SUSE 5185 Published by

The following security updates are available for openSUSE and SUSE Linux Enterprise:

SUSE-SU-2024:2020-1: important: Security update for openssl-3
SUSE-SU-2024:2005-1: important: Security update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed
SUSE-SU-2024:2008-1: important: Security update for the Linux Kernel
SUSE-SU-2024:2003-1: important: Security update for cups
SUSE-SU-2024:1980-1: low: Security update for poppler
SUSE-SU-2024:1982-1: important: Security update for bind
SUSE-SU-2024:1984-1: moderate: Security update for aws-nitro-enclaves-cli
SUSE-SU-2024:1985-1: moderate: Security update for mariadb
SUSE-SU-2024:1990-1: important: Security update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed
SUSE-SU-2024:1974-1: moderate: Security update for rmt-server




SUSE-SU-2024:2020-1: important: Security update for openssl-3


# Security update for openssl-3

Announcement ID: SUSE-SU-2024:2020-1
Rating: important
References:

* bsc#1225551

Cross-References:

* CVE-2024-4741

CVSS scores:

* CVE-2024-4741 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves one vulnerability can now be installed.

## Description:

This update for openssl-3 fixes the following issues:

* CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-2020=1 openSUSE-SLE-15.5-2024-2020=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2020=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libopenssl3-3.0.8-150500.5.36.1
* libopenssl-3-devel-3.0.8-150500.5.36.1
* openssl-3-debuginfo-3.0.8-150500.5.36.1
* openssl-3-debugsource-3.0.8-150500.5.36.1
* libopenssl3-debuginfo-3.0.8-150500.5.36.1
* openssl-3-3.0.8-150500.5.36.1
* openSUSE Leap 15.5 (x86_64)
* libopenssl-3-devel-32bit-3.0.8-150500.5.36.1
* libopenssl3-32bit-3.0.8-150500.5.36.1
* libopenssl3-32bit-debuginfo-3.0.8-150500.5.36.1
* openSUSE Leap 15.5 (noarch)
* openssl-3-doc-3.0.8-150500.5.36.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libopenssl3-64bit-debuginfo-3.0.8-150500.5.36.1
* libopenssl-3-devel-64bit-3.0.8-150500.5.36.1
* libopenssl3-64bit-3.0.8-150500.5.36.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libopenssl3-3.0.8-150500.5.36.1
* libopenssl-3-devel-3.0.8-150500.5.36.1
* openssl-3-debuginfo-3.0.8-150500.5.36.1
* openssl-3-debugsource-3.0.8-150500.5.36.1
* libopenssl3-debuginfo-3.0.8-150500.5.36.1
* openssl-3-3.0.8-150500.5.36.1

## References:

* https://www.suse.com/security/cve/CVE-2024-4741.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225551



SUSE-SU-2024:2005-1: important: Security update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed


# Security update for kernel-firmware-nvidia-gspx-G06, nvidia-open-
driver-G06-signed

Announcement ID: SUSE-SU-2024:2005-1
Rating: important
References:

* bsc#1223356

Cross-References:

* CVE-2024-0090
* CVE-2024-0091
* CVE-2024-0092

CVSS scores:

* CVE-2024-0090 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-0091 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-0092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves three vulnerabilities can now be installed.

## Description:

This update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed
fixes the following issues:

Security Update 550.90.07:

* CVE-2024-0090: Fixed out of bounds write (bsc#1223356).
* CVE-2024-0092: Fixed incorrect exception handling (bsc#1223356).
* CVE-2024-0091: Fixed untrusted pointer dereference (bsc#1223356).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2005=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2005=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2005=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2005=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2005=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2005=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2005=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2005=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2005=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2005=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2005=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-2005=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2005=1

## Package List:

* openSUSE Leap 15.4 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1
* openSUSE Leap 15.4 (x86_64)
* nvidia-open-driver-G06-signed-azure-devel-550.90.07-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-azure-debuginfo-550.90.07_k5.14.21_150400.14.75-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150400.14.75-150400.9.62.1
* openSUSE Leap 15.4 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1
* openSUSE Leap 15.4 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1
* SUSE Manager Proxy 4.3 (nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1
* SUSE Manager Proxy 4.3 (x86_64)
* nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1
* SUSE Manager Retail Branch Server 4.3 (nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1
* SUSE Manager Server 4.3 (nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1
* SUSE Manager Server 4.3 (x86_64)
* nvidia-open-driver-G06-signed-debugsource-550.90.07-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150400.24.119-150400.9.62.1
* nvidia-open-driver-G06-signed-default-devel-550.90.07-150400.9.62.1

## References:

* https://www.suse.com/security/cve/CVE-2024-0090.html
* https://www.suse.com/security/cve/CVE-2024-0091.html
* https://www.suse.com/security/cve/CVE-2024-0092.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223356



SUSE-SU-2024:2008-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:2008-1
Rating: important
References:

* bsc#1065729
* bsc#1141539
* bsc#1174585
* bsc#1181674
* bsc#1187716
* bsc#1190569
* bsc#1191949
* bsc#1192107
* bsc#1193983
* bsc#1194288
* bsc#1194869
* bsc#1196956
* bsc#1197915
* bsc#1200465
* bsc#1205205
* bsc#1207284
* bsc#1207361
* bsc#1207948
* bsc#1208149
* bsc#1209657
* bsc#1209799
* bsc#1209834
* bsc#1209980
* bsc#1210335
* bsc#1213863
* bsc#1214852
* bsc#1215322
* bsc#1215702
* bsc#1216358
* bsc#1216702
* bsc#1217169
* bsc#1217339
* bsc#1217515
* bsc#1218447
* bsc#1220021
* bsc#1220267
* bsc#1220363
* bsc#1220783
* bsc#1221044
* bsc#1221081
* bsc#1221615
* bsc#1221777
* bsc#1221816
* bsc#1221829
* bsc#1222011
* bsc#1222374
* bsc#1222385
* bsc#1222413
* bsc#1222464
* bsc#1222513
* bsc#1222559
* bsc#1222561
* bsc#1222608
* bsc#1222619
* bsc#1222627
* bsc#1222721
* bsc#1222765
* bsc#1222770
* bsc#1222783
* bsc#1222793
* bsc#1222838
* bsc#1222870
* bsc#1222893
* bsc#1222960
* bsc#1222961
* bsc#1222974
* bsc#1222975
* bsc#1222976
* bsc#1223011
* bsc#1223023
* bsc#1223027
* bsc#1223031
* bsc#1223043
* bsc#1223046
* bsc#1223048
* bsc#1223049
* bsc#1223084
* bsc#1223113
* bsc#1223119
* bsc#1223137
* bsc#1223138
* bsc#1223140
* bsc#1223188
* bsc#1223203
* bsc#1223207
* bsc#1223315
* bsc#1223360
* bsc#1223384
* bsc#1223390
* bsc#1223432
* bsc#1223489
* bsc#1223505
* bsc#1223532
* bsc#1223575
* bsc#1223595
* bsc#1223626
* bsc#1223627
* bsc#1223628
* bsc#1223631
* bsc#1223633
* bsc#1223638
* bsc#1223650
* bsc#1223653
* bsc#1223666
* bsc#1223670
* bsc#1223671
* bsc#1223675
* bsc#1223677
* bsc#1223678
* bsc#1223679
* bsc#1223698
* bsc#1223712
* bsc#1223715
* bsc#1223717
* bsc#1223718
* bsc#1223737
* bsc#1223738
* bsc#1223741
* bsc#1223744
* bsc#1223747
* bsc#1223748
* bsc#1223750
* bsc#1223752
* bsc#1223754
* bsc#1223756
* bsc#1223757
* bsc#1223762
* bsc#1223769
* bsc#1223770
* bsc#1223779
* bsc#1223780
* bsc#1223781
* bsc#1223788
* bsc#1223802
* bsc#1223819
* bsc#1223823
* bsc#1223826
* bsc#1223828
* bsc#1223829
* bsc#1223837
* bsc#1223842
* bsc#1223843
* bsc#1223844
* bsc#1223847
* bsc#1223858
* bsc#1223875
* bsc#1223879
* bsc#1223895
* bsc#1223959
* bsc#1223961
* bsc#1223991
* bsc#1223996
* bsc#1224020
* bsc#1224076
* bsc#1224096
* bsc#1224098
* bsc#1224099
* bsc#1224137
* bsc#1224166
* bsc#1224174
* bsc#1224177
* bsc#1224180
* bsc#1224181
* bsc#1224187
* bsc#1224331
* bsc#1224346
* bsc#1224423
* bsc#1224432
* bsc#1224437
* bsc#1224438
* bsc#1224442
* bsc#1224443
* bsc#1224445
* bsc#1224449
* bsc#1224479
* bsc#1224482
* bsc#1224487
* bsc#1224488
* bsc#1224492
* bsc#1224494
* bsc#1224495
* bsc#1224502
* bsc#1224508
* bsc#1224509
* bsc#1224511
* bsc#1224519
* bsc#1224524
* bsc#1224525
* bsc#1224530
* bsc#1224531
* bsc#1224534
* bsc#1224535
* bsc#1224537
* bsc#1224541
* bsc#1224543
* bsc#1224549
* bsc#1224550
* bsc#1224558
* bsc#1224559
* bsc#1224566
* bsc#1224567
* bsc#1224571
* bsc#1224575
* bsc#1224576
* bsc#1224579
* bsc#1224580
* bsc#1224581
* bsc#1224582
* bsc#1224586
* bsc#1224587
* bsc#1224592
* bsc#1224598
* bsc#1224601
* bsc#1224607
* bsc#1224608
* bsc#1224611
* bsc#1224615
* bsc#1224617
* bsc#1224618
* bsc#1224621
* bsc#1224622
* bsc#1224624
* bsc#1224627
* bsc#1224628
* bsc#1224629
* bsc#1224632
* bsc#1224636
* bsc#1224637
* bsc#1224638
* bsc#1224640
* bsc#1224643
* bsc#1224644
* bsc#1224645
* bsc#1224647
* bsc#1224648
* bsc#1224649
* bsc#1224650
* bsc#1224651
* bsc#1224657
* bsc#1224659
* bsc#1224660
* bsc#1224663
* bsc#1224664
* bsc#1224665
* bsc#1224666
* bsc#1224667
* bsc#1224668
* bsc#1224671
* bsc#1224672
* bsc#1224676
* bsc#1224678
* bsc#1224679
* bsc#1224680
* bsc#1224681
* bsc#1224682
* bsc#1224685
* bsc#1224686
* bsc#1224692
* bsc#1224697
* bsc#1224699
* bsc#1224701
* bsc#1224703
* bsc#1224705
* bsc#1224707
* bsc#1224717
* bsc#1224718
* bsc#1224721
* bsc#1224722
* bsc#1224723
* bsc#1224725
* bsc#1224727
* bsc#1224728
* bsc#1224729
* bsc#1224730
* bsc#1224731
* bsc#1224732
* bsc#1224733
* bsc#1224736
* bsc#1224738
* bsc#1224739
* bsc#1224740
* bsc#1224747
* bsc#1224749
* bsc#1224759
* bsc#1224763
* bsc#1224764
* bsc#1224765
* bsc#1224766
* bsc#1224794
* bsc#1224795
* bsc#1224796
* bsc#1224803
* bsc#1224816
* bsc#1224895
* bsc#1224898
* bsc#1224900
* bsc#1224901
* bsc#1224902
* bsc#1224903
* bsc#1224904
* bsc#1224905
* bsc#1224907
* bsc#1224909
* bsc#1224910
* bsc#1224911
* bsc#1224912
* bsc#1224913
* bsc#1224914
* bsc#1224915
* bsc#1224920
* bsc#1224928
* bsc#1224929
* bsc#1224930
* bsc#1224931
* bsc#1224932
* bsc#1224936
* bsc#1224937
* bsc#1224941
* bsc#1224942
* bsc#1224944
* bsc#1224945
* bsc#1224947
* bsc#1224956
* bsc#1224988
* bsc#1224992
* bsc#1225000
* bsc#1225003
* bsc#1225005
* bsc#1225008
* bsc#1225009
* bsc#1225022
* bsc#1225031
* bsc#1225032
* bsc#1225036
* bsc#1225041
* bsc#1225044
* bsc#1225053
* bsc#1225076
* bsc#1225077
* bsc#1225082
* bsc#1225085
* bsc#1225086
* bsc#1225092
* bsc#1225095
* bsc#1225096
* bsc#1225097
* bsc#1225106
* bsc#1225108
* bsc#1225109
* bsc#1225114
* bsc#1225118
* bsc#1225121
* bsc#1225122
* bsc#1225123
* bsc#1225125
* bsc#1225126
* bsc#1225127
* bsc#1225129
* bsc#1225131
* bsc#1225132
* bsc#1225138
* bsc#1225139
* bsc#1225145
* bsc#1225151
* bsc#1225153
* bsc#1225156
* bsc#1225158
* bsc#1225160
* bsc#1225161
* bsc#1225164
* bsc#1225167
* bsc#1225180
* bsc#1225183
* bsc#1225184
* bsc#1225186
* bsc#1225187
* bsc#1225189
* bsc#1225190
* bsc#1225191
* bsc#1225192
* bsc#1225193
* bsc#1225195
* bsc#1225198
* bsc#1225201
* bsc#1225203
* bsc#1225205
* bsc#1225206
* bsc#1225207
* bsc#1225208
* bsc#1225209
* bsc#1225210
* bsc#1225214
* bsc#1225222
* bsc#1225223
* bsc#1225224
* bsc#1225225
* bsc#1225227
* bsc#1225228
* bsc#1225229
* bsc#1225230
* bsc#1225232
* bsc#1225233
* bsc#1225235
* bsc#1225236
* bsc#1225237
* bsc#1225238
* bsc#1225239
* bsc#1225240
* bsc#1225241
* bsc#1225242
* bsc#1225243
* bsc#1225244
* bsc#1225245
* bsc#1225246
* bsc#1225247
* bsc#1225248
* bsc#1225249
* bsc#1225250
* bsc#1225251
* bsc#1225252
* bsc#1225253
* bsc#1225254
* bsc#1225255
* bsc#1225256
* bsc#1225257
* bsc#1225258
* bsc#1225259
* bsc#1225260
* bsc#1225261
* bsc#1225262
* bsc#1225263
* bsc#1225268
* bsc#1225301
* bsc#1225303
* bsc#1225304
* bsc#1225306
* bsc#1225316
* bsc#1225318
* bsc#1225320
* bsc#1225321
* bsc#1225322
* bsc#1225323
* bsc#1225326
* bsc#1225327
* bsc#1225328
* bsc#1225329
* bsc#1225330
* bsc#1225331
* bsc#1225332
* bsc#1225333
* bsc#1225334
* bsc#1225335
* bsc#1225336
* bsc#1225337
* bsc#1225338
* bsc#1225339
* bsc#1225341
* bsc#1225342
* bsc#1225344
* bsc#1225346
* bsc#1225347
* bsc#1225351
* bsc#1225353
* bsc#1225354
* bsc#1225355
* bsc#1225357
* bsc#1225358
* bsc#1225360
* bsc#1225361
* bsc#1225366
* bsc#1225367
* bsc#1225368
* bsc#1225369
* bsc#1225370
* bsc#1225372
* bsc#1225373
* bsc#1225374
* bsc#1225375
* bsc#1225376
* bsc#1225377
* bsc#1225379
* bsc#1225380
* bsc#1225382
* bsc#1225383
* bsc#1225384
* bsc#1225386
* bsc#1225387
* bsc#1225388
* bsc#1225390
* bsc#1225392
* bsc#1225393
* bsc#1225396
* bsc#1225400
* bsc#1225404
* bsc#1225405
* bsc#1225408
* bsc#1225409
* bsc#1225410
* bsc#1225411
* bsc#1225424
* bsc#1225425
* bsc#1225427
* bsc#1225431
* bsc#1225435
* bsc#1225436
* bsc#1225437
* bsc#1225438
* bsc#1225439
* bsc#1225441
* bsc#1225442
* bsc#1225443
* bsc#1225444
* bsc#1225445
* bsc#1225446
* bsc#1225447
* bsc#1225450
* bsc#1225453
* bsc#1225455
* bsc#1225461
* bsc#1225463
* bsc#1225464
* bsc#1225466
* bsc#1225467
* bsc#1225468
* bsc#1225471
* bsc#1225472
* bsc#1225478
* bsc#1225479
* bsc#1225480
* bsc#1225482
* bsc#1225483
* bsc#1225486
* bsc#1225488
* bsc#1225490
* bsc#1225492
* bsc#1225495
* bsc#1225499
* bsc#1225500
* bsc#1225501
* bsc#1225502
* bsc#1225506
* bsc#1225508
* bsc#1225510
* bsc#1225513
* bsc#1225515
* bsc#1225529
* bsc#1225530
* bsc#1225532
* bsc#1225534
* bsc#1225535
* bsc#1225548
* bsc#1225549
* bsc#1225550
* bsc#1225553
* bsc#1225554
* bsc#1225555
* bsc#1225556
* bsc#1225557
* bsc#1225559
* bsc#1225560
* bsc#1225565
* bsc#1225566
* bsc#1225568
* bsc#1225569
* bsc#1225570
* bsc#1225571
* bsc#1225572
* bsc#1225577
* bsc#1225583
* bsc#1225584
* bsc#1225587
* bsc#1225588
* bsc#1225589
* bsc#1225590
* bsc#1225591
* bsc#1225592
* bsc#1225593
* bsc#1225595
* bsc#1225599
* bsc#1225616
* bsc#1225640
* bsc#1225642
* bsc#1225705
* bsc#1225708
* bsc#1225715
* bsc#1225720
* bsc#1225722
* bsc#1225734
* bsc#1225735
* bsc#1225747
* bsc#1225748
* bsc#1225756
* bsc#1225761
* bsc#1225766
* bsc#1225775
* bsc#1225810
* bsc#1225820
* bsc#1225829
* bsc#1225835
* bsc#1225842
* jsc#PED-3259
* jsc#PED-7167

Cross-References:

* CVE-2020-36788
* CVE-2021-39698
* CVE-2021-4148
* CVE-2021-42327
* CVE-2021-43056
* CVE-2021-47200
* CVE-2021-47358
* CVE-2021-47359
* CVE-2021-47360
* CVE-2021-47361
* CVE-2021-47362
* CVE-2021-47363
* CVE-2021-47364
* CVE-2021-47365
* CVE-2021-47366
* CVE-2021-47367
* CVE-2021-47368
* CVE-2021-47369
* CVE-2021-47370
* CVE-2021-47371
* CVE-2021-47372
* CVE-2021-47373
* CVE-2021-47374
* CVE-2021-47375
* CVE-2021-47376
* CVE-2021-47378
* CVE-2021-47379
* CVE-2021-47380
* CVE-2021-47381
* CVE-2021-47382
* CVE-2021-47383
* CVE-2021-47384
* CVE-2021-47385
* CVE-2021-47386
* CVE-2021-47387
* CVE-2021-47388
* CVE-2021-47389
* CVE-2021-47390
* CVE-2021-47391
* CVE-2021-47392
* CVE-2021-47393
* CVE-2021-47394
* CVE-2021-47395
* CVE-2021-47396
* CVE-2021-47397
* CVE-2021-47398
* CVE-2021-47399
* CVE-2021-47400
* CVE-2021-47401
* CVE-2021-47402
* CVE-2021-47403
* CVE-2021-47404
* CVE-2021-47405
* CVE-2021-47406
* CVE-2021-47407
* CVE-2021-47408
* CVE-2021-47409
* CVE-2021-47410
* CVE-2021-47412
* CVE-2021-47413
* CVE-2021-47414
* CVE-2021-47415
* CVE-2021-47416
* CVE-2021-47417
* CVE-2021-47418
* CVE-2021-47419
* CVE-2021-47420
* CVE-2021-47421
* CVE-2021-47422
* CVE-2021-47423
* CVE-2021-47424
* CVE-2021-47425
* CVE-2021-47426
* CVE-2021-47427
* CVE-2021-47428
* CVE-2021-47429
* CVE-2021-47430
* CVE-2021-47431
* CVE-2021-47433
* CVE-2021-47434
* CVE-2021-47435
* CVE-2021-47436
* CVE-2021-47437
* CVE-2021-47438
* CVE-2021-47439
* CVE-2021-47440
* CVE-2021-47441
* CVE-2021-47442
* CVE-2021-47443
* CVE-2021-47444
* CVE-2021-47445
* CVE-2021-47446
* CVE-2021-47447
* CVE-2021-47448
* CVE-2021-47449
* CVE-2021-47450
* CVE-2021-47451
* CVE-2021-47452
* CVE-2021-47453
* CVE-2021-47454
* CVE-2021-47455
* CVE-2021-47456
* CVE-2021-47457
* CVE-2021-47458
* CVE-2021-47459
* CVE-2021-47460
* CVE-2021-47461
* CVE-2021-47462
* CVE-2021-47463
* CVE-2021-47464
* CVE-2021-47465
* CVE-2021-47466
* CVE-2021-47467
* CVE-2021-47468
* CVE-2021-47469
* CVE-2021-47470
* CVE-2021-47471
* CVE-2021-47472
* CVE-2021-47473
* CVE-2021-47474
* CVE-2021-47475
* CVE-2021-47476
* CVE-2021-47477
* CVE-2021-47478
* CVE-2021-47479
* CVE-2021-47480
* CVE-2021-47481
* CVE-2021-47482
* CVE-2021-47483
* CVE-2021-47484
* CVE-2021-47485
* CVE-2021-47486
* CVE-2021-47488
* CVE-2021-47489
* CVE-2021-47490
* CVE-2021-47491
* CVE-2021-47492
* CVE-2021-47493
* CVE-2021-47494
* CVE-2021-47495
* CVE-2021-47496
* CVE-2021-47497
* CVE-2021-47498
* CVE-2021-47499
* CVE-2021-47500
* CVE-2021-47501
* CVE-2021-47502
* CVE-2021-47503
* CVE-2021-47504
* CVE-2021-47505
* CVE-2021-47506
* CVE-2021-47507
* CVE-2021-47508
* CVE-2021-47509
* CVE-2021-47510
* CVE-2021-47511
* CVE-2021-47512
* CVE-2021-47513
* CVE-2021-47514
* CVE-2021-47516
* CVE-2021-47518
* CVE-2021-47520
* CVE-2021-47521
* CVE-2021-47522
* CVE-2021-47523
* CVE-2021-47524
* CVE-2021-47525
* CVE-2021-47526
* CVE-2021-47527
* CVE-2021-47528
* CVE-2021-47529
* CVE-2021-47530
* CVE-2021-47531
* CVE-2021-47532
* CVE-2021-47533
* CVE-2021-47534
* CVE-2021-47535
* CVE-2021-47536
* CVE-2021-47537
* CVE-2021-47540
* CVE-2021-47541
* CVE-2021-47542
* CVE-2021-47544
* CVE-2021-47548
* CVE-2021-47549
* CVE-2021-47550
* CVE-2021-47551
* CVE-2021-47552
* CVE-2021-47553
* CVE-2021-47554
* CVE-2021-47555
* CVE-2021-47556
* CVE-2021-47557
* CVE-2021-47558
* CVE-2021-47559
* CVE-2021-47560
* CVE-2021-47562
* CVE-2021-47563
* CVE-2021-47564
* CVE-2021-47565
* CVE-2021-47569
* CVE-2022-48633
* CVE-2022-48662
* CVE-2022-48669
* CVE-2022-48689
* CVE-2022-48691
* CVE-2022-48699
* CVE-2022-48705
* CVE-2022-48708
* CVE-2022-48709
* CVE-2022-48710
* CVE-2023-0160
* CVE-2023-1829
* CVE-2023-42755
* CVE-2023-47233
* CVE-2023-52586
* CVE-2023-52591
* CVE-2023-52618
* CVE-2023-52642
* CVE-2023-52643
* CVE-2023-52644
* CVE-2023-52646
* CVE-2023-52650
* CVE-2023-52653
* CVE-2023-52654
* CVE-2023-52655
* CVE-2023-52656
* CVE-2023-52657
* CVE-2023-52659
* CVE-2023-52660
* CVE-2023-52661
* CVE-2023-52662
* CVE-2023-52664
* CVE-2023-52669
* CVE-2023-52671
* CVE-2023-52674
* CVE-2023-52676
* CVE-2023-52678
* CVE-2023-52679
* CVE-2023-52680
* CVE-2023-52683
* CVE-2023-52685
* CVE-2023-52686
* CVE-2023-52690
* CVE-2023-52691
* CVE-2023-52692
* CVE-2023-52693
* CVE-2023-52694
* CVE-2023-52696
* CVE-2023-52698
* CVE-2023-52699
* CVE-2023-52702
* CVE-2023-52703
* CVE-2023-52705
* CVE-2023-52707
* CVE-2023-52708
* CVE-2023-52730
* CVE-2023-52731
* CVE-2023-52732
* CVE-2023-52733
* CVE-2023-52736
* CVE-2023-52738
* CVE-2023-52739
* CVE-2023-52740
* CVE-2023-52741
* CVE-2023-52742
* CVE-2023-52743
* CVE-2023-52744
* CVE-2023-52745
* CVE-2023-52746
* CVE-2023-52747
* CVE-2023-52753
* CVE-2023-52754
* CVE-2023-52756
* CVE-2023-52757
* CVE-2023-52759
* CVE-2023-52763
* CVE-2023-52764
* CVE-2023-52766
* CVE-2023-52773
* CVE-2023-52774
* CVE-2023-52777
* CVE-2023-52781
* CVE-2023-52788
* CVE-2023-52789
* CVE-2023-52791
* CVE-2023-52795
* CVE-2023-52796
* CVE-2023-52798
* CVE-2023-52799
* CVE-2023-52800
* CVE-2023-52803
* CVE-2023-52804
* CVE-2023-52805
* CVE-2023-52806
* CVE-2023-52807
* CVE-2023-52808
* CVE-2023-52809
* CVE-2023-52810
* CVE-2023-52811
* CVE-2023-52814
* CVE-2023-52815
* CVE-2023-52816
* CVE-2023-52817
* CVE-2023-52818
* CVE-2023-52819
* CVE-2023-52821
* CVE-2023-52825
* CVE-2023-52826
* CVE-2023-52832
* CVE-2023-52833
* CVE-2023-52834
* CVE-2023-52838
* CVE-2023-52840
* CVE-2023-52841
* CVE-2023-52844
* CVE-2023-52847
* CVE-2023-52851
* CVE-2023-52853
* CVE-2023-52854
* CVE-2023-52855
* CVE-2023-52856
* CVE-2023-52858
* CVE-2023-52860
* CVE-2023-52861
* CVE-2023-52864
* CVE-2023-52865
* CVE-2023-52867
* CVE-2023-52868
* CVE-2023-52870
* CVE-2023-52871
* CVE-2023-52872
* CVE-2023-52873
* CVE-2023-52875
* CVE-2023-52876
* CVE-2023-52877
* CVE-2023-52878
* CVE-2023-52880
* CVE-2023-6531
* CVE-2024-2201
* CVE-2024-26597
* CVE-2024-26643
* CVE-2024-26679
* CVE-2024-26692
* CVE-2024-26698
* CVE-2024-26700
* CVE-2024-26715
* CVE-2024-26739
* CVE-2024-26742
* CVE-2024-26748
* CVE-2024-26758
* CVE-2024-26764
* CVE-2024-26775
* CVE-2024-26777
* CVE-2024-26778
* CVE-2024-26788
* CVE-2024-26791
* CVE-2024-26801
* CVE-2024-26822
* CVE-2024-26828
* CVE-2024-26829
* CVE-2024-26838
* CVE-2024-26839
* CVE-2024-26840
* CVE-2024-26846
* CVE-2024-26859
* CVE-2024-26870
* CVE-2024-26874
* CVE-2024-26876
* CVE-2024-26877
* CVE-2024-26880
* CVE-2024-26889
* CVE-2024-26894
* CVE-2024-26900
* CVE-2024-26907
* CVE-2024-26915
* CVE-2024-26916
* CVE-2024-26919
* CVE-2024-26920
* CVE-2024-26921
* CVE-2024-26922
* CVE-2024-26925
* CVE-2024-26928
* CVE-2024-26929
* CVE-2024-26930
* CVE-2024-26931
* CVE-2024-26933
* CVE-2024-26934
* CVE-2024-269355
* CVE-2024-26937
* CVE-2024-26938
* CVE-2024-26939
* CVE-2024-26940
* CVE-2024-26943
* CVE-2024-26957
* CVE-2024-26958
* CVE-2024-26964
* CVE-2024-26974
* CVE-2024-26977
* CVE-2024-26979
* CVE-2024-26984
* CVE-2024-26988
* CVE-2024-26989
* CVE-2024-26994
* CVE-2024-26996
* CVE-2024-26997
* CVE-2024-26999
* CVE-2024-27000
* CVE-2024-27001
* CVE-2024-27004
* CVE-2024-27008
* CVE-2024-27028
* CVE-2024-27037
* CVE-2024-27042
* CVE-2024-27045
* CVE-2024-27047
* CVE-2024-27051
* CVE-2024-27052
* CVE-2024-27053
* CVE-2024-27054
* CVE-2024-27059
* CVE-2024-27072
* CVE-2024-27073
* CVE-2024-27074
* CVE-2024-27075
* CVE-2024-27076
* CVE-2024-27077
* CVE-2024-27078
* CVE-2024-27388
* CVE-2024-27393
* CVE-2024-27395
* CVE-2024-27396
* CVE-2024-27398
* CVE-2024-27399
* CVE-2024-27400
* CVE-2024-27401
* CVE-2024-27405
* CVE-2024-27410
* CVE-2024-27412
* CVE-2024-27413
* CVE-2024-27416
* CVE-2024-27417
* CVE-2024-27419
* CVE-2024-27431
* CVE-2024-27435
* CVE-2024-27436
* CVE-2024-35789
* CVE-2024-35791
* CVE-2024-35796
* CVE-2024-35799
* CVE-2024-35801
* CVE-2024-35804
* CVE-2024-35806
* CVE-2024-35809
* CVE-2024-35811
* CVE-2024-35812
* CVE-2024-35813
* CVE-2024-35815
* CVE-2024-35817
* CVE-2024-35821
* CVE-2024-35822
* CVE-2024-35823
* CVE-2024-35825
* CVE-2024-35828
* CVE-2024-35829
* CVE-2024-35830
* CVE-2024-35833
* CVE-2024-35845
* CVE-2024-35847
* CVE-2024-35849
* CVE-2024-35851
* CVE-2024-35852
* CVE-2024-35854
* CVE-2024-35860
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35863
* CVE-2024-35864
* CVE-2024-35865
* CVE-2024-35866
* CVE-2024-35867
* CVE-2024-35868
* CVE-2024-35869
* CVE-2024-35870
* CVE-2024-35872
* CVE-2024-35875
* CVE-2024-35877
* CVE-2024-35878
* CVE-2024-35879
* CVE-2024-35885
* CVE-2024-35887
* CVE-2024-35895
* CVE-2024-35901
* CVE-2024-35904
* CVE-2024-35905
* CVE-2024-35907
* CVE-2024-35912
* CVE-2024-35914
* CVE-2024-35915
* CVE-2024-35922
* CVE-2024-35924
* CVE-2024-35930
* CVE-2024-35932
* CVE-2024-35933
* CVE-2024-35935
* CVE-2024-35936
* CVE-2024-35938
* CVE-2024-35939
* CVE-2024-35940
* CVE-2024-35943
* CVE-2024-35944
* CVE-2024-35947
* CVE-2024-35950
* CVE-2024-35951
* CVE-2024-35952
* CVE-2024-35955
* CVE-2024-35959
* CVE-2024-35963
* CVE-2024-35964
* CVE-2024-35965
* CVE-2024-35966
* CVE-2024-35967
* CVE-2024-35969
* CVE-2024-35973
* CVE-2024-35976
* CVE-2024-35978
* CVE-2024-35982
* CVE-2024-35984
* CVE-2024-35989
* CVE-2024-35990
* CVE-2024-35998
* CVE-2024-35999
* CVE-2024-36006
* CVE-2024-36007
* CVE-2024-36012
* CVE-2024-36014
* CVE-2024-36015
* CVE-2024-36016
* CVE-2024-36026
* CVE-2024-36029
* CVE-2024-36032
* CVE-2024-36880
* CVE-2024-36893
* CVE-2024-36896
* CVE-2024-36897
* CVE-2024-36906
* CVE-2024-36918
* CVE-2024-36924
* CVE-2024-36926
* CVE-2024-36928
* CVE-2024-36931
* CVE-2024-36938
* CVE-2024-36940
* CVE-2024-36941
* CVE-2024-36942
* CVE-2024-36944
* CVE-2024-36947
* CVE-2024-36950
* CVE-2024-36952
* CVE-2024-36955
* CVE-2024-36959

CVSS scores:

* CVE-2020-36788 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-39698 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-39698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-4148 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-4148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-42327 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-42327 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-43056 ( SUSE ): 6.8 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2021-43056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47358 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47359 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47361 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-47362 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47363 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47364 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47365 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47366 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2021-47367 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47368 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47369 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47370 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47371 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47372 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47373 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47374 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47375 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47379 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47380 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47382 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47387 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47388 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47389 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2021-47390 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47392 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47394 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47398 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47401 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47404 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47405 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47407 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47408 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47413 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47414 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47415 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47418 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47420 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47421 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47423 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47426 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47427 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47428 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47429 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47430 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2021-47434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47439 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47440 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47447 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47448 ( SUSE ): 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2021-47449 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47450 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47452 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47453 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47454 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47455 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47461 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47462 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47465 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47466 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47467 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2021-47468 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47469 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47470 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47471 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47472 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47473 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47474 ( SUSE ): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47475 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47476 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47477 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2021-47478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47479 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47480 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47481 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47482 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47488 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47489 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47490 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47491 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47492 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47496 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47497 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47499 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47502 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2021-47503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47504 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47505 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47506 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47508 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47510 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47512 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47513 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47513 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47514 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47516 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47518 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47518 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47520 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47520 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47521 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47521 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47522 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47523 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47524 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47525 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47525 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47526 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47526 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47528 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47528 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47529 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47529 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47530 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47531 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47532 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47533 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47534 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47535 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2021-47536 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2021-47537 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47537 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47540 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47540 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47541 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47544 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2021-47548 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
* CVE-2021-47549 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47550 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47550 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47552 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47553 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47554 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47555 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47556 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47559 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47565 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47569 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48689 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48691 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48708 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48709 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-42755 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2023-42755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52586 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52618 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-52642 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52644 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52656 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52661 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2023-52662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2023-52664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52671 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52702 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52703 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-52705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52707 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52730 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52731 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52738 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52739 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52743 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52744 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52745 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52746 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-52747 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52756 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-52757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52773 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52777 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52781 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52795 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52798 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52803 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52804 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52805 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52807 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52815 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52818 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52819 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52825 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52834 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52838 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52840 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52847 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52853 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52856 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52860 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52861 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52865 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52867 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52868 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52870 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52871 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-52872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52875 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52876 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-2201 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26597 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-26597 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-26643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26700 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26715 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26839 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26840 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26846 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26877 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26880 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26907 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-26907 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26933 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26938 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26939 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26940 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26979 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26988 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26989 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26996 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27000 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27004 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27008 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-27028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-27045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-27047 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27051 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-27052 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27053 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27401 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-27405 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27419 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-27431 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35789 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-35791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35809 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35822 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-35823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-35851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35869 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35875 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-35877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-35930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35938 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-35939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-35940 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35943 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35944 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-35947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35998 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35999 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-36006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36012 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36016 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36032 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-36880 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L
* CVE-2024-36893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36906 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-36918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36924 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36928 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36931 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L
* CVE-2024-36938 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36940 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-36941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36942 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-36944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36947 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-36950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36952 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36955 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36959 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Real Time Module 15-SP5

An update that solves 561 vulnerabilities, contains two features and has 39
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

* CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)
* CVE-2022-48689: Fixed data-race in lru_add_fn (bsc#1223959)
* CVE-2022-48691: Fixed memory leak in netfilter (bsc#1223961)
* CVE-2023-1829: Fixed a use-after-free vulnerability in the control index
filter (tcindex) (bsc#1210335).
* CVE-2023-42755: Check user supplied offsets (bsc#1215702).
* CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081).
* CVE-2023-52618: Fixed string overflow in block/rnbd-srv (bsc#1221615).
* CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187).
* CVE-2023-52660: Fiedx IRQ handling due to shared interrupts (bsc#1224443).
* CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).
* CVE-2023-52671: Fixed hang/underflow when transitioning to ODM4:1
(bsc#1224729).
* CVE-2023-52674: Add clamp() in scarlett2_mixer_ctl_put() (bsc#1224727).
* CVE-2023-52680: Fixed missing error checks to *_ctl_get() (bsc#1224608).
* CVE-2023-52692: Fixed missing error check to scarlett2_usb_set_config()
(bsc#1224628).
* CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass()
(CVE-2023-52698 bsc#1224621)
* CVE-2023-52746: Prevent potential spectre v1 gadget in xfrm_xlate32_attr()
(bsc#1225114)
* CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548).
* CVE-2023-52795: Fixed use after free in vhost_vdpa_probe() (bsc#1225085).
* CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
* CVE-2023-52807: Fixed out-of-bounds access may occur when coalesce info is
read via debugfs (bsc#1225097).
* CVE-2023-52860: Fixed null pointer dereference in hisi_hns3 (bsc#1224936).
* CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
* CVE-2024-26643: Fixed mark set as dead when unbinding anonymous set with
timeout (bsc#1221829).
* CVE-2024-26679: Fixed read sk->sk_family once in inet_recv_error()
(bsc#1222385).
* CVE-2024-26692: Fixed regression in writes when non-standard maximum write
size negotiated (bsc#1222464).
* CVE-2024-26715: Fixed NULL pointer dereference in dwc3_gadget_suspend
(bsc#1222561).
* CVE-2024-26742: Fixed disable_managed_interrupts (git-fixes bsc#1222608).
* CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).
* CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)
* CVE-2024-26822: Set correct id, uid and cruid for multiuser automounts
(bsc#1223011).
* CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
* CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119).
* CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046).
* CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)
* CVE-2024-26919: Fixed debugfs directory leak (bsc#1223847).
* CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
* CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path
(bsc#1223390).
* CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show()
(bsc#1223532).
* CVE-2024-26939: Fixed UAF on destroy against retire race (bsc#1223679).
* CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).
* CVE-2024-27042: Fixed potential out-of-bounds access in
'amdgpu_discovery_reg_base_init()' (bsc#1223823).
* CVE-2024-27395: Fixed Use-After-Free in ovs_ct_exit (bsc#1224098).
* CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1224174).
* CVE-2024-27401: Fixed user_length taken into account when fetching packet
contents (bsc#1224181).
* CVE-2024-27417: Fixed potential "struct net" leak in inet6_rtm_getaddr()
(bsc#1224721)
* CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759)
* CVE-2024-27431: Fixed Zero-initialise xdp_rxq_info struct before running XDP
program (bsc#1224718).
* CVE-2024-35791: Flush pages under kvm->lock to fix UAF in
svm_register_enc_region() (bsc#1224725).
* CVE-2024-35799: Prevent crash when disable stream (bsc#1224740).
* CVE-2024-35804: Mark target gfn of emulated atomic instruction as dirty
(bsc#1224638).
* CVE-2024-35852: Fixed memory leak when canceling rehash work (bsc#1224502).
* CVE-2024-35854: Fixed possible use-after-free during rehash (bsc#1224636).
* CVE-2024-35860: struct bpf_link and bpf_link_ops kABI workaround
(bsc#1224531).
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1224766).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1224764).
* CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break()
(bsc#1224763).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1224765).
* CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break()
(bsc#1224668).
* CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key() (bsc#1224667).
* CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664).
* CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write()
(bsc#1224678).
* CVE-2024-35869: Guarantee refcounted children from parent session
(bsc#1224679).
* CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224672).
* CVE-2024-35872: Fixed GUP-fast succeeding on secretmem folios (bsc#1224530).
* CVE-2024-35875: Require seeding RNG with RDRAND on CoCo systems
(bsc#1224665).
* CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
* CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf()
(bsc#1224671).
* CVE-2024-35879: kABI workaround for drivers/of/dynamic.c (bsc#1224524).
* CVE-2024-35885: Stop interface during shutdown (bsc#1224519).
* CVE-2024-35904: Fixed dereference of garbage after mount failure
(bsc#1224494).
* CVE-2024-35905: Fixed int overflow for stack access size (bsc#1224488).
* CVE-2024-35907: Call request_irq() after NAPI initialized (bsc#1224492).
* CVE-2024-35924: Limit read size on v1.2 (bsc#1224657).
* CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure
(bsc#1224535).
* CVE-2024-35943: Fixed a null pointer dereference in omap_prm_domain_init
(bsc#1224649).
* CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host()
(bsc#1224648).
* CVE-2024-35951: Fixed the error path in panfrost_mmu_map_fault_addr()
(bsc#1224701).
* CVE-2024-35959: Fixed mlx5e_priv_init() cleanup flow (bsc#1224666).
* CVE-2024-35964: Fixed not validating setsockopt user input (bsc#1224581).
* CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and
ipv6_del_addr (bsc#1224580).
* CVE-2024-35973: Fixed header validation in geneve[6]_xmit_skb (bsc#1224586).
* CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING
(bsc#1224575).
* CVE-2024-35998: Fixed lock ordering potential deadlock in
cifs_sync_mid_result (bsc#1224549).
* CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550).
* CVE-2024-36006: Fixed incorrect list API usage (bsc#1224541).
* CVE-2024-36007: Fixed warning during rehash (bsc#1224543).
* CVE-2024-36938: Fixed NULL pointer dereference in
sk_psock_skb_ingress_enqueue (bsc#1225761).

The following non-security bugs were fixed:

* 9p: explicitly deny setlease attempts (git-fixes).
* ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes).
* ACPI: disable -Wstringop-truncation (git-fixes).
* ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes).
* ACPI: LPSS: Advertise number of chip selects via property (git-fixes).
* admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET
(git-fixes).
* af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress
(bsc#1223384).
* af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
* af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
* ALSA: core: Fix NULL module pointer assignment at card init (git-fixes).
* ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes).
* ALSA: line6: Zero-initialize message buffers (stable-fixes).
* ARM: 9381/1: kasan: clear stale stack poison (git-fixes).
* ASoC: Intel: avs: Fix ASRC module initialization (git-fixes).
* ASoC: Intel: avs: Fix potential integer overflow (git-fixes).
* ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes).
* ASoC: Intel: Disable route checks for Skylake boards (git-fixes).
* ASoC: kirkwood: Fix potential NULL dereference (git-fixes).
* ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes).
* ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes).
* ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes).
* ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes).
* ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).
* ata: pata_legacy: make legacy_exit() work again (git-fixes).
* ata: sata_gemini: Check clk_enable() result (stable-fixes).
* autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166).
* Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes).
* Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor()
(git-fixes).
* Bluetooth: hci_sync: Do not double print name in add/remove adv_monitor
(bsc#1216358).
* Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes).
* Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes).
* Bluetooth: qca: add missing firmware sanity checks (git-fixes).
* Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes).
* Bluetooth: qca: fix firmware check error path (git-fixes).
* Bluetooth: qca: fix info leak when fetching fw build id (git-fixes).
* Bluetooth: qca: fix NVM configuration parsing (git-fixes).
* bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git-
fixes)
* bpf: decouple prune and jump points (bsc#1225756).
* bpf: fix precision backtracking instruction iteration (bsc#1225756).
* bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes).
* bpf: handle ldimm64 properly in check_cfg() (bsc#1225756).
* bpf: mostly decouple jump history management from is_state_visited()
(bsc#1225756).
* bpf: remove unnecessary prune and jump points (bsc#1225756).
* btrfs: add error messages to all unrecognized mount options (git-fixes)
* btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes)
* btrfs: export: handle invalid inode or root reference in btrfs_get_parent()
(git-fixes)
* btrfs: extend locking to all space_info members accesses (git-fixes)
* btrfs: fix btrfs_submit_compressed_write cgroup attribution (git-fixes)
* btrfs: fix fallocate to use file_modified to update permissions consistently
(git-fixes)
* btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes)
* btrfs: fix missing blkdev_put() call in btrfs_scan_one_device() (git-fixes)
* btrfs: fix off-by-one chunk length calculation at contains_pending_extent()
(git-fixes)
* btrfs: fix qgroup reserve overflow the qgroup limit (git-fixes)
* btrfs: fix silent failure when deleting root reference (git-fixes)
* btrfs: fix use-after-free after failure to create a snapshot (git-fixes)
* btrfs: free exchange changeset on failures (git-fixes)
* btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git-
fixes)
* btrfs: make search_csum_tree return 0 if we get -EFBIG (git-fixes)
* btrfs: prevent copying too big compressed lzo segment (git-fixes)
* btrfs: remove BUG_ON(!eie) in find_parent_nodes (git-fixes)
* btrfs: remove BUG_ON() in find_parent_nodes() (git-fixes)
* btrfs: repair super block num_devices automatically (git-fixes)
* btrfs: replace the BUG_ON in btrfs_del_root_ref with proper error handling
(git-fixes)
* btrfs: send: ensure send_fd is writable (git-fixes)
* btrfs: send: handle path ref underflow in header iterate_inode_ref() (git-
fixes)
* btrfs: send: in case of IO error log it (git-fixes)
* btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes)
* btrfs: tree-checker: check item_size for dev_item (git-fixes)
* btrfs: tree-checker: check item_size for inode_item (git-fixes)
* cifs: account for primary channel in the interface list (bsc#1224020).
* cifs: cifs_chan_is_iface_active should be called with chan_lock held
(bsc#1224020).
* cifs: distribute channels across interfaces based on speed (bsc#1224020).
* cifs: do not pass cifs_sb when trying to add channels (bsc#1224020).
* cifs: failure to add channel on iface should bump up weight (git-fixes,
bsc#1224020).
* cifs: fix charset issue in reconnection (bsc#1224020).
* cifs: fix leak of iface for primary channel (git-fixes, bsc#1224020).
* cifs: handle cases where a channel is closed (bsc#1224020).
* cifs: handle cases where multiple sessions share connection (bsc#1224020).
* cifs: reconnect work should have reference on server struct (bsc#1224020).
* clk: Do not hold prepare_lock when calling kref_put() (stable-fixes).
* clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes).
* counter: stm32-lptimer-cnt: Provide defines for clock polarities (git-
fixes).
* counter: stm32-timer-cnt: Provide defines for slave mode selection (git-
fixes).
* cppc_cpufreq: Fix possible null pointer dereference (git-fixes).
* cpu/hotplug: Remove the 'cpu' member of cpuhp_cpu_state (git-fixes).
* cpumask: Add for_each_cpu_from() (bsc#1225053).
* crypto: bcm - Fix pointer arithmetic (git-fixes).
* crypto: ccp - drop platform ifdef checks (git-fixes).
* crypto: ecdsa - Fix module auto-load on add-key (git-fixes).
* crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes).
* crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes).
* crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes).
* dmaengine: axi-dmac: fix possible race in remove() (git-fixes).
* dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes).
* dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11
users (git-fixes).
* dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575).
* docs: kernel_include.py: Cope with docutils 0.21 (stable-fixes).
* drivers/nvme: Add quirks for device 126f:2262 (git-fixes).
* drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes).
* drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes).
* drm/amd/display: Fix potential index out of bounds in color transformation
function (git-fixes).
* drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes).
* drm/amd: Flush GFXOFF requests in prepare stage (git-fixes).
* drm/amdgpu: Refine IB schedule error logging (stable-fixes).
* drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git-
fixes).
* drm/arm/malidp: fix a possible null pointer dereference (git-fixes).
* drm/bridge: anx7625: Do not log an error when DSI host can't be found (git-
fixes).
* drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git-
fixes).
* drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: icn6211: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: lt9611: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: tc358775: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes).
* drm/connector: Add \n to message about demoting connector force-probes (git-
fixes).
* drm/i915/bios: Fix parsing backlight BDB data (git-fixes).
* drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes).
* drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes).
* drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes).
* drm/meson: dw-hdmi: power up phy on device init (git-fixes).
* drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes).
* drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes).
* drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes).
* drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk
(git-fixes).
* drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes).
* drm/panel: atna33xc20: Fix unbalanced regulator in the case HPD does not
assert (git-fixes).
* drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found
(git-fixes).
* drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector
(git-fixes).
* drm: vc4: Fix possible null pointer dereference (git-fixes).
* dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes)
* dyndbg: fix old BUG_ON in >control parser (stable-fixes).
* efi: libstub: only free priv.runtime_map when allocated (git-fixes).
* extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes).
* fail_function: fix wrong use of fei_attr_remove().
* fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes).
* fbdev: shmobile: fix snprintf truncation (git-fixes).
* fbdev: sisfb: hide unused variables (git-fixes).
* firewire: ohci: mask bus reset interrupts between ISR and bottom half
(stable-fixes).
* firmware: dmi-id: add a release callback function (git-fixes).
* firmware: raspberrypi: Use correct device for DMA mappings (git-fixes).
* fs/9p: drop inodes immediately on non-.L too (git-fixes).
* fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes).
* fs/9p: translate O_TRUNC into OTRUNC (git-fixes).
* gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes).
* gpio: wcove: Use -ENOTSUPP consistently (stable-fixes).
* gpu: host1x: Do not setup DMA for virtual devices (stable-fixes).
* HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes).
* hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock (git-
fixes).
* hwmon: (corsair-cpro) Use a separate buffer for sending commands (git-
fixes).
* hwmon: (corsair-cpro) Use complete_all() instead of complete() in
ccp_raw_event() (git-fixes).
* hwmon: (lm70) fix links in doc and comments (git-fixes).
* hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes).
* i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame
(git-fixes).
* i3c: master: svc: fix invalidate IBI type and miss call client IBI handler
(git-fixes).
* IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes)
* idpf: extend tx watchdog timeout (bsc#1224137).
* iio: core: Leave private pointer NULL when no private data supplied (git-
fixes).
* iio: pressure: dps310: support negative temperature values (git-fixes).
* Input: cyapa - add missing input core locking to suspend/resume functions
(git-fixes).
* Input: ims-pcu - fix printf string overflow (git-fixes).
* Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes).
* iomap: Fix inline extent handling in iomap_readpage (git-fixes)
* iomap: iomap: fix memory corruption when recording errors during writeback
(git-fixes)
* iomap: Support partial direct I/O on user copy failures (git-fixes)
* iommu/dma: Force swiotlb_max_mapping_size on an untrusted device
(bsc#1224331)
* io_uring/unix: drop usage of io_uring socket (git-fixes).
* irqchip/gic-v3-its: Prevent double free on error (git-fixes).
* jffs2: prevent xattr node from overflowing the eraseblock (git-fixes).
* kABI: bpf: struct bpf_insn_aux_data kABI workaround (bsc#1225756).
* kcm: do not sense pfmemalloc status in kcm_sendpage() (git-fixes
bsc#1223959)
* KEYS: trusted: Do not use WARN when encode fails (git-fixes).
* KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes).
* KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes
bsc#1224794).
* KVM: x86: Delete duplicate documentation for KVM_X86_SET_MSR_FILTER (git-
fixes).
* leds: pwm: Disable PWM when going to suspend (git-fixes).
* libsubcmd: Fix parse-options memory leak (git-fixes).
* locking/atomic: Make test_and_*_bit() ordered on failure (git-fixes).
* media: atomisp: ssh_css: Fix a null-pointer dereference in
load_video_binaries (git-fixes).
* media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes).
* media: mc: mark the media devnode as registered from the, start (git-fixes).
* media: ngene: Add dvb_ca_en50221_init return value check (git-fixes).
* media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes).
* mei: me: add lunar lake point M DID (stable-fixes).
* mfd: intel-lpss: Revert "Add missing check for platform_get_resource" (git-
fixes).
* mfd: ti_am335x_tscadc: Support the correctly spelled DT property (git-
fixes).
* mfd: tqmx86: Specify IO port register range more precisely (git-fixes).
* mlxbf_gige: Enable the GigE port in mlxbf_gige_open (git-fixes).
* mlxbf_gige: Fix intermittent no ip issue (git-fixes).
* mlxbf_gige: stop PHY during open() error paths (git-fixes).
* mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes).
* mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes).
* mtd: core: Report error if first mtd_otp_size() call fails in
mtd_otp_nvmem_add() (git-fixes).
* mtd: rawnand: hynix: fixed typo (git-fixes).
* net: do not sense pfmemalloc status in skb_append_pagefrags() (git-fixes
bsc#1223959)
* netfilter: nf_tables: bail out early if hardware offload is not supported
(git-fixes bsc#1223961)
* net: introduce __skb_fill_page_desc_noacc (git-fixes bsc#1223959)
* net: nfc: remove inappropriate attrs check (stable-fixes).
* net: qualcomm: rmnet: fix global oob in rmnet_policy (git-fixes).
* net: usb: ax88179_178a: fix link status when link is set to down/up (git-
fixes).
* net:usb:qmi_wwan: support Rolling modules (stable-fixes).
* net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).
* net: usb: sr9700: stop lying about skb->truesize (git-fixes).
* net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete()
(bsc#1223360).
* nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git-
fixes).
* nfc: nci: Fix uninit-value in nci_rx_work (git-fixes).
* nilfs2: fix out-of-range warning (git-fixes).
* nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes).
* nilfs2: fix use-after-free of timer for log writer thread (git-fixes).
* nilfs2: make superblock data array index computation sparse friendly (git-
fixes).
* nvme: ensure disabling pairs with unquiesce (bsc#1224534).
* nvme: fix miss command type check (git-fixes).
* nvme: fix multipath batched completion accounting (git-fixes).
* nvme-multipath: fix io accounting on failover (git-fixes).
* nvmet: fix ns enable/disable possible hang (git-fixes).
* PCI: dwc: Detect iATU settings after getting "addr_space" resource (git-
fixes).
* PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host
(git-fixes).
* PCI: dwc: Use the bitmap API to allocate bitmaps (git-fixes).
* PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes).
* PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes).
* PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes).
* PCI: tegra194: Fix probe path for Endpoint mode (git-fixes).
* pinctrl: armada-37xx: remove an unused variable (git-fixes).
* pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes).
* pinctrl: core: handle radix_tree_insert() errors in
pinctrl_register_one_pin() (stable-fixes).
* pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes).
* pinctrl/meson: fix typo in PDM's pin name (git-fixes).
* pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git-
fixes).
* platform/x86/intel-uncore-freq: Do not present root domain on error (git-
fixes).
* platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git-
fixes).
* powerpc/eeh: Permanently disable the removed device (bsc#1223991
ltc#205740).
* powerpc/eeh: Small refactor of eeh_handle_normal_event() (bsc#1223991
ltc#205740).
* powerpc/eeh: Use a goto for recovery failures (bsc#1223991 ltc#205740).
* powerpc/powernv: Add a null pointer check in opal_event_init()
(bsc#1065729).
* powerpc/pseries/lparcfg: drop error message from guest name lookup
(bsc#1187716 ltc#193451 git-fixes).
* powerpc/pseries/vio: Do not return ENODEV if node or compatible missing
(bsc#1220783).
* powerpc/uaccess: Fix build errors seen with GCC 13/14 (bsc#1194869).
* powerpc/uaccess: Use YZ asm constraint for ld (bsc#1194869).
* power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes).
* ppdev: Add an error check in register_device (git-fixes).
* printk: Update @console_may_schedule in console_trylock_spinning()
(bsc#1225616).
* qibfs: fix dentry leak (git-fixes)
* RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git-
fixes)
* RDMA/hns: Fix deadlock on SRQ async events. (git-fixes)
* RDMA/hns: Fix GMV table pagesize (git-fixes)
* RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes)
* RDMA/hns: Fix UAF for cq async event (git-fixes)
* RDMA/hns: Modify the print level of CQE error (git-fixes)
* RDMA/hns: Use complete parentheses in macros (git-fixes)
* RDMA/IPoIB: Fix format truncation compilation errors (git-fixes)
* RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes)
* RDMA/mlx5: Fix port number for counter query in multi-port configuration
(git-fixes)
* RDMA/rxe: Add ibdev_dbg macros for rxe (git-fixes)
* RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes)
* RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes)
* RDMA/rxe: Fix the problem "mutex_destroy missing" (git-fixes)
* RDMA/rxe: Replace pr_xxx by rxe_dbg_xxx in rxe_net.c (git-fixes)
* RDMA/rxe: Split rxe_run_task() into two subroutines (git-fixes)
* regulator: bd71828: Do not overwrite runtime voltages (git-fixes).
* regulator: core: fix debugfs creation regression (git-fixes).
* regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes).
* remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes).
* Rename colliding patches before origin/cve/linux-5.14-LTSS -> SLE15-SP5
merge
* Revert "cifs: reconnect work should have reference on server struct" (git-
fixes, bsc#1224020).
* Revert "drm/bridge: ti-sn65dsi83: Fix enable error path" (git-fixes).
* ring-buffer: Fix a race between readers and resize checks (git-fixes).
* s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224795).
* s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224796).
* s390/cpum_cf: make crypto counters upward compatible across machine types
(bsc#1224346).
* s390/ipl: Fix incorrect initialization of len fields in nvme reipl block
(git-fixes bsc#1225139).
* s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes
bsc#1225138).
* sched/topology: Optimize topology_span_sane() (bsc#1225053).
* scsi: arcmsr: Support new PCI device IDs 1883 and 1886 (git-fixes).
* scsi: bfa: Fix function pointer type mismatch for hcb_qe->cbfn (git-fixes).
* scsi: core: Consult supported VPD page list prior to fetching page (git-
fixes).
* scsi: core: Fix unremoved procfs host directory regression (git-fixes).
* scsi: csiostor: Avoid function pointer casts (git-fixes).
* scsi: libfc: Do not schedule abort twice (git-fixes).
* scsi: libfc: Fix up timeout error in fc_fcp_rec_error() (git-fixes).
* scsi: lpfc: Add support for 32 byte CDBs (bsc#1225842).
* scsi: lpfc: Change default logging level for unsolicited CT MIB commands
(bsc#1225842).
* scsi: lpfc: Change lpfc_hba hba_flag member into a bitmask (bsc#1225842).
* scsi: lpfc: Clear deferred RSCN processing flag when driver is unloading
(bsc#1225842).
* scsi: lpfc: Copyright updates for 14.4.0.2 patches (bsc#1225842).
* scsi: lpfc: Introduce rrq_list_lock to protect active_rrq_list
(bsc#1225842).
* scsi: lpfc: Update logging of protection type for T10 DIF I/O (bsc#1225842).
* scsi: lpfc: Update lpfc version to 14.4.0.2 (bsc#1225842).
* scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git-
fixes).
* scsi: mylex: Fix sysfs buffer lengths (git-fixes).
* scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes).
* scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git-
fixes).
* selftests/pidfd: Fix config for pidfd_setns_test (git-fixes).
* serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes).
* serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable-
fixes).
* serial: max3100: Fix bitwise types (git-fixes).
* serial: max3100: Lock port->lock when calling uart_handle_cts_change() (git-
fixes).
* serial: max3100: Update uart_driver_registered on driver removal (git-
fixes).
* serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git-
fixes).
* serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler
(git-fixes).
* serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes).
* smb3: show beginning time for per share stats (bsc#1224020).
* smb: client: ensure to try all targets when finding nested links
(bsc#1224020).
* smb: client: fix mount when dns_resolver key is not available (git-fixes,
bsc#1224020).
* smb: client: get rid of dfs code dep in namespace.c (bsc#1224020).
* smb: client: get rid of dfs naming in automount code (bsc#1224020).
* smb: client: introduce DFS_CACHE_TGT_LIST() (bsc#1224020).
* smb: client: reduce stack usage in cifs_try_adding_channels() (bsc#1224020).
* smb: client: remove extra @chan_count check in __cifs_put_smb_ses()
(bsc#1224020).
* smb: client: rename cifs_dfs_ref.c to namespace.c (bsc#1224020).
* soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes).
* soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes).
* Sort recent BHI patches
* speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes).
* spmi: Add a check for remove callback when removing a SPMI driver (git-
fixes).
* spmi: hisi-spmi-controller: Do not override device identifier (git-fixes).
* swiotlb: extend buffer pre-padding to alloc_align_mask if necessary
(bsc#1224331).
* swiotlb: Fix alignment checks when both allocation and DMA masks are
(bsc#1224331)
* swiotlb: Fix double-allocation of slots due to broken alignment
(bsc#1224331)
* swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc()
(bsc#1224331)
* sysv: do not call sb_bread() with pointers_lock held (git-fixes).
* thermal/drivers/tsens: Fix null pointer dereference (git-fixes).
* tools/latency-collector: Fix -Wformat-security compile warns (git-fixes).
* tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer
(bsc#1225535)
* tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer
(git-fixes).
* tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes).
* tracing: hide unused ftrace_event_id_fops (git-fixes).
* tty: n_gsm: fix missing receive state reset after mode switch (git-fixes).
* tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes).
* Update patches.suse/ring-buffer-Fix-a-race-between-readers-and-resize-
checks.patch (bsc#1222893).
* Update patches.suse/scsi-qedf-Don-t-process-stag-work-during-unload.patch
(bsc#1214852)
* Update patches.suse/scsi-qedf-Wait-for-stag-work-during-unload.patch
(bsc#1214852)
* usb: aqc111: stop lying about skb->truesize (git-fixes).
* USB: core: Add hub_get() and hub_put() routines (git-fixes).
* USB: core: Fix access violation during port device removal (git-fixes).
* USB: core: Fix deadlock in port "disable" sysfs attribute (git-fixes).
* usb: dwc3: core: Prevent phy suspend during init (Git-fixes).
* usb: gadget: u_audio: Clear uac pointer when freed (git-fixes).
* usb: typec: tipd: fix event checking for tps6598x (git-fixes).
* usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes).
* VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes).
* VMCI: Fix possible memcpy() run-time warning in
vmci_datagram_invoke_guest_handler() (stable-fixes).
* vmci: prevent speculation leaks by sanitizing event in event_deliver() (git-
fixes).
* watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git-
fixes).
* watchdog: ixp4xx: Make sure restart always works (git-fixes).
* watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin
(git-fixes).
* wifi: ar5523: enable proper endpoint verification (git-fixes).
* wifi: ath10k: Fix an error code problem in
ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes).
* wifi: ath10k: poll service ready message before failing (git-fixes).
* wifi: ath10k: populate board data for WCN3990 (git-fixes).
* wifi: ath11k: do not force enable power save on non-running vdevs (git-
fixes).
* wifi: carl9170: add a proper sanity check for endpoints (git-fixes).
* wifi: carl9170: re-fix fortified-memset warning (git-fixes).
* wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes).
* wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes).
* wifi: mwl8k: initialize cmd->addr[] properly (git-fixes).
* x86/boot: Ignore NMIs during very early boot (git-fixes).
* x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes).
* x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file (git-
fixes).
* x86/bugs: Fix BHI documentation (git-fixes).
* x86/bugs: Fix BHI handling of RRSBA (git-fixes).
* x86/bugs: Fix BHI retpoline check (git-fixes).
* x86/bugs: Fix return type of spectre_bhi_state() (git-fixes).
* x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-
fixes).
* x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr' (git-
fixes).
* x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with
CONFIG_MITIGATION_SPECTRE_BHI (git-fixes).
* x86: Fix CPUIDLE_FLAG_IRQ_ENABLE leaking timer reprogram (git-fixes).
* x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes).
* x86/lib: Fix overflow when counting digits (git-fixes).
* x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes).
* x86/nmi: Drop unused declaration of proc_nmi_enabled() (git-fixes).
* x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for
!SRSO (git-fixes).
* x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git-
fixes).
* x86/sme: Fix memory encryption setting if enabled by default and not
overridden (git-fixes).
* x86/tdx: Preserve shared bit on mprotect() (git-fixes).
* xfs: add missing cmap->br_state = XFS_EXT_NORM update (git-fixes).
* xfs: fix exception caused by unexpected illegal bestcount in leaf dir (git-
fixes).
* xfs: Fix false ENOSPC when performing direct write on a delalloc extent in
cow fork (git-fixes).
* xfs: fix imprecise logic in xchk_btree_check_block_owner (git-fixes).
* xfs: fix inode reservation space for removing transaction (git-fixes).
* xfs: shrink failure needs to hold AGI buffer (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-2008=1 openSUSE-SLE-15.5-2024-2008=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-2008=1

* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-2008=1

* SUSE Real Time Module 15-SP5
zypper in -t patch SUSE-SLE-Module-RT-15-SP5-2024-2008=1

## Package List:

* openSUSE Leap 15.5 (noarch)
* kernel-devel-rt-5.14.21-150500.13.58.1
* kernel-source-rt-5.14.21-150500.13.58.1
* openSUSE Leap 15.5 (x86_64)
* ocfs2-kmp-rt-5.14.21-150500.13.58.1
* kernel-rt-vdso-5.14.21-150500.13.58.1
* reiserfs-kmp-rt-5.14.21-150500.13.58.1
* cluster-md-kmp-rt-5.14.21-150500.13.58.1
* kernel-rt-livepatch-devel-5.14.21-150500.13.58.1
* kernel-syms-rt-5.14.21-150500.13.58.1
* dlm-kmp-rt-debuginfo-5.14.21-150500.13.58.1
* kernel-rt-extra-debuginfo-5.14.21-150500.13.58.1
* kernel-rt-livepatch-5.14.21-150500.13.58.1
* kernel-rt_debug-vdso-5.14.21-150500.13.58.1
* gfs2-kmp-rt-debuginfo-5.14.21-150500.13.58.1
* kernel-rt_debug-devel-5.14.21-150500.13.58.1
* cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.58.1
* kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.58.1
* dlm-kmp-rt-5.14.21-150500.13.58.1
* kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1
* kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.58.1
* kernel-rt_debug-debuginfo-5.14.21-150500.13.58.1
* kernel-livepatch-5_14_21-150500_13_58-rt-debuginfo-1-150500.11.3.1
* kselftests-kmp-rt-debuginfo-5.14.21-150500.13.58.1
* kernel-rt-debuginfo-5.14.21-150500.13.58.1
* gfs2-kmp-rt-5.14.21-150500.13.58.1
* kernel-rt-vdso-debuginfo-5.14.21-150500.13.58.1
* kernel-rt-devel-5.14.21-150500.13.58.1
* kernel-rt-devel-debuginfo-5.14.21-150500.13.58.1
* kselftests-kmp-rt-5.14.21-150500.13.58.1
* kernel-rt_debug-debugsource-5.14.21-150500.13.58.1
* ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.58.1
* kernel-rt-extra-5.14.21-150500.13.58.1
* kernel-livepatch-SLE15-SP5-RT_Update_16-debugsource-1-150500.11.3.1
* kernel-rt-optional-debuginfo-5.14.21-150500.13.58.1
* kernel-rt-optional-5.14.21-150500.13.58.1
* kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1
* kernel-rt-debugsource-5.14.21-150500.13.58.1
* reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.58.1
* openSUSE Leap 15.5 (nosrc x86_64)
* kernel-rt_debug-5.14.21-150500.13.58.1
* kernel-rt-5.14.21-150500.13.58.1
* SUSE Linux Enterprise Micro 5.5 (nosrc x86_64)
* kernel-rt-5.14.21-150500.13.58.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* kernel-rt-debuginfo-5.14.21-150500.13.58.1
* kernel-rt-debugsource-5.14.21-150500.13.58.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-source-rt-5.14.21-150500.13.58.1
* SUSE Linux Enterprise Live Patching 15-SP5 (x86_64)
* kernel-livepatch-SLE15-SP5-RT_Update_16-debugsource-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_13_58-rt-debuginfo-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1
* SUSE Real Time Module 15-SP5 (x86_64)
* ocfs2-kmp-rt-5.14.21-150500.13.58.1
* kernel-rt-vdso-5.14.21-150500.13.58.1
* cluster-md-kmp-rt-5.14.21-150500.13.58.1
* kernel-syms-rt-5.14.21-150500.13.58.1
* dlm-kmp-rt-debuginfo-5.14.21-150500.13.58.1
* kernel-rt_debug-vdso-5.14.21-150500.13.58.1
* kernel-rt_debug-devel-5.14.21-150500.13.58.1
* gfs2-kmp-rt-debuginfo-5.14.21-150500.13.58.1
* kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.58.1
* cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.58.1
* dlm-kmp-rt-5.14.21-150500.13.58.1
* kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.58.1
* kernel-rt_debug-debuginfo-5.14.21-150500.13.58.1
* kernel-rt-debuginfo-5.14.21-150500.13.58.1
* kernel-rt-vdso-debuginfo-5.14.21-150500.13.58.1
* gfs2-kmp-rt-5.14.21-150500.13.58.1
* kernel-rt-devel-5.14.21-150500.13.58.1
* kernel-rt-devel-debuginfo-5.14.21-150500.13.58.1
* kernel-rt_debug-debugsource-5.14.21-150500.13.58.1
* ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.58.1
* kernel-rt-debugsource-5.14.21-150500.13.58.1
* SUSE Real Time Module 15-SP5 (noarch)
* kernel-devel-rt-5.14.21-150500.13.58.1
* kernel-source-rt-5.14.21-150500.13.58.1
* SUSE Real Time Module 15-SP5 (nosrc x86_64)
* kernel-rt_debug-5.14.21-150500.13.58.1
* kernel-rt-5.14.21-150500.13.58.1

## References:

* https://www.suse.com/security/cve/CVE-2020-36788.html
* https://www.suse.com/security/cve/CVE-2021-39698.html
* https://www.suse.com/security/cve/CVE-2021-4148.html
* https://www.suse.com/security/cve/CVE-2021-42327.html
* https://www.suse.com/security/cve/CVE-2021-43056.html
* https://www.suse.com/security/cve/CVE-2021-47200.html
* https://www.suse.com/security/cve/CVE-2021-47358.html
* https://www.suse.com/security/cve/CVE-2021-47359.html
* https://www.suse.com/security/cve/CVE-2021-47360.html
* https://www.suse.com/security/cve/CVE-2021-47361.html
* https://www.suse.com/security/cve/CVE-2021-47362.html
* https://www.suse.com/security/cve/CVE-2021-47363.html
* https://www.suse.com/security/cve/CVE-2021-47364.html
* https://www.suse.com/security/cve/CVE-2021-47365.html
* https://www.suse.com/security/cve/CVE-2021-47366.html
* https://www.suse.com/security/cve/CVE-2021-47367.html
* https://www.suse.com/security/cve/CVE-2021-47368.html
* https://www.suse.com/security/cve/CVE-2021-47369.html
* https://www.suse.com/security/cve/CVE-2021-47370.html
* https://www.suse.com/security/cve/CVE-2021-47371.html
* https://www.suse.com/security/cve/CVE-2021-47372.html
* https://www.suse.com/security/cve/CVE-2021-47373.html
* https://www.suse.com/security/cve/CVE-2021-47374.html
* https://www.suse.com/security/cve/CVE-2021-47375.html
* https://www.suse.com/security/cve/CVE-2021-47376.html
* https://www.suse.com/security/cve/CVE-2021-47378.html
* https://www.suse.com/security/cve/CVE-2021-47379.html
* https://www.suse.com/security/cve/CVE-2021-47380.html
* https://www.suse.com/security/cve/CVE-2021-47381.html
* https://www.suse.com/security/cve/CVE-2021-47382.html
* https://www.suse.com/security/cve/CVE-2021-47383.html
* https://www.suse.com/security/cve/CVE-2021-47384.html
* https://www.suse.com/security/cve/CVE-2021-47385.html
* https://www.suse.com/security/cve/CVE-2021-47386.html
* https://www.suse.com/security/cve/CVE-2021-47387.html
* https://www.suse.com/security/cve/CVE-2021-47388.html
* https://www.suse.com/security/cve/CVE-2021-47389.html
* https://www.suse.com/security/cve/CVE-2021-47390.html
* https://www.suse.com/security/cve/CVE-2021-47391.html
* https://www.suse.com/security/cve/CVE-2021-47392.html
* https://www.suse.com/security/cve/CVE-2021-47393.html
* https://www.suse.com/security/cve/CVE-2021-47394.html
* https://www.suse.com/security/cve/CVE-2021-47395.html
* https://www.suse.com/security/cve/CVE-2021-47396.html
* https://www.suse.com/security/cve/CVE-2021-47397.html
* https://www.suse.com/security/cve/CVE-2021-47398.html
* https://www.suse.com/security/cve/CVE-2021-47399.html
* https://www.suse.com/security/cve/CVE-2021-47400.html
* https://www.suse.com/security/cve/CVE-2021-47401.html
* https://www.suse.com/security/cve/CVE-2021-47402.html
* https://www.suse.com/security/cve/CVE-2021-47403.html
* https://www.suse.com/security/cve/CVE-2021-47404.html
* https://www.suse.com/security/cve/CVE-2021-47405.html
* https://www.suse.com/security/cve/CVE-2021-47406.html
* https://www.suse.com/security/cve/CVE-2021-47407.html
* https://www.suse.com/security/cve/CVE-2021-47408.html
* https://www.suse.com/security/cve/CVE-2021-47409.html
* https://www.suse.com/security/cve/CVE-2021-47410.html
* https://www.suse.com/security/cve/CVE-2021-47412.html
* https://www.suse.com/security/cve/CVE-2021-47413.html
* https://www.suse.com/security/cve/CVE-2021-47414.html
* https://www.suse.com/security/cve/CVE-2021-47415.html
* https://www.suse.com/security/cve/CVE-2021-47416.html
* https://www.suse.com/security/cve/CVE-2021-47417.html
* https://www.suse.com/security/cve/CVE-2021-47418.html
* https://www.suse.com/security/cve/CVE-2021-47419.html
* https://www.suse.com/security/cve/CVE-2021-47420.html
* https://www.suse.com/security/cve/CVE-2021-47421.html
* https://www.suse.com/security/cve/CVE-2021-47422.html
* https://www.suse.com/security/cve/CVE-2021-47423.html
* https://www.suse.com/security/cve/CVE-2021-47424.html
* https://www.suse.com/security/cve/CVE-2021-47425.html
* https://www.suse.com/security/cve/CVE-2021-47426.html
* https://www.suse.com/security/cve/CVE-2021-47427.html
* https://www.suse.com/security/cve/CVE-2021-47428.html
* https://www.suse.com/security/cve/CVE-2021-47429.html
* https://www.suse.com/security/cve/CVE-2021-47430.html
* https://www.suse.com/security/cve/CVE-2021-47431.html
* https://www.suse.com/security/cve/CVE-2021-47433.html
* https://www.suse.com/security/cve/CVE-2021-47434.html
* https://www.suse.com/security/cve/CVE-2021-47435.html
* https://www.suse.com/security/cve/CVE-2021-47436.html
* https://www.suse.com/security/cve/CVE-2021-47437.html
* https://www.suse.com/security/cve/CVE-2021-47438.html
* https://www.suse.com/security/cve/CVE-2021-47439.html
* https://www.suse.com/security/cve/CVE-2021-47440.html
* https://www.suse.com/security/cve/CVE-2021-47441.html
* https://www.suse.com/security/cve/CVE-2021-47442.html
* https://www.suse.com/security/cve/CVE-2021-47443.html
* https://www.suse.com/security/cve/CVE-2021-47444.html
* https://www.suse.com/security/cve/CVE-2021-47445.html
* https://www.suse.com/security/cve/CVE-2021-47446.html
* https://www.suse.com/security/cve/CVE-2021-47447.html
* https://www.suse.com/security/cve/CVE-2021-47448.html
* https://www.suse.com/security/cve/CVE-2021-47449.html
* https://www.suse.com/security/cve/CVE-2021-47450.html
* https://www.suse.com/security/cve/CVE-2021-47451.html
* https://www.suse.com/security/cve/CVE-2021-47452.html
* https://www.suse.com/security/cve/CVE-2021-47453.html
* https://www.suse.com/security/cve/CVE-2021-47454.html
* https://www.suse.com/security/cve/CVE-2021-47455.html
* https://www.suse.com/security/cve/CVE-2021-47456.html
* https://www.suse.com/security/cve/CVE-2021-47457.html
* https://www.suse.com/security/cve/CVE-2021-47458.html
* https://www.suse.com/security/cve/CVE-2021-47459.html
* https://www.suse.com/security/cve/CVE-2021-47460.html
* https://www.suse.com/security/cve/CVE-2021-47461.html
* https://www.suse.com/security/cve/CVE-2021-47462.html
* https://www.suse.com/security/cve/CVE-2021-47463.html
* https://www.suse.com/security/cve/CVE-2021-47464.html
* https://www.suse.com/security/cve/CVE-2021-47465.html
* https://www.suse.com/security/cve/CVE-2021-47466.html
* https://www.suse.com/security/cve/CVE-2021-47467.html
* https://www.suse.com/security/cve/CVE-2021-47468.html
* https://www.suse.com/security/cve/CVE-2021-47469.html
* https://www.suse.com/security/cve/CVE-2021-47470.html
* https://www.suse.com/security/cve/CVE-2021-47471.html
* https://www.suse.com/security/cve/CVE-2021-47472.html
* https://www.suse.com/security/cve/CVE-2021-47473.html
* https://www.suse.com/security/cve/CVE-2021-47474.html
* https://www.suse.com/security/cve/CVE-2021-47475.html
* https://www.suse.com/security/cve/CVE-2021-47476.html
* https://www.suse.com/security/cve/CVE-2021-47477.html
* https://www.suse.com/security/cve/CVE-2021-47478.html
* https://www.suse.com/security/cve/CVE-2021-47479.html
* https://www.suse.com/security/cve/CVE-2021-47480.html
* https://www.suse.com/security/cve/CVE-2021-47481.html
* https://www.suse.com/security/cve/CVE-2021-47482.html
* https://www.suse.com/security/cve/CVE-2021-47483.html
* https://www.suse.com/security/cve/CVE-2021-47484.html
* https://www.suse.com/security/cve/CVE-2021-47485.html
* https://www.suse.com/security/cve/CVE-2021-47486.html
* https://www.suse.com/security/cve/CVE-2021-47488.html
* https://www.suse.com/security/cve/CVE-2021-47489.html
* https://www.suse.com/security/cve/CVE-2021-47490.html
* https://www.suse.com/security/cve/CVE-2021-47491.html
* https://www.suse.com/security/cve/CVE-2021-47492.html
* https://www.suse.com/security/cve/CVE-2021-47493.html
* https://www.suse.com/security/cve/CVE-2021-47494.html
* https://www.suse.com/security/cve/CVE-2021-47495.html
* https://www.suse.com/security/cve/CVE-2021-47496.html
* https://www.suse.com/security/cve/CVE-2021-47497.html
* https://www.suse.com/security/cve/CVE-2021-47498.html
* https://www.suse.com/security/cve/CVE-2021-47499.html
* https://www.suse.com/security/cve/CVE-2021-47500.html
* https://www.suse.com/security/cve/CVE-2021-47501.html
* https://www.suse.com/security/cve/CVE-2021-47502.html
* https://www.suse.com/security/cve/CVE-2021-47503.html
* https://www.suse.com/security/cve/CVE-2021-47504.html
* https://www.suse.com/security/cve/CVE-2021-47505.html
* https://www.suse.com/security/cve/CVE-2021-47506.html
* https://www.suse.com/security/cve/CVE-2021-47507.html
* https://www.suse.com/security/cve/CVE-2021-47508.html
* https://www.suse.com/security/cve/CVE-2021-47509.html
* https://www.suse.com/security/cve/CVE-2021-47510.html
* https://www.suse.com/security/cve/CVE-2021-47511.html
* https://www.suse.com/security/cve/CVE-2021-47512.html
* https://www.suse.com/security/cve/CVE-2021-47513.html
* https://www.suse.com/security/cve/CVE-2021-47514.html
* https://www.suse.com/security/cve/CVE-2021-47516.html
* https://www.suse.com/security/cve/CVE-2021-47518.html
* https://www.suse.com/security/cve/CVE-2021-47520.html
* https://www.suse.com/security/cve/CVE-2021-47521.html
* https://www.suse.com/security/cve/CVE-2021-47522.html
* https://www.suse.com/security/cve/CVE-2021-47523.html
* https://www.suse.com/security/cve/CVE-2021-47524.html
* https://www.suse.com/security/cve/CVE-2021-47525.html
* https://www.suse.com/security/cve/CVE-2021-47526.html
* https://www.suse.com/security/cve/CVE-2021-47527.html
* https://www.suse.com/security/cve/CVE-2021-47528.html
* https://www.suse.com/security/cve/CVE-2021-47529.html
* https://www.suse.com/security/cve/CVE-2021-47530.html
* https://www.suse.com/security/cve/CVE-2021-47531.html
* https://www.suse.com/security/cve/CVE-2021-47532.html
* https://www.suse.com/security/cve/CVE-2021-47533.html
* https://www.suse.com/security/cve/CVE-2021-47534.html
* https://www.suse.com/security/cve/CVE-2021-47535.html
* https://www.suse.com/security/cve/CVE-2021-47536.html
* https://www.suse.com/security/cve/CVE-2021-47537.html
* https://www.suse.com/security/cve/CVE-2021-47540.html
* https://www.suse.com/security/cve/CVE-2021-47541.html
* https://www.suse.com/security/cve/CVE-2021-47542.html
* https://www.suse.com/security/cve/CVE-2021-47544.html
* https://www.suse.com/security/cve/CVE-2021-47548.html
* https://www.suse.com/security/cve/CVE-2021-47549.html
* https://www.suse.com/security/cve/CVE-2021-47550.html
* https://www.suse.com/security/cve/CVE-2021-47551.html
* https://www.suse.com/security/cve/CVE-2021-47552.html
* https://www.suse.com/security/cve/CVE-2021-47553.html
* https://www.suse.com/security/cve/CVE-2021-47554.html
* https://www.suse.com/security/cve/CVE-2021-47555.html
* https://www.suse.com/security/cve/CVE-2021-47556.html
* https://www.suse.com/security/cve/CVE-2021-47557.html
* https://www.suse.com/security/cve/CVE-2021-47558.html
* https://www.suse.com/security/cve/CVE-2021-47559.html
* https://www.suse.com/security/cve/CVE-2021-47560.html
* https://www.suse.com/security/cve/CVE-2021-47562.html
* https://www.suse.com/security/cve/CVE-2021-47563.html
* https://www.suse.com/security/cve/CVE-2021-47564.html
* https://www.suse.com/security/cve/CVE-2021-47565.html
* https://www.suse.com/security/cve/CVE-2021-47569.html
* https://www.suse.com/security/cve/CVE-2022-48633.html
* https://www.suse.com/security/cve/CVE-2022-48662.html
* https://www.suse.com/security/cve/CVE-2022-48669.html
* https://www.suse.com/security/cve/CVE-2022-48689.html
* https://www.suse.com/security/cve/CVE-2022-48691.html
* https://www.suse.com/security/cve/CVE-2022-48699.html
* https://www.suse.com/security/cve/CVE-2022-48705.html
* https://www.suse.com/security/cve/CVE-2022-48708.html
* https://www.suse.com/security/cve/CVE-2022-48709.html
* https://www.suse.com/security/cve/CVE-2022-48710.html
* https://www.suse.com/security/cve/CVE-2023-0160.html
* https://www.suse.com/security/cve/CVE-2023-1829.html
* https://www.suse.com/security/cve/CVE-2023-42755.html
* https://www.suse.com/security/cve/CVE-2023-47233.html
* https://www.suse.com/security/cve/CVE-2023-52586.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52618.html
* https://www.suse.com/security/cve/CVE-2023-52642.html
* https://www.suse.com/security/cve/CVE-2023-52643.html
* https://www.suse.com/security/cve/CVE-2023-52644.html
* https://www.suse.com/security/cve/CVE-2023-52646.html
* https://www.suse.com/security/cve/CVE-2023-52650.html
* https://www.suse.com/security/cve/CVE-2023-52653.html
* https://www.suse.com/security/cve/CVE-2023-52654.html
* https://www.suse.com/security/cve/CVE-2023-52655.html
* https://www.suse.com/security/cve/CVE-2023-52656.html
* https://www.suse.com/security/cve/CVE-2023-52657.html
* https://www.suse.com/security/cve/CVE-2023-52659.html
* https://www.suse.com/security/cve/CVE-2023-52660.html
* https://www.suse.com/security/cve/CVE-2023-52661.html
* https://www.suse.com/security/cve/CVE-2023-52662.html
* https://www.suse.com/security/cve/CVE-2023-52664.html
* https://www.suse.com/security/cve/CVE-2023-52669.html
* https://www.suse.com/security/cve/CVE-2023-52671.html
* https://www.suse.com/security/cve/CVE-2023-52674.html
* https://www.suse.com/security/cve/CVE-2023-52676.html
* https://www.suse.com/security/cve/CVE-2023-52678.html
* https://www.suse.com/security/cve/CVE-2023-52679.html
* https://www.suse.com/security/cve/CVE-2023-52680.html
* https://www.suse.com/security/cve/CVE-2023-52683.html
* https://www.suse.com/security/cve/CVE-2023-52685.html
* https://www.suse.com/security/cve/CVE-2023-52686.html
* https://www.suse.com/security/cve/CVE-2023-52690.html
* https://www.suse.com/security/cve/CVE-2023-52691.html
* https://www.suse.com/security/cve/CVE-2023-52692.html
* https://www.suse.com/security/cve/CVE-2023-52693.html
* https://www.suse.com/security/cve/CVE-2023-52694.html
* https://www.suse.com/security/cve/CVE-2023-52696.html
* https://www.suse.com/security/cve/CVE-2023-52698.html
* https://www.suse.com/security/cve/CVE-2023-52699.html
* https://www.suse.com/security/cve/CVE-2023-52702.html
* https://www.suse.com/security/cve/CVE-2023-52703.html
* https://www.suse.com/security/cve/CVE-2023-52705.html
* https://www.suse.com/security/cve/CVE-2023-52707.html
* https://www.suse.com/security/cve/CVE-2023-52708.html
* https://www.suse.com/security/cve/CVE-2023-52730.html
* https://www.suse.com/security/cve/CVE-2023-52731.html
* https://www.suse.com/security/cve/CVE-2023-52732.html
* https://www.suse.com/security/cve/CVE-2023-52733.html
* https://www.suse.com/security/cve/CVE-2023-52736.html
* https://www.suse.com/security/cve/CVE-2023-52738.html
* https://www.suse.com/security/cve/CVE-2023-52739.html
* https://www.suse.com/security/cve/CVE-2023-52740.html
* https://www.suse.com/security/cve/CVE-2023-52741.html
* https://www.suse.com/security/cve/CVE-2023-52742.html
* https://www.suse.com/security/cve/CVE-2023-52743.html
* https://www.suse.com/security/cve/CVE-2023-52744.html
* https://www.suse.com/security/cve/CVE-2023-52745.html
* https://www.suse.com/security/cve/CVE-2023-52746.html
* https://www.suse.com/security/cve/CVE-2023-52747.html
* https://www.suse.com/security/cve/CVE-2023-52753.html
* https://www.suse.com/security/cve/CVE-2023-52754.html
* https://www.suse.com/security/cve/CVE-2023-52756.html
* https://www.suse.com/security/cve/CVE-2023-52757.html
* https://www.suse.com/security/cve/CVE-2023-52759.html
* https://www.suse.com/security/cve/CVE-2023-52763.html
* https://www.suse.com/security/cve/CVE-2023-52764.html
* https://www.suse.com/security/cve/CVE-2023-52766.html
* https://www.suse.com/security/cve/CVE-2023-52773.html
* https://www.suse.com/security/cve/CVE-2023-52774.html
* https://www.suse.com/security/cve/CVE-2023-52777.html
* https://www.suse.com/security/cve/CVE-2023-52781.html
* https://www.suse.com/security/cve/CVE-2023-52788.html
* https://www.suse.com/security/cve/CVE-2023-52789.html
* https://www.suse.com/security/cve/CVE-2023-52791.html
* https://www.suse.com/security/cve/CVE-2023-52795.html
* https://www.suse.com/security/cve/CVE-2023-52796.html
* https://www.suse.com/security/cve/CVE-2023-52798.html
* https://www.suse.com/security/cve/CVE-2023-52799.html
* https://www.suse.com/security/cve/CVE-2023-52800.html
* https://www.suse.com/security/cve/CVE-2023-52803.html
* https://www.suse.com/security/cve/CVE-2023-52804.html
* https://www.suse.com/security/cve/CVE-2023-52805.html
* https://www.suse.com/security/cve/CVE-2023-52806.html
* https://www.suse.com/security/cve/CVE-2023-52807.html
* https://www.suse.com/security/cve/CVE-2023-52808.html
* https://www.suse.com/security/cve/CVE-2023-52809.html
* https://www.suse.com/security/cve/CVE-2023-52810.html
* https://www.suse.com/security/cve/CVE-2023-52811.html
* https://www.suse.com/security/cve/CVE-2023-52814.html
* https://www.suse.com/security/cve/CVE-2023-52815.html
* https://www.suse.com/security/cve/CVE-2023-52816.html
* https://www.suse.com/security/cve/CVE-2023-52817.html
* https://www.suse.com/security/cve/CVE-2023-52818.html
* https://www.suse.com/security/cve/CVE-2023-52819.html
* https://www.suse.com/security/cve/CVE-2023-52821.html
* https://www.suse.com/security/cve/CVE-2023-52825.html
* https://www.suse.com/security/cve/CVE-2023-52826.html
* https://www.suse.com/security/cve/CVE-2023-52832.html
* https://www.suse.com/security/cve/CVE-2023-52833.html
* https://www.suse.com/security/cve/CVE-2023-52834.html
* https://www.suse.com/security/cve/CVE-2023-52838.html
* https://www.suse.com/security/cve/CVE-2023-52840.html
* https://www.suse.com/security/cve/CVE-2023-52841.html
* https://www.suse.com/security/cve/CVE-2023-52844.html
* https://www.suse.com/security/cve/CVE-2023-52847.html
* https://www.suse.com/security/cve/CVE-2023-52851.html
* https://www.suse.com/security/cve/CVE-2023-52853.html
* https://www.suse.com/security/cve/CVE-2023-52854.html
* https://www.suse.com/security/cve/CVE-2023-52855.html
* https://www.suse.com/security/cve/CVE-2023-52856.html
* https://www.suse.com/security/cve/CVE-2023-52858.html
* https://www.suse.com/security/cve/CVE-2023-52860.html
* https://www.suse.com/security/cve/CVE-2023-52861.html
* https://www.suse.com/security/cve/CVE-2023-52864.html
* https://www.suse.com/security/cve/CVE-2023-52865.html
* https://www.suse.com/security/cve/CVE-2023-52867.html
* https://www.suse.com/security/cve/CVE-2023-52868.html
* https://www.suse.com/security/cve/CVE-2023-52870.html
* https://www.suse.com/security/cve/CVE-2023-52871.html
* https://www.suse.com/security/cve/CVE-2023-52872.html
* https://www.suse.com/security/cve/CVE-2023-52873.html
* https://www.suse.com/security/cve/CVE-2023-52875.html
* https://www.suse.com/security/cve/CVE-2023-52876.html
* https://www.suse.com/security/cve/CVE-2023-52877.html
* https://www.suse.com/security/cve/CVE-2023-52878.html
* https://www.suse.com/security/cve/CVE-2023-52880.html
* https://www.suse.com/security/cve/CVE-2023-6531.html
* https://www.suse.com/security/cve/CVE-2024-2201.html
* https://www.suse.com/security/cve/CVE-2024-26597.html
* https://www.suse.com/security/cve/CVE-2024-26643.html
* https://www.suse.com/security/cve/CVE-2024-26679.html
* https://www.suse.com/security/cve/CVE-2024-26692.html
* https://www.suse.com/security/cve/CVE-2024-26698.html
* https://www.suse.com/security/cve/CVE-2024-26700.html
* https://www.suse.com/security/cve/CVE-2024-26715.html
* https://www.suse.com/security/cve/CVE-2024-26739.html
* https://www.suse.com/security/cve/CVE-2024-26742.html
* https://www.suse.com/security/cve/CVE-2024-26748.html
* https://www.suse.com/security/cve/CVE-2024-26758.html
* https://www.suse.com/security/cve/CVE-2024-26764.html
* https://www.suse.com/security/cve/CVE-2024-26775.html
* https://www.suse.com/security/cve/CVE-2024-26777.html
* https://www.suse.com/security/cve/CVE-2024-26778.html
* https://www.suse.com/security/cve/CVE-2024-26788.html
* https://www.suse.com/security/cve/CVE-2024-26791.html
* https://www.suse.com/security/cve/CVE-2024-26801.html
* https://www.suse.com/security/cve/CVE-2024-26822.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26829.html
* https://www.suse.com/security/cve/CVE-2024-26838.html
* https://www.suse.com/security/cve/CVE-2024-26839.html
* https://www.suse.com/security/cve/CVE-2024-26840.html
* https://www.suse.com/security/cve/CVE-2024-26846.html
* https://www.suse.com/security/cve/CVE-2024-26859.html
* https://www.suse.com/security/cve/CVE-2024-26870.html
* https://www.suse.com/security/cve/CVE-2024-26874.html
* https://www.suse.com/security/cve/CVE-2024-26876.html
* https://www.suse.com/security/cve/CVE-2024-26877.html
* https://www.suse.com/security/cve/CVE-2024-26880.html
* https://www.suse.com/security/cve/CVE-2024-26889.html
* https://www.suse.com/security/cve/CVE-2024-26894.html
* https://www.suse.com/security/cve/CVE-2024-26900.html
* https://www.suse.com/security/cve/CVE-2024-26907.html
* https://www.suse.com/security/cve/CVE-2024-26915.html
* https://www.suse.com/security/cve/CVE-2024-26916.html
* https://www.suse.com/security/cve/CVE-2024-26919.html
* https://www.suse.com/security/cve/CVE-2024-26920.html
* https://www.suse.com/security/cve/CVE-2024-26921.html
* https://www.suse.com/security/cve/CVE-2024-26922.html
* https://www.suse.com/security/cve/CVE-2024-26925.html
* https://www.suse.com/security/cve/CVE-2024-26928.html
* https://www.suse.com/security/cve/CVE-2024-26929.html
* https://www.suse.com/security/cve/CVE-2024-26930.html
* https://www.suse.com/security/cve/CVE-2024-26931.html
* https://www.suse.com/security/cve/CVE-2024-26933.html
* https://www.suse.com/security/cve/CVE-2024-26934.html
* https://www.suse.com/security/cve/CVE-2024-269355.html
* https://www.suse.com/security/cve/CVE-2024-26937.html
* https://www.suse.com/security/cve/CVE-2024-26938.html
* https://www.suse.com/security/cve/CVE-2024-26939.html
* https://www.suse.com/security/cve/CVE-2024-26940.html
* https://www.suse.com/security/cve/CVE-2024-26943.html
* https://www.suse.com/security/cve/CVE-2024-26957.html
* https://www.suse.com/security/cve/CVE-2024-26958.html
* https://www.suse.com/security/cve/CVE-2024-26964.html
* https://www.suse.com/security/cve/CVE-2024-26974.html
* https://www.suse.com/security/cve/CVE-2024-26977.html
* https://www.suse.com/security/cve/CVE-2024-26979.html
* https://www.suse.com/security/cve/CVE-2024-26984.html
* https://www.suse.com/security/cve/CVE-2024-26988.html
* https://www.suse.com/security/cve/CVE-2024-26989.html
* https://www.suse.com/security/cve/CVE-2024-26994.html
* https://www.suse.com/security/cve/CVE-2024-26996.html
* https://www.suse.com/security/cve/CVE-2024-26997.html
* https://www.suse.com/security/cve/CVE-2024-26999.html
* https://www.suse.com/security/cve/CVE-2024-27000.html
* https://www.suse.com/security/cve/CVE-2024-27001.html
* https://www.suse.com/security/cve/CVE-2024-27004.html
* https://www.suse.com/security/cve/CVE-2024-27008.html
* https://www.suse.com/security/cve/CVE-2024-27028.html
* https://www.suse.com/security/cve/CVE-2024-27037.html
* https://www.suse.com/security/cve/CVE-2024-27042.html
* https://www.suse.com/security/cve/CVE-2024-27045.html
* https://www.suse.com/security/cve/CVE-2024-27047.html
* https://www.suse.com/security/cve/CVE-2024-27051.html
* https://www.suse.com/security/cve/CVE-2024-27052.html
* https://www.suse.com/security/cve/CVE-2024-27053.html
* https://www.suse.com/security/cve/CVE-2024-27054.html
* https://www.suse.com/security/cve/CVE-2024-27059.html
* https://www.suse.com/security/cve/CVE-2024-27072.html
* https://www.suse.com/security/cve/CVE-2024-27073.html
* https://www.suse.com/security/cve/CVE-2024-27074.html
* https://www.suse.com/security/cve/CVE-2024-27075.html
* https://www.suse.com/security/cve/CVE-2024-27076.html
* https://www.suse.com/security/cve/CVE-2024-27077.html
* https://www.suse.com/security/cve/CVE-2024-27078.html
* https://www.suse.com/security/cve/CVE-2024-27388.html
* https://www.suse.com/security/cve/CVE-2024-27393.html
* https://www.suse.com/security/cve/CVE-2024-27395.html
* https://www.suse.com/security/cve/CVE-2024-27396.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-27399.html
* https://www.suse.com/security/cve/CVE-2024-27400.html
* https://www.suse.com/security/cve/CVE-2024-27401.html
* https://www.suse.com/security/cve/CVE-2024-27405.html
* https://www.suse.com/security/cve/CVE-2024-27410.html
* https://www.suse.com/security/cve/CVE-2024-27412.html
* https://www.suse.com/security/cve/CVE-2024-27413.html
* https://www.suse.com/security/cve/CVE-2024-27416.html
* https://www.suse.com/security/cve/CVE-2024-27417.html
* https://www.suse.com/security/cve/CVE-2024-27419.html
* https://www.suse.com/security/cve/CVE-2024-27431.html
* https://www.suse.com/security/cve/CVE-2024-27435.html
* https://www.suse.com/security/cve/CVE-2024-27436.html
* https://www.suse.com/security/cve/CVE-2024-35789.html
* https://www.suse.com/security/cve/CVE-2024-35791.html
* https://www.suse.com/security/cve/CVE-2024-35796.html
* https://www.suse.com/security/cve/CVE-2024-35799.html
* https://www.suse.com/security/cve/CVE-2024-35801.html
* https://www.suse.com/security/cve/CVE-2024-35804.html
* https://www.suse.com/security/cve/CVE-2024-35806.html
* https://www.suse.com/security/cve/CVE-2024-35809.html
* https://www.suse.com/security/cve/CVE-2024-35811.html
* https://www.suse.com/security/cve/CVE-2024-35812.html
* https://www.suse.com/security/cve/CVE-2024-35813.html
* https://www.suse.com/security/cve/CVE-2024-35815.html
* https://www.suse.com/security/cve/CVE-2024-35817.html
* https://www.suse.com/security/cve/CVE-2024-35821.html
* https://www.suse.com/security/cve/CVE-2024-35822.html
* https://www.suse.com/security/cve/CVE-2024-35823.html
* https://www.suse.com/security/cve/CVE-2024-35825.html
* https://www.suse.com/security/cve/CVE-2024-35828.html
* https://www.suse.com/security/cve/CVE-2024-35829.html
* https://www.suse.com/security/cve/CVE-2024-35830.html
* https://www.suse.com/security/cve/CVE-2024-35833.html
* https://www.suse.com/security/cve/CVE-2024-35845.html
* https://www.suse.com/security/cve/CVE-2024-35847.html
* https://www.suse.com/security/cve/CVE-2024-35849.html
* https://www.suse.com/security/cve/CVE-2024-35851.html
* https://www.suse.com/security/cve/CVE-2024-35852.html
* https://www.suse.com/security/cve/CVE-2024-35854.html
* https://www.suse.com/security/cve/CVE-2024-35860.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35863.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35865.html
* https://www.suse.com/security/cve/CVE-2024-35866.html
* https://www.suse.com/security/cve/CVE-2024-35867.html
* https://www.suse.com/security/cve/CVE-2024-35868.html
* https://www.suse.com/security/cve/CVE-2024-35869.html
* https://www.suse.com/security/cve/CVE-2024-35870.html
* https://www.suse.com/security/cve/CVE-2024-35872.html
* https://www.suse.com/security/cve/CVE-2024-35875.html
* https://www.suse.com/security/cve/CVE-2024-35877.html
* https://www.suse.com/security/cve/CVE-2024-35878.html
* https://www.suse.com/security/cve/CVE-2024-35879.html
* https://www.suse.com/security/cve/CVE-2024-35885.html
* https://www.suse.com/security/cve/CVE-2024-35887.html
* https://www.suse.com/security/cve/CVE-2024-35895.html
* https://www.suse.com/security/cve/CVE-2024-35901.html
* https://www.suse.com/security/cve/CVE-2024-35904.html
* https://www.suse.com/security/cve/CVE-2024-35905.html
* https://www.suse.com/security/cve/CVE-2024-35907.html
* https://www.suse.com/security/cve/CVE-2024-35912.html
* https://www.suse.com/security/cve/CVE-2024-35914.html
* https://www.suse.com/security/cve/CVE-2024-35915.html
* https://www.suse.com/security/cve/CVE-2024-35922.html
* https://www.suse.com/security/cve/CVE-2024-35924.html
* https://www.suse.com/security/cve/CVE-2024-35930.html
* https://www.suse.com/security/cve/CVE-2024-35932.html
* https://www.suse.com/security/cve/CVE-2024-35933.html
* https://www.suse.com/security/cve/CVE-2024-35935.html
* https://www.suse.com/security/cve/CVE-2024-35936.html
* https://www.suse.com/security/cve/CVE-2024-35938.html
* https://www.suse.com/security/cve/CVE-2024-35939.html
* https://www.suse.com/security/cve/CVE-2024-35940.html
* https://www.suse.com/security/cve/CVE-2024-35943.html
* https://www.suse.com/security/cve/CVE-2024-35944.html
* https://www.suse.com/security/cve/CVE-2024-35947.html
* https://www.suse.com/security/cve/CVE-2024-35950.html
* https://www.suse.com/security/cve/CVE-2024-35951.html
* https://www.suse.com/security/cve/CVE-2024-35952.html
* https://www.suse.com/security/cve/CVE-2024-35955.html
* https://www.suse.com/security/cve/CVE-2024-35959.html
* https://www.suse.com/security/cve/CVE-2024-35963.html
* https://www.suse.com/security/cve/CVE-2024-35964.html
* https://www.suse.com/security/cve/CVE-2024-35965.html
* https://www.suse.com/security/cve/CVE-2024-35966.html
* https://www.suse.com/security/cve/CVE-2024-35967.html
* https://www.suse.com/security/cve/CVE-2024-35969.html
* https://www.suse.com/security/cve/CVE-2024-35973.html
* https://www.suse.com/security/cve/CVE-2024-35976.html
* https://www.suse.com/security/cve/CVE-2024-35978.html
* https://www.suse.com/security/cve/CVE-2024-35982.html
* https://www.suse.com/security/cve/CVE-2024-35984.html
* https://www.suse.com/security/cve/CVE-2024-35989.html
* https://www.suse.com/security/cve/CVE-2024-35990.html
* https://www.suse.com/security/cve/CVE-2024-35998.html
* https://www.suse.com/security/cve/CVE-2024-35999.html
* https://www.suse.com/security/cve/CVE-2024-36006.html
* https://www.suse.com/security/cve/CVE-2024-36007.html
* https://www.suse.com/security/cve/CVE-2024-36012.html
* https://www.suse.com/security/cve/CVE-2024-36014.html
* https://www.suse.com/security/cve/CVE-2024-36015.html
* https://www.suse.com/security/cve/CVE-2024-36016.html
* https://www.suse.com/security/cve/CVE-2024-36026.html
* https://www.suse.com/security/cve/CVE-2024-36029.html
* https://www.suse.com/security/cve/CVE-2024-36032.html
* https://www.suse.com/security/cve/CVE-2024-36880.html
* https://www.suse.com/security/cve/CVE-2024-36893.html
* https://www.suse.com/security/cve/CVE-2024-36896.html
* https://www.suse.com/security/cve/CVE-2024-36897.html
* https://www.suse.com/security/cve/CVE-2024-36906.html
* https://www.suse.com/security/cve/CVE-2024-36918.html
* https://www.suse.com/security/cve/CVE-2024-36924.html
* https://www.suse.com/security/cve/CVE-2024-36926.html
* https://www.suse.com/security/cve/CVE-2024-36928.html
* https://www.suse.com/security/cve/CVE-2024-36931.html
* https://www.suse.com/security/cve/CVE-2024-36938.html
* https://www.suse.com/security/cve/CVE-2024-36940.html
* https://www.suse.com/security/cve/CVE-2024-36941.html
* https://www.suse.com/security/cve/CVE-2024-36942.html
* https://www.suse.com/security/cve/CVE-2024-36944.html
* https://www.suse.com/security/cve/CVE-2024-36947.html
* https://www.suse.com/security/cve/CVE-2024-36950.html
* https://www.suse.com/security/cve/CVE-2024-36952.html
* https://www.suse.com/security/cve/CVE-2024-36955.html
* https://www.suse.com/security/cve/CVE-2024-36959.html
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1141539
* https://bugzilla.suse.com/show_bug.cgi?id=1174585
* https://bugzilla.suse.com/show_bug.cgi?id=1181674
* https://bugzilla.suse.com/show_bug.cgi?id=1187716
* https://bugzilla.suse.com/show_bug.cgi?id=1190569
* https://bugzilla.suse.com/show_bug.cgi?id=1191949
* https://bugzilla.suse.com/show_bug.cgi?id=1192107
* https://bugzilla.suse.com/show_bug.cgi?id=1193983
* https://bugzilla.suse.com/show_bug.cgi?id=1194288
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1196956
* https://bugzilla.suse.com/show_bug.cgi?id=1197915
* https://bugzilla.suse.com/show_bug.cgi?id=1200465
* https://bugzilla.suse.com/show_bug.cgi?id=1205205
* https://bugzilla.suse.com/show_bug.cgi?id=1207284
* https://bugzilla.suse.com/show_bug.cgi?id=1207361
* https://bugzilla.suse.com/show_bug.cgi?id=1207948
* https://bugzilla.suse.com/show_bug.cgi?id=1208149
* https://bugzilla.suse.com/show_bug.cgi?id=1209657
* https://bugzilla.suse.com/show_bug.cgi?id=1209799
* https://bugzilla.suse.com/show_bug.cgi?id=1209834
* https://bugzilla.suse.com/show_bug.cgi?id=1209980
* https://bugzilla.suse.com/show_bug.cgi?id=1210335
* https://bugzilla.suse.com/show_bug.cgi?id=1213863
* https://bugzilla.suse.com/show_bug.cgi?id=1214852
* https://bugzilla.suse.com/show_bug.cgi?id=1215322
* https://bugzilla.suse.com/show_bug.cgi?id=1215702
* https://bugzilla.suse.com/show_bug.cgi?id=1216358
* https://bugzilla.suse.com/show_bug.cgi?id=1216702
* https://bugzilla.suse.com/show_bug.cgi?id=1217169
* https://bugzilla.suse.com/show_bug.cgi?id=1217339
* https://bugzilla.suse.com/show_bug.cgi?id=1217515
* https://bugzilla.suse.com/show_bug.cgi?id=1218447
* https://bugzilla.suse.com/show_bug.cgi?id=1220021
* https://bugzilla.suse.com/show_bug.cgi?id=1220267
* https://bugzilla.suse.com/show_bug.cgi?id=1220363
* https://bugzilla.suse.com/show_bug.cgi?id=1220783
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221081
* https://bugzilla.suse.com/show_bug.cgi?id=1221615
* https://bugzilla.suse.com/show_bug.cgi?id=1221777
* https://bugzilla.suse.com/show_bug.cgi?id=1221816
* https://bugzilla.suse.com/show_bug.cgi?id=1221829
* https://bugzilla.suse.com/show_bug.cgi?id=1222011
* https://bugzilla.suse.com/show_bug.cgi?id=1222374
* https://bugzilla.suse.com/show_bug.cgi?id=1222385
* https://bugzilla.suse.com/show_bug.cgi?id=1222413
* https://bugzilla.suse.com/show_bug.cgi?id=1222464
* https://bugzilla.suse.com/show_bug.cgi?id=1222513
* https://bugzilla.suse.com/show_bug.cgi?id=1222559
* https://bugzilla.suse.com/show_bug.cgi?id=1222561
* https://bugzilla.suse.com/show_bug.cgi?id=1222608
* https://bugzilla.suse.com/show_bug.cgi?id=1222619
* https://bugzilla.suse.com/show_bug.cgi?id=1222627
* https://bugzilla.suse.com/show_bug.cgi?id=1222721
* https://bugzilla.suse.com/show_bug.cgi?id=1222765
* https://bugzilla.suse.com/show_bug.cgi?id=1222770
* https://bugzilla.suse.com/show_bug.cgi?id=1222783
* https://bugzilla.suse.com/show_bug.cgi?id=1222793
* https://bugzilla.suse.com/show_bug.cgi?id=1222838
* https://bugzilla.suse.com/show_bug.cgi?id=1222870
* https://bugzilla.suse.com/show_bug.cgi?id=1222893
* https://bugzilla.suse.com/show_bug.cgi?id=1222960
* https://bugzilla.suse.com/show_bug.cgi?id=1222961
* https://bugzilla.suse.com/show_bug.cgi?id=1222974
* https://bugzilla.suse.com/show_bug.cgi?id=1222975
* https://bugzilla.suse.com/show_bug.cgi?id=1222976
* https://bugzilla.suse.com/show_bug.cgi?id=1223011
* https://bugzilla.suse.com/show_bug.cgi?id=1223023
* https://bugzilla.suse.com/show_bug.cgi?id=1223027
* https://bugzilla.suse.com/show_bug.cgi?id=1223031
* https://bugzilla.suse.com/show_bug.cgi?id=1223043
* https://bugzilla.suse.com/show_bug.cgi?id=1223046
* https://bugzilla.suse.com/show_bug.cgi?id=1223048
* https://bugzilla.suse.com/show_bug.cgi?id=1223049
* https://bugzilla.suse.com/show_bug.cgi?id=1223084
* https://bugzilla.suse.com/show_bug.cgi?id=1223113
* https://bugzilla.suse.com/show_bug.cgi?id=1223119
* https://bugzilla.suse.com/show_bug.cgi?id=1223137
* https://bugzilla.suse.com/show_bug.cgi?id=1223138
* https://bugzilla.suse.com/show_bug.cgi?id=1223140
* https://bugzilla.suse.com/show_bug.cgi?id=1223188
* https://bugzilla.suse.com/show_bug.cgi?id=1223203
* https://bugzilla.suse.com/show_bug.cgi?id=1223207
* https://bugzilla.suse.com/show_bug.cgi?id=1223315
* https://bugzilla.suse.com/show_bug.cgi?id=1223360
* https://bugzilla.suse.com/show_bug.cgi?id=1223384
* https://bugzilla.suse.com/show_bug.cgi?id=1223390
* https://bugzilla.suse.com/show_bug.cgi?id=1223432
* https://bugzilla.suse.com/show_bug.cgi?id=1223489
* https://bugzilla.suse.com/show_bug.cgi?id=1223505
* https://bugzilla.suse.com/show_bug.cgi?id=1223532
* https://bugzilla.suse.com/show_bug.cgi?id=1223575
* https://bugzilla.suse.com/show_bug.cgi?id=1223595
* https://bugzilla.suse.com/show_bug.cgi?id=1223626
* https://bugzilla.suse.com/show_bug.cgi?id=1223627
* https://bugzilla.suse.com/show_bug.cgi?id=1223628
* https://bugzilla.suse.com/show_bug.cgi?id=1223631
* https://bugzilla.suse.com/show_bug.cgi?id=1223633
* https://bugzilla.suse.com/show_bug.cgi?id=1223638
* https://bugzilla.suse.com/show_bug.cgi?id=1223650
* https://bugzilla.suse.com/show_bug.cgi?id=1223653
* https://bugzilla.suse.com/show_bug.cgi?id=1223666
* https://bugzilla.suse.com/show_bug.cgi?id=1223670
* https://bugzilla.suse.com/show_bug.cgi?id=1223671
* https://bugzilla.suse.com/show_bug.cgi?id=1223675
* https://bugzilla.suse.com/show_bug.cgi?id=1223677
* https://bugzilla.suse.com/show_bug.cgi?id=1223678
* https://bugzilla.suse.com/show_bug.cgi?id=1223679
* https://bugzilla.suse.com/show_bug.cgi?id=1223698
* https://bugzilla.suse.com/show_bug.cgi?id=1223712
* https://bugzilla.suse.com/show_bug.cgi?id=1223715
* https://bugzilla.suse.com/show_bug.cgi?id=1223717
* https://bugzilla.suse.com/show_bug.cgi?id=1223718
* https://bugzilla.suse.com/show_bug.cgi?id=1223737
* https://bugzilla.suse.com/show_bug.cgi?id=1223738
* https://bugzilla.suse.com/show_bug.cgi?id=1223741
* https://bugzilla.suse.com/show_bug.cgi?id=1223744
* https://bugzilla.suse.com/show_bug.cgi?id=1223747
* https://bugzilla.suse.com/show_bug.cgi?id=1223748
* https://bugzilla.suse.com/show_bug.cgi?id=1223750
* https://bugzilla.suse.com/show_bug.cgi?id=1223752
* https://bugzilla.suse.com/show_bug.cgi?id=1223754
* https://bugzilla.suse.com/show_bug.cgi?id=1223756
* https://bugzilla.suse.com/show_bug.cgi?id=1223757
* https://bugzilla.suse.com/show_bug.cgi?id=1223762
* https://bugzilla.suse.com/show_bug.cgi?id=1223769
* https://bugzilla.suse.com/show_bug.cgi?id=1223770
* https://bugzilla.suse.com/show_bug.cgi?id=1223779
* https://bugzilla.suse.com/show_bug.cgi?id=1223780
* https://bugzilla.suse.com/show_bug.cgi?id=1223781
* https://bugzilla.suse.com/show_bug.cgi?id=1223788
* https://bugzilla.suse.com/show_bug.cgi?id=1223802
* https://bugzilla.suse.com/show_bug.cgi?id=1223819
* https://bugzilla.suse.com/show_bug.cgi?id=1223823
* https://bugzilla.suse.com/show_bug.cgi?id=1223826
* https://bugzilla.suse.com/show_bug.cgi?id=1223828
* https://bugzilla.suse.com/show_bug.cgi?id=1223829
* https://bugzilla.suse.com/show_bug.cgi?id=1223837
* https://bugzilla.suse.com/show_bug.cgi?id=1223842
* https://bugzilla.suse.com/show_bug.cgi?id=1223843
* https://bugzilla.suse.com/show_bug.cgi?id=1223844
* https://bugzilla.suse.com/show_bug.cgi?id=1223847
* https://bugzilla.suse.com/show_bug.cgi?id=1223858
* https://bugzilla.suse.com/show_bug.cgi?id=1223875
* https://bugzilla.suse.com/show_bug.cgi?id=1223879
* https://bugzilla.suse.com/show_bug.cgi?id=1223895
* https://bugzilla.suse.com/show_bug.cgi?id=1223959
* https://bugzilla.suse.com/show_bug.cgi?id=1223961
* https://bugzilla.suse.com/show_bug.cgi?id=1223991
* https://bugzilla.suse.com/show_bug.cgi?id=1223996
* https://bugzilla.suse.com/show_bug.cgi?id=1224020
* https://bugzilla.suse.com/show_bug.cgi?id=1224076
* https://bugzilla.suse.com/show_bug.cgi?id=1224096
* https://bugzilla.suse.com/show_bug.cgi?id=1224098
* https://bugzilla.suse.com/show_bug.cgi?id=1224099
* https://bugzilla.suse.com/show_bug.cgi?id=1224137
* https://bugzilla.suse.com/show_bug.cgi?id=1224166
* https://bugzilla.suse.com/show_bug.cgi?id=1224174
* https://bugzilla.suse.com/show_bug.cgi?id=1224177
* https://bugzilla.suse.com/show_bug.cgi?id=1224180
* https://bugzilla.suse.com/show_bug.cgi?id=1224181
* https://bugzilla.suse.com/show_bug.cgi?id=1224187
* https://bugzilla.suse.com/show_bug.cgi?id=1224331
* https://bugzilla.suse.com/show_bug.cgi?id=1224346
* https://bugzilla.suse.com/show_bug.cgi?id=1224423
* https://bugzilla.suse.com/show_bug.cgi?id=1224432
* https://bugzilla.suse.com/show_bug.cgi?id=1224437
* https://bugzilla.suse.com/show_bug.cgi?id=1224438
* https://bugzilla.suse.com/show_bug.cgi?id=1224442
* https://bugzilla.suse.com/show_bug.cgi?id=1224443
* https://bugzilla.suse.com/show_bug.cgi?id=1224445
* https://bugzilla.suse.com/show_bug.cgi?id=1224449
* https://bugzilla.suse.com/show_bug.cgi?id=1224479
* https://bugzilla.suse.com/show_bug.cgi?id=1224482
* https://bugzilla.suse.com/show_bug.cgi?id=1224487
* https://bugzilla.suse.com/show_bug.cgi?id=1224488
* https://bugzilla.suse.com/show_bug.cgi?id=1224492
* https://bugzilla.suse.com/show_bug.cgi?id=1224494
* https://bugzilla.suse.com/show_bug.cgi?id=1224495
* https://bugzilla.suse.com/show_bug.cgi?id=1224502
* https://bugzilla.suse.com/show_bug.cgi?id=1224508
* https://bugzilla.suse.com/show_bug.cgi?id=1224509
* https://bugzilla.suse.com/show_bug.cgi?id=1224511
* https://bugzilla.suse.com/show_bug.cgi?id=1224519
* https://bugzilla.suse.com/show_bug.cgi?id=1224524
* https://bugzilla.suse.com/show_bug.cgi?id=1224525
* https://bugzilla.suse.com/show_bug.cgi?id=1224530
* https://bugzilla.suse.com/show_bug.cgi?id=1224531
* https://bugzilla.suse.com/show_bug.cgi?id=1224534
* https://bugzilla.suse.com/show_bug.cgi?id=1224535
* https://bugzilla.suse.com/show_bug.cgi?id=1224537
* https://bugzilla.suse.com/show_bug.cgi?id=1224541
* https://bugzilla.suse.com/show_bug.cgi?id=1224543
* https://bugzilla.suse.com/show_bug.cgi?id=1224549
* https://bugzilla.suse.com/show_bug.cgi?id=1224550
* https://bugzilla.suse.com/show_bug.cgi?id=1224558
* https://bugzilla.suse.com/show_bug.cgi?id=1224559
* https://bugzilla.suse.com/show_bug.cgi?id=1224566
* https://bugzilla.suse.com/show_bug.cgi?id=1224567
* https://bugzilla.suse.com/show_bug.cgi?id=1224571
* https://bugzilla.suse.com/show_bug.cgi?id=1224575
* https://bugzilla.suse.com/show_bug.cgi?id=1224576
* https://bugzilla.suse.com/show_bug.cgi?id=1224579
* https://bugzilla.suse.com/show_bug.cgi?id=1224580
* https://bugzilla.suse.com/show_bug.cgi?id=1224581
* https://bugzilla.suse.com/show_bug.cgi?id=1224582
* https://bugzilla.suse.com/show_bug.cgi?id=1224586
* https://bugzilla.suse.com/show_bug.cgi?id=1224587
* https://bugzilla.suse.com/show_bug.cgi?id=1224592
* https://bugzilla.suse.com/show_bug.cgi?id=1224598
* https://bugzilla.suse.com/show_bug.cgi?id=1224601
* https://bugzilla.suse.com/show_bug.cgi?id=1224607
* https://bugzilla.suse.com/show_bug.cgi?id=1224608
* https://bugzilla.suse.com/show_bug.cgi?id=1224611
* https://bugzilla.suse.com/show_bug.cgi?id=1224615
* https://bugzilla.suse.com/show_bug.cgi?id=1224617
* https://bugzilla.suse.com/show_bug.cgi?id=1224618
* https://bugzilla.suse.com/show_bug.cgi?id=1224621
* https://bugzilla.suse.com/show_bug.cgi?id=1224622
* https://bugzilla.suse.com/show_bug.cgi?id=1224624
* https://bugzilla.suse.com/show_bug.cgi?id=1224627
* https://bugzilla.suse.com/show_bug.cgi?id=1224628
* https://bugzilla.suse.com/show_bug.cgi?id=1224629
* https://bugzilla.suse.com/show_bug.cgi?id=1224632
* https://bugzilla.suse.com/show_bug.cgi?id=1224636
* https://bugzilla.suse.com/show_bug.cgi?id=1224637
* https://bugzilla.suse.com/show_bug.cgi?id=1224638
* https://bugzilla.suse.com/show_bug.cgi?id=1224640
* https://bugzilla.suse.com/show_bug.cgi?id=1224643
* https://bugzilla.suse.com/show_bug.cgi?id=1224644
* https://bugzilla.suse.com/show_bug.cgi?id=1224645
* https://bugzilla.suse.com/show_bug.cgi?id=1224647
* https://bugzilla.suse.com/show_bug.cgi?id=1224648
* https://bugzilla.suse.com/show_bug.cgi?id=1224649
* https://bugzilla.suse.com/show_bug.cgi?id=1224650
* https://bugzilla.suse.com/show_bug.cgi?id=1224651
* https://bugzilla.suse.com/show_bug.cgi?id=1224657
* https://bugzilla.suse.com/show_bug.cgi?id=1224659
* https://bugzilla.suse.com/show_bug.cgi?id=1224660
* https://bugzilla.suse.com/show_bug.cgi?id=1224663
* https://bugzilla.suse.com/show_bug.cgi?id=1224664
* https://bugzilla.suse.com/show_bug.cgi?id=1224665
* https://bugzilla.suse.com/show_bug.cgi?id=1224666
* https://bugzilla.suse.com/show_bug.cgi?id=1224667
* https://bugzilla.suse.com/show_bug.cgi?id=1224668
* https://bugzilla.suse.com/show_bug.cgi?id=1224671
* https://bugzilla.suse.com/show_bug.cgi?id=1224672
* https://bugzilla.suse.com/show_bug.cgi?id=1224676
* https://bugzilla.suse.com/show_bug.cgi?id=1224678
* https://bugzilla.suse.com/show_bug.cgi?id=1224679
* https://bugzilla.suse.com/show_bug.cgi?id=1224680
* https://bugzilla.suse.com/show_bug.cgi?id=1224681
* https://bugzilla.suse.com/show_bug.cgi?id=1224682
* https://bugzilla.suse.com/show_bug.cgi?id=1224685
* https://bugzilla.suse.com/show_bug.cgi?id=1224686
* https://bugzilla.suse.com/show_bug.cgi?id=1224692
* https://bugzilla.suse.com/show_bug.cgi?id=1224697
* https://bugzilla.suse.com/show_bug.cgi?id=1224699
* https://bugzilla.suse.com/show_bug.cgi?id=1224701
* https://bugzilla.suse.com/show_bug.cgi?id=1224703
* https://bugzilla.suse.com/show_bug.cgi?id=1224705
* https://bugzilla.suse.com/show_bug.cgi?id=1224707
* https://bugzilla.suse.com/show_bug.cgi?id=1224717
* https://bugzilla.suse.com/show_bug.cgi?id=1224718
* https://bugzilla.suse.com/show_bug.cgi?id=1224721
* https://bugzilla.suse.com/show_bug.cgi?id=1224722
* https://bugzilla.suse.com/show_bug.cgi?id=1224723
* https://bugzilla.suse.com/show_bug.cgi?id=1224725
* https://bugzilla.suse.com/show_bug.cgi?id=1224727
* https://bugzilla.suse.com/show_bug.cgi?id=1224728
* https://bugzilla.suse.com/show_bug.cgi?id=1224729
* https://bugzilla.suse.com/show_bug.cgi?id=1224730
* https://bugzilla.suse.com/show_bug.cgi?id=1224731
* https://bugzilla.suse.com/show_bug.cgi?id=1224732
* https://bugzilla.suse.com/show_bug.cgi?id=1224733
* https://bugzilla.suse.com/show_bug.cgi?id=1224736
* https://bugzilla.suse.com/show_bug.cgi?id=1224738
* https://bugzilla.suse.com/show_bug.cgi?id=1224739
* https://bugzilla.suse.com/show_bug.cgi?id=1224740
* https://bugzilla.suse.com/show_bug.cgi?id=1224747
* https://bugzilla.suse.com/show_bug.cgi?id=1224749
* https://bugzilla.suse.com/show_bug.cgi?id=1224759
* https://bugzilla.suse.com/show_bug.cgi?id=1224763
* https://bugzilla.suse.com/show_bug.cgi?id=1224764
* https://bugzilla.suse.com/show_bug.cgi?id=1224765
* https://bugzilla.suse.com/show_bug.cgi?id=1224766
* https://bugzilla.suse.com/show_bug.cgi?id=1224794
* https://bugzilla.suse.com/show_bug.cgi?id=1224795
* https://bugzilla.suse.com/show_bug.cgi?id=1224796
* https://bugzilla.suse.com/show_bug.cgi?id=1224803
* https://bugzilla.suse.com/show_bug.cgi?id=1224816
* https://bugzilla.suse.com/show_bug.cgi?id=1224895
* https://bugzilla.suse.com/show_bug.cgi?id=1224898
* https://bugzilla.suse.com/show_bug.cgi?id=1224900
* https://bugzilla.suse.com/show_bug.cgi?id=1224901
* https://bugzilla.suse.com/show_bug.cgi?id=1224902
* https://bugzilla.suse.com/show_bug.cgi?id=1224903
* https://bugzilla.suse.com/show_bug.cgi?id=1224904
* https://bugzilla.suse.com/show_bug.cgi?id=1224905
* https://bugzilla.suse.com/show_bug.cgi?id=1224907
* https://bugzilla.suse.com/show_bug.cgi?id=1224909
* https://bugzilla.suse.com/show_bug.cgi?id=1224910
* https://bugzilla.suse.com/show_bug.cgi?id=1224911
* https://bugzilla.suse.com/show_bug.cgi?id=1224912
* https://bugzilla.suse.com/show_bug.cgi?id=1224913
* https://bugzilla.suse.com/show_bug.cgi?id=1224914
* https://bugzilla.suse.com/show_bug.cgi?id=1224915
* https://bugzilla.suse.com/show_bug.cgi?id=1224920
* https://bugzilla.suse.com/show_bug.cgi?id=1224928
* https://bugzilla.suse.com/show_bug.cgi?id=1224929
* https://bugzilla.suse.com/show_bug.cgi?id=1224930
* https://bugzilla.suse.com/show_bug.cgi?id=1224931
* https://bugzilla.suse.com/show_bug.cgi?id=1224932
* https://bugzilla.suse.com/show_bug.cgi?id=1224936
* https://bugzilla.suse.com/show_bug.cgi?id=1224937
* https://bugzilla.suse.com/show_bug.cgi?id=1224941
* https://bugzilla.suse.com/show_bug.cgi?id=1224942
* https://bugzilla.suse.com/show_bug.cgi?id=1224944
* https://bugzilla.suse.com/show_bug.cgi?id=1224945
* https://bugzilla.suse.com/show_bug.cgi?id=1224947
* https://bugzilla.suse.com/show_bug.cgi?id=1224956
* https://bugzilla.suse.com/show_bug.cgi?id=1224988
* https://bugzilla.suse.com/show_bug.cgi?id=1224992
* https://bugzilla.suse.com/show_bug.cgi?id=1225000
* https://bugzilla.suse.com/show_bug.cgi?id=1225003
* https://bugzilla.suse.com/show_bug.cgi?id=1225005
* https://bugzilla.suse.com/show_bug.cgi?id=1225008
* https://bugzilla.suse.com/show_bug.cgi?id=1225009
* https://bugzilla.suse.com/show_bug.cgi?id=1225022
* https://bugzilla.suse.com/show_bug.cgi?id=1225031
* https://bugzilla.suse.com/show_bug.cgi?id=1225032
* https://bugzilla.suse.com/show_bug.cgi?id=1225036
* https://bugzilla.suse.com/show_bug.cgi?id=1225041
* https://bugzilla.suse.com/show_bug.cgi?id=1225044
* https://bugzilla.suse.com/show_bug.cgi?id=1225053
* https://bugzilla.suse.com/show_bug.cgi?id=1225076
* https://bugzilla.suse.com/show_bug.cgi?id=1225077
* https://bugzilla.suse.com/show_bug.cgi?id=1225082
* https://bugzilla.suse.com/show_bug.cgi?id=1225085
* https://bugzilla.suse.com/show_bug.cgi?id=1225086
* https://bugzilla.suse.com/show_bug.cgi?id=1225092
* https://bugzilla.suse.com/show_bug.cgi?id=1225095
* https://bugzilla.suse.com/show_bug.cgi?id=1225096
* https://bugzilla.suse.com/show_bug.cgi?id=1225097
* https://bugzilla.suse.com/show_bug.cgi?id=1225106
* https://bugzilla.suse.com/show_bug.cgi?id=1225108
* https://bugzilla.suse.com/show_bug.cgi?id=1225109
* https://bugzilla.suse.com/show_bug.cgi?id=1225114
* https://bugzilla.suse.com/show_bug.cgi?id=1225118
* https://bugzilla.suse.com/show_bug.cgi?id=1225121
* https://bugzilla.suse.com/show_bug.cgi?id=1225122
* https://bugzilla.suse.com/show_bug.cgi?id=1225123
* https://bugzilla.suse.com/show_bug.cgi?id=1225125
* https://bugzilla.suse.com/show_bug.cgi?id=1225126
* https://bugzilla.suse.com/show_bug.cgi?id=1225127
* https://bugzilla.suse.com/show_bug.cgi?id=1225129
* https://bugzilla.suse.com/show_bug.cgi?id=1225131
* https://bugzilla.suse.com/show_bug.cgi?id=1225132
* https://bugzilla.suse.com/show_bug.cgi?id=1225138
* https://bugzilla.suse.com/show_bug.cgi?id=1225139
* https://bugzilla.suse.com/show_bug.cgi?id=1225145
* https://bugzilla.suse.com/show_bug.cgi?id=1225151
* https://bugzilla.suse.com/show_bug.cgi?id=1225153
* https://bugzilla.suse.com/show_bug.cgi?id=1225156
* https://bugzilla.suse.com/show_bug.cgi?id=1225158
* https://bugzilla.suse.com/show_bug.cgi?id=1225160
* https://bugzilla.suse.com/show_bug.cgi?id=1225161
* https://bugzilla.suse.com/show_bug.cgi?id=1225164
* https://bugzilla.suse.com/show_bug.cgi?id=1225167
* https://bugzilla.suse.com/show_bug.cgi?id=1225180
* https://bugzilla.suse.com/show_bug.cgi?id=1225183
* https://bugzilla.suse.com/show_bug.cgi?id=1225184
* https://bugzilla.suse.com/show_bug.cgi?id=1225186
* https://bugzilla.suse.com/show_bug.cgi?id=1225187
* https://bugzilla.suse.com/show_bug.cgi?id=1225189
* https://bugzilla.suse.com/show_bug.cgi?id=1225190
* https://bugzilla.suse.com/show_bug.cgi?id=1225191
* https://bugzilla.suse.com/show_bug.cgi?id=1225192
* https://bugzilla.suse.com/show_bug.cgi?id=1225193
* https://bugzilla.suse.com/show_bug.cgi?id=1225195
* https://bugzilla.suse.com/show_bug.cgi?id=1225198
* https://bugzilla.suse.com/show_bug.cgi?id=1225201
* https://bugzilla.suse.com/show_bug.cgi?id=1225203
* https://bugzilla.suse.com/show_bug.cgi?id=1225205
* https://bugzilla.suse.com/show_bug.cgi?id=1225206
* https://bugzilla.suse.com/show_bug.cgi?id=1225207
* https://bugzilla.suse.com/show_bug.cgi?id=1225208
* https://bugzilla.suse.com/show_bug.cgi?id=1225209
* https://bugzilla.suse.com/show_bug.cgi?id=1225210
* https://bugzilla.suse.com/show_bug.cgi?id=1225214
* https://bugzilla.suse.com/show_bug.cgi?id=1225222
* https://bugzilla.suse.com/show_bug.cgi?id=1225223
* https://bugzilla.suse.com/show_bug.cgi?id=1225224
* https://bugzilla.suse.com/show_bug.cgi?id=1225225
* https://bugzilla.suse.com/show_bug.cgi?id=1225227
* https://bugzilla.suse.com/show_bug.cgi?id=1225228
* https://bugzilla.suse.com/show_bug.cgi?id=1225229
* https://bugzilla.suse.com/show_bug.cgi?id=1225230
* https://bugzilla.suse.com/show_bug.cgi?id=1225232
* https://bugzilla.suse.com/show_bug.cgi?id=1225233
* https://bugzilla.suse.com/show_bug.cgi?id=1225235
* https://bugzilla.suse.com/show_bug.cgi?id=1225236
* https://bugzilla.suse.com/show_bug.cgi?id=1225237
* https://bugzilla.suse.com/show_bug.cgi?id=1225238
* https://bugzilla.suse.com/show_bug.cgi?id=1225239
* https://bugzilla.suse.com/show_bug.cgi?id=1225240
* https://bugzilla.suse.com/show_bug.cgi?id=1225241
* https://bugzilla.suse.com/show_bug.cgi?id=1225242
* https://bugzilla.suse.com/show_bug.cgi?id=1225243
* https://bugzilla.suse.com/show_bug.cgi?id=1225244
* https://bugzilla.suse.com/show_bug.cgi?id=1225245
* https://bugzilla.suse.com/show_bug.cgi?id=1225246
* https://bugzilla.suse.com/show_bug.cgi?id=1225247
* https://bugzilla.suse.com/show_bug.cgi?id=1225248
* https://bugzilla.suse.com/show_bug.cgi?id=1225249
* https://bugzilla.suse.com/show_bug.cgi?id=1225250
* https://bugzilla.suse.com/show_bug.cgi?id=1225251
* https://bugzilla.suse.com/show_bug.cgi?id=1225252
* https://bugzilla.suse.com/show_bug.cgi?id=1225253
* https://bugzilla.suse.com/show_bug.cgi?id=1225254
* https://bugzilla.suse.com/show_bug.cgi?id=1225255
* https://bugzilla.suse.com/show_bug.cgi?id=1225256
* https://bugzilla.suse.com/show_bug.cgi?id=1225257
* https://bugzilla.suse.com/show_bug.cgi?id=1225258
* https://bugzilla.suse.com/show_bug.cgi?id=1225259
* https://bugzilla.suse.com/show_bug.cgi?id=1225260
* https://bugzilla.suse.com/show_bug.cgi?id=1225261
* https://bugzilla.suse.com/show_bug.cgi?id=1225262
* https://bugzilla.suse.com/show_bug.cgi?id=1225263
* https://bugzilla.suse.com/show_bug.cgi?id=1225268
* https://bugzilla.suse.com/show_bug.cgi?id=1225301
* https://bugzilla.suse.com/show_bug.cgi?id=1225303
* https://bugzilla.suse.com/show_bug.cgi?id=1225304
* https://bugzilla.suse.com/show_bug.cgi?id=1225306
* https://bugzilla.suse.com/show_bug.cgi?id=1225316
* https://bugzilla.suse.com/show_bug.cgi?id=1225318
* https://bugzilla.suse.com/show_bug.cgi?id=1225320
* https://bugzilla.suse.com/show_bug.cgi?id=1225321
* https://bugzilla.suse.com/show_bug.cgi?id=1225322
* https://bugzilla.suse.com/show_bug.cgi?id=1225323
* https://bugzilla.suse.com/show_bug.cgi?id=1225326
* https://bugzilla.suse.com/show_bug.cgi?id=1225327
* https://bugzilla.suse.com/show_bug.cgi?id=1225328
* https://bugzilla.suse.com/show_bug.cgi?id=1225329
* https://bugzilla.suse.com/show_bug.cgi?id=1225330
* https://bugzilla.suse.com/show_bug.cgi?id=1225331
* https://bugzilla.suse.com/show_bug.cgi?id=1225332
* https://bugzilla.suse.com/show_bug.cgi?id=1225333
* https://bugzilla.suse.com/show_bug.cgi?id=1225334
* https://bugzilla.suse.com/show_bug.cgi?id=1225335
* https://bugzilla.suse.com/show_bug.cgi?id=1225336
* https://bugzilla.suse.com/show_bug.cgi?id=1225337
* https://bugzilla.suse.com/show_bug.cgi?id=1225338
* https://bugzilla.suse.com/show_bug.cgi?id=1225339
* https://bugzilla.suse.com/show_bug.cgi?id=1225341
* https://bugzilla.suse.com/show_bug.cgi?id=1225342
* https://bugzilla.suse.com/show_bug.cgi?id=1225344
* https://bugzilla.suse.com/show_bug.cgi?id=1225346
* https://bugzilla.suse.com/show_bug.cgi?id=1225347
* https://bugzilla.suse.com/show_bug.cgi?id=1225351
* https://bugzilla.suse.com/show_bug.cgi?id=1225353
* https://bugzilla.suse.com/show_bug.cgi?id=1225354
* https://bugzilla.suse.com/show_bug.cgi?id=1225355
* https://bugzilla.suse.com/show_bug.cgi?id=1225357
* https://bugzilla.suse.com/show_bug.cgi?id=1225358
* https://bugzilla.suse.com/show_bug.cgi?id=1225360
* https://bugzilla.suse.com/show_bug.cgi?id=1225361
* https://bugzilla.suse.com/show_bug.cgi?id=1225366
* https://bugzilla.suse.com/show_bug.cgi?id=1225367
* https://bugzilla.suse.com/show_bug.cgi?id=1225368
* https://bugzilla.suse.com/show_bug.cgi?id=1225369
* https://bugzilla.suse.com/show_bug.cgi?id=1225370
* https://bugzilla.suse.com/show_bug.cgi?id=1225372
* https://bugzilla.suse.com/show_bug.cgi?id=1225373
* https://bugzilla.suse.com/show_bug.cgi?id=1225374
* https://bugzilla.suse.com/show_bug.cgi?id=1225375
* https://bugzilla.suse.com/show_bug.cgi?id=1225376
* https://bugzilla.suse.com/show_bug.cgi?id=1225377
* https://bugzilla.suse.com/show_bug.cgi?id=1225379
* https://bugzilla.suse.com/show_bug.cgi?id=1225380
* https://bugzilla.suse.com/show_bug.cgi?id=1225382
* https://bugzilla.suse.com/show_bug.cgi?id=1225383
* https://bugzilla.suse.com/show_bug.cgi?id=1225384
* https://bugzilla.suse.com/show_bug.cgi?id=1225386
* https://bugzilla.suse.com/show_bug.cgi?id=1225387
* https://bugzilla.suse.com/show_bug.cgi?id=1225388
* https://bugzilla.suse.com/show_bug.cgi?id=1225390
* https://bugzilla.suse.com/show_bug.cgi?id=1225392
* https://bugzilla.suse.com/show_bug.cgi?id=1225393
* https://bugzilla.suse.com/show_bug.cgi?id=1225396
* https://bugzilla.suse.com/show_bug.cgi?id=1225400
* https://bugzilla.suse.com/show_bug.cgi?id=1225404
* https://bugzilla.suse.com/show_bug.cgi?id=1225405
* https://bugzilla.suse.com/show_bug.cgi?id=1225408
* https://bugzilla.suse.com/show_bug.cgi?id=1225409
* https://bugzilla.suse.com/show_bug.cgi?id=1225410
* https://bugzilla.suse.com/show_bug.cgi?id=1225411
* https://bugzilla.suse.com/show_bug.cgi?id=1225424
* https://bugzilla.suse.com/show_bug.cgi?id=1225425
* https://bugzilla.suse.com/show_bug.cgi?id=1225427
* https://bugzilla.suse.com/show_bug.cgi?id=1225431
* https://bugzilla.suse.com/show_bug.cgi?id=1225435
* https://bugzilla.suse.com/show_bug.cgi?id=1225436
* https://bugzilla.suse.com/show_bug.cgi?id=1225437
* https://bugzilla.suse.com/show_bug.cgi?id=1225438
* https://bugzilla.suse.com/show_bug.cgi?id=1225439
* https://bugzilla.suse.com/show_bug.cgi?id=1225441
* https://bugzilla.suse.com/show_bug.cgi?id=1225442
* https://bugzilla.suse.com/show_bug.cgi?id=1225443
* https://bugzilla.suse.com/show_bug.cgi?id=1225444
* https://bugzilla.suse.com/show_bug.cgi?id=1225445
* https://bugzilla.suse.com/show_bug.cgi?id=1225446
* https://bugzilla.suse.com/show_bug.cgi?id=1225447
* https://bugzilla.suse.com/show_bug.cgi?id=1225450
* https://bugzilla.suse.com/show_bug.cgi?id=1225453
* https://bugzilla.suse.com/show_bug.cgi?id=1225455
* https://bugzilla.suse.com/show_bug.cgi?id=1225461
* https://bugzilla.suse.com/show_bug.cgi?id=1225463
* https://bugzilla.suse.com/show_bug.cgi?id=1225464
* https://bugzilla.suse.com/show_bug.cgi?id=1225466
* https://bugzilla.suse.com/show_bug.cgi?id=1225467
* https://bugzilla.suse.com/show_bug.cgi?id=1225468
* https://bugzilla.suse.com/show_bug.cgi?id=1225471
* https://bugzilla.suse.com/show_bug.cgi?id=1225472
* https://bugzilla.suse.com/show_bug.cgi?id=1225478
* https://bugzilla.suse.com/show_bug.cgi?id=1225479
* https://bugzilla.suse.com/show_bug.cgi?id=1225480
* https://bugzilla.suse.com/show_bug.cgi?id=1225482
* https://bugzilla.suse.com/show_bug.cgi?id=1225483
* https://bugzilla.suse.com/show_bug.cgi?id=1225486
* https://bugzilla.suse.com/show_bug.cgi?id=1225488
* https://bugzilla.suse.com/show_bug.cgi?id=1225490
* https://bugzilla.suse.com/show_bug.cgi?id=1225492
* https://bugzilla.suse.com/show_bug.cgi?id=1225495
* https://bugzilla.suse.com/show_bug.cgi?id=1225499
* https://bugzilla.suse.com/show_bug.cgi?id=1225500
* https://bugzilla.suse.com/show_bug.cgi?id=1225501
* https://bugzilla.suse.com/show_bug.cgi?id=1225502
* https://bugzilla.suse.com/show_bug.cgi?id=1225506
* https://bugzilla.suse.com/show_bug.cgi?id=1225508
* https://bugzilla.suse.com/show_bug.cgi?id=1225510
* https://bugzilla.suse.com/show_bug.cgi?id=1225513
* https://bugzilla.suse.com/show_bug.cgi?id=1225515
* https://bugzilla.suse.com/show_bug.cgi?id=1225529
* https://bugzilla.suse.com/show_bug.cgi?id=1225530
* https://bugzilla.suse.com/show_bug.cgi?id=1225532
* https://bugzilla.suse.com/show_bug.cgi?id=1225534
* https://bugzilla.suse.com/show_bug.cgi?id=1225535
* https://bugzilla.suse.com/show_bug.cgi?id=1225548
* https://bugzilla.suse.com/show_bug.cgi?id=1225549
* https://bugzilla.suse.com/show_bug.cgi?id=1225550
* https://bugzilla.suse.com/show_bug.cgi?id=1225553
* https://bugzilla.suse.com/show_bug.cgi?id=1225554
* https://bugzilla.suse.com/show_bug.cgi?id=1225555
* https://bugzilla.suse.com/show_bug.cgi?id=1225556
* https://bugzilla.suse.com/show_bug.cgi?id=1225557
* https://bugzilla.suse.com/show_bug.cgi?id=1225559
* https://bugzilla.suse.com/show_bug.cgi?id=1225560
* https://bugzilla.suse.com/show_bug.cgi?id=1225565
* https://bugzilla.suse.com/show_bug.cgi?id=1225566
* https://bugzilla.suse.com/show_bug.cgi?id=1225568
* https://bugzilla.suse.com/show_bug.cgi?id=1225569
* https://bugzilla.suse.com/show_bug.cgi?id=1225570
* https://bugzilla.suse.com/show_bug.cgi?id=1225571
* https://bugzilla.suse.com/show_bug.cgi?id=1225572
* https://bugzilla.suse.com/show_bug.cgi?id=1225577
* https://bugzilla.suse.com/show_bug.cgi?id=1225583
* https://bugzilla.suse.com/show_bug.cgi?id=1225584
* https://bugzilla.suse.com/show_bug.cgi?id=1225587
* https://bugzilla.suse.com/show_bug.cgi?id=1225588
* https://bugzilla.suse.com/show_bug.cgi?id=1225589
* https://bugzilla.suse.com/show_bug.cgi?id=1225590
* https://bugzilla.suse.com/show_bug.cgi?id=1225591
* https://bugzilla.suse.com/show_bug.cgi?id=1225592
* https://bugzilla.suse.com/show_bug.cgi?id=1225593
* https://bugzilla.suse.com/show_bug.cgi?id=1225595
* https://bugzilla.suse.com/show_bug.cgi?id=1225599
* https://bugzilla.suse.com/show_bug.cgi?id=1225616
* https://bugzilla.suse.com/show_bug.cgi?id=1225640
* https://bugzilla.suse.com/show_bug.cgi?id=1225642
* https://bugzilla.suse.com/show_bug.cgi?id=1225705
* https://bugzilla.suse.com/show_bug.cgi?id=1225708
* https://bugzilla.suse.com/show_bug.cgi?id=1225715
* https://bugzilla.suse.com/show_bug.cgi?id=1225720
* https://bugzilla.suse.com/show_bug.cgi?id=1225722
* https://bugzilla.suse.com/show_bug.cgi?id=1225734
* https://bugzilla.suse.com/show_bug.cgi?id=1225735
* https://bugzilla.suse.com/show_bug.cgi?id=1225747
* https://bugzilla.suse.com/show_bug.cgi?id=1225748
* https://bugzilla.suse.com/show_bug.cgi?id=1225756
* https://bugzilla.suse.com/show_bug.cgi?id=1225761
* https://bugzilla.suse.com/show_bug.cgi?id=1225766
* https://bugzilla.suse.com/show_bug.cgi?id=1225775
* https://bugzilla.suse.com/show_bug.cgi?id=1225810
* https://bugzilla.suse.com/show_bug.cgi?id=1225820
* https://bugzilla.suse.com/show_bug.cgi?id=1225829
* https://bugzilla.suse.com/show_bug.cgi?id=1225835
* https://bugzilla.suse.com/show_bug.cgi?id=1225842
* https://jira.suse.com/browse/PED-3259
* https://jira.suse.com/browse/PED-7167



SUSE-SU-2024:2003-1: important: Security update for cups


# Security update for cups

Announcement ID: SUSE-SU-2024:2003-1
Rating: important
References:

* bsc#1223179
* bsc#1225365

Cross-References:

* CVE-2024-35235

CVSS scores:

* CVE-2024-35235 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* Desktop Applications Module 15-SP5
* Desktop Applications Module 15-SP6
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves one vulnerability and has one security fix can now be
installed.

## Description:

This update for cups fixes the following issues:

* CVE-2024-35235: Fixed a bug in cupsd that could allow an attacker to change
the permissions of other files in the system. (bsc#1225365)
* Handle local 'Negotiate' authentication response for cli clients
(bsc#1223179)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-2003=1

* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-2003=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2003=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-2003=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2003=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2003=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2003=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2003=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-2003=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2003=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2003=1

* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-2003=1

* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2003=1

* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-2003=1

* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-2003=1

* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2003=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2003=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2003=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2003=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2003=1

* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2003=1

* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2003=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2003=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2003=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2003=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2003=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2003=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-2003=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2003=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-2003=1

* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2003=1

* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2003=1

## Package List:

* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcupsmime1-2.2.7-150000.3.59.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* cups-ddk-debuginfo-2.2.7-150000.3.59.1
* libcupscgi1-2.2.7-150000.3.59.1
* cups-2.2.7-150000.3.59.1
* libcupscgi1-debuginfo-2.2.7-150000.3.59.1
* libcupsppdc1-2.2.7-150000.3.59.1
* cups-client-debuginfo-2.2.7-150000.3.59.1
* cups-devel-2.2.7-150000.3.59.1
* cups-ddk-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* libcupsimage2-2.2.7-150000.3.59.1
* cups-client-2.2.7-150000.3.59.1
* libcupsmime1-debuginfo-2.2.7-150000.3.59.1
* libcupsimage2-debuginfo-2.2.7-150000.3.59.1
* openSUSE Leap 15.5 (x86_64)
* cups-devel-32bit-2.2.7-150000.3.59.1
* libcupscgi1-32bit-2.2.7-150000.3.59.1
* libcupsimage2-32bit-debuginfo-2.2.7-150000.3.59.1
* libcupsppdc1-32bit-2.2.7-150000.3.59.1
* libcupsppdc1-32bit-debuginfo-2.2.7-150000.3.59.1
* libcupsimage2-32bit-2.2.7-150000.3.59.1
* libcupsmime1-32bit-debuginfo-2.2.7-150000.3.59.1
* libcups2-32bit-2.2.7-150000.3.59.1
* libcupsmime1-32bit-2.2.7-150000.3.59.1
* libcupscgi1-32bit-debuginfo-2.2.7-150000.3.59.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.59.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcupsmime1-2.2.7-150000.3.59.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* cups-ddk-debuginfo-2.2.7-150000.3.59.1
* libcupscgi1-2.2.7-150000.3.59.1
* cups-2.2.7-150000.3.59.1
* libcupscgi1-debuginfo-2.2.7-150000.3.59.1
* libcupsppdc1-2.2.7-150000.3.59.1
* cups-client-debuginfo-2.2.7-150000.3.59.1
* cups-devel-2.2.7-150000.3.59.1
* cups-ddk-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* libcupsimage2-2.2.7-150000.3.59.1
* cups-client-2.2.7-150000.3.59.1
* libcupsmime1-debuginfo-2.2.7-150000.3.59.1
* libcupsimage2-debuginfo-2.2.7-150000.3.59.1
* openSUSE Leap 15.6 (x86_64)
* cups-devel-32bit-2.2.7-150000.3.59.1
* libcupscgi1-32bit-2.2.7-150000.3.59.1
* libcupsimage2-32bit-debuginfo-2.2.7-150000.3.59.1
* libcupsppdc1-32bit-2.2.7-150000.3.59.1
* libcupsppdc1-32bit-debuginfo-2.2.7-150000.3.59.1
* libcupsimage2-32bit-2.2.7-150000.3.59.1
* libcupsmime1-32bit-debuginfo-2.2.7-150000.3.59.1
* libcups2-32bit-2.2.7-150000.3.59.1
* libcupsmime1-32bit-2.2.7-150000.3.59.1
* libcupscgi1-32bit-debuginfo-2.2.7-150000.3.59.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.59.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcupsmime1-2.2.7-150000.3.59.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* libcupscgi1-2.2.7-150000.3.59.1
* cups-2.2.7-150000.3.59.1
* libcupscgi1-debuginfo-2.2.7-150000.3.59.1
* libcupsppdc1-2.2.7-150000.3.59.1
* cups-client-debuginfo-2.2.7-150000.3.59.1
* cups-devel-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* libcupsimage2-2.2.7-150000.3.59.1
* cups-client-2.2.7-150000.3.59.1
* libcupsmime1-debuginfo-2.2.7-150000.3.59.1
* libcupsimage2-debuginfo-2.2.7-150000.3.59.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcupsmime1-2.2.7-150000.3.59.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* libcupscgi1-2.2.7-150000.3.59.1
* cups-2.2.7-150000.3.59.1
* libcupscgi1-debuginfo-2.2.7-150000.3.59.1
* libcupsppdc1-2.2.7-150000.3.59.1
* cups-client-debuginfo-2.2.7-150000.3.59.1
* cups-devel-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* libcupsimage2-2.2.7-150000.3.59.1
* cups-client-2.2.7-150000.3.59.1
* libcupsmime1-debuginfo-2.2.7-150000.3.59.1
* libcupsimage2-debuginfo-2.2.7-150000.3.59.1
* Desktop Applications Module 15-SP5 (x86_64)
* libcups2-32bit-2.2.7-150000.3.59.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.59.1
* Desktop Applications Module 15-SP6 (x86_64)
* libcups2-32bit-2.2.7-150000.3.59.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.59.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-ddk-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* cups-ddk-2.2.7-150000.3.59.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-ddk-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* cups-ddk-2.2.7-150000.3.59.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcupsmime1-2.2.7-150000.3.59.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* cups-ddk-debuginfo-2.2.7-150000.3.59.1
* libcupscgi1-2.2.7-150000.3.59.1
* cups-2.2.7-150000.3.59.1
* libcupscgi1-debuginfo-2.2.7-150000.3.59.1
* libcupsppdc1-2.2.7-150000.3.59.1
* cups-client-debuginfo-2.2.7-150000.3.59.1
* cups-devel-2.2.7-150000.3.59.1
* cups-ddk-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* libcupsimage2-2.2.7-150000.3.59.1
* cups-client-2.2.7-150000.3.59.1
* libcupsmime1-debuginfo-2.2.7-150000.3.59.1
* libcupsimage2-debuginfo-2.2.7-150000.3.59.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64)
* libcups2-32bit-2.2.7-150000.3.59.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.59.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcupsmime1-2.2.7-150000.3.59.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* cups-ddk-debuginfo-2.2.7-150000.3.59.1
* libcupscgi1-2.2.7-150000.3.59.1
* cups-2.2.7-150000.3.59.1
* libcupscgi1-debuginfo-2.2.7-150000.3.59.1
* libcupsppdc1-2.2.7-150000.3.59.1
* cups-client-debuginfo-2.2.7-150000.3.59.1
* cups-devel-2.2.7-150000.3.59.1
* cups-ddk-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* libcupsimage2-2.2.7-150000.3.59.1
* cups-client-2.2.7-150000.3.59.1
* libcupsmime1-debuginfo-2.2.7-150000.3.59.1
* libcupsimage2-debuginfo-2.2.7-150000.3.59.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* libcups2-32bit-2.2.7-150000.3.59.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.59.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcupsmime1-2.2.7-150000.3.59.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* cups-ddk-debuginfo-2.2.7-150000.3.59.1
* libcupscgi1-2.2.7-150000.3.59.1
* cups-2.2.7-150000.3.59.1
* libcupscgi1-debuginfo-2.2.7-150000.3.59.1
* libcupsppdc1-2.2.7-150000.3.59.1
* cups-client-debuginfo-2.2.7-150000.3.59.1
* cups-devel-2.2.7-150000.3.59.1
* cups-ddk-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* libcupsimage2-2.2.7-150000.3.59.1
* cups-client-2.2.7-150000.3.59.1
* libcupsmime1-debuginfo-2.2.7-150000.3.59.1
* libcupsimage2-debuginfo-2.2.7-150000.3.59.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libcups2-32bit-2.2.7-150000.3.59.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.59.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcupsmime1-2.2.7-150000.3.59.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* cups-ddk-debuginfo-2.2.7-150000.3.59.1
* libcupscgi1-2.2.7-150000.3.59.1
* cups-2.2.7-150000.3.59.1
* libcupscgi1-debuginfo-2.2.7-150000.3.59.1
* libcupsppdc1-2.2.7-150000.3.59.1
* cups-client-debuginfo-2.2.7-150000.3.59.1
* cups-devel-2.2.7-150000.3.59.1
* cups-ddk-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* libcupsimage2-2.2.7-150000.3.59.1
* cups-client-2.2.7-150000.3.59.1
* libcupsmime1-debuginfo-2.2.7-150000.3.59.1
* libcupsimage2-debuginfo-2.2.7-150000.3.59.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libcups2-32bit-2.2.7-150000.3.59.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.59.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libcupscgi1-2.2.7-150000.3.59.1
* cups-client-debuginfo-2.2.7-150000.3.59.1
* cups-devel-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* libcupsimage2-2.2.7-150000.3.59.1
* cups-client-2.2.7-150000.3.59.1
* libcupsmime1-debuginfo-2.2.7-150000.3.59.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.59.1
* cups-debuginfo-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* cups-ddk-debuginfo-2.2.7-150000.3.59.1
* libcupscgi1-debuginfo-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.59.1
* cups-2.2.7-150000.3.59.1
* cups-ddk-2.2.7-150000.3.59.1
* libcupsppdc1-2.2.7-150000.3.59.1
* libcups2-32bit-2.2.7-150000.3.59.1
* libcupsmime1-2.2.7-150000.3.59.1
* libcupsimage2-debuginfo-2.2.7-150000.3.59.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcupsmime1-2.2.7-150000.3.59.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* cups-ddk-debuginfo-2.2.7-150000.3.59.1
* libcupscgi1-2.2.7-150000.3.59.1
* cups-2.2.7-150000.3.59.1
* libcupscgi1-debuginfo-2.2.7-150000.3.59.1
* libcupsppdc1-2.2.7-150000.3.59.1
* cups-client-debuginfo-2.2.7-150000.3.59.1
* cups-devel-2.2.7-150000.3.59.1
* cups-ddk-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* libcupsimage2-2.2.7-150000.3.59.1
* cups-client-2.2.7-150000.3.59.1
* libcupsmime1-debuginfo-2.2.7-150000.3.59.1
* libcupsimage2-debuginfo-2.2.7-150000.3.59.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64)
* libcups2-32bit-2.2.7-150000.3.59.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.59.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcupsmime1-2.2.7-150000.3.59.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* cups-ddk-debuginfo-2.2.7-150000.3.59.1
* libcupscgi1-2.2.7-150000.3.59.1
* cups-2.2.7-150000.3.59.1
* libcupscgi1-debuginfo-2.2.7-150000.3.59.1
* libcupsppdc1-2.2.7-150000.3.59.1
* cups-client-debuginfo-2.2.7-150000.3.59.1
* cups-devel-2.2.7-150000.3.59.1
* cups-ddk-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* libcupsimage2-2.2.7-150000.3.59.1
* cups-client-2.2.7-150000.3.59.1
* libcupsmime1-debuginfo-2.2.7-150000.3.59.1
* libcupsimage2-debuginfo-2.2.7-150000.3.59.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* libcups2-32bit-2.2.7-150000.3.59.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.59.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcupsmime1-2.2.7-150000.3.59.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* cups-ddk-debuginfo-2.2.7-150000.3.59.1
* libcupscgi1-2.2.7-150000.3.59.1
* cups-2.2.7-150000.3.59.1
* libcupscgi1-debuginfo-2.2.7-150000.3.59.1
* libcupsppdc1-2.2.7-150000.3.59.1
* cups-client-debuginfo-2.2.7-150000.3.59.1
* cups-devel-2.2.7-150000.3.59.1
* cups-ddk-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* libcupsimage2-2.2.7-150000.3.59.1
* cups-client-2.2.7-150000.3.59.1
* libcupsmime1-debuginfo-2.2.7-150000.3.59.1
* libcupsimage2-debuginfo-2.2.7-150000.3.59.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* libcups2-32bit-2.2.7-150000.3.59.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.59.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcupsmime1-2.2.7-150000.3.59.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* cups-ddk-debuginfo-2.2.7-150000.3.59.1
* libcupscgi1-2.2.7-150000.3.59.1
* cups-2.2.7-150000.3.59.1
* libcupscgi1-debuginfo-2.2.7-150000.3.59.1
* libcupsppdc1-2.2.7-150000.3.59.1
* cups-client-debuginfo-2.2.7-150000.3.59.1
* cups-devel-2.2.7-150000.3.59.1
* cups-ddk-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* libcupsimage2-2.2.7-150000.3.59.1
* cups-client-2.2.7-150000.3.59.1
* libcupsmime1-debuginfo-2.2.7-150000.3.59.1
* libcupsimage2-debuginfo-2.2.7-150000.3.59.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* libcups2-32bit-2.2.7-150000.3.59.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.59.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcupsmime1-2.2.7-150000.3.59.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* cups-ddk-debuginfo-2.2.7-150000.3.59.1
* libcupscgi1-2.2.7-150000.3.59.1
* cups-2.2.7-150000.3.59.1
* libcupscgi1-debuginfo-2.2.7-150000.3.59.1
* libcupsppdc1-2.2.7-150000.3.59.1
* cups-client-debuginfo-2.2.7-150000.3.59.1
* cups-devel-2.2.7-150000.3.59.1
* cups-ddk-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* libcupsimage2-2.2.7-150000.3.59.1
* cups-client-2.2.7-150000.3.59.1
* libcupsmime1-debuginfo-2.2.7-150000.3.59.1
* libcupsimage2-debuginfo-2.2.7-150000.3.59.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* libcups2-32bit-2.2.7-150000.3.59.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.59.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcupsmime1-2.2.7-150000.3.59.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* cups-ddk-debuginfo-2.2.7-150000.3.59.1
* libcupscgi1-2.2.7-150000.3.59.1
* cups-2.2.7-150000.3.59.1
* libcupscgi1-debuginfo-2.2.7-150000.3.59.1
* libcupsppdc1-2.2.7-150000.3.59.1
* cups-client-debuginfo-2.2.7-150000.3.59.1
* cups-devel-2.2.7-150000.3.59.1
* cups-ddk-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* libcupsimage2-2.2.7-150000.3.59.1
* cups-client-2.2.7-150000.3.59.1
* libcupsmime1-debuginfo-2.2.7-150000.3.59.1
* libcupsimage2-debuginfo-2.2.7-150000.3.59.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libcups2-32bit-2.2.7-150000.3.59.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.59.1
* SUSE Manager Proxy 4.3 (x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcupsmime1-2.2.7-150000.3.59.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* libcupscgi1-2.2.7-150000.3.59.1
* cups-2.2.7-150000.3.59.1
* libcupscgi1-debuginfo-2.2.7-150000.3.59.1
* libcupsppdc1-2.2.7-150000.3.59.1
* cups-client-debuginfo-2.2.7-150000.3.59.1
* cups-devel-2.2.7-150000.3.59.1
* libcups2-32bit-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* libcupsimage2-2.2.7-150000.3.59.1
* cups-client-2.2.7-150000.3.59.1
* libcupsmime1-debuginfo-2.2.7-150000.3.59.1
* libcupsimage2-debuginfo-2.2.7-150000.3.59.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.59.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcupsmime1-2.2.7-150000.3.59.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* libcupscgi1-2.2.7-150000.3.59.1
* cups-2.2.7-150000.3.59.1
* libcupscgi1-debuginfo-2.2.7-150000.3.59.1
* libcupsppdc1-2.2.7-150000.3.59.1
* cups-client-debuginfo-2.2.7-150000.3.59.1
* cups-devel-2.2.7-150000.3.59.1
* libcups2-32bit-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* libcupsimage2-2.2.7-150000.3.59.1
* cups-client-2.2.7-150000.3.59.1
* libcupsmime1-debuginfo-2.2.7-150000.3.59.1
* libcupsimage2-debuginfo-2.2.7-150000.3.59.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.59.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcupsmime1-2.2.7-150000.3.59.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* libcupscgi1-2.2.7-150000.3.59.1
* cups-2.2.7-150000.3.59.1
* libcupscgi1-debuginfo-2.2.7-150000.3.59.1
* libcupsppdc1-2.2.7-150000.3.59.1
* cups-client-debuginfo-2.2.7-150000.3.59.1
* cups-devel-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* libcupsimage2-2.2.7-150000.3.59.1
* cups-client-2.2.7-150000.3.59.1
* libcupsmime1-debuginfo-2.2.7-150000.3.59.1
* libcupsimage2-debuginfo-2.2.7-150000.3.59.1
* SUSE Manager Server 4.3 (x86_64)
* libcups2-32bit-2.2.7-150000.3.59.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.59.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcupsmime1-2.2.7-150000.3.59.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* cups-ddk-debuginfo-2.2.7-150000.3.59.1
* libcupscgi1-2.2.7-150000.3.59.1
* cups-2.2.7-150000.3.59.1
* libcupscgi1-debuginfo-2.2.7-150000.3.59.1
* libcupsppdc1-2.2.7-150000.3.59.1
* cups-client-debuginfo-2.2.7-150000.3.59.1
* cups-devel-2.2.7-150000.3.59.1
* cups-ddk-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* libcupsimage2-2.2.7-150000.3.59.1
* cups-client-2.2.7-150000.3.59.1
* libcupsmime1-debuginfo-2.2.7-150000.3.59.1
* libcupsimage2-debuginfo-2.2.7-150000.3.59.1
* SUSE Enterprise Storage 7.1 (x86_64)
* libcups2-32bit-2.2.7-150000.3.59.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.59.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* cups-debuginfo-2.2.7-150000.3.59.1
* cups-debugsource-2.2.7-150000.3.59.1
* libcups2-debuginfo-2.2.7-150000.3.59.1
* libcups2-2.2.7-150000.3.59.1
* cups-config-2.2.7-150000.3.59.1

## References:

* https://www.suse.com/security/cve/CVE-2024-35235.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223179
* https://bugzilla.suse.com/show_bug.cgi?id=1225365



SUSE-SU-2024:1980-1: low: Security update for poppler


# Security update for poppler

Announcement ID: SUSE-SU-2024:1980-1
Rating: low
References:

* bsc#1223375

Cross-References:

* CVE-2024-4141

CVSS scores:

* CVE-2024-4141 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Package Hub 15 15-SP5

An update that solves one vulnerability can now be installed.

## Description:

This update for poppler fixes the following issues:

* CVE-2024-4141: Fixed out-of-bounds array write (bsc#1223375).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1980=1 openSUSE-SLE-15.5-2024-1980=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1980=1

* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1980=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libpoppler-glib8-debuginfo-23.01.0-150500.3.8.1
* poppler-qt6-debugsource-23.01.0-150500.3.8.1
* libpoppler-glib-devel-23.01.0-150500.3.8.1
* libpoppler-qt5-1-debuginfo-23.01.0-150500.3.8.1
* libpoppler126-debuginfo-23.01.0-150500.3.8.1
* libpoppler-cpp0-debuginfo-23.01.0-150500.3.8.1
* poppler-tools-debuginfo-23.01.0-150500.3.8.1
* poppler-qt5-debugsource-23.01.0-150500.3.8.1
* libpoppler-qt5-devel-23.01.0-150500.3.8.1
* libpoppler-qt6-3-23.01.0-150500.3.8.1
* poppler-tools-23.01.0-150500.3.8.1
* libpoppler-qt6-3-debuginfo-23.01.0-150500.3.8.1
* libpoppler-qt6-devel-23.01.0-150500.3.8.1
* libpoppler-devel-23.01.0-150500.3.8.1
* libpoppler-cpp0-23.01.0-150500.3.8.1
* libpoppler126-23.01.0-150500.3.8.1
* libpoppler-qt5-1-23.01.0-150500.3.8.1
* typelib-1_0-Poppler-0_18-23.01.0-150500.3.8.1
* poppler-debugsource-23.01.0-150500.3.8.1
* libpoppler-glib8-23.01.0-150500.3.8.1
* openSUSE Leap 15.5 (x86_64)
* libpoppler-qt5-1-32bit-debuginfo-23.01.0-150500.3.8.1
* libpoppler126-32bit-23.01.0-150500.3.8.1
* libpoppler-cpp0-32bit-debuginfo-23.01.0-150500.3.8.1
* libpoppler-glib8-32bit-23.01.0-150500.3.8.1
* libpoppler-cpp0-32bit-23.01.0-150500.3.8.1
* libpoppler-qt5-1-32bit-23.01.0-150500.3.8.1
* libpoppler126-32bit-debuginfo-23.01.0-150500.3.8.1
* libpoppler-glib8-32bit-debuginfo-23.01.0-150500.3.8.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libpoppler126-64bit-23.01.0-150500.3.8.1
* libpoppler126-64bit-debuginfo-23.01.0-150500.3.8.1
* libpoppler-qt5-1-64bit-23.01.0-150500.3.8.1
* libpoppler-qt5-1-64bit-debuginfo-23.01.0-150500.3.8.1
* libpoppler-glib8-64bit-23.01.0-150500.3.8.1
* libpoppler-cpp0-64bit-debuginfo-23.01.0-150500.3.8.1
* libpoppler-glib8-64bit-debuginfo-23.01.0-150500.3.8.1
* libpoppler-cpp0-64bit-23.01.0-150500.3.8.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libpoppler-glib8-debuginfo-23.01.0-150500.3.8.1
* libpoppler-glib-devel-23.01.0-150500.3.8.1
* libpoppler126-debuginfo-23.01.0-150500.3.8.1
* libpoppler-cpp0-debuginfo-23.01.0-150500.3.8.1
* poppler-tools-debuginfo-23.01.0-150500.3.8.1
* poppler-tools-23.01.0-150500.3.8.1
* libpoppler-devel-23.01.0-150500.3.8.1
* libpoppler-cpp0-23.01.0-150500.3.8.1
* libpoppler126-23.01.0-150500.3.8.1
* typelib-1_0-Poppler-0_18-23.01.0-150500.3.8.1
* poppler-debugsource-23.01.0-150500.3.8.1
* libpoppler-glib8-23.01.0-150500.3.8.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* libpoppler-qt5-1-debuginfo-23.01.0-150500.3.8.1
* libpoppler-cpp0-debuginfo-23.01.0-150500.3.8.1
* poppler-qt5-debugsource-23.01.0-150500.3.8.1
* libpoppler-qt5-devel-23.01.0-150500.3.8.1
* libpoppler-devel-23.01.0-150500.3.8.1
* libpoppler-cpp0-23.01.0-150500.3.8.1
* libpoppler-qt5-1-23.01.0-150500.3.8.1
* poppler-debugsource-23.01.0-150500.3.8.1
* SUSE Package Hub 15 15-SP5 (x86_64)
* libpoppler-glib8-32bit-debuginfo-23.01.0-150500.3.8.1
* libpoppler126-32bit-23.01.0-150500.3.8.1
* libpoppler126-32bit-debuginfo-23.01.0-150500.3.8.1
* libpoppler-glib8-32bit-23.01.0-150500.3.8.1

## References:

* https://www.suse.com/security/cve/CVE-2024-4141.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223375



SUSE-SU-2024:1982-1: important: Security update for bind


# Security update for bind

Announcement ID: SUSE-SU-2024:1982-1
Rating: important
References:

* bsc#1219823
* bsc#1219826
* bsc#1219851
* bsc#1219852
* bsc#1219854

Cross-References:

* CVE-2023-4408
* CVE-2023-50387
* CVE-2023-50868
* CVE-2023-5517
* CVE-2023-6516

CVSS scores:

* CVE-2023-4408 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-50387 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-50387 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-50868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-5517 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6516 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP6
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves five vulnerabilities can now be installed.

## Description:

This update for bind fixes the following issues:

* CVE-2023-4408: Fixed denial of service during DNS message parsing with
different names (bsc#1219851)
* CVE-2023-50387: Fixed denial of service during DNS messages validation with
DNSSEC signatures (bsc#1219823)
* CVE-2023-50868: Fixed denial of service during NSEC3 closest encloser proof
preparation (bsc#1219826)
* CVE-2023-5517: Fixed denial of service caused by specific queries with
nxdomain-redirect enabled (bsc#1219852)
* CVE-2023-6516: Fixed denial of service caused by specific queries that
continuously triggered cache database maintenance (bsc#1219854)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1982=1

* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1982=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1982=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1982=1

* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1982=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1982=1

## Package List:

* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libns1604-debuginfo-9.16.6-150300.22.44.1
* bind-debugsource-9.16.6-150300.22.44.1
* libisccfg1600-debuginfo-9.16.6-150300.22.44.1
* bind-utils-9.16.6-150300.22.44.1
* libisc1606-debuginfo-9.16.6-150300.22.44.1
* libisc1606-9.16.6-150300.22.44.1
* libdns1605-9.16.6-150300.22.44.1
* libisccfg1600-9.16.6-150300.22.44.1
* libisccc1600-debuginfo-9.16.6-150300.22.44.1
* libbind9-1600-9.16.6-150300.22.44.1
* bind-utils-debuginfo-9.16.6-150300.22.44.1
* libirs1601-9.16.6-150300.22.44.1
* bind-9.16.6-150300.22.44.1
* bind-debuginfo-9.16.6-150300.22.44.1
* libdns1605-debuginfo-9.16.6-150300.22.44.1
* libirs1601-debuginfo-9.16.6-150300.22.44.1
* bind-chrootenv-9.16.6-150300.22.44.1
* libirs-devel-9.16.6-150300.22.44.1
* libns1604-9.16.6-150300.22.44.1
* bind-devel-9.16.6-150300.22.44.1
* libbind9-1600-debuginfo-9.16.6-150300.22.44.1
* libisccc1600-9.16.6-150300.22.44.1
* SUSE Enterprise Storage 7.1 (noarch)
* bind-doc-9.16.6-150300.22.44.1
* python3-bind-9.16.6-150300.22.44.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* libns1604-debuginfo-9.16.6-150300.22.44.1
* bind-debugsource-9.16.6-150300.22.44.1
* libisccfg1600-debuginfo-9.16.6-150300.22.44.1
* bind-utils-9.16.6-150300.22.44.1
* libisc1606-debuginfo-9.16.6-150300.22.44.1
* libisc1606-9.16.6-150300.22.44.1
* libdns1605-9.16.6-150300.22.44.1
* libisccfg1600-9.16.6-150300.22.44.1
* libisccc1600-debuginfo-9.16.6-150300.22.44.1
* libbind9-1600-9.16.6-150300.22.44.1
* bind-utils-debuginfo-9.16.6-150300.22.44.1
* libirs1601-9.16.6-150300.22.44.1
* bind-9.16.6-150300.22.44.1
* bind-debuginfo-9.16.6-150300.22.44.1
* libdns1605-debuginfo-9.16.6-150300.22.44.1
* libirs1601-debuginfo-9.16.6-150300.22.44.1
* bind-chrootenv-9.16.6-150300.22.44.1
* libirs-devel-9.16.6-150300.22.44.1
* libns1604-9.16.6-150300.22.44.1
* bind-devel-9.16.6-150300.22.44.1
* libbind9-1600-debuginfo-9.16.6-150300.22.44.1
* libisccc1600-9.16.6-150300.22.44.1
* openSUSE Leap 15.3 (noarch)
* bind-doc-9.16.6-150300.22.44.1
* python3-bind-9.16.6-150300.22.44.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libisc1606-debuginfo-9.16.6-150300.22.44.1
* libisc1606-9.16.6-150300.22.44.1
* bind-debugsource-9.16.6-150300.22.44.1
* libirs1601-9.16.6-150300.22.44.1
* libisccfg1600-debuginfo-9.16.6-150300.22.44.1
* bind-debuginfo-9.16.6-150300.22.44.1
* libdns1605-debuginfo-9.16.6-150300.22.44.1
* libirs1601-debuginfo-9.16.6-150300.22.44.1
* libirs-devel-9.16.6-150300.22.44.1
* libdns1605-9.16.6-150300.22.44.1
* libisccfg1600-9.16.6-150300.22.44.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libns1604-debuginfo-9.16.6-150300.22.44.1
* bind-debugsource-9.16.6-150300.22.44.1
* libisccfg1600-debuginfo-9.16.6-150300.22.44.1
* bind-utils-9.16.6-150300.22.44.1
* libisc1606-debuginfo-9.16.6-150300.22.44.1
* libisc1606-9.16.6-150300.22.44.1
* libdns1605-9.16.6-150300.22.44.1
* libisccfg1600-9.16.6-150300.22.44.1
* libisccc1600-debuginfo-9.16.6-150300.22.44.1
* libbind9-1600-9.16.6-150300.22.44.1
* bind-utils-debuginfo-9.16.6-150300.22.44.1
* libirs1601-9.16.6-150300.22.44.1
* bind-9.16.6-150300.22.44.1
* bind-debuginfo-9.16.6-150300.22.44.1
* libdns1605-debuginfo-9.16.6-150300.22.44.1
* libirs1601-debuginfo-9.16.6-150300.22.44.1
* bind-chrootenv-9.16.6-150300.22.44.1
* libirs-devel-9.16.6-150300.22.44.1
* libns1604-9.16.6-150300.22.44.1
* bind-devel-9.16.6-150300.22.44.1
* libbind9-1600-debuginfo-9.16.6-150300.22.44.1
* libisccc1600-9.16.6-150300.22.44.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* bind-doc-9.16.6-150300.22.44.1
* python3-bind-9.16.6-150300.22.44.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libns1604-debuginfo-9.16.6-150300.22.44.1
* bind-debugsource-9.16.6-150300.22.44.1
* libisccfg1600-debuginfo-9.16.6-150300.22.44.1
* bind-utils-9.16.6-150300.22.44.1
* libisc1606-debuginfo-9.16.6-150300.22.44.1
* libisc1606-9.16.6-150300.22.44.1
* libdns1605-9.16.6-150300.22.44.1
* libisccfg1600-9.16.6-150300.22.44.1
* libisccc1600-debuginfo-9.16.6-150300.22.44.1
* libbind9-1600-9.16.6-150300.22.44.1
* bind-utils-debuginfo-9.16.6-150300.22.44.1
* libirs1601-9.16.6-150300.22.44.1
* bind-9.16.6-150300.22.44.1
* bind-debuginfo-9.16.6-150300.22.44.1
* libdns1605-debuginfo-9.16.6-150300.22.44.1
* libirs1601-debuginfo-9.16.6-150300.22.44.1
* bind-chrootenv-9.16.6-150300.22.44.1
* libirs-devel-9.16.6-150300.22.44.1
* libns1604-9.16.6-150300.22.44.1
* bind-devel-9.16.6-150300.22.44.1
* libbind9-1600-debuginfo-9.16.6-150300.22.44.1
* libisccc1600-9.16.6-150300.22.44.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* bind-doc-9.16.6-150300.22.44.1
* python3-bind-9.16.6-150300.22.44.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libns1604-debuginfo-9.16.6-150300.22.44.1
* bind-debugsource-9.16.6-150300.22.44.1
* libisccfg1600-debuginfo-9.16.6-150300.22.44.1
* bind-utils-9.16.6-150300.22.44.1
* libisc1606-debuginfo-9.16.6-150300.22.44.1
* libisc1606-9.16.6-150300.22.44.1
* libdns1605-9.16.6-150300.22.44.1
* libisccfg1600-9.16.6-150300.22.44.1
* libisccc1600-debuginfo-9.16.6-150300.22.44.1
* libbind9-1600-9.16.6-150300.22.44.1
* bind-utils-debuginfo-9.16.6-150300.22.44.1
* libirs1601-9.16.6-150300.22.44.1
* bind-9.16.6-150300.22.44.1
* bind-debuginfo-9.16.6-150300.22.44.1
* libdns1605-debuginfo-9.16.6-150300.22.44.1
* libirs1601-debuginfo-9.16.6-150300.22.44.1
* bind-chrootenv-9.16.6-150300.22.44.1
* libirs-devel-9.16.6-150300.22.44.1
* libns1604-9.16.6-150300.22.44.1
* bind-devel-9.16.6-150300.22.44.1
* libbind9-1600-debuginfo-9.16.6-150300.22.44.1
* libisccc1600-9.16.6-150300.22.44.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* bind-doc-9.16.6-150300.22.44.1
* python3-bind-9.16.6-150300.22.44.1

## References:

* https://www.suse.com/security/cve/CVE-2023-4408.html
* https://www.suse.com/security/cve/CVE-2023-50387.html
* https://www.suse.com/security/cve/CVE-2023-50868.html
* https://www.suse.com/security/cve/CVE-2023-5517.html
* https://www.suse.com/security/cve/CVE-2023-6516.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219823
* https://bugzilla.suse.com/show_bug.cgi?id=1219826
* https://bugzilla.suse.com/show_bug.cgi?id=1219851
* https://bugzilla.suse.com/show_bug.cgi?id=1219852
* https://bugzilla.suse.com/show_bug.cgi?id=1219854



SUSE-SU-2024:1984-1: moderate: Security update for aws-nitro-enclaves-cli


# Security update for aws-nitro-enclaves-cli

Announcement ID: SUSE-SU-2024:1984-1
Rating: moderate
References:

* bsc#1218501

Cross-References:

* CVE-2023-50711

CVSS scores:

* CVE-2023-50711 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L
* CVE-2023-50711 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.5
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves one vulnerability can now be installed.

## Description:

This update for aws-nitro-enclaves-cli fixes the following issues:

* CVE-2023-50711: Fixed out of bounds memory accesses in embedded vmm-sys-util
(bsc#1218501).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1984=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1984=1

* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1984=1

* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1984=1

## Package List:

* openSUSE Leap 15.4 (aarch64 x86_64)
* aws-nitro-enclaves-cli-1.3.0~git1.db34c02-150400.3.6.1
* aws-nitro-enclaves-cli-debugsource-1.3.0~git1.db34c02-150400.3.6.1
* aws-nitro-enclaves-binaryblobs-upstream-debuginfo-1.3.0~git1.db34c02-150400.3.6.1
* aws-nitro-enclaves-cli-debuginfo-1.3.0~git1.db34c02-150400.3.6.1
* system-group-ne-1.3.0~git1.db34c02-150400.3.6.1
* aws-nitro-enclaves-binaryblobs-upstream-1.3.0~git1.db34c02-150400.3.6.1
* openSUSE Leap 15.5 (aarch64 x86_64)
* aws-nitro-enclaves-cli-1.3.0~git1.db34c02-150400.3.6.1
* aws-nitro-enclaves-cli-debugsource-1.3.0~git1.db34c02-150400.3.6.1
* aws-nitro-enclaves-binaryblobs-upstream-debuginfo-1.3.0~git1.db34c02-150400.3.6.1
* aws-nitro-enclaves-cli-debuginfo-1.3.0~git1.db34c02-150400.3.6.1
* system-group-ne-1.3.0~git1.db34c02-150400.3.6.1
* aws-nitro-enclaves-binaryblobs-upstream-1.3.0~git1.db34c02-150400.3.6.1
* Public Cloud Module 15-SP4 (aarch64 x86_64)
* aws-nitro-enclaves-cli-1.3.0~git1.db34c02-150400.3.6.1
* aws-nitro-enclaves-cli-debugsource-1.3.0~git1.db34c02-150400.3.6.1
* aws-nitro-enclaves-binaryblobs-upstream-debuginfo-1.3.0~git1.db34c02-150400.3.6.1
* aws-nitro-enclaves-cli-debuginfo-1.3.0~git1.db34c02-150400.3.6.1
* system-group-ne-1.3.0~git1.db34c02-150400.3.6.1
* aws-nitro-enclaves-binaryblobs-upstream-1.3.0~git1.db34c02-150400.3.6.1
* Public Cloud Module 15-SP5 (aarch64 x86_64)
* aws-nitro-enclaves-cli-1.3.0~git1.db34c02-150400.3.6.1
* aws-nitro-enclaves-cli-debugsource-1.3.0~git1.db34c02-150400.3.6.1
* aws-nitro-enclaves-binaryblobs-upstream-debuginfo-1.3.0~git1.db34c02-150400.3.6.1
* aws-nitro-enclaves-cli-debuginfo-1.3.0~git1.db34c02-150400.3.6.1
* system-group-ne-1.3.0~git1.db34c02-150400.3.6.1
* aws-nitro-enclaves-binaryblobs-upstream-1.3.0~git1.db34c02-150400.3.6.1

## References:

* https://www.suse.com/security/cve/CVE-2023-50711.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218501



SUSE-SU-2024:1985-1: moderate: Security update for mariadb


# Security update for mariadb

Announcement ID: SUSE-SU-2024:1985-1
Rating: moderate
References:

* bsc#1217405
* bsc#1225983

Cross-References:

* CVE-2023-22084
* CVE-2024-21096

CVSS scores:

* CVE-2023-22084 ( SUSE ): 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-22084 ( NVD ): 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-21096 ( SUSE ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Affected Products:

* Galera for Ericsson 15 SP4
* Galera for Ericsson 15 SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP5

An update that solves two vulnerabilities can now be installed.

## Description:

This update for mariadb fixes the following issues:

* CVE-2024-21096: Fixed mysqldump unspecified vulnerability (bsc#1225983).
* CVE-2023-22084: Fixed a vulnerability allows high privileged attacker with
network access via multiple protocols to compromise the server
(bsc#1217405).

* Update to 10.6.18.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1985=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1985=1

* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1985=1

* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1985=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1985=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1985=1

* Galera for Ericsson 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-ERICSSON-2024-1985=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1985=1

* Galera for Ericsson 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-ERICSSON-2024-1985=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1985=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1985=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1985=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1985=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* mariadb-bench-debuginfo-10.6.18-150400.3.33.1
* mariadb-debugsource-10.6.18-150400.3.33.1
* mariadb-test-debuginfo-10.6.18-150400.3.33.1
* mariadb-rpm-macros-10.6.18-150400.3.33.1
* libmariadbd-devel-10.6.18-150400.3.33.1
* mariadb-tools-10.6.18-150400.3.33.1
* mariadb-tools-debuginfo-10.6.18-150400.3.33.1
* mariadb-client-debuginfo-10.6.18-150400.3.33.1
* libmariadbd19-debuginfo-10.6.18-150400.3.33.1
* libmariadbd19-10.6.18-150400.3.33.1
* mariadb-galera-10.6.18-150400.3.33.1
* mariadb-test-10.6.18-150400.3.33.1
* mariadb-client-10.6.18-150400.3.33.1
* mariadb-bench-10.6.18-150400.3.33.1
* mariadb-10.6.18-150400.3.33.1
* mariadb-debuginfo-10.6.18-150400.3.33.1
* openSUSE Leap 15.4 (noarch)
* mariadb-errormessages-10.6.18-150400.3.33.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* mariadb-bench-debuginfo-10.6.18-150400.3.33.1
* mariadb-debugsource-10.6.18-150400.3.33.1
* mariadb-test-debuginfo-10.6.18-150400.3.33.1
* mariadb-rpm-macros-10.6.18-150400.3.33.1
* libmariadbd-devel-10.6.18-150400.3.33.1
* mariadb-tools-10.6.18-150400.3.33.1
* mariadb-tools-debuginfo-10.6.18-150400.3.33.1
* mariadb-client-debuginfo-10.6.18-150400.3.33.1
* libmariadbd19-debuginfo-10.6.18-150400.3.33.1
* libmariadbd19-10.6.18-150400.3.33.1
* mariadb-galera-10.6.18-150400.3.33.1
* mariadb-test-10.6.18-150400.3.33.1
* mariadb-client-10.6.18-150400.3.33.1
* mariadb-bench-10.6.18-150400.3.33.1
* mariadb-10.6.18-150400.3.33.1
* mariadb-debuginfo-10.6.18-150400.3.33.1
* openSUSE Leap 15.5 (noarch)
* mariadb-errormessages-10.6.18-150400.3.33.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* mariadb-galera-10.6.18-150400.3.33.1
* mariadb-debuginfo-10.6.18-150400.3.33.1
* mariadb-debugsource-10.6.18-150400.3.33.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* mariadb-debugsource-10.6.18-150400.3.33.1
* libmariadbd-devel-10.6.18-150400.3.33.1
* mariadb-tools-10.6.18-150400.3.33.1
* mariadb-tools-debuginfo-10.6.18-150400.3.33.1
* mariadb-client-debuginfo-10.6.18-150400.3.33.1
* libmariadbd19-debuginfo-10.6.18-150400.3.33.1
* libmariadbd19-10.6.18-150400.3.33.1
* mariadb-client-10.6.18-150400.3.33.1
* mariadb-10.6.18-150400.3.33.1
* mariadb-debuginfo-10.6.18-150400.3.33.1
* Server Applications Module 15-SP5 (noarch)
* mariadb-errormessages-10.6.18-150400.3.33.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* mariadb-debugsource-10.6.18-150400.3.33.1
* libmariadbd-devel-10.6.18-150400.3.33.1
* mariadb-tools-10.6.18-150400.3.33.1
* mariadb-tools-debuginfo-10.6.18-150400.3.33.1
* mariadb-client-debuginfo-10.6.18-150400.3.33.1
* libmariadbd19-debuginfo-10.6.18-150400.3.33.1
* libmariadbd19-10.6.18-150400.3.33.1
* mariadb-client-10.6.18-150400.3.33.1
* mariadb-10.6.18-150400.3.33.1
* mariadb-debuginfo-10.6.18-150400.3.33.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* mariadb-errormessages-10.6.18-150400.3.33.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* mariadb-debugsource-10.6.18-150400.3.33.1
* libmariadbd-devel-10.6.18-150400.3.33.1
* mariadb-tools-10.6.18-150400.3.33.1
* mariadb-tools-debuginfo-10.6.18-150400.3.33.1
* mariadb-client-debuginfo-10.6.18-150400.3.33.1
* libmariadbd19-debuginfo-10.6.18-150400.3.33.1
* libmariadbd19-10.6.18-150400.3.33.1
* mariadb-client-10.6.18-150400.3.33.1
* mariadb-10.6.18-150400.3.33.1
* mariadb-debuginfo-10.6.18-150400.3.33.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* mariadb-errormessages-10.6.18-150400.3.33.1
* Galera for Ericsson 15 SP4 (x86_64)
* mariadb-galera-10.6.18-150400.3.33.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* mariadb-debugsource-10.6.18-150400.3.33.1
* libmariadbd-devel-10.6.18-150400.3.33.1
* mariadb-tools-10.6.18-150400.3.33.1
* mariadb-tools-debuginfo-10.6.18-150400.3.33.1
* mariadb-client-debuginfo-10.6.18-150400.3.33.1
* libmariadbd19-debuginfo-10.6.18-150400.3.33.1
* libmariadbd19-10.6.18-150400.3.33.1
* mariadb-client-10.6.18-150400.3.33.1
* mariadb-10.6.18-150400.3.33.1
* mariadb-debuginfo-10.6.18-150400.3.33.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* mariadb-errormessages-10.6.18-150400.3.33.1
* Galera for Ericsson 15 SP5 (x86_64)
* mariadb-galera-10.6.18-150400.3.33.1
* mariadb-debuginfo-10.6.18-150400.3.33.1
* mariadb-debugsource-10.6.18-150400.3.33.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* mariadb-debugsource-10.6.18-150400.3.33.1
* libmariadbd-devel-10.6.18-150400.3.33.1
* mariadb-tools-10.6.18-150400.3.33.1
* mariadb-tools-debuginfo-10.6.18-150400.3.33.1
* mariadb-client-debuginfo-10.6.18-150400.3.33.1
* libmariadbd19-debuginfo-10.6.18-150400.3.33.1
* libmariadbd19-10.6.18-150400.3.33.1
* mariadb-client-10.6.18-150400.3.33.1
* mariadb-10.6.18-150400.3.33.1
* mariadb-debuginfo-10.6.18-150400.3.33.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* mariadb-errormessages-10.6.18-150400.3.33.1
* SUSE Manager Proxy 4.3 (x86_64)
* mariadb-debugsource-10.6.18-150400.3.33.1
* libmariadbd-devel-10.6.18-150400.3.33.1
* mariadb-tools-10.6.18-150400.3.33.1
* mariadb-tools-debuginfo-10.6.18-150400.3.33.1
* mariadb-client-debuginfo-10.6.18-150400.3.33.1
* libmariadbd19-debuginfo-10.6.18-150400.3.33.1
* libmariadbd19-10.6.18-150400.3.33.1
* mariadb-client-10.6.18-150400.3.33.1
* mariadb-10.6.18-150400.3.33.1
* mariadb-debuginfo-10.6.18-150400.3.33.1
* SUSE Manager Proxy 4.3 (noarch)
* mariadb-errormessages-10.6.18-150400.3.33.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* mariadb-debugsource-10.6.18-150400.3.33.1
* libmariadbd-devel-10.6.18-150400.3.33.1
* mariadb-tools-10.6.18-150400.3.33.1
* mariadb-tools-debuginfo-10.6.18-150400.3.33.1
* mariadb-client-debuginfo-10.6.18-150400.3.33.1
* libmariadbd19-debuginfo-10.6.18-150400.3.33.1
* libmariadbd19-10.6.18-150400.3.33.1
* mariadb-client-10.6.18-150400.3.33.1
* mariadb-10.6.18-150400.3.33.1
* mariadb-debuginfo-10.6.18-150400.3.33.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* mariadb-errormessages-10.6.18-150400.3.33.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* mariadb-debugsource-10.6.18-150400.3.33.1
* libmariadbd-devel-10.6.18-150400.3.33.1
* mariadb-tools-10.6.18-150400.3.33.1
* mariadb-tools-debuginfo-10.6.18-150400.3.33.1
* mariadb-client-debuginfo-10.6.18-150400.3.33.1
* libmariadbd19-debuginfo-10.6.18-150400.3.33.1
* libmariadbd19-10.6.18-150400.3.33.1
* mariadb-client-10.6.18-150400.3.33.1
* mariadb-10.6.18-150400.3.33.1
* mariadb-debuginfo-10.6.18-150400.3.33.1
* SUSE Manager Server 4.3 (noarch)
* mariadb-errormessages-10.6.18-150400.3.33.1

## References:

* https://www.suse.com/security/cve/CVE-2023-22084.html
* https://www.suse.com/security/cve/CVE-2024-21096.html
* https://bugzilla.suse.com/show_bug.cgi?id=1217405
* https://bugzilla.suse.com/show_bug.cgi?id=1225983



SUSE-SU-2024:1990-1: important: Security update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed


# Security update for kernel-firmware-nvidia-gspx-G06, nvidia-open-
driver-G06-signed

Announcement ID: SUSE-SU-2024:1990-1
Rating: important
References:

* bsc#1223356

Cross-References:

* CVE-2024-0090
* CVE-2024-0091
* CVE-2024-0092

CVSS scores:

* CVE-2024-0090 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-0091 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-0092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves three vulnerabilities can now be installed.

## Description:

This update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed
fixes the following issues:

Security Update 550.90.07:

* CVE-2024-0090: Fixed out of bounds write (bsc#1223356).
* CVE-2024-0092: Fixed incorrect exception handling (bsc#1223356).
* CVE-2024-0091: Fixed untrusted pointer dereference (bsc#1223356).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1990=1 openSUSE-SLE-15.5-2024-1990=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1990=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1990=1

* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1990=1

## Package List:

* openSUSE Leap 15.5 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1
* openSUSE Leap 15.5 (x86_64)
* nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1
* nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1
* nvidia-open-driver-G06-signed-kmp-azure-debuginfo-550.90.07_k5.14.21_150500.33.54-150500.3.47.1
* openSUSE Leap 15.5 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150500.55.65-150500.3.47.1
* nvidia-open-driver-G06-signed-debugsource-550.90.07-150500.3.47.1
* nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1
* nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1
* openSUSE Leap 15.5 (aarch64)
* nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.90.07_k5.14.21_150500.55.65-150500.3.47.1
* nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150500.55.65-150500.3.47.1
* nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1
* Basesystem Module 15-SP5 (aarch64 nosrc x86_64)
* kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1
* Basesystem Module 15-SP5 (aarch64)
* nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.90.07_k5.14.21_150500.55.65-150500.3.47.1
* nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1
* Basesystem Module 15-SP5 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.90.07_k5.14.21_150500.55.65-150500.3.47.1
* nvidia-open-driver-G06-signed-debugsource-550.90.07-150500.3.47.1
* nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1
* nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1
* Public Cloud Module 15-SP5 (x86_64)
* nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1
* nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1
* nvidia-open-driver-G06-signed-kmp-azure-debuginfo-550.90.07_k5.14.21_150500.33.54-150500.3.47.1

## References:

* https://www.suse.com/security/cve/CVE-2024-0090.html
* https://www.suse.com/security/cve/CVE-2024-0091.html
* https://www.suse.com/security/cve/CVE-2024-0092.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223356



SUSE-SU-2024:1974-1: moderate: Security update for rmt-server


# Security update for rmt-server

Announcement ID: SUSE-SU-2024:1974-1
Rating: moderate
References:

* bsc#1203171
* bsc#1225997
* jsc#PED-7982
* jsc#PED-8018

Cross-References:

* CVE-2024-28103

CVSS scores:

* CVE-2024-28103 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Affected Products:

* openSUSE Leap 15.5
* openSUSE Leap 15.6
* Public Cloud Module 15-SP5
* Public Cloud Module 15-SP6
* Server Applications Module 15-SP5
* Server Applications Module 15-SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves one vulnerability, contains two features and has one
security fix can now be installed.

## Description:

This update for rmt-server fixes the following issues:

* Update to version 2.17
* CVE-2024-28103: Fixed Permissions-Policy that was only served on responses
with an HTML related Content-Type. (bsc#1225997)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1974=1 openSUSE-SLE-15.5-2024-1974=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-1974=1

* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1974=1

* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-1974=1

* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1974=1

* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-1974=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* rmt-server-2.17-150500.3.16.1
* rmt-server-pubcloud-2.17-150500.3.16.1
* rmt-server-debuginfo-2.17-150500.3.16.1
* rmt-server-debugsource-2.17-150500.3.16.1
* rmt-server-config-2.17-150500.3.16.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* rmt-server-2.17-150500.3.16.1
* rmt-server-pubcloud-2.17-150500.3.16.1
* rmt-server-debuginfo-2.17-150500.3.16.1
* rmt-server-debugsource-2.17-150500.3.16.1
* rmt-server-config-2.17-150500.3.16.1
* Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* rmt-server-debuginfo-2.17-150500.3.16.1
* rmt-server-debugsource-2.17-150500.3.16.1
* rmt-server-pubcloud-2.17-150500.3.16.1
* Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* rmt-server-debuginfo-2.17-150500.3.16.1
* rmt-server-debugsource-2.17-150500.3.16.1
* rmt-server-pubcloud-2.17-150500.3.16.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* rmt-server-2.17-150500.3.16.1
* rmt-server-debuginfo-2.17-150500.3.16.1
* rmt-server-debugsource-2.17-150500.3.16.1
* rmt-server-config-2.17-150500.3.16.1
* Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* rmt-server-2.17-150500.3.16.1
* rmt-server-debuginfo-2.17-150500.3.16.1
* rmt-server-debugsource-2.17-150500.3.16.1
* rmt-server-config-2.17-150500.3.16.1

## References:

* https://www.suse.com/security/cve/CVE-2024-28103.html
* https://bugzilla.suse.com/show_bug.cgi?id=1203171
* https://bugzilla.suse.com/show_bug.cgi?id=1225997
* https://jira.suse.com/browse/PED-7982
* https://jira.suse.com/browse/PED-8018