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* gdk-pixbuf-devel-2.42.12-150600.3.3.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150600.3.3.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150600.3.3.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150600.3.3.1
* libgdk_pixbuf-2_0-0-2.42.12-150600.3.3.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150600.3.3.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150600.3.3.1
* gdk-pixbuf-thumbnailer-2.42.12-150600.3.3.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150600.3.3.1
* gdk-pixbuf-query-loaders-2.42.12-150600.3.3.1
* gdk-pixbuf-debugsource-2.42.12-150600.3.3.1
* openSUSE Leap 15.6 (x86_64)
* gdk-pixbuf-devel-32bit-debuginfo-2.42.12-150600.3.3.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150600.3.3.1
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150600.3.3.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150600.3.3.1
* gdk-pixbuf-devel-32bit-2.42.12-150600.3.3.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150600.3.3.1
* openSUSE Leap 15.6 (noarch)
* gdk-pixbuf-lang-2.42.12-150600.3.3.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* gdk-pixbuf-devel-64bit-2.42.12-150600.3.3.1
* libgdk_pixbuf-2_0-0-64bit-2.42.12-150600.3.3.1
* gdk-pixbuf-query-loaders-64bit-2.42.12-150600.3.3.1
* gdk-pixbuf-query-loaders-64bit-debuginfo-2.42.12-150600.3.3.1
* libgdk_pixbuf-2_0-0-64bit-debuginfo-2.42.12-150600.3.3.1
* gdk-pixbuf-devel-64bit-debuginfo-2.42.12-150600.3.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* gdk-pixbuf-devel-2.42.12-150600.3.3.1
* gdk-pixbuf-query-loaders-debuginfo-2.42.12-150600.3.3.1
* typelib-1_0-GdkPixbuf-2_0-2.42.12-150600.3.3.1
* gdk-pixbuf-devel-debuginfo-2.42.12-150600.3.3.1
* libgdk_pixbuf-2_0-0-2.42.12-150600.3.3.1
* libgdk_pixbuf-2_0-0-debuginfo-2.42.12-150600.3.3.1
* gdk-pixbuf-thumbnailer-debuginfo-2.42.12-150600.3.3.1
* gdk-pixbuf-thumbnailer-2.42.12-150600.3.3.1
* typelib-1_0-GdkPixdata-2_0-2.42.12-150600.3.3.1
* gdk-pixbuf-query-loaders-2.42.12-150600.3.3.1
* gdk-pixbuf-debugsource-2.42.12-150600.3.3.1
* Basesystem Module 15-SP6 (noarch)
* gdk-pixbuf-lang-2.42.12-150600.3.3.1
* Basesystem Module 15-SP6 (x86_64)
* libgdk_pixbuf-2_0-0-32bit-debuginfo-2.42.12-150600.3.3.1
* gdk-pixbuf-query-loaders-32bit-debuginfo-2.42.12-150600.3.3.1
* libgdk_pixbuf-2_0-0-32bit-2.42.12-150600.3.3.1
* gdk-pixbuf-query-loaders-32bit-2.42.12-150600.3.3.1

## References:

* https://www.suse.com/security/cve/CVE-2022-48622.html
* https://bugzilla.suse.com/show_bug.cgi?id=1195391
* https://bugzilla.suse.com/show_bug.cgi?id=1219276
* https://bugzilla.suse.com/show_bug.cgi?id=1223903