SUSE 5157 Published by

SUSE Linux has received a number of security updates, including crucial updates to the Linux Kernel, and switchboard-plug-bluetooth:

SUSE-SU-2024:3983-1: important: Security update for the Linux Kernel
SUSE-SU-2024:3984-1: important: Security update for the Linux Kernel
SUSE-SU-2024:3985-1: important: Security update for the Linux Kernel
SUSE-SU-2024:3986-1: important: Security update for the Linux Kernel
openSUSE-SU-2024:14486-1: moderate: switchboard-plug-bluetooth-8.0.1-1.1 on GA media




SUSE-SU-2024:3983-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:3983-1
Release Date: 2024-11-13T10:12:32Z
Rating: important
References:

* bsc#1204171
* bsc#1205796
* bsc#1206188
* bsc#1206344
* bsc#1209290
* bsc#1210449
* bsc#1210627
* bsc#1213034
* bsc#1216813
* bsc#1218562
* bsc#1223384
* bsc#1223524
* bsc#1223824
* bsc#1225189
* bsc#1225336
* bsc#1225611
* bsc#1225762
* bsc#1226498
* bsc#1226797
* bsc#1227437
* bsc#1227885
* bsc#1228119
* bsc#1228269
* bsc#1228709
* bsc#1228743
* bsc#1229005
* bsc#1229019
* bsc#1229450
* bsc#1229454
* bsc#1229456
* bsc#1229556
* bsc#1229769
* bsc#1229837
* bsc#1230179
* bsc#1230405
* bsc#1230414
* bsc#1230429
* bsc#1230456
* bsc#1230600
* bsc#1230620
* bsc#1230715
* bsc#1230722
* bsc#1230773
* bsc#1230801
* bsc#1230903
* bsc#1230918
* bsc#1231016
* bsc#1231072
* bsc#1231073
* bsc#1231094
* bsc#1231096
* bsc#1231105
* bsc#1231114
* bsc#1231148
* bsc#1231179
* bsc#1231191
* bsc#1231193
* bsc#1231195
* bsc#1231197
* bsc#1231200
* bsc#1231203
* bsc#1231293
* bsc#1231344
* bsc#1231375
* bsc#1231383
* bsc#1231439
* bsc#1231442
* bsc#1231496
* bsc#1231502
* bsc#1231539
* bsc#1231540
* bsc#1231578
* bsc#1231673
* bsc#1231857
* bsc#1231861
* bsc#1231872
* bsc#1231883
* bsc#1231885
* bsc#1231887
* bsc#1231888
* bsc#1231889
* bsc#1231890
* bsc#1231892
* bsc#1231893
* bsc#1231895
* bsc#1231896
* bsc#1231897
* bsc#1231902
* bsc#1231903
* bsc#1231907
* bsc#1231914
* bsc#1231929
* bsc#1231935
* bsc#1231936
* bsc#1231937
* bsc#1231938
* bsc#1231939
* bsc#1231940
* bsc#1231941
* bsc#1231942
* bsc#1231944
* bsc#1231950
* bsc#1231954
* bsc#1231958
* bsc#1231960
* bsc#1231961
* bsc#1231962
* bsc#1231965
* bsc#1231967
* bsc#1231968
* bsc#1231972
* bsc#1231973
* bsc#1231976
* bsc#1231979
* bsc#1231987
* bsc#1231988
* bsc#1231990
* bsc#1231992
* bsc#1231995
* bsc#1231996
* bsc#1231997
* bsc#1231998
* bsc#1232001
* bsc#1232004
* bsc#1232005
* bsc#1232006
* bsc#1232007
* bsc#1232025
* bsc#1232026
* bsc#1232033
* bsc#1232034
* bsc#1232035
* bsc#1232036
* bsc#1232037
* bsc#1232038
* bsc#1232039
* bsc#1232043
* bsc#1232049
* bsc#1232067
* bsc#1232069
* bsc#1232070
* bsc#1232071
* bsc#1232075
* bsc#1232083
* bsc#1232084
* bsc#1232085
* bsc#1232089
* bsc#1232097
* bsc#1232104
* bsc#1232105
* bsc#1232108
* bsc#1232114
* bsc#1232116
* bsc#1232119
* bsc#1232120
* bsc#1232123
* bsc#1232124
* bsc#1232133
* bsc#1232135
* bsc#1232136
* bsc#1232140
* bsc#1232145
* bsc#1232149
* bsc#1232150
* bsc#1232151
* bsc#1232154
* bsc#1232155
* bsc#1232160
* bsc#1232163
* bsc#1232164
* bsc#1232170
* bsc#1232172
* bsc#1232174
* bsc#1232175
* bsc#1232191
* bsc#1232196
* bsc#1232199
* bsc#1232200
* bsc#1232201
* bsc#1232217
* bsc#1232220
* bsc#1232221
* bsc#1232229
* bsc#1232233
* bsc#1232237
* bsc#1232251
* bsc#1232253
* bsc#1232259
* bsc#1232260
* bsc#1232262
* bsc#1232263
* bsc#1232282
* bsc#1232285
* bsc#1232286
* bsc#1232304
* bsc#1232305
* bsc#1232307
* bsc#1232309
* bsc#1232310
* bsc#1232313
* bsc#1232314
* bsc#1232316
* bsc#1232329
* bsc#1232332
* bsc#1232335
* bsc#1232337
* bsc#1232342
* bsc#1232345
* bsc#1232352
* bsc#1232354
* bsc#1232355
* bsc#1232358
* bsc#1232361
* bsc#1232366
* bsc#1232367
* bsc#1232368
* bsc#1232369
* bsc#1232374
* bsc#1232381
* bsc#1232383
* bsc#1232392
* bsc#1232395
* bsc#1232418
* bsc#1232424
* bsc#1232432
* bsc#1232435
* bsc#1232442
* bsc#1232446
* bsc#1232501
* bsc#1232519
* bsc#1232630
* bsc#1232631
* bsc#1232632
* bsc#1232757

Cross-References:

* CVE-2021-47416
* CVE-2021-47534
* CVE-2022-3435
* CVE-2022-45934
* CVE-2022-48664
* CVE-2022-48879
* CVE-2022-48946
* CVE-2022-48947
* CVE-2022-48948
* CVE-2022-48949
* CVE-2022-48951
* CVE-2022-48953
* CVE-2022-48954
* CVE-2022-48955
* CVE-2022-48956
* CVE-2022-48957
* CVE-2022-48958
* CVE-2022-48959
* CVE-2022-48960
* CVE-2022-48961
* CVE-2022-48962
* CVE-2022-48966
* CVE-2022-48967
* CVE-2022-48968
* CVE-2022-48969
* CVE-2022-48970
* CVE-2022-48971
* CVE-2022-48972
* CVE-2022-48973
* CVE-2022-48975
* CVE-2022-48977
* CVE-2022-48978
* CVE-2022-48980
* CVE-2022-48981
* CVE-2022-48985
* CVE-2022-48987
* CVE-2022-48988
* CVE-2022-48991
* CVE-2022-48992
* CVE-2022-48994
* CVE-2022-48995
* CVE-2022-48997
* CVE-2022-48999
* CVE-2022-49000
* CVE-2022-49002
* CVE-2022-49003
* CVE-2022-49005
* CVE-2022-49006
* CVE-2022-49007
* CVE-2022-49010
* CVE-2022-49011
* CVE-2022-49012
* CVE-2022-49014
* CVE-2022-49015
* CVE-2022-49016
* CVE-2022-49017
* CVE-2022-49019
* CVE-2022-49020
* CVE-2022-49021
* CVE-2022-49022
* CVE-2022-49023
* CVE-2022-49024
* CVE-2022-49025
* CVE-2022-49026
* CVE-2022-49027
* CVE-2022-49028
* CVE-2022-49029
* CVE-2022-49031
* CVE-2022-49032
* CVE-2023-2166
* CVE-2023-28327
* CVE-2023-52766
* CVE-2023-52800
* CVE-2023-52881
* CVE-2023-52919
* CVE-2023-6270
* CVE-2024-27043
* CVE-2024-36244
* CVE-2024-36957
* CVE-2024-39476
* CVE-2024-40965
* CVE-2024-42145
* CVE-2024-42226
* CVE-2024-42253
* CVE-2024-44931
* CVE-2024-44947
* CVE-2024-44958
* CVE-2024-45016
* CVE-2024-45025
* CVE-2024-46716
* CVE-2024-46719
* CVE-2024-46754
* CVE-2024-46777
* CVE-2024-46809
* CVE-2024-46811
* CVE-2024-46813
* CVE-2024-46814
* CVE-2024-46815
* CVE-2024-46816
* CVE-2024-46817
* CVE-2024-46818
* CVE-2024-46828
* CVE-2024-46834
* CVE-2024-46840
* CVE-2024-46841
* CVE-2024-46848
* CVE-2024-46849
* CVE-2024-47660
* CVE-2024-47661
* CVE-2024-47664
* CVE-2024-47668
* CVE-2024-47672
* CVE-2024-47673
* CVE-2024-47674
* CVE-2024-47684
* CVE-2024-47685
* CVE-2024-47692
* CVE-2024-47704
* CVE-2024-47705
* CVE-2024-47706
* CVE-2024-47707
* CVE-2024-47710
* CVE-2024-47720
* CVE-2024-47727
* CVE-2024-47730
* CVE-2024-47738
* CVE-2024-47739
* CVE-2024-47745
* CVE-2024-47747
* CVE-2024-47748
* CVE-2024-49858
* CVE-2024-49860
* CVE-2024-49866
* CVE-2024-49867
* CVE-2024-49881
* CVE-2024-49882
* CVE-2024-49883
* CVE-2024-49886
* CVE-2024-49890
* CVE-2024-49892
* CVE-2024-49894
* CVE-2024-49895
* CVE-2024-49896
* CVE-2024-49897
* CVE-2024-49899
* CVE-2024-49901
* CVE-2024-49906
* CVE-2024-49908
* CVE-2024-49909
* CVE-2024-49911
* CVE-2024-49912
* CVE-2024-49913
* CVE-2024-49914
* CVE-2024-49917
* CVE-2024-49918
* CVE-2024-49919
* CVE-2024-49920
* CVE-2024-49922
* CVE-2024-49923
* CVE-2024-49929
* CVE-2024-49930
* CVE-2024-49933
* CVE-2024-49936
* CVE-2024-49939
* CVE-2024-49946
* CVE-2024-49949
* CVE-2024-49954
* CVE-2024-49955
* CVE-2024-49958
* CVE-2024-49959
* CVE-2024-49960
* CVE-2024-49962
* CVE-2024-49967
* CVE-2024-49969
* CVE-2024-49973
* CVE-2024-49974
* CVE-2024-49975
* CVE-2024-49982
* CVE-2024-49991
* CVE-2024-49993
* CVE-2024-49995
* CVE-2024-49996
* CVE-2024-50000
* CVE-2024-50001
* CVE-2024-50002
* CVE-2024-50006
* CVE-2024-50014
* CVE-2024-50019
* CVE-2024-50024
* CVE-2024-50028
* CVE-2024-50033
* CVE-2024-50035
* CVE-2024-50041
* CVE-2024-50045
* CVE-2024-50046
* CVE-2024-50047
* CVE-2024-50048
* CVE-2024-50049
* CVE-2024-50055
* CVE-2024-50058
* CVE-2024-50059
* CVE-2024-50061
* CVE-2024-50063
* CVE-2024-50081

CVSS scores:

* CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47534 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47534 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-3435 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-3435 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-45934 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-45934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48879 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48946 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48947 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48948 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48948 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48949 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48951 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48951 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48953 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48954 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48954 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-48954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48955 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48955 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48956 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48956 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48957 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48957 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48959 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48959 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48960 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48960 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48960 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48961 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48961 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48962 ( SUSE ): 7.2
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48962 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2022-48962 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48966 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48966 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-48966 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48967 ( SUSE ): 7.0
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48967 ( SUSE ): 7.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2022-48967 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2022-48968 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48969 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48971 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48971 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48972 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48973 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48973 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2022-48973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48975 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48977 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48977 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48978 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48978 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-48978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48980 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48980 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-48980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48981 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48981 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2022-48981 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48985 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48987 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48987 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48988 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48988 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48988 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48991 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48992 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48992 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48994 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2022-48994 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2022-48994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48995 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48995 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48997 ( SUSE ): 1.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48997 ( SUSE ): 2.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2022-48997 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-49000 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49000 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49002 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49002 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49003 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49003 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49003 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49005 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2022-49005 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2022-49005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49006 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49006 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49006 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49007 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49010 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49015 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49015 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49017 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49020 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49020 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49022 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49023 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49023 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49024 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49025 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49025 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49026 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49027 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-49028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49029 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49031 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-49032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49032 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-2166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-2166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-28327 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-28327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52800 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52881 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36244 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
* CVE-2024-36957 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-39476 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39476 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40965 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42145 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42226 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42226 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42253 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42253 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-42253 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44931 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-44931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44947 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46716 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-46719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46754 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46754 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46809 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46811 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46811 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46813 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46813 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46813 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46814 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46814 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46814 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46815 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46815 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46816 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46816 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46817 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46818 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46818 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46849 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47660 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47660 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47660 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47661 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47661 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-47661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47664 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47664 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47664 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47668 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47668 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-47668 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47672 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47673 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47674 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47684 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47685 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47685 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-47685 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47692 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47692 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47704 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47704 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47705 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47706 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47706 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47707 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47710 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47710 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47710 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47720 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47727 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47738 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47739 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47745 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47745 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47745 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47747 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47747 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47747 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47748 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47748 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47748 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49858 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49858 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-49858 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49860 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49860 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49860 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49866 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49866 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49867 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49867 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49867 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49890 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49892 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49892 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49894 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49894 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49894 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49895 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-49895 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49896 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49896 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49897 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49899 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49901 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49906 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49909 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49911 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49912 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49913 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49914 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49917 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49918 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49919 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49920 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49922 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49923 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49929 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49930 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49933 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49933 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49936 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49936 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49939 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49954 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49955 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49960 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49960 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49960 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49962 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49969 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49969 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49974 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49974 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49974 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49982 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49991 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49993 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49993 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-49993 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49995 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49995 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-49995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49996 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50006 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50006 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50014 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50024 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50033 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50035 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50035 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50035 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50041 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50049 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50059 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50059 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50061 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50063 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50063 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.5
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves 204 vulnerabilities and has 30 security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

* CVE-2022-48879: efi: fix NULL-deref in init error path (bsc#1229556).
* CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893).
* CVE-2022-48957: dpaa2-switch: Fix memory leak in
dpaa2_switch_acl_entry_add() and dpaa2_switch_acl_entry_remove()
(bsc#1231973).
* CVE-2022-48958: ethernet: aeroflex: fix potential skb leak in
greth_init_rings() (bsc#1231889).
* CVE-2022-48959: net: dsa: sja1105: fix memory leak in
sja1105_setup_devlink_regions() (bsc#1231976).
* CVE-2022-48960: net: hisilicon: Fix potential use-after-free in hix5hd2_rx()
(bsc#1231979).
* CVE-2022-48962: net: hisilicon: Fix potential use-after-free in
hisi_femac_rx() (bsc#1232286).
* CVE-2022-48966: net: mvneta: Fix an out of bounds check (bsc#1232191).
* CVE-2022-48980: net: dsa: sja1105: avoid out of bounds access in
sja1105_init_l2_policing() (bsc#1232233).
* CVE-2022-48991: mm/khugepaged: fix collapse_pte_mapped_thp() to allow
anon_vma (bsc#1232070 git-fix prerequisity).
* CVE-2022-49015: net: hsr: Fix potential use-after-free (bsc#1231938).
* CVE-2022-49017: tipc: re-fetch skb cb after tipc_msg_validate (bsc#1232004).
* CVE-2022-49020: net/9p: Fix a potential socket leak in p9_socket_open
(bsc#1232175).
* CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to
entire cycle too (bsc#1226797).
* CVE-2024-36957: octeontx2-af: avoid off-by-one read from userspace
(bsc#1225762).
* CVE-2024-39476: md/raid5: fix deadlock that raid5d() wait for itself to
clear MD_SB_CHANGE_PENDING (bsc#1227437).
* CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer
(bsc#1227885).
* CVE-2024-42226: Prevent potential failure in handle_tx_event() for Transfer
events without TRB (bsc#1228709).
* CVE-2024-42253: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race
(bsc#1229005 stable-fixes).
* CVE-2024-44931: gpio: prevent potential speculation leaks in
gpio_device_get_desc() (bsc#1229837 stable-fixes).
* CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc
(bsc#1230179).
* CVE-2024-45016: netem: fix return value if duplicate enqueue fails
(bsc#1230429).
* CVE-2024-45025: fix bitmap corruption on close_range() with
CLOSE_RANGE_UNSHARE (bsc#1230456).
* CVE-2024-46716: dmaengine: altera-msgdma: properly free descriptor in
msgdma_free_descriptor (bsc#1230715).
* CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops
(bsc#1230801).
* CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773).
* CVE-2024-46809: drm/amd/display: Check BIOS images before it is used
(bsc#1231148).
* CVE-2024-46811: drm/amd/display: Fix index may exceed array range within
fpu_update_bw_bounding_box (bsc#1231179).
* CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links
(bsc#1231191).
* CVE-2024-46814: drm/amd/display: Check msg_id before processing transcation
(bsc#1231193).
* CVE-2024-46815: drm/amd/display: Check num_valid_sets before accessing
reader_wm_sets (bsc#1231195).
* CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums
greater than max_links (bsc#1231197).
* CVE-2024-46817: drm/amd/display: Stop amdgpu_dm initialize when stream nums
greater than 6 (bsc#1231200).
* CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index
(bsc#1231203).
* CVE-2024-46828: uprobes: fix kernel info leak via "[uprobes]" vma
(bsc#1231114).
* CVE-2024-46834: ethtool: fail closed if we can't get max channel used in
indirection tables (bsc#1231096).
* CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete
(bsc#1231105).
* CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from
btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094).
* CVE-2024-46848: perf/x86/intel: Limit the period on Haswell (bsc#1231072).
* CVE-2024-46849: ASoC: meson: axg-card: fix 'use-after-free' (bsc#1231073).
* CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439).
* CVE-2024-47661: drm/amd/display: Avoid overflow from uint32_t to uint8_t
(bsc#1231496).
* CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency
provided by the firmware (bsc#1231442).
* CVE-2024-47668: lib/generic-radix-tree.c: Fix rare race in
__genradix_ptr_alloc() (bsc#1231502).
* CVE-2024-47672: wifi: iwlwifi: mvm: do not wait for tx queues if firmware is
dead (bsc#1231540).
* CVE-2024-47673: wifi: iwlwifi: mvm: pause TCM when the firmware is stopped
(bsc#1231539).
* CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case
(bsc#1231673).
* CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us()
(bsc#1231987).
* CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
(bsc#1231998).
* CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857).
* CVE-2024-47704: drm/amd/display: Check link_res->hpo_dp_link_enc before
using it (bsc#1231944).
* CVE-2024-47705: block: fix potential invalid pointer dereference in
blk_add_partition (bsc#1231872).
* CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain
(bsc#1231942).
* CVE-2024-47707: ipv6: avoid possible NULL deref in
rt6_uncached_list_flush_dev() (bsc#1231935).
* CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free()
(bsc#1232049).
* CVE-2024-47720: drm/amd/display: Add null check for set_output_gamma in
dcn30_set_output_transfer_func (bsc#1232043).
* CVE-2024-47727: x86/tdx: Fix "in-kernel MMIO" check (bsc#1232116).
* CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue
(bsc#1232075).
* CVE-2024-47738: wifi: mac80211: do not use rate mask for offchannel TX
either (bsc#1232114).
* CVE-2024-47739: padata: use integer wrap around to prevent deadlock on
seq_nr overflow (bsc#1232124).
* CVE-2024-47745: mm: split critical region in remap_file_pages() and invoke
LSMs in between (bsc#1232135).
* CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver
Due to Race Condition (bsc#1232145).
* CVE-2024-47748: vhost_vdpa: assign irq bypass producer token correctly
(bsc#1232174).
* CVE-2024-49860: ACPI: sysfs: validate return type of _STR method
(bsc#1231861).
* CVE-2024-49866: tracing/timerlat: Fix a race during cpuhp processing
(bsc#1232259).
* CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201).
* CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path
(bsc#1232200).
* CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent()
(bsc#1232199).
* CVE-2024-49886: platform/x86: ISST: Fix the KASAN report slab-out-of-bounds
bug (bsc#1232196).
* CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it
(bsc#1232217).
* CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default
to 1 (bsc#1232220).
* CVE-2024-49896: drm/amd/display: Check stream before comparing them
(bsc#1232221).
* CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used
(bsc#1232355).
* CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1
(bsc#1232358).
* CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid
nullptrs (bsc#1232305).
* CVE-2024-49906: drm/amd/display: Check null pointer before try to access it
(bsc#1232332).
* CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in
dcn32_set_output_transfer_func (bsc#1232337).
* CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in
dcn20_set_output_transfer_func (bsc#1232366).
* CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx->plane_state in
(bsc#1232369).
* CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and
clk_mgr->funcs in dcn30_init_hw (bsc#1231965).
* CVE-2024-49918: drm/amd/display: Add null check for head_pipe in
dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967).
* CVE-2024-49919: drm/amd/display: Add null check for head_pipe in
dcn201_acquire_free_pipe_for_layer (bsc#1231968).
* CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses
(bsc#1232313).
* CVE-2024-49922: drm/amd/display: Check null pointers before using them
(bsc#1232374).
* CVE-2024-49923: drm/amd/display: Pass non-null to
dcn20_validate_apply_pipe_split_flags (bsc#1232361).
* CVE-2024-49929: wifi: iwlwifi: mvm: avoid NULL pointer dereference
(bsc#1232253).
* CVE-2024-49930: wifi: ath11k: fix array out-of-bound access in SoC stats
(bsc#1232260).
* CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368).
* CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash()
(bsc#1232424).
* CVE-2024-49939: wifi: rtw89: avoid to add interface to list twice when SER
(bsc#1232381).
* CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input()
(bsc#1232164).
* CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with
UFO (bsc#1232160).
* CVE-2024-49954: static_call: Replace pointless WARN_ON() in
static_call_module_notify() (bsc#1232155).
* CVE-2024-49955: ACPI: battery: Fix possible crash when unregistering a
battery hook (bsc#1232154).
* CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching
reflink tree (bsc#1232151).
* CVE-2024-49959: jbd2: stop waiting for space when
jbd2_cleanup_journal_tail() returns error (bsc#1232149).
* CVE-2024-49960: ext4: fix timer use-after-free on failed mount
(bsc#1232395).
* CVE-2024-49967: ext4: no need to continue when the number of entries is 1
(bsc#1232140).
* CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color
transformation (bsc#1232519).
* CVE-2024-49973: r8169: add tally counter fields added with RTL8125
(bsc#1232105).
* CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous
(bsc#1232383).
* CVE-2024-49975: uprobes: fix kernel info leak via "[uprobes]" vma
(bsc#1232104).
* CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer
(bsc#1232282).
* CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called
with 0 count (bsc#1232316).
* CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).
* CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points
(bsc#1232089).
* CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc()
(bsc#1232085).
* CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit
(bsc#1232084).
* CVE-2024-50002: static_call: Handle module init failure correctly in
static_call_del_module() (bsc#1232083).
* CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate()
(bsc#1232442).
* CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path
(bsc#1232446).
* CVE-2024-50019: kthread: unpark only parked kthread (bsc#1231990).
* CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954).
* CVE-2024-50028: thermal: core: Reference count the zone in
thermal_zone_get_by_id() (bsc#1231950).
* CVE-2024-50033: slip: make slhc_remember() more robust against malicious
packets (bsc#1231914).
* CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392).
* CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to
mac_filter_hash (bsc#1231907).
* CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb
(bsc#1231903).
* CVE-2024-50046: kabi fix for NFSv4: Prevent NULL-pointer dereference in
nfs42_complete_copies() (bsc#1231902).
* CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).
* CVE-2024-50048: fbcon: Fix a NULL pointer dereference issue in fbcon_putcs
(bsc#1232310).
* CVE-2024-50055: driver core: bus: Fix double free in driver API
bus_register() (bsc#1232329).
* CVE-2024-50058: serial: protect uart_port_dtr_rts() in uart_shutdown() too
(bsc#1232285).
* CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in
switchtec_ntb_remove due to race condition (bsc#1232345).
* CVE-2024-50061: i3c: master: cdns: Fix use after free vulnerability in
cdns_i3c_master Driver Due to Race Condition (bsc#1232263).
* CVE-2024-50063: kABI: bpf: struct bpf_map kABI workaround (bsc#1232435).
* CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx
(bsc#1232501).

The following non-security bugs were fixed:

* ACPI: EC: Do not release locks during operation region accesses (stable-
fixes).
* ACPI: PAD: fix crash in exit_round_robin() (stable-fixes).
* ACPI: PRM: Clean up guid type in struct prm_handler_info (git-fixes).
* ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context (git-
fixes).
* ACPI: battery: Call power_supply_changed() when adding hooks (bsc#1232154)
* ACPI: battery: Simplify battery hook locking (bsc#1232154)
* ACPI: resource: Add Asus ExpertBook B2502CVA to
irq1_level_low_skip_override[] (stable-fixes).
* ACPI: resource: Add Asus Vivobook X1704VAP to irq1_level_low_skip_override[]
(stable-fixes).
* ACPI: resource: Add another DMI match for the TongFang GMxXGxx (stable-
fixes).
* ACPICA: Fix memory leak if acpi_ps_get_next_field() fails (stable-fixes).
* ACPICA: Fix memory leak if acpi_ps_get_next_namepath() fails (stable-fixes).
* ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in
acpi_db_convert_to_package() (stable-fixes).
* ACPICA: iasl: handle empty connection_node (stable-fixes).
* ALSA: asihpi: Fix potential OOB array access (stable-fixes).
* ALSA: core: add isascii() check to card ID generator (stable-fixes).
* ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()
(git-fixes).
* ALSA: hda/conexant - Fix audio routing for HP EliteOne 1000 G2 (stable-
fixes).
* ALSA: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne
1000 G2 (git-fixes).
* ALSA: hda/conexant: Fix conflicting quirk for System76 Pangolin (git-fixes).
* ALSA: hda/cs8409: Fix possible NULL dereference (git-fixes).
* ALSA: hda/generic: Unconditionally prefer preferred_dacs pairs (git-fixes).
* ALSA: hda/realtek - FIxed ALC285 headphone no sound (stable-fixes).
* ALSA: hda/realtek - Fixed ALC256 headphone no sound (stable-fixes).
* ALSA: hda/realtek: Add a quirk for HP Pavilion 15z-ec200 (stable-fixes).
* ALSA: hda/realtek: Add quirk for Huawei MateBook 13 KLV-WX9 (stable-fixes).
* ALSA: hda/realtek: Fix the push button function for the ALC257 (git-fixes).
* ALSA: hda/realtek: Update default depop procedure (git-fixes).
* ALSA: hda: Fix kctl->id initialization (git-fixes).
* ALSA: hda: cs35l41: fix module autoloading (git-fixes).
* ALSA: hdsp: Break infinite MIDI input flush loop (stable-fixes).
* ALSA: line6: add hw monitor volume control to POD HD500X (stable-fixes).
* ALSA: mixer_oss: Remove some incorrect kfree_const() usages (git-fixes).
* ALSA: usb-audio: Add delay quirk for VIVO USB-C HEADSET (stable-fixes).
* ALSA: usb-audio: Add input value sanity checks for standard types (stable-
fixes).
* ALSA: usb-audio: Add logitech Audio profile quirk (stable-fixes).
* ALSA: usb-audio: Add native DSD support for Luxman D-08u (stable-fixes).
* ALSA: usb-audio: Define macros for quirk table entries (stable-fixes).
* ALSA: usb-audio: Replace complex quirk lines with macros (stable-fixes).
* ASoC: allow module autoloading for table db1200_pids (stable-fixes).
* ASoC: imx-card: Set card.owner to avoid a warning calltrace if SND=m (git-
fixes).
* ASoC: intel: fix module autoloading (stable-fixes).
* ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe()
(git-fixes).
* ASoC: rt5682: Return devm_of_clk_add_hw_provider to transfer the error (git-
fixes).
* ASoC: soc-pcm: Do not zero TDM masks in __soc_pcm_open() (git-fixes).
* ASoC: tda7419: fix module autoloading (stable-fixes).
* Bluetooth: Call iso_exit() on module unload (git-fixes).
* Bluetooth: ISO: Fix multiple init when debugfs is disabled (git-fixes).
* Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (git-
fixes).
* Bluetooth: Remove debugfs directory on module init failure (git-fixes).
* Bluetooth: bnep: fix wild-memory-access in proto_unregister (git-fixes).
* Bluetooth: btmrvl: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* Bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001 (git-
fixes).
* Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (git-fixes).
* HID: amd_sfh: Switch to device-managed dmam_alloc_coherent() (git-fixes).
* HID: multitouch: Add support for GT7868Q (stable-fixes).
* HID: multitouch: Add support for Thinkpad X12 Gen 2 Kbd Portfolio (stable-
fixes).
* HID: plantronics: Workaround for an unexcepted opposite volume key (stable-
fixes).
* Input: adp5589-keys - fix NULL pointer dereference (git-fixes).
* Input: adp5589-keys - fix adp5589_gpio_get_value() (git-fixes).
* Input: ads7846 - ratelimit the spi_sync error message (stable-fixes).
* Input: goodix - use the new soc_intel_is_byt() helper (stable-fixes).
* Input: synaptics - enable SMBus for HP Elitebook 840 G2 (stable-fixes).
* KVM: Fix coalesced_mmio_has_room() to avoid premature userspace exit (git-
fixes).
* KVM: Fix lockdep false negative during host resume (git-fixes).
* KVM: Grab a reference to KVM for VM and vCPU stats file descriptors (git-
fixes).
* KVM: Optimize kvm_make_vcpus_request_mask() a bit (git-fixes).
* KVM: Pre-allocate cpumasks for kvm_make_all_cpus_request_except() (git-
fixes).
* KVM: Reject overly excessive IDs in KVM_CREATE_VCPU (git-fixes).
* KVM: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value
(git-fixes).
* KVM: SVM: Do not advertise Bus Lock Detect to guest if SVM support is
missing (git-fixes).
* KVM: SVM: fix emulation of msr reads/writes of MSR_FS_BASE and MSR_GS_BASE
(git-fixes).
* KVM: Unconditionally get a ref to /dev/kvm module when creating a VM (git-
fixes).
* KVM: Write the per-page "segment" when clearing (part of) a guest page (git-
fixes).
* KVM: arm64: Add missing memory barriers when switching to pKVM's hyp pgd
(git-fixes).
* KVM: arm64: Allow AArch32 PSTATE.M to be restored as System mode (git-
fixes).
* KVM: arm64: Fix AArch32 register narrowing on userspace write (git-fixes).
* KVM: arm64: GICv4: Do not perform a map to a mapped vLPI (git-fixes).
* KVM: arm64: Invalidate EL1&0 TLB entries for all VMIDs in nvhe hyp init
(git-fixes).
* KVM: arm64: Preserve PSTATE.SS for the guest while single-step is enabled
(git-fixes).
* KVM: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE
(git-fixes).
* KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs
(git-fixes).
* KVM: arm64: vgic-its: Test for valid IRQ in MOVALL handler (git-fixes).
* KVM: arm64: vgic-its: Test for valid IRQ in its_sync_lpi_pending_table()
(git-fixes).
* KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() (git-
fixes).
* KVM: arm64: vgic-v2: Use cpuid from userspace as vcpu_id (git-fixes).
* KVM: arm64: vgic-v4: Restore pending state on host userspace write (git-
fixes).
* KVM: eventfd: Fix false positive RCU usage warning (git-fixes).
* KVM: fix memoryleak in kvm_init() (git-fixes).
* KVM: s390: Change virtual to physical address access in diag 0x258 handler
(git-fixes bsc#1232631).
* KVM: s390: gaccess: Check if guest address is in memslot (git-fixes
bsc#1232630).
* KVM: x86/mmu: Fold rmap_recycle into rmap_add (git-fixes).
* KVM: x86/mmu: Rename slot_handle_leaf to slot_handle_level_4k (git-fixes).
* KVM: x86: Use a stable condition around all VT-d PI paths (git-fixes).
* Makefile.compiler: replace cc-ifversion with compiler-specific macros
(bsc#1230414 bsc#1229450).
* NFS: Avoid unnecessary rescanning of the per-server delegation list (git-
fixes).
* NFSD: Fix NFSv4's PUTPUBFH operation (git-fixes).
* NFSD: Mark filecache "down" if init fails (git-fixes).
* NFSv3: only use NFS timeout for MOUNT when protocols are compatible
(bsc#1231016).
* NFSv4: Fix clearing of layout segments in layoutreturn (git-fixes).
* PCI: Add ACS quirk for Qualcomm SA8775P (stable-fixes).
* PCI: Add function 0 DMA alias quirk for Glenfly Arise chip (stable-fixes).
* PCI: Fix pci_enable_acs() support for the ACS quirks (bsc#1229019).
* PCI: Mark Creative Labs EMU20k2 INTx masking as broken (stable-fixes).
* RDMA/bnxt_re: Add a check for memory allocation (git-fixes)
* RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (git-fixes)
* RDMA/bnxt_re: Fix incorrect AVID type in WQE structure (git-fixes)
* RDMA/bnxt_re: Fix the GID table length (git-fixes)
* RDMA/bnxt_re: Fix the max CQ WQEs for older adapters (git-fixes)
* RDMA/bnxt_re: Fix the usage of control path spin locks (git-fixes)
* RDMA/bnxt_re: Return more meaningful error (git-fixes)
* RDMA/bnxt_re: synchronize the qp-handle table array (git-fixes)
* RDMA/cxgb4: Dump vendor specific QP details (git-fixes)
* RDMA/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP (git-fixes)
* RDMA/hns: Remove unused abnormal interrupt of type RAS (git-fixes)
* RDMA/irdma: Fix misspelling of "accept*" (git-fixes)
* RDMA/mad: Improve handling of timed out WRs of mad agent (git-fixes)
* RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page
(git-fixes).
* RDMA/mana_ib: use the correct page table index based on hardware page size
(git-fixes).
* RDMA/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down (git-
fixes)
* RDMA/rtrs-srv: Avoid null pointer deref during path establishment (git-
fixes)
* RDMA/srpt: Make slab cache names unique (git-fixes)
* SUNRPC: Fix integer overflow in decode_rc_list() (git-fixes).
* SUNRPC: Fixup gss_status tracepoint error output (git-fixes).
* SUNRPC: clnt.c: Remove misleading comment (git-fixes).
* USB: appledisplay: close race between probe and completion handler (stable-
fixes).
* USB: misc: cypress_cy7c63: check for short transfer (stable-fixes).
* USB: misc: yurex: fix race between read and write (stable-fixes).
* USB: serial: option: add Telit FN920C04 MBIM compositions (stable-fixes).
* USB: serial: option: add support for Quectel EG916Q-GL (stable-fixes).
* USB: serial: pl2303: add device id for Macrosilicon MS3020 (stable-fixes).
* Use pahole -j1 option for reproducible builds (bsc#1230414 bsc#1229450).
* add bug reference for a mana change (bsc#1229769).
* add bug references to existing mana changes (bsc#1232033, bsc#1232034,
bsc#1232036).
* afs: Revert "afs: Hide silly-rename files from userspace" (git-fixes).
* arm64: cputype: Add Neoverse-N3 definitions (git-fixes)
* arm64: dts: rockchip: override BIOS_DISABLE signal via GPIO hog on RK3399
Puma (git-fixes).
* arm64: errata: Expand speculative SSBS workaround once more (git-fixes)
* arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes)
* arm64: probes: Fix simulate_ldr*_literal() (git-fixes)
* arm64: probes: Fix uprobes for big-endian kernels (git-fixes)
* arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes)
* block: print symbolic error name instead of error code (bsc#1231872).
* bpf, lsm: Add disabled BPF LSM hook list (git-fixes).
* bpf, net: Fix a potential race in do_sock_getsockopt() (git-fixes).
* bpf, verifier: Correct tail_call_reachable for bpf prog (git-fixes).
* bpf, x64: Remove tail call detection (git-fixes).
* bpf,perf: Fix perf_event_detach_bpf_prog error handling (git-fixes).
* bpf: Add --skip_encoding_btf_inconsistent_proto, --btf_gen_optimized to
pahole flags for v1.25 (bsc#1230414 bsc#1229450).
* bpf: Allow helpers to accept pointers with a fixed size (git-fixes).
* bpf: Check for helper calls in check_subprogs() (git-fixes).
* bpf: Fix bpf_strtol and bpf_strtoul helpers for 32bit (git-fixes).
* bpf: Fix helper writes to read-only maps (git-fixes).
* bpf: Fix pointer-leak due to insufficient speculative store bypass
mitigation (bsc#1231375).
* bpf: Fix tailcall cases in test_bpf (git-fixes).
* bpf: Improve check_raw_mode_ok test for MEM_UNINIT-tagged types (git-fixes).
* bpf: Remove truncation test in bpf_strtol and bpf_strtoul helpers (git-
fixes).
* bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error (git-fixes).
* bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos (git-fixes).
* btf, scripts: Exclude Rust CUs with pahole (bsc#1230414 bsc#1229450).
* bus: integrator-lm: fix OF node leak in probe() (git-fixes).
* ceph: fix cap ref leak via netfs init_request (bsc#1231383).
* clk: Add a devm variant of clk_rate_exclusive_get() (bsc#1227885).
* clk: Provide !COMMON_CLK dummy for devm_clk_rate_exclusive_get()
(bsc#1227885).
* comedi: ni_routing: tools: Check when the file could not be opened (stable-
fixes).
* cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems
(git-fixes).
* crypto: hisilicon - Remove pci_aer_clear_nonfatal_status() call
(bsc#1232075)
* crypto: hisilicon/qm - re-enable communicate interrupt before notifying PF
(bsc#1232075)
* debugfs: fix automount d_fsdata usage (git-fixes).
* dn_route: set rt neigh to blackhole_netdev instead of loopback_dev in ifdown
(bsc#1216813).
* drbd: Add NULL check for net_conf to prevent dereference in state validation
(git-fixes).
* drbd: Fix atomicity violation in drbd_uuid_set_bm() (git-fixes).
* driver core: bus: Return -EIO instead of 0 when show/store invalid bus
attribute (stable-fixes).
* drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring (git-fixes).
* drm/amd/display: Add null check for 'afb' in
amdgpu_dm_plane_handle_cursor_update (v2) (stable-fixes).
* drm/amd/display: Add null check for top_pipe_to_program in
commit_planes_for_stream (stable-fixes).
* drm/amd/display: Allow backlight to go below
`AMDGPU_DM_DEFAULT_MIN_BACKLIGHT` (stable-fixes).
* drm/amd/display: Check link_res->hpo_dp_link_enc before using it
(bsc#1231944)
* drm/amd/display: Check null pointer before dereferencing se (stable-fixes).
* drm/amd/display: Check null pointers before using dc->clk_mgr (stable-
fixes).
* drm/amd/display: Check stream before comparing them (stable-fixes).
* drm/amd/display: Fix Synaptics Cascaded Panamera DSC Determination (stable-
fixes).
* drm/amd/display: Fix index out of bounds in DCN30 color transformation
(stable-fixes).
* drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format
translation (stable-fixes).
* drm/amd/display: Fix index out of bounds in degamma hardware format
translation (stable-fixes).
* drm/amd/display: Fix system hang while resume with TBT monitor (stable-
fixes).
* drm/amd/display: Handle null 'stream_status' in
'planes_changed_for_existing_stream' (stable-fixes).
* drm/amd/display: Initialize get_bytes_per_element's default to 1 (stable-
fixes).
* drm/amd/display: Round calculated vtotal (stable-fixes).
* drm/amd/display: Validate backlight caps are sane (stable-fixes).
* drm/amd/pm: ensure the fw_info is not null before using it (stable-fixes).
* drm/amd: Guard against bad data for ATIF ACPI method (git-fixes).
* drm/amdgpu: Replace one-element array with flexible-array member (stable-
fixes).
* drm/amdgpu: add raven1 gfxoff quirk (stable-fixes).
* drm/amdgpu: disallow multiple BO_HANDLES chunks in one submit (stable-
fixes).
* drm/amdgpu: enable gfxoff quirk on HP 705G4 (stable-fixes).
* drm/amdgpu: fix unchecked return value warning for amdgpu_gfx (stable-
fixes).
* drm/amdgpu: prevent BO_HANDLES error from being overwritten (git-fixes).
* drm/amdgpu: properly handle vbios fake edid sizing (git-fixes).
* drm/amdkfd: Fix resource leak in criu restore queue (stable-fixes).
* drm/msm/dpu: do not always program merge_3d block (git-fixes).
* drm/msm/dpu: make sure phys resources are properly initialized (git-fixes).
* drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation
(git-fixes).
* drm/msm: Allocate memory for disp snapshot with kvzalloc() (git-fixes).
* drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() (git-fixes).
* drm/printer: Allow NULL data in devcoredump printer (stable-fixes).
* drm/radeon/r100: Handle unknown family in r100_cp_init_microcode() (stable-
fixes).
* drm/radeon: Fix encoder->possible_clones (git-fixes).
* drm/radeon: Replace one-element array with flexible-array member (stable-
fixes).
* drm/radeon: properly handle vbios fake edid sizing (git-fixes).
* drm/rockchip: define gamma registers for RK3399 (stable-fixes).
* drm/rockchip: support gamma control on RK3399 (stable-fixes).
* drm/sched: Add locking to drm_sched_entity_modify_sched (git-fixes).
* drm/v3d: Stop the active perfmon before being destroyed (git-fixes).
* drm/vc4: Stop the active perfmon before being destroyed (git-fixes).
* drm/vmwgfx: Handle surface check failure correctly (git-fixes).
* drm: Consistently use struct drm_mode_rect for FB_DAMAGE_CLIPS (git-fixes).
* drm: komeda: Fix an issue related to normalized zpos (stable-fixes).
* efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
(stable-fixes).
* erofs: avoid consecutive detection for Highmem memory (git-fixes).
* erofs: avoid infinite loop in z_erofs_do_read_page() when reading beyond EOF
(git-fixes).
* erofs: fix pcluster use-after-free on UP platforms (git-fixes).
* erofs: fix potential overflow calculating xattr_isize (git-fixes).
* erofs: stop parsing non-compact HEAD index if clusterofs is invalid (git-
fixes).
* exportfs: use pr_debug for unreachable debug statements (git-fixes).
* ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201)
* fat: fix uninitialized variable (git-fixes).
* fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes).
* fbdev: sisfb: Fix strbuf array overflow (stable-fixes).
* fgraph: Change the name of cpuhp state to "fgraph:online" (git-fixes).
* fgraph: Fix missing unlock in register_ftrace_graph() (git-fixes).
* fgraph: Use CPU hotplug mechanism to initialize idle shadow stacks (git-
fixes).
* filelock: fix potential use-after-free in posix_lock_inode (git-fixes).
* firmware: tegra: bpmp: Drop unused mbox_client_to_bpmp() (git-fixes).
* fs/namespace: fnic: Switch to use %ptTd (git-fixes).
* fs/pipe: Fix lockdep false-positive in watchqueue pipe_write() (git-fixes).
* fs: Fix file_set_fowner LSM hook inconsistencies (git-fixes).
* gpio: aspeed: Add the flush write to ensure the write complete (git-fixes).
* gpio: aspeed: Use devm_clk api to manage clock source (git-fixes).
* gpio: davinci: fix lazy disable (git-fixes).
* hid: intel-ish-hid: Fix uninitialized variable 'rv' in
ish_fw_xfer_direct_dma (git-fixes).
* hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event
(git-fixes).
* hwmon: (adm9240) Add missing dependency on REGMAP_I2C (git-fixes).
* hwmon: (tmp513) Add missing dependency on REGMAP_I2C (git-fixes).
* i2c: i801: Use a different adapter-name for IDF adapters (stable-fixes).
* i2c: imx-lpi2c: return -EINVAL when i2c peripheral clk does not work
(bsc#1227885).
* i2c: imx-lpi2c: use bulk clk API (bsc#1227885).
* i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume
(git-fixes).
* i2c: xiic: Fix RX IRQ busy check (stable-fixes).
* i2c: xiic: Fix broken locking on tx_msg (stable-fixes).
* i2c: xiic: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
fixes).
* i2c: xiic: Switch from waitqueue to completion (stable-fixes).
* i2c: xiic: Try re-initialization on bus busy timeout (git-fixes).
* i2c: xiic: Use devm_clk_get_enabled() (stable-fixes).
* i2c: xiic: improve error message when transfer fails to start (stable-
fixes).
* i2c: xiic: xiic_xfer(): Fix runtime PM leak on error path (git-fixes).
* ice: Unbind the workqueue (bsc#1231344).
* iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig (git-fixes).
* iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig (git-fixes).
* iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig (git-
fixes).
* iio: hid-sensors: Fix an error handling path in
_hid_sensor_set_report_latency() (git-fixes).
* iio: light: opt3001: add missing full-scale range value (git-fixes).
* iio: light: veml6030: fix ALS sensor resolution (git-fixes).
* iio: light: veml6030: fix IIO device retrieval from embedded device (git-
fixes).
* iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
(git-fixes).
* iommu/vt-d: Always reserve a domain ID for identity setup (git-fixes).
* ipv6: blackhole_netdev needs snmp6 counters (bsc#1216813).
* ipv6: give an IPv6 dev to blackhole_netdev (bsc#1216813).
* jfs: Fix sanity check in dbMount (git-fixes).
* jfs: Fix uaf in dbFreeBits (git-fixes).
* jfs: Fix uninit-value access of new_ea in ea_buffer (git-fixes).
* jfs: UBSAN: shift-out-of-bounds in dbFindBits (git-fixes).
* jfs: check if leafidx greater than num leaves per dmap tree (git-fixes).
* kABI: bpf: enum bpf_{type_flag,arg_type} kABI workaround (git-fixes).
* kABI: bpf: struct bpf_func_proto kABI workaround (git-fixes).
* kab: fix after net: add more sanity check in virtio_net_hdr_to_skb() (git-
fixes).
* kabi fix of KVM: arm64: Preserve PSTATE.SS for the guest while single-step
is enabled (git-fixes).
* kabi: fix after KVM: arm64: mixed-width check should be skipped for
uninitialized vCPUs (git-fixes).
* kabi: fix after kvm: add guest_state_{enter,exit}_irqoff() (git-fixes).
* kbuild, bpf: Use test-ge check for v1.25-only pahole (bsc#1230414
bsc#1229450).
* kbuild,bpf: Add module-specific pahole flags for distilled base BTF
(bsc#1230414 bsc#1229450).
* kbuild,bpf: Switch to using --btf_features for pahole v1.26 and later
(bsc#1230414 bsc#1229450).
* kbuild: add test-{ge,gt,le,lt} macros (bsc#1230414 bsc#1229450).
* kbuild: avoid too many execution of scripts/pahole-flags.sh (bsc#1230414
bsc#1229450).
* kbuild: bpf: Tell pahole to DECL_TAG kfuncs (bsc#1230414 bsc#1229450).
* kvm/arm64: rework guest entry logic (git-fixes).
* kvm: Add support for arch compat vm ioctls (git-fixes).
* kvm: add guest_state_{enter,exit}_irqoff() (git-fixes).
* media: videobuf2-core: clear memory related fields in
__vb2_plane_dmabuf_put() (stable-fixes).
* module: abort module loading when sysfs setup suffer errors (git-fixes).
* nbd: fix race between timeout and normal completion (bsc#1230918).
* net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX
(bsc#1226797)
* net: add more sanity check in virtio_net_hdr_to_skb() (git-fixes).
* net: socket: suppress unused warning (git-fixes).
* net: test for not too small csum_start in virtio_net_hdr_to_skb() (git-
fixes).
* net: usb: usbnet: fix name regression (git-fixes).
* netdevsim: use cond_resched() in nsim_dev_trap_report_work() (git-fixes).
* nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes).
* nfsd: call cache_put if xdr_reserve_space returns NULL (git-fixes).
* nfsd: fix delegation_blocked() to block correctly for at least 30 seconds
(git-fixes).
* nfsd: fix refcount leak when file is unhashed after being found (git-fixes).
* nfsd: map the EBADMSG to nfserr_io to avoid warning (git-fixes).
* nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire (git-
fixes).
* nfsd: return -EINVAL when namelen is 0 (git-fixes).
* nilfs2: fix kernel bug due to missing clearing of buffer delay flag (git-
fixes).
* nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error (git-
fixes).
* ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() (git-
fixes).
* ntb: ntb_hw_switchtec: Fix use after free vulnerability in
switchtec_ntb_remove due to race condition (stable-fixes).
* nvme-multipath: system fails to create generic nvme device (git-fixes).
* nvme-pci: qdepth 1 quirk (git-fixes).
* nvmet-auth: assign dh_key to NULL after kfree_sensitive (git-fixes).
* ocfs2: fix the la space leak when unmounting an ocfs2 volume (git-fixes).
* ocfs2: fix uninit-value in ocfs2_get_block() (git-fixes).
* ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (git-fixes).
* parport: Proper fix for array out-of-bounds access (git-fixes).
* platform/surface: aggregator_registry: Add support for Surface Laptop Go 3
(stable-fixes).
* platform/x86: touchscreen_dmi: add nanote-next quirk (stable-fixes).
* power: reset: brcmstb: Do not go into infinite loop if reset fails (stable-
fixes).
* s390/sclp_vt220: Convert newlines to CRLF instead of LFCR (git-fixes
bsc#1232632).
* scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes).
* scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes).
* scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes).
* scsi: core: Handle devices which return an unusually large VPD page count
(git-fixes).
* scsi: core: alua: I/O errors for ALUA state transitions (git-fixes).
* scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del()
(git-fixes).
* scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes).
* scsi: libsas: Fix exp-attached device scan after probe failure scanned in
again after probe failed (git-fixes).
* scsi: libsas: Fix the failure of adding phy with zero-address to port (git-
fixes).
* scsi: lpfc: Add ELS_RSP cmd to the list of WQEs to flush in
lpfc_els_flush_cmd() (bsc#1232757).
* scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV
instance (bsc#1232757).
* scsi: lpfc: Fix kref imbalance on fabric ndlps from dev_loss_tmo handler
(bsc#1232757).
* scsi: lpfc: Remove trailing space after \n newline (bsc#1232757).
* scsi: lpfc: Restrict support for 32 byte CDBs to specific HBAs (git-fixes).
* scsi: lpfc: Revise TRACE_EVENT log flag severities from KERN_ERR to
KERN_WARNING (bsc#1232757).
* scsi: lpfc: Support loopback tests with VMID enabled (bsc#1232757).
* scsi: lpfc: Update lpfc version to 14.4.0.5 (bsc#1232757).
* scsi: lpfc: Update phba link state conditional before sending CMF_SYNC_WQE
(bsc#1232757).
* scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes).
* scsi: mac_scsi: Refactor polling loop (git-fixes).
* scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes).
* scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
* scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes).
* scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
* scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes).
* scsi: smartpqi: correct stream detection (git-fixes).
* scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git-
fixes).
* scsi: spi: Fix sshdr use (git-fixes).
* scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes).
* selftests/bpf: Add a test case to write mtu result into .rodata (git-fixes).
* selftests/bpf: Add a test case to write strtol result into .rodata (git-
fixes).
* selftests/bpf: Fix ARG_PTR_TO_LONG {half-,}uninitialized test (git-fixes).
* selftests/bpf: Rename ARG_PTR_TO_LONG test description (git-fixes).
* selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation (git-
fixes).
* spi: bcm63xx: Enable module autoloading (stable-fixes).
* spi: bcm63xx: Fix module autoloading (git-fixes).
* spi: lpspi: Silence error message upon deferred probe (stable-fixes).
* spi: lpspi: Simplify some error message (git-fixes).
* spi: lpspi: release requested DMA channels (stable-fixes).
* spi: ppc4xx: Avoid returning 0 when failed to parse and map IRQ (git-fixes).
* spi: ppc4xx: handle irq_of_parse_and_map() errors (git-fixes).
* spi: s3c64xx: fix timeout counters in flush_fifo (git-fixes).
* spi: spi-fsl-lpspi: Undo runtime PM changes at driver exit time (git-fixes).
* spi: spi-imx: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
fixes).
* spi: spidev: Add missing spi_device_id for jg10309-01 (git-fixes).
* static_call: Do not make __static_call_return0 static (git-fixes).
* tracing/hwlat: Fix a race during cpuhp processing (git-fixes).
* tracing/uprobes: Use trace_event_buffer_reserve() helper (git-fixes).
* tracing: Consider the NULL character when validating the event length (git-
fixes).
* uprobe: avoid out-of-bounds memory access of fetching args (git-fixes).
* uprobes: encapsulate preparation of uprobe args buffer (git-fixes).
* usb: chipidea: udc: enable suspend interrupt after usb reset (stable-fixes).
* usb: dwc2: Adjust the timing of USB Driver Interrupt Registration in the
Crashkernel Scenario (stable-fixes).
* usb: dwc3: core: Stop processing of pending events if controller is halted
(git-fixes).
* usb: gadget: core: force synchronous registration (git-fixes).
* usb: storage: ignore bogus device raised by JieLi BR21 USB sound chip
(stable-fixes).
* usb: typec: altmode should keep reference to parent (git-fixes).
* usb: xhci: Fix problem with xhci resume from suspend (stable-fixes).
* usb: yurex: Fix inconsistent locking bug in yurex_read() (git-fixes).
* usb: yurex: Replace snprintf() with the safer scnprintf() variant (stable-
fixes).
* usbnet: ipheth: fix carrier detection in modes 1 and 4 (stable-fixes).
* vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() (git-fixes).
* vhost_vdpa: assign irq bypass producer token correctly (git-fixes).
* virtio-net: synchronize probe with ndo_set_features (git-fixes).
* virtio_console: fix misc probe bugs (git-fixes).
* virtio_net: fixing XDP for fully checksummed packets handling (git-fixes).
* vmxnet3: add command to allow disabling of offloads (bsc#1226498).
* vmxnet3: add latency measurement support in vmxnet3 (bsc#1226498).
* vmxnet3: prepare for version 9 changes (bsc#1226498).
* vmxnet3: update to version 9 (bsc#1226498).
* vsock/virtio: fix packet delivery to tap device (git-fixes).
* wifi: ath11k: fix array out-of-bound access in SoC stats (stable-fixes).
* wifi: ath9k: Remove error checks when creating debugfs entries (git-fixes).
* wifi: ath9k: fix parameter check in ath9k_init_debug() (stable-fixes).
* wifi: ath9k: fix possible integer overflow in ath9k_get_et_stats() (stable-
fixes).
* wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit
(stable-fixes).
* wifi: iwlwifi: clear trans->state earlier upon error (stable-fixes).
* wifi: iwlwifi: lower message level for FW buffer destination (stable-fixes).
* wifi: iwlwifi: mvm: fix iwl_mvm_scan_fits() calculation (stable-fixes).
* wifi: mwifiex: Fix memcpy() field-spanning write warning in
mwifiex_cmd_802_11_scan_ext() (stable-fixes).
* wifi: rtw88: select WANT_DEV_COREDUMP (stable-fixes).
* x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (git-fixes).
* x86/bugs: Skip RSB fill at VMEXIT (git-fixes).
* x86/cpufeatures: Add a IBPB_NO_RET BUG flag (git-fixes).
* x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (git-fixes).
* x86/entry: Have entry_ibpb() invalidate return predictions (git-fixes).
* x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides frequency
(git-fixes).
* x86/kaslr: Expose and use the end of the physical memory address space
(bsc#1230405).
* xfrm: set dst dev to blackhole_netdev instead of loopback_dev in ifdown
(bsc#1216813).
* xhci: Fix incorrect stream context type macro (git-fixes).
* xhci: Mitigate failed set dequeue pointer commands (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3983=1 openSUSE-SLE-15.5-2024-3983=1

* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-3983=1

## Package List:

* openSUSE Leap 15.5 (aarch64 x86_64)
* cluster-md-kmp-azure-debuginfo-5.14.21-150500.33.72.1
* cluster-md-kmp-azure-5.14.21-150500.33.72.1
* kernel-azure-extra-5.14.21-150500.33.72.1
* ocfs2-kmp-azure-debuginfo-5.14.21-150500.33.72.1
* kernel-azure-optional-debuginfo-5.14.21-150500.33.72.1
* kselftests-kmp-azure-5.14.21-150500.33.72.1
* kernel-azure-livepatch-devel-5.14.21-150500.33.72.1
* kernel-syms-azure-5.14.21-150500.33.72.1
* reiserfs-kmp-azure-5.14.21-150500.33.72.1
* ocfs2-kmp-azure-5.14.21-150500.33.72.1
* dlm-kmp-azure-debuginfo-5.14.21-150500.33.72.1
* kernel-azure-devel-debuginfo-5.14.21-150500.33.72.1
* gfs2-kmp-azure-debuginfo-5.14.21-150500.33.72.1
* kernel-azure-debuginfo-5.14.21-150500.33.72.1
* kselftests-kmp-azure-debuginfo-5.14.21-150500.33.72.1
* kernel-azure-extra-debuginfo-5.14.21-150500.33.72.1
* dlm-kmp-azure-5.14.21-150500.33.72.1
* reiserfs-kmp-azure-debuginfo-5.14.21-150500.33.72.1
* kernel-azure-optional-5.14.21-150500.33.72.1
* kernel-azure-devel-5.14.21-150500.33.72.1
* kernel-azure-debugsource-5.14.21-150500.33.72.1
* gfs2-kmp-azure-5.14.21-150500.33.72.1
* openSUSE Leap 15.5 (aarch64 nosrc x86_64)
* kernel-azure-5.14.21-150500.33.72.1
* openSUSE Leap 15.5 (x86_64)
* kernel-azure-vdso-debuginfo-5.14.21-150500.33.72.1
* kernel-azure-vdso-5.14.21-150500.33.72.1
* openSUSE Leap 15.5 (noarch)
* kernel-devel-azure-5.14.21-150500.33.72.1
* kernel-source-azure-5.14.21-150500.33.72.1
* Public Cloud Module 15-SP5 (aarch64 nosrc x86_64)
* kernel-azure-5.14.21-150500.33.72.1
* Public Cloud Module 15-SP5 (aarch64 x86_64)
* kernel-azure-devel-debuginfo-5.14.21-150500.33.72.1
* kernel-azure-debuginfo-5.14.21-150500.33.72.1
* kernel-azure-devel-5.14.21-150500.33.72.1
* kernel-syms-azure-5.14.21-150500.33.72.1
* kernel-azure-debugsource-5.14.21-150500.33.72.1
* Public Cloud Module 15-SP5 (noarch)
* kernel-devel-azure-5.14.21-150500.33.72.1
* kernel-source-azure-5.14.21-150500.33.72.1

## References:

* https://www.suse.com/security/cve/CVE-2021-47416.html
* https://www.suse.com/security/cve/CVE-2021-47534.html
* https://www.suse.com/security/cve/CVE-2022-3435.html
* https://www.suse.com/security/cve/CVE-2022-45934.html
* https://www.suse.com/security/cve/CVE-2022-48664.html
* https://www.suse.com/security/cve/CVE-2022-48879.html
* https://www.suse.com/security/cve/CVE-2022-48946.html
* https://www.suse.com/security/cve/CVE-2022-48947.html
* https://www.suse.com/security/cve/CVE-2022-48948.html
* https://www.suse.com/security/cve/CVE-2022-48949.html
* https://www.suse.com/security/cve/CVE-2022-48951.html
* https://www.suse.com/security/cve/CVE-2022-48953.html
* https://www.suse.com/security/cve/CVE-2022-48954.html
* https://www.suse.com/security/cve/CVE-2022-48955.html
* https://www.suse.com/security/cve/CVE-2022-48956.html
* https://www.suse.com/security/cve/CVE-2022-48957.html
* https://www.suse.com/security/cve/CVE-2022-48958.html
* https://www.suse.com/security/cve/CVE-2022-48959.html
* https://www.suse.com/security/cve/CVE-2022-48960.html
* https://www.suse.com/security/cve/CVE-2022-48961.html
* https://www.suse.com/security/cve/CVE-2022-48962.html
* https://www.suse.com/security/cve/CVE-2022-48966.html
* https://www.suse.com/security/cve/CVE-2022-48967.html
* https://www.suse.com/security/cve/CVE-2022-48968.html
* https://www.suse.com/security/cve/CVE-2022-48969.html
* https://www.suse.com/security/cve/CVE-2022-48970.html
* https://www.suse.com/security/cve/CVE-2022-48971.html
* https://www.suse.com/security/cve/CVE-2022-48972.html
* https://www.suse.com/security/cve/CVE-2022-48973.html
* https://www.suse.com/security/cve/CVE-2022-48975.html
* https://www.suse.com/security/cve/CVE-2022-48977.html
* https://www.suse.com/security/cve/CVE-2022-48978.html
* https://www.suse.com/security/cve/CVE-2022-48980.html
* https://www.suse.com/security/cve/CVE-2022-48981.html
* https://www.suse.com/security/cve/CVE-2022-48985.html
* https://www.suse.com/security/cve/CVE-2022-48987.html
* https://www.suse.com/security/cve/CVE-2022-48988.html
* https://www.suse.com/security/cve/CVE-2022-48991.html
* https://www.suse.com/security/cve/CVE-2022-48992.html
* https://www.suse.com/security/cve/CVE-2022-48994.html
* https://www.suse.com/security/cve/CVE-2022-48995.html
* https://www.suse.com/security/cve/CVE-2022-48997.html
* https://www.suse.com/security/cve/CVE-2022-48999.html
* https://www.suse.com/security/cve/CVE-2022-49000.html
* https://www.suse.com/security/cve/CVE-2022-49002.html
* https://www.suse.com/security/cve/CVE-2022-49003.html
* https://www.suse.com/security/cve/CVE-2022-49005.html
* https://www.suse.com/security/cve/CVE-2022-49006.html
* https://www.suse.com/security/cve/CVE-2022-49007.html
* https://www.suse.com/security/cve/CVE-2022-49010.html
* https://www.suse.com/security/cve/CVE-2022-49011.html
* https://www.suse.com/security/cve/CVE-2022-49012.html
* https://www.suse.com/security/cve/CVE-2022-49014.html
* https://www.suse.com/security/cve/CVE-2022-49015.html
* https://www.suse.com/security/cve/CVE-2022-49016.html
* https://www.suse.com/security/cve/CVE-2022-49017.html
* https://www.suse.com/security/cve/CVE-2022-49019.html
* https://www.suse.com/security/cve/CVE-2022-49020.html
* https://www.suse.com/security/cve/CVE-2022-49021.html
* https://www.suse.com/security/cve/CVE-2022-49022.html
* https://www.suse.com/security/cve/CVE-2022-49023.html
* https://www.suse.com/security/cve/CVE-2022-49024.html
* https://www.suse.com/security/cve/CVE-2022-49025.html
* https://www.suse.com/security/cve/CVE-2022-49026.html
* https://www.suse.com/security/cve/CVE-2022-49027.html
* https://www.suse.com/security/cve/CVE-2022-49028.html
* https://www.suse.com/security/cve/CVE-2022-49029.html
* https://www.suse.com/security/cve/CVE-2022-49031.html
* https://www.suse.com/security/cve/CVE-2022-49032.html
* https://www.suse.com/security/cve/CVE-2023-2166.html
* https://www.suse.com/security/cve/CVE-2023-28327.html
* https://www.suse.com/security/cve/CVE-2023-52766.html
* https://www.suse.com/security/cve/CVE-2023-52800.html
* https://www.suse.com/security/cve/CVE-2023-52881.html
* https://www.suse.com/security/cve/CVE-2023-52919.html
* https://www.suse.com/security/cve/CVE-2023-6270.html
* https://www.suse.com/security/cve/CVE-2024-27043.html
* https://www.suse.com/security/cve/CVE-2024-36244.html
* https://www.suse.com/security/cve/CVE-2024-36957.html
* https://www.suse.com/security/cve/CVE-2024-39476.html
* https://www.suse.com/security/cve/CVE-2024-40965.html
* https://www.suse.com/security/cve/CVE-2024-42145.html
* https://www.suse.com/security/cve/CVE-2024-42226.html
* https://www.suse.com/security/cve/CVE-2024-42253.html
* https://www.suse.com/security/cve/CVE-2024-44931.html
* https://www.suse.com/security/cve/CVE-2024-44947.html
* https://www.suse.com/security/cve/CVE-2024-44958.html
* https://www.suse.com/security/cve/CVE-2024-45016.html
* https://www.suse.com/security/cve/CVE-2024-45025.html
* https://www.suse.com/security/cve/CVE-2024-46716.html
* https://www.suse.com/security/cve/CVE-2024-46719.html
* https://www.suse.com/security/cve/CVE-2024-46754.html
* https://www.suse.com/security/cve/CVE-2024-46777.html
* https://www.suse.com/security/cve/CVE-2024-46809.html
* https://www.suse.com/security/cve/CVE-2024-46811.html
* https://www.suse.com/security/cve/CVE-2024-46813.html
* https://www.suse.com/security/cve/CVE-2024-46814.html
* https://www.suse.com/security/cve/CVE-2024-46815.html
* https://www.suse.com/security/cve/CVE-2024-46816.html
* https://www.suse.com/security/cve/CVE-2024-46817.html
* https://www.suse.com/security/cve/CVE-2024-46818.html
* https://www.suse.com/security/cve/CVE-2024-46828.html
* https://www.suse.com/security/cve/CVE-2024-46834.html
* https://www.suse.com/security/cve/CVE-2024-46840.html
* https://www.suse.com/security/cve/CVE-2024-46841.html
* https://www.suse.com/security/cve/CVE-2024-46848.html
* https://www.suse.com/security/cve/CVE-2024-46849.html
* https://www.suse.com/security/cve/CVE-2024-47660.html
* https://www.suse.com/security/cve/CVE-2024-47661.html
* https://www.suse.com/security/cve/CVE-2024-47664.html
* https://www.suse.com/security/cve/CVE-2024-47668.html
* https://www.suse.com/security/cve/CVE-2024-47672.html
* https://www.suse.com/security/cve/CVE-2024-47673.html
* https://www.suse.com/security/cve/CVE-2024-47674.html
* https://www.suse.com/security/cve/CVE-2024-47684.html
* https://www.suse.com/security/cve/CVE-2024-47685.html
* https://www.suse.com/security/cve/CVE-2024-47692.html
* https://www.suse.com/security/cve/CVE-2024-47704.html
* https://www.suse.com/security/cve/CVE-2024-47705.html
* https://www.suse.com/security/cve/CVE-2024-47706.html
* https://www.suse.com/security/cve/CVE-2024-47707.html
* https://www.suse.com/security/cve/CVE-2024-47710.html
* https://www.suse.com/security/cve/CVE-2024-47720.html
* https://www.suse.com/security/cve/CVE-2024-47727.html
* https://www.suse.com/security/cve/CVE-2024-47730.html
* https://www.suse.com/security/cve/CVE-2024-47738.html
* https://www.suse.com/security/cve/CVE-2024-47739.html
* https://www.suse.com/security/cve/CVE-2024-47745.html
* https://www.suse.com/security/cve/CVE-2024-47747.html
* https://www.suse.com/security/cve/CVE-2024-47748.html
* https://www.suse.com/security/cve/CVE-2024-49858.html
* https://www.suse.com/security/cve/CVE-2024-49860.html
* https://www.suse.com/security/cve/CVE-2024-49866.html
* https://www.suse.com/security/cve/CVE-2024-49867.html
* https://www.suse.com/security/cve/CVE-2024-49881.html
* https://www.suse.com/security/cve/CVE-2024-49882.html
* https://www.suse.com/security/cve/CVE-2024-49883.html
* https://www.suse.com/security/cve/CVE-2024-49886.html
* https://www.suse.com/security/cve/CVE-2024-49890.html
* https://www.suse.com/security/cve/CVE-2024-49892.html
* https://www.suse.com/security/cve/CVE-2024-49894.html
* https://www.suse.com/security/cve/CVE-2024-49895.html
* https://www.suse.com/security/cve/CVE-2024-49896.html
* https://www.suse.com/security/cve/CVE-2024-49897.html
* https://www.suse.com/security/cve/CVE-2024-49899.html
* https://www.suse.com/security/cve/CVE-2024-49901.html
* https://www.suse.com/security/cve/CVE-2024-49906.html
* https://www.suse.com/security/cve/CVE-2024-49908.html
* https://www.suse.com/security/cve/CVE-2024-49909.html
* https://www.suse.com/security/cve/CVE-2024-49911.html
* https://www.suse.com/security/cve/CVE-2024-49912.html
* https://www.suse.com/security/cve/CVE-2024-49913.html
* https://www.suse.com/security/cve/CVE-2024-49914.html
* https://www.suse.com/security/cve/CVE-2024-49917.html
* https://www.suse.com/security/cve/CVE-2024-49918.html
* https://www.suse.com/security/cve/CVE-2024-49919.html
* https://www.suse.com/security/cve/CVE-2024-49920.html
* https://www.suse.com/security/cve/CVE-2024-49922.html
* https://www.suse.com/security/cve/CVE-2024-49923.html
* https://www.suse.com/security/cve/CVE-2024-49929.html
* https://www.suse.com/security/cve/CVE-2024-49930.html
* https://www.suse.com/security/cve/CVE-2024-49933.html
* https://www.suse.com/security/cve/CVE-2024-49936.html
* https://www.suse.com/security/cve/CVE-2024-49939.html
* https://www.suse.com/security/cve/CVE-2024-49946.html
* https://www.suse.com/security/cve/CVE-2024-49949.html
* https://www.suse.com/security/cve/CVE-2024-49954.html
* https://www.suse.com/security/cve/CVE-2024-49955.html
* https://www.suse.com/security/cve/CVE-2024-49958.html
* https://www.suse.com/security/cve/CVE-2024-49959.html
* https://www.suse.com/security/cve/CVE-2024-49960.html
* https://www.suse.com/security/cve/CVE-2024-49962.html
* https://www.suse.com/security/cve/CVE-2024-49967.html
* https://www.suse.com/security/cve/CVE-2024-49969.html
* https://www.suse.com/security/cve/CVE-2024-49973.html
* https://www.suse.com/security/cve/CVE-2024-49974.html
* https://www.suse.com/security/cve/CVE-2024-49975.html
* https://www.suse.com/security/cve/CVE-2024-49982.html
* https://www.suse.com/security/cve/CVE-2024-49991.html
* https://www.suse.com/security/cve/CVE-2024-49993.html
* https://www.suse.com/security/cve/CVE-2024-49995.html
* https://www.suse.com/security/cve/CVE-2024-49996.html
* https://www.suse.com/security/cve/CVE-2024-50000.html
* https://www.suse.com/security/cve/CVE-2024-50001.html
* https://www.suse.com/security/cve/CVE-2024-50002.html
* https://www.suse.com/security/cve/CVE-2024-50006.html
* https://www.suse.com/security/cve/CVE-2024-50014.html
* https://www.suse.com/security/cve/CVE-2024-50019.html
* https://www.suse.com/security/cve/CVE-2024-50024.html
* https://www.suse.com/security/cve/CVE-2024-50028.html
* https://www.suse.com/security/cve/CVE-2024-50033.html
* https://www.suse.com/security/cve/CVE-2024-50035.html
* https://www.suse.com/security/cve/CVE-2024-50041.html
* https://www.suse.com/security/cve/CVE-2024-50045.html
* https://www.suse.com/security/cve/CVE-2024-50046.html
* https://www.suse.com/security/cve/CVE-2024-50047.html
* https://www.suse.com/security/cve/CVE-2024-50048.html
* https://www.suse.com/security/cve/CVE-2024-50049.html
* https://www.suse.com/security/cve/CVE-2024-50055.html
* https://www.suse.com/security/cve/CVE-2024-50058.html
* https://www.suse.com/security/cve/CVE-2024-50059.html
* https://www.suse.com/security/cve/CVE-2024-50061.html
* https://www.suse.com/security/cve/CVE-2024-50063.html
* https://www.suse.com/security/cve/CVE-2024-50081.html
* https://bugzilla.suse.com/show_bug.cgi?id=1204171
* https://bugzilla.suse.com/show_bug.cgi?id=1205796
* https://bugzilla.suse.com/show_bug.cgi?id=1206188
* https://bugzilla.suse.com/show_bug.cgi?id=1206344
* https://bugzilla.suse.com/show_bug.cgi?id=1209290
* https://bugzilla.suse.com/show_bug.cgi?id=1210449
* https://bugzilla.suse.com/show_bug.cgi?id=1210627
* https://bugzilla.suse.com/show_bug.cgi?id=1213034
* https://bugzilla.suse.com/show_bug.cgi?id=1216813
* https://bugzilla.suse.com/show_bug.cgi?id=1218562
* https://bugzilla.suse.com/show_bug.cgi?id=1223384
* https://bugzilla.suse.com/show_bug.cgi?id=1223524
* https://bugzilla.suse.com/show_bug.cgi?id=1223824
* https://bugzilla.suse.com/show_bug.cgi?id=1225189
* https://bugzilla.suse.com/show_bug.cgi?id=1225336
* https://bugzilla.suse.com/show_bug.cgi?id=1225611
* https://bugzilla.suse.com/show_bug.cgi?id=1225762
* https://bugzilla.suse.com/show_bug.cgi?id=1226498
* https://bugzilla.suse.com/show_bug.cgi?id=1226797
* https://bugzilla.suse.com/show_bug.cgi?id=1227437
* https://bugzilla.suse.com/show_bug.cgi?id=1227885
* https://bugzilla.suse.com/show_bug.cgi?id=1228119
* https://bugzilla.suse.com/show_bug.cgi?id=1228269
* https://bugzilla.suse.com/show_bug.cgi?id=1228709
* https://bugzilla.suse.com/show_bug.cgi?id=1228743
* https://bugzilla.suse.com/show_bug.cgi?id=1229005
* https://bugzilla.suse.com/show_bug.cgi?id=1229019
* https://bugzilla.suse.com/show_bug.cgi?id=1229450
* https://bugzilla.suse.com/show_bug.cgi?id=1229454
* https://bugzilla.suse.com/show_bug.cgi?id=1229456
* https://bugzilla.suse.com/show_bug.cgi?id=1229556
* https://bugzilla.suse.com/show_bug.cgi?id=1229769
* https://bugzilla.suse.com/show_bug.cgi?id=1229837
* https://bugzilla.suse.com/show_bug.cgi?id=1230179
* https://bugzilla.suse.com/show_bug.cgi?id=1230405
* https://bugzilla.suse.com/show_bug.cgi?id=1230414
* https://bugzilla.suse.com/show_bug.cgi?id=1230429
* https://bugzilla.suse.com/show_bug.cgi?id=1230456
* https://bugzilla.suse.com/show_bug.cgi?id=1230600
* https://bugzilla.suse.com/show_bug.cgi?id=1230620
* https://bugzilla.suse.com/show_bug.cgi?id=1230715
* https://bugzilla.suse.com/show_bug.cgi?id=1230722
* https://bugzilla.suse.com/show_bug.cgi?id=1230773
* https://bugzilla.suse.com/show_bug.cgi?id=1230801
* https://bugzilla.suse.com/show_bug.cgi?id=1230903
* https://bugzilla.suse.com/show_bug.cgi?id=1230918
* https://bugzilla.suse.com/show_bug.cgi?id=1231016
* https://bugzilla.suse.com/show_bug.cgi?id=1231072
* https://bugzilla.suse.com/show_bug.cgi?id=1231073
* https://bugzilla.suse.com/show_bug.cgi?id=1231094
* https://bugzilla.suse.com/show_bug.cgi?id=1231096
* https://bugzilla.suse.com/show_bug.cgi?id=1231105
* https://bugzilla.suse.com/show_bug.cgi?id=1231114
* https://bugzilla.suse.com/show_bug.cgi?id=1231148
* https://bugzilla.suse.com/show_bug.cgi?id=1231179
* https://bugzilla.suse.com/show_bug.cgi?id=1231191
* https://bugzilla.suse.com/show_bug.cgi?id=1231193
* https://bugzilla.suse.com/show_bug.cgi?id=1231195
* https://bugzilla.suse.com/show_bug.cgi?id=1231197
* https://bugzilla.suse.com/show_bug.cgi?id=1231200
* https://bugzilla.suse.com/show_bug.cgi?id=1231203
* https://bugzilla.suse.com/show_bug.cgi?id=1231293
* https://bugzilla.suse.com/show_bug.cgi?id=1231344
* https://bugzilla.suse.com/show_bug.cgi?id=1231375
* https://bugzilla.suse.com/show_bug.cgi?id=1231383
* https://bugzilla.suse.com/show_bug.cgi?id=1231439
* https://bugzilla.suse.com/show_bug.cgi?id=1231442
* https://bugzilla.suse.com/show_bug.cgi?id=1231496
* https://bugzilla.suse.com/show_bug.cgi?id=1231502
* https://bugzilla.suse.com/show_bug.cgi?id=1231539
* https://bugzilla.suse.com/show_bug.cgi?id=1231540
* https://bugzilla.suse.com/show_bug.cgi?id=1231578
* https://bugzilla.suse.com/show_bug.cgi?id=1231673
* https://bugzilla.suse.com/show_bug.cgi?id=1231857
* https://bugzilla.suse.com/show_bug.cgi?id=1231861
* https://bugzilla.suse.com/show_bug.cgi?id=1231872
* https://bugzilla.suse.com/show_bug.cgi?id=1231883
* https://bugzilla.suse.com/show_bug.cgi?id=1231885
* https://bugzilla.suse.com/show_bug.cgi?id=1231887
* https://bugzilla.suse.com/show_bug.cgi?id=1231888
* https://bugzilla.suse.com/show_bug.cgi?id=1231889
* https://bugzilla.suse.com/show_bug.cgi?id=1231890
* https://bugzilla.suse.com/show_bug.cgi?id=1231892
* https://bugzilla.suse.com/show_bug.cgi?id=1231893
* https://bugzilla.suse.com/show_bug.cgi?id=1231895
* https://bugzilla.suse.com/show_bug.cgi?id=1231896
* https://bugzilla.suse.com/show_bug.cgi?id=1231897
* https://bugzilla.suse.com/show_bug.cgi?id=1231902
* https://bugzilla.suse.com/show_bug.cgi?id=1231903
* https://bugzilla.suse.com/show_bug.cgi?id=1231907
* https://bugzilla.suse.com/show_bug.cgi?id=1231914
* https://bugzilla.suse.com/show_bug.cgi?id=1231929
* https://bugzilla.suse.com/show_bug.cgi?id=1231935
* https://bugzilla.suse.com/show_bug.cgi?id=1231936
* https://bugzilla.suse.com/show_bug.cgi?id=1231937
* https://bugzilla.suse.com/show_bug.cgi?id=1231938
* https://bugzilla.suse.com/show_bug.cgi?id=1231939
* https://bugzilla.suse.com/show_bug.cgi?id=1231940
* https://bugzilla.suse.com/show_bug.cgi?id=1231941
* https://bugzilla.suse.com/show_bug.cgi?id=1231942
* https://bugzilla.suse.com/show_bug.cgi?id=1231944
* https://bugzilla.suse.com/show_bug.cgi?id=1231950
* https://bugzilla.suse.com/show_bug.cgi?id=1231954
* https://bugzilla.suse.com/show_bug.cgi?id=1231958
* https://bugzilla.suse.com/show_bug.cgi?id=1231960
* https://bugzilla.suse.com/show_bug.cgi?id=1231961
* https://bugzilla.suse.com/show_bug.cgi?id=1231962
* https://bugzilla.suse.com/show_bug.cgi?id=1231965
* https://bugzilla.suse.com/show_bug.cgi?id=1231967
* https://bugzilla.suse.com/show_bug.cgi?id=1231968
* https://bugzilla.suse.com/show_bug.cgi?id=1231972
* https://bugzilla.suse.com/show_bug.cgi?id=1231973
* https://bugzilla.suse.com/show_bug.cgi?id=1231976
* https://bugzilla.suse.com/show_bug.cgi?id=1231979
* https://bugzilla.suse.com/show_bug.cgi?id=1231987
* https://bugzilla.suse.com/show_bug.cgi?id=1231988
* https://bugzilla.suse.com/show_bug.cgi?id=1231990
* https://bugzilla.suse.com/show_bug.cgi?id=1231992
* https://bugzilla.suse.com/show_bug.cgi?id=1231995
* https://bugzilla.suse.com/show_bug.cgi?id=1231996
* https://bugzilla.suse.com/show_bug.cgi?id=1231997
* https://bugzilla.suse.com/show_bug.cgi?id=1231998
* https://bugzilla.suse.com/show_bug.cgi?id=1232001
* https://bugzilla.suse.com/show_bug.cgi?id=1232004
* https://bugzilla.suse.com/show_bug.cgi?id=1232005
* https://bugzilla.suse.com/show_bug.cgi?id=1232006
* https://bugzilla.suse.com/show_bug.cgi?id=1232007
* https://bugzilla.suse.com/show_bug.cgi?id=1232025
* https://bugzilla.suse.com/show_bug.cgi?id=1232026
* https://bugzilla.suse.com/show_bug.cgi?id=1232033
* https://bugzilla.suse.com/show_bug.cgi?id=1232034
* https://bugzilla.suse.com/show_bug.cgi?id=1232035
* https://bugzilla.suse.com/show_bug.cgi?id=1232036
* https://bugzilla.suse.com/show_bug.cgi?id=1232037
* https://bugzilla.suse.com/show_bug.cgi?id=1232038
* https://bugzilla.suse.com/show_bug.cgi?id=1232039
* https://bugzilla.suse.com/show_bug.cgi?id=1232043
* https://bugzilla.suse.com/show_bug.cgi?id=1232049
* https://bugzilla.suse.com/show_bug.cgi?id=1232067
* https://bugzilla.suse.com/show_bug.cgi?id=1232069
* https://bugzilla.suse.com/show_bug.cgi?id=1232070
* https://bugzilla.suse.com/show_bug.cgi?id=1232071
* https://bugzilla.suse.com/show_bug.cgi?id=1232075
* https://bugzilla.suse.com/show_bug.cgi?id=1232083
* https://bugzilla.suse.com/show_bug.cgi?id=1232084
* https://bugzilla.suse.com/show_bug.cgi?id=1232085
* https://bugzilla.suse.com/show_bug.cgi?id=1232089
* https://bugzilla.suse.com/show_bug.cgi?id=1232097
* https://bugzilla.suse.com/show_bug.cgi?id=1232104
* https://bugzilla.suse.com/show_bug.cgi?id=1232105
* https://bugzilla.suse.com/show_bug.cgi?id=1232108
* https://bugzilla.suse.com/show_bug.cgi?id=1232114
* https://bugzilla.suse.com/show_bug.cgi?id=1232116
* https://bugzilla.suse.com/show_bug.cgi?id=1232119
* https://bugzilla.suse.com/show_bug.cgi?id=1232120
* https://bugzilla.suse.com/show_bug.cgi?id=1232123
* https://bugzilla.suse.com/show_bug.cgi?id=1232124
* https://bugzilla.suse.com/show_bug.cgi?id=1232133
* https://bugzilla.suse.com/show_bug.cgi?id=1232135
* https://bugzilla.suse.com/show_bug.cgi?id=1232136
* https://bugzilla.suse.com/show_bug.cgi?id=1232140
* https://bugzilla.suse.com/show_bug.cgi?id=1232145
* https://bugzilla.suse.com/show_bug.cgi?id=1232149
* https://bugzilla.suse.com/show_bug.cgi?id=1232150
* https://bugzilla.suse.com/show_bug.cgi?id=1232151
* https://bugzilla.suse.com/show_bug.cgi?id=1232154
* https://bugzilla.suse.com/show_bug.cgi?id=1232155
* https://bugzilla.suse.com/show_bug.cgi?id=1232160
* https://bugzilla.suse.com/show_bug.cgi?id=1232163
* https://bugzilla.suse.com/show_bug.cgi?id=1232164
* https://bugzilla.suse.com/show_bug.cgi?id=1232170
* https://bugzilla.suse.com/show_bug.cgi?id=1232172
* https://bugzilla.suse.com/show_bug.cgi?id=1232174
* https://bugzilla.suse.com/show_bug.cgi?id=1232175
* https://bugzilla.suse.com/show_bug.cgi?id=1232191
* https://bugzilla.suse.com/show_bug.cgi?id=1232196
* https://bugzilla.suse.com/show_bug.cgi?id=1232199
* https://bugzilla.suse.com/show_bug.cgi?id=1232200
* https://bugzilla.suse.com/show_bug.cgi?id=1232201
* https://bugzilla.suse.com/show_bug.cgi?id=1232217
* https://bugzilla.suse.com/show_bug.cgi?id=1232220
* https://bugzilla.suse.com/show_bug.cgi?id=1232221
* https://bugzilla.suse.com/show_bug.cgi?id=1232229
* https://bugzilla.suse.com/show_bug.cgi?id=1232233
* https://bugzilla.suse.com/show_bug.cgi?id=1232237
* https://bugzilla.suse.com/show_bug.cgi?id=1232251
* https://bugzilla.suse.com/show_bug.cgi?id=1232253
* https://bugzilla.suse.com/show_bug.cgi?id=1232259
* https://bugzilla.suse.com/show_bug.cgi?id=1232260
* https://bugzilla.suse.com/show_bug.cgi?id=1232262
* https://bugzilla.suse.com/show_bug.cgi?id=1232263
* https://bugzilla.suse.com/show_bug.cgi?id=1232282
* https://bugzilla.suse.com/show_bug.cgi?id=1232285
* https://bugzilla.suse.com/show_bug.cgi?id=1232286
* https://bugzilla.suse.com/show_bug.cgi?id=1232304
* https://bugzilla.suse.com/show_bug.cgi?id=1232305
* https://bugzilla.suse.com/show_bug.cgi?id=1232307
* https://bugzilla.suse.com/show_bug.cgi?id=1232309
* https://bugzilla.suse.com/show_bug.cgi?id=1232310
* https://bugzilla.suse.com/show_bug.cgi?id=1232313
* https://bugzilla.suse.com/show_bug.cgi?id=1232314
* https://bugzilla.suse.com/show_bug.cgi?id=1232316
* https://bugzilla.suse.com/show_bug.cgi?id=1232329
* https://bugzilla.suse.com/show_bug.cgi?id=1232332
* https://bugzilla.suse.com/show_bug.cgi?id=1232335
* https://bugzilla.suse.com/show_bug.cgi?id=1232337
* https://bugzilla.suse.com/show_bug.cgi?id=1232342
* https://bugzilla.suse.com/show_bug.cgi?id=1232345
* https://bugzilla.suse.com/show_bug.cgi?id=1232352
* https://bugzilla.suse.com/show_bug.cgi?id=1232354
* https://bugzilla.suse.com/show_bug.cgi?id=1232355
* https://bugzilla.suse.com/show_bug.cgi?id=1232358
* https://bugzilla.suse.com/show_bug.cgi?id=1232361
* https://bugzilla.suse.com/show_bug.cgi?id=1232366
* https://bugzilla.suse.com/show_bug.cgi?id=1232367
* https://bugzilla.suse.com/show_bug.cgi?id=1232368
* https://bugzilla.suse.com/show_bug.cgi?id=1232369
* https://bugzilla.suse.com/show_bug.cgi?id=1232374
* https://bugzilla.suse.com/show_bug.cgi?id=1232381
* https://bugzilla.suse.com/show_bug.cgi?id=1232383
* https://bugzilla.suse.com/show_bug.cgi?id=1232392
* https://bugzilla.suse.com/show_bug.cgi?id=1232395
* https://bugzilla.suse.com/show_bug.cgi?id=1232418
* https://bugzilla.suse.com/show_bug.cgi?id=1232424
* https://bugzilla.suse.com/show_bug.cgi?id=1232432
* https://bugzilla.suse.com/show_bug.cgi?id=1232435
* https://bugzilla.suse.com/show_bug.cgi?id=1232442
* https://bugzilla.suse.com/show_bug.cgi?id=1232446
* https://bugzilla.suse.com/show_bug.cgi?id=1232501
* https://bugzilla.suse.com/show_bug.cgi?id=1232519
* https://bugzilla.suse.com/show_bug.cgi?id=1232630
* https://bugzilla.suse.com/show_bug.cgi?id=1232631
* https://bugzilla.suse.com/show_bug.cgi?id=1232632
* https://bugzilla.suse.com/show_bug.cgi?id=1232757



SUSE-SU-2024:3984-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:3984-1
Release Date: 2024-11-13T10:13:14Z
Rating: important
References:

* bsc#1065729
* bsc#1194869
* bsc#1217845
* bsc#1218562
* bsc#1219596
* bsc#1219803
* bsc#1220382
* bsc#1223384
* bsc#1223700
* bsc#1223824
* bsc#1223848
* bsc#1224088
* bsc#1224574
* bsc#1225611
* bsc#1226003
* bsc#1226498
* bsc#1226623
* bsc#1226631
* bsc#1226797
* bsc#1226848
* bsc#1228119
* bsc#1228244
* bsc#1228269
* bsc#1228410
* bsc#1228454
* bsc#1228537
* bsc#1228620
* bsc#1228743
* bsc#1228747
* bsc#1228857
* bsc#1229019
* bsc#1229429
* bsc#1229450
* bsc#1229585
* bsc#1229677
* bsc#1229769
* bsc#1229808
* bsc#1229891
* bsc#1230055
* bsc#1230132
* bsc#1230179
* bsc#1230220
* bsc#1230289
* bsc#1230295
* bsc#1230339
* bsc#1230341
* bsc#1230375
* bsc#1230414
* bsc#1230429
* bsc#1230456
* bsc#1230501
* bsc#1230527
* bsc#1230550
* bsc#1230600
* bsc#1230620
* bsc#1230710
* bsc#1230762
* bsc#1230763
* bsc#1230773
* bsc#1230774
* bsc#1230801
* bsc#1230831
* bsc#1230914
* bsc#1230918
* bsc#1231016
* bsc#1231035
* bsc#1231072
* bsc#1231073
* bsc#1231075
* bsc#1231081
* bsc#1231082
* bsc#1231083
* bsc#1231084
* bsc#1231085
* bsc#1231087
* bsc#1231089
* bsc#1231092
* bsc#1231093
* bsc#1231094
* bsc#1231096
* bsc#1231098
* bsc#1231100
* bsc#1231101
* bsc#1231102
* bsc#1231105
* bsc#1231108
* bsc#1231111
* bsc#1231114
* bsc#1231115
* bsc#1231116
* bsc#1231117
* bsc#1231131
* bsc#1231132
* bsc#1231135
* bsc#1231136
* bsc#1231138
* bsc#1231148
* bsc#1231169
* bsc#1231170
* bsc#1231171
* bsc#1231178
* bsc#1231179
* bsc#1231183
* bsc#1231187
* bsc#1231191
* bsc#1231193
* bsc#1231195
* bsc#1231197
* bsc#1231200
* bsc#1231202
* bsc#1231203
* bsc#1231276
* bsc#1231293
* bsc#1231384
* bsc#1231434
* bsc#1231435
* bsc#1231436
* bsc#1231439
* bsc#1231440
* bsc#1231441
* bsc#1231442
* bsc#1231452
* bsc#1231474
* bsc#1231481
* bsc#1231496
* bsc#1231502
* bsc#1231537
* bsc#1231539
* bsc#1231540
* bsc#1231541
* bsc#1231617
* bsc#1231634
* bsc#1231635
* bsc#1231636
* bsc#1231637
* bsc#1231638
* bsc#1231639
* bsc#1231640
* bsc#1231673
* bsc#1231828
* bsc#1231849
* bsc#1231855
* bsc#1231856
* bsc#1231857
* bsc#1231858
* bsc#1231859
* bsc#1231860
* bsc#1231861
* bsc#1231864
* bsc#1231865
* bsc#1231868
* bsc#1231869
* bsc#1231871
* bsc#1231872
* bsc#1231901
* bsc#1231902
* bsc#1231903
* bsc#1231904
* bsc#1231906
* bsc#1231907
* bsc#1231908
* bsc#1231914
* bsc#1231916
* bsc#1231924
* bsc#1231926
* bsc#1231931
* bsc#1231935
* bsc#1231942
* bsc#1231944
* bsc#1231947
* bsc#1231950
* bsc#1231951
* bsc#1231953
* bsc#1231954
* bsc#1231955
* bsc#1231956
* bsc#1231957
* bsc#1231965
* bsc#1231967
* bsc#1231968
* bsc#1231987
* bsc#1231988
* bsc#1231989
* bsc#1231990
* bsc#1231998
* bsc#1232000
* bsc#1232003
* bsc#1232009
* bsc#1232013
* bsc#1232015
* bsc#1232016
* bsc#1232017
* bsc#1232018
* bsc#1232033
* bsc#1232034
* bsc#1232036
* bsc#1232043
* bsc#1232047
* bsc#1232048
* bsc#1232049
* bsc#1232050
* bsc#1232056
* bsc#1232075
* bsc#1232076
* bsc#1232079
* bsc#1232080
* bsc#1232083
* bsc#1232084
* bsc#1232085
* bsc#1232089
* bsc#1232093
* bsc#1232094
* bsc#1232097
* bsc#1232098
* bsc#1232105
* bsc#1232109
* bsc#1232111
* bsc#1232114
* bsc#1232116
* bsc#1232117
* bsc#1232124
* bsc#1232126
* bsc#1232127
* bsc#1232129
* bsc#1232130
* bsc#1232131
* bsc#1232132
* bsc#1232134
* bsc#1232135
* bsc#1232140
* bsc#1232141
* bsc#1232142
* bsc#1232145
* bsc#1232147
* bsc#1232148
* bsc#1232149
* bsc#1232151
* bsc#1232152
* bsc#1232154
* bsc#1232155
* bsc#1232156
* bsc#1232159
* bsc#1232160
* bsc#1232162
* bsc#1232164
* bsc#1232174
* bsc#1232180
* bsc#1232182
* bsc#1232183
* bsc#1232185
* bsc#1232187
* bsc#1232189
* bsc#1232192
* bsc#1232195
* bsc#1232196
* bsc#1232199
* bsc#1232200
* bsc#1232201
* bsc#1232208
* bsc#1232217
* bsc#1232218
* bsc#1232220
* bsc#1232221
* bsc#1232222
* bsc#1232232
* bsc#1232250
* bsc#1232251
* bsc#1232253
* bsc#1232254
* bsc#1232255
* bsc#1232256
* bsc#1232259
* bsc#1232260
* bsc#1232262
* bsc#1232263
* bsc#1232275
* bsc#1232279
* bsc#1232282
* bsc#1232285
* bsc#1232287
* bsc#1232295
* bsc#1232305
* bsc#1232307
* bsc#1232309
* bsc#1232310
* bsc#1232312
* bsc#1232313
* bsc#1232314
* bsc#1232315
* bsc#1232316
* bsc#1232317
* bsc#1232329
* bsc#1232332
* bsc#1232333
* bsc#1232334
* bsc#1232335
* bsc#1232337
* bsc#1232339
* bsc#1232340
* bsc#1232342
* bsc#1232345
* bsc#1232349
* bsc#1232352
* bsc#1232354
* bsc#1232355
* bsc#1232359
* bsc#1232362
* bsc#1232369
* bsc#1232370
* bsc#1232378
* bsc#1232381
* bsc#1232383
* bsc#1232392
* bsc#1232394
* bsc#1232395
* bsc#1232417
* bsc#1232418
* bsc#1232424
* bsc#1232427
* bsc#1232432
* bsc#1232435
* bsc#1232501
* bsc#1232502
* bsc#1232503
* bsc#1232504
* bsc#1232505
* bsc#1232506
* bsc#1232507
* bsc#1232511
* bsc#1232519
* bsc#1232520
* bsc#1232529
* bsc#1232552
* bsc#1232623
* bsc#1232626
* bsc#1232627
* bsc#1232628
* bsc#1232629
* bsc#1232757
* bsc#1232768
* bsc#1232819
* jsc#PED-10559
* jsc#PED-10978
* jsc#PED-9899
* jsc#PED-9901

Cross-References:

* CVE-2023-52766
* CVE-2023-52800
* CVE-2023-52881
* CVE-2023-52917
* CVE-2023-52918
* CVE-2023-52919
* CVE-2023-6270
* CVE-2024-26758
* CVE-2024-26761
* CVE-2024-26767
* CVE-2024-26943
* CVE-2024-27026
* CVE-2024-27043
* CVE-2024-35980
* CVE-2024-36244
* CVE-2024-38576
* CVE-2024-38577
* CVE-2024-38599
* CVE-2024-41016
* CVE-2024-41031
* CVE-2024-41047
* CVE-2024-41082
* CVE-2024-42145
* CVE-2024-44932
* CVE-2024-44958
* CVE-2024-44964
* CVE-2024-45016
* CVE-2024-45025
* CVE-2024-46678
* CVE-2024-46721
* CVE-2024-46754
* CVE-2024-46766
* CVE-2024-46770
* CVE-2024-46775
* CVE-2024-46777
* CVE-2024-46797
* CVE-2024-46802
* CVE-2024-46803
* CVE-2024-46804
* CVE-2024-46805
* CVE-2024-46806
* CVE-2024-46807
* CVE-2024-46809
* CVE-2024-46810
* CVE-2024-46811
* CVE-2024-46812
* CVE-2024-46813
* CVE-2024-46814
* CVE-2024-46815
* CVE-2024-46816
* CVE-2024-46817
* CVE-2024-46818
* CVE-2024-46819
* CVE-2024-46821
* CVE-2024-46825
* CVE-2024-46826
* CVE-2024-46827
* CVE-2024-46828
* CVE-2024-46830
* CVE-2024-46831
* CVE-2024-46834
* CVE-2024-46835
* CVE-2024-46836
* CVE-2024-46840
* CVE-2024-46841
* CVE-2024-46842
* CVE-2024-46843
* CVE-2024-46846
* CVE-2024-46848
* CVE-2024-46849
* CVE-2024-46851
* CVE-2024-46852
* CVE-2024-46853
* CVE-2024-46854
* CVE-2024-46855
* CVE-2024-46857
* CVE-2024-46859
* CVE-2024-46860
* CVE-2024-46861
* CVE-2024-46864
* CVE-2024-46870
* CVE-2024-46871
* CVE-2024-47658
* CVE-2024-47660
* CVE-2024-47661
* CVE-2024-47662
* CVE-2024-47663
* CVE-2024-47664
* CVE-2024-47665
* CVE-2024-47667
* CVE-2024-47668
* CVE-2024-47669
* CVE-2024-47670
* CVE-2024-47671
* CVE-2024-47672
* CVE-2024-47673
* CVE-2024-47674
* CVE-2024-47675
* CVE-2024-47681
* CVE-2024-47682
* CVE-2024-47684
* CVE-2024-47685
* CVE-2024-47686
* CVE-2024-47687
* CVE-2024-47688
* CVE-2024-47692
* CVE-2024-47693
* CVE-2024-47695
* CVE-2024-47696
* CVE-2024-47697
* CVE-2024-47698
* CVE-2024-47699
* CVE-2024-47702
* CVE-2024-47704
* CVE-2024-47705
* CVE-2024-47706
* CVE-2024-47707
* CVE-2024-47709
* CVE-2024-47710
* CVE-2024-47712
* CVE-2024-47713
* CVE-2024-47714
* CVE-2024-47715
* CVE-2024-47718
* CVE-2024-47719
* CVE-2024-47720
* CVE-2024-47723
* CVE-2024-47727
* CVE-2024-47728
* CVE-2024-47730
* CVE-2024-47731
* CVE-2024-47732
* CVE-2024-47735
* CVE-2024-47737
* CVE-2024-47738
* CVE-2024-47739
* CVE-2024-47741
* CVE-2024-47742
* CVE-2024-47743
* CVE-2024-47744
* CVE-2024-47745
* CVE-2024-47747
* CVE-2024-47748
* CVE-2024-47749
* CVE-2024-47750
* CVE-2024-47751
* CVE-2024-47752
* CVE-2024-47753
* CVE-2024-47754
* CVE-2024-47756
* CVE-2024-47757
* CVE-2024-49850
* CVE-2024-49851
* CVE-2024-49852
* CVE-2024-49853
* CVE-2024-49855
* CVE-2024-49858
* CVE-2024-49860
* CVE-2024-49861
* CVE-2024-49862
* CVE-2024-49863
* CVE-2024-49864
* CVE-2024-49866
* CVE-2024-49867
* CVE-2024-49870
* CVE-2024-49871
* CVE-2024-49874
* CVE-2024-49875
* CVE-2024-49877
* CVE-2024-49878
* CVE-2024-49879
* CVE-2024-49881
* CVE-2024-49882
* CVE-2024-49883
* CVE-2024-49886
* CVE-2024-49888
* CVE-2024-49890
* CVE-2024-49891
* CVE-2024-49892
* CVE-2024-49894
* CVE-2024-49895
* CVE-2024-49896
* CVE-2024-49897
* CVE-2024-49898
* CVE-2024-49900
* CVE-2024-49901
* CVE-2024-49902
* CVE-2024-49903
* CVE-2024-49906
* CVE-2024-49907
* CVE-2024-49908
* CVE-2024-49909
* CVE-2024-49913
* CVE-2024-49914
* CVE-2024-49917
* CVE-2024-49918
* CVE-2024-49919
* CVE-2024-49920
* CVE-2024-49928
* CVE-2024-49929
* CVE-2024-49930
* CVE-2024-49931
* CVE-2024-49935
* CVE-2024-49936
* CVE-2024-49937
* CVE-2024-49938
* CVE-2024-49939
* CVE-2024-49946
* CVE-2024-49947
* CVE-2024-49949
* CVE-2024-49950
* CVE-2024-49953
* CVE-2024-49954
* CVE-2024-49955
* CVE-2024-49957
* CVE-2024-49958
* CVE-2024-49959
* CVE-2024-49960
* CVE-2024-49961
* CVE-2024-49962
* CVE-2024-49963
* CVE-2024-49965
* CVE-2024-49966
* CVE-2024-49967
* CVE-2024-49969
* CVE-2024-49972
* CVE-2024-49973
* CVE-2024-49974
* CVE-2024-49981
* CVE-2024-49982
* CVE-2024-49985
* CVE-2024-49986
* CVE-2024-49991
* CVE-2024-49993
* CVE-2024-49995
* CVE-2024-49996
* CVE-2024-50000
* CVE-2024-50001
* CVE-2024-50002
* CVE-2024-50007
* CVE-2024-50008
* CVE-2024-50013
* CVE-2024-50015
* CVE-2024-50017
* CVE-2024-50019
* CVE-2024-50020
* CVE-2024-50021
* CVE-2024-50022
* CVE-2024-50023
* CVE-2024-50024
* CVE-2024-50025
* CVE-2024-50027
* CVE-2024-50028
* CVE-2024-50031
* CVE-2024-50033
* CVE-2024-50035
* CVE-2024-50040
* CVE-2024-50041
* CVE-2024-50042
* CVE-2024-50044
* CVE-2024-50045
* CVE-2024-50046
* CVE-2024-50047
* CVE-2024-50048
* CVE-2024-50049
* CVE-2024-50055
* CVE-2024-50058
* CVE-2024-50059
* CVE-2024-50060
* CVE-2024-50061
* CVE-2024-50062
* CVE-2024-50063
* CVE-2024-50064
* CVE-2024-50069
* CVE-2024-50073
* CVE-2024-50074
* CVE-2024-50075
* CVE-2024-50076
* CVE-2024-50077
* CVE-2024-50078
* CVE-2024-50080
* CVE-2024-50081

CVSS scores:

* CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52800 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52881 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52917 ( SUSE ): 4.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-52917 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52918 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26767 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-26767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36244 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
* CVE-2024-38576 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38576 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-38577 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38577 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38599 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41031 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41047 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-41082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42145 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44964 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H
* CVE-2024-44964 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46678 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
* CVE-2024-46678 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46754 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46754 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46766 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46797 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46802 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46803 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46803 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46803 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46804 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46804 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-46804 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46805 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46806 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46807 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46809 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46810 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46810 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46811 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46811 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46812 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46813 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46813 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46813 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46814 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46814 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46814 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46815 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46815 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46816 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46816 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46817 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46818 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46818 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46819 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46821 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46825 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-46826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46831 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46831 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46836 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46842 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46843 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46849 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46851 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46854 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46854 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46870 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46870 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46870 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46871 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46871 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-46871 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47658 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47658 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47660 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47660 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47660 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47661 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47661 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-47661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47662 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-47662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47663 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47664 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47664 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47664 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47665 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47665 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47667 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-47667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47668 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47668 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-47668 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47669 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47669 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-47669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47670 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47670 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47671 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-47671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-47672 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47673 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47674 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47675 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47675 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47681 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47682 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47682 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47682 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47684 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47685 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47685 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-47685 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47686 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47686 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-47686 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47687 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47688 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47688 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47692 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47692 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47693 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47693 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-47693 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47695 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47695 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47696 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47696 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47697 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47697 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47697 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47698 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47698 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47699 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47702 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47704 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47704 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47705 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47706 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47706 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47707 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47709 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47710 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47710 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47710 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47714 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47715 ( SUSE ): 7.1
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47715 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47718 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47719 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47719 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-47719 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47720 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47723 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47723 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47727 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47731 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47731 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47732 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47737 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47737 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47738 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47739 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47741 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47741 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47741 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47742 ( SUSE ): 8.3
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47742 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-47742 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47743 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47743 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47744 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47744 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47745 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47745 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47745 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47747 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47747 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47747 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47748 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47748 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47748 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47749 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47750 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47750 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47750 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47751 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47751 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47752 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47753 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47754 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47754 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47756 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47757 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47757 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47757 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49850 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49851 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49852 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49853 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49853 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49855 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49858 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49858 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-49858 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49860 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49860 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49860 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49861 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2024-49861 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-49861 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-49862 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49862 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49862 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49863 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49864 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49864 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49866 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49866 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49867 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49867 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49867 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49870 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-49870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49871 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49874 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49874 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49874 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49875 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49875 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-49875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-49877 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49878 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-49878 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-49879 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49888 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49890 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49891 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49892 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49892 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49894 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49894 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49894 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49895 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-49895 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49896 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49896 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49897 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49898 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49900 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49900 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49900 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49901 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49902 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49902 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49903 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49903 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49903 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49906 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49907 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49909 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49913 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49914 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49917 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49918 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49919 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49920 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49928 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49928 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49928 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49929 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49930 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49931 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49931 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49935 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49936 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49936 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49937 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49938 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49939 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49954 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49955 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49960 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49960 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49960 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49962 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49969 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49969 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49972 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49972 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49974 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49974 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49974 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49981 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49982 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49991 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49993 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49993 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-49993 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49995 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49995 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-49995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49996 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50007 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50007 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50007 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50008 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50008 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50022 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50023 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50024 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50027 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50033 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50035 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50035 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50035 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50040 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50041 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50044 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50049 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50059 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50059 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50060 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50061 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50063 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50063 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50073 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50075 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50076 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50078 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.6
* Public Cloud Module 15-SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves 282 vulnerabilities, contains four features and has 59
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

* CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to
entire cycle too (bsc#1226797).
* CVE-2024-41031: mm/filemap: skip to create PMD-sized page cache if needed
(bsc#1228454).
* CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command
(bsc#1228620).
* CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc
(bsc#1230179).
* CVE-2024-45016: netem: fix return value if duplicate enqueue fails
(bsc#1230429).
* CVE-2024-45025: fix bitmap corruption on close_range() with
CLOSE_RANGE_UNSHARE (bsc#1230456).
* CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex
(bsc#1230550).
* CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710)
* CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops
(bsc#1230801).
* CVE-2024-46766: ice: move netif_queue_set_napi to rtnl-protected sections
(bsc#1230762).
* CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow
(bsc#1230763).
* CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774).
* CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773).
* CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links
(bsc#1231191).
* CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums
greater than max_links (bsc#1231197).
* CVE-2024-46826: ELF: fix kernel.randomize_va_space double read
(bsc#1231115).
* CVE-2024-46828: uprobes: fix kernel info leak via "[uprobes]" vma
(bsc#1231114).
* CVE-2024-46831: net: microchip: vcap: Fix use-after-free error in kunit test
(bsc#1231117).
* CVE-2024-46834: ethtool: fail closed if we can't get max channel used in
indirection tables (bsc#1231096).
* CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete
(bsc#1231105).
* CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from
btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094).
* CVE-2024-46843: scsi: ufs: core: Remove SCSI host only if added
(bsc#1231100).
* CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084).
* CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085).
* CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs
(bsc#1231087).
* CVE-2024-46870: drm/amd/display: Disable DMCUB timeout for DCN35
(bsc#1231435).
* CVE-2024-47658: crypto: stm32/cryp - call finalize with bh disabled
(bsc#1231436).
* CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439).
* CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency
provided by the firmware (bsc#1231442).
* CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case
(bsc#1231673).
* CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us()
(bsc#1231987).
* CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
(bsc#1231998).
* CVE-2024-47687: vdpa/mlx5: Fix invalid mr resource destroy (bsc#1232003).
* CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857).
* CVE-2024-47704: drm/amd/display: Check link_res->hpo_dp_link_enc before
using it (bsc#1231944).
* CVE-2024-47705: block: fix potential invalid pointer dereference in
blk_add_partition (bsc#1231872).
* CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain
(bsc#1231942).
* CVE-2024-47707: ipv6: avoid possible NULL deref in
rt6_uncached_list_flush_dev() (bsc#1231935).
* CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free()
(bsc#1232049).
* CVE-2024-47727: x86/tdx: Fix "in-kernel MMIO" check (bsc#1232116).
* CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue
(bsc#1232075).
* CVE-2024-47731: drivers/perf: Fix ali_drw_pmu driver interrupt status
clearing (bsc#1232117).
* CVE-2024-47739: padata: use integer wrap around to prevent deadlock on
seq_nr overflow (bsc#1232124).
* CVE-2024-47741: btrfs: fix race setting file private on concurrent lseek
using same fd (bsc#1231869).
* CVE-2024-47745: mm: split critical region in remap_file_pages() and invoke
LSMs in between (bsc#1232135).
* CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver
Due to Race Condition (bsc#1232145).
* CVE-2024-47752: media: mediatek: vcodec: Fix H264 stateless decoder smatch
warning (bsc#1232130).
* CVE-2024-47753: media: mediatek: vcodec: Fix VP8 stateless decoder smatch
warning (bsc#1231868).
* CVE-2024-47754: media: mediatek: vcodec: Fix H264 multi stateless decoder
smatch warning (bsc#1232131).
* CVE-2024-49852: scsi: elx: libefc: Fix potential use after free in
efc_nport_vport_del() (bsc#1232819).
* CVE-2024-49864: rxrpc: Fix a race between socket set up and I/O thread
creation (bsc#1232256).
* CVE-2024-49867: btrfs: wait for fixup workers before stopping cleaner
kthread during umount (bsc#1232262).
* CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201).
* CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path
(bsc#1232200).
* CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent()
(bsc#1232199).
* CVE-2024-49888: bpf: Fix a sdiv overflow issue (bsc#1232208).
* CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it
(bsc#1232217).
* CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default
to 1 (bsc#1232220).
* CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware
format translation (bsc#1232354).
* CVE-2024-49895: drm/amd/display: Fix index out of bounds in DCN30 degamma
hardware format translation (bsc#1232352).
* CVE-2024-49896: drm/amd/display: Check stream before comparing them
(bsc#1232221).
* CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used
(bsc#1232355).
* CVE-2024-49898: drm/amd/display: Check null-initialized variables
(bsc#1232222).
* CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid
nullptrs (bsc#1232305).
* CVE-2024-49906: drm/amd/display: Check null pointer before try to access it
(bsc#1232332).
* CVE-2024-49907: drm/amd/display: Check null pointers before using
dc->clk_mgr (bsc#1232334).
* CVE-2024-49908: drm/amd/display: Add null check for 'afb' in
amdgpu_dm_update_cursor (bsc#1232335).
* CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in
dcn32_set_output_transfer_func (bsc#1232337).
* CVE-2024-49913: drm/amd/display: Add null check for top_pipe_to_program in
commit_planes_for_stream (bsc#1232307).
* CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx->plane_state in
(bsc#1232369).
* CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and
clk_mgr->funcs in dcn30_init_hw (bsc#1231965).
* CVE-2024-49918: drm/amd/display: Add null check for head_pipe in
dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967).
* CVE-2024-49919: drm/amd/display: Add null check for head_pipe in
dcn201_acquire_free_pipe_for_layer (bsc#1231968).
* CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses
(bsc#1232313).
* CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash()
(bsc#1232424).
* CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input()
(bsc#1232164).
* CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with
UFO (bsc#1232160).
* CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).
* CVE-2024-49953: net/mlx5e: Fix crash caused by calling __xfrm_state_delete()
twice (bsc#1232156).
* CVE-2024-49954: static_call: Replace pointless WARN_ON() in
static_call_module_notify() (bsc#1232155).
* CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching
reflink tree (bsc#1232151).
* CVE-2024-49959: jbd2: stop waiting for space when
jbd2_cleanup_journal_tail() returns error (bsc#1232149).
* CVE-2024-49960: ext4: fix timer use-after-free on failed mount
(bsc#1232395).
* CVE-2024-49967: ext4: no need to continue when the number of entries is 1
(bsc#1232140).
* CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color
transformation (bsc#1232519).
* CVE-2024-49972: drm/amd/display: Deallocate DML memory if allocation fails
(bsc#1232315).
* CVE-2024-49973: r8169: add tally counter fields added with RTL8125
(bsc#1232105).
* CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous
(bsc#1232383).
* CVE-2024-49986: platform/x86: x86-android-tablets: Fix use after free on
platform_device_register() errors (bsc#1232093).
* CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer
(bsc#1232282).
* CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called
with 0 count (bsc#1232316).
* CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).
* CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points
(bsc#1232089).
* CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc()
(bsc#1232085).
* CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit
(bsc#1232084).
* CVE-2024-50002: static_call: Handle module init failure correctly in
static_call_del_module() (bsc#1232083).
* CVE-2024-50015: ext4: dax: fix overflowing extents beyond inode size when
partially writing (bsc#1232079).
* CVE-2024-50020: ice: Fix improper handling of refcount in
ice_sriov_set_msix_vec_count() (bsc#1231989).
* CVE-2024-50021: ice: Fix improper handling of refcount in
ice_dpll_init_rclk_pins() (bsc#1231957).
* CVE-2024-50022: device-dax: correct pgoff align in dax_set_mapping()
(bsc#1231956).
* CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954).
* CVE-2024-50027: thermal: core: Free tzp copy along with the thermal zone
(bsc#1231951).
* CVE-2024-50028: thermal: core: Reference count the zone in
thermal_zone_get_by_id() (bsc#1231950).
* CVE-2024-50033: slip: make slhc_remember() more robust against malicious
packets (bsc#1231914).
* CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392).
* CVE-2024-50040: igb: Do not bring the device up after non-fatal error
(bsc#1231908).
* CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to
mac_filter_hash (bsc#1231907).
* CVE-2024-50042: ice: Fix increasing MSI-X on VF (bsc#1231906).
* CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb
(bsc#1231903).
* CVE-2024-50046: kabi fix for NFSv4: Prevent NULL-pointer dereference in
nfs42_complete_copies() (bsc#1231902).
* CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).
* CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in
switchtec_ntb_remove due to race condition (bsc#1232345).
* CVE-2024-50060: io_uring: check if we need to reschedule during overflow
flush (bsc#1232417).
* CVE-2024-50063: kABI: bpf: struct bpf_map kABI workaround (bsc#1232435).
* CVE-2024-50064: zram: do not free statically defined names (bsc#1231901).
* CVE-2024-50080: ublk: do not allow user copy for unprivileged device
(bsc#1232502).
* CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx
(bsc#1232501).

The following non-security bugs were fixed:

* 9p: explicitly deny setlease attempts (git-fixes).
* ACPI: CPPC: Add support for setting EPP register in FFH (stable-fixes).
* ACPI: CPPC: Make rmw_lock a raw_spin_lock (git-fixes).
* ACPI: EC: Do not release locks during operation region accesses (stable-
fixes).
* ACPI: PAD: fix crash in exit_round_robin() (stable-fixes).
* ACPI: PRM: Clean up guid type in struct prm_handler_info (git-fixes).
* ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context (git-
fixes).
* ACPI: battery: Fix possible crash when unregistering a battery hook (git-
fixes).
* ACPI: battery: Simplify battery hook locking (stable-fixes).
* ACPI: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid
detection issue (stable-fixes).
* ACPI: resource: Add Asus ExpertBook B2502CVA to
irq1_level_low_skip_override[] (stable-fixes).
* ACPI: resource: Add Asus Vivobook X1704VAP to irq1_level_low_skip_override[]
(stable-fixes).
* ACPI: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable-
fixes).
* ACPI: resource: Add another DMI match for the TongFang GMxXGxx (stable-
fixes).
* ACPI: video: Add force_vendor quirk for Panasonic Toughbook CF-18 (stable-
fixes).
* ACPICA: Fix memory leak if acpi_ps_get_next_field() fails (stable-fixes).
* ACPICA: Fix memory leak if acpi_ps_get_next_namepath() fails (stable-fixes).
* ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in
acpi_db_convert_to_package() (stable-fixes).
* ACPICA: iasl: handle empty connection_node (stable-fixes).
* ALSA/hda: intel-sdw-acpi: cleanup sdw_intel_scan_controller (stable-fixes).
* ALSA/hda: intel-sdw-acpi: fetch fwnode once in sdw_intel_scan_controller()
(stable-fixes).
* ALSA/hda: intel-sdw-acpi: simplify sdw-master-count property read (stable-
fixes).
* ALSA: Reorganize kerneldoc parameter names (stable-fixes).
* ALSA: asihpi: Fix potential OOB array access (stable-fixes).
* ALSA: core: add isascii() check to card ID generator (stable-fixes).
* ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()
(git-fixes).
* ALSA: hda/conexant - Fix audio routing for HP EliteOne 1000 G2 (stable-
fixes).
* ALSA: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne
1000 G2 (git-fixes).
* ALSA: hda/conexant: Fix conflicting quirk for System76 Pangolin (git-fixes).
* ALSA: hda/conexant: fix some typos (stable-fixes).
* ALSA: hda/cs8409: Fix possible NULL dereference (git-fixes).
* ALSA: hda/generic: Unconditionally prefer preferred_dacs pairs
(bsc#1219803).
* ALSA: hda/realtek: Add a quirk for HP Pavilion 15z-ec200 (stable-fixes).
* ALSA: hda/realtek: Add quirk for Huawei MateBook 13 KLV-WX9 (stable-fixes).
* ALSA: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable-
fixes).
* ALSA: hda/realtek: Add subwoofer quirk for Infinix ZERO BOOK 13 (stable-
fixes).
* ALSA: hda/realtek: Enable mic on Vaio VJFH52 (stable-fixes).
* ALSA: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes).
* ALSA: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable-
fixes).
* ALSA: hda/realtek: Fix the push button function for the ALC257 (git-fixes).
* ALSA: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes).
* ALSA: hda/realtek: Refactor and simplify Samsung Galaxy Book init (stable-
fixes).
* ALSA: hda/realtek: Update default depop procedure (git-fixes).
* ALSA: hda/realtek: fix mute/micmute LED for HP mt645 G8 (stable-fixes).
* ALSA: hda/realtek: tas2781: Fix ROG ALLY X audio (stable-fixes).
* ALSA: hda/tas2781: Add new quirk for Lenovo Y990 Laptop (stable-fixes).
* ALSA: hda/tas2781: Add new quirk for Lenovo, ASUS, Dell projects (stable-
fixes).
* ALSA: hda/tas2781: select CRC32 instead of CRC32_SARWATE (git-fixes).
* ALSA: hda: Sound support for HP Spectre x360 16 inch model 2024 (stable-
fixes).
* ALSA: hda: tas2781: Fix missing setup at runtime PM (bsc#1230132).
* ALSA: hdsp: Break infinite MIDI input flush loop (stable-fixes).
* ALSA: line6: add hw monitor volume control to POD HD500X (stable-fixes).
* ALSA: line6: update contact information (stable-fixes).
* ALSA: mixer_oss: Remove some incorrect kfree_const() usages (git-fixes).
* ALSA: silence integer wrapping warning (stable-fixes).
* ALSA: usb-audio: Add delay quirk for VIVO USB-C HEADSET (stable-fixes).
* ALSA: usb-audio: Add input value sanity checks for standard types (stable-
fixes).
* ALSA: usb-audio: Add logitech Audio profile quirk (stable-fixes).
* ALSA: usb-audio: Add native DSD support for Luxman D-08u (stable-fixes).
* ALSA: usb-audio: Add quirk for HP 320 FHD Webcam (bsc#1232768).
* ALSA: usb-audio: Add quirks for Dell WD19 dock (stable-fixes).
* ALSA: usb-audio: Define macros for quirk table entries (stable-fixes).
* ALSA: usb-audio: Replace complex quirk lines with macros (stable-fixes).
* ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet
(stable-fixes).
* ASoC: Intel: bytcr_rt5640: Add support for non ACPI instantiated codec
(stable-fixes).
* ASoC: Intel: sst: Fix used of uninitialized ctx to log an error (git-fixes).
* ASoC: Intel: sst: Support LPE0F28 ACPI HID (stable-fixes).
* ASoC: amd: yc: Add quirk for HP Dragonfly pro one (stable-fixes).
* ASoC: atmel: mchp-pdmc: Skip ALSA restoration if substream runtime is
uninitialized (git-fixes).
* ASoC: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to
default regs values (stable-fixes).
* ASoC: codecs: rt5640: Always disable IRQs from rt5640_cancel_work() (stable-
fixes).
* ASoC: codecs: wsa883x: Handle reading version failure (stable-fixes).
* ASoC: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes).
* ASoC: dapm: fix bounds checker error in dapm_widget_list_create (git-fixes).
* ASoC: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes).
* ASoC: imx-card: Set card.owner to avoid a warning calltrace if SND=m (git-
fixes).
* ASoC: max98388: Fix missing increment of variable slot_found (git-fixes).
* ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe()
(git-fixes).
* ASoC: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable-
fixes).
* ASoC: tas2781: Use of_property_read_reg() (stable-fixes).
* Bluetooth: Call iso_exit() on module unload (git-fixes).
* Bluetooth: ISO: Fix multiple init when debugfs is disabled (git-fixes).
* Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (git-
fixes).
* Bluetooth: Remove debugfs directory on module init failure (git-fixes).
* Bluetooth: bnep: fix wild-memory-access in proto_unregister (git-fixes).
* Bluetooth: btmrvl: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0489:0xe122 (stable-
fixes).
* Bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001 (git-
fixes).
* Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes).
* Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (git-fixes).
* HID: Ignore battery for all ELAN I2C-HID devices (stable-fixes).
* HID: amd_sfh: Switch to device-managed dmam_alloc_coherent() (git-fixes).
* HID: i2c-hid: Remove I2C_HID_QUIRK_SET_PWR_WAKEUP_DEV quirk (stable-fixes).
* HID: multitouch: Add support for Thinkpad X12 Gen 2 Kbd Portfolio (stable-
fixes).
* HID: multitouch: Add support for lenovo Y9000P Touchpad (stable-fixes).
* HID: plantronics: Workaround for an unexcepted opposite volume key (stable-
fixes).
* Input: adp5589-keys - fix NULL pointer dereference (git-fixes).
* Input: adp5589-keys - fix adp5589_gpio_get_value() (git-fixes).
* Input: edt-ft5x06 - fix regmap leak when probe fails (git-fixes).
* Input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table
(stable-fixes).
* Input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table
(stable-fixes).
* Input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line
(stable-fixes).
* KVM: Fix coalesced_mmio_has_room() to avoid premature userspace exit (git-
fixes).
* KVM: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value
(git-fixes).
* KVM: Use dedicated mutex to protect kvm_usage_count to avoid deadlock (git-
fixes).
* KVM: VMX: Also clear SGX EDECCSSA in KVM CPU caps when SGX is disabled (git-
fixes).
* KVM: VMX: Set PFERR_GUEST_{FINAL,PAGE}_MASK if and only if the GVA is valid
(git-fixes).
* KVM: Write the per-page "segment" when clearing (part of) a guest page (git-
fixes).
* KVM: s390: Change virtual to physical address access in diag 0x258 handler
(git-fixes bsc#1232626).
* KVM: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query
(git-fixes bsc#1231276).
* KVM: s390: gaccess: Check if guest address is in memslot (git-fixes
bsc#1232623).
* KVM: x86/mmu: Skip emulation on page fault iff 1+ SPs were unprotected (git-
fixes).
* KVM: x86/mmu: Trigger unprotect logic only on write-protection page faults
(git-fixes).
* KVM: x86: Dedup fastpath MSR post-handling logic (git-fixes).
* KVM: x86: Enforce x2APIC's must-be-zero reserved ICR bits (git-fixes).
* KVM: x86: Exit to userspace if fastpath triggers one on instruction skip
(git-fixes).
* KVM: x86: Move x2APIC ICR helper above kvm_apic_write_nodecode() (git-
fixes).
* KVM: x86: Re-enter guest if WRMSR(X2APIC_ICR) fastpath is successful (git-
fixes).
* KVM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) (git-fixes).
* NFS: Avoid unnecessary rescanning of the per-server delegation list (git-
fixes).
* NFSD: Fix NFSv4's PUTPUBFH operation (git-fixes).
* NFSD: Mark filecache "down" if init fails (git-fixes).
* NFSv3: only use NFS timeout for MOUNT when protocols are compatible
(bsc#1231016).
* NFSv4: Fix clearing of layout segments in layoutreturn (git-fixes).
* PCI: Add ACS quirk for Qualcomm SA8775P (stable-fixes).
* PCI: Add function 0 DMA alias quirk for Glenfly Arise chip (stable-fixes).
* PCI: Fix pci_enable_acs() support for the ACS quirks (bsc#1229019).
* PCI: Mark Creative Labs EMU20k2 INTx masking as broken (stable-fixes).
* RAS/AMD/ATL: Add amd_atl pr_fmt() prefix (jsc#PED-10559).
* RAS/AMD/ATL: Expand helpers for adding and removing base and hole
(jsc#PED-10559).
* RAS/AMD/ATL: Implement DF 4.5 NP2 denormalization (jsc#PED-10559).
* RAS/AMD/ATL: Read DRAM hole base early (jsc#PED-10559).
* RAS/AMD/ATL: Validate address map when information is gathered
(jsc#PED-10559).
* RDMA/bnxt_re: Add a check for memory allocation (git-fixes)
* RDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop (git-fixes)
* RDMA/bnxt_re: Change the sequence of updating the CQ toggle value (git-
fixes)
* RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (git-fixes)
* RDMA/bnxt_re: Fix a possible memory leak (git-fixes)
* RDMA/bnxt_re: Fix incorrect AVID type in WQE structure (git-fixes)
* RDMA/bnxt_re: Fix incorrect dereference of srq in async event (git-fixes)
* RDMA/bnxt_re: Fix out of bound check (git-fixes)
* RDMA/bnxt_re: Fix the GID table length (git-fixes)
* RDMA/bnxt_re: Fix the max CQ WQEs for older adapters (git-fixes)
* RDMA/bnxt_re: Fix the usage of control path spin locks (git-fixes)
* RDMA/bnxt_re: Return more meaningful error (git-fixes)
* RDMA/bnxt_re: synchronize the qp-handle table array (git-fixes)
* RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes)
* RDMA/cxgb4: Dump vendor specific QP details (git-fixes)
* RDMA/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP (git-fixes)
* RDMA/irdma: Fix misspelling of "accept*" (git-fixes)
* RDMA/mad: Improve handling of timed out WRs of mad agent (git-fixes)
* RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page
(git-fixes).
* RDMA/mana_ib: use the correct page table index based on hardware page size
(git-fixes).
* RDMA/mlx5: Enforce umem boundaries for explicit ODP page faults (git-fixes)
* RDMA/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down (git-
fixes)
* RDMA/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git-
fixes).
* RDMA/rtrs-srv: Avoid null pointer deref during path establishment (git-
fixes)
* RDMA/srpt: Make slab cache names unique (git-fixes)
* SUNRPC: Fix integer overflow in decode_rc_list() (git-fixes).
* SUNRPC: Fixup gss_status tracepoint error output (git-fixes).
* SUNRPC: clnt.c: Remove misleading comment (git-fixes).
* USB: appledisplay: close race between probe and completion handler (git-
fixes).
* USB: misc: cypress_cy7c63: check for short transfer (git-fixes).
* USB: misc: yurex: fix race between read and write (git-fixes).
* USB: serial: option: add Telit FN920C04 MBIM compositions (stable-fixes).
* USB: serial: option: add support for Quectel EG916Q-GL (stable-fixes).
* Update config files: Enable NFSD_V2 (bsc#1230914)
* Use pahole -j1 option for reproducible builds (bsc#1230414 bsc#1229450).
* accel/qaic: Fix the for loop used to walk SG table (git-fixes).
* add bug reference for a mana change (bsc#1229769).
* add bug references to existing mana changes (bsc#1232033, bsc#1232034,
bsc#1232036).
* arm64: Subscribe Microsoft Azure Cobalt 100 to erratum 3194386 (git-fixes)
* arm64: cputype: Add Neoverse-N3 definitions (git-fixes)
* arm64: errata: Enable the AC03_CPU_38 workaround for ampere1a (git-fixes).
* arm64: errata: Expand speculative SSBS workaround once more (git-fixes)
* arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes)
* arm64: fix selection of HAVE_DYNAMIC_FTRACE_WITH_ARGS (git-fixes).
* arm64: probes: Fix simulate_ldr*_literal() (git-fixes)
* arm64: probes: Fix uprobes for big-endian kernels (git-fixes)
* arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes)
* ata: libata: Set DID_TIME_OUT for commands that actually timed out (git-
fixes).
* ata: libata: avoid superfluous disk spin down + spin up during hibernation
(git-fixes).
* audit: do not WARN_ON_ONCE(!current->mm) in audit_exe_compare() (git-fixes).
* audit: do not take task_lock() in audit_exe_compare() code path (git-fixes).
* block: print symbolic error name instead of error code (bsc#1231872).
* block: sed-opal: add ioctl IOC_OPAL_SET_SID_PW (bsc#1229677).
* bnxt_en: Cap the size of HWRM_PORT_PHY_QCFG forwarded response (git-fixes).
* bnxt_en: Fix error recovery for 5760X (P7) chips (git-fixes).
* bnxt_en: Fix the PCI-AER routines (git-fixes).
* bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes).
* bnxt_en: refactor reset close code (git-fixes).
* bpf, lsm: Add disabled BPF LSM hook list (git-fixes).
* bpf, net: Fix a potential race in do_sock_getsockopt() (git-fixes).
* bpf, verifier: Correct tail_call_reachable for bpf prog (git-fixes).
* bpf, x64: Remove tail call detection (git-fixes).
* bpf,perf: Fix perf_event_detach_bpf_prog error handling (git-fixes).
* bpf: Fail verification for sign-extension of packet data/data_end/data_meta
(git-fixes).
* bpf: Fix bpf_strtol and bpf_strtoul helpers for 32bit (git-fixes).
* bpf: Fix error message on kfunc arg type mismatch (git-fixes).
* bpf: Fix helper writes to read-only maps (git-fixes).
* bpf: Fix tailcall cases in test_bpf (git-fixes).
* bpf: Fix truncation bug in coerce_reg_to_size_sx() (git-fixes).
* bpf: Improve check_raw_mode_ok test for MEM_UNINIT-tagged types (git-fixes).
* bpf: Remove truncation test in bpf_strtol and bpf_strtoul helpers (git-
fixes).
* bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error (git-fixes).
* bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos (git-fixes).
* btf, scripts: rust: drop is_rust_module.sh (bsc#1230414 bsc#1229450).
* btrfs: send: fix invalid clone operation for file that got its size
decreased (git-fixes).
* can: netlink: avoid call to do_set_data_bittiming callback with stale
can_priv::ctrlmode (stable-fixes).
* ceph: fix cap ref leak via netfs init_request (bsc#1231384).
* clk: bcm: bcm53573: fix OF node leak in init (stable-fixes).
* clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D (stable-fixes).
* comedi: ni_routing: tools: Check when the file could not be opened (stable-
fixes).
* config: Disable LAM on x86 (bsc#1217845)
* cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems
(git-fixes).
* crypto: hisilicon/qm - flush all work before driver removed (bsc#1232075)
* crypto: octeontx - Fix authenc setkey (stable-fixes).
* crypto: octeontx* - Select CRYPTO_AUTHENC (git-fixes).
* crypto: octeontx2 - Fix authenc setkey (stable-fixes).
* crypto: powerpc/p10-aes-gcm - Add dependency on CRYPTO_SIMD and re-enable
CRYPTO_AES_GCM_P10 (bsc#1230501 ltc#208632)
* crypto: powerpc/p10-aes-gcm - Disable CRYPTO_AES_GCM_P10 (bsc#1230501
ltc#208632).
* crypto: powerpc/p10-aes-gcm - Re-write AES/GCM stitched implementation
(bsc#1230501 ltc#208632).
* crypto: powerpc/p10-aes-gcm - Register modules as SIMD (bsc#1230501
ltc#208632).
* cxgb4: Properly lock TX queue for the selftest (git-fixes).
* cxgb4: add forgotten u64 ivlan cast before shift (git-fixes).
* cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git-
fixes).
* dcache: keep dentry_hashtable or d_hash_shift even when not used (git-
fixes).
* debugfs: fix automount d_fsdata usage (git-fixes).
* devlink: Fix command annotation documentation (git-fixes).
* dmaengine: sh: rz-dmac: handle configs where one address is zero (git-
fixes).
* dmaengine: ti: k3-udma: Set EOP for all TRs in cyclic BCDMA transfer (git-
fixes).
* driver core: bus: Fix double free in driver API bus_register() (stable-
fixes).
* driver core: bus: Return -EIO instead of 0 when show/store invalid bus
attribute (stable-fixes).
* drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring (git-fixes).
* drm/amd/display: Add HDMI DSC native YCbCr422 support (stable-fixes).
* drm/amd/display: Add disable timeout option (bsc#1231435)
* drm/amd/display: Check link_res->hpo_dp_link_enc before using it
(bsc#1231944)
* drm/amd/display: Check null pointer before dereferencing se (stable-fixes).
* drm/amd/display: Clean up dsc blocks in accelerated mode (stable-fixes).
* drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (stable-fixes).
* drm/amd/display: Remove a redundant check in authenticated_dp (stable-
fixes).
* drm/amd/display: Revert "Check HDCP returned status" (stable-fixes).
* drm/amd/display: Round calculated vtotal (stable-fixes).
* drm/amd/display: Skip to enable dsc if it has been off (stable-fixes).
* drm/amd/display: Validate backlight caps are sane (stable-fixes).
* drm/amd/pm: Vangogh: Fix kernel memory out of bounds write (git-fixes).
* drm/amd: Guard against bad data for ATIF ACPI method (git-fixes).
* drm/amdgpu/swsmu: Only force workload setup on init (git-fixes).
* drm/amdgpu/vcn: enable AV1 on both instances (stable-fixes).
* drm/i915/gem: fix bitwise and logical AND mixup (git-fixes).
* drm/i915/hdcp: fix connector refcounting (git-fixes).
* drm/mediatek: Fix get efuse issue for MT8188 DPTX (git-fixes).
* drm/msm/dpu: check for overflow in _dpu_crtc_setup_lm_bounds() (git-fixes).
* drm/msm/dpu: do not always program merge_3d block (git-fixes).
* drm/msm/dpu: make sure phys resources are properly initialized (git-fixes).
* drm/msm/dpu: move CRTC resource assignment to dpu_encoder_virt_atomic_check
(git-fixes).
* drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation
(git-fixes).
* drm/msm/dsi: improve/fix dsc pclk calculation (git-fixes).
* drm/msm: Allocate memory for disp snapshot with kvzalloc() (git-fixes).
* drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() (git-fixes).
* drm/radeon: Fix encoder->possible_clones (git-fixes).
* drm/sched: Add locking to drm_sched_entity_modify_sched (git-fixes).
* drm/sched: Always wake up correct scheduler in drm_sched_entity_push_job
(git-fixes).
* drm/v3d: Stop the active perfmon before being destroyed (git-fixes).
* drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real
VLA (stable-fixes).
* drm/vc4: Stop the active perfmon before being destroyed (git-fixes).
* drm/vmwgfx: Handle surface check failure correctly (git-fixes).
* drm: Consistently use struct drm_mode_rect for FB_DAMAGE_CLIPS (git-fixes).
* e1000e: Fix S0ix residency on corporate systems (git-fixes).
* e1000e: change I219 (19) devices to ADP (git-fixes).
* e1000e: fix force smbus during suspend flow (git-fixes).
* e1000e: move force SMBUS near the end of enable_ulp function (git-fixes).
* efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
(stable-fixes).
* eth: bnxt: fix counting packets discarded due to OOM and netpoll (git-
fixes).
* ext4: do not track ranges in fast_commit if inode has inlined data
(bsc#1231635).
* ext4: fix fast commit inode enqueueing during a full journal commit
(bsc#1231636).
* ext4: fix incorrect tid assumption in ext4_fc_mark_ineligible()
(bsc#1231637).
* ext4: fix possible tid_t sequence overflows (bsc#1231634).
* ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201)
* ext4: mark fc as ineligible using an handle in ext4_xattr_set()
(bsc#1231640).
* ext4: use handle to mark fc as ineligible in __track_dentry_update()
(bsc#1231639).
* fat: fix uninitialized variable (git-fixes).
* fbcon: Fix a NULL pointer dereference issue in fbcon_putcs (stable-fixes).
* fbdev: sisfb: Fix strbuf array overflow (stable-fixes).
* fgraph: Change the name of cpuhp state to "fgraph:online" (git-fixes).
* fgraph: Fix missing unlock in register_ftrace_graph() (git-fixes).
* fgraph: Use CPU hotplug mechanism to initialize idle shadow stacks (git-
fixes).
* filemap: remove use of wait bookmarks (bsc#1224088).
* firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (git-
fixes).
* firmware: arm_scmi: Fix the double free in scmi_debugfs_common_setup() (git-
fixes).
* firmware: arm_sdei: Fix the input parameter of cpuhp_remove_state() (git-
fixes).
* fs/9p: drop inodes immediately on non-.L too (git-fixes).
* fs/9p: fix the cache always being enabled on files with qid flags (git-
fixes).
* genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes).
* gpio: aspeed: Add the flush write to ensure the write complete (git-fixes).
* gpio: aspeed: Use devm_clk api to manage clock source (git-fixes).
* gpio: davinci: fix lazy disable (git-fixes).
* gve: Fix XDP TX completion handling when counters overflow (git-fixes).
* gve: Fix an edge case for TSO skb validity check (git-fixes).
* gve: ignore nonrelevant GSO type bits when processing TSO headers (git-
fixes).
* hid: intel-ish-hid: Fix uninitialized variable 'rv' in
ish_fw_xfer_direct_dma (git-fixes).
* hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event
(git-fixes).
* hwmon: (adm9240) Add missing dependency on REGMAP_I2C (git-fixes).
* hwmon: (adt7470) Add missing dependency on REGMAP_I2C (git-fixes).
* hwmon: (max16065) Fix alarm attributes (git-fixes).
* hwmon: (max16065) Remove use of i2c_match_id() (stable-fixes).
* hwmon: (mc34vr500) Add missing dependency on REGMAP_I2C (git-fixes).
* hwmon: (nct6775) add G15CF to ASUS WMI monitoring list (stable-fixes).
* hwmon: (tmp513) Add missing dependency on REGMAP_I2C (git-fixes).
* hwmon: intel-m10-bmc-hwmon: relabel Columbiaville to CVL Die Temperature
(git-fixes).
* i2c: core: Setup i2c_adapter runtime-pm before calling device_add() (git-
fixes).
* i2c: core: fix lockdep warning for sparsely nested adapter chain (git-
fixes).
* i2c: cpm: Remove linux,i2c-index conversion from be32 (git-fixes).
* i2c: exynos5: Calculate t_scl_l, t_scl_h according to i2c spec (git-fixes).
* i2c: i801: Add lis3lv02d for Dell Precision 3540 (git-fixes).
* i2c: i801: Add lis3lv02d for Dell XPS 15 7590 (git-fixes).
* i2c: i801: Use a different adapter-name for IDF adapters (stable-fixes).
* i2c: i801: add helper i801_restore_regs (git-fixes).
* i2c: ismt: kill transaction in hardware on timeout (git-fixes).
* i2c: ocores: Move system PM hooks to the NOIRQ phase (git-fixes).
* i2c: ocores: Remove #ifdef guards for PM related functions (git-fixes).
* i2c: omap: switch to NOIRQ_SYSTEM_SLEEP_PM_OPS() and RUNTIME_PM_OPS() (git-
fixes).
* i2c: omap: wakeup the controller during suspend() callback (git-fixes).
* i2c: rcar: properly format a debug output (git-fixes).
* i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume
(git-fixes).
* i2c: stm32f7: perform most of irq job in threaded handler (git-fixes).
* i2c: synquacer: Deal with optional PCLK correctly (git-fixes).
* i2c: synquacer: Remove a clk reference from struct synquacer_i2c (stable-
fixes).
* i2c: xiic: Try re-initialization on bus busy timeout (git-fixes).
* i2c: xiic: improve error message when transfer fails to start (stable-
fixes).
* i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master
Driver Due to Race Condition (stable-fixes).
* i40e: Fix XDP program unloading while removing the driver (git-fixes).
* i40e: Report MFS in decimal base instead of hex (git-fixes).
* iavf: Fix TC config comparison with existing adapter TC config (git-fixes).
* ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes).
* ice: Fix checking for unsupported keys on non-tunnel device (git-fixes).
* ice: Fix lldp packets dropping after changing the number of channels (git-
fixes).
* ice: Fix netif_is_ice() in Safe Mode (git-fixes).
* ice: Fix package download algorithm (git-fixes).
* ice: Fix recipe read procedure (git-fixes).
* ice: Fix reset handler (git-fixes).
* ice: Flush FDB entries before reset (git-fixes).
* ice: Interpret .set_channels() input differently (git-fixes).
* ice: Rebuild TC queues on VSI queue reconfiguration (git-fixes).
* ice: Reject pin requests with unsupported flags (git-fixes).
* ice: add flag to distinguish reset from .ndo_bpf in XDP rings config (git-
fixes).
* ice: add missing WRITE_ONCE when clearing ice_rx_ring::xdp_prog (git-fixes).
* ice: avoid IRQ collision to fix init failure on ACPI S3 resume (git-fixes).
* ice: clear port vlan config during reset (git-fixes).
* ice: disallow DPLL_PIN_STATE_SELECTABLE for dpll output pins (git-fixes).
* ice: do not bring the VSI up, if it was down before the XDP setup (git-
fixes).
* ice: do not busy wait for Rx queue disable in ice_qp_dis() (git-fixes).
* ice: fix 200G PHY types to link speed mapping (git-fixes).
* ice: fix 200G link speed message log (git-fixes).
* ice: fix ICE_LAST_OFFSET formula (git-fixes).
* ice: fix VLAN replay after reset (git-fixes).
* ice: fix VSI lists confusion when adding VLANs (git-fixes).
* ice: fix accounting for filters shared by multiple VSIs (git-fixes).
* ice: fix accounting if a VLAN already exists (git-fixes).
* ice: fix iteration of TLVs in Preserved Fields Area (git-fixes).
* ice: fix page reuse when PAGE_SIZE is over 8k (git-fixes).
* ice: fix reads from NVM Shadow RAM on E830 and E825-C devices (git-fixes).
* ice: fix truesize operations for PAGE_SIZE >= 8192 (git-fixes).
* ice: implement AQ download pkg retry (git-fixes).
* ice: map XDP queues to vectors in ice_vsi_map_rings_to_vectors() (git-
fixes).
* ice: remove af_xdp_zc_qps bitmap (git-fixes).
* ice: replace synchronize_rcu with synchronize_net (git-fixes).
* ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes).
* ice: set correct dst VSI in only LAN filters (git-fixes).
* ice: tc: allow zero flags in parsing tc flower (git-fixes).
* ice: tc: check src_vsi in case of traffic from VF (git-fixes).
* ice: use proper macro for testing bit (git-fixes).
* idpf: Interpret .set_channels() input differently (git-fixes).
* idpf: avoid bloating &idpf_q_vector with big %NR_CPUS (git-fixes).
* idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git-
fixes).
* idpf: do not skip over ethtool tcp-data-split setting (git-fixes).
* idpf: fix UAFs when destroying the queues (git-fixes).
* idpf: fix memleak in vport interrupt configuration (git-fixes).
* idpf: fix memory leaks and crashes while performing a soft reset (git-
fixes).
* ieee802154: Fix build error (git-fixes).
* igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes).
* igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes).
* igc: Fix double reset adapter triggered from a single taprio cmd (git-
fixes).
* igc: Fix packet still tx after gate close by reducing i226 MAC retry buffer
(git-fixes).
* igc: Fix qbv tx latency by setting gtxoffset (git-fixes).
* igc: Fix qbv_config_change_errors logics (git-fixes).
* igc: Fix reset adapter logics when tx mode change (git-fixes).
* igc: Unlock on error in igc_io_resume() (git-fixes).
* iio: accel: bma400: Fix uninitialized variable field_value in tap event
handling (git-fixes).
* iio: accel: kx022a: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
(git-fixes).
* iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git-
fixes).
* iio: adc: ti-ads124s08: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
(git-fixes).
* iio: adc: ti-ads8688: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
(git-fixes).
* iio: adc: ti-lmp92064: add missing select REGMAP_SPI in Kconfig (git-fixes).
* iio: amplifiers: ada4250: add missing select REGMAP_SPI in Kconfig (git-
fixes).
* iio: dac: ad3552r: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
(git-fixes).
* iio: dac: ad5766: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-
fixes).
* iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig (git-fixes).
* iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig (git-fixes).
* iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig (git-
fixes).
* iio: frequency: adf4377: add missing select REMAP_SPI in Kconfig (git-
fixes).
* iio: frequency: admv4420: fix missing select REMAP_SPI in Kconfig (git-
fixes).
* iio: gts-helper: Fix memory leaks for the error path of
iio_gts_build_avail_scale_table() (git-fixes).
* iio: gts-helper: Fix memory leaks in iio_gts_build_avail_scale_table() (git-
fixes).
* iio: hid-sensors: Fix an error handling path in
_hid_sensor_set_report_latency() (git-fixes).
* iio: light: opt3001: add missing full-scale range value (git-fixes).
* iio: light: veml6030: fix ALS sensor resolution (git-fixes).
* iio: light: veml6030: fix IIO device retrieval from embedded device (git-
fixes).
* iio: light: veml6030: fix microlux value calculation (git-fixes).
* iio: magnetometer: ak8975: Convert enum->pointer for data in the match
tables (stable-fixes).
* iio: magnetometer: ak8975: Fix 'Unexpected device' error (git-fixes).
* iio: magnetometer: ak8975: drop incorrect AK09116 compatible (git-fixes).
* iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
(git-fixes).
* io_uring/eventfd: move to more idiomatic RCU free usage (git-fixes).
* io_uring/io-wq: do not allow pinning outside of cpuset (git-fixes).
* io_uring/io-wq: inherit cpuset of cgroup in io worker (git-fixes).
* io_uring/net: harden multishot termination case for recv (git-fixes).
* io_uring/rw: fix cflags posting for single issue multishot read (git-fixes).
* io_uring/rw: treat -EOPNOTSUPP for IOCB_NOWAIT like -EAGAIN (git-fixes).
* io_uring/sqpoll: do not allow pinning outside of cpuset (git-fixes).
* io_uring/sqpoll: do not put cpumask on stack (git-fixes).
* io_uring/sqpoll: retain test for whether the CPU is valid (git-fixes).
* io_uring: check for presence of task_work rather than TIF_NOTIFY_SIGNAL
(git-fixes).
* iommu/amd: Allocate the page table root using GFP_KERNEL (git-fixes).
* iommu/amd: Do not set the D bit on AMD v2 table entries (git-fixes).
* iommu/amd: Fix typo of , instead of ; (git-fixes).
* iommu/vt-d: Always reserve a domain ID for identity setup (git-fixes).
* iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices (git-
fixes).
* iommufd: Check the domain owner of the parent before creating a nesting
domain (git-fixes).
* iommufd: Protect against overflow of ALIGN() during iova allocation (git-
fixes).
* jbd2: correctly compare tids with tid_geq function in jbd2_fc_begin_commit
(bsc#1231638).
* jfs: Fix sanity check in dbMount (git-fixes).
* jfs: Fix uaf in dbFreeBits (git-fixes).
* jfs: Fix uninit-value access of new_ea in ea_buffer (git-fixes).
* jfs: UBSAN: shift-out-of-bounds in dbFindBits (git-fixes).
* jfs: check if leafidx greater than num leaves per dmap tree (git-fixes).
* jump_label: Fix static_key_slow_dec() yet again (git-fixes).
* kABI fix of VM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC)
(git-fixes).
* kABI: bpf: enum bpf_{type_flag,arg_type} kABI workaround (git-fixes).
* kABI: bpf: struct bpf_insn_acces_aux kABI workaround (git-fixes).
* kasan: Fix Software Tag-Based KASAN with GCC (git-fixes).
* kbuild, bpf: Use test-ge check for v1.25-only pahole (bsc#1230414
bsc#1229450).
* kbuild,bpf: Add module-specific pahole flags for distilled base BTF
(bsc#1230414 bsc#1229450).
* kbuild,bpf: Switch to using --btf_features for pahole v1.26 and later
(bsc#1230414 bsc#1229450).
* kbuild: avoid too many execution of scripts/pahole-flags.sh (bsc#1230414
bsc#1229450).
* kbuild: bpf: Tell pahole to DECL_TAG kfuncs (bsc#1230414 bsc#1229450).
* kconfig: qconf: fix buffer overflow in debug links (git-fixes).
* keys, dns: Allow key types (eg. DNS) to be reclaimed immediately on expiry
(git-fixes).
* keys: Fix overwrite of key expiration on instantiation (git-fixes).
* kthread: unpark only parked kthread (git-fixes).
* lib/xarray: introduce a new helper xas_get_order (bsc#1231617).
* mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes).
* macsec: do not increment counters for an unrelated SA (git-fixes).
* maple_tree: correct tree corruption on spanning store (git-fixes).
* media: bttv: use audio defaults for winfast2000 (git-fixes).
* media: core: v4l2-ioctl: check if ioctl is known to avoid NULL name (git-
fixes).
* media: i2c: imx335: Enable regulator supplies (stable-fixes).
* media: imx335: Fix reset-gpio handling (git-fixes).
* media: pci: ipu3-cio2: Initialise timing struct to avoid a compiler warning
(git-fixes).
* media: videobuf2-core: clear memory related fields in
__vb2_plane_dmabuf_put() (stable-fixes).
* media: videobuf2: fix typo: vb2_dbuf -> vb2_qbuf (git-fixes).
* mei: use kvmalloc for read buffer (git-fixes).
* mfd: intel_soc_pmic_chtwc: Make Lenovo Yoga Tab 3 X90F DMI match less strict
(stable-fixes).
* minmax: avoid overly complex min()/max() macro arguments in xen (git-fixes).
* mlx5: avoid truncating error message (git-fixes).
* mlx5: stop warning for 64KB pages (git-fixes).
* mm/filemap: optimize filemap folio adding (bsc#1231617).
* mm/filemap: return early if failed to allocate memory for split
(bsc#1231617).
* mm: khugepaged: fix the arguments order in khugepaged_collapse_file trace
point (git-fixes).
* mm: mmap: no need to call khugepaged_enter_vma() for stack (jsc#PED-10978).
* modpost: fix acpi MODULE_DEVICE_TABLE built with mismatched endianness (git-
fixes).
* modpost: fix input MODULE_DEVICE_TABLE() built for 64-bit on 32-bit host
(git-fixes).
* module: abort module loading when sysfs setup suffer errors (git-fixes).
* nbd: fix race between timeout and normal completion (bsc#1230918).
* net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git-
fixes).
* net/mlx5: Added cond_resched() to crdump collection (git-fixes).
* net/mlx5: Check capability for fw_reset (git-fixes).
* net/mlx5: Check for invalid vector index on EQ creation (git-fixes).
* net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes).
* net/mlx5: Fix command bitmask initialization (git-fixes).
* net/mlx5: Fix error handling in irq_pool_request_irq (git-fixes).
* net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes).
* net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes).
* net/mlx5: Stop waiting for PCI if pci channel is offline (git-fixes).
* net/mlx5: Unregister notifier on eswitch init failure (git-fixes).
* net/mlx5: Update the list of the PCI supported devices (git-fixes).
* net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys
(git-fixes).
* net/mlx5e: Add missing link mode to ptys2ext_ethtool_map (git-fixes).
* net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes).
* net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git-
fixes).
* net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes).
* net/mlx5e: Do not call cleanup on profile rollback failure (git-fixes).
* net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes).
* net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes).
* net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN)
packets (git-fixes).
* net/mlx5e: Require mlx5 tc classifier action support for IPsec prio
capability (git-fixes).
* net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer
exhaustion (git-fixes).
* net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891).
* net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289).
* net: phy: Remove LED entry from LEDs list on unregister (git-fixes).
* net: phy: bcm84881: Fix some error handling paths (git-fixes).
* net: phy: dp83869: fix memory corruption when enabling fiber (git-fixes).
* net: qede: sanitize 'rc' in qede_add_tc_flower_fltr() (git-fixes).
* net: qede: use return from qede_parse_actions() (git-fixes).
* net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes).
* net: qede: use return from qede_parse_flow_attr() for flower (git-fixes).
* net: stmmac: dwmac-tegra: Fix link bring-up sequence (git-fixes)
* net: sysfs: Fix /sys/class/net/<iface> path for statistics (git-fixes).
* net: test for not too small csum_start in virtio_net_hdr_to_skb() (git-
fixes).
* net: usb: usbnet: fix name regression (get-fixes).
* net: usb: usbnet: fix race in probe failure (git-fixes).
* netdevsim: use cond_resched() in nsim_dev_trap_report_work() (git-fixes).
* nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes).
* nfsd: call cache_put if xdr_reserve_space returns NULL (git-fixes).
* nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net
(git-fixes).
* nfsd: fix delegation_blocked() to block correctly for at least 30 seconds
(git-fixes).
* nfsd: fix refcount leak when file is unhashed after being found (git-fixes).
* nfsd: map the EBADMSG to nfserr_io to avoid warning (git-fixes).
* nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire (git-
fixes).
* nfsd: return -EINVAL when namelen is 0 (git-fixes).
* nilfs2: fix kernel bug due to missing clearing of buffer delay flag (git-
fixes).
* nouveau/dmem: Fix privileged error in copy engine channel (git-fixes).
* nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error (git-
fixes).
* nouveau/gsp: Avoid addressing beyond end of rpc->entries (stable-fixes).
* ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() (git-
fixes).
* nvme-multipath: suppress partition scan until the disk is ready
(bsc#1228244).
* nvme-pci: fix race condition between reset and nvme_dev_disable() (git-
fixes).
* nvme-pci: qdepth 1 quirk (git-fixes).
* nvme-pci: set doorbell config before unquiescing (git-fixes).
* nvme: disable CC.CRIME (NVME_CC_CRIME) (jsc#PED-9901).
* nvme: null terminate nvme_tls_attrs (git-fixes).
* nvme: re-fix error-handling for io_uring nvme-passthrough (git-fixes).
* nvmet-auth: assign dh_key to NULL after kfree_sensitive (git-fixes).
* ocfs2: fix the la space leak when unmounting an ocfs2 volume (git-fixes).
* ocfs2: fix uninit-value in ocfs2_get_block() (git-fixes).
* ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (git-fixes).
* parport: Proper fix for array out-of-bounds access (git-fixes).
* phy: freescale: imx8m-pcie: Do CMN_RST just before PHY PLL lock check (git-
fixes).
* phy: qcom: qmp-combo: move driver data initialisation earlier (git-fixes).
* phy: qcom: qmp-usb: fix NULL-deref on runtime suspend (git-fixes).
* phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes).
* phy: ti: phy-j721e-wiz: fix usxgmii configuration (git-fixes).
* pinctrl: apple: check devm_kasprintf() returned value (git-fixes).
* pinctrl: ocelot: fix system hang on level based interrupts (stable-fixes).
* platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug (git-fixes).
* platform/x86: dell-sysman: add support for alienware products (stable-
fixes).
* platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes).
* platform/x86: lenovo-ymc: Ignore the 0x0 state (stable-fixes).
* platform/x86: touchscreen_dmi: add nanote-next quirk (stable-fixes).
* power: reset: brcmstb: Do not go into infinite loop if reset fails (stable-
fixes).
* powercap: intel_rapl: Fix off by one in get_rpi() (git-fixes).
* powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869).
* powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869).
* powerpc/boot: Only free if realloc() succeeds (bsc#1194869).
* powerpc/code-patching: Add generic memory patching (bsc#1194869).
* powerpc/code-patching: Perform hwsync in __patch_instruction() in case of
failure (bsc#1194869).
* powerpc/crypto: do not build aes-gcm-p10 by default (bsc#1230501
ltc#208632).
* powerpc/crypto: fix missing skcipher dependency for aes-gcm-p10 (bsc#1230501
ltc#208632).
* powerpc/vdso: Fix VDSO data access when running in a non-root time namespace
(bsc#1194869).
* powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu
(bsc#1194869).
* powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729).
* printk: Add notation to console_srcu locking (bsc#1232183).
* qed: avoid truncating work queue length (git-fixes).
* rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow
(bsc#1226631).
* rcu: Fix buffer overflow in print_cpu_stall_info() (bsc#1226623).
* rpm/check-for-config-changes: add HAVE_RUST and RUSTC_SUPPORTS_ to
IGNORED_CONFIGS_RE They depend on SHADOW_CALL_STACK.
* rpm/release-projects: Add SLFO projects (bsc#1231293).
* rpmsg: glink: Handle rejected intent request better (git-fixes).
* runtime constants: add default dummy infrastructure (git-fixes).
* runtime constants: add x86 architecture support (git-fixes).
* s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747).
* s390/pci: Handle PCI error codes other than 0x3a (git-fixes bsc#1232629).
* s390/sclp: Deactivate sclp after all its users (git-fixes bsc#1232628).
* s390/sclp_vt220: Convert newlines to CRLF instead of LFCR (git-fixes
bsc#1232627).
* scsi: fnic: Move flush_work initialization out of if block (bsc#1230055).
* scsi: lpfc: Add ELS_RSP cmd to the list of WQEs to flush in
lpfc_els_flush_cmd() (bsc#1232757).
* scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV
instance (bsc#1232757).
* scsi: lpfc: Fix kref imbalance on fabric ndlps from dev_loss_tmo handler
(bsc#1232757).
* scsi: lpfc: Remove trailing space after \n newline (bsc#1232757).
* scsi: lpfc: Restrict support for 32 byte CDBs to specific HBAs (bsc#1232757
bsc#1228119).
* scsi: lpfc: Revise TRACE_EVENT log flag severities from KERN_ERR to
KERN_WARNING (bsc#1232757).
* scsi: lpfc: Support loopback tests with VMID enabled (bsc#1232757).
* scsi: lpfc: Update lpfc version to 14.4.0.5 (bsc#1232757).
* scsi: lpfc: Update phba link state conditional before sending CMF_SYNC_WQE
(bsc#1232757).
* selftests/bpf: Add a test case to write mtu result into .rodata (git-fixes).
* selftests/bpf: Add a test case to write strtol result into .rodata (git-
fixes).
* selftests/bpf: Add test for sign extension in coerce_subreg_to_size_sx()
(git-fixes).
* selftests/bpf: Add test for truncation after sign extension in
coerce_reg_to_size_sx() (git-fixes).
* selftests/bpf: Add tests for ldsx of pkt data/data_end/data_meta accesses
(git-fixes).
* selftests/bpf: Fix ARG_PTR_TO_LONG {half-,}uninitialized test (git-fixes).
* selftests/bpf: Rename ARG_PTR_TO_LONG test description (git-fixes).
* selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation (git-
fixes).
* serial: imx: Update mctrl old_status on RTSD interrupt (git-fixes).
* serial: protect uart_port_dtr_rts() in uart_shutdown() too (stable-fixes).
* soundwire: intel_bus_common: enable interrupts before exiting reset (stable-
fixes).
* spi: atmel-quadspi: Fix wrong register value written to MR (git-fixes).
* spi: mtk-snfi: fix kerneldoc for mtk_snand_is_page_ops() (git-fixes).
* spi: s3c64xx: fix timeout counters in flush_fifo (git-fixes).
* spi: spi-fsl-dspi: Fix crash when not using GPIO chip select (git-fixes).
* spi: spi-imx: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
fixes).
* splice: always fsnotify_access(in), fsnotify_modify(out) on success (git-
fixes).
* splice: fsnotify_access(fd)/fsnotify_modify(fd) in vmsplice (git-fixes).
* splice: fsnotify_access(in), fsnotify_modify(out) on success in tee (git-
fixes).
* srcu: Fix callbacks acceleration mishandling (git-fixes).
* staging: iio: frequency: ad9832: fix division by zero in
ad9832_calc_freqreg() (git-fixes).
* sumversion: Fix a memory leak in get_src_version() (git-fixes).
* supported.conf: mark nhpoly1305 module as supported (bsc#1231035)
* supported.conf: mark ultravisor userspace access as supported (bsc#1232090)
* task_work: add kerneldoc annotation for 'data' argument (git-fixes).
* thunderbolt: Improve DisplayPort tunnel setup process to be more robust
(stable-fixes).
* tools: hv: rm .*.cmd when make clean (git-fixes).
* tracing/hwlat: Fix a race during cpuhp processing (git-fixes).
* tracing/osnoise: Fix build when timerlat is not enabled (git-fixes).
* tracing/osnoise: Skip running osnoise if all instances are off (git-fixes).
* tracing/osnoise: Switch from PF_NO_SETAFFINITY to migrate_disable (git-
fixes).
* tracing/osnoise: Use a cpumask to know what threads are kthreads (git-
fixes).
* tracing/timerlat: Add interface_lock around clearing of kthread in
stop_kthread() (git-fixes).
* tracing/timerlat: Add user-space interface (git-fixes).
* tracing/timerlat: Drop interface_lock in stop_kthread() (git-fixes).
* tracing/timerlat: Fix a race during cpuhp processing (git-fixes).
* tracing/timerlat: Fix duplicated kthread creation due to CPU online/offline
(git-fixes).
* tracing/timerlat: Move hrtimer_init to timerlat_fd open() (git-fixes).
* tracing/timerlat: Only clear timer if a kthread exists (git-fixes).
* tracing: Consider the NULL character when validating the event length (git-
fixes).
* tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (stable-fixes).
* ubifs: Fix adding orphan entry twice for the same inode (git-fixes).
* ubifs: Fix unattached xattr inode if powercut happens after deleting (git-
fixes).
* ubifs: add check for crypto_shash_tfm_digest (git-fixes).
* ubifs: dbg_orphan_check: Fix missed key type checking (git-fixes).
* unicode: Do not special case ignorable code points (stable-fixes).
* uprobe: avoid out-of-bounds memory access of fetching args (git-fixes).
* uprobes: encapsulate preparation of uprobe args buffer (git-fixes).
* uprobes: introduce the global struct vm_special_mapping xol_mapping
(bsc#1231114).
* uprobes: turn xol_area->pages into xol_area->page (bsc#1231114).
* usb: chipidea: udc: enable suspend interrupt after usb reset (stable-fixes).
* usb: dwc2: Adjust the timing of USB Driver Interrupt Registration in the
Crashkernel Scenario (stable-fixes).
* usb: dwc3: Wait for EndXfer completion before restoring GUSB2PHYCFG (git-
fixes).
* usb: dwc3: core: Stop processing of pending events if controller is halted
(git-fixes).
* usb: gadget: core: force synchronous registration (git-fixes).
* usb: gadget: f_uac2: Replace snprintf() with the safer scnprintf() variant
(stable-fixes).
* usb: gadget: f_uac2: fix non-newline-terminated function name (stable-
fixes).
* usb: gadget: f_uac2: fix return value for UAC2_ATTRIBUTE_STRING store (git-
fixes).
* usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes).
* usb: storage: ignore bogus device raised by JieLi BR21 USB sound chip
(stable-fixes).
* usb: typec: altmode should keep reference to parent (git-fixes).
* usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes()
(git-fixes).
* usb: xhci: Fix problem with xhci resume from suspend (stable-fixes).
* usb: xhci: fix loss of data on Cadence xHC (git-fixes).
* usbip: tools: Fix detach_port() invalid port error path (git-fixes).
* usbnet: fix cyclical race on disconnect with work queue (git-fixes).
* vdpa: Fix an error handling path in eni_vdpa_probe() (git-fixes).
* vdpa_sim_blk: Fix the potential leak of mgmt_dev (git-fixes).
* vdpa_sim_blk: allocate the buffer zeroed (git-fixes).
* vduse: avoid using __GFP_NOFAIL (git-fixes).
* vfs: dcache: move hashlen_hash() from callers into d_hash() (git-fixes).
* vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() (git-fixes).
* vhost_vdpa: assign irq bypass producer token correctly (git-fixes).
* virtio_console: fix misc probe bugs (git-fixes).
* vmalloc: modify the alloc_vmap_area() error message for better diagnostics
(jsc#PED-10978).
* vmxnet3: Add XDP support (bsc#1226498).
* vmxnet3: Fix missing reserved tailroom (bsc#1226498).
* vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frame (bsc#1226498).
* vmxnet3: add command to allow disabling of offloads (bsc#1226498).
* vmxnet3: add latency measurement support in vmxnet3 (bsc#1226498).
* vmxnet3: prepare for version 9 changes (bsc#1226498).
* vmxnet3: update to version 9 (bsc#1226498).
* vt: prevent kernel-infoleak in con_font_get() (git-fixes).
* wifi: ath10k: Fix memory leak in management tx (git-fixes).
* wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes).
* wifi: ath11k: fix array out-of-bound access in SoC stats (stable-fixes).
* wifi: ath12k: fix array out-of-bound access in SoC stats (stable-fixes).
* wifi: ath9k: fix possible integer overflow in ath9k_get_et_stats() (stable-
fixes).
* wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit
(stable-fixes).
* wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes).
* wifi: cfg80211: Set correct chandef when starting CAC (stable-fixes).
* wifi: cfg80211: clear wdev->cqm_config pointer on free (git-fixes).
* wifi: iwlegacy: Fix "field-spanning write" warning in il_enqueue_hcmd()
(git-fixes).
* wifi: iwlwifi: allow only CN mcc from WRDD (stable-fixes).
* wifi: iwlwifi: config: label 'gl' devices as discrete (git-fixes).
* wifi: iwlwifi: mvm: Fix a race in scan abort flow (stable-fixes).
* wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
(git-fixes).
* wifi: iwlwifi: mvm: avoid NULL pointer dereference (stable-fixes).
* wifi: iwlwifi: mvm: do not add default link in fw restart flow (git-fixes).
* wifi: iwlwifi: mvm: do not leak a link on AP removal (git-fixes).
* wifi: iwlwifi: mvm: drop wrong STA selection in TX (stable-fixes).
* wifi: iwlwifi: mvm: use correct key iteration (stable-fixes).
* wifi: iwlwifi: remove AX101, AX201 and AX203 support from LNL (stable-
fixes).
* wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower
(git-fixes).
* wifi: mac80211: fix RCU list iterations (stable-fixes).
* wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes).
* wifi: mt76: mt7915: add dummy HW offload of IEEE 802.11 fragmentation
(stable-fixes).
* wifi: mt76: mt7915: disable tx worker during tx BA session enable/disable
(stable-fixes).
* wifi: mt76: mt7915: hold dev->mt76.mutex while disabling tx worker (stable-
fixes).
* wifi: mwifiex: Fix memcpy() field-spanning write warning in
mwifiex_cmd_802_11_scan_ext() (stable-fixes).
* wifi: rtw88: 8821cu: Remove VID/PID 0bda:c82c (stable-fixes).
* wifi: rtw88: Fix USB/SDIO devices not transmitting beacons (git-fixes).
* wifi: rtw88: select WANT_DEV_COREDUMP (stable-fixes).
* wifi: rtw89: avoid reading out of bounds when loading TX power FW elements
(stable-fixes).
* wifi: rtw89: avoid to add interface to list twice when SER (stable-fixes).
* wifi: rtw89: correct base HT rate mask for firmware (stable-fixes).
* x86/CPU/AMD: Only apply Zenbleed fix for Zen2 during late microcode load
(git-fixes).
* x86/Documentation: Indent 'note::' directive for protocol version number
note (git-fixes).
* x86/PCI: Check pcie_find_root_port() return for NULL (git-fixes).
* x86/amd_nb: Add new PCI IDs for AMD family 1Ah model 60h (git-fixes).
* x86/apic: Always explicitly disarm TSC-deadline timer (git-fixes).
* x86/apic: Make x2apic_disable() work correctly (git-fixes).
* x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (git-fixes).
* x86/bugs: Skip RSB fill at VMEXIT (git-fixes).
* x86/cpufeatures: Add a IBPB_NO_RET BUG flag (git-fixes).
* x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (git-fixes).
* x86/entry: Have entry_ibpb() invalidate return predictions (git-fixes).
* x86/entry: Remove unwanted instrumentation in common_interrupt() (git-
fixes).
* x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides frequency
(git-fixes).
* x86/mm: Use IPIs to synchronize LAM enablement (git-fixes).
* x86/resctrl: Annotate get_mem_config() functions as __init (git-fixes).
* x86/resctrl: Avoid overflow in MB settings in bw_validate() (git-fixes).
* x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git-
fixes).
* x86: do the user address masking outside the user access area (git-fixes).
* x86: fix user address masking non-canonical speculation issue (git-fixes).
* x86: make the masked_user_access_begin() macro use its argument only once
(git-fixes).
* x86: support user address masking instead of non-speculative conditional
(git-fixes).
* xfs: check opcode and iovec count match in xlog_recover_attri_commit_pass2
(git-fixes).
* xfs: check shortform attr entry flags specifically (git-fixes).
* xfs: convert delayed extents to unwritten when zeroing post eof blocks (git-
fixes).
* xfs: fix finding a last resort AG in xfs_filestream_pick_ag (git-fixes).
* xfs: fix freeing speculative preallocations for preallocated files (git-
fixes).
* xfs: make sure sb_fdblocks is non-negative (git-fixes).
* xfs: make the seq argument to xfs_bmapi_convert_delalloc() optional (git-
fixes).
* xfs: make xfs_bmapi_convert_delalloc() to allocate the target offset (git-
fixes).
* xfs: remove a racy if_bytes check in xfs_reflink_end_cow_extent (git-fixes).
* xfs: validate recovered name buffers when recovering xattr items (git-
fixes).
* xhci: Add a quirk for writing ERST in high-low order (git-fixes).
* xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes).
* xhci: Fix incorrect stream context type macro (git-fixes).
* xhci: Mitigate failed set dequeue pointer commands (git-fixes).
* xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes).
* xhci: tegra: fix checked USB2 port number (git-fixes).
* zonefs: Improve error handling (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3984=1 openSUSE-SLE-15.6-2024-3984=1

* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-3984=1

## Package List:

* openSUSE Leap 15.6 (aarch64 x86_64)
* kernel-azure-devel-6.4.0-150600.8.17.2
* reiserfs-kmp-azure-debuginfo-6.4.0-150600.8.17.2
* gfs2-kmp-azure-debuginfo-6.4.0-150600.8.17.2
* gfs2-kmp-azure-6.4.0-150600.8.17.2
* kernel-azure-optional-debuginfo-6.4.0-150600.8.17.2
* kselftests-kmp-azure-6.4.0-150600.8.17.2
* kernel-azure-debuginfo-6.4.0-150600.8.17.2
* kernel-azure-extra-6.4.0-150600.8.17.2
* kernel-azure-extra-debuginfo-6.4.0-150600.8.17.2
* kernel-azure-debugsource-6.4.0-150600.8.17.2
* kernel-syms-azure-6.4.0-150600.8.17.1
* kselftests-kmp-azure-debuginfo-6.4.0-150600.8.17.2
* reiserfs-kmp-azure-6.4.0-150600.8.17.2
* dlm-kmp-azure-debuginfo-6.4.0-150600.8.17.2
* ocfs2-kmp-azure-6.4.0-150600.8.17.2
* kernel-azure-optional-6.4.0-150600.8.17.2
* cluster-md-kmp-azure-debuginfo-6.4.0-150600.8.17.2
* kernel-azure-devel-debuginfo-6.4.0-150600.8.17.2
* ocfs2-kmp-azure-debuginfo-6.4.0-150600.8.17.2
* kernel-azure-livepatch-devel-6.4.0-150600.8.17.2
* dlm-kmp-azure-6.4.0-150600.8.17.2
* cluster-md-kmp-azure-6.4.0-150600.8.17.2
* openSUSE Leap 15.6 (aarch64 nosrc x86_64)
* kernel-azure-6.4.0-150600.8.17.2
* openSUSE Leap 15.6 (x86_64)
* kernel-azure-vdso-6.4.0-150600.8.17.2
* kernel-azure-vdso-debuginfo-6.4.0-150600.8.17.2
* openSUSE Leap 15.6 (noarch)
* kernel-devel-azure-6.4.0-150600.8.17.1
* kernel-source-azure-6.4.0-150600.8.17.1
* Public Cloud Module 15-SP6 (aarch64 nosrc x86_64)
* kernel-azure-6.4.0-150600.8.17.2
* Public Cloud Module 15-SP6 (aarch64 x86_64)
* kernel-azure-devel-6.4.0-150600.8.17.2
* kernel-azure-devel-debuginfo-6.4.0-150600.8.17.2
* kernel-azure-debugsource-6.4.0-150600.8.17.2
* kernel-azure-debuginfo-6.4.0-150600.8.17.2
* kernel-syms-azure-6.4.0-150600.8.17.1
* Public Cloud Module 15-SP6 (noarch)
* kernel-devel-azure-6.4.0-150600.8.17.1
* kernel-source-azure-6.4.0-150600.8.17.1

## References:

* https://www.suse.com/security/cve/CVE-2023-52766.html
* https://www.suse.com/security/cve/CVE-2023-52800.html
* https://www.suse.com/security/cve/CVE-2023-52881.html
* https://www.suse.com/security/cve/CVE-2023-52917.html
* https://www.suse.com/security/cve/CVE-2023-52918.html
* https://www.suse.com/security/cve/CVE-2023-52919.html
* https://www.suse.com/security/cve/CVE-2023-6270.html
* https://www.suse.com/security/cve/CVE-2024-26758.html
* https://www.suse.com/security/cve/CVE-2024-26761.html
* https://www.suse.com/security/cve/CVE-2024-26767.html
* https://www.suse.com/security/cve/CVE-2024-26943.html
* https://www.suse.com/security/cve/CVE-2024-27026.html
* https://www.suse.com/security/cve/CVE-2024-27043.html
* https://www.suse.com/security/cve/CVE-2024-35980.html
* https://www.suse.com/security/cve/CVE-2024-36244.html
* https://www.suse.com/security/cve/CVE-2024-38576.html
* https://www.suse.com/security/cve/CVE-2024-38577.html
* https://www.suse.com/security/cve/CVE-2024-38599.html
* https://www.suse.com/security/cve/CVE-2024-41016.html
* https://www.suse.com/security/cve/CVE-2024-41031.html
* https://www.suse.com/security/cve/CVE-2024-41047.html
* https://www.suse.com/security/cve/CVE-2024-41082.html
* https://www.suse.com/security/cve/CVE-2024-42145.html
* https://www.suse.com/security/cve/CVE-2024-44932.html
* https://www.suse.com/security/cve/CVE-2024-44958.html
* https://www.suse.com/security/cve/CVE-2024-44964.html
* https://www.suse.com/security/cve/CVE-2024-45016.html
* https://www.suse.com/security/cve/CVE-2024-45025.html
* https://www.suse.com/security/cve/CVE-2024-46678.html
* https://www.suse.com/security/cve/CVE-2024-46721.html
* https://www.suse.com/security/cve/CVE-2024-46754.html
* https://www.suse.com/security/cve/CVE-2024-46766.html
* https://www.suse.com/security/cve/CVE-2024-46770.html
* https://www.suse.com/security/cve/CVE-2024-46775.html
* https://www.suse.com/security/cve/CVE-2024-46777.html
* https://www.suse.com/security/cve/CVE-2024-46797.html
* https://www.suse.com/security/cve/CVE-2024-46802.html
* https://www.suse.com/security/cve/CVE-2024-46803.html
* https://www.suse.com/security/cve/CVE-2024-46804.html
* https://www.suse.com/security/cve/CVE-2024-46805.html
* https://www.suse.com/security/cve/CVE-2024-46806.html
* https://www.suse.com/security/cve/CVE-2024-46807.html
* https://www.suse.com/security/cve/CVE-2024-46809.html
* https://www.suse.com/security/cve/CVE-2024-46810.html
* https://www.suse.com/security/cve/CVE-2024-46811.html
* https://www.suse.com/security/cve/CVE-2024-46812.html
* https://www.suse.com/security/cve/CVE-2024-46813.html
* https://www.suse.com/security/cve/CVE-2024-46814.html
* https://www.suse.com/security/cve/CVE-2024-46815.html
* https://www.suse.com/security/cve/CVE-2024-46816.html
* https://www.suse.com/security/cve/CVE-2024-46817.html
* https://www.suse.com/security/cve/CVE-2024-46818.html
* https://www.suse.com/security/cve/CVE-2024-46819.html
* https://www.suse.com/security/cve/CVE-2024-46821.html
* https://www.suse.com/security/cve/CVE-2024-46825.html
* https://www.suse.com/security/cve/CVE-2024-46826.html
* https://www.suse.com/security/cve/CVE-2024-46827.html
* https://www.suse.com/security/cve/CVE-2024-46828.html
* https://www.suse.com/security/cve/CVE-2024-46830.html
* https://www.suse.com/security/cve/CVE-2024-46831.html
* https://www.suse.com/security/cve/CVE-2024-46834.html
* https://www.suse.com/security/cve/CVE-2024-46835.html
* https://www.suse.com/security/cve/CVE-2024-46836.html
* https://www.suse.com/security/cve/CVE-2024-46840.html
* https://www.suse.com/security/cve/CVE-2024-46841.html
* https://www.suse.com/security/cve/CVE-2024-46842.html
* https://www.suse.com/security/cve/CVE-2024-46843.html
* https://www.suse.com/security/cve/CVE-2024-46846.html
* https://www.suse.com/security/cve/CVE-2024-46848.html
* https://www.suse.com/security/cve/CVE-2024-46849.html
* https://www.suse.com/security/cve/CVE-2024-46851.html
* https://www.suse.com/security/cve/CVE-2024-46852.html
* https://www.suse.com/security/cve/CVE-2024-46853.html
* https://www.suse.com/security/cve/CVE-2024-46854.html
* https://www.suse.com/security/cve/CVE-2024-46855.html
* https://www.suse.com/security/cve/CVE-2024-46857.html
* https://www.suse.com/security/cve/CVE-2024-46859.html
* https://www.suse.com/security/cve/CVE-2024-46860.html
* https://www.suse.com/security/cve/CVE-2024-46861.html
* https://www.suse.com/security/cve/CVE-2024-46864.html
* https://www.suse.com/security/cve/CVE-2024-46870.html
* https://www.suse.com/security/cve/CVE-2024-46871.html
* https://www.suse.com/security/cve/CVE-2024-47658.html
* https://www.suse.com/security/cve/CVE-2024-47660.html
* https://www.suse.com/security/cve/CVE-2024-47661.html
* https://www.suse.com/security/cve/CVE-2024-47662.html
* https://www.suse.com/security/cve/CVE-2024-47663.html
* https://www.suse.com/security/cve/CVE-2024-47664.html
* https://www.suse.com/security/cve/CVE-2024-47665.html
* https://www.suse.com/security/cve/CVE-2024-47667.html
* https://www.suse.com/security/cve/CVE-2024-47668.html
* https://www.suse.com/security/cve/CVE-2024-47669.html
* https://www.suse.com/security/cve/CVE-2024-47670.html
* https://www.suse.com/security/cve/CVE-2024-47671.html
* https://www.suse.com/security/cve/CVE-2024-47672.html
* https://www.suse.com/security/cve/CVE-2024-47673.html
* https://www.suse.com/security/cve/CVE-2024-47674.html
* https://www.suse.com/security/cve/CVE-2024-47675.html
* https://www.suse.com/security/cve/CVE-2024-47681.html
* https://www.suse.com/security/cve/CVE-2024-47682.html
* https://www.suse.com/security/cve/CVE-2024-47684.html
* https://www.suse.com/security/cve/CVE-2024-47685.html
* https://www.suse.com/security/cve/CVE-2024-47686.html
* https://www.suse.com/security/cve/CVE-2024-47687.html
* https://www.suse.com/security/cve/CVE-2024-47688.html
* https://www.suse.com/security/cve/CVE-2024-47692.html
* https://www.suse.com/security/cve/CVE-2024-47693.html
* https://www.suse.com/security/cve/CVE-2024-47695.html
* https://www.suse.com/security/cve/CVE-2024-47696.html
* https://www.suse.com/security/cve/CVE-2024-47697.html
* https://www.suse.com/security/cve/CVE-2024-47698.html
* https://www.suse.com/security/cve/CVE-2024-47699.html
* https://www.suse.com/security/cve/CVE-2024-47702.html
* https://www.suse.com/security/cve/CVE-2024-47704.html
* https://www.suse.com/security/cve/CVE-2024-47705.html
* https://www.suse.com/security/cve/CVE-2024-47706.html
* https://www.suse.com/security/cve/CVE-2024-47707.html
* https://www.suse.com/security/cve/CVE-2024-47709.html
* https://www.suse.com/security/cve/CVE-2024-47710.html
* https://www.suse.com/security/cve/CVE-2024-47712.html
* https://www.suse.com/security/cve/CVE-2024-47713.html
* https://www.suse.com/security/cve/CVE-2024-47714.html
* https://www.suse.com/security/cve/CVE-2024-47715.html
* https://www.suse.com/security/cve/CVE-2024-47718.html
* https://www.suse.com/security/cve/CVE-2024-47719.html
* https://www.suse.com/security/cve/CVE-2024-47720.html
* https://www.suse.com/security/cve/CVE-2024-47723.html
* https://www.suse.com/security/cve/CVE-2024-47727.html
* https://www.suse.com/security/cve/CVE-2024-47728.html
* https://www.suse.com/security/cve/CVE-2024-47730.html
* https://www.suse.com/security/cve/CVE-2024-47731.html
* https://www.suse.com/security/cve/CVE-2024-47732.html
* https://www.suse.com/security/cve/CVE-2024-47735.html
* https://www.suse.com/security/cve/CVE-2024-47737.html
* https://www.suse.com/security/cve/CVE-2024-47738.html
* https://www.suse.com/security/cve/CVE-2024-47739.html
* https://www.suse.com/security/cve/CVE-2024-47741.html
* https://www.suse.com/security/cve/CVE-2024-47742.html
* https://www.suse.com/security/cve/CVE-2024-47743.html
* https://www.suse.com/security/cve/CVE-2024-47744.html
* https://www.suse.com/security/cve/CVE-2024-47745.html
* https://www.suse.com/security/cve/CVE-2024-47747.html
* https://www.suse.com/security/cve/CVE-2024-47748.html
* https://www.suse.com/security/cve/CVE-2024-47749.html
* https://www.suse.com/security/cve/CVE-2024-47750.html
* https://www.suse.com/security/cve/CVE-2024-47751.html
* https://www.suse.com/security/cve/CVE-2024-47752.html
* https://www.suse.com/security/cve/CVE-2024-47753.html
* https://www.suse.com/security/cve/CVE-2024-47754.html
* https://www.suse.com/security/cve/CVE-2024-47756.html
* https://www.suse.com/security/cve/CVE-2024-47757.html
* https://www.suse.com/security/cve/CVE-2024-49850.html
* https://www.suse.com/security/cve/CVE-2024-49851.html
* https://www.suse.com/security/cve/CVE-2024-49852.html
* https://www.suse.com/security/cve/CVE-2024-49853.html
* https://www.suse.com/security/cve/CVE-2024-49855.html
* https://www.suse.com/security/cve/CVE-2024-49858.html
* https://www.suse.com/security/cve/CVE-2024-49860.html
* https://www.suse.com/security/cve/CVE-2024-49861.html
* https://www.suse.com/security/cve/CVE-2024-49862.html
* https://www.suse.com/security/cve/CVE-2024-49863.html
* https://www.suse.com/security/cve/CVE-2024-49864.html
* https://www.suse.com/security/cve/CVE-2024-49866.html
* https://www.suse.com/security/cve/CVE-2024-49867.html
* https://www.suse.com/security/cve/CVE-2024-49870.html
* https://www.suse.com/security/cve/CVE-2024-49871.html
* https://www.suse.com/security/cve/CVE-2024-49874.html
* https://www.suse.com/security/cve/CVE-2024-49875.html
* https://www.suse.com/security/cve/CVE-2024-49877.html
* https://www.suse.com/security/cve/CVE-2024-49878.html
* https://www.suse.com/security/cve/CVE-2024-49879.html
* https://www.suse.com/security/cve/CVE-2024-49881.html
* https://www.suse.com/security/cve/CVE-2024-49882.html
* https://www.suse.com/security/cve/CVE-2024-49883.html
* https://www.suse.com/security/cve/CVE-2024-49886.html
* https://www.suse.com/security/cve/CVE-2024-49888.html
* https://www.suse.com/security/cve/CVE-2024-49890.html
* https://www.suse.com/security/cve/CVE-2024-49891.html
* https://www.suse.com/security/cve/CVE-2024-49892.html
* https://www.suse.com/security/cve/CVE-2024-49894.html
* https://www.suse.com/security/cve/CVE-2024-49895.html
* https://www.suse.com/security/cve/CVE-2024-49896.html
* https://www.suse.com/security/cve/CVE-2024-49897.html
* https://www.suse.com/security/cve/CVE-2024-49898.html
* https://www.suse.com/security/cve/CVE-2024-49900.html
* https://www.suse.com/security/cve/CVE-2024-49901.html
* https://www.suse.com/security/cve/CVE-2024-49902.html
* https://www.suse.com/security/cve/CVE-2024-49903.html
* https://www.suse.com/security/cve/CVE-2024-49906.html
* https://www.suse.com/security/cve/CVE-2024-49907.html
* https://www.suse.com/security/cve/CVE-2024-49908.html
* https://www.suse.com/security/cve/CVE-2024-49909.html
* https://www.suse.com/security/cve/CVE-2024-49913.html
* https://www.suse.com/security/cve/CVE-2024-49914.html
* https://www.suse.com/security/cve/CVE-2024-49917.html
* https://www.suse.com/security/cve/CVE-2024-49918.html
* https://www.suse.com/security/cve/CVE-2024-49919.html
* https://www.suse.com/security/cve/CVE-2024-49920.html
* https://www.suse.com/security/cve/CVE-2024-49928.html
* https://www.suse.com/security/cve/CVE-2024-49929.html
* https://www.suse.com/security/cve/CVE-2024-49930.html
* https://www.suse.com/security/cve/CVE-2024-49931.html
* https://www.suse.com/security/cve/CVE-2024-49935.html
* https://www.suse.com/security/cve/CVE-2024-49936.html
* https://www.suse.com/security/cve/CVE-2024-49937.html
* https://www.suse.com/security/cve/CVE-2024-49938.html
* https://www.suse.com/security/cve/CVE-2024-49939.html
* https://www.suse.com/security/cve/CVE-2024-49946.html
* https://www.suse.com/security/cve/CVE-2024-49947.html
* https://www.suse.com/security/cve/CVE-2024-49949.html
* https://www.suse.com/security/cve/CVE-2024-49950.html
* https://www.suse.com/security/cve/CVE-2024-49953.html
* https://www.suse.com/security/cve/CVE-2024-49954.html
* https://www.suse.com/security/cve/CVE-2024-49955.html
* https://www.suse.com/security/cve/CVE-2024-49957.html
* https://www.suse.com/security/cve/CVE-2024-49958.html
* https://www.suse.com/security/cve/CVE-2024-49959.html
* https://www.suse.com/security/cve/CVE-2024-49960.html
* https://www.suse.com/security/cve/CVE-2024-49961.html
* https://www.suse.com/security/cve/CVE-2024-49962.html
* https://www.suse.com/security/cve/CVE-2024-49963.html
* https://www.suse.com/security/cve/CVE-2024-49965.html
* https://www.suse.com/security/cve/CVE-2024-49966.html
* https://www.suse.com/security/cve/CVE-2024-49967.html
* https://www.suse.com/security/cve/CVE-2024-49969.html
* https://www.suse.com/security/cve/CVE-2024-49972.html
* https://www.suse.com/security/cve/CVE-2024-49973.html
* https://www.suse.com/security/cve/CVE-2024-49974.html
* https://www.suse.com/security/cve/CVE-2024-49981.html
* https://www.suse.com/security/cve/CVE-2024-49982.html
* https://www.suse.com/security/cve/CVE-2024-49985.html
* https://www.suse.com/security/cve/CVE-2024-49986.html
* https://www.suse.com/security/cve/CVE-2024-49991.html
* https://www.suse.com/security/cve/CVE-2024-49993.html
* https://www.suse.com/security/cve/CVE-2024-49995.html
* https://www.suse.com/security/cve/CVE-2024-49996.html
* https://www.suse.com/security/cve/CVE-2024-50000.html
* https://www.suse.com/security/cve/CVE-2024-50001.html
* https://www.suse.com/security/cve/CVE-2024-50002.html
* https://www.suse.com/security/cve/CVE-2024-50007.html
* https://www.suse.com/security/cve/CVE-2024-50008.html
* https://www.suse.com/security/cve/CVE-2024-50013.html
* https://www.suse.com/security/cve/CVE-2024-50015.html
* https://www.suse.com/security/cve/CVE-2024-50017.html
* https://www.suse.com/security/cve/CVE-2024-50019.html
* https://www.suse.com/security/cve/CVE-2024-50020.html
* https://www.suse.com/security/cve/CVE-2024-50021.html
* https://www.suse.com/security/cve/CVE-2024-50022.html
* https://www.suse.com/security/cve/CVE-2024-50023.html
* https://www.suse.com/security/cve/CVE-2024-50024.html
* https://www.suse.com/security/cve/CVE-2024-50025.html
* https://www.suse.com/security/cve/CVE-2024-50027.html
* https://www.suse.com/security/cve/CVE-2024-50028.html
* https://www.suse.com/security/cve/CVE-2024-50031.html
* https://www.suse.com/security/cve/CVE-2024-50033.html
* https://www.suse.com/security/cve/CVE-2024-50035.html
* https://www.suse.com/security/cve/CVE-2024-50040.html
* https://www.suse.com/security/cve/CVE-2024-50041.html
* https://www.suse.com/security/cve/CVE-2024-50042.html
* https://www.suse.com/security/cve/CVE-2024-50044.html
* https://www.suse.com/security/cve/CVE-2024-50045.html
* https://www.suse.com/security/cve/CVE-2024-50046.html
* https://www.suse.com/security/cve/CVE-2024-50047.html
* https://www.suse.com/security/cve/CVE-2024-50048.html
* https://www.suse.com/security/cve/CVE-2024-50049.html
* https://www.suse.com/security/cve/CVE-2024-50055.html
* https://www.suse.com/security/cve/CVE-2024-50058.html
* https://www.suse.com/security/cve/CVE-2024-50059.html
* https://www.suse.com/security/cve/CVE-2024-50060.html
* https://www.suse.com/security/cve/CVE-2024-50061.html
* https://www.suse.com/security/cve/CVE-2024-50062.html
* https://www.suse.com/security/cve/CVE-2024-50063.html
* https://www.suse.com/security/cve/CVE-2024-50064.html
* https://www.suse.com/security/cve/CVE-2024-50069.html
* https://www.suse.com/security/cve/CVE-2024-50073.html
* https://www.suse.com/security/cve/CVE-2024-50074.html
* https://www.suse.com/security/cve/CVE-2024-50075.html
* https://www.suse.com/security/cve/CVE-2024-50076.html
* https://www.suse.com/security/cve/CVE-2024-50077.html
* https://www.suse.com/security/cve/CVE-2024-50078.html
* https://www.suse.com/security/cve/CVE-2024-50080.html
* https://www.suse.com/security/cve/CVE-2024-50081.html
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1217845
* https://bugzilla.suse.com/show_bug.cgi?id=1218562
* https://bugzilla.suse.com/show_bug.cgi?id=1219596
* https://bugzilla.suse.com/show_bug.cgi?id=1219803
* https://bugzilla.suse.com/show_bug.cgi?id=1220382
* https://bugzilla.suse.com/show_bug.cgi?id=1223384
* https://bugzilla.suse.com/show_bug.cgi?id=1223700
* https://bugzilla.suse.com/show_bug.cgi?id=1223824
* https://bugzilla.suse.com/show_bug.cgi?id=1223848
* https://bugzilla.suse.com/show_bug.cgi?id=1224088
* https://bugzilla.suse.com/show_bug.cgi?id=1224574
* https://bugzilla.suse.com/show_bug.cgi?id=1225611
* https://bugzilla.suse.com/show_bug.cgi?id=1226003
* https://bugzilla.suse.com/show_bug.cgi?id=1226498
* https://bugzilla.suse.com/show_bug.cgi?id=1226623
* https://bugzilla.suse.com/show_bug.cgi?id=1226631
* https://bugzilla.suse.com/show_bug.cgi?id=1226797
* https://bugzilla.suse.com/show_bug.cgi?id=1226848
* https://bugzilla.suse.com/show_bug.cgi?id=1228119
* https://bugzilla.suse.com/show_bug.cgi?id=1228244
* https://bugzilla.suse.com/show_bug.cgi?id=1228269
* https://bugzilla.suse.com/show_bug.cgi?id=1228410
* https://bugzilla.suse.com/show_bug.cgi?id=1228454
* https://bugzilla.suse.com/show_bug.cgi?id=1228537
* https://bugzilla.suse.com/show_bug.cgi?id=1228620
* https://bugzilla.suse.com/show_bug.cgi?id=1228743
* https://bugzilla.suse.com/show_bug.cgi?id=1228747
* https://bugzilla.suse.com/show_bug.cgi?id=1228857
* https://bugzilla.suse.com/show_bug.cgi?id=1229019
* https://bugzilla.suse.com/show_bug.cgi?id=1229429
* https://bugzilla.suse.com/show_bug.cgi?id=1229450
* https://bugzilla.suse.com/show_bug.cgi?id=1229585
* https://bugzilla.suse.com/show_bug.cgi?id=1229677
* https://bugzilla.suse.com/show_bug.cgi?id=1229769
* https://bugzilla.suse.com/show_bug.cgi?id=1229808
* https://bugzilla.suse.com/show_bug.cgi?id=1229891
* https://bugzilla.suse.com/show_bug.cgi?id=1230055
* https://bugzilla.suse.com/show_bug.cgi?id=1230132
* https://bugzilla.suse.com/show_bug.cgi?id=1230179
* https://bugzilla.suse.com/show_bug.cgi?id=1230220
* https://bugzilla.suse.com/show_bug.cgi?id=1230289
* https://bugzilla.suse.com/show_bug.cgi?id=1230295
* https://bugzilla.suse.com/show_bug.cgi?id=1230339
* https://bugzilla.suse.com/show_bug.cgi?id=1230341
* https://bugzilla.suse.com/show_bug.cgi?id=1230375
* https://bugzilla.suse.com/show_bug.cgi?id=1230414
* https://bugzilla.suse.com/show_bug.cgi?id=1230429
* https://bugzilla.suse.com/show_bug.cgi?id=1230456
* https://bugzilla.suse.com/show_bug.cgi?id=1230501
* https://bugzilla.suse.com/show_bug.cgi?id=1230527
* https://bugzilla.suse.com/show_bug.cgi?id=1230550
* https://bugzilla.suse.com/show_bug.cgi?id=1230600
* https://bugzilla.suse.com/show_bug.cgi?id=1230620
* https://bugzilla.suse.com/show_bug.cgi?id=1230710
* https://bugzilla.suse.com/show_bug.cgi?id=1230762
* https://bugzilla.suse.com/show_bug.cgi?id=1230763
* https://bugzilla.suse.com/show_bug.cgi?id=1230773
* https://bugzilla.suse.com/show_bug.cgi?id=1230774
* https://bugzilla.suse.com/show_bug.cgi?id=1230801
* https://bugzilla.suse.com/show_bug.cgi?id=1230831
* https://bugzilla.suse.com/show_bug.cgi?id=1230914
* https://bugzilla.suse.com/show_bug.cgi?id=1230918
* https://bugzilla.suse.com/show_bug.cgi?id=1231016
* https://bugzilla.suse.com/show_bug.cgi?id=1231035
* https://bugzilla.suse.com/show_bug.cgi?id=1231072
* https://bugzilla.suse.com/show_bug.cgi?id=1231073
* https://bugzilla.suse.com/show_bug.cgi?id=1231075
* https://bugzilla.suse.com/show_bug.cgi?id=1231081
* https://bugzilla.suse.com/show_bug.cgi?id=1231082
* https://bugzilla.suse.com/show_bug.cgi?id=1231083
* https://bugzilla.suse.com/show_bug.cgi?id=1231084
* https://bugzilla.suse.com/show_bug.cgi?id=1231085
* https://bugzilla.suse.com/show_bug.cgi?id=1231087
* https://bugzilla.suse.com/show_bug.cgi?id=1231089
* https://bugzilla.suse.com/show_bug.cgi?id=1231092
* https://bugzilla.suse.com/show_bug.cgi?id=1231093
* https://bugzilla.suse.com/show_bug.cgi?id=1231094
* https://bugzilla.suse.com/show_bug.cgi?id=1231096
* https://bugzilla.suse.com/show_bug.cgi?id=1231098
* https://bugzilla.suse.com/show_bug.cgi?id=1231100
* https://bugzilla.suse.com/show_bug.cgi?id=1231101
* https://bugzilla.suse.com/show_bug.cgi?id=1231102
* https://bugzilla.suse.com/show_bug.cgi?id=1231105
* https://bugzilla.suse.com/show_bug.cgi?id=1231108
* https://bugzilla.suse.com/show_bug.cgi?id=1231111
* https://bugzilla.suse.com/show_bug.cgi?id=1231114
* https://bugzilla.suse.com/show_bug.cgi?id=1231115
* https://bugzilla.suse.com/show_bug.cgi?id=1231116
* https://bugzilla.suse.com/show_bug.cgi?id=1231117
* https://bugzilla.suse.com/show_bug.cgi?id=1231131
* https://bugzilla.suse.com/show_bug.cgi?id=1231132
* https://bugzilla.suse.com/show_bug.cgi?id=1231135
* https://bugzilla.suse.com/show_bug.cgi?id=1231136
* https://bugzilla.suse.com/show_bug.cgi?id=1231138
* https://bugzilla.suse.com/show_bug.cgi?id=1231148
* https://bugzilla.suse.com/show_bug.cgi?id=1231169
* https://bugzilla.suse.com/show_bug.cgi?id=1231170
* https://bugzilla.suse.com/show_bug.cgi?id=1231171
* https://bugzilla.suse.com/show_bug.cgi?id=1231178
* https://bugzilla.suse.com/show_bug.cgi?id=1231179
* https://bugzilla.suse.com/show_bug.cgi?id=1231183
* https://bugzilla.suse.com/show_bug.cgi?id=1231187
* https://bugzilla.suse.com/show_bug.cgi?id=1231191
* https://bugzilla.suse.com/show_bug.cgi?id=1231193
* https://bugzilla.suse.com/show_bug.cgi?id=1231195
* https://bugzilla.suse.com/show_bug.cgi?id=1231197
* https://bugzilla.suse.com/show_bug.cgi?id=1231200
* https://bugzilla.suse.com/show_bug.cgi?id=1231202
* https://bugzilla.suse.com/show_bug.cgi?id=1231203
* https://bugzilla.suse.com/show_bug.cgi?id=1231276
* https://bugzilla.suse.com/show_bug.cgi?id=1231293
* https://bugzilla.suse.com/show_bug.cgi?id=1231384
* https://bugzilla.suse.com/show_bug.cgi?id=1231434
* https://bugzilla.suse.com/show_bug.cgi?id=1231435
* https://bugzilla.suse.com/show_bug.cgi?id=1231436
* https://bugzilla.suse.com/show_bug.cgi?id=1231439
* https://bugzilla.suse.com/show_bug.cgi?id=1231440
* https://bugzilla.suse.com/show_bug.cgi?id=1231441
* https://bugzilla.suse.com/show_bug.cgi?id=1231442
* https://bugzilla.suse.com/show_bug.cgi?id=1231452
* https://bugzilla.suse.com/show_bug.cgi?id=1231474
* https://bugzilla.suse.com/show_bug.cgi?id=1231481
* https://bugzilla.suse.com/show_bug.cgi?id=1231496
* https://bugzilla.suse.com/show_bug.cgi?id=1231502
* https://bugzilla.suse.com/show_bug.cgi?id=1231537
* https://bugzilla.suse.com/show_bug.cgi?id=1231539
* https://bugzilla.suse.com/show_bug.cgi?id=1231540
* https://bugzilla.suse.com/show_bug.cgi?id=1231541
* https://bugzilla.suse.com/show_bug.cgi?id=1231617
* https://bugzilla.suse.com/show_bug.cgi?id=1231634
* https://bugzilla.suse.com/show_bug.cgi?id=1231635
* https://bugzilla.suse.com/show_bug.cgi?id=1231636
* https://bugzilla.suse.com/show_bug.cgi?id=1231637
* https://bugzilla.suse.com/show_bug.cgi?id=1231638
* https://bugzilla.suse.com/show_bug.cgi?id=1231639
* https://bugzilla.suse.com/show_bug.cgi?id=1231640
* https://bugzilla.suse.com/show_bug.cgi?id=1231673
* https://bugzilla.suse.com/show_bug.cgi?id=1231828
* https://bugzilla.suse.com/show_bug.cgi?id=1231849
* https://bugzilla.suse.com/show_bug.cgi?id=1231855
* https://bugzilla.suse.com/show_bug.cgi?id=1231856
* https://bugzilla.suse.com/show_bug.cgi?id=1231857
* https://bugzilla.suse.com/show_bug.cgi?id=1231858
* https://bugzilla.suse.com/show_bug.cgi?id=1231859
* https://bugzilla.suse.com/show_bug.cgi?id=1231860
* https://bugzilla.suse.com/show_bug.cgi?id=1231861
* https://bugzilla.suse.com/show_bug.cgi?id=1231864
* https://bugzilla.suse.com/show_bug.cgi?id=1231865
* https://bugzilla.suse.com/show_bug.cgi?id=1231868
* https://bugzilla.suse.com/show_bug.cgi?id=1231869
* https://bugzilla.suse.com/show_bug.cgi?id=1231871
* https://bugzilla.suse.com/show_bug.cgi?id=1231872
* https://bugzilla.suse.com/show_bug.cgi?id=1231901
* https://bugzilla.suse.com/show_bug.cgi?id=1231902
* https://bugzilla.suse.com/show_bug.cgi?id=1231903
* https://bugzilla.suse.com/show_bug.cgi?id=1231904
* https://bugzilla.suse.com/show_bug.cgi?id=1231906
* https://bugzilla.suse.com/show_bug.cgi?id=1231907
* https://bugzilla.suse.com/show_bug.cgi?id=1231908
* https://bugzilla.suse.com/show_bug.cgi?id=1231914
* https://bugzilla.suse.com/show_bug.cgi?id=1231916
* https://bugzilla.suse.com/show_bug.cgi?id=1231924
* https://bugzilla.suse.com/show_bug.cgi?id=1231926
* https://bugzilla.suse.com/show_bug.cgi?id=1231931
* https://bugzilla.suse.com/show_bug.cgi?id=1231935
* https://bugzilla.suse.com/show_bug.cgi?id=1231942
* https://bugzilla.suse.com/show_bug.cgi?id=1231944
* https://bugzilla.suse.com/show_bug.cgi?id=1231947
* https://bugzilla.suse.com/show_bug.cgi?id=1231950
* https://bugzilla.suse.com/show_bug.cgi?id=1231951
* https://bugzilla.suse.com/show_bug.cgi?id=1231953
* https://bugzilla.suse.com/show_bug.cgi?id=1231954
* https://bugzilla.suse.com/show_bug.cgi?id=1231955
* https://bugzilla.suse.com/show_bug.cgi?id=1231956
* https://bugzilla.suse.com/show_bug.cgi?id=1231957
* https://bugzilla.suse.com/show_bug.cgi?id=1231965
* https://bugzilla.suse.com/show_bug.cgi?id=1231967
* https://bugzilla.suse.com/show_bug.cgi?id=1231968
* https://bugzilla.suse.com/show_bug.cgi?id=1231987
* https://bugzilla.suse.com/show_bug.cgi?id=1231988
* https://bugzilla.suse.com/show_bug.cgi?id=1231989
* https://bugzilla.suse.com/show_bug.cgi?id=1231990
* https://bugzilla.suse.com/show_bug.cgi?id=1231998
* https://bugzilla.suse.com/show_bug.cgi?id=1232000
* https://bugzilla.suse.com/show_bug.cgi?id=1232003
* https://bugzilla.suse.com/show_bug.cgi?id=1232009
* https://bugzilla.suse.com/show_bug.cgi?id=1232013
* https://bugzilla.suse.com/show_bug.cgi?id=1232015
* https://bugzilla.suse.com/show_bug.cgi?id=1232016
* https://bugzilla.suse.com/show_bug.cgi?id=1232017
* https://bugzilla.suse.com/show_bug.cgi?id=1232018
* https://bugzilla.suse.com/show_bug.cgi?id=1232033
* https://bugzilla.suse.com/show_bug.cgi?id=1232034
* https://bugzilla.suse.com/show_bug.cgi?id=1232036
* https://bugzilla.suse.com/show_bug.cgi?id=1232043
* https://bugzilla.suse.com/show_bug.cgi?id=1232047
* https://bugzilla.suse.com/show_bug.cgi?id=1232048
* https://bugzilla.suse.com/show_bug.cgi?id=1232049
* https://bugzilla.suse.com/show_bug.cgi?id=1232050
* https://bugzilla.suse.com/show_bug.cgi?id=1232056
* https://bugzilla.suse.com/show_bug.cgi?id=1232075
* https://bugzilla.suse.com/show_bug.cgi?id=1232076
* https://bugzilla.suse.com/show_bug.cgi?id=1232079
* https://bugzilla.suse.com/show_bug.cgi?id=1232080
* https://bugzilla.suse.com/show_bug.cgi?id=1232083
* https://bugzilla.suse.com/show_bug.cgi?id=1232084
* https://bugzilla.suse.com/show_bug.cgi?id=1232085
* https://bugzilla.suse.com/show_bug.cgi?id=1232089
* https://bugzilla.suse.com/show_bug.cgi?id=1232093
* https://bugzilla.suse.com/show_bug.cgi?id=1232094
* https://bugzilla.suse.com/show_bug.cgi?id=1232097
* https://bugzilla.suse.com/show_bug.cgi?id=1232098
* https://bugzilla.suse.com/show_bug.cgi?id=1232105
* https://bugzilla.suse.com/show_bug.cgi?id=1232109
* https://bugzilla.suse.com/show_bug.cgi?id=1232111
* https://bugzilla.suse.com/show_bug.cgi?id=1232114
* https://bugzilla.suse.com/show_bug.cgi?id=1232116
* https://bugzilla.suse.com/show_bug.cgi?id=1232117
* https://bugzilla.suse.com/show_bug.cgi?id=1232124
* https://bugzilla.suse.com/show_bug.cgi?id=1232126
* https://bugzilla.suse.com/show_bug.cgi?id=1232127
* https://bugzilla.suse.com/show_bug.cgi?id=1232129
* https://bugzilla.suse.com/show_bug.cgi?id=1232130
* https://bugzilla.suse.com/show_bug.cgi?id=1232131
* https://bugzilla.suse.com/show_bug.cgi?id=1232132
* https://bugzilla.suse.com/show_bug.cgi?id=1232134
* https://bugzilla.suse.com/show_bug.cgi?id=1232135
* https://bugzilla.suse.com/show_bug.cgi?id=1232140
* https://bugzilla.suse.com/show_bug.cgi?id=1232141
* https://bugzilla.suse.com/show_bug.cgi?id=1232142
* https://bugzilla.suse.com/show_bug.cgi?id=1232145
* https://bugzilla.suse.com/show_bug.cgi?id=1232147
* https://bugzilla.suse.com/show_bug.cgi?id=1232148
* https://bugzilla.suse.com/show_bug.cgi?id=1232149
* https://bugzilla.suse.com/show_bug.cgi?id=1232151
* https://bugzilla.suse.com/show_bug.cgi?id=1232152
* https://bugzilla.suse.com/show_bug.cgi?id=1232154
* https://bugzilla.suse.com/show_bug.cgi?id=1232155
* https://bugzilla.suse.com/show_bug.cgi?id=1232156
* https://bugzilla.suse.com/show_bug.cgi?id=1232159
* https://bugzilla.suse.com/show_bug.cgi?id=1232160
* https://bugzilla.suse.com/show_bug.cgi?id=1232162
* https://bugzilla.suse.com/show_bug.cgi?id=1232164
* https://bugzilla.suse.com/show_bug.cgi?id=1232174
* https://bugzilla.suse.com/show_bug.cgi?id=1232180
* https://bugzilla.suse.com/show_bug.cgi?id=1232182
* https://bugzilla.suse.com/show_bug.cgi?id=1232183
* https://bugzilla.suse.com/show_bug.cgi?id=1232185
* https://bugzilla.suse.com/show_bug.cgi?id=1232187
* https://bugzilla.suse.com/show_bug.cgi?id=1232189
* https://bugzilla.suse.com/show_bug.cgi?id=1232192
* https://bugzilla.suse.com/show_bug.cgi?id=1232195
* https://bugzilla.suse.com/show_bug.cgi?id=1232196
* https://bugzilla.suse.com/show_bug.cgi?id=1232199
* https://bugzilla.suse.com/show_bug.cgi?id=1232200
* https://bugzilla.suse.com/show_bug.cgi?id=1232201
* https://bugzilla.suse.com/show_bug.cgi?id=1232208
* https://bugzilla.suse.com/show_bug.cgi?id=1232217
* https://bugzilla.suse.com/show_bug.cgi?id=1232218
* https://bugzilla.suse.com/show_bug.cgi?id=1232220
* https://bugzilla.suse.com/show_bug.cgi?id=1232221
* https://bugzilla.suse.com/show_bug.cgi?id=1232222
* https://bugzilla.suse.com/show_bug.cgi?id=1232232
* https://bugzilla.suse.com/show_bug.cgi?id=1232250
* https://bugzilla.suse.com/show_bug.cgi?id=1232251
* https://bugzilla.suse.com/show_bug.cgi?id=1232253
* https://bugzilla.suse.com/show_bug.cgi?id=1232254
* https://bugzilla.suse.com/show_bug.cgi?id=1232255
* https://bugzilla.suse.com/show_bug.cgi?id=1232256
* https://bugzilla.suse.com/show_bug.cgi?id=1232259
* https://bugzilla.suse.com/show_bug.cgi?id=1232260
* https://bugzilla.suse.com/show_bug.cgi?id=1232262
* https://bugzilla.suse.com/show_bug.cgi?id=1232263
* https://bugzilla.suse.com/show_bug.cgi?id=1232275
* https://bugzilla.suse.com/show_bug.cgi?id=1232279
* https://bugzilla.suse.com/show_bug.cgi?id=1232282
* https://bugzilla.suse.com/show_bug.cgi?id=1232285
* https://bugzilla.suse.com/show_bug.cgi?id=1232287
* https://bugzilla.suse.com/show_bug.cgi?id=1232295
* https://bugzilla.suse.com/show_bug.cgi?id=1232305
* https://bugzilla.suse.com/show_bug.cgi?id=1232307
* https://bugzilla.suse.com/show_bug.cgi?id=1232309
* https://bugzilla.suse.com/show_bug.cgi?id=1232310
* https://bugzilla.suse.com/show_bug.cgi?id=1232312
* https://bugzilla.suse.com/show_bug.cgi?id=1232313
* https://bugzilla.suse.com/show_bug.cgi?id=1232314
* https://bugzilla.suse.com/show_bug.cgi?id=1232315
* https://bugzilla.suse.com/show_bug.cgi?id=1232316
* https://bugzilla.suse.com/show_bug.cgi?id=1232317
* https://bugzilla.suse.com/show_bug.cgi?id=1232329
* https://bugzilla.suse.com/show_bug.cgi?id=1232332
* https://bugzilla.suse.com/show_bug.cgi?id=1232333
* https://bugzilla.suse.com/show_bug.cgi?id=1232334
* https://bugzilla.suse.com/show_bug.cgi?id=1232335
* https://bugzilla.suse.com/show_bug.cgi?id=1232337
* https://bugzilla.suse.com/show_bug.cgi?id=1232339
* https://bugzilla.suse.com/show_bug.cgi?id=1232340
* https://bugzilla.suse.com/show_bug.cgi?id=1232342
* https://bugzilla.suse.com/show_bug.cgi?id=1232345
* https://bugzilla.suse.com/show_bug.cgi?id=1232349
* https://bugzilla.suse.com/show_bug.cgi?id=1232352
* https://bugzilla.suse.com/show_bug.cgi?id=1232354
* https://bugzilla.suse.com/show_bug.cgi?id=1232355
* https://bugzilla.suse.com/show_bug.cgi?id=1232359
* https://bugzilla.suse.com/show_bug.cgi?id=1232362
* https://bugzilla.suse.com/show_bug.cgi?id=1232369
* https://bugzilla.suse.com/show_bug.cgi?id=1232370
* https://bugzilla.suse.com/show_bug.cgi?id=1232378
* https://bugzilla.suse.com/show_bug.cgi?id=1232381
* https://bugzilla.suse.com/show_bug.cgi?id=1232383
* https://bugzilla.suse.com/show_bug.cgi?id=1232392
* https://bugzilla.suse.com/show_bug.cgi?id=1232394
* https://bugzilla.suse.com/show_bug.cgi?id=1232395
* https://bugzilla.suse.com/show_bug.cgi?id=1232417
* https://bugzilla.suse.com/show_bug.cgi?id=1232418
* https://bugzilla.suse.com/show_bug.cgi?id=1232424
* https://bugzilla.suse.com/show_bug.cgi?id=1232427
* https://bugzilla.suse.com/show_bug.cgi?id=1232432
* https://bugzilla.suse.com/show_bug.cgi?id=1232435
* https://bugzilla.suse.com/show_bug.cgi?id=1232501
* https://bugzilla.suse.com/show_bug.cgi?id=1232502
* https://bugzilla.suse.com/show_bug.cgi?id=1232503
* https://bugzilla.suse.com/show_bug.cgi?id=1232504
* https://bugzilla.suse.com/show_bug.cgi?id=1232505
* https://bugzilla.suse.com/show_bug.cgi?id=1232506
* https://bugzilla.suse.com/show_bug.cgi?id=1232507
* https://bugzilla.suse.com/show_bug.cgi?id=1232511
* https://bugzilla.suse.com/show_bug.cgi?id=1232519
* https://bugzilla.suse.com/show_bug.cgi?id=1232520
* https://bugzilla.suse.com/show_bug.cgi?id=1232529
* https://bugzilla.suse.com/show_bug.cgi?id=1232552
* https://bugzilla.suse.com/show_bug.cgi?id=1232623
* https://bugzilla.suse.com/show_bug.cgi?id=1232626
* https://bugzilla.suse.com/show_bug.cgi?id=1232627
* https://bugzilla.suse.com/show_bug.cgi?id=1232628
* https://bugzilla.suse.com/show_bug.cgi?id=1232629
* https://bugzilla.suse.com/show_bug.cgi?id=1232757
* https://bugzilla.suse.com/show_bug.cgi?id=1232768
* https://bugzilla.suse.com/show_bug.cgi?id=1232819
* https://jira.suse.com/browse/PED-10559
* https://jira.suse.com/browse/PED-10978
* https://jira.suse.com/browse/PED-9899
* https://jira.suse.com/browse/PED-9901



SUSE-SU-2024:3985-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:3985-1
Release Date: 2024-11-13T10:13:42Z
Rating: important
References:

* bsc#1054914
* bsc#1065729
* bsc#1194869
* bsc#1204171
* bsc#1205796
* bsc#1206188
* bsc#1206344
* bsc#1209290
* bsc#1210449
* bsc#1210627
* bsc#1213034
* bsc#1216813
* bsc#1218562
* bsc#1223384
* bsc#1223524
* bsc#1223824
* bsc#1225189
* bsc#1225336
* bsc#1225611
* bsc#1225762
* bsc#1226498
* bsc#1226631
* bsc#1226797
* bsc#1227437
* bsc#1227885
* bsc#1228119
* bsc#1228269
* bsc#1228709
* bsc#1228743
* bsc#1228747
* bsc#1229005
* bsc#1229019
* bsc#1229450
* bsc#1229454
* bsc#1229456
* bsc#1229556
* bsc#1229769
* bsc#1229837
* bsc#1229891
* bsc#1230055
* bsc#1230179
* bsc#1230289
* bsc#1230405
* bsc#1230414
* bsc#1230429
* bsc#1230456
* bsc#1230550
* bsc#1230600
* bsc#1230620
* bsc#1230715
* bsc#1230722
* bsc#1230763
* bsc#1230773
* bsc#1230774
* bsc#1230801
* bsc#1230903
* bsc#1230918
* bsc#1231016
* bsc#1231072
* bsc#1231073
* bsc#1231084
* bsc#1231085
* bsc#1231087
* bsc#1231094
* bsc#1231096
* bsc#1231105
* bsc#1231114
* bsc#1231115
* bsc#1231148
* bsc#1231179
* bsc#1231191
* bsc#1231193
* bsc#1231195
* bsc#1231197
* bsc#1231200
* bsc#1231203
* bsc#1231277
* bsc#1231293
* bsc#1231327
* bsc#1231344
* bsc#1231375
* bsc#1231383
* bsc#1231439
* bsc#1231442
* bsc#1231496
* bsc#1231502
* bsc#1231539
* bsc#1231540
* bsc#1231578
* bsc#1231673
* bsc#1231857
* bsc#1231861
* bsc#1231872
* bsc#1231883
* bsc#1231885
* bsc#1231887
* bsc#1231888
* bsc#1231889
* bsc#1231890
* bsc#1231892
* bsc#1231893
* bsc#1231895
* bsc#1231896
* bsc#1231897
* bsc#1231902
* bsc#1231903
* bsc#1231907
* bsc#1231914
* bsc#1231929
* bsc#1231935
* bsc#1231936
* bsc#1231937
* bsc#1231938
* bsc#1231939
* bsc#1231940
* bsc#1231941
* bsc#1231942
* bsc#1231944
* bsc#1231950
* bsc#1231954
* bsc#1231958
* bsc#1231960
* bsc#1231961
* bsc#1231962
* bsc#1231965
* bsc#1231967
* bsc#1231968
* bsc#1231972
* bsc#1231973
* bsc#1231976
* bsc#1231979
* bsc#1231987
* bsc#1231988
* bsc#1231990
* bsc#1231991
* bsc#1231992
* bsc#1231995
* bsc#1231996
* bsc#1231997
* bsc#1231998
* bsc#1232001
* bsc#1232004
* bsc#1232005
* bsc#1232006
* bsc#1232007
* bsc#1232025
* bsc#1232026
* bsc#1232033
* bsc#1232034
* bsc#1232035
* bsc#1232036
* bsc#1232037
* bsc#1232038
* bsc#1232039
* bsc#1232043
* bsc#1232049
* bsc#1232067
* bsc#1232069
* bsc#1232070
* bsc#1232071
* bsc#1232075
* bsc#1232083
* bsc#1232084
* bsc#1232085
* bsc#1232089
* bsc#1232097
* bsc#1232104
* bsc#1232105
* bsc#1232108
* bsc#1232114
* bsc#1232116
* bsc#1232119
* bsc#1232120
* bsc#1232123
* bsc#1232124
* bsc#1232133
* bsc#1232135
* bsc#1232136
* bsc#1232140
* bsc#1232145
* bsc#1232149
* bsc#1232150
* bsc#1232151
* bsc#1232154
* bsc#1232155
* bsc#1232160
* bsc#1232163
* bsc#1232164
* bsc#1232170
* bsc#1232172
* bsc#1232174
* bsc#1232175
* bsc#1232191
* bsc#1232196
* bsc#1232199
* bsc#1232200
* bsc#1232201
* bsc#1232217
* bsc#1232220
* bsc#1232221
* bsc#1232229
* bsc#1232233
* bsc#1232237
* bsc#1232251
* bsc#1232253
* bsc#1232259
* bsc#1232260
* bsc#1232262
* bsc#1232263
* bsc#1232282
* bsc#1232285
* bsc#1232286
* bsc#1232304
* bsc#1232305
* bsc#1232307
* bsc#1232309
* bsc#1232310
* bsc#1232313
* bsc#1232314
* bsc#1232316
* bsc#1232329
* bsc#1232332
* bsc#1232335
* bsc#1232337
* bsc#1232342
* bsc#1232345
* bsc#1232352
* bsc#1232354
* bsc#1232355
* bsc#1232358
* bsc#1232361
* bsc#1232366
* bsc#1232367
* bsc#1232368
* bsc#1232369
* bsc#1232374
* bsc#1232381
* bsc#1232383
* bsc#1232392
* bsc#1232395
* bsc#1232418
* bsc#1232424
* bsc#1232432
* bsc#1232435
* bsc#1232442
* bsc#1232446
* bsc#1232501
* bsc#1232519
* bsc#1232630
* bsc#1232631
* bsc#1232632
* bsc#1232757

Cross-References:

* CVE-2021-47416
* CVE-2021-47534
* CVE-2022-3435
* CVE-2022-45934
* CVE-2022-48664
* CVE-2022-48879
* CVE-2022-48946
* CVE-2022-48947
* CVE-2022-48948
* CVE-2022-48949
* CVE-2022-48951
* CVE-2022-48953
* CVE-2022-48954
* CVE-2022-48955
* CVE-2022-48956
* CVE-2022-48957
* CVE-2022-48958
* CVE-2022-48959
* CVE-2022-48960
* CVE-2022-48961
* CVE-2022-48962
* CVE-2022-48966
* CVE-2022-48967
* CVE-2022-48968
* CVE-2022-48969
* CVE-2022-48970
* CVE-2022-48971
* CVE-2022-48972
* CVE-2022-48973
* CVE-2022-48975
* CVE-2022-48977
* CVE-2022-48978
* CVE-2022-48980
* CVE-2022-48981
* CVE-2022-48985
* CVE-2022-48987
* CVE-2022-48988
* CVE-2022-48991
* CVE-2022-48992
* CVE-2022-48994
* CVE-2022-48995
* CVE-2022-48997
* CVE-2022-48999
* CVE-2022-49000
* CVE-2022-49002
* CVE-2022-49003
* CVE-2022-49005
* CVE-2022-49006
* CVE-2022-49007
* CVE-2022-49010
* CVE-2022-49011
* CVE-2022-49012
* CVE-2022-49014
* CVE-2022-49015
* CVE-2022-49016
* CVE-2022-49017
* CVE-2022-49019
* CVE-2022-49020
* CVE-2022-49021
* CVE-2022-49022
* CVE-2022-49023
* CVE-2022-49024
* CVE-2022-49025
* CVE-2022-49026
* CVE-2022-49027
* CVE-2022-49028
* CVE-2022-49029
* CVE-2022-49031
* CVE-2022-49032
* CVE-2023-2166
* CVE-2023-28327
* CVE-2023-52766
* CVE-2023-52800
* CVE-2023-52881
* CVE-2023-52919
* CVE-2023-6270
* CVE-2024-27043
* CVE-2024-36244
* CVE-2024-36957
* CVE-2024-39476
* CVE-2024-40965
* CVE-2024-42145
* CVE-2024-42226
* CVE-2024-42253
* CVE-2024-44931
* CVE-2024-44947
* CVE-2024-44958
* CVE-2024-45016
* CVE-2024-45025
* CVE-2024-46678
* CVE-2024-46716
* CVE-2024-46719
* CVE-2024-46754
* CVE-2024-46770
* CVE-2024-46775
* CVE-2024-46777
* CVE-2024-46809
* CVE-2024-46811
* CVE-2024-46813
* CVE-2024-46814
* CVE-2024-46815
* CVE-2024-46816
* CVE-2024-46817
* CVE-2024-46818
* CVE-2024-46826
* CVE-2024-46828
* CVE-2024-46834
* CVE-2024-46840
* CVE-2024-46841
* CVE-2024-46848
* CVE-2024-46849
* CVE-2024-46854
* CVE-2024-46855
* CVE-2024-46857
* CVE-2024-47660
* CVE-2024-47661
* CVE-2024-47664
* CVE-2024-47668
* CVE-2024-47672
* CVE-2024-47673
* CVE-2024-47674
* CVE-2024-47684
* CVE-2024-47685
* CVE-2024-47692
* CVE-2024-47704
* CVE-2024-47705
* CVE-2024-47706
* CVE-2024-47707
* CVE-2024-47710
* CVE-2024-47720
* CVE-2024-47727
* CVE-2024-47730
* CVE-2024-47738
* CVE-2024-47739
* CVE-2024-47745
* CVE-2024-47747
* CVE-2024-47748
* CVE-2024-49858
* CVE-2024-49860
* CVE-2024-49866
* CVE-2024-49867
* CVE-2024-49881
* CVE-2024-49882
* CVE-2024-49883
* CVE-2024-49886
* CVE-2024-49890
* CVE-2024-49892
* CVE-2024-49894
* CVE-2024-49895
* CVE-2024-49896
* CVE-2024-49897
* CVE-2024-49899
* CVE-2024-49901
* CVE-2024-49906
* CVE-2024-49908
* CVE-2024-49909
* CVE-2024-49911
* CVE-2024-49912
* CVE-2024-49913
* CVE-2024-49914
* CVE-2024-49917
* CVE-2024-49918
* CVE-2024-49919
* CVE-2024-49920
* CVE-2024-49922
* CVE-2024-49923
* CVE-2024-49929
* CVE-2024-49930
* CVE-2024-49933
* CVE-2024-49936
* CVE-2024-49939
* CVE-2024-49946
* CVE-2024-49949
* CVE-2024-49954
* CVE-2024-49955
* CVE-2024-49958
* CVE-2024-49959
* CVE-2024-49960
* CVE-2024-49962
* CVE-2024-49967
* CVE-2024-49969
* CVE-2024-49973
* CVE-2024-49974
* CVE-2024-49975
* CVE-2024-49982
* CVE-2024-49991
* CVE-2024-49993
* CVE-2024-49995
* CVE-2024-49996
* CVE-2024-50000
* CVE-2024-50001
* CVE-2024-50002
* CVE-2024-50006
* CVE-2024-50014
* CVE-2024-50019
* CVE-2024-50024
* CVE-2024-50028
* CVE-2024-50033
* CVE-2024-50035
* CVE-2024-50041
* CVE-2024-50045
* CVE-2024-50046
* CVE-2024-50047
* CVE-2024-50048
* CVE-2024-50049
* CVE-2024-50055
* CVE-2024-50058
* CVE-2024-50059
* CVE-2024-50061
* CVE-2024-50063
* CVE-2024-50081

CVSS scores:

* CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47534 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47534 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-3435 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-3435 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-45934 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-45934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48879 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48946 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48947 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48948 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48948 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48949 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48951 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48951 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48953 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48954 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48954 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-48954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48955 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48955 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48956 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48956 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48957 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48957 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48959 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48959 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48960 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48960 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48960 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48961 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48961 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48962 ( SUSE ): 7.2
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48962 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2022-48962 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48966 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48966 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-48966 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48967 ( SUSE ): 7.0
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48967 ( SUSE ): 7.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2022-48967 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2022-48968 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48969 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48971 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48971 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48972 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48973 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48973 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2022-48973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48975 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48977 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48977 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48978 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48978 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-48978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48980 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48980 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-48980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48981 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48981 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2022-48981 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48985 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48987 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48987 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48988 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48988 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48988 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48991 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48992 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48992 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48994 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2022-48994 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2022-48994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48995 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48995 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48997 ( SUSE ): 1.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48997 ( SUSE ): 2.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2022-48997 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-49000 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49000 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49002 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49002 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49003 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49003 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49003 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49005 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2022-49005 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2022-49005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49006 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49006 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49006 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49007 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49010 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49015 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49015 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49017 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49020 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49020 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49022 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49023 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49023 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49024 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49025 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49025 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49026 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49027 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-49028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49029 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49031 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-49032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49032 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-2166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-2166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-28327 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-28327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52800 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52881 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36244 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
* CVE-2024-36957 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-39476 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39476 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40965 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42145 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42226 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42226 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42253 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42253 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-42253 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44931 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-44931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44947 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46678 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
* CVE-2024-46678 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46716 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-46719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46754 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46754 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46809 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46811 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46811 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46813 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46813 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46813 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46814 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46814 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46814 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46815 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46815 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46816 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46816 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46817 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46818 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46818 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46849 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46854 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46854 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47660 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47660 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47660 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47661 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47661 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-47661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47664 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47664 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47664 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47668 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47668 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-47668 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47672 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47673 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47674 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47684 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47685 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47685 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-47685 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47692 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47692 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47704 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47704 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47705 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47706 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47706 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47707 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47710 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47710 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47710 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47720 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47727 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47738 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47739 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47745 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47745 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47745 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47747 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47747 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47747 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47748 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47748 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47748 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49858 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49858 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-49858 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49860 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49860 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49860 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49866 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49866 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49867 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49867 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49867 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49890 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49892 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49892 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49894 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49894 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49894 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49895 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-49895 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49896 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49896 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49897 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49899 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49901 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49906 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49909 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49911 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49912 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49913 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49914 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49917 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49918 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49919 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49920 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49922 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49923 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49929 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49930 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49933 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49933 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49936 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49936 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49939 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49954 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49955 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49960 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49960 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49960 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49962 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49969 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49969 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49974 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49974 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49974 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49982 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49991 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49993 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49993 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-49993 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49995 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49995 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-49995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49996 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50006 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50006 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50014 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50024 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50033 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50035 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50035 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50035 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50041 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50049 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50059 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50059 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50061 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50063 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50063 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Real Time Module 15-SP5

An update that solves 211 vulnerabilities and has 41 security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

* CVE-2022-48879: efi: fix NULL-deref in init error path (bsc#1229556).
* CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893).
* CVE-2022-48957: dpaa2-switch: Fix memory leak in
dpaa2_switch_acl_entry_add() and dpaa2_switch_acl_entry_remove()
(bsc#1231973).
* CVE-2022-48958: ethernet: aeroflex: fix potential skb leak in
greth_init_rings() (bsc#1231889).
* CVE-2022-48959: net: dsa: sja1105: fix memory leak in
sja1105_setup_devlink_regions() (bsc#1231976).
* CVE-2022-48960: net: hisilicon: Fix potential use-after-free in hix5hd2_rx()
(bsc#1231979).
* CVE-2022-48962: net: hisilicon: Fix potential use-after-free in
hisi_femac_rx() (bsc#1232286).
* CVE-2022-48966: net: mvneta: Fix an out of bounds check (bsc#1232191).
* CVE-2022-48980: net: dsa: sja1105: avoid out of bounds access in
sja1105_init_l2_policing() (bsc#1232233).
* CVE-2022-48991: mm/khugepaged: fix collapse_pte_mapped_thp() to allow
anon_vma (bsc#1232070).
* CVE-2022-49015: net: hsr: Fix potential use-after-free (bsc#1231938).
* CVE-2022-49017: tipc: re-fetch skb cb after tipc_msg_validate (bsc#1232004).
* CVE-2022-49020: net/9p: Fix a potential socket leak in p9_socket_open
(bsc#1232175).
* CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to
entire cycle too (bsc#1226797).
* CVE-2024-36957: octeontx2-af: avoid off-by-one read from userspace
(bsc#1225762).
* CVE-2024-39476: md/raid5: fix deadlock that raid5d() wait for itself to
clear MD_SB_CHANGE_PENDING (bsc#1227437).
* CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer
(bsc#1227885).
* CVE-2024-42226: Prevent potential failure in handle_tx_event() for Transfer
events without TRB (bsc#1228709).
* CVE-2024-42253: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race
(bsc#1229005).
* CVE-2024-44931: gpio: prevent potential speculation leaks in
gpio_device_get_desc() (bsc#1229837).
* CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc
(bsc#1230179).
* CVE-2024-45016: netem: fix return value if duplicate enqueue fails
(bsc#1230429).
* CVE-2024-45025: fix bitmap corruption on close_range() with
CLOSE_RANGE_UNSHARE (bsc#1230456).
* CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex
(bsc#1230550).
* CVE-2024-46716: dmaengine: altera-msgdma: properly free descriptor in
msgdma_free_descriptor (bsc#1230715).
* CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops
(bsc#1230801).
* CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow
(bsc#1230763).
* CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774).
* CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773).
* CVE-2024-46809: drm/amd/display: Check BIOS images before it is used
(bsc#1231148).
* CVE-2024-46811: drm/amd/display: Fix index may exceed array range within
fpu_update_bw_bounding_box (bsc#1231179).
* CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links
(bsc#1231191).
* CVE-2024-46814: drm/amd/display: Check msg_id before processing transcation
(bsc#1231193).
* CVE-2024-46815: drm/amd/display: Check num_valid_sets before accessing
reader_wm_sets (bsc#1231195).
* CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums
greater than max_links (bsc#1231197).
* CVE-2024-46817: drm/amd/display: Stop amdgpu_dm initialize when stream nums
greater than 6 (bsc#1231200).
* CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index
(bsc#1231203).
* CVE-2024-46826: ELF: fix kernel.randomize_va_space double read
(bsc#1231115).
* CVE-2024-46828: uprobes: fix kernel info leak via "[uprobes]" vma
(bsc#1231114).
* CVE-2024-46834: ethtool: fail closed if we can't get max channel used in
indirection tables (bsc#1231096).
* CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete
(bsc#1231105).
* CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from
btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094).
* CVE-2024-46848: perf/x86/intel: Limit the period on Haswell (bsc#1231072).
* CVE-2024-46849: ASoC: meson: axg-card: fix 'use-after-free' (bsc#1231073).
* CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084).
* CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085).
* CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs
(bsc#1231087).
* CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439).
* CVE-2024-47661: drm/amd/display: Avoid overflow from uint32_t to uint8_t
(bsc#1231496).
* CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency
provided by the firmware (bsc#1231442).
* CVE-2024-47668: lib/generic-radix-tree.c: Fix rare race in
__genradix_ptr_alloc() (bsc#1231502).
* CVE-2024-47672: wifi: iwlwifi: mvm: do not wait for tx queues if firmware is
dead (bsc#1231540).
* CVE-2024-47673: wifi: iwlwifi: mvm: pause TCM when the firmware is stopped
(bsc#1231539).
* CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case
(bsc#1231673).
* CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us()
(bsc#1231987).
* CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
(bsc#1231998).
* CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857).
* CVE-2024-47704: drm/amd/display: Check link_res->hpo_dp_link_enc before
using it (bsc#1231944).
* CVE-2024-47705: block: fix potential invalid pointer dereference in
blk_add_partition (bsc#1231872).
* CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain
(bsc#1231942).
* CVE-2024-47707: ipv6: avoid possible NULL deref in
rt6_uncached_list_flush_dev() (bsc#1231935).
* CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free()
(bsc#1232049).
* CVE-2024-47720: drm/amd/display: Add null check for set_output_gamma in
dcn30_set_output_transfer_func (bsc#1232043).
* CVE-2024-47727: x86/tdx: Fix "in-kernel MMIO" check (bsc#1232116).
* CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue
(bsc#1232075).
* CVE-2024-47738: wifi: mac80211: do not use rate mask for offchannel TX
either (bsc#1232114).
* CVE-2024-47739: padata: use integer wrap around to prevent deadlock on
seq_nr overflow (bsc#1232124).
* CVE-2024-47745: mm: split critical region in remap_file_pages() and invoke
LSMs in between (bsc#1232135).
* CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver
Due to Race Condition (bsc#1232145).
* CVE-2024-47748: vhost_vdpa: assign irq bypass producer token correctly
(bsc#1232174).
* CVE-2024-49860: ACPI: sysfs: validate return type of _STR method
(bsc#1231861).
* CVE-2024-49866: tracing/timerlat: Fix a race during cpuhp processing
(bsc#1232259).
* CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201).
* CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path
(bsc#1232200).
* CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent()
(bsc#1232199).
* CVE-2024-49886: platform/x86: ISST: Fix the KASAN report slab-out-of-bounds
bug (bsc#1232196).
* CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it
(bsc#1232217).
* CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default
to 1 (bsc#1232220).
* CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware
format translation (bsc#1232354).
* CVE-2024-49896: drm/amd/display: Check stream before comparing them
(bsc#1232221).
* CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used
(bsc#1232355).
* CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1
(bsc#1232358).
* CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid
nullptrs (bsc#1232305).
* CVE-2024-49906: drm/amd/display: Check null pointer before try to access it
(bsc#1232332).
* CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in
dcn32_set_output_transfer_func (bsc#1232337).
* CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in
dcn20_set_output_transfer_func (bsc#1232366).
* CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx->plane_state in
(bsc#1232369).
* CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and
clk_mgr->funcs in dcn30_init_hw (bsc#1231965).
* CVE-2024-49918: drm/amd/display: Add null check for head_pipe in
dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967).
* CVE-2024-49919: drm/amd/display: Add null check for head_pipe in
dcn201_acquire_free_pipe_for_layer (bsc#1231968).
* CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses
(bsc#1232313).
* CVE-2024-49922: drm/amd/display: Check null pointers before using them
(bsc#1232374).
* CVE-2024-49923: drm/amd/display: Pass non-null to
dcn20_validate_apply_pipe_split_flags (bsc#1232361).
* CVE-2024-49929: wifi: iwlwifi: mvm: avoid NULL pointer dereference
(bsc#1232253).
* CVE-2024-49930: wifi: ath11k: fix array out-of-bound access in SoC stats
(bsc#1232260).
* CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368).
* CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash()
(bsc#1232424).
* CVE-2024-49939: wifi: rtw89: avoid to add interface to list twice when SER
(bsc#1232381).
* CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input()
(bsc#1232164).
* CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with
UFO (bsc#1232160).
* CVE-2024-49954: static_call: Replace pointless WARN_ON() in
static_call_module_notify() (bsc#1232155).
* CVE-2024-49955: ACPI: battery: Fix possible crash when unregistering a
battery hook (bsc#1232154).
* CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching
reflink tree (bsc#1232151).
* CVE-2024-49959: jbd2: stop waiting for space when
jbd2_cleanup_journal_tail() returns error (bsc#1232149).
* CVE-2024-49960: ext4: fix timer use-after-free on failed mount
(bsc#1232395).
* CVE-2024-49962: ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in
acpi_db_convert_to_package() (bsc#1232314).
* CVE-2024-49967: ext4: no need to continue when the number of entries is 1
(bsc#1232140).
* CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color
transformation (bsc#1232519).
* CVE-2024-49973: r8169: add tally counter fields added with RTL8125
(bsc#1232105).
* CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous
(bsc#1232383).
* CVE-2024-49975: uprobes: fix kernel info leak via "[uprobes]" vma
(bsc#1232104).
* CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer
(bsc#1232282).
* CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called
with 0 count (bsc#1232316).
* CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).
* CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points
(bsc#1232089).
* CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc()
(bsc#1232085).
* CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit
(bsc#1232084).
* CVE-2024-50002: static_call: Handle module init failure correctly in
static_call_del_module() (bsc#1232083).
* CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate()
(bsc#1232442).
* CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path
(bsc#1232446).
* CVE-2024-50019: kthread: unpark only parked kthread (bsc#1231990).
* CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954).
* CVE-2024-50028: thermal: core: Reference count the zone in
thermal_zone_get_by_id() (bsc#1231950).
* CVE-2024-50033: slip: make slhc_remember() more robust against malicious
packets (bsc#1231914).
* CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392).
* CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to
mac_filter_hash (bsc#1231907).
* CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb
(bsc#1231903).
* CVE-2024-50046: kabi fix for NFSv4: Prevent NULL-pointer dereference in
nfs42_complete_copies() (bsc#1231902).
* CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).
* CVE-2024-50048: fbcon: Fix a NULL pointer dereference issue in fbcon_putcs
(bsc#1232310).
* CVE-2024-50055: driver core: bus: Fix double free in driver API
bus_register() (bsc#1232329).
* CVE-2024-50058: serial: protect uart_port_dtr_rts() in uart_shutdown() too
(bsc#1232285).
* CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in
switchtec_ntb_remove due to race condition (bsc#1232345).
* CVE-2024-50061: i3c: master: cdns: Fix use after free vulnerability in
cdns_i3c_master Driver Due to Race Condition (bsc#1232263).
* CVE-2024-50063: kABI: bpf: struct bpf_map kABI workaround (bsc#1232435).
* CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx
(bsc#1232501).

The following non-security bugs were fixed:

* ACPI: EC: Do not release locks during operation region accesses (stable-
fixes).
* ACPI: PAD: fix crash in exit_round_robin() (stable-fixes).
* ACPI: PRM: Clean up guid type in struct prm_handler_info (git-fixes).
* ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context (git-
fixes).
* ACPI: battery: Call power_supply_changed() when adding hooks (bsc#1232154)
* ACPI: battery: Simplify battery hook locking (bsc#1232154)
* ACPI: resource: Add Asus ExpertBook B2502CVA to
irq1_level_low_skip_override[] (stable-fixes).
* ACPI: resource: Add Asus Vivobook X1704VAP to irq1_level_low_skip_override[]
(stable-fixes).
* ACPI: resource: Add another DMI match for the TongFang GMxXGxx (stable-
fixes).
* ACPICA: Fix memory leak if acpi_ps_get_next_field() fails (stable-fixes).
* ACPICA: Fix memory leak if acpi_ps_get_next_namepath() fails (stable-fixes).
* ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in
acpi_db_convert_to_package() (stable-fixes).
* ACPICA: iasl: handle empty connection_node (stable-fixes).
* ALSA: asihpi: Fix potential OOB array access (stable-fixes).
* ALSA: core: add isascii() check to card ID generator (stable-fixes).
* ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()
(git-fixes).
* ALSA: hda/conexant - Fix audio routing for HP EliteOne 1000 G2 (stable-
fixes).
* ALSA: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne
1000 G2 (git-fixes).
* ALSA: hda/conexant: Fix conflicting quirk for System76 Pangolin (git-fixes).
* ALSA: hda/cs8409: Fix possible NULL dereference (git-fixes).
* ALSA: hda/generic: Unconditionally prefer preferred_dacs pairs (git-fixes).
* ALSA: hda/realtek - FIxed ALC285 headphone no sound (stable-fixes).
* ALSA: hda/realtek - Fixed ALC256 headphone no sound (stable-fixes).
* ALSA: hda/realtek: Add a quirk for HP Pavilion 15z-ec200 (stable-fixes).
* ALSA: hda/realtek: Add quirk for Huawei MateBook 13 KLV-WX9 (stable-fixes).
* ALSA: hda/realtek: Fix the push button function for the ALC257 (git-fixes).
* ALSA: hda/realtek: Update default depop procedure (git-fixes).
* ALSA: hda: Fix kctl->id initialization (git-fixes).
* ALSA: hda: cs35l41: fix module autoloading (git-fixes).
* ALSA: hdsp: Break infinite MIDI input flush loop (stable-fixes).
* ALSA: line6: add hw monitor volume control to POD HD500X (stable-fixes).
* ALSA: mixer_oss: Remove some incorrect kfree_const() usages (git-fixes).
* ALSA: usb-audio: Add delay quirk for VIVO USB-C HEADSET (stable-fixes).
* ALSA: usb-audio: Add input value sanity checks for standard types (stable-
fixes).
* ALSA: usb-audio: Add logitech Audio profile quirk (stable-fixes).
* ALSA: usb-audio: Add native DSD support for Luxman D-08u (stable-fixes).
* ALSA: usb-audio: Define macros for quirk table entries (stable-fixes).
* ALSA: usb-audio: Replace complex quirk lines with macros (stable-fixes).
* ASoC: allow module autoloading for table db1200_pids (stable-fixes).
* ASoC: imx-card: Set card.owner to avoid a warning calltrace if SND=m (git-
fixes).
* ASoC: intel: fix module autoloading (stable-fixes).
* ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe()
(git-fixes).
* ASoC: rt5682: Return devm_of_clk_add_hw_provider to transfer the error (git-
fixes).
* ASoC: soc-pcm: Do not zero TDM masks in __soc_pcm_open() (git-fixes).
* ASoC: tda7419: fix module autoloading (stable-fixes).
* Bluetooth: Call iso_exit() on module unload (git-fixes).
* Bluetooth: ISO: Fix multiple init when debugfs is disabled (git-fixes).
* Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (git-
fixes).
* Bluetooth: Remove debugfs directory on module init failure (git-fixes).
* Bluetooth: bnep: fix wild-memory-access in proto_unregister (git-fixes).
* Bluetooth: btmrvl: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* Bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001 (git-
fixes).
* Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (git-fixes).
* Drop HD-audio conexant patch that caused a regression on Thinkpad
(bsc#1228269)
* Drop USB dwc2 patch that caused a regression on RPi3 (bsc#1232342)
* HID: amd_sfh: Switch to device-managed dmam_alloc_coherent() (git-fixes).
* HID: multitouch: Add support for GT7868Q (stable-fixes).
* HID: multitouch: Add support for Thinkpad X12 Gen 2 Kbd Portfolio (stable-
fixes).
* HID: plantronics: Workaround for an unexcepted opposite volume key (stable-
fixes).
* Input: adp5589-keys - fix NULL pointer dereference (git-fixes).
* Input: adp5589-keys - fix adp5589_gpio_get_value() (git-fixes).
* Input: ads7846 - ratelimit the spi_sync error message (stable-fixes).
* Input: goodix - use the new soc_intel_is_byt() helper (stable-fixes).
* Input: synaptics - enable SMBus for HP Elitebook 840 G2 (stable-fixes).
* KVM: Fix coalesced_mmio_has_room() to avoid premature userspace exit (git-
fixes).
* KVM: Fix lockdep false negative during host resume (git-fixes).
* KVM: Grab a reference to KVM for VM and vCPU stats file descriptors (git-
fixes).
* KVM: Optimize kvm_make_vcpus_request_mask() a bit (git-fixes).
* KVM: Pre-allocate cpumasks for kvm_make_all_cpus_request_except() (git-
fixes).
* KVM: Reject overly excessive IDs in KVM_CREATE_VCPU (git-fixes).
* KVM: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value
(git-fixes).
* KVM: SVM: Do not advertise Bus Lock Detect to guest if SVM support is
missing (git-fixes).
* KVM: SVM: fix emulation of msr reads/writes of MSR_FS_BASE and MSR_GS_BASE
(git-fixes).
* KVM: Unconditionally get a ref to /dev/kvm module when creating a VM (git-
fixes).
* KVM: Write the per-page "segment" when clearing (part of) a guest page (git-
fixes).
* KVM: arm64: Add missing memory barriers when switching to pKVM's hyp pgd
(git-fixes).
* KVM: arm64: Allow AArch32 PSTATE.M to be restored as System mode (git-
fixes).
* KVM: arm64: Fix AArch32 register narrowing on userspace write (git-fixes).
* KVM: arm64: GICv4: Do not perform a map to a mapped vLPI (git-fixes).
* KVM: arm64: Invalidate EL1&0 TLB entries for all VMIDs in nvhe hyp init
(git-fixes).
* KVM: arm64: Preserve PSTATE.SS for the guest while single-step is enabled
(git-fixes).
* KVM: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE
(git-fixes).
* KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs
(git-fixes).
* KVM: arm64: vgic-its: Test for valid IRQ in MOVALL handler (git-fixes).
* KVM: arm64: vgic-its: Test for valid IRQ in its_sync_lpi_pending_table()
(git-fixes).
* KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() (git-
fixes).
* KVM: arm64: vgic-v2: Use cpuid from userspace as vcpu_id (git-fixes).
* KVM: arm64: vgic-v4: Restore pending state on host userspace write (git-
fixes).
* KVM: eventfd: Fix false positive RCU usage warning (git-fixes).
* KVM: fix memoryleak in kvm_init() (git-fixes).
* KVM: s390: Change virtual to physical address access in diag 0x258 handler
(git-fixes bsc#1232631).
* KVM: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query
(git-fixes bsc#1231277).
* KVM: s390: gaccess: Check if guest address is in memslot (git-fixes
bsc#1232630).
* KVM: x86/mmu: Fold rmap_recycle into rmap_add (git-fixes).
* KVM: x86/mmu: Rename slot_handle_leaf to slot_handle_level_4k (git-fixes).
* KVM: x86: Use a stable condition around all VT-d PI paths (git-fixes).
* Makefile.compiler: replace cc-ifversion with compiler-specific macros
(bsc#1230414 bsc#1229450).
* NFS: Avoid unnecessary rescanning of the per-server delegation list (git-
fixes).
* NFSD: Fix NFSv4's PUTPUBFH operation (git-fixes).
* NFSD: Mark filecache "down" if init fails (git-fixes).
* NFSv3: only use NFS timeout for MOUNT when protocols are compatible
(bsc#1231016).
* NFSv4: Fix clearing of layout segments in layoutreturn (git-fixes).
* PCI: Add ACS quirk for Qualcomm SA8775P (stable-fixes).
* PCI: Add function 0 DMA alias quirk for Glenfly Arise chip (stable-fixes).
* PCI: Fix pci_enable_acs() support for the ACS quirks (bsc#1229019).
* PCI: Mark Creative Labs EMU20k2 INTx masking as broken (stable-fixes).
* RDMA/bnxt_re: Add a check for memory allocation (git-fixes)
* RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (git-fixes)
* RDMA/bnxt_re: Fix incorrect AVID type in WQE structure (git-fixes)
* RDMA/bnxt_re: Fix the GID table length (git-fixes)
* RDMA/bnxt_re: Fix the max CQ WQEs for older adapters (git-fixes)
* RDMA/bnxt_re: Fix the usage of control path spin locks (git-fixes)
* RDMA/bnxt_re: Return more meaningful error (git-fixes)
* RDMA/bnxt_re: synchronize the qp-handle table array (git-fixes)
* RDMA/cxgb4: Dump vendor specific QP details (git-fixes)
* RDMA/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP (git-fixes)
* RDMA/hns: Remove unused abnormal interrupt of type RAS (git-fixes)
* RDMA/irdma: Fix misspelling of "accept*" (git-fixes)
* RDMA/mad: Improve handling of timed out WRs of mad agent (git-fixes)
* RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page
(git-fixes).
* RDMA/mana_ib: use the correct page table index based on hardware page size
(git-fixes).
* RDMA/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down (git-
fixes)
* RDMA/rtrs-srv: Avoid null pointer deref during path establishment (git-
fixes)
* RDMA/srpt: Make slab cache names unique (git-fixes)
* SUNRPC: Fix integer overflow in decode_rc_list() (git-fixes).
* SUNRPC: Fixup gss_status tracepoint error output (git-fixes).
* SUNRPC: clnt.c: Remove misleading comment (git-fixes).
* USB: appledisplay: close race between probe and completion handler (stable-
fixes).
* USB: misc: cypress_cy7c63: check for short transfer (stable-fixes).
* USB: misc: yurex: fix race between read and write (stable-fixes).
* USB: serial: option: add Telit FN920C04 MBIM compositions (stable-fixes).
* USB: serial: option: add support for Quectel EG916Q-GL (stable-fixes).
* USB: serial: pl2303: add device id for Macrosilicon MS3020 (stable-fixes).
* Use pahole -j1 option for reproducible builds (bsc#1230414 bsc#1229450).
* add bug reference for a mana change (bsc#1229769).
* add bug references to existing mana changes (bsc#1232033, bsc#1232034,
bsc#1232036).
* afs: Revert "afs: Hide silly-rename files from userspace" (git-fixes).
* arm64: cputype: Add Neoverse-N3 definitions (git-fixes)
* arm64: dts: rockchip: override BIOS_DISABLE signal via GPIO hog on RK3399
Puma (git-fixes).
* arm64: errata: Expand speculative SSBS workaround once more (git-fixes)
* arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes)
* arm64: probes: Fix simulate_ldr*_literal() (git-fixes)
* arm64: probes: Fix uprobes for big-endian kernels (git-fixes)
* arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes)
* block: print symbolic error name instead of error code (bsc#1231872).
* bpf, lsm: Add disabled BPF LSM hook list (git-fixes).
* bpf, net: Fix a potential race in do_sock_getsockopt() (git-fixes).
* bpf, verifier: Correct tail_call_reachable for bpf prog (git-fixes).
* bpf, x64: Remove tail call detection (git-fixes).
* bpf,perf: Fix perf_event_detach_bpf_prog error handling (git-fixes).
* bpf: Add --skip_encoding_btf_inconsistent_proto, --btf_gen_optimized to
pahole flags for v1.25 (bsc#1230414 bsc#1229450).
* bpf: Allow helpers to accept pointers with a fixed size (git-fixes).
* bpf: Check for helper calls in check_subprogs() (git-fixes).
* bpf: Fix bpf_strtol and bpf_strtoul helpers for 32bit (git-fixes).
* bpf: Fix helper writes to read-only maps (git-fixes).
* bpf: Fix pointer-leak due to insufficient speculative store bypass
mitigation (bsc#1231375).
* bpf: Fix tailcall cases in test_bpf (git-fixes).
* bpf: Improve check_raw_mode_ok test for MEM_UNINIT-tagged types (git-fixes).
* bpf: Remove truncation test in bpf_strtol and bpf_strtoul helpers (git-
fixes).
* bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error (git-fixes).
* bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos (git-fixes).
* btf, scripts: Exclude Rust CUs with pahole (bsc#1230414 bsc#1229450).
* bus: integrator-lm: fix OF node leak in probe() (git-fixes).
* ceph: fix cap ref leak via netfs init_request (bsc#1231383).
* char: tpm: Fix possible memory leak in tpm_bios_measurements_open() (git-
fixes).
* clk: Add a devm variant of clk_rate_exclusive_get() (bsc#1227885).
* clk: Provide !COMMON_CLK dummy for devm_clk_rate_exclusive_get()
(bsc#1227885).
* comedi: ni_routing: tools: Check when the file could not be opened (stable-
fixes).
* cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems
(git-fixes).
* crypto: hisilicon - Remove pci_aer_clear_nonfatal_status() call
(bsc#1232075)
* crypto: hisilicon/qm - re-enable communicate interrupt before notifying PF
(bsc#1232075)
* debugfs: fix automount d_fsdata usage (git-fixes).
* dn_route: set rt neigh to blackhole_netdev instead of loopback_dev in ifdown
(bsc#1216813).
* drbd: Add NULL check for net_conf to prevent dereference in state validation
(git-fixes).
* drbd: Fix atomicity violation in drbd_uuid_set_bm() (git-fixes).
* driver core: bus: Return -EIO instead of 0 when show/store invalid bus
attribute (stable-fixes).
* drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring (git-fixes).
* drm/amd/display: Add null check for 'afb' in
amdgpu_dm_plane_handle_cursor_update (v2) (stable-fixes).
* drm/amd/display: Add null check for top_pipe_to_program in
commit_planes_for_stream (stable-fixes).
* drm/amd/display: Allow backlight to go below
`AMDGPU_DM_DEFAULT_MIN_BACKLIGHT` (stable-fixes).
* drm/amd/display: Check link_res->hpo_dp_link_enc before using it
(bsc#1231944)
* drm/amd/display: Check null pointer before dereferencing se (stable-fixes).
* drm/amd/display: Check null pointers before using dc->clk_mgr (stable-
fixes).
* drm/amd/display: Check stream before comparing them (stable-fixes).
* drm/amd/display: Fix Synaptics Cascaded Panamera DSC Determination (stable-
fixes).
* drm/amd/display: Fix index out of bounds in DCN30 color transformation
(stable-fixes).
* drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format
translation (stable-fixes).
* drm/amd/display: Fix index out of bounds in degamma hardware format
translation (stable-fixes).
* drm/amd/display: Fix system hang while resume with TBT monitor (stable-
fixes).
* drm/amd/display: Handle null 'stream_status' in
'planes_changed_for_existing_stream' (stable-fixes).
* drm/amd/display: Initialize get_bytes_per_element's default to 1 (stable-
fixes).
* drm/amd/display: Round calculated vtotal (stable-fixes).
* drm/amd/display: Validate backlight caps are sane (stable-fixes).
* drm/amd/pm: ensure the fw_info is not null before using it (stable-fixes).
* drm/amd: Guard against bad data for ATIF ACPI method (git-fixes).
* drm/amdgpu: Replace one-element array with flexible-array member (stable-
fixes).
* drm/amdgpu: add raven1 gfxoff quirk (stable-fixes).
* drm/amdgpu: disallow multiple BO_HANDLES chunks in one submit (stable-
fixes).
* drm/amdgpu: enable gfxoff quirk on HP 705G4 (stable-fixes).
* drm/amdgpu: fix unchecked return value warning for amdgpu_gfx (stable-
fixes).
* drm/amdgpu: prevent BO_HANDLES error from being overwritten (git-fixes).
* drm/amdgpu: properly handle vbios fake edid sizing (git-fixes).
* drm/amdkfd: Fix resource leak in criu restore queue (stable-fixes).
* drm/msm/dpu: do not always program merge_3d block (git-fixes).
* drm/msm/dpu: make sure phys resources are properly initialized (git-fixes).
* drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation
(git-fixes).
* drm/msm: Allocate memory for disp snapshot with kvzalloc() (git-fixes).
* drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() (git-fixes).
* drm/printer: Allow NULL data in devcoredump printer (stable-fixes).
* drm/radeon/r100: Handle unknown family in r100_cp_init_microcode() (stable-
fixes).
* drm/radeon: Fix encoder->possible_clones (git-fixes).
* drm/radeon: Replace one-element array with flexible-array member (stable-
fixes).
* drm/radeon: properly handle vbios fake edid sizing (git-fixes).
* drm/rockchip: define gamma registers for RK3399 (stable-fixes).
* drm/rockchip: support gamma control on RK3399 (stable-fixes).
* drm/sched: Add locking to drm_sched_entity_modify_sched (git-fixes).
* drm/v3d: Stop the active perfmon before being destroyed (git-fixes).
* drm/vc4: Stop the active perfmon before being destroyed (git-fixes).
* drm/vmwgfx: Handle surface check failure correctly (git-fixes).
* drm: Consistently use struct drm_mode_rect for FB_DAMAGE_CLIPS (git-fixes).
* drm: komeda: Fix an issue related to normalized zpos (stable-fixes).
* efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
(stable-fixes).
* erofs: avoid consecutive detection for Highmem memory (git-fixes).
* erofs: avoid infinite loop in z_erofs_do_read_page() when reading beyond EOF
(git-fixes).
* erofs: fix pcluster use-after-free on UP platforms (git-fixes).
* erofs: fix potential overflow calculating xattr_isize (git-fixes).
* erofs: stop parsing non-compact HEAD index if clusterofs is invalid (git-
fixes).
* exportfs: use pr_debug for unreachable debug statements (git-fixes).
* ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201)
* fat: fix uninitialized variable (git-fixes).
* fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes).
* fbdev: sisfb: Fix strbuf array overflow (stable-fixes).
* fgraph: Change the name of cpuhp state to "fgraph:online" (git-fixes).
* fgraph: Fix missing unlock in register_ftrace_graph() (git-fixes).
* fgraph: Use CPU hotplug mechanism to initialize idle shadow stacks (git-
fixes).
* filelock: fix potential use-after-free in posix_lock_inode (git-fixes).
* firmware: tegra: bpmp: Drop unused mbox_client_to_bpmp() (git-fixes).
* fs/namespace: fnic: Switch to use %ptTd (git-fixes).
* fs/pipe: Fix lockdep false-positive in watchqueue pipe_write() (git-fixes).
* fs: Fix file_set_fowner LSM hook inconsistencies (git-fixes).
* gpio: aspeed: Add the flush write to ensure the write complete (git-fixes).
* gpio: aspeed: Use devm_clk api to manage clock source (git-fixes).
* gpio: davinci: fix lazy disable (git-fixes).
* hid: intel-ish-hid: Fix uninitialized variable 'rv' in
ish_fw_xfer_direct_dma (git-fixes).
* hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event
(git-fixes).
* hwmon: (adm9240) Add missing dependency on REGMAP_I2C (git-fixes).
* hwmon: (tmp513) Add missing dependency on REGMAP_I2C (git-fixes).
* i2c: i801: Use a different adapter-name for IDF adapters (stable-fixes).
* i2c: imx-lpi2c: return -EINVAL when i2c peripheral clk does not work
(bsc#1227885).
* i2c: imx-lpi2c: use bulk clk API (bsc#1227885).
* i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume
(git-fixes).
* i2c: xiic: Fix RX IRQ busy check (stable-fixes).
* i2c: xiic: Fix broken locking on tx_msg (stable-fixes).
* i2c: xiic: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
fixes).
* i2c: xiic: Switch from waitqueue to completion (stable-fixes).
* i2c: xiic: Try re-initialization on bus busy timeout (git-fixes).
* i2c: xiic: Use devm_clk_get_enabled() (stable-fixes).
* i2c: xiic: improve error message when transfer fails to start (stable-
fixes).
* i2c: xiic: xiic_xfer(): Fix runtime PM leak on error path (git-fixes).
* ice: Unbind the workqueue (bsc#1231344).
* iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig (git-fixes).
* iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig (git-fixes).
* iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig (git-
fixes).
* iio: hid-sensors: Fix an error handling path in
_hid_sensor_set_report_latency() (git-fixes).
* iio: light: opt3001: add missing full-scale range value (git-fixes).
* iio: light: veml6030: fix ALS sensor resolution (git-fixes).
* iio: light: veml6030: fix IIO device retrieval from embedded device (git-
fixes).
* iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
(git-fixes).
* iommu/vt-d: Always reserve a domain ID for identity setup (git-fixes).
* ipv6: blackhole_netdev needs snmp6 counters (bsc#1216813).
* ipv6: give an IPv6 dev to blackhole_netdev (bsc#1216813).
* jfs: Fix sanity check in dbMount (git-fixes).
* jfs: Fix uaf in dbFreeBits (git-fixes).
* jfs: Fix uninit-value access of new_ea in ea_buffer (git-fixes).
* jfs: UBSAN: shift-out-of-bounds in dbFindBits (git-fixes).
* jfs: check if leafidx greater than num leaves per dmap tree (git-fixes).
* kABI: bpf: enum bpf_{type_flag,arg_type} kABI workaround (git-fixes).
* kABI: bpf: struct bpf_func_proto kABI workaround (git-fixes).
* kab: fix after net: add more sanity check in virtio_net_hdr_to_skb() (git-
fixes).
* kabi fix of KVM: arm64: Preserve PSTATE.SS for the guest while single-step
is enabled (git-fixes).
* kabi: fix after KVM: arm64: mixed-width check should be skipped for
uninitialized vCPUs (git-fixes).
* kabi: fix after kvm: add guest_state_{enter,exit}_irqoff() (git-fixes).
* kbuild, bpf: Use test-ge check for v1.25-only pahole (bsc#1230414
bsc#1229450).
* kbuild,bpf: Add module-specific pahole flags for distilled base BTF
(bsc#1230414 bsc#1229450).
* kbuild,bpf: Switch to using --btf_features for pahole v1.26 and later
(bsc#1230414 bsc#1229450).
* kbuild: add test-{ge,gt,le,lt} macros (bsc#1230414 bsc#1229450).
* kbuild: avoid too many execution of scripts/pahole-flags.sh (bsc#1230414
bsc#1229450).
* kbuild: bpf: Tell pahole to DECL_TAG kfuncs (bsc#1230414 bsc#1229450).
* kvm/arm64: rework guest entry logic (git-fixes).
* kvm: Add support for arch compat vm ioctls (git-fixes).
* kvm: add guest_state_{enter,exit}_irqoff() (git-fixes).
* media: videobuf2-core: clear memory related fields in
__vb2_plane_dmabuf_put() (stable-fixes).
* module: abort module loading when sysfs setup suffer errors (git-fixes).
* nbd: fix race between timeout and normal completion (bsc#1230918).
* net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX
(bsc#1226797)
* net: add more sanity check in virtio_net_hdr_to_skb() (git-fixes).
* net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891).
* net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289).
* net: socket: suppress unused warning (git-fixes).
* net: test for not too small csum_start in virtio_net_hdr_to_skb() (git-
fixes).
* net: usb: usbnet: fix name regression (git-fixes).
* netdevsim: use cond_resched() in nsim_dev_trap_report_work() (git-fixes).
* nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes).
* nfsd: call cache_put if xdr_reserve_space returns NULL (git-fixes).
* nfsd: fix delegation_blocked() to block correctly for at least 30 seconds
(git-fixes).
* nfsd: fix refcount leak when file is unhashed after being found (git-fixes).
* nfsd: map the EBADMSG to nfserr_io to avoid warning (git-fixes).
* nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire (git-
fixes).
* nfsd: return -EINVAL when namelen is 0 (git-fixes).
* nilfs2: fix kernel bug due to missing clearing of buffer delay flag (git-
fixes).
* nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error (git-
fixes).
* ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() (git-
fixes).
* ntb: ntb_hw_switchtec: Fix use after free vulnerability in
switchtec_ntb_remove due to race condition (stable-fixes).
* nvme-multipath: system fails to create generic nvme device (git-fixes).
* nvme-pci: qdepth 1 quirk (git-fixes).
* nvmet-auth: assign dh_key to NULL after kfree_sensitive (git-fixes).
* ocfs2: fix the la space leak when unmounting an ocfs2 volume (git-fixes).
* ocfs2: fix uninit-value in ocfs2_get_block() (git-fixes).
* ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (git-fixes).
* parport: Proper fix for array out-of-bounds access (git-fixes).
* platform/surface: aggregator_registry: Add support for Surface Laptop Go 3
(stable-fixes).
* platform/x86: touchscreen_dmi: add nanote-next quirk (stable-fixes).
* power: reset: brcmstb: Do not go into infinite loop if reset fails (stable-
fixes).
* powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869).
* powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869).
* powerpc/boot: Only free if realloc() succeeds (bsc#1194869).
* powerpc/code-patching: Add generic memory patching (bsc#1194869).
* powerpc/code-patching: Consolidate and cache per-cpu patching context
(bsc#1194869).
* powerpc/code-patching: Do not call is_vmalloc_or_module_addr() without
CONFIG_MODULES (bsc#1194869).
* powerpc/code-patching: Fix error handling in do_patch_instruction()
(bsc#1194869).
* powerpc/code-patching: Fix oops with DEBUG_VM enabled (bsc#1194869).
* powerpc/code-patching: Fix unmap_patch_area() error handling (bsc#1194869).
* powerpc/code-patching: Perform hwsync in __patch_instruction() in case of
failure (bsc#1194869).
* powerpc/code-patching: Pre-map patch area (bsc#1194869).
* powerpc/code-patching: Remove #ifdef CONFIG_STRICT_KERNEL_RWX (bsc#1194869).
* powerpc/code-patching: Remove pr_debug()/pr_devel() messages and fix check()
(bsc#1194869).
* powerpc/code-patching: Reorganise do_patch_instruction() to ease error
handling (bsc#1194869).
* powerpc/code-patching: Speed up page mapping/unmapping (bsc#1194869).
* powerpc/code-patching: Use WARN_ON and fix check in poking_init
(bsc#1194869).
* powerpc/code-patching: Use jump_label to check if poking_init() is done
(bsc#1194869).
* powerpc/code-patching: Use temporary mm for Radix MMU (bsc#1194869).
* powerpc/code-patching: introduce patch_instructions() (bsc#1194869).
* powerpc/ftrace: Use patch_instruction() return directly (bsc#1194869).
* powerpc/imc-pmu: Fix use of mutex in IRQs disabled section (bsc#1054914 git-
fixes).
* powerpc/imc-pmu: Use the correct spinlock initializer (bsc#1054914 git-
fixes).
* powerpc/inst: Refactor ___get_user_instr() (bsc#1194869).
* powerpc/lib: Add __init attribute to eligible functions (bsc#1194869).
* powerpc/tlb: Add local flush for page given mm_struct and psize
(bsc#1194869).
* powerpc/vdso: Fix VDSO data access when running in a non-root time namespace
(bsc#1194869).
* powerpc/vdso: Merge vdso64 and vdso32 into a single directory (bsc#1194869).
* powerpc/vdso: Rework VDSO32 makefile to add a prefix to object files
(bsc#1194869).
* powerpc/vdso: augment VDSO32 functions to support 64 bits build
(bsc#1194869).
* powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu
(bsc#1194869).
* powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729).
* powerpc: Allow clearing and restoring registers independent of saved
breakpoint state (bsc#1194869).
* rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow
(bsc#1226631).
* rcu: Add rcutree.nohz_full_patience_delay to reduce nohz_full (bsc#1231327)
* s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747).
* s390/sclp_vt220: Convert newlines to CRLF instead of LFCR (git-fixes
bsc#1232632).
* sched/isolation: Prevent boot crash when the boot CPU is (bsc#1231327)
* scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes).
* scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes).
* scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes).
* scsi: core: Handle devices which return an unusually large VPD page count
(git-fixes).
* scsi: core: alua: I/O errors for ALUA state transitions (git-fixes).
* scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del()
(git-fixes).
* scsi: fnic: Move flush_work initialization out of if block (bsc#1230055).
* scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes).
* scsi: libsas: Fix exp-attached device scan after probe failure scanned in
again after probe failed (git-fixes).
* scsi: libsas: Fix the failure of adding phy with zero-address to port (git-
fixes).
* scsi: lpfc: Add ELS_RSP cmd to the list of WQEs to flush in
lpfc_els_flush_cmd() (bsc#1232757).
* scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV
instance (bsc#1232757).
* scsi: lpfc: Fix kref imbalance on fabric ndlps from dev_loss_tmo handler
(bsc#1232757).
* scsi: lpfc: Remove trailing space after \n newline (bsc#1232757).
* scsi: lpfc: Restrict support for 32 byte CDBs to specific HBAs (git-fixes).
* scsi: lpfc: Revise TRACE_EVENT log flag severities from KERN_ERR to
KERN_WARNING (bsc#1232757).
* scsi: lpfc: Support loopback tests with VMID enabled (bsc#1232757).
* scsi: lpfc: Update lpfc version to 14.4.0.5 (bsc#1232757).
* scsi: lpfc: Update phba link state conditional before sending CMF_SYNC_WQE
(bsc#1232757).
* scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes).
* scsi: mac_scsi: Refactor polling loop (git-fixes).
* scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes).
* scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
* scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes).
* scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
* scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes).
* scsi: smartpqi: correct stream detection (git-fixes).
* scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git-
fixes).
* scsi: spi: Fix sshdr use (git-fixes).
* scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes).
* selftests/bpf: Add a test case to write mtu result into .rodata (git-fixes).
* selftests/bpf: Add a test case to write strtol result into .rodata (git-
fixes).
* selftests/bpf: Fix ARG_PTR_TO_LONG {half-,}uninitialized test (git-fixes).
* selftests/bpf: Rename ARG_PTR_TO_LONG test description (git-fixes).
* selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation (git-
fixes).
* spi: bcm63xx: Enable module autoloading (stable-fixes).
* spi: bcm63xx: Fix module autoloading (git-fixes).
* spi: lpspi: Silence error message upon deferred probe (stable-fixes).
* spi: lpspi: Simplify some error message (git-fixes).
* spi: lpspi: release requested DMA channels (stable-fixes).
* spi: ppc4xx: Avoid returning 0 when failed to parse and map IRQ (git-fixes).
* spi: ppc4xx: handle irq_of_parse_and_map() errors (git-fixes).
* spi: s3c64xx: fix timeout counters in flush_fifo (git-fixes).
* spi: spi-fsl-lpspi: Undo runtime PM changes at driver exit time (git-fixes).
* spi: spi-imx: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
fixes).
* spi: spidev: Add missing spi_device_id for jg10309-01 (git-fixes).
* static_call: Do not make __static_call_return0 static (git-fixes).
* tracing/hwlat: Fix a race during cpuhp processing (git-fixes).
* tracing/uprobes: Use trace_event_buffer_reserve() helper (git-fixes).
* tracing: Consider the NULL character when validating the event length (git-
fixes).
* uprobe: avoid out-of-bounds memory access of fetching args (git-fixes).
* uprobes: encapsulate preparation of uprobe args buffer (git-fixes).
* usb: chipidea: udc: enable suspend interrupt after usb reset (stable-fixes).
* usb: dwc2: Adjust the timing of USB Driver Interrupt Registration in the
Crashkernel Scenario (stable-fixes).
* usb: dwc3: core: Stop processing of pending events if controller is halted
(git-fixes).
* usb: gadget: core: force synchronous registration (git-fixes).
* usb: storage: ignore bogus device raised by JieLi BR21 USB sound chip
(stable-fixes).
* usb: typec: altmode should keep reference to parent (git-fixes).
* usb: xhci: Fix problem with xhci resume from suspend (stable-fixes).
* usb: yurex: Fix inconsistent locking bug in yurex_read() (git-fixes).
* usb: yurex: Replace snprintf() with the safer scnprintf() variant (stable-
fixes).
* usbnet: ipheth: fix carrier detection in modes 1 and 4 (stable-fixes).
* vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() (git-fixes).
* vhost_vdpa: assign irq bypass producer token correctly (git-fixes).
* virtio-net: synchronize probe with ndo_set_features (git-fixes).
* virtio_console: fix misc probe bugs (git-fixes).
* virtio_net: fixing XDP for fully checksummed packets handling (git-fixes).
* vmxnet3: add command to allow disabling of offloads (bsc#1226498).
* vmxnet3: add latency measurement support in vmxnet3 (bsc#1226498).
* vmxnet3: prepare for version 9 changes (bsc#1226498).
* vmxnet3: update to version 9 (bsc#1226498).
* vsock/virtio: fix packet delivery to tap device (git-fixes).
* wifi: ath11k: fix array out-of-bound access in SoC stats (stable-fixes).
* wifi: ath9k: Remove error checks when creating debugfs entries (git-fixes).
* wifi: ath9k: fix parameter check in ath9k_init_debug() (stable-fixes).
* wifi: ath9k: fix possible integer overflow in ath9k_get_et_stats() (stable-
fixes).
* wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit
(stable-fixes).
* wifi: iwlwifi: clear trans->state earlier upon error (stable-fixes).
* wifi: iwlwifi: lower message level for FW buffer destination (stable-fixes).
* wifi: iwlwifi: mvm: fix iwl_mvm_scan_fits() calculation (stable-fixes).
* wifi: mwifiex: Fix memcpy() field-spanning write warning in
mwifiex_cmd_802_11_scan_ext() (stable-fixes).
* wifi: rtw88: select WANT_DEV_COREDUMP (stable-fixes).
* workqueue: Avoid using isolated cpus' timers on (bsc#1231327)
* workqueue: mark power efficient workqueue as unbounded if (bsc#1231327)
* x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (git-fixes).
* x86/bugs: Skip RSB fill at VMEXIT (git-fixes).
* x86/cpufeatures: Add a IBPB_NO_RET BUG flag (git-fixes).
* x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (git-fixes).
* x86/entry: Have entry_ibpb() invalidate return predictions (git-fixes).
* x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides frequency
(git-fixes).
* x86/kaslr: Expose and use the end of the physical memory address space
(bsc#1230405).
* xfrm: set dst dev to blackhole_netdev instead of loopback_dev in ifdown
(bsc#1216813).
* xhci: Fix incorrect stream context type macro (git-fixes).
* xhci: Mitigate failed set dequeue pointer commands (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Real Time Module 15-SP5
zypper in -t patch SUSE-SLE-Module-RT-15-SP5-2024-3985=1

* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3985=1 openSUSE-SLE-15.5-2024-3985=1

* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3985=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3985=1

* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3985=1

## Package List:

* SUSE Real Time Module 15-SP5 (x86_64)
* kernel-rt_debug-debugsource-5.14.21-150500.13.76.1
* dlm-kmp-rt-debuginfo-5.14.21-150500.13.76.1
* gfs2-kmp-rt-debuginfo-5.14.21-150500.13.76.1
* kernel-rt_debug-devel-5.14.21-150500.13.76.1
* kernel-rt_debug-vdso-5.14.21-150500.13.76.1
* dlm-kmp-rt-5.14.21-150500.13.76.1
* ocfs2-kmp-rt-5.14.21-150500.13.76.1
* kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.76.1
* kernel-rt-vdso-5.14.21-150500.13.76.1
* ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.76.1
* cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.76.1
* kernel-rt_debug-debuginfo-5.14.21-150500.13.76.1
* cluster-md-kmp-rt-5.14.21-150500.13.76.1
* kernel-syms-rt-5.14.21-150500.13.76.1
* kernel-rt-vdso-debuginfo-5.14.21-150500.13.76.1
* kernel-rt-debugsource-5.14.21-150500.13.76.1
* kernel-rt-devel-5.14.21-150500.13.76.1
* kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.76.1
* kernel-rt-debuginfo-5.14.21-150500.13.76.1
* kernel-rt-devel-debuginfo-5.14.21-150500.13.76.1
* gfs2-kmp-rt-5.14.21-150500.13.76.1
* SUSE Real Time Module 15-SP5 (noarch)
* kernel-source-rt-5.14.21-150500.13.76.1
* kernel-devel-rt-5.14.21-150500.13.76.1
* SUSE Real Time Module 15-SP5 (nosrc x86_64)
* kernel-rt_debug-5.14.21-150500.13.76.1
* kernel-rt-5.14.21-150500.13.76.1
* openSUSE Leap 15.5 (noarch)
* kernel-source-rt-5.14.21-150500.13.76.1
* kernel-devel-rt-5.14.21-150500.13.76.1
* openSUSE Leap 15.5 (x86_64)
* kernel-rt_debug-debugsource-5.14.21-150500.13.76.1
* reiserfs-kmp-rt-5.14.21-150500.13.76.1
* dlm-kmp-rt-debuginfo-5.14.21-150500.13.76.1
* gfs2-kmp-rt-debuginfo-5.14.21-150500.13.76.1
* kselftests-kmp-rt-5.14.21-150500.13.76.1
* kernel-livepatch-SLE15-SP5-RT_Update_22-debugsource-1-150500.11.3.1
* kernel-rt_debug-livepatch-devel-5.14.21-150500.13.76.1
* kernel-rt-optional-5.14.21-150500.13.76.1
* kernel-rt-livepatch-devel-5.14.21-150500.13.76.1
* kernel-rt_debug-devel-5.14.21-150500.13.76.1
* kernel-rt_debug-vdso-5.14.21-150500.13.76.1
* dlm-kmp-rt-5.14.21-150500.13.76.1
* kernel-livepatch-5_14_21-150500_13_76-rt-1-150500.11.3.1
* ocfs2-kmp-rt-5.14.21-150500.13.76.1
* kernel-rt-extra-5.14.21-150500.13.76.1
* kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.76.1
* kernel-rt-vdso-5.14.21-150500.13.76.1
* kernel-rt-optional-debuginfo-5.14.21-150500.13.76.1
* cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.76.1
* ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.76.1
* kernel-rt_debug-debuginfo-5.14.21-150500.13.76.1
* cluster-md-kmp-rt-5.14.21-150500.13.76.1
* kernel-syms-rt-5.14.21-150500.13.76.1
* kernel-rt-extra-debuginfo-5.14.21-150500.13.76.1
* kernel-rt-vdso-debuginfo-5.14.21-150500.13.76.1
* kselftests-kmp-rt-debuginfo-5.14.21-150500.13.76.1
* reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.76.1
* kernel-rt-debugsource-5.14.21-150500.13.76.1
* kernel-rt-devel-5.14.21-150500.13.76.1
* kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.76.1
* kernel-rt-debuginfo-5.14.21-150500.13.76.1
* kernel-livepatch-5_14_21-150500_13_76-rt-debuginfo-1-150500.11.3.1
* kernel-rt-devel-debuginfo-5.14.21-150500.13.76.1
* kernel-rt-livepatch-5.14.21-150500.13.76.1
* gfs2-kmp-rt-5.14.21-150500.13.76.1
* openSUSE Leap 15.5 (nosrc x86_64)
* kernel-rt_debug-5.14.21-150500.13.76.1
* kernel-rt-5.14.21-150500.13.76.1
* openSUSE Leap Micro 5.5 (nosrc x86_64)
* kernel-rt-5.14.21-150500.13.76.1
* openSUSE Leap Micro 5.5 (x86_64)
* kernel-rt-debugsource-5.14.21-150500.13.76.1
* kernel-rt-debuginfo-5.14.21-150500.13.76.1
* SUSE Linux Enterprise Micro 5.5 (nosrc x86_64)
* kernel-rt-5.14.21-150500.13.76.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* kernel-rt-debugsource-5.14.21-150500.13.76.1
* kernel-rt-debuginfo-5.14.21-150500.13.76.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-source-rt-5.14.21-150500.13.76.1
* SUSE Linux Enterprise Live Patching 15-SP5 (x86_64)
* kernel-livepatch-5_14_21-150500_13_76-rt-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_13_76-rt-debuginfo-1-150500.11.3.1
* kernel-livepatch-SLE15-SP5-RT_Update_22-debugsource-1-150500.11.3.1

## References:

* https://www.suse.com/security/cve/CVE-2021-47416.html
* https://www.suse.com/security/cve/CVE-2021-47534.html
* https://www.suse.com/security/cve/CVE-2022-3435.html
* https://www.suse.com/security/cve/CVE-2022-45934.html
* https://www.suse.com/security/cve/CVE-2022-48664.html
* https://www.suse.com/security/cve/CVE-2022-48879.html
* https://www.suse.com/security/cve/CVE-2022-48946.html
* https://www.suse.com/security/cve/CVE-2022-48947.html
* https://www.suse.com/security/cve/CVE-2022-48948.html
* https://www.suse.com/security/cve/CVE-2022-48949.html
* https://www.suse.com/security/cve/CVE-2022-48951.html
* https://www.suse.com/security/cve/CVE-2022-48953.html
* https://www.suse.com/security/cve/CVE-2022-48954.html
* https://www.suse.com/security/cve/CVE-2022-48955.html
* https://www.suse.com/security/cve/CVE-2022-48956.html
* https://www.suse.com/security/cve/CVE-2022-48957.html
* https://www.suse.com/security/cve/CVE-2022-48958.html
* https://www.suse.com/security/cve/CVE-2022-48959.html
* https://www.suse.com/security/cve/CVE-2022-48960.html
* https://www.suse.com/security/cve/CVE-2022-48961.html
* https://www.suse.com/security/cve/CVE-2022-48962.html
* https://www.suse.com/security/cve/CVE-2022-48966.html
* https://www.suse.com/security/cve/CVE-2022-48967.html
* https://www.suse.com/security/cve/CVE-2022-48968.html
* https://www.suse.com/security/cve/CVE-2022-48969.html
* https://www.suse.com/security/cve/CVE-2022-48970.html
* https://www.suse.com/security/cve/CVE-2022-48971.html
* https://www.suse.com/security/cve/CVE-2022-48972.html
* https://www.suse.com/security/cve/CVE-2022-48973.html
* https://www.suse.com/security/cve/CVE-2022-48975.html
* https://www.suse.com/security/cve/CVE-2022-48977.html
* https://www.suse.com/security/cve/CVE-2022-48978.html
* https://www.suse.com/security/cve/CVE-2022-48980.html
* https://www.suse.com/security/cve/CVE-2022-48981.html
* https://www.suse.com/security/cve/CVE-2022-48985.html
* https://www.suse.com/security/cve/CVE-2022-48987.html
* https://www.suse.com/security/cve/CVE-2022-48988.html
* https://www.suse.com/security/cve/CVE-2022-48991.html
* https://www.suse.com/security/cve/CVE-2022-48992.html
* https://www.suse.com/security/cve/CVE-2022-48994.html
* https://www.suse.com/security/cve/CVE-2022-48995.html
* https://www.suse.com/security/cve/CVE-2022-48997.html
* https://www.suse.com/security/cve/CVE-2022-48999.html
* https://www.suse.com/security/cve/CVE-2022-49000.html
* https://www.suse.com/security/cve/CVE-2022-49002.html
* https://www.suse.com/security/cve/CVE-2022-49003.html
* https://www.suse.com/security/cve/CVE-2022-49005.html
* https://www.suse.com/security/cve/CVE-2022-49006.html
* https://www.suse.com/security/cve/CVE-2022-49007.html
* https://www.suse.com/security/cve/CVE-2022-49010.html
* https://www.suse.com/security/cve/CVE-2022-49011.html
* https://www.suse.com/security/cve/CVE-2022-49012.html
* https://www.suse.com/security/cve/CVE-2022-49014.html
* https://www.suse.com/security/cve/CVE-2022-49015.html
* https://www.suse.com/security/cve/CVE-2022-49016.html
* https://www.suse.com/security/cve/CVE-2022-49017.html
* https://www.suse.com/security/cve/CVE-2022-49019.html
* https://www.suse.com/security/cve/CVE-2022-49020.html
* https://www.suse.com/security/cve/CVE-2022-49021.html
* https://www.suse.com/security/cve/CVE-2022-49022.html
* https://www.suse.com/security/cve/CVE-2022-49023.html
* https://www.suse.com/security/cve/CVE-2022-49024.html
* https://www.suse.com/security/cve/CVE-2022-49025.html
* https://www.suse.com/security/cve/CVE-2022-49026.html
* https://www.suse.com/security/cve/CVE-2022-49027.html
* https://www.suse.com/security/cve/CVE-2022-49028.html
* https://www.suse.com/security/cve/CVE-2022-49029.html
* https://www.suse.com/security/cve/CVE-2022-49031.html
* https://www.suse.com/security/cve/CVE-2022-49032.html
* https://www.suse.com/security/cve/CVE-2023-2166.html
* https://www.suse.com/security/cve/CVE-2023-28327.html
* https://www.suse.com/security/cve/CVE-2023-52766.html
* https://www.suse.com/security/cve/CVE-2023-52800.html
* https://www.suse.com/security/cve/CVE-2023-52881.html
* https://www.suse.com/security/cve/CVE-2023-52919.html
* https://www.suse.com/security/cve/CVE-2023-6270.html
* https://www.suse.com/security/cve/CVE-2024-27043.html
* https://www.suse.com/security/cve/CVE-2024-36244.html
* https://www.suse.com/security/cve/CVE-2024-36957.html
* https://www.suse.com/security/cve/CVE-2024-39476.html
* https://www.suse.com/security/cve/CVE-2024-40965.html
* https://www.suse.com/security/cve/CVE-2024-42145.html
* https://www.suse.com/security/cve/CVE-2024-42226.html
* https://www.suse.com/security/cve/CVE-2024-42253.html
* https://www.suse.com/security/cve/CVE-2024-44931.html
* https://www.suse.com/security/cve/CVE-2024-44947.html
* https://www.suse.com/security/cve/CVE-2024-44958.html
* https://www.suse.com/security/cve/CVE-2024-45016.html
* https://www.suse.com/security/cve/CVE-2024-45025.html
* https://www.suse.com/security/cve/CVE-2024-46678.html
* https://www.suse.com/security/cve/CVE-2024-46716.html
* https://www.suse.com/security/cve/CVE-2024-46719.html
* https://www.suse.com/security/cve/CVE-2024-46754.html
* https://www.suse.com/security/cve/CVE-2024-46770.html
* https://www.suse.com/security/cve/CVE-2024-46775.html
* https://www.suse.com/security/cve/CVE-2024-46777.html
* https://www.suse.com/security/cve/CVE-2024-46809.html
* https://www.suse.com/security/cve/CVE-2024-46811.html
* https://www.suse.com/security/cve/CVE-2024-46813.html
* https://www.suse.com/security/cve/CVE-2024-46814.html
* https://www.suse.com/security/cve/CVE-2024-46815.html
* https://www.suse.com/security/cve/CVE-2024-46816.html
* https://www.suse.com/security/cve/CVE-2024-46817.html
* https://www.suse.com/security/cve/CVE-2024-46818.html
* https://www.suse.com/security/cve/CVE-2024-46826.html
* https://www.suse.com/security/cve/CVE-2024-46828.html
* https://www.suse.com/security/cve/CVE-2024-46834.html
* https://www.suse.com/security/cve/CVE-2024-46840.html
* https://www.suse.com/security/cve/CVE-2024-46841.html
* https://www.suse.com/security/cve/CVE-2024-46848.html
* https://www.suse.com/security/cve/CVE-2024-46849.html
* https://www.suse.com/security/cve/CVE-2024-46854.html
* https://www.suse.com/security/cve/CVE-2024-46855.html
* https://www.suse.com/security/cve/CVE-2024-46857.html
* https://www.suse.com/security/cve/CVE-2024-47660.html
* https://www.suse.com/security/cve/CVE-2024-47661.html
* https://www.suse.com/security/cve/CVE-2024-47664.html
* https://www.suse.com/security/cve/CVE-2024-47668.html
* https://www.suse.com/security/cve/CVE-2024-47672.html
* https://www.suse.com/security/cve/CVE-2024-47673.html
* https://www.suse.com/security/cve/CVE-2024-47674.html
* https://www.suse.com/security/cve/CVE-2024-47684.html
* https://www.suse.com/security/cve/CVE-2024-47685.html
* https://www.suse.com/security/cve/CVE-2024-47692.html
* https://www.suse.com/security/cve/CVE-2024-47704.html
* https://www.suse.com/security/cve/CVE-2024-47705.html
* https://www.suse.com/security/cve/CVE-2024-47706.html
* https://www.suse.com/security/cve/CVE-2024-47707.html
* https://www.suse.com/security/cve/CVE-2024-47710.html
* https://www.suse.com/security/cve/CVE-2024-47720.html
* https://www.suse.com/security/cve/CVE-2024-47727.html
* https://www.suse.com/security/cve/CVE-2024-47730.html
* https://www.suse.com/security/cve/CVE-2024-47738.html
* https://www.suse.com/security/cve/CVE-2024-47739.html
* https://www.suse.com/security/cve/CVE-2024-47745.html
* https://www.suse.com/security/cve/CVE-2024-47747.html
* https://www.suse.com/security/cve/CVE-2024-47748.html
* https://www.suse.com/security/cve/CVE-2024-49858.html
* https://www.suse.com/security/cve/CVE-2024-49860.html
* https://www.suse.com/security/cve/CVE-2024-49866.html
* https://www.suse.com/security/cve/CVE-2024-49867.html
* https://www.suse.com/security/cve/CVE-2024-49881.html
* https://www.suse.com/security/cve/CVE-2024-49882.html
* https://www.suse.com/security/cve/CVE-2024-49883.html
* https://www.suse.com/security/cve/CVE-2024-49886.html
* https://www.suse.com/security/cve/CVE-2024-49890.html
* https://www.suse.com/security/cve/CVE-2024-49892.html
* https://www.suse.com/security/cve/CVE-2024-49894.html
* https://www.suse.com/security/cve/CVE-2024-49895.html
* https://www.suse.com/security/cve/CVE-2024-49896.html
* https://www.suse.com/security/cve/CVE-2024-49897.html
* https://www.suse.com/security/cve/CVE-2024-49899.html
* https://www.suse.com/security/cve/CVE-2024-49901.html
* https://www.suse.com/security/cve/CVE-2024-49906.html
* https://www.suse.com/security/cve/CVE-2024-49908.html
* https://www.suse.com/security/cve/CVE-2024-49909.html
* https://www.suse.com/security/cve/CVE-2024-49911.html
* https://www.suse.com/security/cve/CVE-2024-49912.html
* https://www.suse.com/security/cve/CVE-2024-49913.html
* https://www.suse.com/security/cve/CVE-2024-49914.html
* https://www.suse.com/security/cve/CVE-2024-49917.html
* https://www.suse.com/security/cve/CVE-2024-49918.html
* https://www.suse.com/security/cve/CVE-2024-49919.html
* https://www.suse.com/security/cve/CVE-2024-49920.html
* https://www.suse.com/security/cve/CVE-2024-49922.html
* https://www.suse.com/security/cve/CVE-2024-49923.html
* https://www.suse.com/security/cve/CVE-2024-49929.html
* https://www.suse.com/security/cve/CVE-2024-49930.html
* https://www.suse.com/security/cve/CVE-2024-49933.html
* https://www.suse.com/security/cve/CVE-2024-49936.html
* https://www.suse.com/security/cve/CVE-2024-49939.html
* https://www.suse.com/security/cve/CVE-2024-49946.html
* https://www.suse.com/security/cve/CVE-2024-49949.html
* https://www.suse.com/security/cve/CVE-2024-49954.html
* https://www.suse.com/security/cve/CVE-2024-49955.html
* https://www.suse.com/security/cve/CVE-2024-49958.html
* https://www.suse.com/security/cve/CVE-2024-49959.html
* https://www.suse.com/security/cve/CVE-2024-49960.html
* https://www.suse.com/security/cve/CVE-2024-49962.html
* https://www.suse.com/security/cve/CVE-2024-49967.html
* https://www.suse.com/security/cve/CVE-2024-49969.html
* https://www.suse.com/security/cve/CVE-2024-49973.html
* https://www.suse.com/security/cve/CVE-2024-49974.html
* https://www.suse.com/security/cve/CVE-2024-49975.html
* https://www.suse.com/security/cve/CVE-2024-49982.html
* https://www.suse.com/security/cve/CVE-2024-49991.html
* https://www.suse.com/security/cve/CVE-2024-49993.html
* https://www.suse.com/security/cve/CVE-2024-49995.html
* https://www.suse.com/security/cve/CVE-2024-49996.html
* https://www.suse.com/security/cve/CVE-2024-50000.html
* https://www.suse.com/security/cve/CVE-2024-50001.html
* https://www.suse.com/security/cve/CVE-2024-50002.html
* https://www.suse.com/security/cve/CVE-2024-50006.html
* https://www.suse.com/security/cve/CVE-2024-50014.html
* https://www.suse.com/security/cve/CVE-2024-50019.html
* https://www.suse.com/security/cve/CVE-2024-50024.html
* https://www.suse.com/security/cve/CVE-2024-50028.html
* https://www.suse.com/security/cve/CVE-2024-50033.html
* https://www.suse.com/security/cve/CVE-2024-50035.html
* https://www.suse.com/security/cve/CVE-2024-50041.html
* https://www.suse.com/security/cve/CVE-2024-50045.html
* https://www.suse.com/security/cve/CVE-2024-50046.html
* https://www.suse.com/security/cve/CVE-2024-50047.html
* https://www.suse.com/security/cve/CVE-2024-50048.html
* https://www.suse.com/security/cve/CVE-2024-50049.html
* https://www.suse.com/security/cve/CVE-2024-50055.html
* https://www.suse.com/security/cve/CVE-2024-50058.html
* https://www.suse.com/security/cve/CVE-2024-50059.html
* https://www.suse.com/security/cve/CVE-2024-50061.html
* https://www.suse.com/security/cve/CVE-2024-50063.html
* https://www.suse.com/security/cve/CVE-2024-50081.html
* https://bugzilla.suse.com/show_bug.cgi?id=1054914
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1204171
* https://bugzilla.suse.com/show_bug.cgi?id=1205796
* https://bugzilla.suse.com/show_bug.cgi?id=1206188
* https://bugzilla.suse.com/show_bug.cgi?id=1206344
* https://bugzilla.suse.com/show_bug.cgi?id=1209290
* https://bugzilla.suse.com/show_bug.cgi?id=1210449
* https://bugzilla.suse.com/show_bug.cgi?id=1210627
* https://bugzilla.suse.com/show_bug.cgi?id=1213034
* https://bugzilla.suse.com/show_bug.cgi?id=1216813
* https://bugzilla.suse.com/show_bug.cgi?id=1218562
* https://bugzilla.suse.com/show_bug.cgi?id=1223384
* https://bugzilla.suse.com/show_bug.cgi?id=1223524
* https://bugzilla.suse.com/show_bug.cgi?id=1223824
* https://bugzilla.suse.com/show_bug.cgi?id=1225189
* https://bugzilla.suse.com/show_bug.cgi?id=1225336
* https://bugzilla.suse.com/show_bug.cgi?id=1225611
* https://bugzilla.suse.com/show_bug.cgi?id=1225762
* https://bugzilla.suse.com/show_bug.cgi?id=1226498
* https://bugzilla.suse.com/show_bug.cgi?id=1226631
* https://bugzilla.suse.com/show_bug.cgi?id=1226797
* https://bugzilla.suse.com/show_bug.cgi?id=1227437
* https://bugzilla.suse.com/show_bug.cgi?id=1227885
* https://bugzilla.suse.com/show_bug.cgi?id=1228119
* https://bugzilla.suse.com/show_bug.cgi?id=1228269
* https://bugzilla.suse.com/show_bug.cgi?id=1228709
* https://bugzilla.suse.com/show_bug.cgi?id=1228743
* https://bugzilla.suse.com/show_bug.cgi?id=1228747
* https://bugzilla.suse.com/show_bug.cgi?id=1229005
* https://bugzilla.suse.com/show_bug.cgi?id=1229019
* https://bugzilla.suse.com/show_bug.cgi?id=1229450
* https://bugzilla.suse.com/show_bug.cgi?id=1229454
* https://bugzilla.suse.com/show_bug.cgi?id=1229456
* https://bugzilla.suse.com/show_bug.cgi?id=1229556
* https://bugzilla.suse.com/show_bug.cgi?id=1229769
* https://bugzilla.suse.com/show_bug.cgi?id=1229837
* https://bugzilla.suse.com/show_bug.cgi?id=1229891
* https://bugzilla.suse.com/show_bug.cgi?id=1230055
* https://bugzilla.suse.com/show_bug.cgi?id=1230179
* https://bugzilla.suse.com/show_bug.cgi?id=1230289
* https://bugzilla.suse.com/show_bug.cgi?id=1230405
* https://bugzilla.suse.com/show_bug.cgi?id=1230414
* https://bugzilla.suse.com/show_bug.cgi?id=1230429
* https://bugzilla.suse.com/show_bug.cgi?id=1230456
* https://bugzilla.suse.com/show_bug.cgi?id=1230550
* https://bugzilla.suse.com/show_bug.cgi?id=1230600
* https://bugzilla.suse.com/show_bug.cgi?id=1230620
* https://bugzilla.suse.com/show_bug.cgi?id=1230715
* https://bugzilla.suse.com/show_bug.cgi?id=1230722
* https://bugzilla.suse.com/show_bug.cgi?id=1230763
* https://bugzilla.suse.com/show_bug.cgi?id=1230773
* https://bugzilla.suse.com/show_bug.cgi?id=1230774
* https://bugzilla.suse.com/show_bug.cgi?id=1230801
* https://bugzilla.suse.com/show_bug.cgi?id=1230903
* https://bugzilla.suse.com/show_bug.cgi?id=1230918
* https://bugzilla.suse.com/show_bug.cgi?id=1231016
* https://bugzilla.suse.com/show_bug.cgi?id=1231072
* https://bugzilla.suse.com/show_bug.cgi?id=1231073
* https://bugzilla.suse.com/show_bug.cgi?id=1231084
* https://bugzilla.suse.com/show_bug.cgi?id=1231085
* https://bugzilla.suse.com/show_bug.cgi?id=1231087
* https://bugzilla.suse.com/show_bug.cgi?id=1231094
* https://bugzilla.suse.com/show_bug.cgi?id=1231096
* https://bugzilla.suse.com/show_bug.cgi?id=1231105
* https://bugzilla.suse.com/show_bug.cgi?id=1231114
* https://bugzilla.suse.com/show_bug.cgi?id=1231115
* https://bugzilla.suse.com/show_bug.cgi?id=1231148
* https://bugzilla.suse.com/show_bug.cgi?id=1231179
* https://bugzilla.suse.com/show_bug.cgi?id=1231191
* https://bugzilla.suse.com/show_bug.cgi?id=1231193
* https://bugzilla.suse.com/show_bug.cgi?id=1231195
* https://bugzilla.suse.com/show_bug.cgi?id=1231197
* https://bugzilla.suse.com/show_bug.cgi?id=1231200
* https://bugzilla.suse.com/show_bug.cgi?id=1231203
* https://bugzilla.suse.com/show_bug.cgi?id=1231277
* https://bugzilla.suse.com/show_bug.cgi?id=1231293
* https://bugzilla.suse.com/show_bug.cgi?id=1231327
* https://bugzilla.suse.com/show_bug.cgi?id=1231344
* https://bugzilla.suse.com/show_bug.cgi?id=1231375
* https://bugzilla.suse.com/show_bug.cgi?id=1231383
* https://bugzilla.suse.com/show_bug.cgi?id=1231439
* https://bugzilla.suse.com/show_bug.cgi?id=1231442
* https://bugzilla.suse.com/show_bug.cgi?id=1231496
* https://bugzilla.suse.com/show_bug.cgi?id=1231502
* https://bugzilla.suse.com/show_bug.cgi?id=1231539
* https://bugzilla.suse.com/show_bug.cgi?id=1231540
* https://bugzilla.suse.com/show_bug.cgi?id=1231578
* https://bugzilla.suse.com/show_bug.cgi?id=1231673
* https://bugzilla.suse.com/show_bug.cgi?id=1231857
* https://bugzilla.suse.com/show_bug.cgi?id=1231861
* https://bugzilla.suse.com/show_bug.cgi?id=1231872
* https://bugzilla.suse.com/show_bug.cgi?id=1231883
* https://bugzilla.suse.com/show_bug.cgi?id=1231885
* https://bugzilla.suse.com/show_bug.cgi?id=1231887
* https://bugzilla.suse.com/show_bug.cgi?id=1231888
* https://bugzilla.suse.com/show_bug.cgi?id=1231889
* https://bugzilla.suse.com/show_bug.cgi?id=1231890
* https://bugzilla.suse.com/show_bug.cgi?id=1231892
* https://bugzilla.suse.com/show_bug.cgi?id=1231893
* https://bugzilla.suse.com/show_bug.cgi?id=1231895
* https://bugzilla.suse.com/show_bug.cgi?id=1231896
* https://bugzilla.suse.com/show_bug.cgi?id=1231897
* https://bugzilla.suse.com/show_bug.cgi?id=1231902
* https://bugzilla.suse.com/show_bug.cgi?id=1231903
* https://bugzilla.suse.com/show_bug.cgi?id=1231907
* https://bugzilla.suse.com/show_bug.cgi?id=1231914
* https://bugzilla.suse.com/show_bug.cgi?id=1231929
* https://bugzilla.suse.com/show_bug.cgi?id=1231935
* https://bugzilla.suse.com/show_bug.cgi?id=1231936
* https://bugzilla.suse.com/show_bug.cgi?id=1231937
* https://bugzilla.suse.com/show_bug.cgi?id=1231938
* https://bugzilla.suse.com/show_bug.cgi?id=1231939
* https://bugzilla.suse.com/show_bug.cgi?id=1231940
* https://bugzilla.suse.com/show_bug.cgi?id=1231941
* https://bugzilla.suse.com/show_bug.cgi?id=1231942
* https://bugzilla.suse.com/show_bug.cgi?id=1231944
* https://bugzilla.suse.com/show_bug.cgi?id=1231950
* https://bugzilla.suse.com/show_bug.cgi?id=1231954
* https://bugzilla.suse.com/show_bug.cgi?id=1231958
* https://bugzilla.suse.com/show_bug.cgi?id=1231960
* https://bugzilla.suse.com/show_bug.cgi?id=1231961
* https://bugzilla.suse.com/show_bug.cgi?id=1231962
* https://bugzilla.suse.com/show_bug.cgi?id=1231965
* https://bugzilla.suse.com/show_bug.cgi?id=1231967
* https://bugzilla.suse.com/show_bug.cgi?id=1231968
* https://bugzilla.suse.com/show_bug.cgi?id=1231972
* https://bugzilla.suse.com/show_bug.cgi?id=1231973
* https://bugzilla.suse.com/show_bug.cgi?id=1231976
* https://bugzilla.suse.com/show_bug.cgi?id=1231979
* https://bugzilla.suse.com/show_bug.cgi?id=1231987
* https://bugzilla.suse.com/show_bug.cgi?id=1231988
* https://bugzilla.suse.com/show_bug.cgi?id=1231990
* https://bugzilla.suse.com/show_bug.cgi?id=1231991
* https://bugzilla.suse.com/show_bug.cgi?id=1231992
* https://bugzilla.suse.com/show_bug.cgi?id=1231995
* https://bugzilla.suse.com/show_bug.cgi?id=1231996
* https://bugzilla.suse.com/show_bug.cgi?id=1231997
* https://bugzilla.suse.com/show_bug.cgi?id=1231998
* https://bugzilla.suse.com/show_bug.cgi?id=1232001
* https://bugzilla.suse.com/show_bug.cgi?id=1232004
* https://bugzilla.suse.com/show_bug.cgi?id=1232005
* https://bugzilla.suse.com/show_bug.cgi?id=1232006
* https://bugzilla.suse.com/show_bug.cgi?id=1232007
* https://bugzilla.suse.com/show_bug.cgi?id=1232025
* https://bugzilla.suse.com/show_bug.cgi?id=1232026
* https://bugzilla.suse.com/show_bug.cgi?id=1232033
* https://bugzilla.suse.com/show_bug.cgi?id=1232034
* https://bugzilla.suse.com/show_bug.cgi?id=1232035
* https://bugzilla.suse.com/show_bug.cgi?id=1232036
* https://bugzilla.suse.com/show_bug.cgi?id=1232037
* https://bugzilla.suse.com/show_bug.cgi?id=1232038
* https://bugzilla.suse.com/show_bug.cgi?id=1232039
* https://bugzilla.suse.com/show_bug.cgi?id=1232043
* https://bugzilla.suse.com/show_bug.cgi?id=1232049
* https://bugzilla.suse.com/show_bug.cgi?id=1232067
* https://bugzilla.suse.com/show_bug.cgi?id=1232069
* https://bugzilla.suse.com/show_bug.cgi?id=1232070
* https://bugzilla.suse.com/show_bug.cgi?id=1232071
* https://bugzilla.suse.com/show_bug.cgi?id=1232075
* https://bugzilla.suse.com/show_bug.cgi?id=1232083
* https://bugzilla.suse.com/show_bug.cgi?id=1232084
* https://bugzilla.suse.com/show_bug.cgi?id=1232085
* https://bugzilla.suse.com/show_bug.cgi?id=1232089
* https://bugzilla.suse.com/show_bug.cgi?id=1232097
* https://bugzilla.suse.com/show_bug.cgi?id=1232104
* https://bugzilla.suse.com/show_bug.cgi?id=1232105
* https://bugzilla.suse.com/show_bug.cgi?id=1232108
* https://bugzilla.suse.com/show_bug.cgi?id=1232114
* https://bugzilla.suse.com/show_bug.cgi?id=1232116
* https://bugzilla.suse.com/show_bug.cgi?id=1232119
* https://bugzilla.suse.com/show_bug.cgi?id=1232120
* https://bugzilla.suse.com/show_bug.cgi?id=1232123
* https://bugzilla.suse.com/show_bug.cgi?id=1232124
* https://bugzilla.suse.com/show_bug.cgi?id=1232133
* https://bugzilla.suse.com/show_bug.cgi?id=1232135
* https://bugzilla.suse.com/show_bug.cgi?id=1232136
* https://bugzilla.suse.com/show_bug.cgi?id=1232140
* https://bugzilla.suse.com/show_bug.cgi?id=1232145
* https://bugzilla.suse.com/show_bug.cgi?id=1232149
* https://bugzilla.suse.com/show_bug.cgi?id=1232150
* https://bugzilla.suse.com/show_bug.cgi?id=1232151
* https://bugzilla.suse.com/show_bug.cgi?id=1232154
* https://bugzilla.suse.com/show_bug.cgi?id=1232155
* https://bugzilla.suse.com/show_bug.cgi?id=1232160
* https://bugzilla.suse.com/show_bug.cgi?id=1232163
* https://bugzilla.suse.com/show_bug.cgi?id=1232164
* https://bugzilla.suse.com/show_bug.cgi?id=1232170
* https://bugzilla.suse.com/show_bug.cgi?id=1232172
* https://bugzilla.suse.com/show_bug.cgi?id=1232174
* https://bugzilla.suse.com/show_bug.cgi?id=1232175
* https://bugzilla.suse.com/show_bug.cgi?id=1232191
* https://bugzilla.suse.com/show_bug.cgi?id=1232196
* https://bugzilla.suse.com/show_bug.cgi?id=1232199
* https://bugzilla.suse.com/show_bug.cgi?id=1232200
* https://bugzilla.suse.com/show_bug.cgi?id=1232201
* https://bugzilla.suse.com/show_bug.cgi?id=1232217
* https://bugzilla.suse.com/show_bug.cgi?id=1232220
* https://bugzilla.suse.com/show_bug.cgi?id=1232221
* https://bugzilla.suse.com/show_bug.cgi?id=1232229
* https://bugzilla.suse.com/show_bug.cgi?id=1232233
* https://bugzilla.suse.com/show_bug.cgi?id=1232237
* https://bugzilla.suse.com/show_bug.cgi?id=1232251
* https://bugzilla.suse.com/show_bug.cgi?id=1232253
* https://bugzilla.suse.com/show_bug.cgi?id=1232259
* https://bugzilla.suse.com/show_bug.cgi?id=1232260
* https://bugzilla.suse.com/show_bug.cgi?id=1232262
* https://bugzilla.suse.com/show_bug.cgi?id=1232263
* https://bugzilla.suse.com/show_bug.cgi?id=1232282
* https://bugzilla.suse.com/show_bug.cgi?id=1232285
* https://bugzilla.suse.com/show_bug.cgi?id=1232286
* https://bugzilla.suse.com/show_bug.cgi?id=1232304
* https://bugzilla.suse.com/show_bug.cgi?id=1232305
* https://bugzilla.suse.com/show_bug.cgi?id=1232307
* https://bugzilla.suse.com/show_bug.cgi?id=1232309
* https://bugzilla.suse.com/show_bug.cgi?id=1232310
* https://bugzilla.suse.com/show_bug.cgi?id=1232313
* https://bugzilla.suse.com/show_bug.cgi?id=1232314
* https://bugzilla.suse.com/show_bug.cgi?id=1232316
* https://bugzilla.suse.com/show_bug.cgi?id=1232329
* https://bugzilla.suse.com/show_bug.cgi?id=1232332
* https://bugzilla.suse.com/show_bug.cgi?id=1232335
* https://bugzilla.suse.com/show_bug.cgi?id=1232337
* https://bugzilla.suse.com/show_bug.cgi?id=1232342
* https://bugzilla.suse.com/show_bug.cgi?id=1232345
* https://bugzilla.suse.com/show_bug.cgi?id=1232352
* https://bugzilla.suse.com/show_bug.cgi?id=1232354
* https://bugzilla.suse.com/show_bug.cgi?id=1232355
* https://bugzilla.suse.com/show_bug.cgi?id=1232358
* https://bugzilla.suse.com/show_bug.cgi?id=1232361
* https://bugzilla.suse.com/show_bug.cgi?id=1232366
* https://bugzilla.suse.com/show_bug.cgi?id=1232367
* https://bugzilla.suse.com/show_bug.cgi?id=1232368
* https://bugzilla.suse.com/show_bug.cgi?id=1232369
* https://bugzilla.suse.com/show_bug.cgi?id=1232374
* https://bugzilla.suse.com/show_bug.cgi?id=1232381
* https://bugzilla.suse.com/show_bug.cgi?id=1232383
* https://bugzilla.suse.com/show_bug.cgi?id=1232392
* https://bugzilla.suse.com/show_bug.cgi?id=1232395
* https://bugzilla.suse.com/show_bug.cgi?id=1232418
* https://bugzilla.suse.com/show_bug.cgi?id=1232424
* https://bugzilla.suse.com/show_bug.cgi?id=1232432
* https://bugzilla.suse.com/show_bug.cgi?id=1232435
* https://bugzilla.suse.com/show_bug.cgi?id=1232442
* https://bugzilla.suse.com/show_bug.cgi?id=1232446
* https://bugzilla.suse.com/show_bug.cgi?id=1232501
* https://bugzilla.suse.com/show_bug.cgi?id=1232519
* https://bugzilla.suse.com/show_bug.cgi?id=1232630
* https://bugzilla.suse.com/show_bug.cgi?id=1232631
* https://bugzilla.suse.com/show_bug.cgi?id=1232632
* https://bugzilla.suse.com/show_bug.cgi?id=1232757



SUSE-SU-2024:3986-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:3986-1
Release Date:
Rating: important
References:

* bsc#1065729
* bsc#1194869
* bsc#1217845
* bsc#1218562
* bsc#1219596
* bsc#1219803
* bsc#1220382
* bsc#1223384
* bsc#1223700
* bsc#1223824
* bsc#1223848
* bsc#1224088
* bsc#1224574
* bsc#1225611
* bsc#1226003
* bsc#1226498
* bsc#1226623
* bsc#1226631
* bsc#1226797
* bsc#1226848
* bsc#1228119
* bsc#1228244
* bsc#1228269
* bsc#1228410
* bsc#1228454
* bsc#1228537
* bsc#1228620
* bsc#1228743
* bsc#1228747
* bsc#1228857
* bsc#1229019
* bsc#1229429
* bsc#1229450
* bsc#1229585
* bsc#1229677
* bsc#1229769
* bsc#1229808
* bsc#1229891
* bsc#1230055
* bsc#1230132
* bsc#1230179
* bsc#1230220
* bsc#1230289
* bsc#1230295
* bsc#1230339
* bsc#1230341
* bsc#1230375
* bsc#1230414
* bsc#1230429
* bsc#1230456
* bsc#1230501
* bsc#1230527
* bsc#1230550
* bsc#1230600
* bsc#1230620
* bsc#1230710
* bsc#1230762
* bsc#1230763
* bsc#1230773
* bsc#1230774
* bsc#1230801
* bsc#1230831
* bsc#1230914
* bsc#1230918
* bsc#1231016
* bsc#1231035
* bsc#1231072
* bsc#1231073
* bsc#1231075
* bsc#1231081
* bsc#1231082
* bsc#1231083
* bsc#1231084
* bsc#1231085
* bsc#1231087
* bsc#1231089
* bsc#1231092
* bsc#1231093
* bsc#1231094
* bsc#1231096
* bsc#1231098
* bsc#1231100
* bsc#1231101
* bsc#1231102
* bsc#1231105
* bsc#1231108
* bsc#1231111
* bsc#1231114
* bsc#1231115
* bsc#1231116
* bsc#1231117
* bsc#1231131
* bsc#1231132
* bsc#1231135
* bsc#1231136
* bsc#1231138
* bsc#1231148
* bsc#1231169
* bsc#1231170
* bsc#1231171
* bsc#1231178
* bsc#1231179
* bsc#1231183
* bsc#1231187
* bsc#1231191
* bsc#1231193
* bsc#1231195
* bsc#1231197
* bsc#1231200
* bsc#1231202
* bsc#1231203
* bsc#1231276
* bsc#1231293
* bsc#1231384
* bsc#1231434
* bsc#1231435
* bsc#1231436
* bsc#1231439
* bsc#1231440
* bsc#1231441
* bsc#1231442
* bsc#1231452
* bsc#1231474
* bsc#1231481
* bsc#1231496
* bsc#1231502
* bsc#1231537
* bsc#1231539
* bsc#1231540
* bsc#1231541
* bsc#1231617
* bsc#1231634
* bsc#1231635
* bsc#1231636
* bsc#1231637
* bsc#1231638
* bsc#1231639
* bsc#1231640
* bsc#1231673
* bsc#1231828
* bsc#1231849
* bsc#1231855
* bsc#1231856
* bsc#1231857
* bsc#1231858
* bsc#1231859
* bsc#1231860
* bsc#1231861
* bsc#1231864
* bsc#1231865
* bsc#1231868
* bsc#1231869
* bsc#1231871
* bsc#1231872
* bsc#1231901
* bsc#1231902
* bsc#1231903
* bsc#1231904
* bsc#1231906
* bsc#1231907
* bsc#1231908
* bsc#1231914
* bsc#1231916
* bsc#1231924
* bsc#1231926
* bsc#1231931
* bsc#1231935
* bsc#1231942
* bsc#1231944
* bsc#1231947
* bsc#1231950
* bsc#1231951
* bsc#1231953
* bsc#1231954
* bsc#1231955
* bsc#1231956
* bsc#1231957
* bsc#1231965
* bsc#1231967
* bsc#1231968
* bsc#1231987
* bsc#1231988
* bsc#1231989
* bsc#1231990
* bsc#1231998
* bsc#1232000
* bsc#1232003
* bsc#1232009
* bsc#1232013
* bsc#1232015
* bsc#1232016
* bsc#1232017
* bsc#1232018
* bsc#1232033
* bsc#1232034
* bsc#1232036
* bsc#1232043
* bsc#1232047
* bsc#1232048
* bsc#1232049
* bsc#1232050
* bsc#1232056
* bsc#1232075
* bsc#1232076
* bsc#1232080
* bsc#1232083
* bsc#1232084
* bsc#1232085
* bsc#1232089
* bsc#1232090
* bsc#1232093
* bsc#1232094
* bsc#1232097
* bsc#1232098
* bsc#1232105
* bsc#1232109
* bsc#1232111
* bsc#1232114
* bsc#1232116
* bsc#1232117
* bsc#1232124
* bsc#1232126
* bsc#1232127
* bsc#1232129
* bsc#1232130
* bsc#1232131
* bsc#1232132
* bsc#1232134
* bsc#1232135
* bsc#1232140
* bsc#1232141
* bsc#1232142
* bsc#1232145
* bsc#1232147
* bsc#1232148
* bsc#1232151
* bsc#1232152
* bsc#1232154
* bsc#1232155
* bsc#1232156
* bsc#1232159
* bsc#1232160
* bsc#1232162
* bsc#1232164
* bsc#1232174
* bsc#1232180
* bsc#1232182
* bsc#1232183
* bsc#1232185
* bsc#1232187
* bsc#1232189
* bsc#1232192
* bsc#1232195
* bsc#1232196
* bsc#1232200
* bsc#1232208
* bsc#1232217
* bsc#1232218
* bsc#1232220
* bsc#1232221
* bsc#1232222
* bsc#1232232
* bsc#1232250
* bsc#1232251
* bsc#1232253
* bsc#1232254
* bsc#1232255
* bsc#1232256
* bsc#1232260
* bsc#1232262
* bsc#1232263
* bsc#1232275
* bsc#1232279
* bsc#1232282
* bsc#1232285
* bsc#1232287
* bsc#1232295
* bsc#1232309
* bsc#1232310
* bsc#1232312
* bsc#1232313
* bsc#1232314
* bsc#1232315
* bsc#1232316
* bsc#1232317
* bsc#1232329
* bsc#1232332
* bsc#1232333
* bsc#1232334
* bsc#1232335
* bsc#1232339
* bsc#1232340
* bsc#1232342
* bsc#1232345
* bsc#1232349
* bsc#1232359
* bsc#1232362
* bsc#1232369
* bsc#1232370
* bsc#1232378
* bsc#1232381
* bsc#1232383
* bsc#1232392
* bsc#1232394
* bsc#1232395
* bsc#1232417
* bsc#1232418
* bsc#1232424
* bsc#1232427
* bsc#1232432
* bsc#1232435
* bsc#1232503
* bsc#1232504
* bsc#1232505
* bsc#1232506
* bsc#1232507
* bsc#1232511
* bsc#1232519
* bsc#1232520
* bsc#1232529
* bsc#1232552
* bsc#1232623
* bsc#1232626
* bsc#1232627
* bsc#1232628
* bsc#1232629
* bsc#1232757
* bsc#1232768
* jsc#PED-10559
* jsc#PED-10978
* jsc#PED-9901

Cross-References:

* CVE-2023-52766
* CVE-2023-52800
* CVE-2023-52881
* CVE-2023-52917
* CVE-2023-52918
* CVE-2023-52919
* CVE-2023-6270
* CVE-2024-26758
* CVE-2024-26761
* CVE-2024-26767
* CVE-2024-26943
* CVE-2024-27026
* CVE-2024-27043
* CVE-2024-35980
* CVE-2024-36244
* CVE-2024-38576
* CVE-2024-38577
* CVE-2024-38599
* CVE-2024-41016
* CVE-2024-41031
* CVE-2024-41047
* CVE-2024-41082
* CVE-2024-42145
* CVE-2024-44932
* CVE-2024-44958
* CVE-2024-44964
* CVE-2024-45016
* CVE-2024-45025
* CVE-2024-46678
* CVE-2024-46721
* CVE-2024-46754
* CVE-2024-46766
* CVE-2024-46770
* CVE-2024-46775
* CVE-2024-46777
* CVE-2024-46797
* CVE-2024-46802
* CVE-2024-46803
* CVE-2024-46804
* CVE-2024-46805
* CVE-2024-46806
* CVE-2024-46807
* CVE-2024-46809
* CVE-2024-46810
* CVE-2024-46811
* CVE-2024-46812
* CVE-2024-46813
* CVE-2024-46814
* CVE-2024-46815
* CVE-2024-46816
* CVE-2024-46817
* CVE-2024-46818
* CVE-2024-46819
* CVE-2024-46821
* CVE-2024-46825
* CVE-2024-46826
* CVE-2024-46827
* CVE-2024-46828
* CVE-2024-46830
* CVE-2024-46831
* CVE-2024-46834
* CVE-2024-46835
* CVE-2024-46836
* CVE-2024-46840
* CVE-2024-46841
* CVE-2024-46842
* CVE-2024-46843
* CVE-2024-46846
* CVE-2024-46848
* CVE-2024-46849
* CVE-2024-46851
* CVE-2024-46852
* CVE-2024-46853
* CVE-2024-46854
* CVE-2024-46855
* CVE-2024-46857
* CVE-2024-46859
* CVE-2024-46860
* CVE-2024-46861
* CVE-2024-46864
* CVE-2024-46870
* CVE-2024-46871
* CVE-2024-47658
* CVE-2024-47660
* CVE-2024-47661
* CVE-2024-47662
* CVE-2024-47663
* CVE-2024-47664
* CVE-2024-47665
* CVE-2024-47667
* CVE-2024-47668
* CVE-2024-47669
* CVE-2024-47670
* CVE-2024-47671
* CVE-2024-47672
* CVE-2024-47673
* CVE-2024-47674
* CVE-2024-47675
* CVE-2024-47681
* CVE-2024-47682
* CVE-2024-47684
* CVE-2024-47685
* CVE-2024-47686
* CVE-2024-47687
* CVE-2024-47688
* CVE-2024-47692
* CVE-2024-47693
* CVE-2024-47695
* CVE-2024-47696
* CVE-2024-47697
* CVE-2024-47698
* CVE-2024-47699
* CVE-2024-47702
* CVE-2024-47704
* CVE-2024-47705
* CVE-2024-47706
* CVE-2024-47707
* CVE-2024-47709
* CVE-2024-47710
* CVE-2024-47712
* CVE-2024-47713
* CVE-2024-47714
* CVE-2024-47715
* CVE-2024-47718
* CVE-2024-47719
* CVE-2024-47720
* CVE-2024-47723
* CVE-2024-47727
* CVE-2024-47728
* CVE-2024-47730
* CVE-2024-47731
* CVE-2024-47732
* CVE-2024-47735
* CVE-2024-47737
* CVE-2024-47738
* CVE-2024-47739
* CVE-2024-47741
* CVE-2024-47742
* CVE-2024-47743
* CVE-2024-47744
* CVE-2024-47745
* CVE-2024-47747
* CVE-2024-47748
* CVE-2024-47749
* CVE-2024-47750
* CVE-2024-47751
* CVE-2024-47752
* CVE-2024-47753
* CVE-2024-47754
* CVE-2024-47756
* CVE-2024-47757
* CVE-2024-49850
* CVE-2024-49851
* CVE-2024-49853
* CVE-2024-49855
* CVE-2024-49858
* CVE-2024-49860
* CVE-2024-49861
* CVE-2024-49862
* CVE-2024-49863
* CVE-2024-49864
* CVE-2024-49867
* CVE-2024-49870
* CVE-2024-49871
* CVE-2024-49874
* CVE-2024-49875
* CVE-2024-49877
* CVE-2024-49878
* CVE-2024-49879
* CVE-2024-49882
* CVE-2024-49886
* CVE-2024-49888
* CVE-2024-49890
* CVE-2024-49891
* CVE-2024-49892
* CVE-2024-49896
* CVE-2024-49898
* CVE-2024-49900
* CVE-2024-49902
* CVE-2024-49903
* CVE-2024-49906
* CVE-2024-49907
* CVE-2024-49908
* CVE-2024-49914
* CVE-2024-49917
* CVE-2024-49918
* CVE-2024-49919
* CVE-2024-49920
* CVE-2024-49928
* CVE-2024-49929
* CVE-2024-49930
* CVE-2024-49931
* CVE-2024-49935
* CVE-2024-49936
* CVE-2024-49937
* CVE-2024-49938
* CVE-2024-49939
* CVE-2024-49946
* CVE-2024-49947
* CVE-2024-49949
* CVE-2024-49950
* CVE-2024-49953
* CVE-2024-49954
* CVE-2024-49955
* CVE-2024-49957
* CVE-2024-49958
* CVE-2024-49960
* CVE-2024-49961
* CVE-2024-49962
* CVE-2024-49963
* CVE-2024-49965
* CVE-2024-49966
* CVE-2024-49967
* CVE-2024-49969
* CVE-2024-49972
* CVE-2024-49973
* CVE-2024-49974
* CVE-2024-49981
* CVE-2024-49982
* CVE-2024-49985
* CVE-2024-49986
* CVE-2024-49991
* CVE-2024-49993
* CVE-2024-49995
* CVE-2024-49996
* CVE-2024-50000
* CVE-2024-50001
* CVE-2024-50002
* CVE-2024-50007
* CVE-2024-50008
* CVE-2024-50013
* CVE-2024-50017
* CVE-2024-50019
* CVE-2024-50020
* CVE-2024-50021
* CVE-2024-50022
* CVE-2024-50023
* CVE-2024-50024
* CVE-2024-50025
* CVE-2024-50027
* CVE-2024-50028
* CVE-2024-50031
* CVE-2024-50033
* CVE-2024-50035
* CVE-2024-50040
* CVE-2024-50041
* CVE-2024-50042
* CVE-2024-50044
* CVE-2024-50045
* CVE-2024-50046
* CVE-2024-50047
* CVE-2024-50048
* CVE-2024-50049
* CVE-2024-50055
* CVE-2024-50058
* CVE-2024-50059
* CVE-2024-50060
* CVE-2024-50061
* CVE-2024-50062
* CVE-2024-50063
* CVE-2024-50064
* CVE-2024-50069
* CVE-2024-50073
* CVE-2024-50074
* CVE-2024-50075
* CVE-2024-50076
* CVE-2024-50077
* CVE-2024-50078

CVSS scores:

* CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52800 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52881 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52917 ( SUSE ): 4.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-52917 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52918 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26767 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-26767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36244 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
* CVE-2024-38576 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38576 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-38577 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38577 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38599 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41031 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41047 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-41082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42145 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44964 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H
* CVE-2024-44964 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46678 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
* CVE-2024-46678 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46754 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46754 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46766 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46797 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46802 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46803 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46803 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46803 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46804 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46804 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-46804 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46805 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46806 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46807 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46809 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46810 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46810 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46811 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46811 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46812 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46813 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46813 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46813 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46814 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46814 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46814 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46815 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46815 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46816 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46816 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46817 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46818 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46818 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46819 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46821 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46825 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-46826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46831 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46831 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46836 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46842 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46843 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46849 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46851 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46854 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46854 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46870 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46870 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46870 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46871 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46871 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-46871 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47658 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47658 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47660 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47660 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47660 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47661 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47661 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-47661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47662 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-47662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47663 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47664 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47664 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47664 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47665 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47665 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47667 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-47667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47668 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47668 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-47668 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47669 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47669 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-47669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47670 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47670 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47671 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-47671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-47672 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47673 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47674 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47675 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47675 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47681 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47682 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47682 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47682 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47684 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47685 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47685 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-47685 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47686 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47686 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-47686 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47687 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47688 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47688 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47692 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47692 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47693 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47693 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-47693 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47695 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47695 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47696 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47696 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47697 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47697 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47697 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47698 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47698 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47699 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47702 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47704 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47704 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47705 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47706 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47706 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47707 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47709 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47710 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47710 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47710 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47714 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47715 ( SUSE ): 7.1
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47715 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47718 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47719 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47719 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-47719 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47720 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47723 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47723 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47727 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47731 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47731 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47732 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47737 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47737 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47738 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47739 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47741 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47741 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47741 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47742 ( SUSE ): 8.3
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47742 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-47742 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47743 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47743 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47744 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47744 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47745 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47745 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47745 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47747 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47747 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47747 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47748 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47748 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47748 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47749 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47750 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47750 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47750 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47751 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47751 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47752 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47753 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47754 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47754 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47756 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47757 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47757 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47757 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49850 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49851 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49853 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49853 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49855 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49858 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49858 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-49858 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49860 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49860 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49860 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49861 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2024-49861 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-49861 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-49862 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49862 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49862 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49863 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49864 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49864 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49867 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49867 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49867 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49870 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-49870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49871 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49874 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49874 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49874 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49875 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49875 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-49875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-49877 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49878 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-49878 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-49879 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49888 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49890 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49891 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49892 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49892 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49896 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49896 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49898 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49900 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49900 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49900 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49902 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49902 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49903 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49903 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49903 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49906 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49907 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49914 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49917 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49918 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49919 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49920 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49928 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49928 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49928 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49929 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49930 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49931 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49931 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49935 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49936 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49936 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49937 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49938 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49939 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49954 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49955 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49960 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49960 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49960 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49962 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49969 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49969 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49972 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49972 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49974 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49974 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49974 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49981 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49982 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49991 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49993 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49993 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-49993 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49995 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49995 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-49995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49996 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50007 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50007 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50007 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50008 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50008 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50022 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50023 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50024 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50027 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50033 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50035 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50035 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50035 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50040 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50041 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50044 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50049 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50059 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50059 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50060 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50061 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50063 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50063 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50073 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50075 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50076 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50078 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Real Time Module 15-SP6

An update that solves 268 vulnerabilities, contains three features and has 60
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

* CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to
entire cycle too (bsc#1226797).
* CVE-2024-41031: mm/filemap: skip to create PMD-sized page cache if needed
(bsc#1228454).
* CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command
(bsc#1228620).
* CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc
(bsc#1230179).
* CVE-2024-45016: netem: fix return value if duplicate enqueue fails
(bsc#1230429).
* CVE-2024-45025: fix bitmap corruption on close_range() with
CLOSE_RANGE_UNSHARE (bsc#1230456).
* CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex
(bsc#1230550).
* CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710)
* CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops
(bsc#1230801).
* CVE-2024-46766: ice: move netif_queue_set_napi to rtnl-protected sections
(bsc#1230762).
* CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow
(bsc#1230763).
* CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774).
* CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773).
* CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links
(bsc#1231191).
* CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums
greater than max_links (bsc#1231197).
* CVE-2024-46826: ELF: fix kernel.randomize_va_space double read
(bsc#1231115).
* CVE-2024-46828: uprobes: fix kernel info leak via "[uprobes]" vma
(bsc#1231114).
* CVE-2024-46831: net: microchip: vcap: Fix use-after-free error in kunit test
(bsc#1231117).
* CVE-2024-46834: ethtool: fail closed if we can't get max channel used in
indirection tables (bsc#1231096).
* CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete
(bsc#1231105).
* CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from
btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094).
* CVE-2024-46843: scsi: ufs: core: Remove SCSI host only if added
(bsc#1231100).
* CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084).
* CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085).
* CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs
(bsc#1231087).
* CVE-2024-46870: drm/amd/display: Disable DMCUB timeout for DCN35
(bsc#1231435).
* CVE-2024-47658: crypto: stm32/cryp - call finalize with bh disabled
(bsc#1231436).
* CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439).
* CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency
provided by the firmware (bsc#1231442).
* CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case
(bsc#1231673).
* CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us()
(bsc#1231987).
* CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
(bsc#1231998).
* CVE-2024-47687: vdpa/mlx5: Fix invalid mr resource destroy (bsc#1232003).
* CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857).
* CVE-2024-47704: drm/amd/display: Check link_res->hpo_dp_link_enc before
using it (bsc#1231944).
* CVE-2024-47705: block: fix potential invalid pointer dereference in
blk_add_partition (bsc#1231872).
* CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain
(bsc#1231942).
* CVE-2024-47707: ipv6: avoid possible NULL deref in
rt6_uncached_list_flush_dev() (bsc#1231935).
* CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free()
(bsc#1232049).
* CVE-2024-47727: x86/tdx: Fix "in-kernel MMIO" check (bsc#1232116).
* CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue
(bsc#1232075).
* CVE-2024-47731: drivers/perf: Fix ali_drw_pmu driver interrupt status
clearing (bsc#1232117).
* CVE-2024-47739: padata: use integer wrap around to prevent deadlock on
seq_nr overflow (bsc#1232124).
* CVE-2024-47741: btrfs: fix race setting file private on concurrent lseek
using same fd (bsc#1231869).
* CVE-2024-47745: mm: split critical region in remap_file_pages() and invoke
LSMs in between (bsc#1232135).
* CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver
Due to Race Condition (bsc#1232145).
* CVE-2024-47752: media: mediatek: vcodec: Fix H264 stateless decoder smatch
warning (bsc#1232130).
* CVE-2024-47753: media: mediatek: vcodec: Fix VP8 stateless decoder smatch
warning (bsc#1231868).
* CVE-2024-47754: media: mediatek: vcodec: Fix H264 multi stateless decoder
smatch warning (bsc#1232131).
* CVE-2024-49864: rxrpc: Fix a race between socket set up and I/O thread
creation (bsc#1232256).
* CVE-2024-49867: btrfs: wait for fixup workers before stopping cleaner
kthread during umount (bsc#1232262).
* CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path
(bsc#1232200).
* CVE-2024-49888: bpf: Fix a sdiv overflow issue (bsc#1232208).
* CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it
(bsc#1232217).
* CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default
to 1 (bsc#1232220).
* CVE-2024-49896: drm/amd/display: Check stream before comparing them
(bsc#1232221).
* CVE-2024-49898: drm/amd/display: Check null-initialized variables
(bsc#1232222).
* CVE-2024-49906: drm/amd/display: Check null pointer before try to access it
(bsc#1232332).
* CVE-2024-49907: drm/amd/display: Check null pointers before using
dc->clk_mgr (bsc#1232334).
* CVE-2024-49908: drm/amd/display: Add null check for 'afb' in
amdgpu_dm_update_cursor (bsc#1232335).
* CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx->plane_state in
(bsc#1232369).
* CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and
clk_mgr->funcs in dcn30_init_hw (bsc#1231965).
* CVE-2024-49918: drm/amd/display: Add null check for head_pipe in
dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967).
* CVE-2024-49919: drm/amd/display: Add null check for head_pipe in
dcn201_acquire_free_pipe_for_layer (bsc#1231968).
* CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses
(bsc#1232313).
* CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash()
(bsc#1232424).
* CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input()
(bsc#1232164).
* CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with
UFO (bsc#1232160).
* CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).
* CVE-2024-49953: net/mlx5e: Fix crash caused by calling __xfrm_state_delete()
twice (bsc#1232156).
* CVE-2024-49954: static_call: Replace pointless WARN_ON() in
static_call_module_notify() (bsc#1232155).
* CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching
reflink tree (bsc#1232151).
* CVE-2024-49960: ext4: fix timer use-after-free on failed mount
(bsc#1232395).
* CVE-2024-49967: ext4: no need to continue when the number of entries is 1
(bsc#1232140).
* CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color
transformation (bsc#1232519).
* CVE-2024-49972: drm/amd/display: Deallocate DML memory if allocation fails
(bsc#1232315).
* CVE-2024-49973: r8169: add tally counter fields added with RTL8125
(bsc#1232105).
* CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous
(bsc#1232383).
* CVE-2024-49986: platform/x86: x86-android-tablets: Fix use after free on
platform_device_register() errors (bsc#1232093).
* CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer
(bsc#1232282).
* CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called
with 0 count (bsc#1232316).
* CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).
* CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points
(bsc#1232089).
* CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc()
(bsc#1232085).
* CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit
(bsc#1232084).
* CVE-2024-50002: static_call: Handle module init failure correctly in
static_call_del_module() (bsc#1232083).
* CVE-2024-50020: ice: Fix improper handling of refcount in
ice_sriov_set_msix_vec_count() (bsc#1231989).
* CVE-2024-50021: ice: Fix improper handling of refcount in
ice_dpll_init_rclk_pins() (bsc#1231957).
* CVE-2024-50022: device-dax: correct pgoff align in dax_set_mapping()
(bsc#1231956).
* CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954).
* CVE-2024-50027: thermal: core: Free tzp copy along with the thermal zone
(bsc#1231951).
* CVE-2024-50028: thermal: core: Reference count the zone in
thermal_zone_get_by_id() (bsc#1231950).
* CVE-2024-50033: slip: make slhc_remember() more robust against malicious
packets (bsc#1231914).
* CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392).
* CVE-2024-50040: igb: Do not bring the device up after non-fatal error
(bsc#1231908).
* CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to
mac_filter_hash (bsc#1231907).
* CVE-2024-50042: ice: Fix increasing MSI-X on VF (bsc#1231906).
* CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb
(bsc#1231903).
* CVE-2024-50046: kabi fix for NFSv4: Prevent NULL-pointer dereference in
nfs42_complete_copies() (bsc#1231902).
* CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).
* CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in
switchtec_ntb_remove due to race condition (bsc#1232345).
* CVE-2024-50060: io_uring: check if we need to reschedule during overflow
flush (bsc#1232417).
* CVE-2024-50063: kABI: bpf: struct bpf_map kABI workaround (bsc#1232435).
* CVE-2024-50064: zram: do not free statically defined names (bsc#1231901).

The following non-security bugs were fixed:

* 9p: explicitly deny setlease attempts (git-fixes).
* ACPI: CPPC: Add support for setting EPP register in FFH (stable-fixes).
* ACPI: CPPC: Make rmw_lock a raw_spin_lock (git-fixes).
* ACPI: EC: Do not release locks during operation region accesses (stable-
fixes).
* ACPI: PAD: fix crash in exit_round_robin() (stable-fixes).
* ACPI: PRM: Clean up guid type in struct prm_handler_info (git-fixes).
* ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context (git-
fixes).
* ACPI: battery: Fix possible crash when unregistering a battery hook (git-
fixes).
* ACPI: battery: Simplify battery hook locking (stable-fixes).
* ACPI: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid
detection issue (stable-fixes).
* ACPI: resource: Add Asus ExpertBook B2502CVA to
irq1_level_low_skip_override[] (stable-fixes).
* ACPI: resource: Add Asus Vivobook X1704VAP to irq1_level_low_skip_override[]
(stable-fixes).
* ACPI: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable-
fixes).
* ACPI: resource: Add another DMI match for the TongFang GMxXGxx (stable-
fixes).
* ACPI: video: Add force_vendor quirk for Panasonic Toughbook CF-18 (stable-
fixes).
* ACPICA: Fix memory leak if acpi_ps_get_next_field() fails (stable-fixes).
* ACPICA: Fix memory leak if acpi_ps_get_next_namepath() fails (stable-fixes).
* ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in
acpi_db_convert_to_package() (stable-fixes).
* ACPICA: iasl: handle empty connection_node (stable-fixes).
* ALSA/hda: intel-sdw-acpi: cleanup sdw_intel_scan_controller (stable-fixes).
* ALSA/hda: intel-sdw-acpi: fetch fwnode once in sdw_intel_scan_controller()
(stable-fixes).
* ALSA/hda: intel-sdw-acpi: simplify sdw-master-count property read (stable-
fixes).
* ALSA: Reorganize kerneldoc parameter names (stable-fixes).
* ALSA: asihpi: Fix potential OOB array access (stable-fixes).
* ALSA: core: add isascii() check to card ID generator (stable-fixes).
* ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()
(git-fixes).
* ALSA: hda/conexant - Fix audio routing for HP EliteOne 1000 G2 (stable-
fixes).
* ALSA: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne
1000 G2 (git-fixes).
* ALSA: hda/conexant: Fix conflicting quirk for System76 Pangolin (git-fixes).
* ALSA: hda/conexant: fix some typos (stable-fixes).
* ALSA: hda/cs8409: Fix possible NULL dereference (git-fixes).
* ALSA: hda/generic: Unconditionally prefer preferred_dacs pairs
(bsc#1219803).
* ALSA: hda/realtek: Add a quirk for HP Pavilion 15z-ec200 (stable-fixes).
* ALSA: hda/realtek: Add quirk for Huawei MateBook 13 KLV-WX9 (stable-fixes).
* ALSA: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable-
fixes).
* ALSA: hda/realtek: Add subwoofer quirk for Infinix ZERO BOOK 13 (stable-
fixes).
* ALSA: hda/realtek: Enable mic on Vaio VJFH52 (stable-fixes).
* ALSA: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes).
* ALSA: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable-
fixes).
* ALSA: hda/realtek: Fix the push button function for the ALC257 (git-fixes).
* ALSA: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes).
* ALSA: hda/realtek: Refactor and simplify Samsung Galaxy Book init (stable-
fixes).
* ALSA: hda/realtek: Update default depop procedure (git-fixes).
* ALSA: hda/realtek: fix mute/micmute LED for HP mt645 G8 (stable-fixes).
* ALSA: hda/realtek: tas2781: Fix ROG ALLY X audio (stable-fixes).
* ALSA: hda/tas2781: Add new quirk for Lenovo Y990 Laptop (stable-fixes).
* ALSA: hda/tas2781: Add new quirk for Lenovo, ASUS, Dell projects (stable-
fixes).
* ALSA: hda/tas2781: select CRC32 instead of CRC32_SARWATE (git-fixes).
* ALSA: hda: Sound support for HP Spectre x360 16 inch model 2024 (stable-
fixes).
* ALSA: hda: tas2781: Fix missing setup at runtime PM (bsc#1230132).
* ALSA: hdsp: Break infinite MIDI input flush loop (stable-fixes).
* ALSA: line6: add hw monitor volume control to POD HD500X (stable-fixes).
* ALSA: line6: update contact information (stable-fixes).
* ALSA: mixer_oss: Remove some incorrect kfree_const() usages (git-fixes).
* ALSA: silence integer wrapping warning (stable-fixes).
* ALSA: usb-audio: Add delay quirk for VIVO USB-C HEADSET (stable-fixes).
* ALSA: usb-audio: Add input value sanity checks for standard types (stable-
fixes).
* ALSA: usb-audio: Add logitech Audio profile quirk (stable-fixes).
* ALSA: usb-audio: Add native DSD support for Luxman D-08u (stable-fixes).
* ALSA: usb-audio: Add quirk for HP 320 FHD Webcam (bsc#1232768).
* ALSA: usb-audio: Add quirks for Dell WD19 dock (stable-fixes).
* ALSA: usb-audio: Define macros for quirk table entries (stable-fixes).
* ALSA: usb-audio: Replace complex quirk lines with macros (stable-fixes).
* ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet
(stable-fixes).
* ASoC: Intel: bytcr_rt5640: Add support for non ACPI instantiated codec
(stable-fixes).
* ASoC: Intel: sst: Fix used of uninitialized ctx to log an error (git-fixes).
* ASoC: Intel: sst: Support LPE0F28 ACPI HID (stable-fixes).
* ASoC: amd: yc: Add quirk for HP Dragonfly pro one (stable-fixes).
* ASoC: atmel: mchp-pdmc: Skip ALSA restoration if substream runtime is
uninitialized (git-fixes).
* ASoC: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to
default regs values (stable-fixes).
* ASoC: codecs: rt5640: Always disable IRQs from rt5640_cancel_work() (stable-
fixes).
* ASoC: codecs: wsa883x: Handle reading version failure (stable-fixes).
* ASoC: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes).
* ASoC: dapm: fix bounds checker error in dapm_widget_list_create (git-fixes).
* ASoC: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes).
* ASoC: imx-card: Set card.owner to avoid a warning calltrace if SND=m (git-
fixes).
* ASoC: max98388: Fix missing increment of variable slot_found (git-fixes).
* ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe()
(git-fixes).
* ASoC: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable-
fixes).
* ASoC: tas2781: Use of_property_read_reg() (stable-fixes).
* Bluetooth: Call iso_exit() on module unload (git-fixes).
* Bluetooth: ISO: Fix multiple init when debugfs is disabled (git-fixes).
* Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (git-
fixes).
* Bluetooth: Remove debugfs directory on module init failure (git-fixes).
* Bluetooth: bnep: fix wild-memory-access in proto_unregister (git-fixes).
* Bluetooth: btmrvl: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0489:0xe122 (stable-
fixes).
* Bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001 (git-
fixes).
* Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes).
* Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (git-fixes).
* Drop USB dwc2 patch that caused a regression on RPi3 (bsc#1232342)
* Drop the previous HD-audio TAS2781 fix (bsc#1230132) The proposed fix turned
out to be incorrect
* HID: Ignore battery for all ELAN I2C-HID devices (stable-fixes).
* HID: amd_sfh: Switch to device-managed dmam_alloc_coherent() (git-fixes).
* HID: i2c-hid: Remove I2C_HID_QUIRK_SET_PWR_WAKEUP_DEV quirk (stable-fixes).
* HID: multitouch: Add support for Thinkpad X12 Gen 2 Kbd Portfolio (stable-
fixes).
* HID: multitouch: Add support for lenovo Y9000P Touchpad (stable-fixes).
* HID: plantronics: Workaround for an unexcepted opposite volume key (stable-
fixes).
* Input: adp5589-keys - fix NULL pointer dereference (git-fixes).
* Input: adp5589-keys - fix adp5589_gpio_get_value() (git-fixes).
* Input: edt-ft5x06 - fix regmap leak when probe fails (git-fixes).
* Input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table
(stable-fixes).
* Input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table
(stable-fixes).
* Input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line
(stable-fixes).
* KVM: Fix coalesced_mmio_has_room() to avoid premature userspace exit (git-
fixes).
* KVM: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value
(git-fixes).
* KVM: Use dedicated mutex to protect kvm_usage_count to avoid deadlock (git-
fixes).
* KVM: VMX: Also clear SGX EDECCSSA in KVM CPU caps when SGX is disabled (git-
fixes).
* KVM: VMX: Set PFERR_GUEST_{FINAL,PAGE}_MASK if and only if the GVA is valid
(git-fixes).
* KVM: Write the per-page "segment" when clearing (part of) a guest page (git-
fixes).
* KVM: s390: Change virtual to physical address access in diag 0x258 handler
(git-fixes bsc#1232626).
* KVM: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query
(git-fixes bsc#1231276).
* KVM: s390: gaccess: Check if guest address is in memslot (git-fixes
bsc#1232623).
* KVM: x86/mmu: Skip emulation on page fault iff 1+ SPs were unprotected (git-
fixes).
* KVM: x86/mmu: Trigger unprotect logic only on write-protection page faults
(git-fixes).
* KVM: x86: Dedup fastpath MSR post-handling logic (git-fixes).
* KVM: x86: Enforce x2APIC's must-be-zero reserved ICR bits (git-fixes).
* KVM: x86: Exit to userspace if fastpath triggers one on instruction skip
(git-fixes).
* KVM: x86: Move x2APIC ICR helper above kvm_apic_write_nodecode() (git-
fixes).
* KVM: x86: Re-enter guest if WRMSR(X2APIC_ICR) fastpath is successful (git-
fixes).
* KVM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) (git-fixes).
* NFS: Avoid unnecessary rescanning of the per-server delegation list (git-
fixes).
* NFSD: Fix NFSv4's PUTPUBFH operation (git-fixes).
* NFSD: Mark filecache "down" if init fails (git-fixes).
* NFSv3: only use NFS timeout for MOUNT when protocols are compatible
(bsc#1231016).
* NFSv4: Fix clearing of layout segments in layoutreturn (git-fixes).
* PCI: Add ACS quirk for Qualcomm SA8775P (stable-fixes).
* PCI: Add function 0 DMA alias quirk for Glenfly Arise chip (stable-fixes).
* PCI: Fix pci_enable_acs() support for the ACS quirks (bsc#1229019).
* PCI: Mark Creative Labs EMU20k2 INTx masking as broken (stable-fixes).
* RAS/AMD/ATL: Add amd_atl pr_fmt() prefix (jsc#PED-10559).
* RAS/AMD/ATL: Expand helpers for adding and removing base and hole
(jsc#PED-10559).
* RAS/AMD/ATL: Implement DF 4.5 NP2 denormalization (jsc#PED-10559).
* RAS/AMD/ATL: Read DRAM hole base early (jsc#PED-10559).
* RAS/AMD/ATL: Validate address map when information is gathered
(jsc#PED-10559).
* RDMA/bnxt_re: Add a check for memory allocation (git-fixes)
* RDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop (git-fixes)
* RDMA/bnxt_re: Change the sequence of updating the CQ toggle value (git-
fixes)
* RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (git-fixes)
* RDMA/bnxt_re: Fix a possible memory leak (git-fixes)
* RDMA/bnxt_re: Fix incorrect AVID type in WQE structure (git-fixes)
* RDMA/bnxt_re: Fix incorrect dereference of srq in async event (git-fixes)
* RDMA/bnxt_re: Fix out of bound check (git-fixes)
* RDMA/bnxt_re: Fix the GID table length (git-fixes)
* RDMA/bnxt_re: Fix the max CQ WQEs for older adapters (git-fixes)
* RDMA/bnxt_re: Fix the usage of control path spin locks (git-fixes)
* RDMA/bnxt_re: Return more meaningful error (git-fixes)
* RDMA/bnxt_re: synchronize the qp-handle table array (git-fixes)
* RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes)
* RDMA/cxgb4: Dump vendor specific QP details (git-fixes)
* RDMA/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP (git-fixes)
* RDMA/irdma: Fix misspelling of "accept*" (git-fixes)
* RDMA/mad: Improve handling of timed out WRs of mad agent (git-fixes)
* RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page
(git-fixes).
* RDMA/mana_ib: use the correct page table index based on hardware page size
(git-fixes).
* RDMA/mlx5: Enforce umem boundaries for explicit ODP page faults (git-fixes)
* RDMA/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down (git-
fixes)
* RDMA/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git-
fixes).
* RDMA/rtrs-srv: Avoid null pointer deref during path establishment (git-
fixes)
* RDMA/srpt: Make slab cache names unique (git-fixes)
* Revert "ALSA: hda/conexant: Mute speakers at suspend / shutdown"
(bsc#1228269).
* Revert "ALSA: hda: Conditionally use snooping for AMD HDMI" (stable-fixes).
* Revert "KEYS: encrypted: Add check for strsep" (git-fixes).
* Revert "driver core: Fix uevent_show() vs driver detach race" (git-fixes).
* Revert "ixgbe: Manual AN-37 for troublesome link partners for X550 SFI"
(git-fixes).
* Revert "ubifs: ubifs_symlink: Fix memleak of inode->i_link in error path"
(git-fixes).
* Revert "wifi: iwlwifi: remove retry loops in start" (git-fixes).
* SUNRPC: Fix integer overflow in decode_rc_list() (git-fixes).
* SUNRPC: Fixup gss_status tracepoint error output (git-fixes).
* SUNRPC: clnt.c: Remove misleading comment (git-fixes).
* USB: appledisplay: close race between probe and completion handler (git-
fixes).
* USB: misc: cypress_cy7c63: check for short transfer (git-fixes).
* USB: misc: yurex: fix race between read and write (git-fixes).
* USB: serial: option: add Telit FN920C04 MBIM compositions (stable-fixes).
* USB: serial: option: add support for Quectel EG916Q-GL (stable-fixes).
* Use pahole -j1 option for reproducible builds (bsc#1230414 bsc#1229450).
* accel/qaic: Fix the for loop used to walk SG table (git-fixes).
* arm64: Subscribe Microsoft Azure Cobalt 100 to erratum 3194386 (git-fixes)
* arm64: cputype: Add Neoverse-N3 definitions (git-fixes)
* arm64: errata: Enable the AC03_CPU_38 workaround for ampere1a (git-fixes).
* arm64: errata: Expand speculative SSBS workaround once more (git-fixes)
* arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes)
* arm64: fix selection of HAVE_DYNAMIC_FTRACE_WITH_ARGS (git-fixes).
* arm64: probes: Fix simulate_ldr*_literal() (git-fixes)
* arm64: probes: Fix uprobes for big-endian kernels (git-fixes)
* arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes)
* ata: libata: Set DID_TIME_OUT for commands that actually timed out (git-
fixes).
* ata: libata: avoid superfluous disk spin down + spin up during hibernation
(git-fixes).
* audit: do not WARN_ON_ONCE(!current->mm) in audit_exe_compare() (git-fixes).
* audit: do not take task_lock() in audit_exe_compare() code path (git-fixes).
* block: print symbolic error name instead of error code (bsc#1231872).
* block: sed-opal: add ioctl IOC_OPAL_SET_SID_PW (bsc#1229677).
* bnxt_en: Cap the size of HWRM_PORT_PHY_QCFG forwarded response (git-fixes).
* bnxt_en: Fix error recovery for 5760X (P7) chips (git-fixes).
* bnxt_en: Fix the PCI-AER routines (git-fixes).
* bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes).
* bnxt_en: refactor reset close code (git-fixes).
* bpf, lsm: Add disabled BPF LSM hook list (git-fixes).
* bpf, net: Fix a potential race in do_sock_getsockopt() (git-fixes).
* bpf, verifier: Correct tail_call_reachable for bpf prog (git-fixes).
* bpf, x64: Remove tail call detection (git-fixes).
* bpf,perf: Fix perf_event_detach_bpf_prog error handling (git-fixes).
* bpf: Fail verification for sign-extension of packet data/data_end/data_meta
(git-fixes).
* bpf: Fix bpf_strtol and bpf_strtoul helpers for 32bit (git-fixes).
* bpf: Fix error message on kfunc arg type mismatch (git-fixes).
* bpf: Fix helper writes to read-only maps (git-fixes).
* bpf: Fix tailcall cases in test_bpf (git-fixes).
* bpf: Fix truncation bug in coerce_reg_to_size_sx() (git-fixes).
* bpf: Improve check_raw_mode_ok test for MEM_UNINIT-tagged types (git-fixes).
* bpf: Remove truncation test in bpf_strtol and bpf_strtoul helpers (git-
fixes).
* bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error (git-fixes).
* bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos (git-fixes).
* btf, scripts: rust: drop is_rust_module.sh (bsc#1230414 bsc#1229450).
* btrfs: send: fix invalid clone operation for file that got its size
decreased (git-fixes).
* can: netlink: avoid call to do_set_data_bittiming callback with stale
can_priv::ctrlmode (stable-fixes).
* ceph: fix cap ref leak via netfs init_request (bsc#1231384).
* clk: bcm: bcm53573: fix OF node leak in init (stable-fixes).
* clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D (stable-fixes).
* comedi: ni_routing: tools: Check when the file could not be opened (stable-
fixes).
* config: Disable LAM on x86 (bsc#1217845)
* cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems
(git-fixes).
* crypto: hisilicon/qm - flush all work before driver removed (bsc#1232075)
* crypto: octeontx - Fix authenc setkey (stable-fixes).
* crypto: octeontx* - Select CRYPTO_AUTHENC (git-fixes).
* crypto: octeontx2 - Fix authenc setkey (stable-fixes).
* crypto: powerpc/p10-aes-gcm - Add dependency on CRYPTO_SIMD and re-enable
CRYPTO_AES_GCM_P10 (bsc#1230501 ltc#208632).
* crypto: powerpc/p10-aes-gcm - Disable CRYPTO_AES_GCM_P10 (bsc#1230501
ltc#208632).
* crypto: powerpc/p10-aes-gcm - Re-write AES/GCM stitched implementation
(bsc#1230501 ltc#208632).
* crypto: powerpc/p10-aes-gcm - Register modules as SIMD (bsc#1230501
ltc#208632).
* cxgb4: Properly lock TX queue for the selftest (git-fixes).
* cxgb4: add forgotten u64 ivlan cast before shift (git-fixes).
* cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git-
fixes).
* dcache: keep dentry_hashtable or d_hash_shift even when not used (git-
fixes).
* debugfs: fix automount d_fsdata usage (git-fixes).
* devlink: Fix command annotation documentation (git-fixes).
* dmaengine: sh: rz-dmac: handle configs where one address is zero (git-
fixes).
* dmaengine: ti: k3-udma: Set EOP for all TRs in cyclic BCDMA transfer (git-
fixes).
* driver core: bus: Fix double free in driver API bus_register() (stable-
fixes).
* driver core: bus: Return -EIO instead of 0 when show/store invalid bus
attribute (stable-fixes).
* drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring (git-fixes).
* drm/amd/display: Add HDMI DSC native YCbCr422 support (stable-fixes).
* drm/amd/display: Add disable timeout option (bsc#1231435)
* drm/amd/display: Check link_res->hpo_dp_link_enc before using it
(bsc#1231944)
* drm/amd/display: Check null pointer before dereferencing se (stable-fixes).
* drm/amd/display: Clean up dsc blocks in accelerated mode (stable-fixes).
* drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (stable-fixes).
* drm/amd/display: Remove a redundant check in authenticated_dp (stable-
fixes).
* drm/amd/display: Revert "Check HDCP returned status" (stable-fixes).
* drm/amd/display: Round calculated vtotal (stable-fixes).
* drm/amd/display: Skip to enable dsc if it has been off (stable-fixes).
* drm/amd/display: Validate backlight caps are sane (stable-fixes).
* drm/amd/pm: Vangogh: Fix kernel memory out of bounds write (git-fixes).
* drm/amd: Guard against bad data for ATIF ACPI method (git-fixes).
* drm/amdgpu/swsmu: Only force workload setup on init (git-fixes).
* drm/amdgpu/vcn: enable AV1 on both instances (stable-fixes).
* drm/i915/gem: fix bitwise and logical AND mixup (git-fixes).
* drm/i915/hdcp: fix connector refcounting (git-fixes).
* drm/mediatek: Fix get efuse issue for MT8188 DPTX (git-fixes).
* drm/msm/dpu: check for overflow in _dpu_crtc_setup_lm_bounds() (git-fixes).
* drm/msm/dpu: do not always program merge_3d block (git-fixes).
* drm/msm/dpu: make sure phys resources are properly initialized (git-fixes).
* drm/msm/dpu: move CRTC resource assignment to dpu_encoder_virt_atomic_check
(git-fixes).
* drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation
(git-fixes).
* drm/msm/dsi: improve/fix dsc pclk calculation (git-fixes).
* drm/msm: Allocate memory for disp snapshot with kvzalloc() (git-fixes).
* drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() (git-fixes).
* drm/radeon: Fix encoder->possible_clones (git-fixes).
* drm/sched: Add locking to drm_sched_entity_modify_sched (git-fixes).
* drm/sched: Always wake up correct scheduler in drm_sched_entity_push_job
(git-fixes).
* drm/v3d: Stop the active perfmon before being destroyed (git-fixes).
* drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real
VLA (stable-fixes).
* drm/vc4: Stop the active perfmon before being destroyed (git-fixes).
* drm/vmwgfx: Handle surface check failure correctly (git-fixes).
* drm: Consistently use struct drm_mode_rect for FB_DAMAGE_CLIPS (git-fixes).
* e1000e: Fix S0ix residency on corporate systems (git-fixes).
* e1000e: change I219 (19) devices to ADP (git-fixes).
* e1000e: fix force smbus during suspend flow (git-fixes).
* e1000e: move force SMBUS near the end of enable_ulp function (git-fixes).
* efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
(stable-fixes).
* eth: bnxt: fix counting packets discarded due to OOM and netpoll (git-
fixes).
* ext4: do not track ranges in fast_commit if inode has inlined data
(bsc#1231635).
* ext4: fix fast commit inode enqueueing during a full journal commit
(bsc#1231636).
* ext4: fix incorrect tid assumption in ext4_fc_mark_ineligible()
(bsc#1231637).
* ext4: fix possible tid_t sequence overflows (bsc#1231634).
* ext4: mark fc as ineligible using an handle in ext4_xattr_set()
(bsc#1231640).
* ext4: use handle to mark fc as ineligible in __track_dentry_update()
(bsc#1231639).
* fat: fix uninitialized variable (git-fixes).
* fbcon: Fix a NULL pointer dereference issue in fbcon_putcs (stable-fixes).
* fbdev: sisfb: Fix strbuf array overflow (stable-fixes).
* fgraph: Change the name of cpuhp state to "fgraph:online" (git-fixes).
* fgraph: Fix missing unlock in register_ftrace_graph() (git-fixes).
* fgraph: Use CPU hotplug mechanism to initialize idle shadow stacks (git-
fixes).
* filemap: remove use of wait bookmarks (bsc#1224088).
* firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (git-
fixes).
* firmware: arm_scmi: Fix the double free in scmi_debugfs_common_setup() (git-
fixes).
* firmware: arm_sdei: Fix the input parameter of cpuhp_remove_state() (git-
fixes).
* fs/9p: drop inodes immediately on non-.L too (git-fixes).
* fs/9p: fix the cache always being enabled on files with qid flags (git-
fixes).
* genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes).
* gpio: aspeed: Add the flush write to ensure the write complete (git-fixes).
* gpio: aspeed: Use devm_clk api to manage clock source (git-fixes).
* gpio: davinci: fix lazy disable (git-fixes).
* gve: Fix XDP TX completion handling when counters overflow (git-fixes).
* gve: Fix an edge case for TSO skb validity check (git-fixes).
* gve: ignore nonrelevant GSO type bits when processing TSO headers (git-
fixes).
* hid: intel-ish-hid: Fix uninitialized variable 'rv' in
ish_fw_xfer_direct_dma (git-fixes).
* hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event
(git-fixes).
* hwmon: (adm9240) Add missing dependency on REGMAP_I2C (git-fixes).
* hwmon: (adt7470) Add missing dependency on REGMAP_I2C (git-fixes).
* hwmon: (max16065) Fix alarm attributes (git-fixes).
* hwmon: (max16065) Remove use of i2c_match_id() (stable-fixes).
* hwmon: (mc34vr500) Add missing dependency on REGMAP_I2C (git-fixes).
* hwmon: (nct6775) add G15CF to ASUS WMI monitoring list (stable-fixes).
* hwmon: (tmp513) Add missing dependency on REGMAP_I2C (git-fixes).
* hwmon: intel-m10-bmc-hwmon: relabel Columbiaville to CVL Die Temperature
(git-fixes).
* i2c: core: Setup i2c_adapter runtime-pm before calling device_add() (git-
fixes).
* i2c: core: fix lockdep warning for sparsely nested adapter chain (git-
fixes).
* i2c: cpm: Remove linux,i2c-index conversion from be32 (git-fixes).
* i2c: exynos5: Calculate t_scl_l, t_scl_h according to i2c spec (git-fixes).
* i2c: i801: Add lis3lv02d for Dell Precision 3540 (git-fixes).
* i2c: i801: Add lis3lv02d for Dell XPS 15 7590 (git-fixes).
* i2c: i801: Use a different adapter-name for IDF adapters (stable-fixes).
* i2c: i801: add helper i801_restore_regs (git-fixes).
* i2c: ismt: kill transaction in hardware on timeout (git-fixes).
* i2c: ocores: Move system PM hooks to the NOIRQ phase (git-fixes).
* i2c: ocores: Remove #ifdef guards for PM related functions (git-fixes).
* i2c: omap: switch to NOIRQ_SYSTEM_SLEEP_PM_OPS() and RUNTIME_PM_OPS() (git-
fixes).
* i2c: omap: wakeup the controller during suspend() callback (git-fixes).
* i2c: rcar: properly format a debug output (git-fixes).
* i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume
(git-fixes).
* i2c: stm32f7: perform most of irq job in threaded handler (git-fixes).
* i2c: synquacer: Deal with optional PCLK correctly (git-fixes).
* i2c: synquacer: Remove a clk reference from struct synquacer_i2c (stable-
fixes).
* i2c: xiic: Try re-initialization on bus busy timeout (git-fixes).
* i2c: xiic: improve error message when transfer fails to start (stable-
fixes).
* i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master
Driver Due to Race Condition (stable-fixes).
* i40e: Fix XDP program unloading while removing the driver (git-fixes).
* i40e: Report MFS in decimal base instead of hex (git-fixes).
* iavf: Fix TC config comparison with existing adapter TC config (git-fixes).
* ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes).
* ice: Fix checking for unsupported keys on non-tunnel device (git-fixes).
* ice: Fix lldp packets dropping after changing the number of channels (git-
fixes).
* ice: Fix netif_is_ice() in Safe Mode (git-fixes).
* ice: Fix package download algorithm (git-fixes).
* ice: Fix recipe read procedure (git-fixes).
* ice: Fix reset handler (git-fixes).
* ice: Flush FDB entries before reset (git-fixes).
* ice: Interpret .set_channels() input differently (git-fixes).
* ice: Rebuild TC queues on VSI queue reconfiguration (git-fixes).
* ice: Reject pin requests with unsupported flags (git-fixes).
* ice: add flag to distinguish reset from .ndo_bpf in XDP rings config (git-
fixes).
* ice: add missing WRITE_ONCE when clearing ice_rx_ring::xdp_prog (git-fixes).
* ice: avoid IRQ collision to fix init failure on ACPI S3 resume (git-fixes).
* ice: clear port vlan config during reset (git-fixes).
* ice: disallow DPLL_PIN_STATE_SELECTABLE for dpll output pins (git-fixes).
* ice: do not bring the VSI up, if it was down before the XDP setup (git-
fixes).
* ice: do not busy wait for Rx queue disable in ice_qp_dis() (git-fixes).
* ice: fix 200G PHY types to link speed mapping (git-fixes).
* ice: fix 200G link speed message log (git-fixes).
* ice: fix ICE_LAST_OFFSET formula (git-fixes).
* ice: fix VLAN replay after reset (git-fixes).
* ice: fix VSI lists confusion when adding VLANs (git-fixes).
* ice: fix accounting for filters shared by multiple VSIs (git-fixes).
* ice: fix accounting if a VLAN already exists (git-fixes).
* ice: fix iteration of TLVs in Preserved Fields Area (git-fixes).
* ice: fix page reuse when PAGE_SIZE is over 8k (git-fixes).
* ice: fix reads from NVM Shadow RAM on E830 and E825-C devices (git-fixes).
* ice: fix truesize operations for PAGE_SIZE >= 8192 (git-fixes).
* ice: implement AQ download pkg retry (git-fixes).
* ice: map XDP queues to vectors in ice_vsi_map_rings_to_vectors() (git-
fixes).
* ice: remove af_xdp_zc_qps bitmap (git-fixes).
* ice: replace synchronize_rcu with synchronize_net (git-fixes).
* ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes).
* ice: set correct dst VSI in only LAN filters (git-fixes).
* ice: tc: allow zero flags in parsing tc flower (git-fixes).
* ice: tc: check src_vsi in case of traffic from VF (git-fixes).
* ice: use proper macro for testing bit (git-fixes).
* idpf: Interpret .set_channels() input differently (git-fixes).
* idpf: avoid bloating &idpf_q_vector with big %NR_CPUS (git-fixes).
* idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git-
fixes).
* idpf: do not skip over ethtool tcp-data-split setting (git-fixes).
* idpf: fix UAFs when destroying the queues (git-fixes).
* idpf: fix memleak in vport interrupt configuration (git-fixes).
* idpf: fix memory leaks and crashes while performing a soft reset (git-
fixes).
* ieee802154: Fix build error (git-fixes).
* igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes).
* igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes).
* igc: Fix double reset adapter triggered from a single taprio cmd (git-
fixes).
* igc: Fix packet still tx after gate close by reducing i226 MAC retry buffer
(git-fixes).
* igc: Fix qbv tx latency by setting gtxoffset (git-fixes).
* igc: Fix qbv_config_change_errors logics (git-fixes).
* igc: Fix reset adapter logics when tx mode change (git-fixes).
* igc: Unlock on error in igc_io_resume() (git-fixes).
* iio: accel: bma400: Fix uninitialized variable field_value in tap event
handling (git-fixes).
* iio: accel: kx022a: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
(git-fixes).
* iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git-
fixes).
* iio: adc: ti-ads124s08: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
(git-fixes).
* iio: adc: ti-ads8688: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
(git-fixes).
* iio: adc: ti-lmp92064: add missing select REGMAP_SPI in Kconfig (git-fixes).
* iio: amplifiers: ada4250: add missing select REGMAP_SPI in Kconfig (git-
fixes).
* iio: dac: ad3552r: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
(git-fixes).
* iio: dac: ad5766: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-
fixes).
* iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig (git-fixes).
* iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig (git-fixes).
* iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig (git-
fixes).
* iio: frequency: adf4377: add missing select REMAP_SPI in Kconfig (git-
fixes).
* iio: frequency: admv4420: fix missing select REMAP_SPI in Kconfig (git-
fixes).
* iio: gts-helper: Fix memory leaks for the error path of
iio_gts_build_avail_scale_table() (git-fixes).
* iio: gts-helper: Fix memory leaks in iio_gts_build_avail_scale_table() (git-
fixes).
* iio: hid-sensors: Fix an error handling path in
_hid_sensor_set_report_latency() (git-fixes).
* iio: light: opt3001: add missing full-scale range value (git-fixes).
* iio: light: veml6030: fix ALS sensor resolution (git-fixes).
* iio: light: veml6030: fix IIO device retrieval from embedded device (git-
fixes).
* iio: light: veml6030: fix microlux value calculation (git-fixes).
* iio: magnetometer: ak8975: Convert enum->pointer for data in the match
tables (stable-fixes).
* iio: magnetometer: ak8975: Fix 'Unexpected device' error (git-fixes).
* iio: magnetometer: ak8975: drop incorrect AK09116 compatible (git-fixes).
* iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
(git-fixes).
* io_uring/eventfd: move to more idiomatic RCU free usage (git-fixes).
* io_uring/io-wq: do not allow pinning outside of cpuset (git-fixes).
* io_uring/io-wq: inherit cpuset of cgroup in io worker (git-fixes).
* io_uring/net: harden multishot termination case for recv (git-fixes).
* io_uring/rw: fix cflags posting for single issue multishot read (git-fixes).
* io_uring/rw: treat -EOPNOTSUPP for IOCB_NOWAIT like -EAGAIN (git-fixes).
* io_uring/sqpoll: do not allow pinning outside of cpuset (git-fixes).
* io_uring/sqpoll: do not put cpumask on stack (git-fixes).
* io_uring/sqpoll: retain test for whether the CPU is valid (git-fixes).
* io_uring: check for presence of task_work rather than TIF_NOTIFY_SIGNAL
(git-fixes).
* iommu/amd: Allocate the page table root using GFP_KERNEL (git-fixes).
* iommu/amd: Do not set the D bit on AMD v2 table entries (git-fixes).
* iommu/amd: Fix typo of , instead of ; (git-fixes).
* iommu/vt-d: Always reserve a domain ID for identity setup (git-fixes).
* iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices (git-
fixes).
* iommufd: Check the domain owner of the parent before creating a nesting
domain (git-fixes).
* iommufd: Protect against overflow of ALIGN() during iova allocation (git-
fixes).
* jbd2: correctly compare tids with tid_geq function in jbd2_fc_begin_commit
(bsc#1231638).
* jfs: Fix sanity check in dbMount (git-fixes).
* jfs: Fix uaf in dbFreeBits (git-fixes).
* jfs: Fix uninit-value access of new_ea in ea_buffer (git-fixes).
* jfs: UBSAN: shift-out-of-bounds in dbFindBits (git-fixes).
* jfs: check if leafidx greater than num leaves per dmap tree (git-fixes).
* jump_label: Fix static_key_slow_dec() yet again (git-fixes).
* kABI fix of VM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC)
(git-fixes).
* kABI: bpf: enum bpf_{type_flag,arg_type} kABI workaround (git-fixes).
* kABI: bpf: struct bpf_insn_acces_aux kABI workaround (git-fixes).
* kasan: Fix Software Tag-Based KASAN with GCC (git-fixes).
* kbuild, bpf: Use test-ge check for v1.25-only pahole (bsc#1230414
bsc#1229450).
* kbuild,bpf: Add module-specific pahole flags for distilled base BTF
(bsc#1230414 bsc#1229450).
* kbuild,bpf: Switch to using --btf_features for pahole v1.26 and later
(bsc#1230414 bsc#1229450).
* kbuild: avoid too many execution of scripts/pahole-flags.sh (bsc#1230414
bsc#1229450).
* kbuild: bpf: Tell pahole to DECL_TAG kfuncs (bsc#1230414 bsc#1229450).
* kconfig: qconf: fix buffer overflow in debug links (git-fixes).
* keys, dns: Allow key types (eg. DNS) to be reclaimed immediately on expiry
(git-fixes).
* keys: Fix overwrite of key expiration on instantiation (git-fixes).
* kthread: unpark only parked kthread (git-fixes).
* lib/xarray: introduce a new helper xas_get_order (bsc#1231617).
* mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes).
* macsec: do not increment counters for an unrelated SA (git-fixes).
* maple_tree: correct tree corruption on spanning store (git-fixes).
* media: i2c: imx335: Enable regulator supplies (stable-fixes).
* media: imx335: Fix reset-gpio handling (git-fixes).
* media: pci: ipu3-cio2: Initialise timing struct to avoid a compiler warning
(git-fixes).
* media: videobuf2-core: clear memory related fields in
__vb2_plane_dmabuf_put() (stable-fixes).
* mei: use kvmalloc for read buffer (git-fixes).
* mfd: intel_soc_pmic_chtwc: Make Lenovo Yoga Tab 3 X90F DMI match less strict
(stable-fixes).
* minmax: avoid overly complex min()/max() macro arguments in xen (git-fixes).
* mlx5: avoid truncating error message (git-fixes).
* mlx5: stop warning for 64KB pages (git-fixes).
* mm/filemap: optimize filemap folio adding (bsc#1231617).
* mm/filemap: return early if failed to allocate memory for split
(bsc#1231617).
* mm: khugepaged: fix the arguments order in khugepaged_collapse_file trace
point (git-fixes).
* mm: mmap: no need to call khugepaged_enter_vma() for stack (jsc#PED-10978).
* modpost: fix acpi MODULE_DEVICE_TABLE built with mismatched endianness (git-
fixes).
* modpost: fix input MODULE_DEVICE_TABLE() built for 64-bit on 32-bit host
(git-fixes).
* module: abort module loading when sysfs setup suffer errors (git-fixes).
* nbd: fix race between timeout and normal completion (bsc#1230918).
* net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git-
fixes).
* net/mlx5: Added cond_resched() to crdump collection (git-fixes).
* net/mlx5: Check capability for fw_reset (git-fixes).
* net/mlx5: Check for invalid vector index on EQ creation (git-fixes).
* net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes).
* net/mlx5: Fix command bitmask initialization (git-fixes).
* net/mlx5: Fix error handling in irq_pool_request_irq (git-fixes).
* net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes).
* net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes).
* net/mlx5: Stop waiting for PCI if pci channel is offline (git-fixes).
* net/mlx5: Unregister notifier on eswitch init failure (git-fixes).
* net/mlx5: Update the list of the PCI supported devices (git-fixes).
* net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys
(git-fixes).
* net/mlx5e: Add missing link mode to ptys2ext_ethtool_map (git-fixes).
* net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes).
* net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git-
fixes).
* net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes).
* net/mlx5e: Do not call cleanup on profile rollback failure (git-fixes).
* net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes).
* net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes).
* net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN)
packets (git-fixes).
* net/mlx5e: Require mlx5 tc classifier action support for IPsec prio
capability (git-fixes).
* net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer
exhaustion (git-fixes).
* net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891).
* net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289).
* net: phy: Remove LED entry from LEDs list on unregister (git-fixes).
* net: phy: bcm84881: Fix some error handling paths (git-fixes).
* net: phy: dp83869: fix memory corruption when enabling fiber (git-fixes).
* net: qede: sanitize 'rc' in qede_add_tc_flower_fltr() (git-fixes).
* net: qede: use return from qede_parse_actions() (git-fixes).
* net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes).
* net: qede: use return from qede_parse_flow_attr() for flower (git-fixes).
* net: stmmac: dwmac-tegra: Fix link bring-up sequence (git-fixes)
* net: sysfs: Fix /sys/class/net/<iface> path for statistics (git-fixes).
* net: test for not too small csum_start in virtio_net_hdr_to_skb() (git-
fixes).
* net: usb: usbnet: fix name regression (get-fixes).
* net: usb: usbnet: fix race in probe failure (git-fixes).
* netdevsim: use cond_resched() in nsim_dev_trap_report_work() (git-fixes).
* nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes).
* nfsd: call cache_put if xdr_reserve_space returns NULL (git-fixes).
* nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net
(git-fixes).
* nfsd: fix delegation_blocked() to block correctly for at least 30 seconds
(git-fixes).
* nfsd: fix refcount leak when file is unhashed after being found (git-fixes).
* nfsd: map the EBADMSG to nfserr_io to avoid warning (git-fixes).
* nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire (git-
fixes).
* nfsd: return -EINVAL when namelen is 0 (git-fixes).
* nilfs2: fix kernel bug due to missing clearing of buffer delay flag (git-
fixes).
* nouveau/dmem: Fix privileged error in copy engine channel (git-fixes).
* nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error (git-
fixes).
* nouveau/gsp: Avoid addressing beyond end of rpc->entries (stable-fixes).
* ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() (git-
fixes).
* nvme-multipath: suppress partition scan until the disk is ready
(bsc#1228244).
* nvme-pci: fix race condition between reset and nvme_dev_disable() (git-
fixes).
* nvme-pci: qdepth 1 quirk (git-fixes).
* nvme-pci: set doorbell config before unquiescing (git-fixes).
* nvme: disable CC.CRIME (NVME_CC_CRIME) (jsc#PED-9901).
* nvme: null terminate nvme_tls_attrs (git-fixes).
* nvme: re-fix error-handling for io_uring nvme-passthrough (git-fixes).
* nvmet-auth: assign dh_key to NULL after kfree_sensitive (git-fixes).
* ocfs2: fix the la space leak when unmounting an ocfs2 volume (git-fixes).
* ocfs2: fix uninit-value in ocfs2_get_block() (git-fixes).
* ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (git-fixes).
* parport: Proper fix for array out-of-bounds access (git-fixes).
* phy: freescale: imx8m-pcie: Do CMN_RST just before PHY PLL lock check (git-
fixes).
* phy: qcom: qmp-combo: move driver data initialisation earlier (git-fixes).
* phy: qcom: qmp-usb: fix NULL-deref on runtime suspend (git-fixes).
* phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes).
* phy: ti: phy-j721e-wiz: fix usxgmii configuration (git-fixes).
* pinctrl: apple: check devm_kasprintf() returned value (git-fixes).
* pinctrl: ocelot: fix system hang on level based interrupts (stable-fixes).
* platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug (git-fixes).
* platform/x86: dell-sysman: add support for alienware products (stable-
fixes).
* platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes).
* platform/x86: lenovo-ymc: Ignore the 0x0 state (stable-fixes).
* platform/x86: touchscreen_dmi: add nanote-next quirk (stable-fixes).
* power: reset: brcmstb: Do not go into infinite loop if reset fails (stable-
fixes).
* powercap: intel_rapl: Fix off by one in get_rpi() (git-fixes).
* powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869).
* powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869).
* powerpc/boot: Only free if realloc() succeeds (bsc#1194869).
* powerpc/code-patching: Add generic memory patching (bsc#1194869).
* powerpc/code-patching: Perform hwsync in __patch_instruction() in case of
failure (bsc#1194869).
* powerpc/crypto: do not build aes-gcm-p10 by default (bsc#1230501
ltc#208632).
* powerpc/crypto: fix missing skcipher dependency for aes-gcm-p10 (bsc#1230501
ltc#208632).
* powerpc/vdso: Fix VDSO data access when running in a non-root time namespace
(bsc#1194869).
* powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu
(bsc#1194869).
* powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729).
* printk: Add notation to console_srcu locking (bsc#1232183).
* qed: avoid truncating work queue length (git-fixes).
* rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow
(bsc#1226631).
* rcu: Fix buffer overflow in print_cpu_stall_info() (bsc#1226623).
* rpm/check-for-config-changes: add HAVE_RUST and RUSTC_SUPPORTS_ to
IGNORED_CONFIGS_RE They depend on SHADOW_CALL_STACK.
* rpm/release-projects: Add SLFO projects (bsc#1231293).
* rpmsg: glink: Handle rejected intent request better (git-fixes).
* runtime constants: add default dummy infrastructure (git-fixes).
* runtime constants: add x86 architecture support (git-fixes).
* s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747).
* s390/pci: Handle PCI error codes other than 0x3a (git-fixes bsc#1232629).
* s390/sclp: Deactivate sclp after all its users (git-fixes bsc#1232628).
* s390/sclp_vt220: Convert newlines to CRLF instead of LFCR (git-fixes
bsc#1232627).
* scsi: fnic: Move flush_work initialization out of if block (bsc#1230055).
* scsi: lpfc: Add ELS_RSP cmd to the list of WQEs to flush in
lpfc_els_flush_cmd() (bsc#1232757).
* scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV
instance (bsc#1232757).
* scsi: lpfc: Fix kref imbalance on fabric ndlps from dev_loss_tmo handler
(bsc#1232757).
* scsi: lpfc: Remove trailing space after \n newline (bsc#1232757).
* scsi: lpfc: Restrict support for 32 byte CDBs to specific HBAs (bsc#1232757
bsc#1228119).
* scsi: lpfc: Revise TRACE_EVENT log flag severities from KERN_ERR to
KERN_WARNING (bsc#1232757).
* scsi: lpfc: Support loopback tests with VMID enabled (bsc#1232757).
* scsi: lpfc: Update lpfc version to 14.4.0.5 (bsc#1232757).
* scsi: lpfc: Update phba link state conditional before sending CMF_SYNC_WQE
(bsc#1232757).
* selftests/bpf: Add a test case to write mtu result into .rodata (git-fixes).
* selftests/bpf: Add a test case to write strtol result into .rodata (git-
fixes).
* selftests/bpf: Add test for sign extension in coerce_subreg_to_size_sx()
(git-fixes).
* selftests/bpf: Add test for truncation after sign extension in
coerce_reg_to_size_sx() (git-fixes).
* selftests/bpf: Add tests for ldsx of pkt data/data_end/data_meta accesses
(git-fixes).
* selftests/bpf: Fix ARG_PTR_TO_LONG {half-,}uninitialized test (git-fixes).
* selftests/bpf: Rename ARG_PTR_TO_LONG test description (git-fixes).
* selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation (git-
fixes).
* serial: imx: Update mctrl old_status on RTSD interrupt (git-fixes).
* serial: protect uart_port_dtr_rts() in uart_shutdown() too (stable-fixes).
* soundwire: intel_bus_common: enable interrupts before exiting reset (stable-
fixes).
* spi: atmel-quadspi: Fix wrong register value written to MR (git-fixes).
* spi: mtk-snfi: fix kerneldoc for mtk_snand_is_page_ops() (git-fixes).
* spi: s3c64xx: fix timeout counters in flush_fifo (git-fixes).
* spi: spi-fsl-dspi: Fix crash when not using GPIO chip select (git-fixes).
* spi: spi-imx: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
fixes).
* splice: always fsnotify_access(in), fsnotify_modify(out) on success (git-
fixes).
* splice: fsnotify_access(fd)/fsnotify_modify(fd) in vmsplice (git-fixes).
* splice: fsnotify_access(in), fsnotify_modify(out) on success in tee (git-
fixes).
* srcu: Fix callbacks acceleration mishandling (git-fixes).
* staging: iio: frequency: ad9832: fix division by zero in
ad9832_calc_freqreg() (git-fixes).
* sumversion: Fix a memory leak in get_src_version() (git-fixes).
* supported.conf: mark nhpoly1305 module as supported (bsc#1231035)
* supported.conf: mark ultravisor userspace access as supported (bsc#1232090)
* task_work: add kerneldoc annotation for 'data' argument (git-fixes).
* thunderbolt: Improve DisplayPort tunnel setup process to be more robust
(stable-fixes).
* tools: hv: rm .*.cmd when make clean (git-fixes).
* tracing/hwlat: Fix a race during cpuhp processing (git-fixes).
* tracing/osnoise: Fix build when timerlat is not enabled (git-fixes).
* tracing/osnoise: Skip running osnoise if all instances are off (git-fixes).
* tracing/osnoise: Switch from PF_NO_SETAFFINITY to migrate_disable (git-
fixes).
* tracing/osnoise: Use a cpumask to know what threads are kthreads (git-
fixes).
* tracing/timerlat: Add interface_lock around clearing of kthread in
stop_kthread() (git-fixes).
* tracing/timerlat: Add user-space interface (git-fixes).
* tracing/timerlat: Drop interface_lock in stop_kthread() (git-fixes).
* tracing/timerlat: Fix a race during cpuhp processing (git-fixes).
* tracing/timerlat: Fix duplicated kthread creation due to CPU online/offline
(git-fixes).
* tracing/timerlat: Move hrtimer_init to timerlat_fd open() (git-fixes).
* tracing/timerlat: Only clear timer if a kthread exists (git-fixes).
* tracing: Consider the NULL character when validating the event length (git-
fixes).
* tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (stable-fixes).
* ubifs: Fix adding orphan entry twice for the same inode (git-fixes).
* ubifs: Fix unattached xattr inode if powercut happens after deleting (git-
fixes).
* ubifs: add check for crypto_shash_tfm_digest (git-fixes).
* ubifs: dbg_orphan_check: Fix missed key type checking (git-fixes).
* unicode: Do not special case ignorable code points (stable-fixes).
* uprobe: avoid out-of-bounds memory access of fetching args (git-fixes).
* uprobes: encapsulate preparation of uprobe args buffer (git-fixes).
* uprobes: introduce the global struct vm_special_mapping xol_mapping
(bsc#1231114).
* uprobes: turn xol_area->pages into xol_area->page (bsc#1231114).
* usb: chipidea: udc: enable suspend interrupt after usb reset (stable-fixes).
* usb: dwc2: Adjust the timing of USB Driver Interrupt Registration in the
Crashkernel Scenario (stable-fixes).
* usb: dwc3: Wait for EndXfer completion before restoring GUSB2PHYCFG (git-
fixes).
* usb: dwc3: core: Stop processing of pending events if controller is halted
(git-fixes).
* usb: gadget: core: force synchronous registration (git-fixes).
* usb: gadget: f_uac2: Replace snprintf() with the safer scnprintf() variant
(stable-fixes).
* usb: gadget: f_uac2: fix non-newline-terminated function name (stable-
fixes).
* usb: gadget: f_uac2: fix return value for UAC2_ATTRIBUTE_STRING store (git-
fixes).
* usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes).
* usb: storage: ignore bogus device raised by JieLi BR21 USB sound chip
(stable-fixes).
* usb: typec: altmode should keep reference to parent (git-fixes).
* usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes()
(git-fixes).
* usb: xhci: Fix problem with xhci resume from suspend (stable-fixes).
* usb: xhci: fix loss of data on Cadence xHC (git-fixes).
* usbip: tools: Fix detach_port() invalid port error path (git-fixes).
* usbnet: fix cyclical race on disconnect with work queue (git-fixes).
* vdpa: Fix an error handling path in eni_vdpa_probe() (git-fixes).
* vdpa_sim_blk: Fix the potential leak of mgmt_dev (git-fixes).
* vdpa_sim_blk: allocate the buffer zeroed (git-fixes).
* vduse: avoid using __GFP_NOFAIL (git-fixes).
* vfs: dcache: move hashlen_hash() from callers into d_hash() (git-fixes).
* vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() (git-fixes).
* vhost_vdpa: assign irq bypass producer token correctly (git-fixes).
* virtio_console: fix misc probe bugs (git-fixes).
* vmalloc: modify the alloc_vmap_area() error message for better diagnostics
(jsc#PED-10978).
* vmxnet3: Add XDP support (bsc#1226498).
* vmxnet3: Fix missing reserved tailroom (bsc#1226498).
* vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frame (bsc#1226498).
* vmxnet3: add command to allow disabling of offloads (bsc#1226498).
* vmxnet3: add latency measurement support in vmxnet3 (bsc#1226498).
* vmxnet3: prepare for version 9 changes (bsc#1226498).
* vmxnet3: update to version 9 (bsc#1226498).
* vt: prevent kernel-infoleak in con_font_get() (git-fixes).
* wifi: ath10k: Fix memory leak in management tx (git-fixes).
* wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes).
* wifi: ath11k: fix array out-of-bound access in SoC stats (stable-fixes).
* wifi: ath12k: fix array out-of-bound access in SoC stats (stable-fixes).
* wifi: ath9k: fix possible integer overflow in ath9k_get_et_stats() (stable-
fixes).
* wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit
(stable-fixes).
* wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes).
* wifi: cfg80211: Set correct chandef when starting CAC (stable-fixes).
* wifi: cfg80211: clear wdev->cqm_config pointer on free (git-fixes).
* wifi: iwlegacy: Fix "field-spanning write" warning in il_enqueue_hcmd()
(git-fixes).
* wifi: iwlwifi: allow only CN mcc from WRDD (stable-fixes).
* wifi: iwlwifi: config: label 'gl' devices as discrete (git-fixes).
* wifi: iwlwifi: mvm: Fix a race in scan abort flow (stable-fixes).
* wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
(git-fixes).
* wifi: iwlwifi: mvm: avoid NULL pointer dereference (stable-fixes).
* wifi: iwlwifi: mvm: do not add default link in fw restart flow (git-fixes).
* wifi: iwlwifi: mvm: do not leak a link on AP removal (git-fixes).
* wifi: iwlwifi: mvm: drop wrong STA selection in TX (stable-fixes).
* wifi: iwlwifi: mvm: use correct key iteration (stable-fixes).
* wifi: iwlwifi: remove AX101, AX201 and AX203 support from LNL (stable-
fixes).
* wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower
(git-fixes).
* wifi: mac80211: fix RCU list iterations (stable-fixes).
* wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes).
* wifi: mt76: mt7915: add dummy HW offload of IEEE 802.11 fragmentation
(stable-fixes).
* wifi: mt76: mt7915: disable tx worker during tx BA session enable/disable
(stable-fixes).
* wifi: mt76: mt7915: hold dev->mt76.mutex while disabling tx worker (stable-
fixes).
* wifi: mwifiex: Fix memcpy() field-spanning write warning in
mwifiex_cmd_802_11_scan_ext() (stable-fixes).
* wifi: rtw88: 8821cu: Remove VID/PID 0bda:c82c (stable-fixes).
* wifi: rtw88: Fix USB/SDIO devices not transmitting beacons (git-fixes).
* wifi: rtw88: select WANT_DEV_COREDUMP (stable-fixes).
* wifi: rtw89: avoid reading out of bounds when loading TX power FW elements
(stable-fixes).
* wifi: rtw89: avoid to add interface to list twice when SER (stable-fixes).
* wifi: rtw89: correct base HT rate mask for firmware (stable-fixes).
* x86/CPU/AMD: Only apply Zenbleed fix for Zen2 during late microcode load
(git-fixes).
* x86/Documentation: Indent 'note::' directive for protocol version number
note (git-fixes).
* x86/PCI: Check pcie_find_root_port() return for NULL (git-fixes).
* x86/amd_nb: Add new PCI IDs for AMD family 1Ah model 60h (git-fixes).
* x86/apic: Always explicitly disarm TSC-deadline timer (git-fixes).
* x86/apic: Make x2apic_disable() work correctly (git-fixes).
* x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (git-fixes).
* x86/bugs: Skip RSB fill at VMEXIT (git-fixes).
* x86/cpufeatures: Add a IBPB_NO_RET BUG flag (git-fixes).
* x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (git-fixes).
* x86/entry: Have entry_ibpb() invalidate return predictions (git-fixes).
* x86/entry: Remove unwanted instrumentation in common_interrupt() (git-
fixes).
* x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides frequency
(git-fixes).
* x86/mm: Use IPIs to synchronize LAM enablement (git-fixes).
* x86/resctrl: Annotate get_mem_config() functions as __init (git-fixes).
* x86/resctrl: Avoid overflow in MB settings in bw_validate() (git-fixes).
* x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git-
fixes).
* x86: do the user address masking outside the user access area (git-fixes).
* x86: fix user address masking non-canonical speculation issue (git-fixes).
* x86: make the masked_user_access_begin() macro use its argument only once
(git-fixes).
* x86: support user address masking instead of non-speculative conditional
(git-fixes).
* xfs: check opcode and iovec count match in xlog_recover_attri_commit_pass2
(git-fixes).
* xfs: check shortform attr entry flags specifically (git-fixes).
* xfs: convert delayed extents to unwritten when zeroing post eof blocks (git-
fixes).
* xfs: fix finding a last resort AG in xfs_filestream_pick_ag (git-fixes).
* xfs: fix freeing speculative preallocations for preallocated files (git-
fixes).
* xfs: make sure sb_fdblocks is non-negative (git-fixes).
* xfs: make the seq argument to xfs_bmapi_convert_delalloc() optional (git-
fixes).
* xfs: make xfs_bmapi_convert_delalloc() to allocate the target offset (git-
fixes).
* xfs: remove a racy if_bytes check in xfs_reflink_end_cow_extent (git-fixes).
* xfs: validate recovered name buffers when recovering xattr items (git-
fixes).
* xhci: Add a quirk for writing ERST in high-low order (git-fixes).
* xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes).
* xhci: Fix incorrect stream context type macro (git-fixes).
* xhci: Mitigate failed set dequeue pointer commands (git-fixes).
* xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes).
* xhci: tegra: fix checked USB2 port number (git-fixes).
* zonefs: Improve error handling (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3986=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-3986=1

* SUSE Real Time Module 15-SP6
zypper in -t patch SUSE-SLE-Module-RT-15-SP6-2024-3986=1

## Package List:

* openSUSE Leap 15.6 (x86_64)
* kernel-rt-devel-debuginfo-6.4.0-150600.10.17.1
* gfs2-kmp-rt-6.4.0-150600.10.17.1
* kernel-rt-vdso-debuginfo-6.4.0-150600.10.17.1
* cluster-md-kmp-rt-6.4.0-150600.10.17.1
* ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.17.1
* cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.17.1
* reiserfs-kmp-rt-debuginfo-6.4.0-150600.10.17.1
* kernel-rt-optional-6.4.0-150600.10.17.1
* kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.17.1
* kernel-rt-debugsource-6.4.0-150600.10.17.1
* dlm-kmp-rt-debuginfo-6.4.0-150600.10.17.1
* kernel-rt_debug-livepatch-devel-6.4.0-150600.10.17.1
* kernel-rt-extra-debuginfo-6.4.0-150600.10.17.1
* kernel-rt-extra-6.4.0-150600.10.17.1
* kernel-rt-optional-debuginfo-6.4.0-150600.10.17.1
* gfs2-kmp-rt-debuginfo-6.4.0-150600.10.17.1
* kernel-rt_debug-vdso-debuginfo-6.4.0-150600.10.17.1
* kselftests-kmp-rt-debuginfo-6.4.0-150600.10.17.1
* kernel-rt_debug-debugsource-6.4.0-150600.10.17.1
* kernel-rt_debug-debuginfo-6.4.0-150600.10.17.1
* kernel-rt-debuginfo-6.4.0-150600.10.17.1
* kernel-rt_debug-vdso-6.4.0-150600.10.17.1
* dlm-kmp-rt-6.4.0-150600.10.17.1
* kselftests-kmp-rt-6.4.0-150600.10.17.1
* kernel-rt_debug-devel-6.4.0-150600.10.17.1
* kernel-rt-vdso-6.4.0-150600.10.17.1
* ocfs2-kmp-rt-6.4.0-150600.10.17.1
* reiserfs-kmp-rt-6.4.0-150600.10.17.1
* kernel-rt-devel-6.4.0-150600.10.17.1
* kernel-syms-rt-6.4.0-150600.10.17.1
* kernel-rt-livepatch-devel-6.4.0-150600.10.17.1
* openSUSE Leap 15.6 (noarch)
* kernel-source-rt-6.4.0-150600.10.17.1
* kernel-devel-rt-6.4.0-150600.10.17.1
* openSUSE Leap 15.6 (nosrc x86_64)
* kernel-rt-6.4.0-150600.10.17.1
* kernel-rt_debug-6.4.0-150600.10.17.1
* SUSE Linux Enterprise Live Patching 15-SP6 (x86_64)
* kernel-livepatch-SLE15-SP6-RT_Update_5-debugsource-1-150600.1.3.1
* kernel-livepatch-6_4_0-150600_10_17-rt-1-150600.1.3.1
* kernel-livepatch-6_4_0-150600_10_17-rt-debuginfo-1-150600.1.3.1
* SUSE Real Time Module 15-SP6 (x86_64)
* kernel-rt-devel-debuginfo-6.4.0-150600.10.17.1
* kernel-rt_debug-devel-6.4.0-150600.10.17.1
* gfs2-kmp-rt-6.4.0-150600.10.17.1
* gfs2-kmp-rt-debuginfo-6.4.0-150600.10.17.1
* kernel-rt-debuginfo-6.4.0-150600.10.17.1
* cluster-md-kmp-rt-6.4.0-150600.10.17.1
* kernel-rt-debugsource-6.4.0-150600.10.17.1
* cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.17.1
* kernel-syms-rt-6.4.0-150600.10.17.1
* ocfs2-kmp-rt-6.4.0-150600.10.17.1
* ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.17.1
* kernel-rt_debug-debugsource-6.4.0-150600.10.17.1
* dlm-kmp-rt-6.4.0-150600.10.17.1
* kernel-rt-devel-6.4.0-150600.10.17.1
* kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.17.1
* dlm-kmp-rt-debuginfo-6.4.0-150600.10.17.1
* kernel-rt_debug-debuginfo-6.4.0-150600.10.17.1
* SUSE Real Time Module 15-SP6 (noarch)
* kernel-source-rt-6.4.0-150600.10.17.1
* kernel-devel-rt-6.4.0-150600.10.17.1
* SUSE Real Time Module 15-SP6 (nosrc x86_64)
* kernel-rt-6.4.0-150600.10.17.1
* kernel-rt_debug-6.4.0-150600.10.17.1

## References:

* https://www.suse.com/security/cve/CVE-2023-52766.html
* https://www.suse.com/security/cve/CVE-2023-52800.html
* https://www.suse.com/security/cve/CVE-2023-52881.html
* https://www.suse.com/security/cve/CVE-2023-52917.html
* https://www.suse.com/security/cve/CVE-2023-52918.html
* https://www.suse.com/security/cve/CVE-2023-52919.html
* https://www.suse.com/security/cve/CVE-2023-6270.html
* https://www.suse.com/security/cve/CVE-2024-26758.html
* https://www.suse.com/security/cve/CVE-2024-26761.html
* https://www.suse.com/security/cve/CVE-2024-26767.html
* https://www.suse.com/security/cve/CVE-2024-26943.html
* https://www.suse.com/security/cve/CVE-2024-27026.html
* https://www.suse.com/security/cve/CVE-2024-27043.html
* https://www.suse.com/security/cve/CVE-2024-35980.html
* https://www.suse.com/security/cve/CVE-2024-36244.html
* https://www.suse.com/security/cve/CVE-2024-38576.html
* https://www.suse.com/security/cve/CVE-2024-38577.html
* https://www.suse.com/security/cve/CVE-2024-38599.html
* https://www.suse.com/security/cve/CVE-2024-41016.html
* https://www.suse.com/security/cve/CVE-2024-41031.html
* https://www.suse.com/security/cve/CVE-2024-41047.html
* https://www.suse.com/security/cve/CVE-2024-41082.html
* https://www.suse.com/security/cve/CVE-2024-42145.html
* https://www.suse.com/security/cve/CVE-2024-44932.html
* https://www.suse.com/security/cve/CVE-2024-44958.html
* https://www.suse.com/security/cve/CVE-2024-44964.html
* https://www.suse.com/security/cve/CVE-2024-45016.html
* https://www.suse.com/security/cve/CVE-2024-45025.html
* https://www.suse.com/security/cve/CVE-2024-46678.html
* https://www.suse.com/security/cve/CVE-2024-46721.html
* https://www.suse.com/security/cve/CVE-2024-46754.html
* https://www.suse.com/security/cve/CVE-2024-46766.html
* https://www.suse.com/security/cve/CVE-2024-46770.html
* https://www.suse.com/security/cve/CVE-2024-46775.html
* https://www.suse.com/security/cve/CVE-2024-46777.html
* https://www.suse.com/security/cve/CVE-2024-46797.html
* https://www.suse.com/security/cve/CVE-2024-46802.html
* https://www.suse.com/security/cve/CVE-2024-46803.html
* https://www.suse.com/security/cve/CVE-2024-46804.html
* https://www.suse.com/security/cve/CVE-2024-46805.html
* https://www.suse.com/security/cve/CVE-2024-46806.html
* https://www.suse.com/security/cve/CVE-2024-46807.html
* https://www.suse.com/security/cve/CVE-2024-46809.html
* https://www.suse.com/security/cve/CVE-2024-46810.html
* https://www.suse.com/security/cve/CVE-2024-46811.html
* https://www.suse.com/security/cve/CVE-2024-46812.html
* https://www.suse.com/security/cve/CVE-2024-46813.html
* https://www.suse.com/security/cve/CVE-2024-46814.html
* https://www.suse.com/security/cve/CVE-2024-46815.html
* https://www.suse.com/security/cve/CVE-2024-46816.html
* https://www.suse.com/security/cve/CVE-2024-46817.html
* https://www.suse.com/security/cve/CVE-2024-46818.html
* https://www.suse.com/security/cve/CVE-2024-46819.html
* https://www.suse.com/security/cve/CVE-2024-46821.html
* https://www.suse.com/security/cve/CVE-2024-46825.html
* https://www.suse.com/security/cve/CVE-2024-46826.html
* https://www.suse.com/security/cve/CVE-2024-46827.html
* https://www.suse.com/security/cve/CVE-2024-46828.html
* https://www.suse.com/security/cve/CVE-2024-46830.html
* https://www.suse.com/security/cve/CVE-2024-46831.html
* https://www.suse.com/security/cve/CVE-2024-46834.html
* https://www.suse.com/security/cve/CVE-2024-46835.html
* https://www.suse.com/security/cve/CVE-2024-46836.html
* https://www.suse.com/security/cve/CVE-2024-46840.html
* https://www.suse.com/security/cve/CVE-2024-46841.html
* https://www.suse.com/security/cve/CVE-2024-46842.html
* https://www.suse.com/security/cve/CVE-2024-46843.html
* https://www.suse.com/security/cve/CVE-2024-46846.html
* https://www.suse.com/security/cve/CVE-2024-46848.html
* https://www.suse.com/security/cve/CVE-2024-46849.html
* https://www.suse.com/security/cve/CVE-2024-46851.html
* https://www.suse.com/security/cve/CVE-2024-46852.html
* https://www.suse.com/security/cve/CVE-2024-46853.html
* https://www.suse.com/security/cve/CVE-2024-46854.html
* https://www.suse.com/security/cve/CVE-2024-46855.html
* https://www.suse.com/security/cve/CVE-2024-46857.html
* https://www.suse.com/security/cve/CVE-2024-46859.html
* https://www.suse.com/security/cve/CVE-2024-46860.html
* https://www.suse.com/security/cve/CVE-2024-46861.html
* https://www.suse.com/security/cve/CVE-2024-46864.html
* https://www.suse.com/security/cve/CVE-2024-46870.html
* https://www.suse.com/security/cve/CVE-2024-46871.html
* https://www.suse.com/security/cve/CVE-2024-47658.html
* https://www.suse.com/security/cve/CVE-2024-47660.html
* https://www.suse.com/security/cve/CVE-2024-47661.html
* https://www.suse.com/security/cve/CVE-2024-47662.html
* https://www.suse.com/security/cve/CVE-2024-47663.html
* https://www.suse.com/security/cve/CVE-2024-47664.html
* https://www.suse.com/security/cve/CVE-2024-47665.html
* https://www.suse.com/security/cve/CVE-2024-47667.html
* https://www.suse.com/security/cve/CVE-2024-47668.html
* https://www.suse.com/security/cve/CVE-2024-47669.html
* https://www.suse.com/security/cve/CVE-2024-47670.html
* https://www.suse.com/security/cve/CVE-2024-47671.html
* https://www.suse.com/security/cve/CVE-2024-47672.html
* https://www.suse.com/security/cve/CVE-2024-47673.html
* https://www.suse.com/security/cve/CVE-2024-47674.html
* https://www.suse.com/security/cve/CVE-2024-47675.html
* https://www.suse.com/security/cve/CVE-2024-47681.html
* https://www.suse.com/security/cve/CVE-2024-47682.html
* https://www.suse.com/security/cve/CVE-2024-47684.html
* https://www.suse.com/security/cve/CVE-2024-47685.html
* https://www.suse.com/security/cve/CVE-2024-47686.html
* https://www.suse.com/security/cve/CVE-2024-47687.html
* https://www.suse.com/security/cve/CVE-2024-47688.html
* https://www.suse.com/security/cve/CVE-2024-47692.html
* https://www.suse.com/security/cve/CVE-2024-47693.html
* https://www.suse.com/security/cve/CVE-2024-47695.html
* https://www.suse.com/security/cve/CVE-2024-47696.html
* https://www.suse.com/security/cve/CVE-2024-47697.html
* https://www.suse.com/security/cve/CVE-2024-47698.html
* https://www.suse.com/security/cve/CVE-2024-47699.html
* https://www.suse.com/security/cve/CVE-2024-47702.html
* https://www.suse.com/security/cve/CVE-2024-47704.html
* https://www.suse.com/security/cve/CVE-2024-47705.html
* https://www.suse.com/security/cve/CVE-2024-47706.html
* https://www.suse.com/security/cve/CVE-2024-47707.html
* https://www.suse.com/security/cve/CVE-2024-47709.html
* https://www.suse.com/security/cve/CVE-2024-47710.html
* https://www.suse.com/security/cve/CVE-2024-47712.html
* https://www.suse.com/security/cve/CVE-2024-47713.html
* https://www.suse.com/security/cve/CVE-2024-47714.html
* https://www.suse.com/security/cve/CVE-2024-47715.html
* https://www.suse.com/security/cve/CVE-2024-47718.html
* https://www.suse.com/security/cve/CVE-2024-47719.html
* https://www.suse.com/security/cve/CVE-2024-47720.html
* https://www.suse.com/security/cve/CVE-2024-47723.html
* https://www.suse.com/security/cve/CVE-2024-47727.html
* https://www.suse.com/security/cve/CVE-2024-47728.html
* https://www.suse.com/security/cve/CVE-2024-47730.html
* https://www.suse.com/security/cve/CVE-2024-47731.html
* https://www.suse.com/security/cve/CVE-2024-47732.html
* https://www.suse.com/security/cve/CVE-2024-47735.html
* https://www.suse.com/security/cve/CVE-2024-47737.html
* https://www.suse.com/security/cve/CVE-2024-47738.html
* https://www.suse.com/security/cve/CVE-2024-47739.html
* https://www.suse.com/security/cve/CVE-2024-47741.html
* https://www.suse.com/security/cve/CVE-2024-47742.html
* https://www.suse.com/security/cve/CVE-2024-47743.html
* https://www.suse.com/security/cve/CVE-2024-47744.html
* https://www.suse.com/security/cve/CVE-2024-47745.html
* https://www.suse.com/security/cve/CVE-2024-47747.html
* https://www.suse.com/security/cve/CVE-2024-47748.html
* https://www.suse.com/security/cve/CVE-2024-47749.html
* https://www.suse.com/security/cve/CVE-2024-47750.html
* https://www.suse.com/security/cve/CVE-2024-47751.html
* https://www.suse.com/security/cve/CVE-2024-47752.html
* https://www.suse.com/security/cve/CVE-2024-47753.html
* https://www.suse.com/security/cve/CVE-2024-47754.html
* https://www.suse.com/security/cve/CVE-2024-47756.html
* https://www.suse.com/security/cve/CVE-2024-47757.html
* https://www.suse.com/security/cve/CVE-2024-49850.html
* https://www.suse.com/security/cve/CVE-2024-49851.html
* https://www.suse.com/security/cve/CVE-2024-49853.html
* https://www.suse.com/security/cve/CVE-2024-49855.html
* https://www.suse.com/security/cve/CVE-2024-49858.html
* https://www.suse.com/security/cve/CVE-2024-49860.html
* https://www.suse.com/security/cve/CVE-2024-49861.html
* https://www.suse.com/security/cve/CVE-2024-49862.html
* https://www.suse.com/security/cve/CVE-2024-49863.html
* https://www.suse.com/security/cve/CVE-2024-49864.html
* https://www.suse.com/security/cve/CVE-2024-49867.html
* https://www.suse.com/security/cve/CVE-2024-49870.html
* https://www.suse.com/security/cve/CVE-2024-49871.html
* https://www.suse.com/security/cve/CVE-2024-49874.html
* https://www.suse.com/security/cve/CVE-2024-49875.html
* https://www.suse.com/security/cve/CVE-2024-49877.html
* https://www.suse.com/security/cve/CVE-2024-49878.html
* https://www.suse.com/security/cve/CVE-2024-49879.html
* https://www.suse.com/security/cve/CVE-2024-49882.html
* https://www.suse.com/security/cve/CVE-2024-49886.html
* https://www.suse.com/security/cve/CVE-2024-49888.html
* https://www.suse.com/security/cve/CVE-2024-49890.html
* https://www.suse.com/security/cve/CVE-2024-49891.html
* https://www.suse.com/security/cve/CVE-2024-49892.html
* https://www.suse.com/security/cve/CVE-2024-49896.html
* https://www.suse.com/security/cve/CVE-2024-49898.html
* https://www.suse.com/security/cve/CVE-2024-49900.html
* https://www.suse.com/security/cve/CVE-2024-49902.html
* https://www.suse.com/security/cve/CVE-2024-49903.html
* https://www.suse.com/security/cve/CVE-2024-49906.html
* https://www.suse.com/security/cve/CVE-2024-49907.html
* https://www.suse.com/security/cve/CVE-2024-49908.html
* https://www.suse.com/security/cve/CVE-2024-49914.html
* https://www.suse.com/security/cve/CVE-2024-49917.html
* https://www.suse.com/security/cve/CVE-2024-49918.html
* https://www.suse.com/security/cve/CVE-2024-49919.html
* https://www.suse.com/security/cve/CVE-2024-49920.html
* https://www.suse.com/security/cve/CVE-2024-49928.html
* https://www.suse.com/security/cve/CVE-2024-49929.html
* https://www.suse.com/security/cve/CVE-2024-49930.html
* https://www.suse.com/security/cve/CVE-2024-49931.html
* https://www.suse.com/security/cve/CVE-2024-49935.html
* https://www.suse.com/security/cve/CVE-2024-49936.html
* https://www.suse.com/security/cve/CVE-2024-49937.html
* https://www.suse.com/security/cve/CVE-2024-49938.html
* https://www.suse.com/security/cve/CVE-2024-49939.html
* https://www.suse.com/security/cve/CVE-2024-49946.html
* https://www.suse.com/security/cve/CVE-2024-49947.html
* https://www.suse.com/security/cve/CVE-2024-49949.html
* https://www.suse.com/security/cve/CVE-2024-49950.html
* https://www.suse.com/security/cve/CVE-2024-49953.html
* https://www.suse.com/security/cve/CVE-2024-49954.html
* https://www.suse.com/security/cve/CVE-2024-49955.html
* https://www.suse.com/security/cve/CVE-2024-49957.html
* https://www.suse.com/security/cve/CVE-2024-49958.html
* https://www.suse.com/security/cve/CVE-2024-49960.html
* https://www.suse.com/security/cve/CVE-2024-49961.html
* https://www.suse.com/security/cve/CVE-2024-49962.html
* https://www.suse.com/security/cve/CVE-2024-49963.html
* https://www.suse.com/security/cve/CVE-2024-49965.html
* https://www.suse.com/security/cve/CVE-2024-49966.html
* https://www.suse.com/security/cve/CVE-2024-49967.html
* https://www.suse.com/security/cve/CVE-2024-49969.html
* https://www.suse.com/security/cve/CVE-2024-49972.html
* https://www.suse.com/security/cve/CVE-2024-49973.html
* https://www.suse.com/security/cve/CVE-2024-49974.html
* https://www.suse.com/security/cve/CVE-2024-49981.html
* https://www.suse.com/security/cve/CVE-2024-49982.html
* https://www.suse.com/security/cve/CVE-2024-49985.html
* https://www.suse.com/security/cve/CVE-2024-49986.html
* https://www.suse.com/security/cve/CVE-2024-49991.html
* https://www.suse.com/security/cve/CVE-2024-49993.html
* https://www.suse.com/security/cve/CVE-2024-49995.html
* https://www.suse.com/security/cve/CVE-2024-49996.html
* https://www.suse.com/security/cve/CVE-2024-50000.html
* https://www.suse.com/security/cve/CVE-2024-50001.html
* https://www.suse.com/security/cve/CVE-2024-50002.html
* https://www.suse.com/security/cve/CVE-2024-50007.html
* https://www.suse.com/security/cve/CVE-2024-50008.html
* https://www.suse.com/security/cve/CVE-2024-50013.html
* https://www.suse.com/security/cve/CVE-2024-50017.html
* https://www.suse.com/security/cve/CVE-2024-50019.html
* https://www.suse.com/security/cve/CVE-2024-50020.html
* https://www.suse.com/security/cve/CVE-2024-50021.html
* https://www.suse.com/security/cve/CVE-2024-50022.html
* https://www.suse.com/security/cve/CVE-2024-50023.html
* https://www.suse.com/security/cve/CVE-2024-50024.html
* https://www.suse.com/security/cve/CVE-2024-50025.html
* https://www.suse.com/security/cve/CVE-2024-50027.html
* https://www.suse.com/security/cve/CVE-2024-50028.html
* https://www.suse.com/security/cve/CVE-2024-50031.html
* https://www.suse.com/security/cve/CVE-2024-50033.html
* https://www.suse.com/security/cve/CVE-2024-50035.html
* https://www.suse.com/security/cve/CVE-2024-50040.html
* https://www.suse.com/security/cve/CVE-2024-50041.html
* https://www.suse.com/security/cve/CVE-2024-50042.html
* https://www.suse.com/security/cve/CVE-2024-50044.html
* https://www.suse.com/security/cve/CVE-2024-50045.html
* https://www.suse.com/security/cve/CVE-2024-50046.html
* https://www.suse.com/security/cve/CVE-2024-50047.html
* https://www.suse.com/security/cve/CVE-2024-50048.html
* https://www.suse.com/security/cve/CVE-2024-50049.html
* https://www.suse.com/security/cve/CVE-2024-50055.html
* https://www.suse.com/security/cve/CVE-2024-50058.html
* https://www.suse.com/security/cve/CVE-2024-50059.html
* https://www.suse.com/security/cve/CVE-2024-50060.html
* https://www.suse.com/security/cve/CVE-2024-50061.html
* https://www.suse.com/security/cve/CVE-2024-50062.html
* https://www.suse.com/security/cve/CVE-2024-50063.html
* https://www.suse.com/security/cve/CVE-2024-50064.html
* https://www.suse.com/security/cve/CVE-2024-50069.html
* https://www.suse.com/security/cve/CVE-2024-50073.html
* https://www.suse.com/security/cve/CVE-2024-50074.html
* https://www.suse.com/security/cve/CVE-2024-50075.html
* https://www.suse.com/security/cve/CVE-2024-50076.html
* https://www.suse.com/security/cve/CVE-2024-50077.html
* https://www.suse.com/security/cve/CVE-2024-50078.html
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1217845
* https://bugzilla.suse.com/show_bug.cgi?id=1218562
* https://bugzilla.suse.com/show_bug.cgi?id=1219596
* https://bugzilla.suse.com/show_bug.cgi?id=1219803
* https://bugzilla.suse.com/show_bug.cgi?id=1220382
* https://bugzilla.suse.com/show_bug.cgi?id=1223384
* https://bugzilla.suse.com/show_bug.cgi?id=1223700
* https://bugzilla.suse.com/show_bug.cgi?id=1223824
* https://bugzilla.suse.com/show_bug.cgi?id=1223848
* https://bugzilla.suse.com/show_bug.cgi?id=1224088
* https://bugzilla.suse.com/show_bug.cgi?id=1224574
* https://bugzilla.suse.com/show_bug.cgi?id=1225611
* https://bugzilla.suse.com/show_bug.cgi?id=1226003
* https://bugzilla.suse.com/show_bug.cgi?id=1226498
* https://bugzilla.suse.com/show_bug.cgi?id=1226623
* https://bugzilla.suse.com/show_bug.cgi?id=1226631
* https://bugzilla.suse.com/show_bug.cgi?id=1226797
* https://bugzilla.suse.com/show_bug.cgi?id=1226848
* https://bugzilla.suse.com/show_bug.cgi?id=1228119
* https://bugzilla.suse.com/show_bug.cgi?id=1228244
* https://bugzilla.suse.com/show_bug.cgi?id=1228269
* https://bugzilla.suse.com/show_bug.cgi?id=1228410
* https://bugzilla.suse.com/show_bug.cgi?id=1228454
* https://bugzilla.suse.com/show_bug.cgi?id=1228537
* https://bugzilla.suse.com/show_bug.cgi?id=1228620
* https://bugzilla.suse.com/show_bug.cgi?id=1228743
* https://bugzilla.suse.com/show_bug.cgi?id=1228747
* https://bugzilla.suse.com/show_bug.cgi?id=1228857
* https://bugzilla.suse.com/show_bug.cgi?id=1229019
* https://bugzilla.suse.com/show_bug.cgi?id=1229429
* https://bugzilla.suse.com/show_bug.cgi?id=1229450
* https://bugzilla.suse.com/show_bug.cgi?id=1229585
* https://bugzilla.suse.com/show_bug.cgi?id=1229677
* https://bugzilla.suse.com/show_bug.cgi?id=1229769
* https://bugzilla.suse.com/show_bug.cgi?id=1229808
* https://bugzilla.suse.com/show_bug.cgi?id=1229891
* https://bugzilla.suse.com/show_bug.cgi?id=1230055
* https://bugzilla.suse.com/show_bug.cgi?id=1230132
* https://bugzilla.suse.com/show_bug.cgi?id=1230179
* https://bugzilla.suse.com/show_bug.cgi?id=1230220
* https://bugzilla.suse.com/show_bug.cgi?id=1230289
* https://bugzilla.suse.com/show_bug.cgi?id=1230295
* https://bugzilla.suse.com/show_bug.cgi?id=1230339
* https://bugzilla.suse.com/show_bug.cgi?id=1230341
* https://bugzilla.suse.com/show_bug.cgi?id=1230375
* https://bugzilla.suse.com/show_bug.cgi?id=1230414
* https://bugzilla.suse.com/show_bug.cgi?id=1230429
* https://bugzilla.suse.com/show_bug.cgi?id=1230456
* https://bugzilla.suse.com/show_bug.cgi?id=1230501
* https://bugzilla.suse.com/show_bug.cgi?id=1230527
* https://bugzilla.suse.com/show_bug.cgi?id=1230550
* https://bugzilla.suse.com/show_bug.cgi?id=1230600
* https://bugzilla.suse.com/show_bug.cgi?id=1230620
* https://bugzilla.suse.com/show_bug.cgi?id=1230710
* https://bugzilla.suse.com/show_bug.cgi?id=1230762
* https://bugzilla.suse.com/show_bug.cgi?id=1230763
* https://bugzilla.suse.com/show_bug.cgi?id=1230773
* https://bugzilla.suse.com/show_bug.cgi?id=1230774
* https://bugzilla.suse.com/show_bug.cgi?id=1230801
* https://bugzilla.suse.com/show_bug.cgi?id=1230831
* https://bugzilla.suse.com/show_bug.cgi?id=1230914
* https://bugzilla.suse.com/show_bug.cgi?id=1230918
* https://bugzilla.suse.com/show_bug.cgi?id=1231016
* https://bugzilla.suse.com/show_bug.cgi?id=1231035
* https://bugzilla.suse.com/show_bug.cgi?id=1231072
* https://bugzilla.suse.com/show_bug.cgi?id=1231073
* https://bugzilla.suse.com/show_bug.cgi?id=1231075
* https://bugzilla.suse.com/show_bug.cgi?id=1231081
* https://bugzilla.suse.com/show_bug.cgi?id=1231082
* https://bugzilla.suse.com/show_bug.cgi?id=1231083
* https://bugzilla.suse.com/show_bug.cgi?id=1231084
* https://bugzilla.suse.com/show_bug.cgi?id=1231085
* https://bugzilla.suse.com/show_bug.cgi?id=1231087
* https://bugzilla.suse.com/show_bug.cgi?id=1231089
* https://bugzilla.suse.com/show_bug.cgi?id=1231092
* https://bugzilla.suse.com/show_bug.cgi?id=1231093
* https://bugzilla.suse.com/show_bug.cgi?id=1231094
* https://bugzilla.suse.com/show_bug.cgi?id=1231096
* https://bugzilla.suse.com/show_bug.cgi?id=1231098
* https://bugzilla.suse.com/show_bug.cgi?id=1231100
* https://bugzilla.suse.com/show_bug.cgi?id=1231101
* https://bugzilla.suse.com/show_bug.cgi?id=1231102
* https://bugzilla.suse.com/show_bug.cgi?id=1231105
* https://bugzilla.suse.com/show_bug.cgi?id=1231108
* https://bugzilla.suse.com/show_bug.cgi?id=1231111
* https://bugzilla.suse.com/show_bug.cgi?id=1231114
* https://bugzilla.suse.com/show_bug.cgi?id=1231115
* https://bugzilla.suse.com/show_bug.cgi?id=1231116
* https://bugzilla.suse.com/show_bug.cgi?id=1231117
* https://bugzilla.suse.com/show_bug.cgi?id=1231131
* https://bugzilla.suse.com/show_bug.cgi?id=1231132
* https://bugzilla.suse.com/show_bug.cgi?id=1231135
* https://bugzilla.suse.com/show_bug.cgi?id=1231136
* https://bugzilla.suse.com/show_bug.cgi?id=1231138
* https://bugzilla.suse.com/show_bug.cgi?id=1231148
* https://bugzilla.suse.com/show_bug.cgi?id=1231169
* https://bugzilla.suse.com/show_bug.cgi?id=1231170
* https://bugzilla.suse.com/show_bug.cgi?id=1231171
* https://bugzilla.suse.com/show_bug.cgi?id=1231178
* https://bugzilla.suse.com/show_bug.cgi?id=1231179
* https://bugzilla.suse.com/show_bug.cgi?id=1231183
* https://bugzilla.suse.com/show_bug.cgi?id=1231187
* https://bugzilla.suse.com/show_bug.cgi?id=1231191
* https://bugzilla.suse.com/show_bug.cgi?id=1231193
* https://bugzilla.suse.com/show_bug.cgi?id=1231195
* https://bugzilla.suse.com/show_bug.cgi?id=1231197
* https://bugzilla.suse.com/show_bug.cgi?id=1231200
* https://bugzilla.suse.com/show_bug.cgi?id=1231202
* https://bugzilla.suse.com/show_bug.cgi?id=1231203
* https://bugzilla.suse.com/show_bug.cgi?id=1231276
* https://bugzilla.suse.com/show_bug.cgi?id=1231293
* https://bugzilla.suse.com/show_bug.cgi?id=1231384
* https://bugzilla.suse.com/show_bug.cgi?id=1231434
* https://bugzilla.suse.com/show_bug.cgi?id=1231435
* https://bugzilla.suse.com/show_bug.cgi?id=1231436
* https://bugzilla.suse.com/show_bug.cgi?id=1231439
* https://bugzilla.suse.com/show_bug.cgi?id=1231440
* https://bugzilla.suse.com/show_bug.cgi?id=1231441
* https://bugzilla.suse.com/show_bug.cgi?id=1231442
* https://bugzilla.suse.com/show_bug.cgi?id=1231452
* https://bugzilla.suse.com/show_bug.cgi?id=1231474
* https://bugzilla.suse.com/show_bug.cgi?id=1231481
* https://bugzilla.suse.com/show_bug.cgi?id=1231496
* https://bugzilla.suse.com/show_bug.cgi?id=1231502
* https://bugzilla.suse.com/show_bug.cgi?id=1231537
* https://bugzilla.suse.com/show_bug.cgi?id=1231539
* https://bugzilla.suse.com/show_bug.cgi?id=1231540
* https://bugzilla.suse.com/show_bug.cgi?id=1231541
* https://bugzilla.suse.com/show_bug.cgi?id=1231617
* https://bugzilla.suse.com/show_bug.cgi?id=1231634
* https://bugzilla.suse.com/show_bug.cgi?id=1231635
* https://bugzilla.suse.com/show_bug.cgi?id=1231636
* https://bugzilla.suse.com/show_bug.cgi?id=1231637
* https://bugzilla.suse.com/show_bug.cgi?id=1231638
* https://bugzilla.suse.com/show_bug.cgi?id=1231639
* https://bugzilla.suse.com/show_bug.cgi?id=1231640
* https://bugzilla.suse.com/show_bug.cgi?id=1231673
* https://bugzilla.suse.com/show_bug.cgi?id=1231828
* https://bugzilla.suse.com/show_bug.cgi?id=1231849
* https://bugzilla.suse.com/show_bug.cgi?id=1231855
* https://bugzilla.suse.com/show_bug.cgi?id=1231856
* https://bugzilla.suse.com/show_bug.cgi?id=1231857
* https://bugzilla.suse.com/show_bug.cgi?id=1231858
* https://bugzilla.suse.com/show_bug.cgi?id=1231859
* https://bugzilla.suse.com/show_bug.cgi?id=1231860
* https://bugzilla.suse.com/show_bug.cgi?id=1231861
* https://bugzilla.suse.com/show_bug.cgi?id=1231864
* https://bugzilla.suse.com/show_bug.cgi?id=1231865
* https://bugzilla.suse.com/show_bug.cgi?id=1231868
* https://bugzilla.suse.com/show_bug.cgi?id=1231869
* https://bugzilla.suse.com/show_bug.cgi?id=1231871
* https://bugzilla.suse.com/show_bug.cgi?id=1231872
* https://bugzilla.suse.com/show_bug.cgi?id=1231901
* https://bugzilla.suse.com/show_bug.cgi?id=1231902
* https://bugzilla.suse.com/show_bug.cgi?id=1231903
* https://bugzilla.suse.com/show_bug.cgi?id=1231904
* https://bugzilla.suse.com/show_bug.cgi?id=1231906
* https://bugzilla.suse.com/show_bug.cgi?id=1231907
* https://bugzilla.suse.com/show_bug.cgi?id=1231908
* https://bugzilla.suse.com/show_bug.cgi?id=1231914
* https://bugzilla.suse.com/show_bug.cgi?id=1231916
* https://bugzilla.suse.com/show_bug.cgi?id=1231924
* https://bugzilla.suse.com/show_bug.cgi?id=1231926
* https://bugzilla.suse.com/show_bug.cgi?id=1231931
* https://bugzilla.suse.com/show_bug.cgi?id=1231935
* https://bugzilla.suse.com/show_bug.cgi?id=1231942
* https://bugzilla.suse.com/show_bug.cgi?id=1231944
* https://bugzilla.suse.com/show_bug.cgi?id=1231947
* https://bugzilla.suse.com/show_bug.cgi?id=1231950
* https://bugzilla.suse.com/show_bug.cgi?id=1231951
* https://bugzilla.suse.com/show_bug.cgi?id=1231953
* https://bugzilla.suse.com/show_bug.cgi?id=1231954
* https://bugzilla.suse.com/show_bug.cgi?id=1231955
* https://bugzilla.suse.com/show_bug.cgi?id=1231956
* https://bugzilla.suse.com/show_bug.cgi?id=1231957
* https://bugzilla.suse.com/show_bug.cgi?id=1231965
* https://bugzilla.suse.com/show_bug.cgi?id=1231967
* https://bugzilla.suse.com/show_bug.cgi?id=1231968
* https://bugzilla.suse.com/show_bug.cgi?id=1231987
* https://bugzilla.suse.com/show_bug.cgi?id=1231988
* https://bugzilla.suse.com/show_bug.cgi?id=1231989
* https://bugzilla.suse.com/show_bug.cgi?id=1231990
* https://bugzilla.suse.com/show_bug.cgi?id=1231998
* https://bugzilla.suse.com/show_bug.cgi?id=1232000
* https://bugzilla.suse.com/show_bug.cgi?id=1232003
* https://bugzilla.suse.com/show_bug.cgi?id=1232009
* https://bugzilla.suse.com/show_bug.cgi?id=1232013
* https://bugzilla.suse.com/show_bug.cgi?id=1232015
* https://bugzilla.suse.com/show_bug.cgi?id=1232016
* https://bugzilla.suse.com/show_bug.cgi?id=1232017
* https://bugzilla.suse.com/show_bug.cgi?id=1232018
* https://bugzilla.suse.com/show_bug.cgi?id=1232033
* https://bugzilla.suse.com/show_bug.cgi?id=1232034
* https://bugzilla.suse.com/show_bug.cgi?id=1232036
* https://bugzilla.suse.com/show_bug.cgi?id=1232043
* https://bugzilla.suse.com/show_bug.cgi?id=1232047
* https://bugzilla.suse.com/show_bug.cgi?id=1232048
* https://bugzilla.suse.com/show_bug.cgi?id=1232049
* https://bugzilla.suse.com/show_bug.cgi?id=1232050
* https://bugzilla.suse.com/show_bug.cgi?id=1232056
* https://bugzilla.suse.com/show_bug.cgi?id=1232075
* https://bugzilla.suse.com/show_bug.cgi?id=1232076
* https://bugzilla.suse.com/show_bug.cgi?id=1232080
* https://bugzilla.suse.com/show_bug.cgi?id=1232083
* https://bugzilla.suse.com/show_bug.cgi?id=1232084
* https://bugzilla.suse.com/show_bug.cgi?id=1232085
* https://bugzilla.suse.com/show_bug.cgi?id=1232089
* https://bugzilla.suse.com/show_bug.cgi?id=1232090
* https://bugzilla.suse.com/show_bug.cgi?id=1232093
* https://bugzilla.suse.com/show_bug.cgi?id=1232094
* https://bugzilla.suse.com/show_bug.cgi?id=1232097
* https://bugzilla.suse.com/show_bug.cgi?id=1232098
* https://bugzilla.suse.com/show_bug.cgi?id=1232105
* https://bugzilla.suse.com/show_bug.cgi?id=1232109
* https://bugzilla.suse.com/show_bug.cgi?id=1232111
* https://bugzilla.suse.com/show_bug.cgi?id=1232114
* https://bugzilla.suse.com/show_bug.cgi?id=1232116
* https://bugzilla.suse.com/show_bug.cgi?id=1232117
* https://bugzilla.suse.com/show_bug.cgi?id=1232124
* https://bugzilla.suse.com/show_bug.cgi?id=1232126
* https://bugzilla.suse.com/show_bug.cgi?id=1232127
* https://bugzilla.suse.com/show_bug.cgi?id=1232129
* https://bugzilla.suse.com/show_bug.cgi?id=1232130
* https://bugzilla.suse.com/show_bug.cgi?id=1232131
* https://bugzilla.suse.com/show_bug.cgi?id=1232132
* https://bugzilla.suse.com/show_bug.cgi?id=1232134
* https://bugzilla.suse.com/show_bug.cgi?id=1232135
* https://bugzilla.suse.com/show_bug.cgi?id=1232140
* https://bugzilla.suse.com/show_bug.cgi?id=1232141
* https://bugzilla.suse.com/show_bug.cgi?id=1232142
* https://bugzilla.suse.com/show_bug.cgi?id=1232145
* https://bugzilla.suse.com/show_bug.cgi?id=1232147
* https://bugzilla.suse.com/show_bug.cgi?id=1232148
* https://bugzilla.suse.com/show_bug.cgi?id=1232151
* https://bugzilla.suse.com/show_bug.cgi?id=1232152
* https://bugzilla.suse.com/show_bug.cgi?id=1232154
* https://bugzilla.suse.com/show_bug.cgi?id=1232155
* https://bugzilla.suse.com/show_bug.cgi?id=1232156
* https://bugzilla.suse.com/show_bug.cgi?id=1232159
* https://bugzilla.suse.com/show_bug.cgi?id=1232160
* https://bugzilla.suse.com/show_bug.cgi?id=1232162
* https://bugzilla.suse.com/show_bug.cgi?id=1232164
* https://bugzilla.suse.com/show_bug.cgi?id=1232174
* https://bugzilla.suse.com/show_bug.cgi?id=1232180
* https://bugzilla.suse.com/show_bug.cgi?id=1232182
* https://bugzilla.suse.com/show_bug.cgi?id=1232183
* https://bugzilla.suse.com/show_bug.cgi?id=1232185
* https://bugzilla.suse.com/show_bug.cgi?id=1232187
* https://bugzilla.suse.com/show_bug.cgi?id=1232189
* https://bugzilla.suse.com/show_bug.cgi?id=1232192
* https://bugzilla.suse.com/show_bug.cgi?id=1232195
* https://bugzilla.suse.com/show_bug.cgi?id=1232196
* https://bugzilla.suse.com/show_bug.cgi?id=1232200
* https://bugzilla.suse.com/show_bug.cgi?id=1232208
* https://bugzilla.suse.com/show_bug.cgi?id=1232217
* https://bugzilla.suse.com/show_bug.cgi?id=1232218
* https://bugzilla.suse.com/show_bug.cgi?id=1232220
* https://bugzilla.suse.com/show_bug.cgi?id=1232221
* https://bugzilla.suse.com/show_bug.cgi?id=1232222
* https://bugzilla.suse.com/show_bug.cgi?id=1232232
* https://bugzilla.suse.com/show_bug.cgi?id=1232250
* https://bugzilla.suse.com/show_bug.cgi?id=1232251
* https://bugzilla.suse.com/show_bug.cgi?id=1232253
* https://bugzilla.suse.com/show_bug.cgi?id=1232254
* https://bugzilla.suse.com/show_bug.cgi?id=1232255
* https://bugzilla.suse.com/show_bug.cgi?id=1232256
* https://bugzilla.suse.com/show_bug.cgi?id=1232260
* https://bugzilla.suse.com/show_bug.cgi?id=1232262
* https://bugzilla.suse.com/show_bug.cgi?id=1232263
* https://bugzilla.suse.com/show_bug.cgi?id=1232275
* https://bugzilla.suse.com/show_bug.cgi?id=1232279
* https://bugzilla.suse.com/show_bug.cgi?id=1232282
* https://bugzilla.suse.com/show_bug.cgi?id=1232285
* https://bugzilla.suse.com/show_bug.cgi?id=1232287
* https://bugzilla.suse.com/show_bug.cgi?id=1232295
* https://bugzilla.suse.com/show_bug.cgi?id=1232309
* https://bugzilla.suse.com/show_bug.cgi?id=1232310
* https://bugzilla.suse.com/show_bug.cgi?id=1232312
* https://bugzilla.suse.com/show_bug.cgi?id=1232313
* https://bugzilla.suse.com/show_bug.cgi?id=1232314
* https://bugzilla.suse.com/show_bug.cgi?id=1232315
* https://bugzilla.suse.com/show_bug.cgi?id=1232316
* https://bugzilla.suse.com/show_bug.cgi?id=1232317
* https://bugzilla.suse.com/show_bug.cgi?id=1232329
* https://bugzilla.suse.com/show_bug.cgi?id=1232332
* https://bugzilla.suse.com/show_bug.cgi?id=1232333
* https://bugzilla.suse.com/show_bug.cgi?id=1232334
* https://bugzilla.suse.com/show_bug.cgi?id=1232335
* https://bugzilla.suse.com/show_bug.cgi?id=1232339
* https://bugzilla.suse.com/show_bug.cgi?id=1232340
* https://bugzilla.suse.com/show_bug.cgi?id=1232342
* https://bugzilla.suse.com/show_bug.cgi?id=1232345
* https://bugzilla.suse.com/show_bug.cgi?id=1232349
* https://bugzilla.suse.com/show_bug.cgi?id=1232359
* https://bugzilla.suse.com/show_bug.cgi?id=1232362
* https://bugzilla.suse.com/show_bug.cgi?id=1232369
* https://bugzilla.suse.com/show_bug.cgi?id=1232370
* https://bugzilla.suse.com/show_bug.cgi?id=1232378
* https://bugzilla.suse.com/show_bug.cgi?id=1232381
* https://bugzilla.suse.com/show_bug.cgi?id=1232383
* https://bugzilla.suse.com/show_bug.cgi?id=1232392
* https://bugzilla.suse.com/show_bug.cgi?id=1232394
* https://bugzilla.suse.com/show_bug.cgi?id=1232395
* https://bugzilla.suse.com/show_bug.cgi?id=1232417
* https://bugzilla.suse.com/show_bug.cgi?id=1232418
* https://bugzilla.suse.com/show_bug.cgi?id=1232424
* https://bugzilla.suse.com/show_bug.cgi?id=1232427
* https://bugzilla.suse.com/show_bug.cgi?id=1232432
* https://bugzilla.suse.com/show_bug.cgi?id=1232435
* https://bugzilla.suse.com/show_bug.cgi?id=1232503
* https://bugzilla.suse.com/show_bug.cgi?id=1232504
* https://bugzilla.suse.com/show_bug.cgi?id=1232505
* https://bugzilla.suse.com/show_bug.cgi?id=1232506
* https://bugzilla.suse.com/show_bug.cgi?id=1232507
* https://bugzilla.suse.com/show_bug.cgi?id=1232511
* https://bugzilla.suse.com/show_bug.cgi?id=1232519
* https://bugzilla.suse.com/show_bug.cgi?id=1232520
* https://bugzilla.suse.com/show_bug.cgi?id=1232529
* https://bugzilla.suse.com/show_bug.cgi?id=1232552
* https://bugzilla.suse.com/show_bug.cgi?id=1232623
* https://bugzilla.suse.com/show_bug.cgi?id=1232626
* https://bugzilla.suse.com/show_bug.cgi?id=1232627
* https://bugzilla.suse.com/show_bug.cgi?id=1232628
* https://bugzilla.suse.com/show_bug.cgi?id=1232629
* https://bugzilla.suse.com/show_bug.cgi?id=1232757
* https://bugzilla.suse.com/show_bug.cgi?id=1232768
* https://jira.suse.com/browse/PED-10559
* https://jira.suse.com/browse/PED-10978
* https://jira.suse.com/browse/PED-9901



openSUSE-SU-2024:14486-1: moderate: switchboard-plug-bluetooth-8.0.1-1.1 on GA media


# switchboard-plug-bluetooth-8.0.1-1.1 on GA media

Announcement ID: openSUSE-SU-2024:14486-1
Rating: moderate

Cross-References:

* CVE-2021-21367

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the switchboard-plug-bluetooth-8.0.1-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* switchboard-plug-bluetooth 8.0.1-1.1
* switchboard-plug-bluetooth-lang 8.0.1-1.1

## References:

* https://www.suse.com/security/cve/CVE-2021-21367.html