SUSE 5270 Published by

SUSE Linux has announced the release of multiple security updates:

SUSE-SU-2025:0525-1: moderate: Security update for SUSE Manager Client Tools
SUSE-SU-2025:0546-1: moderate: Security update golang-github-prometheus-prometheus
SUSE-SU-2025:0545-1: moderate: Security update for grafana
openSUSE-SU-2025:0059-1: important: Security update for chromium
SUSE-SU-2025:0548-1: important: Security update for libtasn1
openSUSE-SU-2025:14807-1: moderate: postgresql15-15.11-1.1 on GA media
openSUSE-SU-2025:14804-1: moderate: kernel-firmware-all-20250206-1.1 on GA media
SUSE-SU-2025:0551-1: moderate: Security update for python311
SUSE-SU-2025:0554-1: moderate: Security update for python3
SUSE-SU-2025:0556-1: important: Security update for the Linux Kernel
SUSE-SU-2025:0558-1: moderate: Security update for buildah
SUSE-SU-2025:0557-1: important: Security update for the Linux Kernel




SUSE-SU-2025:0525-1: moderate: Security update for SUSE Manager Client Tools


# Security update for SUSE Manager Client Tools

Announcement ID: SUSE-SU-2025:0525-1
Release Date: 2025-02-14T07:19:20Z
Rating: moderate
References:

* bsc#1212641
* bsc#1219912
* bsc#1229079
* bsc#1229104
* bsc#1231024
* bsc#1231497
* bsc#1231568
* bsc#1231759
* bsc#1232575
* bsc#1232769
* bsc#1232817
* bsc#1232970
* bsc#1233202
* bsc#1233279
* bsc#1233630
* bsc#1233660
* bsc#1234123
* bsc#1234554
* bsc#1235145
* bsc#1236301
* jsc#MSQA-914
* jsc#PED-11591
* jsc#PED-11649
* jsc#SUMA-314

Cross-References:

* CVE-2023-3128
* CVE-2023-6152
* CVE-2024-22037
* CVE-2024-45337
* CVE-2024-51744
* CVE-2024-6837
* CVE-2024-8118

CVSS scores:

* CVE-2023-3128 ( SUSE ): 9.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
* CVE-2023-3128 ( NVD ): 9.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
* CVE-2023-3128 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6152 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-6152 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-6152 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-22037 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:L
* CVE-2024-22037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-22037 ( NVD ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2024-22037 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-45337 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45337 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-51744 ( SUSE ): 2.1
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-51744 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2024-51744 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2024-6837 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-6837 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2024-8118 ( SUSE ): 4.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-8118 ( NVD ): 5.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Affected Products:

* Basesystem Module 15-SP6
* openSUSE Leap 15.3
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15
* SUSE Linux Enterprise Desktop 15 SP1
* SUSE Linux Enterprise Desktop 15 SP2
* SUSE Linux Enterprise Desktop 15 SP3
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15
* SUSE Linux Enterprise High Performance Computing 15 SP1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.0
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP1
* SUSE Linux Enterprise Real Time 15 SP2
* SUSE Linux Enterprise Real Time 15 SP3
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15
* SUSE Linux Enterprise Server 15 SP1
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Client Tools for SLE 15
* SUSE Manager Client Tools for SLE Micro 5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP6

An update that solves seven vulnerabilities, contains four features and has 13
security fixes can now be installed.

## Description:

This update fixes the following issues:

dracut-saltboot was updated to version 0.1.1728559936.c16d4fb:

* Added MAC based terminal naming option (jsc#SUMA-314)

golang-github-prometheus-prometheus was updated from version 2.45.6 to 2.53.3
(jsc#PED-11649):

* Security issues fixed:
* CVE-2024-51744: Updated golang-jwt to version 5.0 to fix bad error handling
(bsc#1232970)

* Highlights of other changes:

* Performance:
* Significant enhancements to PromQL execution speed, TSDB operations (especially querying and compaction) and remote write operations.
* Default GOGC value lowered to 75 for better memory management.
* Option to limit memory usage from dropped targets added.
* New Features:
* Experimental OpenTelemetry ingestion.
* Automatic memory limit handling.
* Native histogram support, including new functions, UI enhancements, and improved scraping.
* Improved alerting features, such as relabeling rules for AlertmanagerConfig and a new query_offset option.
* Expanded service discovery options with added metadata and support for new services.
* New promtool commands for PromQL formatting, label manipulation, metric pushing, and OpenMetrics dumping.
* Bug Fixes:
* Numerous fixes across scraping, API, TSDB, PromQL, and service discovery.
* For a detailed list of changes consult the package changelog or
https://github.com/prometheus/prometheus/compare/v2.45.6...v2.53.3

grafana was updated from version 9.5.18 to 10.4.13
(jsc#PED-11591,jsc#PED-11649):

* Security issues fixed:
* CVE-2024-45337: Prevent possible misuse of ServerConfig.PublicKeyCallback by
upgrading golang.org/x/crypto (bsc#1234554)
* CVE-2023-3128: Fixed authentication bypass using Azure AD OAuth
(bsc#1212641)
* CVE-2023-6152: Add email verification when updating user email (bsc#1219912)
* CVE-2024-6837: Fixed potential data source permission escalation
(bsc#1236301)
* CVE-2024-8118: Fixed permission on external alerting rule write endpoint
(bsc#1231024)

* Potential breaking changes in version 10:

* In panels using the `extract fields` transformation, where one of the
extracted names collides with one of the already existing ields, the
extracted field will be renamed.
* For the existing backend mode users who have table visualization might see
some inconsistencies on their panels. We have updated the table column
naming. This will potentially affect field transformations and/or field
overrides. To resolve this either: update transformation or field override.
* For the existing backend mode users who have Transformations with the `time`
field, might see their transformations are not working. Those panels that
have broken transformations will fail to render. This is because we changed
the field key. To resolve this either: Remove the affected panel and re-
create it; Select the `Time` field again; Edit the `time` field as `Time`
for transformation in `panel.json` or `dashboard.json`
* The following data source permission endpoints have been removed: `GET
/datasources/:datasourceId/permissions` `POST
/api/datasources/:datasourceId/permissions` `DELETE
/datasources/:datasourceId/permissions` `POST
/datasources/:datasourceId/enable-permissions` `POST
/datasources/:datasourceId/disable-permissions`
* Please use the following endpoints instead: `GET /api/access-control/datasources/:uid` for listing data source permissions `POST /api/access-control/datasources/:uid/users/:id`, `POST /api/access-control/datasources/:uid/teams/:id` and `POST /api/access-control/datasources/:uid/buildInRoles/:id` for adding or removing data source permissions
* If you are using Terraform Grafana provider to manage data source
permissions, you will need to upgrade your provider.
* For the existing backend mode users who have table visualization might see
some inconsistencies on their panels. We have updated the table column
naming. This will potentially affect field transformations and/or field
overrides.
* The deprecated `/playlists/{uid}/dashboards` API endpoint has been removed.
Dashboard information can be retrieved from the `/dashboard/...` APIs.
* The `PUT /api/folders/:uid` endpoint no more supports modifying the folder's
`UID`
* Removed all components for the old panel header design.
* Please review https://grafana.com/docs/grafana/next/breaking-
changes/breaking-changes-v10-3/ for more details
* OAuth role mapping enforcement: This change impacts GitHub, Gitlab, Okta,
and Generic OAuth. To avoid overriding manually set roles, enable the
skip_org_role_sync option in the Grafana configuration for your OAuth
provider before upgrading
* Angular has been deprecated
* Grafana legacy alerting has been deprecated
* API keys are migrating to service accounts
* The experimental “dashboard previews” feature is removed
* Usernames are now case-insensitive by default
* Grafana OAuth integrations do not work anymore with email lookups
* The “Alias” field in the CloudWatch data source is removed
* Athena data source plugin must be updated to version >=2.9.3
* Redshift data source plugin must be updated to version >=1.8.3
* DoiT International BigQuery plugin no longer supported
* Please review https://grafana.com/docs/grafana/next/breaking-
changes/breaking-changes-v10-0 for more details

* This update brings many new features, enhancements and fixes highlighted at:

* https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v10-4/
* https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v10-3/
* https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v10-2/
* https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v10-1/
* https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v10-0/:

spacecmd was updated to version 5.0.11-0:

* Updated translation strings

supportutils-plugin-salt was updated to version 1.2.3:

* Adjusted requirements for plugin to allow compatibility with supportutils
3.2.9 release (bsc#1235145)
* Provide backwards-compatible scripts version

supportutils-plugin-susemanager-client was updated to version 5.0.4-0:

* Adjusted requirements for plugin to allow compatibility with supportutils
3.2.9 release (bsc#1235145)

uyuni-tools was updated from version 0.1.23-0 to 0.1.27-0:

* Security issues fixed:
* CVE-2024-22037: Use podman secret to store the database credentials
(bsc#1231497)
* Other changes and bugs fixed:
* Version 0.1.27-0
* Bump the default image tag to 5.0.3
* IsInstalled function fix
* Run systemctl daemon-reload after changing the container image config (bsc#1233279)
* Coco-replicas-upgrade
* Persist search server indexes (bsc#1231759)
* Sync deletes files during migration (bsc#1233660)
* Ignore coco and hub images when applying PTF if they are not ailable (bsc#1229079)
* Add --registry back to mgrpxy (bsc#1233202)
* Only add java.hostname on migrated server if not present
* Consider the configuration file to detect the coco or hub api images should be pulled (bsc#1229104)
* Only raise an error if cloudguestregistryauth fails for PAYG (bsc#1233630)
* Add registry.suse.com login to mgradm upgrade podman list (bsc#1234123)
* Version 0.1.26-0
* Ignore all zypper caches during migration (bsc#1232769)
* Use the uyuni network for all podman containers (bsc#1232817)
* Version 0.1.25-0
* Don't migrate enabled systemd services, recreate them (bsc#1232575)
* Version 0.1.24-0
* Redact JSESSIONID and pxt-session-cookie values from logs and console output (bsc#1231568)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2025-525=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-525=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2025-525=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-525=1

* SUSE Manager Client Tools for SLE 15
zypper in -t patch SUSE-SLE-Manager-Tools-15-2025-525=1

* SUSE Manager Client Tools for SLE Micro 5
zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2025-525=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-525=1

* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-525=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-525=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-525=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-525=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-525=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-525=1

* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-525=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-525=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-525=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-525=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-525=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-525=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-525=1

## Package List:

* SUSE Manager Retail Branch Server 4.3 (noarch)
* supportutils-plugin-salt-1.2.3-150000.3.16.1
* SUSE Manager Server 4.3 (noarch)
* supportutils-plugin-salt-1.2.3-150000.3.16.1
* SUSE Enterprise Storage 7.1 (noarch)
* supportutils-plugin-salt-1.2.3-150000.3.16.1
* openSUSE Leap 15.6 (noarch)
* supportutils-plugin-salt-1.2.3-150000.3.16.1
* dracut-saltboot-0.1.1728559936.c16d4fb-150000.1.56.1
* supportutils-plugin-susemanager-client-5.0.4-150000.3.27.1
* spacecmd-5.0.11-150000.3.130.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* golang-github-prometheus-promu-0.17.0-150000.3.24.1
* SUSE Manager Client Tools for SLE 15 (noarch)
* mgrctl-lang-0.1.28-150000.1.16.1
* mgrctl-bash-completion-0.1.28-150000.1.16.1
* dracut-saltboot-0.1.1728559936.c16d4fb-150000.1.56.1
* mgrctl-zsh-completion-0.1.28-150000.1.16.1
* supportutils-plugin-salt-1.2.3-150000.3.16.1
* spacecmd-5.0.11-150000.3.130.1
* supportutils-plugin-susemanager-client-5.0.4-150000.3.27.1
* SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64)
* grafana-debuginfo-10.4.13-150000.1.66.1
* grafana-10.4.13-150000.1.66.1
* golang-github-prometheus-prometheus-2.53.3-150000.3.59.1
* mgrctl-debuginfo-0.1.28-150000.1.16.1
* mgrctl-0.1.28-150000.1.16.1
* firewalld-prometheus-config-0.1-150000.3.59.1
* SUSE Manager Client Tools for SLE Micro 5 (noarch)
* mgrctl-lang-0.1.28-150000.1.16.1
* dracut-saltboot-0.1.1728559936.c16d4fb-150000.1.56.1
* mgrctl-zsh-completion-0.1.28-150000.1.16.1
* mgrctl-bash-completion-0.1.28-150000.1.16.1
* SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64)
* mgrctl-debuginfo-0.1.28-150000.1.16.1
* mgrctl-0.1.28-150000.1.16.1
* Basesystem Module 15-SP6 (noarch)
* supportutils-plugin-salt-1.2.3-150000.3.16.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* golang-github-prometheus-promu-0.17.0-150000.3.24.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* supportutils-plugin-salt-1.2.3-150000.3.16.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* supportutils-plugin-salt-1.2.3-150000.3.16.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* supportutils-plugin-salt-1.2.3-150000.3.16.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* supportutils-plugin-salt-1.2.3-150000.3.16.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* supportutils-plugin-salt-1.2.3-150000.3.16.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (noarch)
* supportutils-plugin-salt-1.2.3-150000.3.16.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* supportutils-plugin-salt-1.2.3-150000.3.16.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* supportutils-plugin-salt-1.2.3-150000.3.16.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* supportutils-plugin-salt-1.2.3-150000.3.16.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* supportutils-plugin-salt-1.2.3-150000.3.16.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* supportutils-plugin-salt-1.2.3-150000.3.16.1
* SUSE Manager Proxy 4.3 (noarch)
* supportutils-plugin-salt-1.2.3-150000.3.16.1

## References:

* https://www.suse.com/security/cve/CVE-2023-3128.html
* https://www.suse.com/security/cve/CVE-2023-6152.html
* https://www.suse.com/security/cve/CVE-2024-22037.html
* https://www.suse.com/security/cve/CVE-2024-45337.html
* https://www.suse.com/security/cve/CVE-2024-51744.html
* https://www.suse.com/security/cve/CVE-2024-6837.html
* https://www.suse.com/security/cve/CVE-2024-8118.html
* https://bugzilla.suse.com/show_bug.cgi?id=1212641
* https://bugzilla.suse.com/show_bug.cgi?id=1219912
* https://bugzilla.suse.com/show_bug.cgi?id=1229079
* https://bugzilla.suse.com/show_bug.cgi?id=1229104
* https://bugzilla.suse.com/show_bug.cgi?id=1231024
* https://bugzilla.suse.com/show_bug.cgi?id=1231497
* https://bugzilla.suse.com/show_bug.cgi?id=1231568
* https://bugzilla.suse.com/show_bug.cgi?id=1231759
* https://bugzilla.suse.com/show_bug.cgi?id=1232575
* https://bugzilla.suse.com/show_bug.cgi?id=1232769
* https://bugzilla.suse.com/show_bug.cgi?id=1232817
* https://bugzilla.suse.com/show_bug.cgi?id=1232970
* https://bugzilla.suse.com/show_bug.cgi?id=1233202
* https://bugzilla.suse.com/show_bug.cgi?id=1233279
* https://bugzilla.suse.com/show_bug.cgi?id=1233630
* https://bugzilla.suse.com/show_bug.cgi?id=1233660
* https://bugzilla.suse.com/show_bug.cgi?id=1234123
* https://bugzilla.suse.com/show_bug.cgi?id=1234554
* https://bugzilla.suse.com/show_bug.cgi?id=1235145
* https://bugzilla.suse.com/show_bug.cgi?id=1236301
* https://jira.suse.com/browse/MSQA-914
* https://jira.suse.com/browse/PED-11591
* https://jira.suse.com/browse/PED-11649
* https://jira.suse.com/browse/SUMA-314



SUSE-SU-2025:0546-1: moderate: Security update golang-github-prometheus-prometheus


# Security update golang-github-prometheus-prometheus

Announcement ID: SUSE-SU-2025:0546-1
Release Date: 2025-02-14T07:24:45Z
Rating: moderate
References:

* bsc#1232970
* jsc#MSQA-914
* jsc#PED-11649

Cross-References:

* CVE-2024-51744

CVSS scores:

* CVE-2024-51744 ( SUSE ): 2.1
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-51744 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2024-51744 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Proxy 4.3 Module
* SUSE Manager Retail Branch Server 4.3
* SUSE Package Hub 15 15-SP6

An update that solves one vulnerability and contains two features can now be
installed.

## Description:

golang-github-prometheus-prometheus was updated from version 2.45.6 to 2.53.3
(jsc#PED-11649):

* Security issues fixed:
* CVE-2024-51744: Updated golang-jwt to version 5.0 to fix bad error handling
(bsc#1232970)

* Highlights of other changes:

* Performance:
* Significant enhancements to PromQL execution speed, TSDB operations (especially querying and compaction) and remote write operations.
* Default GOGC value lowered to 75 for better memory management.
* Option to limit memory usage from dropped targets added.
* New Features:
* Experimental OpenTelemetry ingestion.
* Automatic memory limit handling.
* Native histogram support, including new functions, UI enhancements, and improved scraping.
* Improved alerting features, such as relabeling rules for AlertmanagerConfig and a new query_offset option.
* Expanded service discovery options with added metadata and support for new services.
* New promtool commands for PromQL formatting, label manipulation, metric pushing, and OpenMetrics dumping.
* Bug Fixes:
* Numerous fixes across scraping, API, TSDB, PromQL, and service discovery.
* For a detailed list of changes consult the package changelog or
https://github.com/prometheus/prometheus/compare/v2.45.6...v2.53.3

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-546=1

* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-546=1

* SUSE Manager Proxy 4.3 Module
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2025-546=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* firewalld-prometheus-config-0.1-150100.4.23.1
* golang-github-prometheus-prometheus-2.53.3-150100.4.23.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* golang-github-prometheus-prometheus-2.53.3-150100.4.23.1
* SUSE Manager Proxy 4.3 Module (aarch64 ppc64le s390x x86_64)
* golang-github-prometheus-prometheus-2.53.3-150100.4.23.1

## References:

* https://www.suse.com/security/cve/CVE-2024-51744.html
* https://bugzilla.suse.com/show_bug.cgi?id=1232970
* https://jira.suse.com/browse/MSQA-914
* https://jira.suse.com/browse/PED-11649



SUSE-SU-2025:0545-1: moderate: Security update for grafana


# Security update for grafana

Announcement ID: SUSE-SU-2025:0545-1
Release Date: 2025-02-14T07:24:23Z
Rating: moderate
References:

* bsc#1212641
* bsc#1219912
* bsc#1231024
* bsc#1234554
* bsc#1236301
* jsc#MSQA-914
* jsc#PED-11591
* jsc#PED-11649

Cross-References:

* CVE-2023-3128
* CVE-2023-6152
* CVE-2024-45337
* CVE-2024-6837
* CVE-2024-8118

CVSS scores:

* CVE-2023-3128 ( SUSE ): 9.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
* CVE-2023-3128 ( NVD ): 9.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
* CVE-2023-3128 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6152 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-6152 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-6152 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-45337 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45337 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-6837 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-6837 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2024-8118 ( SUSE ): 4.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-8118 ( NVD ): 5.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6

An update that solves five vulnerabilities and contains three features can now
be installed.

## Description:

This update for grafana fixes the following issues:

grafana was updated from version 9.5.18 to 10.4.13
(jsc#PED-11591,jsc#PED-11649):

* Security issues fixed:
* CVE-2024-45337: Prevent possible misuse of ServerConfig.PublicKeyCallback by
upgrading golang.org/x/crypto (bsc#1234554)
* CVE-2023-3128: Fixed authentication bypass using Azure AD OAuth
(bsc#1212641)
* CVE-2023-6152: Add email verification when updating user email (bsc#1219912)
* CVE-2024-6837: Fixed potential data source permission escalation
(bsc#1236301)
* CVE-2024-8118: Fixed permission on external alerting rule write endpoint
(bsc#1231024)

* Potential breaking changes in version 10:

* In panels using the `extract fields` transformation, where one of the
extracted names collides with one of the already existing ields, the
extracted field will be renamed.
* For the existing backend mode users who have table visualization might see
some inconsistencies on their panels. We have updated the table column
naming. This will potentially affect field transformations and/or field
overrides. To resolve this either: update transformation or field override.
* For the existing backend mode users who have Transformations with the `time`
field, might see their transformations are not working. Those panels that
have broken transformations will fail to render. This is because we changed
the field key. To resolve this either: Remove the affected panel and re-
create it; Select the `Time` field again; Edit the `time` field as `Time`
for transformation in `panel.json` or `dashboard.json`
* The following data source permission endpoints have been removed: `GET
/datasources/:datasourceId/permissions` `POST
/api/datasources/:datasourceId/permissions` `DELETE
/datasources/:datasourceId/permissions` `POST
/datasources/:datasourceId/enable-permissions` `POST
/datasources/:datasourceId/disable-permissions`
* Please use the following endpoints instead: `GET /api/access-control/datasources/:uid` for listing data source permissions `POST /api/access-control/datasources/:uid/users/:id`, `POST /api/access-control/datasources/:uid/teams/:id` and `POST /api/access-control/datasources/:uid/buildInRoles/:id` for adding or removing data source permissions
* If you are using Terraform Grafana provider to manage data source
permissions, you will need to upgrade your provider.
* For the existing backend mode users who have table visualization might see
some inconsistencies on their panels. We have updated the table column
naming. This will potentially affect field transformations and/or field
overrides.
* The deprecated `/playlists/{uid}/dashboards` API endpoint has been removed.
Dashboard information can be retrieved from the `/dashboard/...` APIs.
* The `PUT /api/folders/:uid` endpoint no more supports modifying the folder's
`UID`
* Removed all components for the old panel header design.
* Please review https://grafana.com/docs/grafana/next/breaking-
changes/breaking-changes-v10-3/ for more details
* OAuth role mapping enforcement: This change impacts GitHub, Gitlab, Okta,
and Generic OAuth. To avoid overriding manually set roles, enable the
skip_org_role_sync option in the Grafana configuration for your OAuth
provider before upgrading
* Angular has been deprecated
* Grafana legacy alerting has been deprecated
* API keys are migrating to service accounts
* The experimental “dashboard previews” feature is removed
* Usernames are now case-insensitive by default
* Grafana OAuth integrations do not work anymore with email lookups
* The “Alias” field in the CloudWatch data source is removed
* Athena data source plugin must be updated to version >=2.9.3
* Redshift data source plugin must be updated to version >=1.8.3
* DoiT International BigQuery plugin no longer supported
* Please review https://grafana.com/docs/grafana/next/breaking-
changes/breaking-changes-v10-0 for more details

* This update brings many new features, enhancements and fixes highlighted at:

* https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v10-4/
* https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v10-3/
* https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v10-2/
* https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v10-1/
* https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v10-0/

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-545=1

* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-545=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* grafana-10.4.13-150200.3.59.1
* grafana-debuginfo-10.4.13-150200.3.59.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* grafana-10.4.13-150200.3.59.1
* grafana-debuginfo-10.4.13-150200.3.59.1

## References:

* https://www.suse.com/security/cve/CVE-2023-3128.html
* https://www.suse.com/security/cve/CVE-2023-6152.html
* https://www.suse.com/security/cve/CVE-2024-45337.html
* https://www.suse.com/security/cve/CVE-2024-6837.html
* https://www.suse.com/security/cve/CVE-2024-8118.html
* https://bugzilla.suse.com/show_bug.cgi?id=1212641
* https://bugzilla.suse.com/show_bug.cgi?id=1219912
* https://bugzilla.suse.com/show_bug.cgi?id=1231024
* https://bugzilla.suse.com/show_bug.cgi?id=1234554
* https://bugzilla.suse.com/show_bug.cgi?id=1236301
* https://jira.suse.com/browse/MSQA-914
* https://jira.suse.com/browse/PED-11591
* https://jira.suse.com/browse/PED-11649



openSUSE-SU-2025:0059-1: important: Security update for chromium


openSUSE Security Update: Security update for chromium
_______________________________

Announcement ID: openSUSE-SU-2025:0059-1
Rating: important
References: #1237121
Cross-References: CVE-2025-0995 CVE-2025-0996 CVE-2025-0997
CVE-2025-0998
Affected Products:
openSUSE Backports SLE-15-SP6
_______________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for chromium fixes the following issues:

Chromium 133.0.6943.98 (boo#1237121):

- CVE-2025-0995: Use after free in V8
- CVE-2025-0996: Inappropriate implementation in Browser UI
- CVE-2025-0997: Use after free in Navigation
- CVE-2025-0998: Out of bounds memory access in V8

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP6:

zypper in -t patch openSUSE-2025-59=1

Package List:

- openSUSE Backports SLE-15-SP6 (aarch64 x86_64):

chromedriver-133.0.6943.98-bp156.2.81.2
chromium-133.0.6943.98-bp156.2.81.2

References:

https://www.suse.com/security/cve/CVE-2025-0995.html
https://www.suse.com/security/cve/CVE-2025-0996.html
https://www.suse.com/security/cve/CVE-2025-0997.html
https://www.suse.com/security/cve/CVE-2025-0998.html
https://bugzilla.suse.com/1237121



SUSE-SU-2025:0548-1: important: Security update for libtasn1


# Security update for libtasn1

Announcement ID: SUSE-SU-2025:0548-1
Release Date: 2025-02-14T10:20:38Z
Rating: important
References:

* bsc#1236878

Cross-References:

* CVE-2024-12133

CVSS scores:

* CVE-2024-12133 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-12133 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-12133 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves one vulnerability can now be installed.

## Description:

This update for libtasn1 fixes the following issues:

* CVE-2024-12133: the processing of input DER data containing a large number
of SEQUENCE OF or SET OF elements takes quadratic time to complete.
(bsc#1236878)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-548=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-548=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-548=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-548=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-548=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-548=1

* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-548=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-548=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-548=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-548=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-548=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-548=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-548=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2025-548=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-548=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2025-548=1

* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-548=1

* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-548=1

* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-548=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-548=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-548=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-548=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-548=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-548=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-548=1

## Package List:

* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-devel-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1
* Basesystem Module 15-SP6 (x86_64)
* libtasn1-6-32bit-4.13-150000.4.11.1
* libtasn1-6-32bit-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-devel-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* libtasn1-6-32bit-4.13-150000.4.11.1
* libtasn1-6-32bit-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-devel-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libtasn1-6-32bit-4.13-150000.4.11.1
* libtasn1-6-32bit-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-devel-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libtasn1-6-32bit-4.13-150000.4.11.1
* libtasn1-6-32bit-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-devel-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64)
* libtasn1-6-32bit-4.13-150000.4.11.1
* libtasn1-6-32bit-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-devel-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64)
* libtasn1-6-32bit-4.13-150000.4.11.1
* libtasn1-6-32bit-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-devel-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64)
* libtasn1-6-32bit-4.13-150000.4.11.1
* libtasn1-6-32bit-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-devel-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64)
* libtasn1-6-32bit-4.13-150000.4.11.1
* libtasn1-6-32bit-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-devel-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64)
* libtasn1-6-32bit-4.13-150000.4.11.1
* libtasn1-6-32bit-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-devel-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* libtasn1-6-32bit-4.13-150000.4.11.1
* libtasn1-6-32bit-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-devel-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libtasn1-6-32bit-4.13-150000.4.11.1
* libtasn1-6-32bit-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-devel-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64)
* libtasn1-6-32bit-4.13-150000.4.11.1
* libtasn1-6-32bit-debuginfo-4.13-150000.4.11.1
* SUSE Manager Proxy 4.3 (x86_64)
* libtasn1-6-32bit-4.13-150000.4.11.1
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-6-32bit-debuginfo-4.13-150000.4.11.1
* libtasn1-devel-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libtasn1-6-32bit-4.13-150000.4.11.1
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-6-32bit-debuginfo-4.13-150000.4.11.1
* libtasn1-devel-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-devel-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1
* SUSE Manager Server 4.3 (x86_64)
* libtasn1-6-32bit-4.13-150000.4.11.1
* libtasn1-6-32bit-debuginfo-4.13-150000.4.11.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-devel-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1
* SUSE Enterprise Storage 7.1 (x86_64)
* libtasn1-6-32bit-4.13-150000.4.11.1
* libtasn1-6-32bit-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-devel-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1
* openSUSE Leap 15.6 (x86_64)
* libtasn1-6-32bit-4.13-150000.4.11.1
* libtasn1-devel-32bit-4.13-150000.4.11.1
* libtasn1-6-32bit-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libtasn1-debugsource-4.13-150000.4.11.1
* libtasn1-4.13-150000.4.11.1
* libtasn1-6-4.13-150000.4.11.1
* libtasn1-6-debuginfo-4.13-150000.4.11.1
* libtasn1-debuginfo-4.13-150000.4.11.1

## References:

* https://www.suse.com/security/cve/CVE-2024-12133.html
* https://bugzilla.suse.com/show_bug.cgi?id=1236878



openSUSE-SU-2025:14807-1: moderate: postgresql15-15.11-1.1 on GA media


# postgresql15-15.11-1.1 on GA media

Announcement ID: openSUSE-SU-2025:14807-1
Rating: moderate

Cross-References:

* CVE-2025-1094

CVSS scores:

* CVE-2025-1094 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-1094 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the postgresql15-15.11-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* postgresql15 15.11-1.1
* postgresql15-contrib 15.11-1.1
* postgresql15-devel 15.11-1.1
* postgresql15-docs 15.11-1.1
* postgresql15-llvmjit 15.11-1.1
* postgresql15-llvmjit-devel 15.11-1.1
* postgresql15-plperl 15.11-1.1
* postgresql15-plpython 15.11-1.1
* postgresql15-pltcl 15.11-1.1
* postgresql15-server 15.11-1.1
* postgresql15-server-devel 15.11-1.1
* postgresql15-test 15.11-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-1094.html



openSUSE-SU-2025:14804-1: moderate: kernel-firmware-all-20250206-1.1 on GA media


# kernel-firmware-all-20250206-1.1 on GA media

Announcement ID: openSUSE-SU-2025:14804-1
Rating: moderate

Cross-References:

* CVE-2017-13080
* CVE-2017-5715
* CVE-2019-9836
* CVE-2021-26339
* CVE-2021-26348
* CVE-2021-26364
* CVE-2021-26375
* CVE-2021-33139
* CVE-2021-46744
* CVE-2023-20569
* CVE-2023-20593

CVSS scores:

* CVE-2017-13080 ( SUSE ): 8.1 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2017-5715 ( SUSE ): 7.1 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
* CVE-2019-9836 ( SUSE ): 4.7 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-26339 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-33139 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46744 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-20569 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2023-20593 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 11 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the kernel-firmware-all-20250206-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* kernel-firmware-all 20250206-1.1

## References:

* https://www.suse.com/security/cve/CVE-2017-13080.html
* https://www.suse.com/security/cve/CVE-2017-5715.html
* https://www.suse.com/security/cve/CVE-2019-9836.html
* https://www.suse.com/security/cve/CVE-2021-26339.html
* https://www.suse.com/security/cve/CVE-2021-26348.html
* https://www.suse.com/security/cve/CVE-2021-26364.html
* https://www.suse.com/security/cve/CVE-2021-26375.html
* https://www.suse.com/security/cve/CVE-2021-33139.html
* https://www.suse.com/security/cve/CVE-2021-46744.html
* https://www.suse.com/security/cve/CVE-2023-20569.html
* https://www.suse.com/security/cve/CVE-2023-20593.html



SUSE-SU-2025:0551-1: moderate: Security update for python311


# Security update for python311

Announcement ID: SUSE-SU-2025:0551-1
Release Date: 2025-02-14T15:10:00Z
Rating: moderate
References:

* bsc#1228165
* bsc#1231795
* bsc#1236705

Cross-References:

* CVE-2025-0938

CVSS scores:

* CVE-2025-0938 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N
* CVE-2025-0938 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
* CVE-2025-0938 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Affected Products:

* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* Python 3 Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves one vulnerability and has two security fixes can now be
installed.

## Description:

This update for python311 fixes the following issues:

* CVE-2025-0938: domain names containing square brackets are not identified as
incorrect by urlparse. (bsc#1236705)

Other fixes:

* Update to version 3.11.11.
* Remove -IVendor/ from python-config. (bsc#1231795)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-551=1 openSUSE-SLE-15.6-2025-551=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-551=1

* Python 3 Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2025-551=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* python311-idle-3.11.11-150600.3.16.2
* python311-debuginfo-3.11.11-150600.3.16.2
* python311-curses-debuginfo-3.11.11-150600.3.16.2
* libpython3_11-1_0-3.11.11-150600.3.16.2
* libpython3_11-1_0-debuginfo-3.11.11-150600.3.16.2
* python311-doc-3.11.11-150600.3.16.2
* python311-testsuite-debuginfo-3.11.11-150600.3.16.2
* python311-tools-3.11.11-150600.3.16.2
* python311-dbm-debuginfo-3.11.11-150600.3.16.2
* python311-3.11.11-150600.3.16.2
* python311-devel-3.11.11-150600.3.16.2
* python311-debugsource-3.11.11-150600.3.16.2
* python311-tk-3.11.11-150600.3.16.2
* python311-curses-3.11.11-150600.3.16.2
* python311-dbm-3.11.11-150600.3.16.2
* python311-testsuite-3.11.11-150600.3.16.2
* python311-doc-devhelp-3.11.11-150600.3.16.2
* python311-core-debugsource-3.11.11-150600.3.16.2
* python311-base-3.11.11-150600.3.16.2
* python311-tk-debuginfo-3.11.11-150600.3.16.2
* python311-base-debuginfo-3.11.11-150600.3.16.2
* openSUSE Leap 15.6 (x86_64)
* python311-base-32bit-debuginfo-3.11.11-150600.3.16.2
* python311-base-32bit-3.11.11-150600.3.16.2
* python311-32bit-3.11.11-150600.3.16.2
* libpython3_11-1_0-32bit-debuginfo-3.11.11-150600.3.16.2
* libpython3_11-1_0-32bit-3.11.11-150600.3.16.2
* python311-32bit-debuginfo-3.11.11-150600.3.16.2
* openSUSE Leap 15.6 (aarch64_ilp32)
* libpython3_11-1_0-64bit-debuginfo-3.11.11-150600.3.16.2
* python311-64bit-3.11.11-150600.3.16.2
* libpython3_11-1_0-64bit-3.11.11-150600.3.16.2
* python311-base-64bit-debuginfo-3.11.11-150600.3.16.2
* python311-base-64bit-3.11.11-150600.3.16.2
* python311-64bit-debuginfo-3.11.11-150600.3.16.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* python311-core-debugsource-3.11.11-150600.3.16.2
* python311-base-3.11.11-150600.3.16.2
* libpython3_11-1_0-3.11.11-150600.3.16.2
* libpython3_11-1_0-debuginfo-3.11.11-150600.3.16.2
* python311-base-debuginfo-3.11.11-150600.3.16.2
* Python 3 Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* python311-dbm-debuginfo-3.11.11-150600.3.16.2
* python311-3.11.11-150600.3.16.2
* python311-devel-3.11.11-150600.3.16.2
* python311-debugsource-3.11.11-150600.3.16.2
* python311-idle-3.11.11-150600.3.16.2
* python311-dbm-3.11.11-150600.3.16.2
* python311-tk-3.11.11-150600.3.16.2
* python311-debuginfo-3.11.11-150600.3.16.2
* python311-core-debugsource-3.11.11-150600.3.16.2
* python311-curses-3.11.11-150600.3.16.2
* python311-tk-debuginfo-3.11.11-150600.3.16.2
* python311-curses-debuginfo-3.11.11-150600.3.16.2
* python311-tools-3.11.11-150600.3.16.2

## References:

* https://www.suse.com/security/cve/CVE-2025-0938.html
* https://bugzilla.suse.com/show_bug.cgi?id=1228165
* https://bugzilla.suse.com/show_bug.cgi?id=1231795
* https://bugzilla.suse.com/show_bug.cgi?id=1236705



SUSE-SU-2025:0554-1: moderate: Security update for python3


# Security update for python3

Announcement ID: SUSE-SU-2025:0554-1
Release Date: 2025-02-14T15:11:05Z
Rating: moderate
References:

* bsc#1236705

Cross-References:

* CVE-2025-0938

CVSS scores:

* CVE-2025-0938 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N
* CVE-2025-0938 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
* CVE-2025-0938 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Affected Products:

* Basesystem Module 15-SP6
* Development Tools Module 15-SP6
* openSUSE Leap 15.3
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves one vulnerability can now be installed.

## Description:

This update for python3 fixes the following issues:

* CVE-2025-0938: domain names containing square brackets are not identified as
incorrect by urlparse. (bsc#1236705)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.3
zypper in -t patch SUSE-2025-554=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-554=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-554=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-554=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-554=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-554=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-554=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-554=1

* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-554=1

* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-554=1

* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-554=1

## Package List:

* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* python3-dbm-3.6.15-150300.10.81.1
* python3-devel-debuginfo-3.6.15-150300.10.81.1
* python3-testsuite-debuginfo-3.6.15-150300.10.81.1
* python3-tk-3.6.15-150300.10.81.1
* python3-dbm-debuginfo-3.6.15-150300.10.81.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.81.1
* python3-debuginfo-3.6.15-150300.10.81.1
* python3-curses-debuginfo-3.6.15-150300.10.81.1
* python3-debugsource-3.6.15-150300.10.81.1
* libpython3_6m1_0-3.6.15-150300.10.81.1
* python3-testsuite-3.6.15-150300.10.81.1
* python3-tools-3.6.15-150300.10.81.1
* python3-doc-3.6.15-150300.10.81.1
* python3-base-3.6.15-150300.10.81.1
* python3-doc-devhelp-3.6.15-150300.10.81.1
* python3-idle-3.6.15-150300.10.81.1
* python3-devel-3.6.15-150300.10.81.1
* python3-curses-3.6.15-150300.10.81.1
* python3-core-debugsource-3.6.15-150300.10.81.1
* python3-tk-debuginfo-3.6.15-150300.10.81.1
* python3-3.6.15-150300.10.81.1
* python3-base-debuginfo-3.6.15-150300.10.81.1
* openSUSE Leap 15.3 (x86_64)
* libpython3_6m1_0-32bit-3.6.15-150300.10.81.1
* libpython3_6m1_0-32bit-debuginfo-3.6.15-150300.10.81.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* libpython3_6m1_0-64bit-debuginfo-3.6.15-150300.10.81.1
* libpython3_6m1_0-64bit-3.6.15-150300.10.81.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python3-dbm-3.6.15-150300.10.81.1
* python3-devel-debuginfo-3.6.15-150300.10.81.1
* python3-testsuite-debuginfo-3.6.15-150300.10.81.1
* python3-tk-3.6.15-150300.10.81.1
* python3-dbm-debuginfo-3.6.15-150300.10.81.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.81.1
* python3-debuginfo-3.6.15-150300.10.81.1
* python3-curses-debuginfo-3.6.15-150300.10.81.1
* libpython3_6m1_0-3.6.15-150300.10.81.1
* python3-debugsource-3.6.15-150300.10.81.1
* python3-testsuite-3.6.15-150300.10.81.1
* python3-tools-3.6.15-150300.10.81.1
* python3-doc-3.6.15-150300.10.81.1
* python3-base-3.6.15-150300.10.81.1
* python3-doc-devhelp-3.6.15-150300.10.81.1
* python3-idle-3.6.15-150300.10.81.1
* python3-devel-3.6.15-150300.10.81.1
* python3-curses-3.6.15-150300.10.81.1
* python3-core-debugsource-3.6.15-150300.10.81.1
* python3-tk-debuginfo-3.6.15-150300.10.81.1
* python3-3.6.15-150300.10.81.1
* python3-base-debuginfo-3.6.15-150300.10.81.1
* openSUSE Leap 15.6 (x86_64)
* libpython3_6m1_0-32bit-3.6.15-150300.10.81.1
* libpython3_6m1_0-32bit-debuginfo-3.6.15-150300.10.81.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libpython3_6m1_0-3.6.15-150300.10.81.1
* python3-debugsource-3.6.15-150300.10.81.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.81.1
* python3-debuginfo-3.6.15-150300.10.81.1
* python3-base-3.6.15-150300.10.81.1
* python3-core-debugsource-3.6.15-150300.10.81.1
* python3-3.6.15-150300.10.81.1
* python3-base-debuginfo-3.6.15-150300.10.81.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libpython3_6m1_0-3.6.15-150300.10.81.1
* python3-debugsource-3.6.15-150300.10.81.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.81.1
* python3-debuginfo-3.6.15-150300.10.81.1
* python3-base-3.6.15-150300.10.81.1
* python3-core-debugsource-3.6.15-150300.10.81.1
* python3-3.6.15-150300.10.81.1
* python3-base-debuginfo-3.6.15-150300.10.81.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libpython3_6m1_0-3.6.15-150300.10.81.1
* python3-debugsource-3.6.15-150300.10.81.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.81.1
* python3-debuginfo-3.6.15-150300.10.81.1
* python3-base-3.6.15-150300.10.81.1
* python3-core-debugsource-3.6.15-150300.10.81.1
* python3-3.6.15-150300.10.81.1
* python3-base-debuginfo-3.6.15-150300.10.81.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libpython3_6m1_0-3.6.15-150300.10.81.1
* python3-debugsource-3.6.15-150300.10.81.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.81.1
* python3-debuginfo-3.6.15-150300.10.81.1
* python3-base-3.6.15-150300.10.81.1
* python3-core-debugsource-3.6.15-150300.10.81.1
* python3-3.6.15-150300.10.81.1
* python3-base-debuginfo-3.6.15-150300.10.81.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libpython3_6m1_0-3.6.15-150300.10.81.1
* python3-debugsource-3.6.15-150300.10.81.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.81.1
* python3-debuginfo-3.6.15-150300.10.81.1
* python3-base-3.6.15-150300.10.81.1
* python3-core-debugsource-3.6.15-150300.10.81.1
* python3-3.6.15-150300.10.81.1
* python3-base-debuginfo-3.6.15-150300.10.81.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libpython3_6m1_0-3.6.15-150300.10.81.1
* python3-dbm-3.6.15-150300.10.81.1
* python3-debugsource-3.6.15-150300.10.81.1
* python3-devel-3.6.15-150300.10.81.1
* python3-devel-debuginfo-3.6.15-150300.10.81.1
* python3-idle-3.6.15-150300.10.81.1
* python3-tk-3.6.15-150300.10.81.1
* python3-dbm-debuginfo-3.6.15-150300.10.81.1
* python3-curses-3.6.15-150300.10.81.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.81.1
* python3-debuginfo-3.6.15-150300.10.81.1
* python3-base-3.6.15-150300.10.81.1
* python3-core-debugsource-3.6.15-150300.10.81.1
* python3-curses-debuginfo-3.6.15-150300.10.81.1
* python3-tk-debuginfo-3.6.15-150300.10.81.1
* python3-3.6.15-150300.10.81.1
* python3-base-debuginfo-3.6.15-150300.10.81.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* python3-core-debugsource-3.6.15-150300.10.81.1
* python3-tools-3.6.15-150300.10.81.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* libpython3_6m1_0-3.6.15-150300.10.81.1
* python3-debugsource-3.6.15-150300.10.81.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.81.1
* python3-debuginfo-3.6.15-150300.10.81.1
* python3-base-3.6.15-150300.10.81.1
* python3-core-debugsource-3.6.15-150300.10.81.1
* python3-3.6.15-150300.10.81.1
* python3-base-debuginfo-3.6.15-150300.10.81.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* libpython3_6m1_0-3.6.15-150300.10.81.1
* python3-debugsource-3.6.15-150300.10.81.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.81.1
* python3-debuginfo-3.6.15-150300.10.81.1
* python3-base-3.6.15-150300.10.81.1
* python3-core-debugsource-3.6.15-150300.10.81.1
* python3-3.6.15-150300.10.81.1
* python3-base-debuginfo-3.6.15-150300.10.81.1

## References:

* https://www.suse.com/security/cve/CVE-2025-0938.html
* https://bugzilla.suse.com/show_bug.cgi?id=1236705



SUSE-SU-2025:0556-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:0556-1
Release Date: 2025-02-14T15:26:36Z
Rating: important
References:

* bsc#1194869
* bsc#1216813
* bsc#1223384
* bsc#1225736
* bsc#1226848
* bsc#1226980
* bsc#1228537
* bsc#1228592
* bsc#1230341
* bsc#1230432
* bsc#1230527
* bsc#1230697
* bsc#1231088
* bsc#1231847
* bsc#1232914
* bsc#1233028
* bsc#1233055
* bsc#1233097
* bsc#1233103
* bsc#1233112
* bsc#1233464
* bsc#1233488
* bsc#1233642
* bsc#1233778
* bsc#1234024
* bsc#1234025
* bsc#1234078
* bsc#1234087
* bsc#1234153
* bsc#1234155
* bsc#1234223
* bsc#1234381
* bsc#1234683
* bsc#1234690
* bsc#1234825
* bsc#1234829
* bsc#1234832
* bsc#1234884
* bsc#1234889
* bsc#1234896
* bsc#1234899
* bsc#1234900
* bsc#1234905
* bsc#1234909
* bsc#1234916
* bsc#1234918
* bsc#1234922
* bsc#1234930
* bsc#1234931
* bsc#1234934
* bsc#1234962
* bsc#1234999
* bsc#1235002
* bsc#1235009
* bsc#1235011
* bsc#1235053
* bsc#1235057
* bsc#1235059
* bsc#1235100
* bsc#1235122
* bsc#1235123
* bsc#1235133
* bsc#1235134
* bsc#1235217
* bsc#1235222
* bsc#1235230
* bsc#1235249
* bsc#1235410
* bsc#1235430
* bsc#1235433
* bsc#1235441
* bsc#1235451
* bsc#1235458
* bsc#1235466
* bsc#1235473
* bsc#1235480
* bsc#1235491
* bsc#1235495
* bsc#1235496
* bsc#1235521
* bsc#1235557
* bsc#1235563
* bsc#1235570
* bsc#1235584
* bsc#1235611
* bsc#1235635
* bsc#1235641
* bsc#1235643
* bsc#1235645
* bsc#1235647
* bsc#1235723
* bsc#1235739
* bsc#1235747
* bsc#1235759
* bsc#1235764
* bsc#1235768
* bsc#1235806
* bsc#1235812
* bsc#1235814
* bsc#1235818
* bsc#1235842
* bsc#1235920
* bsc#1235969
* bsc#1236628

Cross-References:

* CVE-2024-26758
* CVE-2024-26943
* CVE-2024-36898
* CVE-2024-38599
* CVE-2024-41047
* CVE-2024-45019
* CVE-2024-46858
* CVE-2024-50051
* CVE-2024-50136
* CVE-2024-50142
* CVE-2024-50151
* CVE-2024-50195
* CVE-2024-50199
* CVE-2024-50210
* CVE-2024-50275
* CVE-2024-50299
* CVE-2024-53095
* CVE-2024-53103
* CVE-2024-53104
* CVE-2024-53112
* CVE-2024-53121
* CVE-2024-53127
* CVE-2024-53129
* CVE-2024-53138
* CVE-2024-53141
* CVE-2024-53144
* CVE-2024-53148
* CVE-2024-53151
* CVE-2024-53166
* CVE-2024-53169
* CVE-2024-53171
* CVE-2024-53174
* CVE-2024-53177
* CVE-2024-53208
* CVE-2024-53209
* CVE-2024-53215
* CVE-2024-53217
* CVE-2024-53224
* CVE-2024-53227
* CVE-2024-53229
* CVE-2024-53690
* CVE-2024-54680
* CVE-2024-55916
* CVE-2024-56531
* CVE-2024-56532
* CVE-2024-56533
* CVE-2024-56557
* CVE-2024-56558
* CVE-2024-56562
* CVE-2024-56567
* CVE-2024-56588
* CVE-2024-56595
* CVE-2024-56596
* CVE-2024-56597
* CVE-2024-56600
* CVE-2024-56601
* CVE-2024-56602
* CVE-2024-56623
* CVE-2024-56629
* CVE-2024-56631
* CVE-2024-56642
* CVE-2024-56644
* CVE-2024-56645
* CVE-2024-56648
* CVE-2024-56650
* CVE-2024-56658
* CVE-2024-56661
* CVE-2024-56664
* CVE-2024-56678
* CVE-2024-56681
* CVE-2024-56698
* CVE-2024-56701
* CVE-2024-56704
* CVE-2024-56722
* CVE-2024-56739
* CVE-2024-56745
* CVE-2024-56747
* CVE-2024-56754
* CVE-2024-56756
* CVE-2024-56759
* CVE-2024-56765
* CVE-2024-56776
* CVE-2024-56777
* CVE-2024-56778
* CVE-2024-57791
* CVE-2024-57792
* CVE-2024-57793
* CVE-2024-57798
* CVE-2024-57849
* CVE-2024-57850
* CVE-2024-57876
* CVE-2024-57893
* CVE-2024-57897
* CVE-2024-8805

CVSS scores:

* CVE-2024-26758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36898 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
* CVE-2024-38599 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-41047 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-45019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46858 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50051 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50051 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50051 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50051 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50136 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50136 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50142 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50142 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50142 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50151 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-50151 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50210 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50275 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50275 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50299 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50299 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53103 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53104 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53112 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53121 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53127 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53129 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53138 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-53138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53141 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53141 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53141 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53148 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53148 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53151 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53151 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53151 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53166 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53166 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53166 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53166 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53169 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53169 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53171 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53171 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53171 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53171 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53174 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53174 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53177 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53177 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53177 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53208 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53209 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53209 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53215 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53215 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53217 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53217 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53224 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53224 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53227 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53227 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53227 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53229 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53690 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54680 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-54680 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-55916 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-55916 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-55916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56531 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56531 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56532 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56532 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56533 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56533 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56557 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56558 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56558 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56562 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56567 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56567 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56567 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56588 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56588 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56595 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56595 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56595 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56596 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56596 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56596 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56597 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56597 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-56600 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56602 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56602 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56623 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56623 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56623 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56629 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56629 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56631 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56631 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56642 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56642 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56644 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56644 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56645 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56645 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56648 ( SUSE ): 8.6
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56648 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56650 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-56658 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56658 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56661 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56664 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56664 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56678 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56678 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56678 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56681 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56681 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-56698 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56698 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56701 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56704 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56704 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56722 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56722 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56739 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56745 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56747 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56747 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56747 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56754 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56754 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-56754 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56756 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56756 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-56756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56759 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56759 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56765 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56765 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56776 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56777 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56778 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56778 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57791 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57791 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57792 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57792 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57793 ( SUSE ): 6.2
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-57793 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-57798 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57849 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57849 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57850 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57850 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57876 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57876 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57893 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57893 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57897 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise Micro 5.5

An update that solves 94 vulnerabilities and has 10 security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

* CVE-2024-57897: drm/amdkfd: Correct the migration DMA map direction
(bsc#1235969).
* CVE-2024-57893: ALSA: seq: oss: Fix races at processing SysEx messages
(bsc#1235920).
* CVE-2024-57876: drm/dp_mst: Fix resetting msg rx state after topology
removal (bsc#1235806).
* CVE-2024-57849: s390/cpum_sf: Handle CPU hotplug remove during sampling
(bsc#1235814).
* CVE-2024-57798: drm/dp_mst: Ensure mst_primary pointer is valid in
drm_dp_mst_handle_up_req() (bsc#1235818).
* CVE-2024-57793: virt: tdx-guest: Just leak decrypted memory on unrecoverable
errors (bsc#1235768).
* CVE-2024-57792: power: supply: gpio-charger: Fix set charge current limits
(bsc#1235764).
* CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining
clc data (bsc#1235759).
* CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing
is enabled (bsc#1235645).
* CVE-2024-56747: scsi: qedi: Fix a possible memory leak in
qedi_alloc_and_init_sb() (bsc#1234934).
* CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584).
* CVE-2024-56664: bpf, sockmap: Fix race between element replace and close()
(bsc#1235249).
* CVE-2024-56658: net: defer final 'struct net' free in netns dismantle
(bsc#1235441).
* CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check()
(bsc#1235430).
* CVE-2024-56648: net: hsr: avoid potential out-of-bound access in
fill_frame_info() (bsc#1235451).
* CVE-2024-56642: tipc: Fix use-after-free of kernel socket in
cleanup_bearer() (bsc#1235433).
* CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release()
(bsc#1235480).
* CVE-2024-56623: scsi: qla2xxx: Fix use after free on unload (bsc#1235466).
* CVE-2024-56602: net: ieee802154: do not leave a dangling sk pointer in
ieee802154_create() (bsc#1235521).
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235230).
* CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in
inet6_create() (bsc#1235217).
* CVE-2024-56588: scsi: hisi_sas: Create all dump files during debugfs
initialization (bsc#1235123).
* CVE-2024-53227: scsi: bfa: Fix use-after-free in bfad_im_module_exit()
(bsc#1235011).
* CVE-2024-53209: bnxt_en: Fix receive ring space parameters when XDP is
active (bsc#1235002).
* CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error
paths (bsc#1234896).
* CVE-2024-53166: block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234884).
* CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt
(bsc#1234381).
* CVE-2024-53104: media: uvcvideo: Skip parsing frames of type
UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
* CVE-2024-50299: sctp: properly validate chunk size in sctp_sf_ootb()
(bsc#1233488).
* CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112).
* CVE-2024-50151: smb: client: fix OOBs when building SMB2_IOCTL request
(bsc#1233055).
* CVE-2024-50142: xfrm: validate new SA's prefixlen using SA family when
sel.family is unset (bsc#1233028).
* CVE-2024-46858: mptcp: pm: Fix uaf in __timer_delete_sync (bsc#1231088).
* CVE-2024-36898: gpiolib: cdev: fix uninitialised kfifo (bsc#1225736).

The following non-security bugs were fixed:

* NFS: Adjust the amount of readahead performed by NFS readdir (bsc#1231847).
* NFS: Do not flush the readdir cache in nfs_dentry_iput() (bsc#1231847).
* NFS: Improve heuristic for readdirplus (bsc#1231847).
* NFS: Trigger the "ls -l" readdir heuristic sooner (bsc#1231847).
* VFS: use system_unbound_wq for delayed_mntput (bsc#1234683).
* ceph: improve error handling and short/overflow-read logic in
__ceph_sync_read() (bsc#1228592).
* ibmvnic: Free any outstanding tx skbs during scrq reset (bsc#1226980).
* netfilter: nf_tables: validate family when identifying table via handle
(bsc#1233778 ZDI-24-1454).
* powerpc/pseries/vas: Add close() callback in vas_vm_ops struct
(bsc#1234825).
* tipc: fix NULL deref in cleanup_bearer() (bsc#1235433).
* x86/static-call: Remove early_boot_irqs_disabled check to fix Xen PVH dom0
(git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2025-556=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-556=1

## Package List:

* openSUSE Leap 15.5 (noarch)
* kernel-devel-rt-5.14.21-150500.13.85.1
* kernel-source-rt-5.14.21-150500.13.85.1
* openSUSE Leap 15.5 (x86_64)
* kernel-rt-vdso-debuginfo-5.14.21-150500.13.85.1
* kernel-rt-optional-5.14.21-150500.13.85.1
* kernel-rt_debug-devel-5.14.21-150500.13.85.1
* kernel-syms-rt-5.14.21-150500.13.85.1
* kernel-rt-vdso-5.14.21-150500.13.85.1
* ocfs2-kmp-rt-5.14.21-150500.13.85.1
* kernel-rt-optional-debuginfo-5.14.21-150500.13.85.1
* kselftests-kmp-rt-debuginfo-5.14.21-150500.13.85.1
* kernel-rt-livepatch-devel-5.14.21-150500.13.85.1
* cluster-md-kmp-rt-5.14.21-150500.13.85.1
* kernel-rt-debugsource-5.14.21-150500.13.85.1
* kernel-rt-devel-5.14.21-150500.13.85.1
* kernel-rt-extra-debuginfo-5.14.21-150500.13.85.1
* reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.85.1
* kernel-rt-devel-debuginfo-5.14.21-150500.13.85.1
* gfs2-kmp-rt-5.14.21-150500.13.85.1
* dlm-kmp-rt-5.14.21-150500.13.85.1
* kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.85.1
* kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.85.1
* kernel-rt_debug-debuginfo-5.14.21-150500.13.85.1
* kernel-rt_debug-vdso-5.14.21-150500.13.85.1
* kernel-rt_debug-debugsource-5.14.21-150500.13.85.1
* kernel-rt-livepatch-5.14.21-150500.13.85.1
* dlm-kmp-rt-debuginfo-5.14.21-150500.13.85.1
* kselftests-kmp-rt-5.14.21-150500.13.85.1
* gfs2-kmp-rt-debuginfo-5.14.21-150500.13.85.1
* ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.85.1
* kernel-rt-extra-5.14.21-150500.13.85.1
* kernel-rt-debuginfo-5.14.21-150500.13.85.1
* cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.85.1
* reiserfs-kmp-rt-5.14.21-150500.13.85.1
* openSUSE Leap 15.5 (nosrc x86_64)
* kernel-rt_debug-5.14.21-150500.13.85.1
* kernel-rt-5.14.21-150500.13.85.1
* SUSE Linux Enterprise Micro 5.5 (nosrc x86_64)
* kernel-rt-5.14.21-150500.13.85.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* kernel-rt-debuginfo-5.14.21-150500.13.85.1
* kernel-rt-debugsource-5.14.21-150500.13.85.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-source-rt-5.14.21-150500.13.85.1

## References:

* https://www.suse.com/security/cve/CVE-2024-26758.html
* https://www.suse.com/security/cve/CVE-2024-26943.html
* https://www.suse.com/security/cve/CVE-2024-36898.html
* https://www.suse.com/security/cve/CVE-2024-38599.html
* https://www.suse.com/security/cve/CVE-2024-41047.html
* https://www.suse.com/security/cve/CVE-2024-45019.html
* https://www.suse.com/security/cve/CVE-2024-46858.html
* https://www.suse.com/security/cve/CVE-2024-50051.html
* https://www.suse.com/security/cve/CVE-2024-50136.html
* https://www.suse.com/security/cve/CVE-2024-50142.html
* https://www.suse.com/security/cve/CVE-2024-50151.html
* https://www.suse.com/security/cve/CVE-2024-50195.html
* https://www.suse.com/security/cve/CVE-2024-50199.html
* https://www.suse.com/security/cve/CVE-2024-50210.html
* https://www.suse.com/security/cve/CVE-2024-50275.html
* https://www.suse.com/security/cve/CVE-2024-50299.html
* https://www.suse.com/security/cve/CVE-2024-53095.html
* https://www.suse.com/security/cve/CVE-2024-53103.html
* https://www.suse.com/security/cve/CVE-2024-53104.html
* https://www.suse.com/security/cve/CVE-2024-53112.html
* https://www.suse.com/security/cve/CVE-2024-53121.html
* https://www.suse.com/security/cve/CVE-2024-53127.html
* https://www.suse.com/security/cve/CVE-2024-53129.html
* https://www.suse.com/security/cve/CVE-2024-53138.html
* https://www.suse.com/security/cve/CVE-2024-53141.html
* https://www.suse.com/security/cve/CVE-2024-53144.html
* https://www.suse.com/security/cve/CVE-2024-53148.html
* https://www.suse.com/security/cve/CVE-2024-53151.html
* https://www.suse.com/security/cve/CVE-2024-53166.html
* https://www.suse.com/security/cve/CVE-2024-53169.html
* https://www.suse.com/security/cve/CVE-2024-53171.html
* https://www.suse.com/security/cve/CVE-2024-53174.html
* https://www.suse.com/security/cve/CVE-2024-53177.html
* https://www.suse.com/security/cve/CVE-2024-53208.html
* https://www.suse.com/security/cve/CVE-2024-53209.html
* https://www.suse.com/security/cve/CVE-2024-53215.html
* https://www.suse.com/security/cve/CVE-2024-53217.html
* https://www.suse.com/security/cve/CVE-2024-53224.html
* https://www.suse.com/security/cve/CVE-2024-53227.html
* https://www.suse.com/security/cve/CVE-2024-53229.html
* https://www.suse.com/security/cve/CVE-2024-53690.html
* https://www.suse.com/security/cve/CVE-2024-54680.html
* https://www.suse.com/security/cve/CVE-2024-55916.html
* https://www.suse.com/security/cve/CVE-2024-56531.html
* https://www.suse.com/security/cve/CVE-2024-56532.html
* https://www.suse.com/security/cve/CVE-2024-56533.html
* https://www.suse.com/security/cve/CVE-2024-56557.html
* https://www.suse.com/security/cve/CVE-2024-56558.html
* https://www.suse.com/security/cve/CVE-2024-56562.html
* https://www.suse.com/security/cve/CVE-2024-56567.html
* https://www.suse.com/security/cve/CVE-2024-56588.html
* https://www.suse.com/security/cve/CVE-2024-56595.html
* https://www.suse.com/security/cve/CVE-2024-56596.html
* https://www.suse.com/security/cve/CVE-2024-56597.html
* https://www.suse.com/security/cve/CVE-2024-56600.html
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://www.suse.com/security/cve/CVE-2024-56602.html
* https://www.suse.com/security/cve/CVE-2024-56623.html
* https://www.suse.com/security/cve/CVE-2024-56629.html
* https://www.suse.com/security/cve/CVE-2024-56631.html
* https://www.suse.com/security/cve/CVE-2024-56642.html
* https://www.suse.com/security/cve/CVE-2024-56644.html
* https://www.suse.com/security/cve/CVE-2024-56645.html
* https://www.suse.com/security/cve/CVE-2024-56648.html
* https://www.suse.com/security/cve/CVE-2024-56650.html
* https://www.suse.com/security/cve/CVE-2024-56658.html
* https://www.suse.com/security/cve/CVE-2024-56661.html
* https://www.suse.com/security/cve/CVE-2024-56664.html
* https://www.suse.com/security/cve/CVE-2024-56678.html
* https://www.suse.com/security/cve/CVE-2024-56681.html
* https://www.suse.com/security/cve/CVE-2024-56698.html
* https://www.suse.com/security/cve/CVE-2024-56701.html
* https://www.suse.com/security/cve/CVE-2024-56704.html
* https://www.suse.com/security/cve/CVE-2024-56722.html
* https://www.suse.com/security/cve/CVE-2024-56739.html
* https://www.suse.com/security/cve/CVE-2024-56745.html
* https://www.suse.com/security/cve/CVE-2024-56747.html
* https://www.suse.com/security/cve/CVE-2024-56754.html
* https://www.suse.com/security/cve/CVE-2024-56756.html
* https://www.suse.com/security/cve/CVE-2024-56759.html
* https://www.suse.com/security/cve/CVE-2024-56765.html
* https://www.suse.com/security/cve/CVE-2024-56776.html
* https://www.suse.com/security/cve/CVE-2024-56777.html
* https://www.suse.com/security/cve/CVE-2024-56778.html
* https://www.suse.com/security/cve/CVE-2024-57791.html
* https://www.suse.com/security/cve/CVE-2024-57792.html
* https://www.suse.com/security/cve/CVE-2024-57793.html
* https://www.suse.com/security/cve/CVE-2024-57798.html
* https://www.suse.com/security/cve/CVE-2024-57849.html
* https://www.suse.com/security/cve/CVE-2024-57850.html
* https://www.suse.com/security/cve/CVE-2024-57876.html
* https://www.suse.com/security/cve/CVE-2024-57893.html
* https://www.suse.com/security/cve/CVE-2024-57897.html
* https://www.suse.com/security/cve/CVE-2024-8805.html
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1216813
* https://bugzilla.suse.com/show_bug.cgi?id=1223384
* https://bugzilla.suse.com/show_bug.cgi?id=1225736
* https://bugzilla.suse.com/show_bug.cgi?id=1226848
* https://bugzilla.suse.com/show_bug.cgi?id=1226980
* https://bugzilla.suse.com/show_bug.cgi?id=1228537
* https://bugzilla.suse.com/show_bug.cgi?id=1228592
* https://bugzilla.suse.com/show_bug.cgi?id=1230341
* https://bugzilla.suse.com/show_bug.cgi?id=1230432
* https://bugzilla.suse.com/show_bug.cgi?id=1230527
* https://bugzilla.suse.com/show_bug.cgi?id=1230697
* https://bugzilla.suse.com/show_bug.cgi?id=1231088
* https://bugzilla.suse.com/show_bug.cgi?id=1231847
* https://bugzilla.suse.com/show_bug.cgi?id=1232914
* https://bugzilla.suse.com/show_bug.cgi?id=1233028
* https://bugzilla.suse.com/show_bug.cgi?id=1233055
* https://bugzilla.suse.com/show_bug.cgi?id=1233097
* https://bugzilla.suse.com/show_bug.cgi?id=1233103
* https://bugzilla.suse.com/show_bug.cgi?id=1233112
* https://bugzilla.suse.com/show_bug.cgi?id=1233464
* https://bugzilla.suse.com/show_bug.cgi?id=1233488
* https://bugzilla.suse.com/show_bug.cgi?id=1233642
* https://bugzilla.suse.com/show_bug.cgi?id=1233778
* https://bugzilla.suse.com/show_bug.cgi?id=1234024
* https://bugzilla.suse.com/show_bug.cgi?id=1234025
* https://bugzilla.suse.com/show_bug.cgi?id=1234078
* https://bugzilla.suse.com/show_bug.cgi?id=1234087
* https://bugzilla.suse.com/show_bug.cgi?id=1234153
* https://bugzilla.suse.com/show_bug.cgi?id=1234155
* https://bugzilla.suse.com/show_bug.cgi?id=1234223
* https://bugzilla.suse.com/show_bug.cgi?id=1234381
* https://bugzilla.suse.com/show_bug.cgi?id=1234683
* https://bugzilla.suse.com/show_bug.cgi?id=1234690
* https://bugzilla.suse.com/show_bug.cgi?id=1234825
* https://bugzilla.suse.com/show_bug.cgi?id=1234829
* https://bugzilla.suse.com/show_bug.cgi?id=1234832
* https://bugzilla.suse.com/show_bug.cgi?id=1234884
* https://bugzilla.suse.com/show_bug.cgi?id=1234889
* https://bugzilla.suse.com/show_bug.cgi?id=1234896
* https://bugzilla.suse.com/show_bug.cgi?id=1234899
* https://bugzilla.suse.com/show_bug.cgi?id=1234900
* https://bugzilla.suse.com/show_bug.cgi?id=1234905
* https://bugzilla.suse.com/show_bug.cgi?id=1234909
* https://bugzilla.suse.com/show_bug.cgi?id=1234916
* https://bugzilla.suse.com/show_bug.cgi?id=1234918
* https://bugzilla.suse.com/show_bug.cgi?id=1234922
* https://bugzilla.suse.com/show_bug.cgi?id=1234930
* https://bugzilla.suse.com/show_bug.cgi?id=1234931
* https://bugzilla.suse.com/show_bug.cgi?id=1234934
* https://bugzilla.suse.com/show_bug.cgi?id=1234962
* https://bugzilla.suse.com/show_bug.cgi?id=1234999
* https://bugzilla.suse.com/show_bug.cgi?id=1235002
* https://bugzilla.suse.com/show_bug.cgi?id=1235009
* https://bugzilla.suse.com/show_bug.cgi?id=1235011
* https://bugzilla.suse.com/show_bug.cgi?id=1235053
* https://bugzilla.suse.com/show_bug.cgi?id=1235057
* https://bugzilla.suse.com/show_bug.cgi?id=1235059
* https://bugzilla.suse.com/show_bug.cgi?id=1235100
* https://bugzilla.suse.com/show_bug.cgi?id=1235122
* https://bugzilla.suse.com/show_bug.cgi?id=1235123
* https://bugzilla.suse.com/show_bug.cgi?id=1235133
* https://bugzilla.suse.com/show_bug.cgi?id=1235134
* https://bugzilla.suse.com/show_bug.cgi?id=1235217
* https://bugzilla.suse.com/show_bug.cgi?id=1235222
* https://bugzilla.suse.com/show_bug.cgi?id=1235230
* https://bugzilla.suse.com/show_bug.cgi?id=1235249
* https://bugzilla.suse.com/show_bug.cgi?id=1235410
* https://bugzilla.suse.com/show_bug.cgi?id=1235430
* https://bugzilla.suse.com/show_bug.cgi?id=1235433
* https://bugzilla.suse.com/show_bug.cgi?id=1235441
* https://bugzilla.suse.com/show_bug.cgi?id=1235451
* https://bugzilla.suse.com/show_bug.cgi?id=1235458
* https://bugzilla.suse.com/show_bug.cgi?id=1235466
* https://bugzilla.suse.com/show_bug.cgi?id=1235473
* https://bugzilla.suse.com/show_bug.cgi?id=1235480
* https://bugzilla.suse.com/show_bug.cgi?id=1235491
* https://bugzilla.suse.com/show_bug.cgi?id=1235495
* https://bugzilla.suse.com/show_bug.cgi?id=1235496
* https://bugzilla.suse.com/show_bug.cgi?id=1235521
* https://bugzilla.suse.com/show_bug.cgi?id=1235557
* https://bugzilla.suse.com/show_bug.cgi?id=1235563
* https://bugzilla.suse.com/show_bug.cgi?id=1235570
* https://bugzilla.suse.com/show_bug.cgi?id=1235584
* https://bugzilla.suse.com/show_bug.cgi?id=1235611
* https://bugzilla.suse.com/show_bug.cgi?id=1235635
* https://bugzilla.suse.com/show_bug.cgi?id=1235641
* https://bugzilla.suse.com/show_bug.cgi?id=1235643
* https://bugzilla.suse.com/show_bug.cgi?id=1235645
* https://bugzilla.suse.com/show_bug.cgi?id=1235647
* https://bugzilla.suse.com/show_bug.cgi?id=1235723
* https://bugzilla.suse.com/show_bug.cgi?id=1235739
* https://bugzilla.suse.com/show_bug.cgi?id=1235747
* https://bugzilla.suse.com/show_bug.cgi?id=1235759
* https://bugzilla.suse.com/show_bug.cgi?id=1235764
* https://bugzilla.suse.com/show_bug.cgi?id=1235768
* https://bugzilla.suse.com/show_bug.cgi?id=1235806
* https://bugzilla.suse.com/show_bug.cgi?id=1235812
* https://bugzilla.suse.com/show_bug.cgi?id=1235814
* https://bugzilla.suse.com/show_bug.cgi?id=1235818
* https://bugzilla.suse.com/show_bug.cgi?id=1235842
* https://bugzilla.suse.com/show_bug.cgi?id=1235920
* https://bugzilla.suse.com/show_bug.cgi?id=1235969
* https://bugzilla.suse.com/show_bug.cgi?id=1236628



SUSE-SU-2025:0558-1: moderate: Security update for buildah


# Security update for buildah

Announcement ID: SUSE-SU-2025:0558-1
Release Date: 2025-02-14T15:28:52Z
Rating: moderate
References:

* bsc#1236531

Cross-References:

* CVE-2023-45288

CVSS scores:

* CVE-2023-45288 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-45288 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* openSUSE Leap 15.4

An update that solves one vulnerability can now be installed.

## Description:

This update for buildah fixes the following issues:

* CVE-2023-45288: possible excessive CPU consumption due to no limit being set
on the number of CONTINUATION frames read for an HTTP/2 request in
golang.org/x/net/http2. (bsc#1236531)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-558=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* buildah-1.35.5-150400.3.39.1

## References:

* https://www.suse.com/security/cve/CVE-2023-45288.html
* https://bugzilla.suse.com/show_bug.cgi?id=1236531



SUSE-SU-2025:0557-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:0557-1
Release Date: 2025-02-14T15:26:54Z
Rating: important
References:

* bsc#1012628
* bsc#1194869
* bsc#1215199
* bsc#1216813
* bsc#1218470
* bsc#1220711
* bsc#1222803
* bsc#1224049
* bsc#1225897
* bsc#1226980
* bsc#1228592
* bsc#1229833
* bsc#1231016
* bsc#1231088
* bsc#1232087
* bsc#1232101
* bsc#1232158
* bsc#1232161
* bsc#1232421
* bsc#1232882
* bsc#1233055
* bsc#1233112
* bsc#1233221
* bsc#1233248
* bsc#1233259
* bsc#1233260
* bsc#1233488
* bsc#1233522
* bsc#1233638
* bsc#1233642
* bsc#1233778
* bsc#1234195
* bsc#1234619
* bsc#1234635
* bsc#1234683
* bsc#1234693
* bsc#1234726
* bsc#1234825
* bsc#1234863
* bsc#1234887
* bsc#1234888
* bsc#1234893
* bsc#1234898
* bsc#1234901
* bsc#1234906
* bsc#1234923
* bsc#1234931
* bsc#1234934
* bsc#1234947
* bsc#1234957
* bsc#1235000
* bsc#1235001
* bsc#1235011
* bsc#1235031
* bsc#1235032
* bsc#1235035
* bsc#1235037
* bsc#1235038
* bsc#1235039
* bsc#1235040
* bsc#1235042
* bsc#1235043
* bsc#1235046
* bsc#1235050
* bsc#1235051
* bsc#1235053
* bsc#1235054
* bsc#1235057
* bsc#1235059
* bsc#1235065
* bsc#1235070
* bsc#1235073
* bsc#1235100
* bsc#1235112
* bsc#1235115
* bsc#1235117
* bsc#1235122
* bsc#1235123
* bsc#1235125
* bsc#1235132
* bsc#1235133
* bsc#1235155
* bsc#1235160
* bsc#1235217
* bsc#1235219
* bsc#1235220
* bsc#1235222
* bsc#1235223
* bsc#1235224
* bsc#1235227
* bsc#1235230
* bsc#1235241
* bsc#1235244
* bsc#1235249
* bsc#1235251
* bsc#1235252
* bsc#1235389
* bsc#1235390
* bsc#1235391
* bsc#1235406
* bsc#1235410
* bsc#1235412
* bsc#1235413
* bsc#1235415
* bsc#1235416
* bsc#1235417
* bsc#1235418
* bsc#1235423
* bsc#1235424
* bsc#1235425
* bsc#1235426
* bsc#1235427
* bsc#1235428
* bsc#1235429
* bsc#1235430
* bsc#1235433
* bsc#1235437
* bsc#1235439
* bsc#1235441
* bsc#1235444
* bsc#1235445
* bsc#1235449
* bsc#1235451
* bsc#1235454
* bsc#1235458
* bsc#1235459
* bsc#1235464
* bsc#1235466
* bsc#1235473
* bsc#1235479
* bsc#1235480
* bsc#1235483
* bsc#1235486
* bsc#1235487
* bsc#1235488
* bsc#1235489
* bsc#1235491
* bsc#1235494
* bsc#1235495
* bsc#1235496
* bsc#1235497
* bsc#1235498
* bsc#1235500
* bsc#1235502
* bsc#1235503
* bsc#1235519
* bsc#1235520
* bsc#1235521
* bsc#1235523
* bsc#1235526
* bsc#1235528
* bsc#1235532
* bsc#1235533
* bsc#1235534
* bsc#1235537
* bsc#1235538
* bsc#1235545
* bsc#1235552
* bsc#1235555
* bsc#1235557
* bsc#1235563
* bsc#1235564
* bsc#1235565
* bsc#1235568
* bsc#1235570
* bsc#1235571
* bsc#1235577
* bsc#1235578
* bsc#1235582
* bsc#1235583
* bsc#1235584
* bsc#1235587
* bsc#1235611
* bsc#1235612
* bsc#1235616
* bsc#1235622
* bsc#1235627
* bsc#1235632
* bsc#1235635
* bsc#1235638
* bsc#1235641
* bsc#1235643
* bsc#1235645
* bsc#1235646
* bsc#1235647
* bsc#1235650
* bsc#1235653
* bsc#1235656
* bsc#1235657
* bsc#1235663
* bsc#1235686
* bsc#1235700
* bsc#1235705
* bsc#1235707
* bsc#1235708
* bsc#1235710
* bsc#1235714
* bsc#1235716
* bsc#1235720
* bsc#1235723
* bsc#1235727
* bsc#1235730
* bsc#1235737
* bsc#1235739
* bsc#1235745
* bsc#1235747
* bsc#1235750
* bsc#1235753
* bsc#1235759
* bsc#1235764
* bsc#1235768
* bsc#1235776
* bsc#1235777
* bsc#1235778
* bsc#1235779
* bsc#1235793
* bsc#1235798
* bsc#1235806
* bsc#1235808
* bsc#1235812
* bsc#1235814
* bsc#1235818
* bsc#1235842
* bsc#1235865
* bsc#1235874
* bsc#1235894
* bsc#1235902
* bsc#1235903
* bsc#1235906
* bsc#1235914
* bsc#1235918
* bsc#1235919
* bsc#1235920
* bsc#1235924
* bsc#1235940
* bsc#1235941
* bsc#1235946
* bsc#1235948
* bsc#1235952
* bsc#1235964
* bsc#1235965
* bsc#1235967
* bsc#1235969
* bsc#1235976
* bsc#1235977
* bsc#1236078
* bsc#1236080
* bsc#1236082
* bsc#1236088
* bsc#1236090
* bsc#1236091
* bsc#1236096
* bsc#1236097
* bsc#1236098
* bsc#1236101
* bsc#1236102
* bsc#1236104
* bsc#1236106
* bsc#1236120
* bsc#1236125
* bsc#1236127
* bsc#1236131
* bsc#1236138
* bsc#1236143
* bsc#1236144
* bsc#1236145
* bsc#1236160
* bsc#1236161
* bsc#1236163
* bsc#1236168
* bsc#1236178
* bsc#1236180
* bsc#1236181
* bsc#1236182
* bsc#1236190
* bsc#1236192
* bsc#1236198
* bsc#1236227
* bsc#1236245
* bsc#1236247
* bsc#1236248
* bsc#1236260
* bsc#1236262
* bsc#1236628
* bsc#1236680
* bsc#1236683
* bsc#1236685
* bsc#1236688
* bsc#1236694
* bsc#1236696
* bsc#1236698
* bsc#1236703
* bsc#1236732
* bsc#1236733
* bsc#1236757
* bsc#1236758
* bsc#1236760
* bsc#1236761
* jsc#PED-7242

Cross-References:

* CVE-2023-52923
* CVE-2024-36476
* CVE-2024-39282
* CVE-2024-43913
* CVE-2024-45828
* CVE-2024-46858
* CVE-2024-46896
* CVE-2024-47141
* CVE-2024-47143
* CVE-2024-47809
* CVE-2024-48873
* CVE-2024-48881
* CVE-2024-49569
* CVE-2024-49948
* CVE-2024-49951
* CVE-2024-49978
* CVE-2024-49998
* CVE-2024-50051
* CVE-2024-50106
* CVE-2024-50151
* CVE-2024-50199
* CVE-2024-50251
* CVE-2024-50258
* CVE-2024-50299
* CVE-2024-50304
* CVE-2024-52332
* CVE-2024-53091
* CVE-2024-53095
* CVE-2024-53164
* CVE-2024-53168
* CVE-2024-53170
* CVE-2024-53172
* CVE-2024-53175
* CVE-2024-53185
* CVE-2024-53187
* CVE-2024-53194
* CVE-2024-53195
* CVE-2024-53196
* CVE-2024-53197
* CVE-2024-53198
* CVE-2024-53203
* CVE-2024-53227
* CVE-2024-53230
* CVE-2024-53231
* CVE-2024-53232
* CVE-2024-53233
* CVE-2024-53236
* CVE-2024-53239
* CVE-2024-53685
* CVE-2024-53690
* CVE-2024-54680
* CVE-2024-55639
* CVE-2024-55881
* CVE-2024-55916
* CVE-2024-56369
* CVE-2024-56372
* CVE-2024-56531
* CVE-2024-56532
* CVE-2024-56533
* CVE-2024-56538
* CVE-2024-56543
* CVE-2024-56546
* CVE-2024-56548
* CVE-2024-56557
* CVE-2024-56558
* CVE-2024-56568
* CVE-2024-56569
* CVE-2024-56570
* CVE-2024-56571
* CVE-2024-56572
* CVE-2024-56573
* CVE-2024-56574
* CVE-2024-56575
* CVE-2024-56577
* CVE-2024-56578
* CVE-2024-56584
* CVE-2024-56587
* CVE-2024-56588
* CVE-2024-56589
* CVE-2024-56590
* CVE-2024-56592
* CVE-2024-56593
* CVE-2024-56594
* CVE-2024-56595
* CVE-2024-56596
* CVE-2024-56597
* CVE-2024-56598
* CVE-2024-5660
* CVE-2024-56600
* CVE-2024-56601
* CVE-2024-56602
* CVE-2024-56603
* CVE-2024-56606
* CVE-2024-56607
* CVE-2024-56608
* CVE-2024-56609
* CVE-2024-56610
* CVE-2024-56611
* CVE-2024-56614
* CVE-2024-56615
* CVE-2024-56616
* CVE-2024-56617
* CVE-2024-56619
* CVE-2024-56620
* CVE-2024-56622
* CVE-2024-56623
* CVE-2024-56625
* CVE-2024-56629
* CVE-2024-56630
* CVE-2024-56631
* CVE-2024-56632
* CVE-2024-56634
* CVE-2024-56635
* CVE-2024-56636
* CVE-2024-56637
* CVE-2024-56641
* CVE-2024-56642
* CVE-2024-56643
* CVE-2024-56644
* CVE-2024-56648
* CVE-2024-56649
* CVE-2024-56650
* CVE-2024-56651
* CVE-2024-56654
* CVE-2024-56656
* CVE-2024-56658
* CVE-2024-56659
* CVE-2024-56660
* CVE-2024-56661
* CVE-2024-56662
* CVE-2024-56663
* CVE-2024-56664
* CVE-2024-56665
* CVE-2024-56670
* CVE-2024-56672
* CVE-2024-56675
* CVE-2024-56677
* CVE-2024-56678
* CVE-2024-56679
* CVE-2024-56681
* CVE-2024-56683
* CVE-2024-56687
* CVE-2024-56688
* CVE-2024-56690
* CVE-2024-56691
* CVE-2024-56693
* CVE-2024-56694
* CVE-2024-56698
* CVE-2024-56700
* CVE-2024-56701
* CVE-2024-56704
* CVE-2024-56705
* CVE-2024-56707
* CVE-2024-56708
* CVE-2024-56709
* CVE-2024-56712
* CVE-2024-56715
* CVE-2024-56716
* CVE-2024-56722
* CVE-2024-56723
* CVE-2024-56724
* CVE-2024-56725
* CVE-2024-56726
* CVE-2024-56727
* CVE-2024-56728
* CVE-2024-56729
* CVE-2024-56739
* CVE-2024-56741
* CVE-2024-56745
* CVE-2024-56746
* CVE-2024-56747
* CVE-2024-56748
* CVE-2024-56759
* CVE-2024-56760
* CVE-2024-56763
* CVE-2024-56765
* CVE-2024-56766
* CVE-2024-56767
* CVE-2024-56769
* CVE-2024-56774
* CVE-2024-56775
* CVE-2024-56776
* CVE-2024-56777
* CVE-2024-56778
* CVE-2024-56779
* CVE-2024-56780
* CVE-2024-56787
* CVE-2024-57791
* CVE-2024-57792
* CVE-2024-57793
* CVE-2024-57795
* CVE-2024-57798
* CVE-2024-57801
* CVE-2024-57802
* CVE-2024-57804
* CVE-2024-57809
* CVE-2024-57838
* CVE-2024-57849
* CVE-2024-57850
* CVE-2024-57857
* CVE-2024-57874
* CVE-2024-57876
* CVE-2024-57882
* CVE-2024-57884
* CVE-2024-57887
* CVE-2024-57888
* CVE-2024-57890
* CVE-2024-57892
* CVE-2024-57893
* CVE-2024-57896
* CVE-2024-57897
* CVE-2024-57899
* CVE-2024-57903
* CVE-2024-57904
* CVE-2024-57906
* CVE-2024-57907
* CVE-2024-57908
* CVE-2024-57910
* CVE-2024-57911
* CVE-2024-57912
* CVE-2024-57913
* CVE-2024-57915
* CVE-2024-57916
* CVE-2024-57917
* CVE-2024-57922
* CVE-2024-57926
* CVE-2024-57929
* CVE-2024-57931
* CVE-2024-57932
* CVE-2024-57933
* CVE-2024-57935
* CVE-2024-57936
* CVE-2024-57938
* CVE-2024-57940
* CVE-2024-57946
* CVE-2025-21632
* CVE-2025-21645
* CVE-2025-21646
* CVE-2025-21649
* CVE-2025-21650
* CVE-2025-21651
* CVE-2025-21652
* CVE-2025-21653
* CVE-2025-21655
* CVE-2025-21656
* CVE-2025-21662
* CVE-2025-21663
* CVE-2025-21664
* CVE-2025-21666
* CVE-2025-21669
* CVE-2025-21670
* CVE-2025-21674
* CVE-2025-21675
* CVE-2025-21676
* CVE-2025-21678
* CVE-2025-21682

CVSS scores:

* CVE-2023-52923 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52923 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36476 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-36476 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36476 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39282 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-39282 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43913 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-43913 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-43913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45828 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-45828 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46858 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46896 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47141 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47141 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47143 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47143 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47143 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47809 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-48873 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-48873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-48873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-48881 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-48881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-48881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49569 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49569 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49948 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49951 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49998 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50051 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50051 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50051 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50051 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50151 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-50151 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50251 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50251 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50258 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50258 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50299 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50299 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50304 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-52332 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-52332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53091 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53164 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53164 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53168 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53168 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53170 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53170 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53170 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53170 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53172 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53175 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-53175 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-53175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53185 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53185 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53187 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2024-53187 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
* CVE-2024-53187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53194 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53194 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53194 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53195 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-53195 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-53196 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-53196 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-53197 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-53197 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-53198 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-53198 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-53203 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53203 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-53203 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53227 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53227 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53227 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53230 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53230 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53231 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53232 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53232 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53232 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53233 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53236 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53236 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53239 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53685 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53690 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54680 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-54680 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-55639 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-55639 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-55881 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-55881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-55916 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-55916 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-55916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56369 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56369 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56369 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56372 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56372 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56531 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56531 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56532 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56532 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56533 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56533 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56538 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56538 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56538 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56543 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56546 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56546 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56548 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56557 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56558 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56558 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56568 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56568 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56568 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56569 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56569 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56569 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56570 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56570 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56571 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-56571 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-56572 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56572 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56572 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56573 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56573 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56574 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56574 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56574 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56575 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56575 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56577 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56577 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56577 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56578 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56578 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56578 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56584 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56587 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56587 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56587 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56588 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56588 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56589 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56590 ( SUSE ): 6.9
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56590 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56592 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56592 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56593 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56593 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56593 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56594 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56594 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56595 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56595 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56595 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56596 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56596 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56596 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56597 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56597 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-56598 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56598 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-5660 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56600 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56602 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56602 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56603 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56603 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56603 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56606 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56606 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56606 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56607 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56608 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56608 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56608 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56609 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56609 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56610 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56610 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56611 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56611 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56614 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56614 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56614 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56615 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56615 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56616 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56617 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56617 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56619 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56619 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56619 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56620 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56620 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56620 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56622 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56622 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56623 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56623 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56623 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56625 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56629 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56629 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56630 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56631 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56631 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56632 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56634 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56635 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56635 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56635 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56635 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56636 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56636 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-56637 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56641 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56642 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56642 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56643 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56643 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56643 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56644 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56644 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56648 ( SUSE ): 8.6
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56648 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56649 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56649 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56650 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-56651 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56651 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56654 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56654 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56654 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56656 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56656 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56658 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56658 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56659 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56659 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56660 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56660 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56661 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56662 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56662 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
* CVE-2024-56662 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-56663 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56663 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-56663 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-56664 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56664 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56665 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56670 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56670 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56672 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56672 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56672 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56672 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56675 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56675 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56677 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56677 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56678 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56678 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56678 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56679 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56681 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56681 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-56683 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56687 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56687 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56688 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56690 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56690 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56691 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56693 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56693 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56694 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56698 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56698 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56700 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56700 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56701 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56704 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56704 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56705 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56705 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56707 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56708 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56708 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56708 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56709 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56712 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56715 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56716 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56722 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56722 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56723 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56724 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56724 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56725 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56725 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56725 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56726 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56726 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56727 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56727 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56728 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56729 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56729 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56729 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56739 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56741 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56741 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56741 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56745 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56746 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56746 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56747 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56747 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56747 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56748 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56748 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56759 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56759 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56760 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56760 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56763 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56763 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56765 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56765 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56766 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56766 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56767 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56767 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56769 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56769 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-56769 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56774 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56774 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56775 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56775 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56776 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56777 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56778 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56778 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56779 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56780 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56780 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56787 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57791 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57791 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57792 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57792 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57793 ( SUSE ): 6.2
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-57793 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-57795 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57795 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57795 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57798 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57801 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57801 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57801 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57801 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57802 ( SUSE ): 2.1
CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-57802 ( SUSE ): 4.6 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-57802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57804 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57804 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-57809 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57838 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57849 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57849 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57850 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57850 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57857 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57857 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57857 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57874 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57874 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-57874 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-57876 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57876 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57882 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57884 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57887 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57887 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57888 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57890 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57890 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-57890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57892 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57893 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57893 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57896 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57896 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57896 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57897 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57899 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57899 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-57903 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57904 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57906 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57906 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-57907 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57907 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-57908 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57908 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-57908 ( SUSE ): 3.3 AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-57910 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57910 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-57910 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-57911 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-57911 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-57912 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-57913 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57913 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-57915 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57915 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-57915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57916 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57916 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57917 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57917 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57922 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57926 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57929 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57929 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57931 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57932 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57933 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57935 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57936 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57938 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57940 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57940 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57946 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21632 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21645 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21646 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21649 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21650 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21651 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21651 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21652 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21652 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21652 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21652 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21653 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-21653 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-21655 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21655 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21656 ( SUSE ): 1.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-21656 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L
* CVE-2025-21662 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21662 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21663 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21664 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21664 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21666 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21669 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21669 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21670 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21674 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21675 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21676 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21678 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21682 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21682 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21682 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Real Time Module 15-SP6

An update that solves 256 vulnerabilities, contains one feature and has 42
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

* CVE-2024-45828: i3c: mipi-i3c-hci: Mask ring interrupts before ring stop
request (bsc#1235705).
* CVE-2024-46858: mptcp: pm: Fix uaf in __timer_delete_sync (bsc#1231088).
* CVE-2024-48881: bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again
(bsc#1235727).
* CVE-2024-49948: net: add more sanity checks to qdisc_pkt_len_init()
(bsc#1232161).
* CVE-2024-49951: Bluetooth: MGMT: Fix possible crash on mgmt_index_removed
(bsc#1232158).
* CVE-2024-49978: gso: fix udp gso fraglist segmentation after pull from
frag_list (bsc#1232101).
* CVE-2024-49998: net: dsa: improve shutdown sequence (bsc#1232087).
* CVE-2024-50151: smb: client: fix OOBs when building SMB2_IOCTL request
(bsc#1233055).
* CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112).
* CVE-2024-50251: netfilter: nft_payload: sanitize offset and length before
calling skb_checksum() (bsc#1233248).
* CVE-2024-50258: net: fix crash when config small
gso_max_size/gso_ipv4_max_size (bsc#1233221).
* CVE-2024-50299: sctp: properly validate chunk size in sctp_sf_ootb()
(bsc#1233488).
* CVE-2024-50304: ipv4: ip_tunnel: Fix suspicious RCU usage warning in
ip_tunnel_find() (bsc#1233522).
* CVE-2024-53091: bpf: Add sk_is_inet and IS_ICSK check in
tls_sw_has_ctx_tx/rx (bsc#1233638).
* CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863).
* CVE-2024-53170: block: fix uaf for flush rq while iterating tags
(bsc#1234888).
* CVE-2024-53172: ubi: fastmap: Fix duplicate slab cache names while attaching
(bsc#1234898).
* CVE-2024-53175: ipc: fix memleak if msg_init_ns failed in create_ipc_ns
(bsc#1234893).
* CVE-2024-53185: smb: client: fix NULL ptr deref in crypto_aead_setkey()
(bsc#1234901).
* CVE-2024-53187: io_uring: check for overflows in io_pin_pages (bsc#1234947).
* CVE-2024-53195: KVM: arm64: Get rid of userspace_irqchip_in_use
(bsc#1234957).
* CVE-2024-53196: KVM: arm64: Do not retire aborted MMIO instruction
(bsc#1234906).
* CVE-2024-53198: xen: Fix the issue of resource not being properly released
in xenbus_dev_probe() (bsc#1234923).
* CVE-2024-53203: usb: typec: fix potential array underflow in
ucsi_ccg_sync_control() (bsc#1235001).
* CVE-2024-53227: scsi: bfa: Fix use-after-free in bfad_im_module_exit()
(bsc#1235011).
* CVE-2024-53232: iommu/s390: Implement blocking domain (bsc#1235050).
* CVE-2024-53236: xsk: Free skb when TX metadata options are invalid
(bsc#1235000).
* CVE-2024-53685: ceph: give up on paths longer than PATH_MAX (bsc#1235720).
* CVE-2024-55639: net: renesas: rswitch: avoid use-after-put for a device tree
node (bsc#1235737).
* CVE-2024-55881: KVM: x86: Play nice with protected guests in
complete_hypercall_exit() (bsc#1235745).
* CVE-2024-56372: net: tun: fix tun_napi_alloc_frags() (bsc#1235753).
* CVE-2024-56568: iommu/arm-smmu: Defer probe of clients after smmu device
bound (bsc#1235032).
* CVE-2024-56569: ftrace: Fix regression with module command in
stack_trace_filter (bsc#1235031).
* CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function
(bsc#1235035).
* CVE-2024-56588: scsi: hisi_sas: Create all dump files during debugfs
initialization (bsc#1235123).
* CVE-2024-56589: scsi: hisi_sas: Add cond_resched() for no forced preemption
model (bsc#1235241).
* CVE-2024-56592: bpf: Call free_htab_elem() after htab_unlock_bucket()
(bsc#1235244).
* CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in
inet6_create() (bsc#1235217).
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235230).
* CVE-2024-56602: net: ieee802154: do not leave a dangling sk pointer in
ieee802154_create() (bsc#1235521).
* CVE-2024-56603: net: af_can: do not leave a dangling sk pointer in
can_create() (bsc#1235415).
* CVE-2024-56608: drm/amd/display: Fix out-of-bounds access in
'dcn21_link_encoder_create' (bsc#1235487).
* CVE-2024-56610: kcsan: Turn report_filterlist_lock into a raw_spinlock
(bsc#1235390).
* CVE-2024-56611: mm/mempolicy: fix migrate_to_node() assuming there is at
least one VMA in a MM (bsc#1235391).
* CVE-2024-56614: xsk: fix OOB map writes when deleting elements
(bsc#1235424).
* CVE-2024-56615: bpf: fix OOB devmap writes when deleting elements
(bsc#1235426).
* CVE-2024-56617: cacheinfo: Allocate memory during CPU hotplug if not done
from the primary CPU (bsc#1235429).
* CVE-2024-56620: scsi: ufs: qcom: Only free platform MSIs when ESI is enabled
(bsc#1235227).
* CVE-2024-56622: scsi: ufs: core: sysfs: Prevent div by zero (bsc#1235251).
* CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release()
(bsc#1235480).
* CVE-2024-56635: net: avoid potential UAF in default_operstate()
(bsc#1235519).
* CVE-2024-56636: geneve: do not assume mac header is set in geneve_xmit_skb()
(bsc#1235520).
* CVE-2024-56637: netfilter: ipset: Hold module reference while requesting a
module (bsc#1235523).
* CVE-2024-56641: net/smc: initialize close_work early to avoid warning
(bsc#1235526).
* CVE-2024-56643: dccp: Fix memory leak in dccp_feat_change_recv
(bsc#1235132).
* CVE-2024-56648: net: hsr: avoid potential out-of-bound access in
fill_frame_info() (bsc#1235451).
* CVE-2024-56649: net: enetc: Do not configure preemptible TCs if SIs do not
support (bsc#1235449).
* CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check()
(bsc#1235430).
* CVE-2024-56656: bnxt_en: Fix aggregation ID mask to prevent oops on 5760X
chips (bsc#1235444).
* CVE-2024-56658: net: defer final 'struct net' free in netns dismantle
(bsc#1235441).
* CVE-2024-56659: net: lapb: increase LAPB_HEADER_LEN (bsc#1235439).
* CVE-2024-56660: net/mlx5: DR, prevent potential error pointer dereference
(bsc#1235437).
* CVE-2024-56664: bpf, sockmap: Fix race between element replace and close()
(bsc#1235249).
* CVE-2024-56665: bpf,perf: Fix invalid prog_array access in
perf_event_detach_bpf_prog (bsc#1235489).
* CVE-2024-56675: bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors
(bsc#1235555).
* CVE-2024-56679: octeontx2-pf: handle otx2_mbox_get_rsp errors in
otx2_common.c (bsc#1235498).
* CVE-2024-56693: brd: defer automatic disk creation until module
initialization succeeds (bsc#1235418).
* CVE-2024-56694: bpf: fix recursive lock when verdict program return SK_PASS
(bsc#1235412).
* CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584).
* CVE-2024-56707: octeontx2-pf: handle otx2_mbox_get_rsp errors in
otx2_dmac_flt.c (bsc#1235545).
* CVE-2024-56708: EDAC/igen6: Avoid segmentation fault on module unload
(bsc#1235564).
* CVE-2024-56712: udmabuf: fix memory leak on last export_udmabuf() error path
(bsc#1235565).
* CVE-2024-56715: ionic: Fix netdev notifier unregister on failure
(bsc#1235612).
* CVE-2024-56716: netdevsim: prevent bad user input in
nsim_dev_health_break_write() (bsc#1235587).
* CVE-2024-56725: octeontx2-pf: handle otx2_mbox_get_rsp errors in
otx2_dcbnl.c (bsc#1235578).
* CVE-2024-56726: octeontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c
(bsc#1235582).
* CVE-2024-56727: octeontx2-pf: handle otx2_mbox_get_rsp errors in
otx2_flows.c (bsc#1235583).
* CVE-2024-56728: octeontx2-pf: handle otx2_mbox_get_rsp errors in
otx2_ethtool.c (bsc#1235656).
* CVE-2024-56729: smb: Initialize cfid->tcon before performing network ops
(bsc#1235503).
* CVE-2024-56747: scsi: qedi: Fix a possible memory leak in
qedi_alloc_and_init_sb() (bsc#1234934).
* CVE-2024-56748: scsi: qedf: Fix a possible memory leak in
qedf_alloc_and_init_sb() (bsc#1235627).
* CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing
is enabled (bsc#1235645).
* CVE-2024-56763: tracing: Prevent bad count for tracing_cpumask_write
(bsc#1235638).
* CVE-2024-56774: btrfs: add a sanity check for btrfs root in
btrfs_search_slot() (bsc#1235653).
* CVE-2024-56775: drm/amd/display: Fix handling of plane refcount
(bsc#1235657).
* CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining
clc data (bsc#1235759).
* CVE-2024-57793: virt: tdx-guest: Just leak decrypted memory on unrecoverable
errors (bsc#1235768).
* CVE-2024-57795: RDMA/rxe: Remove the direct link to net_device
(bsc#1235906).
* CVE-2024-57801: net/mlx5e: Skip restore TC rules for vport rep without
loaded flag (bsc#1235940).
* CVE-2024-57802: netrom: check buffer length before accessing it
(bsc#1235941).
* CVE-2024-57804: scsi: mpi3mr: Fix corrupt config pages PHY state is switched
in sysfs (bsc#1235779).
* CVE-2024-57809: PCI: imx6: Fix suspend/resume support on i.MX6QDL
(bsc#1235793).
* CVE-2024-57838: s390/entry: Mark IRQ entries to fix stack depot warnings
(bsc#1235798).
* CVE-2024-57857: RDMA/siw: Remove direct link to net_device (bsc#1235946).
* CVE-2024-57882: mptcp: fix TCP options overflow. (bsc#1235914).
* CVE-2024-57884: mm: vmscan: account for free pages to prevent infinite Loop
in throttle_direct_reclaim() (bsc#1235948).
* CVE-2024-57892: ocfs2: fix slab-use-after-free due to dangling pointer
dqi_priv (bsc#1235964).
* CVE-2024-57896: btrfs: flush delalloc workers queue before stopping cleaner
kthread during unmount (bsc#1235965).
* CVE-2024-57903: net: restrict SO_REUSEPORT to inet sockets (bsc#1235967).
* CVE-2024-57917: topology: Keep the cpumask unchanged when printing cpumap
(bsc#1236127).
* CVE-2024-57929: dm array: fix releasing a faulty array block twice in
dm_array_cursor_end (bsc#1236096).
* CVE-2024-57931: selinux: ignore unknown extended permissions (bsc#1236192).
* CVE-2024-57932: gve: guard XDP xmit NDO on existence of xdp queues
(bsc#1236190).
* CVE-2024-57933: gve: guard XSK operations on the existence of queues
(bsc#1236178).
* CVE-2024-57938: net/sctp: Prevent autoclose integer overflow in
sctp_association_init() (bsc#1236182).
* CVE-2024-57946: virtio-blk: do not keep queue frozen during system suspend
(bsc#1236247).
* CVE-2025-21632: x86/fpu: Ensure shadow stack is active before "getting"
registers (bsc#1236106).
* CVE-2025-21649: net: hns3: fix kernel crash when 1588 is sent on HIP08
devices (bsc#1236143).
* CVE-2025-21650: net: hns3: fixed hclge_fetch_pf_reg accesses bar space out
of bounds issue (bsc#1236144).
* CVE-2025-21651: net: hns3: do not auto enable misc vector (bsc#1236145).
* CVE-2025-21652: ipvlan: Fix use-after-free in ipvlan_get_iflink()
(bsc#1236160).
* CVE-2025-21653: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute
(bsc#1236161).
* CVE-2025-21655: io_uring/eventfd: ensure io_eventfd_signal() defers another
RCU period (bsc#1236163).
* CVE-2025-21662: net/mlx5: Fix variable not being completed when function
returns (bsc#1236198).
* CVE-2025-21663: net: stmmac: dwmac-tegra: Read iommu stream id from device
tree (bsc#1236260).
* CVE-2025-21664: dm thin: make get_first_thin use rcu-safe list first
function (bsc#1236262).
* CVE-2025-21666: vsock: prevent null-ptr-deref in vsock_*[has_data|has_space]
(bsc#1236680).
* CVE-2025-21669: vsock/virtio: discard packets if the transport changes
(bsc#1236683).
* CVE-2025-21670: vsock/bpf: return early if transport is not assigned
(bsc#1236685).
* CVE-2025-21674: net/mlx5e: Fix inversion dependency warning while enabling
IPsec tunnel (bsc#1236688).
* CVE-2025-21675: net/mlx5: Clear port select structure when fail to create
(bsc#1236694).
* CVE-2025-21676: net: fec: handle page_pool_dev_alloc_pages error
(bsc#1236696).
* CVE-2025-21678: gtp: Destroy device along with udp socket's netns dismantle
(bsc#1236698).
* CVE-2025-21682: eth: bnxt: always recalculate features after XDP clearing,
fix null-deref (bsc#1236703).

The following non-security bugs were fixed:

* ACPI/IORT: Add PMCG platform information for HiSilicon HIP09A (stable-
fixes).
* ACPI/IORT: Add PMCG platform information for HiSilicon HIP10/11 (stable-
fixes).
* ACPI: PCC: Add PCC shared memory region command and status bitfields
(stable-fixes).
* ACPI: fan: cleanup resources in the error path of .probe() (git-fixes).
* ACPI: resource: Add Asus Vivobook X1504VAP to irq1_level_low_skip_override[]
(stable-fixes).
* ACPI: resource: Add TongFang GM5HG0A to irq1_edge_low_force_override[]
(stable-fixes).
* ACPI: resource: acpi_dev_irq_override(): Check DMI match last (stable-
fixes).
* ALSA: hda/realtek - Add support for ASUS Zen AIO 27 Z272SD_A272SD audio
(stable-fixes).
* ALSA: hda/realtek - Fixed headphone distorted sound on Acer Aspire A115-31
laptop (git-fixes).
* ALSA: hda/realtek: Add new alc2xx-fixup-headset-mic model (stable-fixes).
* ALSA: hda/realtek: Add support for Ayaneo System using CS35L41 HDA (stable-
fixes).
* ALSA: hda/realtek: Add support for Galaxy Book2 Pro (NP950XEE) (stable-
fixes).
* ALSA: hda/realtek: Enable Mute LED on HP Laptop 14s-fq1xxx (stable-fixes).
* ALSA: hda/realtek: Enable headset mic on Positivo C6400 (stable-fixes).
* ALSA: hda/realtek: Workaround for resume on Dell Venue 11 Pro 7130
(bsc#1235686).
* ALSA: hda: Fix headset detection failure due to unstable sort (git-fixes).
* ALSA: ump: Use guard() for locking (stable-fixes).
* ALSA: usb-audio: Add delay quirk for USB Audio Device (stable-fixes).
* ALSA: usb-audio: Add delay quirk for iBasso DC07 Pro (stable-fixes).
* ASoC: Intel: avs: Fix theoretical infinite loop (git-fixes).
* ASoC: acp: Support microphone from Lenovo Go S (stable-fixes).
* ASoC: mediatek: disable buffer pre-allocation (stable-fixes).
* ASoC: rockchip: i2s_tdm: Re-add the set_sysclk callback (git-fixes).
* ASoC: rt722: add delay time to wait for the calibration procedure (stable-
fixes).
* ASoC: samsung: Add missing depends on I2C (git-fixes).
* ASoC: samsung: Add missing selects for MFD_WM8994 (stable-fixes).
* ASoC: sun4i-spdif: Add clock multiplier settings (git-fixes).
* ASoC: wm8994: Add depends on MFD core (stable-fixes).
* Align git commit ID abbreviation guidelines and checks (git-fixes).
* Bluetooth: Add support ITTIM PE50-M75C (stable-fixes).
* Bluetooth: L2CAP: accept zero as a special value for MTU auto-selection
(git-fixes).
* Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc (git-fixes).
* Bluetooth: MGMT: Fix Add Device to responding before completing (git-fixes).
* Bluetooth: btnxpuart: Fix driver sending truncated data (git-fixes).
* Bluetooth: btnxpuart: Fix glitches seen in dual A2DP streaming (git-fixes).
* Bluetooth: btusb: Add USB HW IDs for MT7921/MT7922/MT7925 (stable-fixes).
* Bluetooth: btusb: Add new VID/PID 0489/e111 for MT7925 (stable-fixes).
* Bluetooth: btusb: Add new VID/PID 13d3/3602 for MT7925 (stable-fixes).
* Bluetooth: btusb: add callback function in btusb suspend/resume (stable-
fixes).
* Bluetooth: btusb: mediatek: add callback function in btusb_disconnect
(stable-fixes).
* Bluetooth: hci_sync: Fix not setting Random Address when required (git-
fixes).
* uvcvideo: drop fix due to regression (bsc#1235894)
* EDAC/{i10nm,skx,skx_common}: Support UV systems (bsc#1234693).
* HID: core: Fix assumption that Resolution Multipliers must be in Logical
Collections (git-fixes).
* HID: fix generic desktop D-Pad controls (git-fixes).
* HID: hid-sensor-hub: do not use stale platform-data on remove (git-fixes).
* HID: hid-thrustmaster: Fix warning in thrustmaster_probe by adding endpoint
check (git-fixes).
* HID: multitouch: fix support for Goodix PID 0x01e9 (git-fixes).
* Input: atkbd - map F23 key to support default copilot shortcut (stable-
fixes).
* Input: bbnsm_pwrkey - add remove hook (git-fixes).
* Input: bbnsm_pwrkey - fix missed key press after suspend (git-fixes).
* Input: davinci-keyscan - remove leftover header (git-fixes).
* Input: xpad - add QH Electronics VID/PID (stable-fixes).
* Input: xpad - add support for Nacon Evol-X Xbox One Controller (stable-
fixes).
* Input: xpad - add support for Nacon Pro Compact (stable-fixes).
* Input: xpad - add support for wooting two he (arm) (stable-fixes).
* Input: xpad - add unofficial Xbox 360 wireless receiver clone (stable-
fixes).
* Input: xpad - improve name of 8BitDo controller 2dc8:3106 (stable-fixes).
* KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits (bsc#1234635).
* KVM: s390: Reject KVM_SET_GSI_ROUTING on ucontrol VMs (git-fixes
bsc#1235776).
* KVM: s390: Reject setting flic pfault attributes on ucontrol VMs (git-fixes
bsc#1235777).
* KVM: s390: vsie: fix virtual/physical address in unpin_scb() (git-fixes
bsc#1235778).
* Move upstreamed DRM patch into sorted section
* Move upstreamed NFS patch into sorted section
* Move upstreamed TPM patch into sorted section
* Move upstreamed lpfc patches into sorted section
* Move upstreamed ppc patch into sorted section
* Move upstreamed sound patch into sorted section
* NFC: nci: Add bounds checking in nci_hci_create_pipe() (git-fixes).
* NFSv4.2: fix COPY_NOTIFY xdr buf size calculation (git-fixes).
* NFSv4.2: mark OFFLOAD_CANCEL MOVEABLE (git-fixes).
* PCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1 (git-
fixes).
* PCI: dwc: Always stop link in the dw_pcie_suspend_noirq (git-fixes).
* PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar() (git-
fixes).
* PCI: dwc: ep: Write BAR_MASK before iATU registers in pci_epc_set_bar()
(git-fixes).
* PCI: endpoint: Destroy the EPC device in devm_pci_epc_destroy() (git-fixes).
* PCI: endpoint: Finish virtual EP removal in pci_epf_remove_vepf() (git-
fixes).
* PCI: endpoint: pci-epf-test: Fix check for DMA MEMCPY test (git-fixes).
* PCI: endpoint: pci-epf-test: Set dma_chan_rx pointer to NULL on error (git-
fixes).
* PCI: imx6: Deassert apps_reset in imx_pcie_deassert_core_reset() (git-
fixes).
* PCI: imx6: Skip controller_id generation logic for i.MX7D (git-fixes).
* PCI: microchip: Set inbound address translation for coherent or non-coherent
mode (git-fixes).
* PCI: rcar-ep: Fix incorrect variable used when calling
devm_request_mem_region() (git-fixes).
* PM: hibernate: Add error handling for syscore_suspend() (git-fixes).
* RDMA/bnxt_re: Add send queue size check for variable wqe (git-fixes)
* RDMA/bnxt_re: Fix MSN table size for variable wqe mode (git-fixes)
* RDMA/bnxt_re: Fix max SGEs for the Work Request (git-fixes)
* RDMA/bnxt_re: Fix the max WQE size for static WQE support (git-fixes)
* RDMA/bnxt_re: Fix the max WQEs used in Static WQE mode (git-fixes)
* RDMA/bnxt_re: Fix to drop reference to the mmap entry in case of error (git-
fixes)
* RDMA/bnxt_re: Fix to export port num to ib_query_qp (git-fixes)
* RDMA/mlx4: Avoid false error about access to uninitialized gids array (git-
fixes)
* RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error (git-
fixes)
* RDMA/mlx5: Fix implicit ODP use after free (git-fixes)
* RDMA/mlx5: Fix indirect mkey ODP page count (git-fixes)
* RDMA/rxe: Fix mismatched max_msg_sz (git-fixes)
* RDMA/rxe: Fix the warning "__rxe_cleanup+0x12c/0x170 [rdma_rxe]" (git-fixes)
* RDMA/srp: Fix error handling in srp_add_port (git-fixes)
* USB: core: Disable LPM only for non-suspended ports (git-fixes).
* USB: serial: cp210x: add Phoenix Contact UPS Device (stable-fixes).
* USB: serial: option: add MeiG Smart SRM815 (stable-fixes).
* USB: serial: option: add Neoway N723-EA support (stable-fixes).
* USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() (git-
fixes).
* USB: usblp: return error when setting unsupported protocol (git-fixes).
* Update patches.suse/nvme-tcp-Fix-I-O-queue-cpu-spreading-for-multiple-
co.patch (git-fixes bsc#1224049).
* VFS: use system_unbound_wq for delayed_mntput (bsc#1234683).
* VMCI: fix reference to ioctl-number.rst (git-fixes).
* afs: Fix EEXIST error returned from afs_rmdir() to be ENOTEMPTY (git-fixes).
* afs: Fix cleanup of immediately failed async calls (git-fixes).
* afs: Fix directory format encoding struct (git-fixes).
* afs: Fix the fallback handling for the YFS.RemoveFile2 RPC call (git-fixes).
* afs: Fix the maximum cell name length (git-fixes).
* arm64/sme: Move storage of reg_smidr to __cpuinfo_store_cpu() (git-fixes)
* arm64: Filter out SVE hwcaps when FEAT_SVE isn't implemented (git-fixes)
* arm64: Kconfig: Make SME depend on BROKEN for now (git-fixes bsc#1236245).
* arm64: dts: rockchip: Add sdmmc/sdio/emmc reset controls for RK3328 (git-
fixes)
* arm64: dts: rockchip: add hevc power domain clock to rk3328 (git-fixes).
* arm64: dts: rockchip: increase gmac rx_delay on rk3399-puma (git-fixes)
* arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL (git-
fixes).
* arm64: tegra: Disable Tegra234 sce-fabric node (git-fixes)
* arm64: tegra: Fix Tegra234 PCIe interrupt-map (git-fixes)
* arm64: tegra: Fix typo in Tegra234 dce-fabric compatible (git-fixes)
* ata: libata-core: Set ATA_QCFLAG_RTF_FILLED in fill_result_tf() (stable-
fixes).
* bnxt_en: Fix GSO type for HW GRO packets on 5750X chips (git-fixes)
* btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235445).
* btrfs: fix use-after-free waiting for encoded read endios (bsc#1235445).
* bus: mhi: host: Free mhi_buf vector inside mhi_alloc_bhie_table() (git-
fixes).
* ceph: improve error handling and short/overflow-read logic in
__ceph_sync_read() (bsc#1228592).
* cleanup: Add conditional guard support (stable-fixes).
* cleanup: Adjust scoped_guard() macros to avoid potential warning (stable-
fixes).
* cleanup: Remove address space of returned pointer (git-fixes).
* cpufreq: ACPI: Fix max-frequency computation (git-fixes).
* cpufreq: Do not unregister cpufreq cooling on CPU hotplug (git-fixes).
* cpufreq: amd-pstate: remove global header file (git-fixes).
* cpufreq: intel_pstate: Check turbo_is_disabled() in store_no_turbo()
(bsc#1234619).
* cpufreq: intel_pstate: Do not update global.turbo_disabled after
initialization (bsc#1234619).
* cpufreq: intel_pstate: Drop redundant locking from
intel_pstate_driver_cleanup() (bsc#1234619).
* cpufreq: intel_pstate: Fix unchecked HWP MSR access (bsc#1234619).
* cpufreq: intel_pstate: Fold intel_pstate_max_within_limits() into caller
(bsc#1234619).
* cpufreq: intel_pstate: Get rid of unnecessary READ_ONCE() annotations
(bsc#1234619).
* cpufreq: intel_pstate: Make hwp_notify_lock a raw spinlock (git-fixes).
* cpufreq: intel_pstate: Read global.no_turbo under READ_ONCE() (bsc#1234619).
* cpufreq: intel_pstate: Rearrange show_no_turbo() and store_no_turbo()
(bsc#1234619).
* cpufreq: intel_pstate: Refine computation of P-state for given frequency
(bsc#1234619).
* cpufreq: intel_pstate: Replace three global.turbo_disabled checks
(bsc#1234619).
* cpufreq: intel_pstate: Revise global turbo disable check (bsc#1234619).
* cpufreq: intel_pstate: Simplify spinlock locking (bsc#1234619).
* cpufreq: intel_pstate: Update the maximum CPU frequency consistently
(bsc#1234619).
* cpufreq: intel_pstate: Use HWP to initialize ITMT if CPPC is missing (git-
fixes).
* cpufreq: intel_pstate: Use __ro_after_init for three variables
(bsc#1234619).
* cpufreq: intel_pstate: Wait for canceled delayed work to complete
(bsc#1234619).
* cpufreq: intel_pstate: fix pstate limits enforcement for adjust_perf call
back (git-fixes).
* cpuidle: Avoid potential overflow in integer multiplication (git-fixes).
* cpupower: fix TSC MHz calculation (git-fixes).
* crypto: caam - use JobR's space to access page 0 regs (git-fixes).
* crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes
(git-fixes).
* crypto: ecdsa - Avoid signed integer overflow on signature decoding (stable-
fixes).
* crypto: ecdsa - Convert byte arrays with key coordinates to digits (stable-
fixes).
* crypto: ecdsa - Rename keylen to bufsize where necessary (stable-fixes).
* crypto: ecdsa - Use ecc_digits_from_bytes to convert signature (stable-
fixes).
* crypto: iaa - Fix IAA disabling that occurs when sync_mode is set to 'async'
(git-fixes).
* crypto: ixp4xx - fix OF node reference leaks in init_ixp_crypto() (git-
fixes).
* crypto: qce - fix goto jump in error path (git-fixes).
* crypto: qce - fix priority to be less than ARMv8 CE (git-fixes).
* crypto: qce - unregister previously registered algos in error path (git-
fixes).
* devcoredump: cleanup some comments (git-fixes).
* dlm: fix possible lkb_resource null dereference (git-fixes).
* dmaengine: ti: edma: fix OF node reference leaks in edma_driver (git-fixes).
* doc/README.SUSE: Point to the updated version of LKMPG
* docs: media: update location of the media patches (stable-fixes).
* docs: power: Fix footnote reference for Toshiba Satellite P10-554 (git-
fixes).
* driver core: class: Fix wild pointer dereferences in API
class_dev_iter_next() (git-fixes).
* drivers/card_reader/rtsx_usb: Restore interrupt based detection (git-fixes).
* drm/amd/display: Add check for granularity in dml ceil/floor helpers
(stable-fixes).
* drm/amd/display: Fix DSC-re-computing (stable-fixes).
* drm/amd/display: Fix incorrect DSC recompute trigger (stable-fixes).
* drm/amd/display: Use HW lock mgr for PSR1 (stable-fixes).
* drm/amd/display: increase MAX_SURFACES to the value supported by hw (stable-
fixes).
* drm/amd/pm: Fix an error handling path in
vega10_enable_se_edc_force_stall_config() (git-fixes).
* drm/amdgpu/vcn: reset fw_shared under SRIOV (git-fixes).
* drm/amdgpu: Fix potential NULL pointer dereference in
atomctrl_get_smc_sclk_range_table (git-fixes).
* drm/amdgpu: always sync the GFX pipe on ctx switch (stable-fixes).
* drm/amdgpu: simplify return statement in amdgpu_ras_eeprom_init (git-fixes).
* drm/amdgpu: tear down ttm range manager for doorbell in amdgpu_ttm_fini()
(git-fixes).
* drm/amdkfd: Correct the migration DMA map direction (stable-fixes).
* drm/amdkfd: fixed page fault when enable MES shader debugger (git-fixes).
* drm/bridge: it6505: Change definition of AUX_FIFO_MAX_SIZE (git-fixes).
* drm/etnaviv: Fix page property being used for non writecombine buffers (git-
fixes).
* drm/i915/fb: Relax clear color alignment to 64 bytes (stable-fixes).
* drm/mediatek: Add return value check when reading DPCD (git-fixes).
* drm/mediatek: Add support for 180-degree rotation in the display driver
(git-fixes).
* drm/mediatek: Fix YCbCr422 color format issue for DP (git-fixes).
* drm/mediatek: Fix mode valid issue for dp (git-fixes).
* drm/mediatek: Set private->all_drm_private[i]->drm to NULL if mtk_drm_bind
returns err (git-fixes).
* drm/mediatek: mtk_dsi: Add registers to pdata to fix MT8186/MT8188 (git-
fixes).
* drm/mediatek: stop selecting foreign drivers (git-fixes).
* drm/msm/dp: set safe_to_exit_level before printing it (git-fixes).
* drm/msm/dpu: link DSPP_2/_3 blocks on SC8180X (git-fixes).
* drm/msm/dpu: link DSPP_2/_3 blocks on SM8150 (git-fixes).
* drm/msm/dpu: link DSPP_2/_3 blocks on SM8250 (git-fixes).
* drm/msm/dpu: link DSPP_2/_3 blocks on SM8350 (git-fixes).
* drm/msm/dpu: link DSPP_2/_3 blocks on SM8550 (git-fixes).
* drm/msm: Check return value of of_dma_configure() (git-fixes).
* drm/msm: do not clean up priv->kms prematurely (git-fixes).
* drm/rcar-du: dsi: Fix PHY lock bit check (git-fixes).
* drm/rockchip: cdn-dp: Use drm_connector_helper_hpd_irq_event() (git-fixes).
* drm/rockchip: vop2: Check linear format for Cluster windows on rk3566/8
(git-fixes).
* drm/rockchip: vop2: Fix cluster windows alpha ctrl regsiters offset (git-
fixes).
* drm/rockchip: vop2: Fix the mixer alpha setup for layer 0 (git-fixes).
* drm/tidss: Clear the interrupt status for interrupts being disabled (git-
fixes).
* drm/tidss: Fix issue in irq handling causing irq-flood issue (git-fixes).
* drm/v3d: Assign job pointer to NULL before signaling the fence (git-fixes).
* drm/v3d: Ensure job pointer is set to NULL after job completion (git-fixes).
* drm/v3d: Stop active perfmon if it is being destroyed (git-fixes).
* drm/vmwgfx: Add new keep_resv BO param (git-fixes).
* exfat: ensure that ctime is updated whenever the mtime is (git-fixes).
* exfat: fix the infinite loop in __exfat_free_cluster() (git-fixes).
* exfat: fix the infinite loop in exfat_readdir() (git-fixes).
* fbdev: omapfb: Fix an OF node leak in dss_of_port_get_parent_device() (git-
fixes).
* genirq: Make handle_enforce_irqctx() unconditionally available (git-fixes).
* genksyms: fix memory leak when the same symbol is added from source (git-
fixes).
* genksyms: fix memory leak when the same symbol is read from *.symref file
(git-fixes).
* gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag (git-fixes).
* gpio: mxc: remove dead code after switch to DT-only (git-fixes).
* gpio: xilinx: Convert gpio_lock to raw spinlock (git-fixes).
* gtp: Use for_each_netdev_rcu() in gtp_genl_dump_pdp() (git-fixes).
* hwmon: (drivetemp) Fix driver producing garbage data when SCSI errors occur
(git-fixes).
* hwmon: (drivetemp) Set scsi command timeout to 10s (stable-fixes).
* hwmon: (tmp513) Fix division of negative numbers (git-fixes).
* hyperv: Do not overlap the hvcall IO areas in get_vtl() (git-fixes).
* i2c: core: fix reference leak in i2c_register_adapter() (git-fixes).
* i2c: i801: Add support for Intel Arrow Lake-H (stable-fixes).
* i2c: i801: Add support for Intel Panther Lake (stable-fixes).
* i2c: mux: demux-pinctrl: check initial mux selection, too (git-fixes).
* i2c: rcar: fix NACK handling when being a target (git-fixes).
* i2c: xgene-slimpro: Migrate to use generic PCC shmem related macros (stable-
fixes).
* ibmvnic: Free any outstanding tx skbs during scrq reset (bsc#1226980).
* ieee802154: ca8210: Add missing check for kfifo_alloc() in ca8210_probe()
(git-fixes).
* iio: adc: ad7124: Disable all channels at probe time (git-fixes).
* iio: adc: ad_sigma_delta: Handle CS assertion as intended in
ad_sd_read_reg_raw() (git-fixes).
* iio: adc: at91: call input_free_device() on allocated iio_dev (git-fixes).
* iio: adc: rockchip_saradc: fix information leak in triggered buffer (git-
fixes).
* iio: adc: ti-ads124s08: Use gpiod_set_value_cansleep() (git-fixes).
* iio: adc: ti-ads8688: fix information leak in triggered buffer (git-fixes).
* iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered
buffer (git-fixes).
* iio: gyro: fxas21002c: Fix missing data update in trigger handler (git-
fixes).
* iio: iio-mux: kzalloc instead of devm_kzalloc to ensure page alignment (git-
fixes).
* iio: imu: kmx61: fix information leak in triggered buffer (git-fixes).
* iio: inkern: call iio_device_put() only on mapped devices (git-fixes).
* iio: light: as73211: fix channel handling in only-color triggered buffer
(git-fixes).
* iio: light: vcnl4035: fix information leak in triggered buffer (git-fixes).
* iio: pressure: zpa2326: fix information leak in triggered buffer (git-
fixes).
* iio: test : check null return of kunit_kmalloc in iio_rescale_test_scale
(git-fixes).
* intel_th: core: fix kernel-doc warnings (git-fixes).
* ipmi: ipmb: Add check devm_kasprintf() returned value (git-fixes).
* ipmi: ssif_bmc: Fix new request loss when bmc ready for a response (git-
fixes).
* irqchip/gic-v3: Force propagation of the active state with a read-back
(stable-fixes).
* irqchip/gic: Correct declaration of *percpu_base pointer in union gic_base
(stable-fixes).
* kABI workaround for struct auto_pin_cfg_item change (git-fixes).
* kconfig: fix file name in warnings when loading KCONFIG_DEFCONFIG_LIST (git-
fixes).
* kheaders: Ignore silly-rename files (stable-fixes).
* ktest.pl: Avoid false positives with grub2 skip regex (stable-fixes).
* ktest.pl: Check kernelrelease return in get_version (git-fixes).
* ktest.pl: Fix typo "accesing" (git-fixes).
* ktest.pl: Fix typo in comment (git-fixes).
* ktest.pl: Remove unused declarations in run_bisect_test function (git-
fixes).
* ktest: force $buildonly = 1 for 'make_warnings_file' test type (stable-
fixes).
* landlock: Handle weird files (git-fixes).
* latencytop: use correct kernel-doc format for func params (git-fixes).
* leds: lp8860: Write full EEPROM, not only half of it (git-fixes).
* leds: netxbig: Fix an OF node reference leak in netxbig_leds_get_of_pdata()
(git-fixes).
* lib/inflate.c: remove dead code (git-fixes).
* lib/stackdepot: print disabled message only if truly disabled (git-fixes).
* mac802154: check local interfaces before deleting sdata list (stable-fixes).
* mailbox: pcc: Add support for platform notification handling (stable-fixes).
* mailbox: pcc: Support shared interrupt for multiple subspaces (stable-
fixes).
* mailbox: tegra-hsp: Clear mailbox before using message (git-fixes).
* maple_tree: simplify split calculation (git-fixes).
* media: camif-core: Add check for clk_enable() (git-fixes).
* media: ccs: Clean up parsed CCS static data on parse failure (git-fixes).
* media: ccs: Fix CCS static data parsing for large block sizes (git-fixes).
* media: ccs: Fix cleanup order in ccs_probe() (git-fixes).
* media: dvb-usb-v2: af9035: fix ISO C90 compilation error on
af9035_i2c_master_xfer (git-fixes).
* media: dvb: mb86a16: check the return value of mb86a16_read() (git-fixes).
* media: firewire: firedtv-avc.c: replace BUG with proper, error return (git-
fixes).
* media: i2c: imx412: Add missing newline to prints (git-fixes).
* media: i2c: ov9282: Correct the exposure offset (git-fixes).
* media: imx-jpeg: Fix potential error pointer dereference in detach_pm()
(git-fixes).
* media: imx296: Add standby delay during probe (git-fixes).
* media: lmedm04: Handle errors for lme2510_int_read (git-fixes).
* media: marvell: Add check for clk_enable() (git-fixes).
* media: mc: fix endpoint iteration (git-fixes).
* media: mipi-csis: Add check for clk_enable() (git-fixes).
* media: nxp: imx8-isi: fix v4l2-compliance test errors (git-fixes).
* media: ov08x40: Fix hblank out of range issue (git-fixes).
* media: ov5640: fix get_light_freq on auto (git-fixes).
* media: rc: iguanair: handle timeouts (git-fixes).
* media: rkisp1: Fix unused value issue (git-fixes).
* media: uvcvideo: Fix crash during unbind if gpio unit is in use (git-fixes).
* media: uvcvideo: Fix double free in error path (git-fixes).
* media: uvcvideo: Fix event flags in uvc_ctrl_send_events (git-fixes).
* media: uvcvideo: Force UVC version to 1.0a for 0408:4035 (stable-fixes).
* media: uvcvideo: Only save async fh if success (git-fixes).
* media: uvcvideo: Propagate buf->error to userspace (git-fixes).
* media: uvcvideo: Remove dangling pointers (git-fixes).
* media: uvcvideo: Remove redundant NULL assignment (git-fixes).
* media: uvcvideo: Support partial control reads (git-fixes).
* memory tiering: count PGPROMOTE_SUCCESS when mem tiering is enabled (git-
fixes).
* memory-failure: use a folio in me_huge_page() (git-fixes).
* memory: tegra20-emc: fix an OF node reference bug in
tegra_emc_find_node_by_ram_code() (git-fixes).
* misc: fastrpc: Deregister device nodes properly in error scenarios (git-
fixes).
* misc: fastrpc: Fix copy buffer page size (git-fixes).
* misc: fastrpc: Fix registered buffer page address (git-fixes).
* misc: microchip: pci1xxxx: Resolve kernel panic during GPIO IRQ handling
(git-fixes).
* misc: microchip: pci1xxxx: Resolve return code mismatch during GPIO set
config (git-fixes).
* misc: misc_minor_alloc to use ida for all dynamic/misc dynamic minors (git-
fixes).
* mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes).
* mm,page_owner: do not remove __GFP_NOLOCKDEP in add_stack_record_to_list
(git-fixes).
* mm/compaction: fix UBSAN shift-out-of-bounds warning (git fixes
(mm/compaction)).
* mm/memory-failure: cast index to loff_t before shifting it (git-fixes).
* mm/memory-failure: check the mapcount of the precise page (git-fixes).
* mm/memory-failure: fix crash in split_huge_page_to_list from
soft_offline_page (git-fixes).
* mm/memory-failure: pass the folio and the page to collect_procs() (git-
fixes).
* mm/memory-failure: use raw_spinlock_t in struct memory_failure_cpu (git-
fixes).
* mm/memory_hotplug: add missing mem_hotplug_lock (git-fixes).
* mm/memory_hotplug: fix error handling in add_memory_resource() (git-fixes).
* mm/memory_hotplug: prevent accessing by index=-1 (git-fixes).
* mm/memory_hotplug: use pfn math in place of direct struct page manipulation
(git-fixes).
* mm/migrate: correct nr_failed in migrate_pages_sync() (git-fixes).
* mm/migrate: fix deadlock in migrate_pages_batch() on large folios (git-
fixes).
* mm/migrate: putback split folios when numa hint migration fails (git-fixes).
* mm/migrate: split source folio if it is on deferred split list (git-fixes).
* mm/page_owner: remove free_ts from page_owner output (git-fixes).
* mm/rodata_test: use READ_ONCE() to read const variable (git-fixes).
* mm: convert DAX lock/unlock page to lock/unlock folio (git-fixes).
* mm: memory-failure: ensure moving HWPoison flag to the raw error pages (git-
fixes).
* mm: memory-failure: fetch compound head after extra page refcnt is held
(git-fixes).
* mm: memory-failure: fix potential page refcnt leak in memory_failure() (git-
fixes).
* mm: memory-failure: fix race window when trying to get hugetlb folio (git-
fixes).
* mm: memory-failure: remove unneeded PageHuge() check (git-fixes).
* mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes).
* modpost: fix the missed iteration for the max bit in do_input() (git-fixes).
* mtd: onenand: Fix uninitialized retlen in do_otp_read() (git-fixes).
* mtd: spinand: Remove write_enable_op() in markbad() (git-fixes).
* net/rose: prevent integer overflows in rose_setsockopt() (git-fixes).
* net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761).
* net: mana: Cleanup "mana" debugfs dir after cleanup of all children
(bsc#1236760).
* net: mana: Enable debugfs files for MANA device (bsc#1236758).
* net: netvsc: Update default VMBus channels (bsc#1236757).
* net: phy: c45-tjaxx: add delay between MDIO write and read in soft_reset
(git-fixes).
* net: rose: fix timer races against user threads (git-fixes).
* net: usb: qmi_wwan: add Telit FE910C04 compositions (stable-fixes).
* net: usb: rtl8150: enable basic endpoint checking (git-fixes).
* net: wwan: iosm: Properly check for valid exec stage in ipc_mmio_init()
(git-fixes).
* net: wwan: t7xx: Fix FSM command timeout issue (git-fixes).
* netfilter: nf_tables: validate family when identifying table via handle
(bsc#1233778 ZDI-24-1454).
* nilfs2: fix possible int overflows in nilfs_fiemap() (git-fixes).
* nvme-tcp: Fix I/O queue cpu spreading for multiple controllers (git-fixes).
* nvme: Add error check for xa_store in nvme_get_effects_log (git-fixes).
* nvme: Add error path for xa_store in nvme_init_effects (git-fixes).
* nvme: fix bogus kzalloc() return check in nvme_init_effects_log() (git-
fixes).
* nvmet: propagate npwg topology (git-fixes).
* padata: add pd get/put refcnt helper (git-fixes).
* padata: avoid UAF for reorder_work (git-fixes).
* padata: fix UAF in padata_reorder (git-fixes).
* pinctrl: amd: Take suspend type into consideration which pins are non-wake
(git-fixes).
* pinctrl: samsung: fix fwnode refcount cleanup if platform_get_irq_optional()
fails (git-fixes).
* platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled
it (git-fixes).
* platform/x86/intel-uncore-freq: Ignore minor version change (bsc#1225897).
* platform/x86/intel/tpmi: Add defines to get version information
(bsc#1225897).
* pm:cpupower: Add missing powercap_set_enabled() stub function (git-fixes).
* power: ip5xxx_power: Fix return value on ADC read errors (git-fixes).
* powerpc/iommu: Move pSeries specific functions to pseries/iommu.c
(bsc#1220711 ltc#205755).
* powerpc/iommu: Only build sPAPR access functions on pSeries (bsc#1220711
ltc#205755).
* powerpc/powernv/pci: Remove MVE code (bsc#1220711 ltc#205755).
* powerpc/powernv/pci: Remove ioda1 support (bsc#1220711 ltc#205755).
* powerpc/powernv/pci: Remove last IODA1 defines (bsc#1220711 ltc#205755).
* powerpc/pseries/eeh: Fix get PE state translation (bsc#1215199).
* powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW
(bsc#1218470 ltc#204531).
* powerpc/pseries/vas: Add close() callback in vas_vm_ops struct
(bsc#1234825).
* pps: add an error check in parport_attach (git-fixes).
* pps: remove usage of the deprecated ida_simple_xx() API (stable-fixes).
* printk: Add is_printk_legacy_deferred() (bsc#1236733).
* printk: Defer legacy printing when holding printk_cpu_sync (bsc#1236733).
* pwm: stm32-lp: Add check for clk_enable() (git-fixes).
* pwm: stm32: Add check for clk_enable() (git-fixes).
* r8169: enable SG/TSO on selected chip versions per default (bsc#1235874).
* rcu-tasks: Pull sampling of ->percpu_dequeue_lim out of loop (git-fixes)
* rcu/tree: Defer setting of jiffies during stall reset (git-fixes)
* rcu: Dump memory object info if callback function is invalid (git-fixes)
* rcu: Eliminate rcu_gp_slow_unregister() false positive (git-fixes)
* rcuscale: Move rcu_scale_writer() (git-fixes)
* rdma/cxgb4: Prevent potential integer overflow on 32bit (git-fixes)
* regulator: core: Add missing newline character (git-fixes).
* regulator: of: Implement the unwind path of of_regulator_match() (git-
fixes).
* remoteproc: core: Fix ida_free call while not allocated (git-fixes).
* rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read (git-fixes).
* rtc: zynqmp: Fix optional clock name property (git-fixes).
* s390x config: IOMMU_DEFAULT_DMA_LAZY=y (bsc#1235646)
* samples/landlock: Fix possible NULL dereference in parse_path() (git-fixes).
* sched/fair: Fix value reported by hot tasks pulled in /proc/schedstat
(bsc#1235865).
* sched/fair: Fix value reported by hot tasks pulled in /proc/schedstat -kabi
(bsc#1235865).
* scsi: storvsc: Ratelimit warning logs to prevent VM denial of service (git-
fixes).
* seccomp: Stub for !CONFIG_SECCOMP (stable-fixes).
* selftest: media_tests: fix trivial UAF typo (git-fixes).
* selftests/alsa: Fix circular dependency involving global-timer (stable-
fixes).
* selftests/landlock: Fix error message (git-fixes).
* selftests/mm/cow: modify the incorrect checking parameters (git-fixes).
* selftests/powerpc: Fix argument order to timer_sub() (git-fixes).
* selftests: harness: fix printing of mismatch values in __EXPECT() (git-
fixes).
* selftests: mptcp: avoid spurious errors on disconnect (git-fixes).
* selftests: tc-testing: reduce rshift value (stable-fixes).
* selftests: timers: clocksource-switch: Adapt progress to kselftest framework
(git-fixes).
* selinux: Fix SCTP error inconsistency in selinux_socket_bind() (git-fixes).
* serial: 8250: Adjust the timeout for FIFO mode (git-fixes).
* serial: sh-sci: Do not probe the serial port if its slot in sci_ports[] is
in use (git-fixes).
* serial: sh-sci: Drop __initdata macro for port_cfg (git-fixes).
* ocfs2: temporarily disable upstream patch (bsc#1236138).
* soc: atmel: fix device_node release in atmel_soc_device_init() (git-fixes).
* soc: mediatek: mtk-devapc: Fix leaking IO map on error paths (git-fixes).
* soc: qcom: smem_state: fix missing of_node_put in error path (git-fixes).
* soc: qcom: socinfo: Avoid out of bounds read of serial number (git-fixes).
* sound: usb: enable DSD output for ddHiFi TC44C (stable-fixes).
* sound: usb: format: do not warn that raw DSD is unsupported (stable-fixes).
* spi: zynq-qspi: Add check for clk_enable() (git-fixes).
* srcu: Fix srcu_struct node grpmask overflow on 64-bit systems (git-fixes)
* srcu: Only accelerate on enqueue time (git-fixes)
* stackdepot: rename pool_index to pool_index_plus_1 (git-fixes).
* stackdepot: respect __GFP_NOLOCKDEP allocation flag (git-fixes).
* staging: iio: ad9832: Correct phase range check (git-fixes).
* staging: iio: ad9834: Correct phase range check (git-fixes).
* staging: media: imx: fix OF node leak in imx_media_add_of_subdevs() (git-
fixes).
* staging: media: max96712: fix kernel oops when removing module (git-fixes).
* thermal: of: fix OF node leak in of_thermal_zone_find() (git-fixes).
* thunderbolt: Add support for Intel Lunar Lake (stable-fixes).
* thunderbolt: Add support for Intel Panther Lake-M/P (stable-fixes).
* tipc: fix NULL deref in cleanup_bearer() (bsc#1235433).
* tools: Sync if_xdp.h uapi tooling header (git-fixes).
* tpm: Map the ACPI provided event log (bsc#1233260 bsc#1233259 bsc#1232421).
* tty: serial: 8250: Fix another runtime PM usage counter underflow (git-
fixes).
* tty: xilinx_uartps: split sysrq handling (git-fixes).
* ubifs: skip dumping tnc tree when zroot is null (git-fixes).
* uio: Fix return value of poll (git-fixes).
* uio: uio_dmem_genirq: check the return value of devm_kasprintf() (git-
fixes).
* usb-storage: Add max sectors quirk for Nokia 208 (stable-fixes).
* usb: chipidea: add CI_HDRC_FORCE_VBUS_ACTIVE_ALWAYS flag (stable-fixes).
* usb: chipidea: ci_hdrc_imx: decrement device's refcount in .remove() and in
the error path of .probe() (git-fixes).
* usb: dwc3-am62: Disable autosuspend during remove (git-fixes).
* usb: dwc3-am62: Fix an OF node leak in phy_syscon_pll_refclk() (git-fixes).
* usb: dwc3: gadget: fix writing NYET threshold (git-fixes).
* usb: fix reference leak in usb_new_device() (git-fixes).
* usb: gadget: configfs: Ignore trailing LF for user strings to cdev (git-
fixes).
* usb: gadget: f_fs: Remove WARN_ON in functionfs_bind (git-fixes).
* usb: gadget: f_tcm: Decrement command ref count on cleanup (git-fixes).
* usb: gadget: f_tcm: Do not free command immediately (git-fixes).
* usb: gadget: f_tcm: Do not prepare BOT write request twice (git-fixes).
* usb: gadget: f_tcm: Fix Get/SetInterface return value (git-fixes).
* usb: gadget: f_tcm: Translate error to sense (git-fixes).
* usb: gadget: f_tcm: ep_autoconfig with fullspeed endpoint (git-fixes).
* usb: gadget: f_uac2: Fix incorrect setting of bNumEndpoints (git-fixes).
* usb: gadget: u_serial: Disable ep before setting port to null to fix the
crash caused by port being null (git-fixes).
* usb: host: xhci-plat: Assign shared_hcd->rsrc_start (git-fixes).
* usb: typec: fix pm usage counter imbalance in ucsi_ccg_sync_control()
(bsc#1235001)
* usb: typec: tcpm/tcpci_maxim: fix error code in
max_contaminant_read_resistance_kohm() (git-fixes).
* usb: typec: tcpm: set SRC_SEND_CAPABILITIES timeout to PD_T_SENDER_RESPONSE
(git-fixes).
* usbnet: ipheth: break up NCM header size computation (git-fixes).
* usbnet: ipheth: check that DPE points past NCM header (git-fixes).
* usbnet: ipheth: fix DPE OoB read (git-fixes).
* usbnet: ipheth: fix possible overflow in DPE length check (git-fixes).
* usbnet: ipheth: refactor NCM datagram loop (git-fixes).
* usbnet: ipheth: use static NDP16 location in URB (git-fixes).
* vfio/pci: Lock external INTx masking ops (bsc#1222803).
* virtio-mem: check if the config changed before fake offlining memory (git-
fixes).
* virtio-mem: convert most offline_and_remove_memory() errors to -EBUSY (git-
fixes).
* virtio-mem: keep retrying on offline_and_remove_memory() errors in Sub Block
Mode (SBM) (git-fixes).
* virtio-mem: remove unsafe unplug in Big Block Mode (BBM) (git-fixes).
* vmscan,migrate: fix page count imbalance on node stats when demoting pages
(git-fixes).
* vsock/virtio: cancel close work in the destructor (git-fixes)
* vsock: Keep the binding until socket destruction (git-fixes)
* vsock: reset socket state when de-assigning the transport (git-fixes)
* watchdog: rzg2l_wdt: Power on the watchdog domain in the restart handler
(stable-fixes).
* watchdog: rzg2l_wdt: Rely on the reset driver for doing proper reset
(stable-fixes).
* watchdog: rzg2l_wdt: Remove reset de-assert from probe (stable-fixes).
* wifi: ath11k: Fix unexpected return buffer manager error for WCN6750/WCN6855
(git-fixes).
* wifi: ath11k: cleanup struct ath11k_mon_data (git-fixes).
* wifi: ath12k: fix atomic calls in ath12k_mac_op_set_bitrate_mask() (stable-
fixes).
* wifi: ath12k: fix tx power, max reg power update to firmware (git-fixes).
* wifi: brcmfmac: add missing header include for brcmf_dbg (git-fixes).
* wifi: cfg80211: adjust allocation of colocated AP data (git-fixes).
* wifi: iwlwifi: fw: read STEP table from correct UEFI var (git-fixes).
* wifi: mac80211: Add non-atomic station iterator (stable-fixes).
* wifi: mac80211: Fix common size calculation for ML element (git-fixes).
* wifi: mac80211: do not flush non-uploaded STAs (git-fixes).
* wifi: mac80211: export ieee80211_purge_tx_queue() for drivers (stable-
fixes).
* wifi: mac80211: fix mbss changed flags corruption on 32 bit systems (stable-
fixes).
* wifi: mac80211: fix tid removal during mesh forwarding (git-fixes).
* wifi: mac80211: prohibit deactivating all links (git-fixes).
* wifi: mac80211: wake the queues in case of failure in resume (stable-fixes).
* wifi: mt76: mt76u_vendor_request: Do not print error messages when -EPROTO
(git-fixes).
* wifi: mt76: mt7915: Fix mesh scan on MT7916 DBDC (git-fixes).
* wifi: mt76: mt7915: add module param to select 5 GHz or 6 GHz on MT7916
(git-fixes).
* wifi: mt76: mt7915: firmware restart on devices with a second pcie link
(git-fixes).
* wifi: mt76: mt7915: fix overflows seen when writing limit attributes (git-
fixes).
* wifi: mt76: mt7915: fix register mapping (git-fixes).
* wifi: mt76: mt7921: fix using incorrect group cipher after disconnection
(git-fixes).
* wifi: mt76: mt7925: fix off by one in mt7925_load_clc() (git-fixes).
* wifi: mt76: mt7996: add max mpdu len capability (git-fixes).
* wifi: mt76: mt7996: fix HE Phy capability (git-fixes).
* wifi: mt76: mt7996: fix definition of tx descriptor (git-fixes).
* wifi: mt76: mt7996: fix incorrect indexing of MIB FW event (git-fixes).
* wifi: mt76: mt7996: fix ldpc setting (git-fixes).
* wifi: mt76: mt7996: fix overflows seen when writing limit attributes (git-
fixes).
* wifi: mt76: mt7996: fix register mapping (git-fixes).
* wifi: mt76: mt7996: fix rx filter setting for bfee functionality (git-
fixes).
* wifi: mt76: mt7996: fix the capability of reception of EHT MU PPDU (git-
fixes).
* wifi: rtlwifi: destroy workqueue at rtl_deinit_core (git-fixes).
* wifi: rtlwifi: do not complete firmware loading needlessly (git-fixes).
* wifi: rtlwifi: fix init_sw_vars leak when probe fails (git-fixes).
* wifi: rtlwifi: fix memory leaks and invalid access at probe error path (git-
fixes).
* wifi: rtlwifi: pci: wait for firmware loading before releasing memory (git-
fixes).
* wifi: rtlwifi: remove unused check_buddy_priv (git-fixes).
* wifi: rtlwifi: rtl8192se: rise completion of firmware loading as last step
(git-fixes).
* wifi: rtlwifi: rtl8821ae: Fix media status report (git-fixes).
* wifi: rtlwifi: rtl8821ae: phy: restore removed code to fix infinite loop
(git-fixes).
* wifi: rtlwifi: usb: fix workqueue leak when probe fails (git-fixes).
* wifi: rtlwifi: wait for firmware loading before releasing memory (git-
fixes).
* wifi: rtw88: use ieee80211_purge_tx_queue() to purge TX skb (stable-fixes).
* wifi: rtw89: mcc: consider time limits not divisible by 1024 (git-fixes).
* wifi: wcn36xx: fix channel survey memory allocation size (git-fixes).
* wifi: wlcore: fix unbalanced pm_runtime calls (git-fixes).
* workqueue: Add rcu lock check at the end of work item execution
(bsc#1236732).
* x86/static-call: Remove early_boot_irqs_disabled check to fix Xen PVH dom0
(git-fixes).
* xfs: Add error handling for xfs_reflink_cancel_cow_range (git-fixes).
* xfs: Propagate errors from xfs_reflink_cancel_cow_range in
xfs_dax_write_iomap_end (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-557=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-557=1

* SUSE Real Time Module 15-SP6
zypper in -t patch SUSE-SLE-Module-RT-15-SP6-2025-557=1

## Package List:

* openSUSE Leap 15.6 (x86_64)
* kernel-rt-devel-6.4.0-150600.10.26.1
* reiserfs-kmp-rt-6.4.0-150600.10.26.1
* reiserfs-kmp-rt-debuginfo-6.4.0-150600.10.26.1
* gfs2-kmp-rt-debuginfo-6.4.0-150600.10.26.1
* dlm-kmp-rt-6.4.0-150600.10.26.1
* kernel-rt-debugsource-6.4.0-150600.10.26.1
* cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.26.1
* kernel-rt_debug-devel-6.4.0-150600.10.26.1
* kernel-rt-devel-debuginfo-6.4.0-150600.10.26.1
* ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.26.1
* kernel-rt_debug-debugsource-6.4.0-150600.10.26.1
* kernel-rt-extra-6.4.0-150600.10.26.1
* kernel-rt-livepatch-devel-6.4.0-150600.10.26.1
* kernel-syms-rt-6.4.0-150600.10.26.1
* dlm-kmp-rt-debuginfo-6.4.0-150600.10.26.1
* kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.26.1
* cluster-md-kmp-rt-6.4.0-150600.10.26.1
* kernel-rt_debug-vdso-6.4.0-150600.10.26.1
* kernel-rt-debuginfo-6.4.0-150600.10.26.1
* gfs2-kmp-rt-6.4.0-150600.10.26.1
* kernel-rt-vdso-debuginfo-6.4.0-150600.10.26.1
* kernel-rt_debug-vdso-debuginfo-6.4.0-150600.10.26.1
* kernel-rt-optional-debuginfo-6.4.0-150600.10.26.1
* kernel-rt-vdso-6.4.0-150600.10.26.1
* kselftests-kmp-rt-6.4.0-150600.10.26.1
* kernel-rt-extra-debuginfo-6.4.0-150600.10.26.1
* kernel-rt_debug-debuginfo-6.4.0-150600.10.26.1
* kselftests-kmp-rt-debuginfo-6.4.0-150600.10.26.1
* kernel-rt-optional-6.4.0-150600.10.26.1
* ocfs2-kmp-rt-6.4.0-150600.10.26.1
* openSUSE Leap 15.6 (noarch)
* kernel-source-rt-6.4.0-150600.10.26.1
* kernel-devel-rt-6.4.0-150600.10.26.1
* openSUSE Leap 15.6 (nosrc x86_64)
* kernel-rt-6.4.0-150600.10.26.1
* kernel-rt_debug-6.4.0-150600.10.26.1
* SUSE Linux Enterprise Live Patching 15-SP6 (x86_64)
* kernel-livepatch-6_4_0-150600_10_26-rt-debuginfo-1-150600.1.3.1
* kernel-livepatch-6_4_0-150600_10_26-rt-1-150600.1.3.1
* kernel-livepatch-SLE15-SP6-RT_Update_8-debugsource-1-150600.1.3.1
* SUSE Real Time Module 15-SP6 (x86_64)
* kernel-rt-devel-debuginfo-6.4.0-150600.10.26.1
* kernel-rt-debuginfo-6.4.0-150600.10.26.1
* ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.26.1
* kernel-rt-devel-6.4.0-150600.10.26.1
* gfs2-kmp-rt-6.4.0-150600.10.26.1
* kernel-rt_debug-debugsource-6.4.0-150600.10.26.1
* gfs2-kmp-rt-debuginfo-6.4.0-150600.10.26.1
* dlm-kmp-rt-6.4.0-150600.10.26.1
* kernel-syms-rt-6.4.0-150600.10.26.1
* kernel-rt-debugsource-6.4.0-150600.10.26.1
* cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.26.1
* dlm-kmp-rt-debuginfo-6.4.0-150600.10.26.1
* kernel-rt_debug-debuginfo-6.4.0-150600.10.26.1
* kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.26.1
* cluster-md-kmp-rt-6.4.0-150600.10.26.1
* kernel-rt_debug-devel-6.4.0-150600.10.26.1
* ocfs2-kmp-rt-6.4.0-150600.10.26.1
* SUSE Real Time Module 15-SP6 (noarch)
* kernel-source-rt-6.4.0-150600.10.26.1
* kernel-devel-rt-6.4.0-150600.10.26.1
* SUSE Real Time Module 15-SP6 (nosrc x86_64)
* kernel-rt-6.4.0-150600.10.26.1
* kernel-rt_debug-6.4.0-150600.10.26.1

## References:

* https://www.suse.com/security/cve/CVE-2023-52923.html
* https://www.suse.com/security/cve/CVE-2024-36476.html
* https://www.suse.com/security/cve/CVE-2024-39282.html
* https://www.suse.com/security/cve/CVE-2024-43913.html
* https://www.suse.com/security/cve/CVE-2024-45828.html
* https://www.suse.com/security/cve/CVE-2024-46858.html
* https://www.suse.com/security/cve/CVE-2024-46896.html
* https://www.suse.com/security/cve/CVE-2024-47141.html
* https://www.suse.com/security/cve/CVE-2024-47143.html
* https://www.suse.com/security/cve/CVE-2024-47809.html
* https://www.suse.com/security/cve/CVE-2024-48873.html
* https://www.suse.com/security/cve/CVE-2024-48881.html
* https://www.suse.com/security/cve/CVE-2024-49569.html
* https://www.suse.com/security/cve/CVE-2024-49948.html
* https://www.suse.com/security/cve/CVE-2024-49951.html
* https://www.suse.com/security/cve/CVE-2024-49978.html
* https://www.suse.com/security/cve/CVE-2024-49998.html
* https://www.suse.com/security/cve/CVE-2024-50051.html
* https://www.suse.com/security/cve/CVE-2024-50106.html
* https://www.suse.com/security/cve/CVE-2024-50151.html
* https://www.suse.com/security/cve/CVE-2024-50199.html
* https://www.suse.com/security/cve/CVE-2024-50251.html
* https://www.suse.com/security/cve/CVE-2024-50258.html
* https://www.suse.com/security/cve/CVE-2024-50299.html
* https://www.suse.com/security/cve/CVE-2024-50304.html
* https://www.suse.com/security/cve/CVE-2024-52332.html
* https://www.suse.com/security/cve/CVE-2024-53091.html
* https://www.suse.com/security/cve/CVE-2024-53095.html
* https://www.suse.com/security/cve/CVE-2024-53164.html
* https://www.suse.com/security/cve/CVE-2024-53168.html
* https://www.suse.com/security/cve/CVE-2024-53170.html
* https://www.suse.com/security/cve/CVE-2024-53172.html
* https://www.suse.com/security/cve/CVE-2024-53175.html
* https://www.suse.com/security/cve/CVE-2024-53185.html
* https://www.suse.com/security/cve/CVE-2024-53187.html
* https://www.suse.com/security/cve/CVE-2024-53194.html
* https://www.suse.com/security/cve/CVE-2024-53195.html
* https://www.suse.com/security/cve/CVE-2024-53196.html
* https://www.suse.com/security/cve/CVE-2024-53197.html
* https://www.suse.com/security/cve/CVE-2024-53198.html
* https://www.suse.com/security/cve/CVE-2024-53203.html
* https://www.suse.com/security/cve/CVE-2024-53227.html
* https://www.suse.com/security/cve/CVE-2024-53230.html
* https://www.suse.com/security/cve/CVE-2024-53231.html
* https://www.suse.com/security/cve/CVE-2024-53232.html
* https://www.suse.com/security/cve/CVE-2024-53233.html
* https://www.suse.com/security/cve/CVE-2024-53236.html
* https://www.suse.com/security/cve/CVE-2024-53239.html
* https://www.suse.com/security/cve/CVE-2024-53685.html
* https://www.suse.com/security/cve/CVE-2024-53690.html
* https://www.suse.com/security/cve/CVE-2024-54680.html
* https://www.suse.com/security/cve/CVE-2024-55639.html
* https://www.suse.com/security/cve/CVE-2024-55881.html
* https://www.suse.com/security/cve/CVE-2024-55916.html
* https://www.suse.com/security/cve/CVE-2024-56369.html
* https://www.suse.com/security/cve/CVE-2024-56372.html
* https://www.suse.com/security/cve/CVE-2024-56531.html
* https://www.suse.com/security/cve/CVE-2024-56532.html
* https://www.suse.com/security/cve/CVE-2024-56533.html
* https://www.suse.com/security/cve/CVE-2024-56538.html
* https://www.suse.com/security/cve/CVE-2024-56543.html
* https://www.suse.com/security/cve/CVE-2024-56546.html
* https://www.suse.com/security/cve/CVE-2024-56548.html
* https://www.suse.com/security/cve/CVE-2024-56557.html
* https://www.suse.com/security/cve/CVE-2024-56558.html
* https://www.suse.com/security/cve/CVE-2024-56568.html
* https://www.suse.com/security/cve/CVE-2024-56569.html
* https://www.suse.com/security/cve/CVE-2024-56570.html
* https://www.suse.com/security/cve/CVE-2024-56571.html
* https://www.suse.com/security/cve/CVE-2024-56572.html
* https://www.suse.com/security/cve/CVE-2024-56573.html
* https://www.suse.com/security/cve/CVE-2024-56574.html
* https://www.suse.com/security/cve/CVE-2024-56575.html
* https://www.suse.com/security/cve/CVE-2024-56577.html
* https://www.suse.com/security/cve/CVE-2024-56578.html
* https://www.suse.com/security/cve/CVE-2024-56584.html
* https://www.suse.com/security/cve/CVE-2024-56587.html
* https://www.suse.com/security/cve/CVE-2024-56588.html
* https://www.suse.com/security/cve/CVE-2024-56589.html
* https://www.suse.com/security/cve/CVE-2024-56590.html
* https://www.suse.com/security/cve/CVE-2024-56592.html
* https://www.suse.com/security/cve/CVE-2024-56593.html
* https://www.suse.com/security/cve/CVE-2024-56594.html
* https://www.suse.com/security/cve/CVE-2024-56595.html
* https://www.suse.com/security/cve/CVE-2024-56596.html
* https://www.suse.com/security/cve/CVE-2024-56597.html
* https://www.suse.com/security/cve/CVE-2024-56598.html
* https://www.suse.com/security/cve/CVE-2024-5660.html
* https://www.suse.com/security/cve/CVE-2024-56600.html
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://www.suse.com/security/cve/CVE-2024-56602.html
* https://www.suse.com/security/cve/CVE-2024-56603.html
* https://www.suse.com/security/cve/CVE-2024-56606.html
* https://www.suse.com/security/cve/CVE-2024-56607.html
* https://www.suse.com/security/cve/CVE-2024-56608.html
* https://www.suse.com/security/cve/CVE-2024-56609.html
* https://www.suse.com/security/cve/CVE-2024-56610.html
* https://www.suse.com/security/cve/CVE-2024-56611.html
* https://www.suse.com/security/cve/CVE-2024-56614.html
* https://www.suse.com/security/cve/CVE-2024-56615.html
* https://www.suse.com/security/cve/CVE-2024-56616.html
* https://www.suse.com/security/cve/CVE-2024-56617.html
* https://www.suse.com/security/cve/CVE-2024-56619.html
* https://www.suse.com/security/cve/CVE-2024-56620.html
* https://www.suse.com/security/cve/CVE-2024-56622.html
* https://www.suse.com/security/cve/CVE-2024-56623.html
* https://www.suse.com/security/cve/CVE-2024-56625.html
* https://www.suse.com/security/cve/CVE-2024-56629.html
* https://www.suse.com/security/cve/CVE-2024-56630.html
* https://www.suse.com/security/cve/CVE-2024-56631.html
* https://www.suse.com/security/cve/CVE-2024-56632.html
* https://www.suse.com/security/cve/CVE-2024-56634.html
* https://www.suse.com/security/cve/CVE-2024-56635.html
* https://www.suse.com/security/cve/CVE-2024-56636.html
* https://www.suse.com/security/cve/CVE-2024-56637.html
* https://www.suse.com/security/cve/CVE-2024-56641.html
* https://www.suse.com/security/cve/CVE-2024-56642.html
* https://www.suse.com/security/cve/CVE-2024-56643.html
* https://www.suse.com/security/cve/CVE-2024-56644.html
* https://www.suse.com/security/cve/CVE-2024-56648.html
* https://www.suse.com/security/cve/CVE-2024-56649.html
* https://www.suse.com/security/cve/CVE-2024-56650.html
* https://www.suse.com/security/cve/CVE-2024-56651.html
* https://www.suse.com/security/cve/CVE-2024-56654.html
* https://www.suse.com/security/cve/CVE-2024-56656.html
* https://www.suse.com/security/cve/CVE-2024-56658.html
* https://www.suse.com/security/cve/CVE-2024-56659.html
* https://www.suse.com/security/cve/CVE-2024-56660.html
* https://www.suse.com/security/cve/CVE-2024-56661.html
* https://www.suse.com/security/cve/CVE-2024-56662.html
* https://www.suse.com/security/cve/CVE-2024-56663.html
* https://www.suse.com/security/cve/CVE-2024-56664.html
* https://www.suse.com/security/cve/CVE-2024-56665.html
* https://www.suse.com/security/cve/CVE-2024-56670.html
* https://www.suse.com/security/cve/CVE-2024-56672.html
* https://www.suse.com/security/cve/CVE-2024-56675.html
* https://www.suse.com/security/cve/CVE-2024-56677.html
* https://www.suse.com/security/cve/CVE-2024-56678.html
* https://www.suse.com/security/cve/CVE-2024-56679.html
* https://www.suse.com/security/cve/CVE-2024-56681.html
* https://www.suse.com/security/cve/CVE-2024-56683.html
* https://www.suse.com/security/cve/CVE-2024-56687.html
* https://www.suse.com/security/cve/CVE-2024-56688.html
* https://www.suse.com/security/cve/CVE-2024-56690.html
* https://www.suse.com/security/cve/CVE-2024-56691.html
* https://www.suse.com/security/cve/CVE-2024-56693.html
* https://www.suse.com/security/cve/CVE-2024-56694.html
* https://www.suse.com/security/cve/CVE-2024-56698.html
* https://www.suse.com/security/cve/CVE-2024-56700.html
* https://www.suse.com/security/cve/CVE-2024-56701.html
* https://www.suse.com/security/cve/CVE-2024-56704.html
* https://www.suse.com/security/cve/CVE-2024-56705.html
* https://www.suse.com/security/cve/CVE-2024-56707.html
* https://www.suse.com/security/cve/CVE-2024-56708.html
* https://www.suse.com/security/cve/CVE-2024-56709.html
* https://www.suse.com/security/cve/CVE-2024-56712.html
* https://www.suse.com/security/cve/CVE-2024-56715.html
* https://www.suse.com/security/cve/CVE-2024-56716.html
* https://www.suse.com/security/cve/CVE-2024-56722.html
* https://www.suse.com/security/cve/CVE-2024-56723.html
* https://www.suse.com/security/cve/CVE-2024-56724.html
* https://www.suse.com/security/cve/CVE-2024-56725.html
* https://www.suse.com/security/cve/CVE-2024-56726.html
* https://www.suse.com/security/cve/CVE-2024-56727.html
* https://www.suse.com/security/cve/CVE-2024-56728.html
* https://www.suse.com/security/cve/CVE-2024-56729.html
* https://www.suse.com/security/cve/CVE-2024-56739.html
* https://www.suse.com/security/cve/CVE-2024-56741.html
* https://www.suse.com/security/cve/CVE-2024-56745.html
* https://www.suse.com/security/cve/CVE-2024-56746.html
* https://www.suse.com/security/cve/CVE-2024-56747.html
* https://www.suse.com/security/cve/CVE-2024-56748.html
* https://www.suse.com/security/cve/CVE-2024-56759.html
* https://www.suse.com/security/cve/CVE-2024-56760.html
* https://www.suse.com/security/cve/CVE-2024-56763.html
* https://www.suse.com/security/cve/CVE-2024-56765.html
* https://www.suse.com/security/cve/CVE-2024-56766.html
* https://www.suse.com/security/cve/CVE-2024-56767.html
* https://www.suse.com/security/cve/CVE-2024-56769.html
* https://www.suse.com/security/cve/CVE-2024-56774.html
* https://www.suse.com/security/cve/CVE-2024-56775.html
* https://www.suse.com/security/cve/CVE-2024-56776.html
* https://www.suse.com/security/cve/CVE-2024-56777.html
* https://www.suse.com/security/cve/CVE-2024-56778.html
* https://www.suse.com/security/cve/CVE-2024-56779.html
* https://www.suse.com/security/cve/CVE-2024-56780.html
* https://www.suse.com/security/cve/CVE-2024-56787.html
* https://www.suse.com/security/cve/CVE-2024-57791.html
* https://www.suse.com/security/cve/CVE-2024-57792.html
* https://www.suse.com/security/cve/CVE-2024-57793.html
* https://www.suse.com/security/cve/CVE-2024-57795.html
* https://www.suse.com/security/cve/CVE-2024-57798.html
* https://www.suse.com/security/cve/CVE-2024-57801.html
* https://www.suse.com/security/cve/CVE-2024-57802.html
* https://www.suse.com/security/cve/CVE-2024-57804.html
* https://www.suse.com/security/cve/CVE-2024-57809.html
* https://www.suse.com/security/cve/CVE-2024-57838.html
* https://www.suse.com/security/cve/CVE-2024-57849.html
* https://www.suse.com/security/cve/CVE-2024-57850.html
* https://www.suse.com/security/cve/CVE-2024-57857.html
* https://www.suse.com/security/cve/CVE-2024-57874.html
* https://www.suse.com/security/cve/CVE-2024-57876.html
* https://www.suse.com/security/cve/CVE-2024-57882.html
* https://www.suse.com/security/cve/CVE-2024-57884.html
* https://www.suse.com/security/cve/CVE-2024-57887.html
* https://www.suse.com/security/cve/CVE-2024-57888.html
* https://www.suse.com/security/cve/CVE-2024-57890.html
* https://www.suse.com/security/cve/CVE-2024-57892.html
* https://www.suse.com/security/cve/CVE-2024-57893.html
* https://www.suse.com/security/cve/CVE-2024-57896.html
* https://www.suse.com/security/cve/CVE-2024-57897.html
* https://www.suse.com/security/cve/CVE-2024-57899.html
* https://www.suse.com/security/cve/CVE-2024-57903.html
* https://www.suse.com/security/cve/CVE-2024-57904.html
* https://www.suse.com/security/cve/CVE-2024-57906.html
* https://www.suse.com/security/cve/CVE-2024-57907.html
* https://www.suse.com/security/cve/CVE-2024-57908.html
* https://www.suse.com/security/cve/CVE-2024-57910.html
* https://www.suse.com/security/cve/CVE-2024-57911.html
* https://www.suse.com/security/cve/CVE-2024-57912.html
* https://www.suse.com/security/cve/CVE-2024-57913.html
* https://www.suse.com/security/cve/CVE-2024-57915.html
* https://www.suse.com/security/cve/CVE-2024-57916.html
* https://www.suse.com/security/cve/CVE-2024-57917.html
* https://www.suse.com/security/cve/CVE-2024-57922.html
* https://www.suse.com/security/cve/CVE-2024-57926.html
* https://www.suse.com/security/cve/CVE-2024-57929.html
* https://www.suse.com/security/cve/CVE-2024-57931.html
* https://www.suse.com/security/cve/CVE-2024-57932.html
* https://www.suse.com/security/cve/CVE-2024-57933.html
* https://www.suse.com/security/cve/CVE-2024-57935.html
* https://www.suse.com/security/cve/CVE-2024-57936.html
* https://www.suse.com/security/cve/CVE-2024-57938.html
* https://www.suse.com/security/cve/CVE-2024-57940.html
* https://www.suse.com/security/cve/CVE-2024-57946.html
* https://www.suse.com/security/cve/CVE-2025-21632.html
* https://www.suse.com/security/cve/CVE-2025-21645.html
* https://www.suse.com/security/cve/CVE-2025-21646.html
* https://www.suse.com/security/cve/CVE-2025-21649.html
* https://www.suse.com/security/cve/CVE-2025-21650.html
* https://www.suse.com/security/cve/CVE-2025-21651.html
* https://www.suse.com/security/cve/CVE-2025-21652.html
* https://www.suse.com/security/cve/CVE-2025-21653.html
* https://www.suse.com/security/cve/CVE-2025-21655.html
* https://www.suse.com/security/cve/CVE-2025-21656.html
* https://www.suse.com/security/cve/CVE-2025-21662.html
* https://www.suse.com/security/cve/CVE-2025-21663.html
* https://www.suse.com/security/cve/CVE-2025-21664.html
* https://www.suse.com/security/cve/CVE-2025-21666.html
* https://www.suse.com/security/cve/CVE-2025-21669.html
* https://www.suse.com/security/cve/CVE-2025-21670.html
* https://www.suse.com/security/cve/CVE-2025-21674.html
* https://www.suse.com/security/cve/CVE-2025-21675.html
* https://www.suse.com/security/cve/CVE-2025-21676.html
* https://www.suse.com/security/cve/CVE-2025-21678.html
* https://www.suse.com/security/cve/CVE-2025-21682.html
* https://bugzilla.suse.com/show_bug.cgi?id=1012628
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1216813
* https://bugzilla.suse.com/show_bug.cgi?id=1218470
* https://bugzilla.suse.com/show_bug.cgi?id=1220711
* https://bugzilla.suse.com/show_bug.cgi?id=1222803
* https://bugzilla.suse.com/show_bug.cgi?id=1224049
* https://bugzilla.suse.com/show_bug.cgi?id=1225897
* https://bugzilla.suse.com/show_bug.cgi?id=1226980
* https://bugzilla.suse.com/show_bug.cgi?id=1228592
* https://bugzilla.suse.com/show_bug.cgi?id=1229833
* https://bugzilla.suse.com/show_bug.cgi?id=1231016
* https://bugzilla.suse.com/show_bug.cgi?id=1231088
* https://bugzilla.suse.com/show_bug.cgi?id=1232087
* https://bugzilla.suse.com/show_bug.cgi?id=1232101
* https://bugzilla.suse.com/show_bug.cgi?id=1232158
* https://bugzilla.suse.com/show_bug.cgi?id=1232161
* https://bugzilla.suse.com/show_bug.cgi?id=1232421
* https://bugzilla.suse.com/show_bug.cgi?id=1232882
* https://bugzilla.suse.com/show_bug.cgi?id=1233055
* https://bugzilla.suse.com/show_bug.cgi?id=1233112
* https://bugzilla.suse.com/show_bug.cgi?id=1233221
* https://bugzilla.suse.com/show_bug.cgi?id=1233248
* https://bugzilla.suse.com/show_bug.cgi?id=1233259
* https://bugzilla.suse.com/show_bug.cgi?id=1233260
* https://bugzilla.suse.com/show_bug.cgi?id=1233488
* https://bugzilla.suse.com/show_bug.cgi?id=1233522
* https://bugzilla.suse.com/show_bug.cgi?id=1233638
* https://bugzilla.suse.com/show_bug.cgi?id=1233642
* https://bugzilla.suse.com/show_bug.cgi?id=1233778
* https://bugzilla.suse.com/show_bug.cgi?id=1234195
* https://bugzilla.suse.com/show_bug.cgi?id=1234619
* https://bugzilla.suse.com/show_bug.cgi?id=1234635
* https://bugzilla.suse.com/show_bug.cgi?id=1234683
* https://bugzilla.suse.com/show_bug.cgi?id=1234693
* https://bugzilla.suse.com/show_bug.cgi?id=1234726
* https://bugzilla.suse.com/show_bug.cgi?id=1234825
* https://bugzilla.suse.com/show_bug.cgi?id=1234863
* https://bugzilla.suse.com/show_bug.cgi?id=1234887
* https://bugzilla.suse.com/show_bug.cgi?id=1234888
* https://bugzilla.suse.com/show_bug.cgi?id=1234893
* https://bugzilla.suse.com/show_bug.cgi?id=1234898
* https://bugzilla.suse.com/show_bug.cgi?id=1234901
* https://bugzilla.suse.com/show_bug.cgi?id=1234906
* https://bugzilla.suse.com/show_bug.cgi?id=1234923
* https://bugzilla.suse.com/show_bug.cgi?id=1234931
* https://bugzilla.suse.com/show_bug.cgi?id=1234934
* https://bugzilla.suse.com/show_bug.cgi?id=1234947
* https://bugzilla.suse.com/show_bug.cgi?id=1234957
* https://bugzilla.suse.com/show_bug.cgi?id=1235000
* https://bugzilla.suse.com/show_bug.cgi?id=1235001
* https://bugzilla.suse.com/show_bug.cgi?id=1235011
* https://bugzilla.suse.com/show_bug.cgi?id=1235031
* https://bugzilla.suse.com/show_bug.cgi?id=1235032
* https://bugzilla.suse.com/show_bug.cgi?id=1235035
* https://bugzilla.suse.com/show_bug.cgi?id=1235037
* https://bugzilla.suse.com/show_bug.cgi?id=1235038
* https://bugzilla.suse.com/show_bug.cgi?id=1235039
* https://bugzilla.suse.com/show_bug.cgi?id=1235040
* https://bugzilla.suse.com/show_bug.cgi?id=1235042
* https://bugzilla.suse.com/show_bug.cgi?id=1235043
* https://bugzilla.suse.com/show_bug.cgi?id=1235046
* https://bugzilla.suse.com/show_bug.cgi?id=1235050
* https://bugzilla.suse.com/show_bug.cgi?id=1235051
* https://bugzilla.suse.com/show_bug.cgi?id=1235053
* https://bugzilla.suse.com/show_bug.cgi?id=1235054
* https://bugzilla.suse.com/show_bug.cgi?id=1235057
* https://bugzilla.suse.com/show_bug.cgi?id=1235059
* https://bugzilla.suse.com/show_bug.cgi?id=1235065
* https://bugzilla.suse.com/show_bug.cgi?id=1235070
* https://bugzilla.suse.com/show_bug.cgi?id=1235073
* https://bugzilla.suse.com/show_bug.cgi?id=1235100
* https://bugzilla.suse.com/show_bug.cgi?id=1235112
* https://bugzilla.suse.com/show_bug.cgi?id=1235115
* https://bugzilla.suse.com/show_bug.cgi?id=1235117
* https://bugzilla.suse.com/show_bug.cgi?id=1235122
* https://bugzilla.suse.com/show_bug.cgi?id=1235123
* https://bugzilla.suse.com/show_bug.cgi?id=1235125
* https://bugzilla.suse.com/show_bug.cgi?id=1235132
* https://bugzilla.suse.com/show_bug.cgi?id=1235133
* https://bugzilla.suse.com/show_bug.cgi?id=1235155
* https://bugzilla.suse.com/show_bug.cgi?id=1235160
* https://bugzilla.suse.com/show_bug.cgi?id=1235217
* https://bugzilla.suse.com/show_bug.cgi?id=1235219
* https://bugzilla.suse.com/show_bug.cgi?id=1235220
* https://bugzilla.suse.com/show_bug.cgi?id=1235222
* https://bugzilla.suse.com/show_bug.cgi?id=1235223
* https://bugzilla.suse.com/show_bug.cgi?id=1235224
* https://bugzilla.suse.com/show_bug.cgi?id=1235227
* https://bugzilla.suse.com/show_bug.cgi?id=1235230
* https://bugzilla.suse.com/show_bug.cgi?id=1235241
* https://bugzilla.suse.com/show_bug.cgi?id=1235244
* https://bugzilla.suse.com/show_bug.cgi?id=1235249
* https://bugzilla.suse.com/show_bug.cgi?id=1235251
* https://bugzilla.suse.com/show_bug.cgi?id=1235252
* https://bugzilla.suse.com/show_bug.cgi?id=1235389
* https://bugzilla.suse.com/show_bug.cgi?id=1235390
* https://bugzilla.suse.com/show_bug.cgi?id=1235391
* https://bugzilla.suse.com/show_bug.cgi?id=1235406
* https://bugzilla.suse.com/show_bug.cgi?id=1235410
* https://bugzilla.suse.com/show_bug.cgi?id=1235412
* https://bugzilla.suse.com/show_bug.cgi?id=1235413
* https://bugzilla.suse.com/show_bug.cgi?id=1235415
* https://bugzilla.suse.com/show_bug.cgi?id=1235416
* https://bugzilla.suse.com/show_bug.cgi?id=1235417
* https://bugzilla.suse.com/show_bug.cgi?id=1235418
* https://bugzilla.suse.com/show_bug.cgi?id=1235423
* https://bugzilla.suse.com/show_bug.cgi?id=1235424
* https://bugzilla.suse.com/show_bug.cgi?id=1235425
* https://bugzilla.suse.com/show_bug.cgi?id=1235426
* https://bugzilla.suse.com/show_bug.cgi?id=1235427
* https://bugzilla.suse.com/show_bug.cgi?id=1235428
* https://bugzilla.suse.com/show_bug.cgi?id=1235429
* https://bugzilla.suse.com/show_bug.cgi?id=1235430
* https://bugzilla.suse.com/show_bug.cgi?id=1235433
* https://bugzilla.suse.com/show_bug.cgi?id=1235437
* https://bugzilla.suse.com/show_bug.cgi?id=1235439
* https://bugzilla.suse.com/show_bug.cgi?id=1235441
* https://bugzilla.suse.com/show_bug.cgi?id=1235444
* https://bugzilla.suse.com/show_bug.cgi?id=1235445
* https://bugzilla.suse.com/show_bug.cgi?id=1235449
* https://bugzilla.suse.com/show_bug.cgi?id=1235451
* https://bugzilla.suse.com/show_bug.cgi?id=1235454
* https://bugzilla.suse.com/show_bug.cgi?id=1235458
* https://bugzilla.suse.com/show_bug.cgi?id=1235459
* https://bugzilla.suse.com/show_bug.cgi?id=1235464
* https://bugzilla.suse.com/show_bug.cgi?id=1235466
* https://bugzilla.suse.com/show_bug.cgi?id=1235473
* https://bugzilla.suse.com/show_bug.cgi?id=1235479
* https://bugzilla.suse.com/show_bug.cgi?id=1235480
* https://bugzilla.suse.com/show_bug.cgi?id=1235483
* https://bugzilla.suse.com/show_bug.cgi?id=1235486
* https://bugzilla.suse.com/show_bug.cgi?id=1235487
* https://bugzilla.suse.com/show_bug.cgi?id=1235488
* https://bugzilla.suse.com/show_bug.cgi?id=1235489
* https://bugzilla.suse.com/show_bug.cgi?id=1235491
* https://bugzilla.suse.com/show_bug.cgi?id=1235494
* https://bugzilla.suse.com/show_bug.cgi?id=1235495
* https://bugzilla.suse.com/show_bug.cgi?id=1235496
* https://bugzilla.suse.com/show_bug.cgi?id=1235497
* https://bugzilla.suse.com/show_bug.cgi?id=1235498
* https://bugzilla.suse.com/show_bug.cgi?id=1235500
* https://bugzilla.suse.com/show_bug.cgi?id=1235502
* https://bugzilla.suse.com/show_bug.cgi?id=1235503
* https://bugzilla.suse.com/show_bug.cgi?id=1235519
* https://bugzilla.suse.com/show_bug.cgi?id=1235520
* https://bugzilla.suse.com/show_bug.cgi?id=1235521
* https://bugzilla.suse.com/show_bug.cgi?id=1235523
* https://bugzilla.suse.com/show_bug.cgi?id=1235526
* https://bugzilla.suse.com/show_bug.cgi?id=1235528
* https://bugzilla.suse.com/show_bug.cgi?id=1235532
* https://bugzilla.suse.com/show_bug.cgi?id=1235533
* https://bugzilla.suse.com/show_bug.cgi?id=1235534
* https://bugzilla.suse.com/show_bug.cgi?id=1235537
* https://bugzilla.suse.com/show_bug.cgi?id=1235538
* https://bugzilla.suse.com/show_bug.cgi?id=1235545
* https://bugzilla.suse.com/show_bug.cgi?id=1235552
* https://bugzilla.suse.com/show_bug.cgi?id=1235555
* https://bugzilla.suse.com/show_bug.cgi?id=1235557
* https://bugzilla.suse.com/show_bug.cgi?id=1235563
* https://bugzilla.suse.com/show_bug.cgi?id=1235564
* https://bugzilla.suse.com/show_bug.cgi?id=1235565
* https://bugzilla.suse.com/show_bug.cgi?id=1235568
* https://bugzilla.suse.com/show_bug.cgi?id=1235570
* https://bugzilla.suse.com/show_bug.cgi?id=1235571
* https://bugzilla.suse.com/show_bug.cgi?id=1235577
* https://bugzilla.suse.com/show_bug.cgi?id=1235578
* https://bugzilla.suse.com/show_bug.cgi?id=1235582
* https://bugzilla.suse.com/show_bug.cgi?id=1235583
* https://bugzilla.suse.com/show_bug.cgi?id=1235584
* https://bugzilla.suse.com/show_bug.cgi?id=1235587
* https://bugzilla.suse.com/show_bug.cgi?id=1235611
* https://bugzilla.suse.com/show_bug.cgi?id=1235612
* https://bugzilla.suse.com/show_bug.cgi?id=1235616
* https://bugzilla.suse.com/show_bug.cgi?id=1235622
* https://bugzilla.suse.com/show_bug.cgi?id=1235627
* https://bugzilla.suse.com/show_bug.cgi?id=1235632
* https://bugzilla.suse.com/show_bug.cgi?id=1235635
* https://bugzilla.suse.com/show_bug.cgi?id=1235638
* https://bugzilla.suse.com/show_bug.cgi?id=1235641
* https://bugzilla.suse.com/show_bug.cgi?id=1235643
* https://bugzilla.suse.com/show_bug.cgi?id=1235645
* https://bugzilla.suse.com/show_bug.cgi?id=1235646
* https://bugzilla.suse.com/show_bug.cgi?id=1235647
* https://bugzilla.suse.com/show_bug.cgi?id=1235650
* https://bugzilla.suse.com/show_bug.cgi?id=1235653
* https://bugzilla.suse.com/show_bug.cgi?id=1235656
* https://bugzilla.suse.com/show_bug.cgi?id=1235657
* https://bugzilla.suse.com/show_bug.cgi?id=1235663
* https://bugzilla.suse.com/show_bug.cgi?id=1235686
* https://bugzilla.suse.com/show_bug.cgi?id=1235700
* https://bugzilla.suse.com/show_bug.cgi?id=1235705
* https://bugzilla.suse.com/show_bug.cgi?id=1235707
* https://bugzilla.suse.com/show_bug.cgi?id=1235708
* https://bugzilla.suse.com/show_bug.cgi?id=1235710
* https://bugzilla.suse.com/show_bug.cgi?id=1235714
* https://bugzilla.suse.com/show_bug.cgi?id=1235716
* https://bugzilla.suse.com/show_bug.cgi?id=1235720
* https://bugzilla.suse.com/show_bug.cgi?id=1235723
* https://bugzilla.suse.com/show_bug.cgi?id=1235727
* https://bugzilla.suse.com/show_bug.cgi?id=1235730
* https://bugzilla.suse.com/show_bug.cgi?id=1235737
* https://bugzilla.suse.com/show_bug.cgi?id=1235739
* https://bugzilla.suse.com/show_bug.cgi?id=1235745
* https://bugzilla.suse.com/show_bug.cgi?id=1235747
* https://bugzilla.suse.com/show_bug.cgi?id=1235750
* https://bugzilla.suse.com/show_bug.cgi?id=1235753
* https://bugzilla.suse.com/show_bug.cgi?id=1235759
* https://bugzilla.suse.com/show_bug.cgi?id=1235764
* https://bugzilla.suse.com/show_bug.cgi?id=1235768
* https://bugzilla.suse.com/show_bug.cgi?id=1235776
* https://bugzilla.suse.com/show_bug.cgi?id=1235777
* https://bugzilla.suse.com/show_bug.cgi?id=1235778
* https://bugzilla.suse.com/show_bug.cgi?id=1235779
* https://bugzilla.suse.com/show_bug.cgi?id=1235793
* https://bugzilla.suse.com/show_bug.cgi?id=1235798
* https://bugzilla.suse.com/show_bug.cgi?id=1235806
* https://bugzilla.suse.com/show_bug.cgi?id=1235808
* https://bugzilla.suse.com/show_bug.cgi?id=1235812
* https://bugzilla.suse.com/show_bug.cgi?id=1235814
* https://bugzilla.suse.com/show_bug.cgi?id=1235818
* https://bugzilla.suse.com/show_bug.cgi?id=1235842
* https://bugzilla.suse.com/show_bug.cgi?id=1235865
* https://bugzilla.suse.com/show_bug.cgi?id=1235874
* https://bugzilla.suse.com/show_bug.cgi?id=1235894
* https://bugzilla.suse.com/show_bug.cgi?id=1235902
* https://bugzilla.suse.com/show_bug.cgi?id=1235903
* https://bugzilla.suse.com/show_bug.cgi?id=1235906
* https://bugzilla.suse.com/show_bug.cgi?id=1235914
* https://bugzilla.suse.com/show_bug.cgi?id=1235918
* https://bugzilla.suse.com/show_bug.cgi?id=1235919
* https://bugzilla.suse.com/show_bug.cgi?id=1235920
* https://bugzilla.suse.com/show_bug.cgi?id=1235924
* https://bugzilla.suse.com/show_bug.cgi?id=1235940
* https://bugzilla.suse.com/show_bug.cgi?id=1235941
* https://bugzilla.suse.com/show_bug.cgi?id=1235946
* https://bugzilla.suse.com/show_bug.cgi?id=1235948
* https://bugzilla.suse.com/show_bug.cgi?id=1235952
* https://bugzilla.suse.com/show_bug.cgi?id=1235964
* https://bugzilla.suse.com/show_bug.cgi?id=1235965
* https://bugzilla.suse.com/show_bug.cgi?id=1235967
* https://bugzilla.suse.com/show_bug.cgi?id=1235969
* https://bugzilla.suse.com/show_bug.cgi?id=1235976
* https://bugzilla.suse.com/show_bug.cgi?id=1235977
* https://bugzilla.suse.com/show_bug.cgi?id=1236078
* https://bugzilla.suse.com/show_bug.cgi?id=1236080
* https://bugzilla.suse.com/show_bug.cgi?id=1236082
* https://bugzilla.suse.com/show_bug.cgi?id=1236088
* https://bugzilla.suse.com/show_bug.cgi?id=1236090
* https://bugzilla.suse.com/show_bug.cgi?id=1236091
* https://bugzilla.suse.com/show_bug.cgi?id=1236096
* https://bugzilla.suse.com/show_bug.cgi?id=1236097
* https://bugzilla.suse.com/show_bug.cgi?id=1236098
* https://bugzilla.suse.com/show_bug.cgi?id=1236101
* https://bugzilla.suse.com/show_bug.cgi?id=1236102
* https://bugzilla.suse.com/show_bug.cgi?id=1236104
* https://bugzilla.suse.com/show_bug.cgi?id=1236106
* https://bugzilla.suse.com/show_bug.cgi?id=1236120
* https://bugzilla.suse.com/show_bug.cgi?id=1236125
* https://bugzilla.suse.com/show_bug.cgi?id=1236127
* https://bugzilla.suse.com/show_bug.cgi?id=1236131
* https://bugzilla.suse.com/show_bug.cgi?id=1236138
* https://bugzilla.suse.com/show_bug.cgi?id=1236143
* https://bugzilla.suse.com/show_bug.cgi?id=1236144
* https://bugzilla.suse.com/show_bug.cgi?id=1236145
* https://bugzilla.suse.com/show_bug.cgi?id=1236160
* https://bugzilla.suse.com/show_bug.cgi?id=1236161
* https://bugzilla.suse.com/show_bug.cgi?id=1236163
* https://bugzilla.suse.com/show_bug.cgi?id=1236168
* https://bugzilla.suse.com/show_bug.cgi?id=1236178
* https://bugzilla.suse.com/show_bug.cgi?id=1236180
* https://bugzilla.suse.com/show_bug.cgi?id=1236181
* https://bugzilla.suse.com/show_bug.cgi?id=1236182
* https://bugzilla.suse.com/show_bug.cgi?id=1236190
* https://bugzilla.suse.com/show_bug.cgi?id=1236192
* https://bugzilla.suse.com/show_bug.cgi?id=1236198
* https://bugzilla.suse.com/show_bug.cgi?id=1236227
* https://bugzilla.suse.com/show_bug.cgi?id=1236245
* https://bugzilla.suse.com/show_bug.cgi?id=1236247
* https://bugzilla.suse.com/show_bug.cgi?id=1236248
* https://bugzilla.suse.com/show_bug.cgi?id=1236260
* https://bugzilla.suse.com/show_bug.cgi?id=1236262
* https://bugzilla.suse.com/show_bug.cgi?id=1236628
* https://bugzilla.suse.com/show_bug.cgi?id=1236680
* https://bugzilla.suse.com/show_bug.cgi?id=1236683
* https://bugzilla.suse.com/show_bug.cgi?id=1236685
* https://bugzilla.suse.com/show_bug.cgi?id=1236688
* https://bugzilla.suse.com/show_bug.cgi?id=1236694
* https://bugzilla.suse.com/show_bug.cgi?id=1236696
* https://bugzilla.suse.com/show_bug.cgi?id=1236698
* https://bugzilla.suse.com/show_bug.cgi?id=1236703
* https://bugzilla.suse.com/show_bug.cgi?id=1236732
* https://bugzilla.suse.com/show_bug.cgi?id=1236733
* https://bugzilla.suse.com/show_bug.cgi?id=1236757
* https://bugzilla.suse.com/show_bug.cgi?id=1236758
* https://bugzilla.suse.com/show_bug.cgi?id=1236760
* https://bugzilla.suse.com/show_bug.cgi?id=1236761
* https://jira.suse.com/browse/PED-7242