7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 High
AI Score
Confidence
High
0.005 Low
EPSS
Percentile
77.1%
The remote SUSE Linux SLES15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:2008-1 advisory.
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)
- CVE-2022-48689: Fixed data-race in lru_add_fn (bsc#1223959)
- CVE-2022-48691: Fixed memory leak in netfilter (bsc#1223961)
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
- CVE-2023-42755: Check user supplied offsets (bsc#1215702).
- CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081).
- CVE-2023-52618: Fixed string overflow in block/rnbd-srv (bsc#1221615).
- CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187).
- CVE-2023-52660: Fiedx IRQ handling due to shared interrupts (bsc#1224443).
- CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).
- CVE-2023-52671: Fixed hang/underflow when transitioning to ODM4:1 (bsc#1224729).
- CVE-2023-52674: Add clamp() in scarlett2_mixer_ctl_put() (bsc#1224727).
- CVE-2023-52680: Fixed missing error checks to *_ctl_get() (bsc#1224608).
- CVE-2023-52692: Fixed missing error check to scarlett2_usb_set_config() (bsc#1224628).
- CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (CVE-2023-52698 bsc#1224621)
- CVE-2023-52746: Prevent potential spectre v1 gadget in xfrm_xlate32_attr() (bsc#1225114)
- CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548).
- CVE-2023-52795: Fixed use after free in vhost_vdpa_probe() (bsc#1225085).
- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
- CVE-2023-52807: Fixed out-of-bounds access may occur when coalesce info is read via debugfs (bsc#1225097).
- CVE-2023-52860: Fixed null pointer dereference in hisi_hns3 (bsc#1224936).
- CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
- CVE-2024-26643: Fixed mark set as dead when unbinding anonymous set with timeout (bsc#1221829).
- CVE-2024-26679: Fixed read sk->sk_family once in inet_recv_error() (bsc#1222385).
- CVE-2024-26692: Fixed regression in writes when non-standard maximum write size negotiated (bsc#1222464).
- CVE-2024-26715: Fixed NULL pointer dereference in dwc3_gadget_suspend (bsc#1222561).
- CVE-2024-26742: Fixed disable_managed_interrupts (git-fixes bsc#1222608).
- CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).
- CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)
- CVE-2024-26822: Set correct id, uid and cruid for multiuser automounts (bsc#1223011).
- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
- CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119).
- CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046).
- CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)
- CVE-2024-26919: Fixed debugfs directory leak (bsc#1223847).
- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
- CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390).
- CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show() (bsc#1223532).
- CVE-2024-26939: Fixed UAF on destroy against retire race (bsc#1223679).
- CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).
- CVE-2024-27042: Fixed potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()' (bsc#1223823).
- CVE-2024-27395: Fixed Use-After-Free in ovs_ct_exit (bsc#1224098).
- CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
- CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181).
- CVE-2024-27417: Fixed potential 'struct net' leak in inet6_rtm_getaddr() (bsc#1224721)
- CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759)
- CVE-2024-27431: Fixed Zero-initialise xdp_rxq_info struct before running XDP program (bsc#1224718).
- CVE-2024-35791: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (bsc#1224725).
- CVE-2024-35799: Prevent crash when disable stream (bsc#1224740).
- CVE-2024-35804: Mark target gfn of emulated atomic instruction as dirty (bsc#1224638).
- CVE-2024-35852: Fixed memory leak when canceling rehash work (bsc#1224502).
- CVE-2024-35854: Fixed possible use-after-free during rehash (bsc#1224636).
- CVE-2024-35860: struct bpf_link and bpf_link_ops kABI workaround (bsc#1224531).
- CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766).
- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764).
- CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763).
- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765).
- CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break() (bsc#1224668).
- CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key() (bsc#1224667).
- CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664).
- CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write() (bsc#1224678).
- CVE-2024-35869: Guarantee refcounted children from parent session (bsc#1224679).
- CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224672).
- CVE-2024-35872: Fixed GUP-fast succeeding on secretmem folios (bsc#1224530).
- CVE-2024-35875: Require seeding RNG with RDRAND on CoCo systems (bsc#1224665).
- CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
- CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671).
- CVE-2024-35879: kABI workaround for drivers/of/dynamic.c (bsc#1224524).
- CVE-2024-35885: Stop interface during shutdown (bsc#1224519).
- CVE-2024-35904: Fixed dereference of garbage after mount failure (bsc#1224494).
- CVE-2024-35905: Fixed int overflow for stack access size (bsc#1224488).
- CVE-2024-35907: Call request_irq() after NAPI initialized (bsc#1224492).
- CVE-2024-35924: Limit read size on v1.2 (bsc#1224657).
- CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure (bsc#1224535).
- CVE-2024-35943: Fixed a null pointer dereference in omap_prm_domain_init (bsc#1224649).
- CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648).
- CVE-2024-35951: Fixed the error path in panfrost_mmu_map_fault_addr() (bsc#1224701).
- CVE-2024-35959: Fixed mlx5e_priv_init() cleanup flow (bsc#1224666).
- CVE-2024-35964: Fixed not validating setsockopt user input (bsc#1224581).
- CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580).
- CVE-2024-35973: Fixed header validation in geneve[6]_xmit_skb (bsc#1224586).
- CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING (bsc#1224575).
- CVE-2024-35998: Fixed lock ordering potential deadlock in cifs_sync_mid_result (bsc#1224549).
- CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550).
- CVE-2024-36006: Fixed incorrect list API usage (bsc#1224541).
- CVE-2024-36007: Fixed warning during rehash (bsc#1224543).
- CVE-2024-36938: Fixed NULL pointer dereference in sk_psock_skb_ingress_enqueue (bsc#1225761).
The following non-security bugs were fixed:
- 9p: explicitly deny setlease attempts (git-fixes).
- ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes).
- ACPI: disable -Wstringop-truncation (git-fixes).
- ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes).
- ACPI: LPSS: Advertise number of chip selects via property (git-fixes).
- admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET (git-fixes).
- af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384).
- af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- ALSA: core: Fix NULL module pointer assignment at card init (git-fixes).
- ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes).
- ALSA: line6: Zero-initialize message buffers (stable-fixes).
- ARM: 9381/1: kasan: clear stale stack poison (git-fixes).
- ASoC: Intel: avs: Fix ASRC module initialization (git-fixes).
- ASoC: Intel: avs: Fix potential integer overflow (git-fixes).
- ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes).
- ASoC: Intel: Disable route checks for Skylake boards (git-fixes).
- ASoC: kirkwood: Fix potential NULL dereference (git-fixes).
- ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes).
- ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes).
- ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes).
- ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes).
- ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).
- ata: pata_legacy: make legacy_exit() work again (git-fixes).
- ata: sata_gemini: Check clk_enable() result (stable-fixes).
- autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166).
- Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes).
- Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor() (git-fixes).
- Bluetooth: hci_sync: Do not double print name in add/remove adv_monitor (bsc#1216358).
- Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes).
- Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes).
- Bluetooth: qca: add missing firmware sanity checks (git-fixes).
- Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes).
- Bluetooth: qca: fix firmware check error path (git-fixes).
- Bluetooth: qca: fix info leak when fetching fw build id (git-fixes).
- Bluetooth: qca: fix NVM configuration parsing (git-fixes).
- bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git-fixes)
- bpf: decouple prune and jump points (bsc#1225756).
- bpf: fix precision backtracking instruction iteration (bsc#1225756).
- bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes).
- bpf: handle ldimm64 properly in check_cfg() (bsc#1225756).
- bpf: mostly decouple jump history management from is_state_visited() (bsc#1225756).
- bpf: remove unnecessary prune and jump points (bsc#1225756).
- btrfs: add error messages to all unrecognized mount options (git-fixes)
- btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes)
- btrfs: export: handle invalid inode or root reference in btrfs_get_parent() (git-fixes)
- btrfs: extend locking to all space_info members accesses (git-fixes)
- btrfs: fix btrfs_submit_compressed_write cgroup attribution (git-fixes)
- btrfs: fix fallocate to use file_modified to update permissions consistently (git-fixes)
- btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes)
- btrfs: fix missing blkdev_put() call in btrfs_scan_one_device() (git-fixes)
- btrfs: fix off-by-one chunk length calculation at contains_pending_extent() (git-fixes)
- btrfs: fix qgroup reserve overflow the qgroup limit (git-fixes)
- btrfs: fix silent failure when deleting root reference (git-fixes)
- btrfs: fix use-after-free after failure to create a snapshot (git-fixes)
- btrfs: free exchange changeset on failures (git-fixes)
- btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git-fixes)
- btrfs: make search_csum_tree return 0 if we get -EFBIG (git-fixes)
- btrfs: prevent copying too big compressed lzo segment (git-fixes)
- btrfs: remove BUG_ON(!eie) in find_parent_nodes (git-fixes)
- btrfs: remove BUG_ON() in find_parent_nodes() (git-fixes)
- btrfs: repair super block num_devices automatically (git-fixes)
- btrfs: replace the BUG_ON in btrfs_del_root_ref with proper error handling (git-fixes)
- btrfs: send: ensure send_fd is writable (git-fixes)
- btrfs: send: handle path ref underflow in header iterate_inode_ref() (git-fixes)
- btrfs: send: in case of IO error log it (git-fixes)
- btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes)
- btrfs: tree-checker: check item_size for dev_item (git-fixes)
- btrfs: tree-checker: check item_size for inode_item (git-fixes)
- cifs: account for primary channel in the interface list (bsc#1224020).
- cifs: cifs_chan_is_iface_active should be called with chan_lock held (bsc#1224020).
- cifs: distribute channels across interfaces based on speed (bsc#1224020).
- cifs: do not pass cifs_sb when trying to add channels (bsc#1224020).
- cifs: failure to add channel on iface should bump up weight (git-fixes, bsc#1224020).
- cifs: fix charset issue in reconnection (bsc#1224020).
- cifs: fix leak of iface for primary channel (git-fixes, bsc#1224020).
- cifs: handle cases where a channel is closed (bsc#1224020).
- cifs: handle cases where multiple sessions share connection (bsc#1224020).
- cifs: reconnect work should have reference on server struct (bsc#1224020).
- clk: Do not hold prepare_lock when calling kref_put() (stable-fixes).
- clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes).
- counter: stm32-lptimer-cnt: Provide defines for clock polarities (git-fixes).
- counter: stm32-timer-cnt: Provide defines for slave mode selection (git-fixes).
- cppc_cpufreq: Fix possible null pointer dereference (git-fixes).
- cpu/hotplug: Remove the 'cpu' member of cpuhp_cpu_state (git-fixes).
- cpumask: Add for_each_cpu_from() (bsc#1225053).
- crypto: bcm - Fix pointer arithmetic (git-fixes).
- crypto: ccp - drop platform ifdef checks (git-fixes).
- crypto: ecdsa - Fix module auto-load on add-key (git-fixes).
- crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes).
- crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes).
- crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes).
- dmaengine: axi-dmac: fix possible race in remove() (git-fixes).
- dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes).
- dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11 users (git-fixes).
- dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575).
- docs: kernel_include.py: Cope with docutils 0.21 (stable-fixes).
- drivers/nvme: Add quirks for device 126f:2262 (git-fixes).
- drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes).
- drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes).
- drm/amd/display: Fix potential index out of bounds in color transformation function (git-fixes).
- drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes).
- drm/amd: Flush GFXOFF requests in prepare stage (git-fixes).
- drm/amdgpu: Refine IB schedule error logging (stable-fixes).
- drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git-fixes).
- drm/arm/malidp: fix a possible null pointer dereference (git-fixes).
- drm/bridge: anx7625: Do not log an error when DSI host can't be found (git-fixes).
- drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git-fixes).
- drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: icn6211: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: lt9611: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: tc358775: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes).
- drm/connector: Add \n to message about demoting connector force-probes (git-fixes).
- drm/i915/bios: Fix parsing backlight BDB data (git-fixes).
- drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes).
- drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes).
- drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes).
- drm/meson: dw-hdmi: power up phy on device init (git-fixes).
- drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes).
- drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes).
- drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes).
- drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk (git-fixes).
- drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes).
- drm/panel: atna33xc20: Fix unbalanced regulator in the case HPD does not assert (git-fixes).
- drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found (git-fixes).
- drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector (git-fixes).
- drm: vc4: Fix possible null pointer dereference (git-fixes).
- dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes)
- dyndbg: fix old BUG_ON in >control parser (stable-fixes).
- efi: libstub: only free priv.runtime_map when allocated (git-fixes).
- extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes).
- fail_function: fix wrong use of fei_attr_remove().
- fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes).
- fbdev: shmobile: fix snprintf truncation (git-fixes).
- fbdev: sisfb: hide unused variables (git-fixes).
- firewire: ohci: mask bus reset interrupts between ISR and bottom half (stable-fixes).
- firmware: dmi-id: add a release callback function (git-fixes).
- firmware: raspberrypi: Use correct device for DMA mappings (git-fixes).
- fs/9p: drop inodes immediately on non-.L too (git-fixes).
- fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes).
- fs/9p: translate O_TRUNC into OTRUNC (git-fixes).
- gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes).
- gpio: wcove: Use -ENOTSUPP consistently (stable-fixes).
- gpu: host1x: Do not setup DMA for virtual devices (stable-fixes).
- HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes).
- hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock (git-fixes).
- hwmon: (corsair-cpro) Use a separate buffer for sending commands (git-fixes).
- hwmon: (corsair-cpro) Use complete_all() instead of complete() in ccp_raw_event() (git-fixes).
- hwmon: (lm70) fix links in doc and comments (git-fixes).
- hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes).
- i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame (git-fixes).
- i3c: master: svc: fix invalidate IBI type and miss call client IBI handler (git-fixes).
- IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes)
- idpf: extend tx watchdog timeout (bsc#1224137).
- iio: core: Leave private pointer NULL when no private data supplied (git-fixes).
- iio: pressure: dps310: support negative temperature values (git-fixes).
- Input: cyapa - add missing input core locking to suspend/resume functions (git-fixes).
- Input: ims-pcu - fix printf string overflow (git-fixes).
- Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes).
- iomap: Fix inline extent handling in iomap_readpage (git-fixes)
- iomap: iomap: fix memory corruption when recording errors during writeback (git-fixes)
- iomap: Support partial direct I/O on user copy failures (git-fixes)
- iommu/dma: Force swiotlb_max_mapping_size on an untrusted device (bsc#1224331)
- io_uring/unix: drop usage of io_uring socket (git-fixes).
- irqchip/gic-v3-its: Prevent double free on error (git-fixes).
- jffs2: prevent xattr node from overflowing the eraseblock (git-fixes).
- kABI: bpf: struct bpf_insn_aux_data kABI workaround (bsc#1225756).
- kcm: do not sense pfmemalloc status in kcm_sendpage() (git-fixes bsc#1223959)
- KEYS: trusted: Do not use WARN when encode fails (git-fixes).
- KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes).
- KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1224794).
- KVM: x86: Delete duplicate documentation for KVM_X86_SET_MSR_FILTER (git-fixes).
- leds: pwm: Disable PWM when going to suspend (git-fixes).
- libsubcmd: Fix parse-options memory leak (git-fixes).
- locking/atomic: Make test_and_*_bit() ordered on failure (git-fixes).
- media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries (git-fixes).
- media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes).
- media: mc: mark the media devnode as registered from the, start (git-fixes).
- media: ngene: Add dvb_ca_en50221_init return value check (git-fixes).
- media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes).
- mei: me: add lunar lake point M DID (stable-fixes).
- mfd: intel-lpss: Revert 'Add missing check for platform_get_resource' (git-fixes).
- mfd: ti_am335x_tscadc: Support the correctly spelled DT property (git-fixes).
- mfd: tqmx86: Specify IO port register range more precisely (git-fixes).
- mlxbf_gige: Enable the GigE port in mlxbf_gige_open (git-fixes).
- mlxbf_gige: Fix intermittent no ip issue (git-fixes).
- mlxbf_gige: stop PHY during open() error paths (git-fixes).
- mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes).
- mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes).
- mtd: core: Report error if first mtd_otp_size() call fails in mtd_otp_nvmem_add() (git-fixes).
- mtd: rawnand: hynix: fixed typo (git-fixes).
- net: do not sense pfmemalloc status in skb_append_pagefrags() (git-fixes bsc#1223959)
- netfilter: nf_tables: bail out early if hardware offload is not supported (git-fixes bsc#1223961)
- net: introduce __skb_fill_page_desc_noacc (git-fixes bsc#1223959)
- net: nfc: remove inappropriate attrs check (stable-fixes).
- net: qualcomm: rmnet: fix global oob in rmnet_policy (git-fixes).
- net: usb: ax88179_178a: fix link status when link is set to down/up (git-fixes).
- net:usb:qmi_wwan: support Rolling modules (stable-fixes).
- net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).
- net: usb: sr9700: stop lying about skb->truesize (git-fixes).
- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).
- nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git-fixes).
- nfc: nci: Fix uninit-value in nci_rx_work (git-fixes).
- nilfs2: fix out-of-range warning (git-fixes).
- nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes).
- nilfs2: fix use-after-free of timer for log writer thread (git-fixes).
- nilfs2: make superblock data array index computation sparse friendly (git-fixes).
- nvme: ensure disabling pairs with unquiesce (bsc#1224534).
- nvme: fix miss command type check (git-fixes).
- nvme: fix multipath batched completion accounting (git-fixes).
- nvme-multipath: fix io accounting on failover (git-fixes).
- nvmet: fix ns enable/disable possible hang (git-fixes).
- PCI: dwc: Detect iATU settings after getting 'addr_space' resource (git-fixes).
- PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host (git-fixes).
- PCI: dwc: Use the bitmap API to allocate bitmaps (git-fixes).
- PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes).
- PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes).
- PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes).
- PCI: tegra194: Fix probe path for Endpoint mode (git-fixes).
- pinctrl: armada-37xx: remove an unused variable (git-fixes).
- pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes).
- pinctrl: core: handle radix_tree_insert() errors in pinctrl_register_one_pin() (stable-fixes).
- pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes).
- pinctrl/meson: fix typo in PDM's pin name (git-fixes).
- pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git-fixes).
- platform/x86/intel-uncore-freq: Do not present root domain on error (git-fixes).
- platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git-fixes).
- powerpc/eeh: Permanently disable the removed device (bsc#1223991 ltc#205740).
- powerpc/eeh: Small refactor of eeh_handle_normal_event() (bsc#1223991 ltc#205740).
- powerpc/eeh: Use a goto for recovery failures (bsc#1223991 ltc#205740).
- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).
- powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).
- powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783).
- powerpc/uaccess: Fix build errors seen with GCC 13/14 (bsc#1194869).
- powerpc/uaccess: Use YZ asm constraint for ld (bsc#1194869).
- power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes).
- ppdev: Add an error check in register_device (git-fixes).
- printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1225616).
- qibfs: fix dentry leak (git-fixes)
- RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git-fixes)
- RDMA/hns: Fix deadlock on SRQ async events. (git-fixes)
- RDMA/hns: Fix GMV table pagesize (git-fixes)
- RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes)
- RDMA/hns: Fix UAF for cq async event (git-fixes)
- RDMA/hns: Modify the print level of CQE error (git-fixes)
- RDMA/hns: Use complete parentheses in macros (git-fixes)
- RDMA/IPoIB: Fix format truncation compilation errors (git-fixes)
- RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes)
- RDMA/mlx5: Fix port number for counter query in multi-port configuration (git-fixes)
- RDMA/rxe: Add ibdev_dbg macros for rxe (git-fixes)
- RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes)
- RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes)
- RDMA/rxe: Fix the problem 'mutex_destroy missing' (git-fixes)
- RDMA/rxe: Replace pr_xxx by rxe_dbg_xxx in rxe_net.c (git-fixes)
- RDMA/rxe: Split rxe_run_task() into two subroutines (git-fixes)
- regulator: bd71828: Do not overwrite runtime voltages (git-fixes).
- regulator: core: fix debugfs creation regression (git-fixes).
- regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes).
- remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes).
- Rename colliding patches before origin/cve/linux-5.14-LTSS -> SLE15-SP5 merge
- Revert 'cifs: reconnect work should have reference on server struct' (git-fixes, bsc#1224020).
- Revert 'drm/bridge: ti-sn65dsi83: Fix enable error path' (git-fixes).
- ring-buffer: Fix a race between readers and resize checks (git-fixes).
- s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224795).
- s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224796).
- s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224346).
- s390/ipl: Fix incorrect initialization of len fields in nvme reipl block (git-fixes bsc#1225139).
- s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes bsc#1225138).
- sched/topology: Optimize topology_span_sane() (bsc#1225053).
- scsi: arcmsr: Support new PCI device IDs 1883 and 1886 (git-fixes).
- scsi: bfa: Fix function pointer type mismatch for hcb_qe->cbfn (git-fixes).
- scsi: core: Consult supported VPD page list prior to fetching page (git-fixes).
- scsi: core: Fix unremoved procfs host directory regression (git-fixes).
- scsi: csiostor: Avoid function pointer casts (git-fixes).
- scsi: libfc: Do not schedule abort twice (git-fixes).
- scsi: libfc: Fix up timeout error in fc_fcp_rec_error() (git-fixes).
- scsi: lpfc: Add support for 32 byte CDBs (bsc#1225842).
- scsi: lpfc: Change default logging level for unsolicited CT MIB commands (bsc#1225842).
- scsi: lpfc: Change lpfc_hba hba_flag member into a bitmask (bsc#1225842).
- scsi: lpfc: Clear deferred RSCN processing flag when driver is unloading (bsc#1225842).
- scsi: lpfc: Copyright updates for 14.4.0.2 patches (bsc#1225842).
- scsi: lpfc: Introduce rrq_list_lock to protect active_rrq_list (bsc#1225842).
- scsi: lpfc: Update logging of protection type for T10 DIF I/O (bsc#1225842).
- scsi: lpfc: Update lpfc version to 14.4.0.2 (bsc#1225842).
- scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git-fixes).
- scsi: mylex: Fix sysfs buffer lengths (git-fixes).
- scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes).
- scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git-fixes).
- selftests/pidfd: Fix config for pidfd_setns_test (git-fixes).
- serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes).
- serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable-fixes).
- serial: max3100: Fix bitwise types (git-fixes).
- serial: max3100: Lock port->lock when calling uart_handle_cts_change() (git-fixes).
- serial: max3100: Update uart_driver_registered on driver removal (git-fixes).
- serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git-fixes).
- serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler (git-fixes).
- serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes).
- smb3: show beginning time for per share stats (bsc#1224020).
- smb: client: ensure to try all targets when finding nested links (bsc#1224020).
- smb: client: fix mount when dns_resolver key is not available (git-fixes, bsc#1224020).
- smb: client: get rid of dfs code dep in namespace.c (bsc#1224020).
- smb: client: get rid of dfs naming in automount code (bsc#1224020).
- smb: client: introduce DFS_CACHE_TGT_LIST() (bsc#1224020).
- smb: client: reduce stack usage in cifs_try_adding_channels() (bsc#1224020).
- smb: client: remove extra @chan_count check in __cifs_put_smb_ses() (bsc#1224020).
- smb: client: rename cifs_dfs_ref.c to namespace.c (bsc#1224020).
- soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes).
- soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes).
- Sort recent BHI patches
- speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes).
- spmi: Add a check for remove callback when removing a SPMI driver (git-fixes).
- spmi: hisi-spmi-controller: Do not override device identifier (git-fixes).
- swiotlb: extend buffer pre-padding to alloc_align_mask if necessary (bsc#1224331).
- swiotlb: Fix alignment checks when both allocation and DMA masks are (bsc#1224331)
- swiotlb: Fix double-allocation of slots due to broken alignment (bsc#1224331)
- swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc() (bsc#1224331)
- sysv: do not call sb_bread() with pointers_lock held (git-fixes).
- thermal/drivers/tsens: Fix null pointer dereference (git-fixes).
- tools/latency-collector: Fix -Wformat-security compile warns (git-fixes).
- tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer (bsc#1225535)
- tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (git-fixes).
- tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes).
- tracing: hide unused ftrace_event_id_fops (git-fixes).
- tty: n_gsm: fix missing receive state reset after mode switch (git-fixes).
- tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes).
- Update patches.suse/ring-buffer-Fix-a-race-between-readers-and-resize-checks.patch (bsc#1222893).
- Update patches.suse/scsi-qedf-Don-t-process-stag-work-during-unload.patch (bsc#1214852)
- Update patches.suse/scsi-qedf-Wait-for-stag-work-during-unload.patch (bsc#1214852)
- usb: aqc111: stop lying about skb->truesize (git-fixes).
- USB: core: Add hub_get() and hub_put() routines (git-fixes).
- USB: core: Fix access violation during port device removal (git-fixes).
- USB: core: Fix deadlock in port 'disable' sysfs attribute (git-fixes).
- usb: dwc3: core: Prevent phy suspend during init (Git-fixes).
- usb: gadget: u_audio: Clear uac pointer when freed (git-fixes).
- usb: typec: tipd: fix event checking for tps6598x (git-fixes).
- usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes).
- VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes).
- VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler() (stable-fixes).
- vmci: prevent speculation leaks by sanitizing event in event_deliver() (git-fixes).
- watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git-fixes).
- watchdog: ixp4xx: Make sure restart always works (git-fixes).
- watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin (git-fixes).
- wifi: ar5523: enable proper endpoint verification (git-fixes).
- wifi: ath10k: Fix an error code problem in ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes).
- wifi: ath10k: poll service ready message before failing (git-fixes).
- wifi: ath10k: populate board data for WCN3990 (git-fixes).
- wifi: ath11k: do not force enable power save on non-running vdevs (git-fixes).
- wifi: carl9170: add a proper sanity check for endpoints (git-fixes).
- wifi: carl9170: re-fix fortified-memset warning (git-fixes).
- wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes).
- wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes).
- wifi: mwl8k: initialize cmd->addr[] properly (git-fixes).
- x86/boot: Ignore NMIs during very early boot (git-fixes).
- x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes).
- x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file (git-fixes).
- x86/bugs: Fix BHI documentation (git-fixes).
- x86/bugs: Fix BHI handling of RRSBA (git-fixes).
- x86/bugs: Fix BHI retpoline check (git-fixes).
- x86/bugs: Fix return type of spectre_bhi_state() (git-fixes).
- x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-fixes).
- x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr' (git-fixes).
- x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI (git-fixes).
- x86: Fix CPUIDLE_FLAG_IRQ_ENABLE leaking timer reprogram (git-fixes).
- x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes).
- x86/lib: Fix overflow when counting digits (git-fixes).
- x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes).
- x86/nmi: Drop unused declaration of proc_nmi_enabled() (git-fixes).
- x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for !SRSO (git-fixes).
- x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git-fixes).
- x86/sme: Fix memory encryption setting if enabled by default and not overridden (git-fixes).
- x86/tdx: Preserve shared bit on mprotect() (git-fixes).
- xfs: add missing cmap->br_state = XFS_EXT_NORM update (git-fixes).
- xfs: fix exception caused by unexpected illegal bestcount in leaf dir (git-fixes).
- xfs: Fix false ENOSPC when performing direct write on a delalloc extent in cow fork (git-fixes).
- xfs: fix imprecise logic in xchk_btree_check_block_owner (git-fixes).
- xfs: fix inode reservation space for removing transaction (git-fixes).
- xfs: shrink failure needs to hold AGI buffer (git-fixes).
Tenable has extracted the preceding description block directly from the SUSE security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The package checks in this plugin were extracted from
# SUSE update advisory SUSE-SU-2024:2008-1. The text itself
# is copyright (C) SUSE.
##
include('compat.inc');
if (description)
{
script_id(200462);
script_version("1.2");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/06/14");
script_cve_id(
"CVE-2020-36788",
"CVE-2021-4148",
"CVE-2021-39698",
"CVE-2021-42327",
"CVE-2021-43056",
"CVE-2021-43527",
"CVE-2021-47200",
"CVE-2021-47358",
"CVE-2021-47359",
"CVE-2021-47360",
"CVE-2021-47361",
"CVE-2021-47362",
"CVE-2021-47363",
"CVE-2021-47364",
"CVE-2021-47365",
"CVE-2021-47366",
"CVE-2021-47367",
"CVE-2021-47368",
"CVE-2021-47369",
"CVE-2021-47370",
"CVE-2021-47371",
"CVE-2021-47372",
"CVE-2021-47373",
"CVE-2021-47374",
"CVE-2021-47375",
"CVE-2021-47376",
"CVE-2021-47378",
"CVE-2021-47379",
"CVE-2021-47380",
"CVE-2021-47381",
"CVE-2021-47382",
"CVE-2021-47383",
"CVE-2021-47384",
"CVE-2021-47385",
"CVE-2021-47386",
"CVE-2021-47387",
"CVE-2021-47388",
"CVE-2021-47389",
"CVE-2021-47390",
"CVE-2021-47391",
"CVE-2021-47392",
"CVE-2021-47393",
"CVE-2021-47394",
"CVE-2021-47395",
"CVE-2021-47396",
"CVE-2021-47397",
"CVE-2021-47398",
"CVE-2021-47399",
"CVE-2021-47400",
"CVE-2021-47401",
"CVE-2021-47402",
"CVE-2021-47403",
"CVE-2021-47404",
"CVE-2021-47405",
"CVE-2021-47406",
"CVE-2021-47407",
"CVE-2021-47408",
"CVE-2021-47409",
"CVE-2021-47410",
"CVE-2021-47412",
"CVE-2021-47413",
"CVE-2021-47414",
"CVE-2021-47415",
"CVE-2021-47416",
"CVE-2021-47417",
"CVE-2021-47418",
"CVE-2021-47419",
"CVE-2021-47420",
"CVE-2021-47421",
"CVE-2021-47422",
"CVE-2021-47423",
"CVE-2021-47424",
"CVE-2021-47425",
"CVE-2021-47426",
"CVE-2021-47427",
"CVE-2021-47428",
"CVE-2021-47429",
"CVE-2021-47430",
"CVE-2021-47431",
"CVE-2021-47433",
"CVE-2021-47434",
"CVE-2021-47435",
"CVE-2021-47436",
"CVE-2021-47437",
"CVE-2021-47438",
"CVE-2021-47439",
"CVE-2021-47440",
"CVE-2021-47441",
"CVE-2021-47442",
"CVE-2021-47443",
"CVE-2021-47444",
"CVE-2021-47445",
"CVE-2021-47446",
"CVE-2021-47447",
"CVE-2021-47448",
"CVE-2021-47449",
"CVE-2021-47450",
"CVE-2021-47451",
"CVE-2021-47452",
"CVE-2021-47453",
"CVE-2021-47454",
"CVE-2021-47455",
"CVE-2021-47456",
"CVE-2021-47457",
"CVE-2021-47458",
"CVE-2021-47459",
"CVE-2021-47460",
"CVE-2021-47461",
"CVE-2021-47462",
"CVE-2021-47463",
"CVE-2021-47464",
"CVE-2021-47465",
"CVE-2021-47466",
"CVE-2021-47467",
"CVE-2021-47468",
"CVE-2021-47469",
"CVE-2021-47470",
"CVE-2021-47471",
"CVE-2021-47472",
"CVE-2021-47473",
"CVE-2021-47474",
"CVE-2021-47475",
"CVE-2021-47476",
"CVE-2021-47477",
"CVE-2021-47478",
"CVE-2021-47479",
"CVE-2021-47480",
"CVE-2021-47481",
"CVE-2021-47482",
"CVE-2021-47483",
"CVE-2021-47484",
"CVE-2021-47485",
"CVE-2021-47486",
"CVE-2021-47488",
"CVE-2021-47489",
"CVE-2021-47490",
"CVE-2021-47491",
"CVE-2021-47492",
"CVE-2021-47493",
"CVE-2021-47494",
"CVE-2021-47495",
"CVE-2021-47496",
"CVE-2021-47497",
"CVE-2021-47498",
"CVE-2021-47499",
"CVE-2021-47500",
"CVE-2021-47501",
"CVE-2021-47502",
"CVE-2021-47503",
"CVE-2021-47504",
"CVE-2021-47505",
"CVE-2021-47506",
"CVE-2021-47507",
"CVE-2021-47508",
"CVE-2021-47509",
"CVE-2021-47510",
"CVE-2021-47511",
"CVE-2021-47512",
"CVE-2021-47513",
"CVE-2021-47514",
"CVE-2021-47516",
"CVE-2021-47518",
"CVE-2021-47520",
"CVE-2021-47521",
"CVE-2021-47522",
"CVE-2021-47523",
"CVE-2021-47524",
"CVE-2021-47525",
"CVE-2021-47526",
"CVE-2021-47528",
"CVE-2021-47529",
"CVE-2021-47530",
"CVE-2021-47531",
"CVE-2021-47532",
"CVE-2021-47533",
"CVE-2021-47534",
"CVE-2021-47535",
"CVE-2021-47536",
"CVE-2021-47537",
"CVE-2021-47540",
"CVE-2021-47541",
"CVE-2021-47542",
"CVE-2021-47544",
"CVE-2021-47548",
"CVE-2021-47549",
"CVE-2021-47550",
"CVE-2021-47551",
"CVE-2021-47552",
"CVE-2021-47553",
"CVE-2021-47554",
"CVE-2021-47555",
"CVE-2021-47556",
"CVE-2021-47557",
"CVE-2021-47558",
"CVE-2021-47559",
"CVE-2021-47560",
"CVE-2021-47562",
"CVE-2021-47563",
"CVE-2021-47564",
"CVE-2021-47565",
"CVE-2021-47569",
"CVE-2022-48633",
"CVE-2022-48662",
"CVE-2022-48669",
"CVE-2022-48689",
"CVE-2022-48691",
"CVE-2022-48699",
"CVE-2022-48705",
"CVE-2022-48708",
"CVE-2022-48709",
"CVE-2022-48710",
"CVE-2023-0160",
"CVE-2023-1829",
"CVE-2023-6531",
"CVE-2023-42755",
"CVE-2023-47233",
"CVE-2023-52586",
"CVE-2023-52591",
"CVE-2023-52618",
"CVE-2023-52642",
"CVE-2023-52643",
"CVE-2023-52644",
"CVE-2023-52646",
"CVE-2023-52650",
"CVE-2023-52653",
"CVE-2023-52654",
"CVE-2023-52655",
"CVE-2023-52656",
"CVE-2023-52657",
"CVE-2023-52659",
"CVE-2023-52660",
"CVE-2023-52661",
"CVE-2023-52662",
"CVE-2023-52664",
"CVE-2023-52669",
"CVE-2023-52671",
"CVE-2023-52674",
"CVE-2023-52676",
"CVE-2023-52678",
"CVE-2023-52679",
"CVE-2023-52680",
"CVE-2023-52683",
"CVE-2023-52685",
"CVE-2023-52686",
"CVE-2023-52690",
"CVE-2023-52691",
"CVE-2023-52692",
"CVE-2023-52693",
"CVE-2023-52694",
"CVE-2023-52696",
"CVE-2023-52698",
"CVE-2023-52699",
"CVE-2023-52702",
"CVE-2023-52703",
"CVE-2023-52705",
"CVE-2023-52707",
"CVE-2023-52708",
"CVE-2023-52730",
"CVE-2023-52731",
"CVE-2023-52732",
"CVE-2023-52733",
"CVE-2023-52736",
"CVE-2023-52738",
"CVE-2023-52739",
"CVE-2023-52740",
"CVE-2023-52741",
"CVE-2023-52742",
"CVE-2023-52743",
"CVE-2023-52744",
"CVE-2023-52745",
"CVE-2023-52746",
"CVE-2023-52747",
"CVE-2023-52753",
"CVE-2023-52754",
"CVE-2023-52756",
"CVE-2023-52757",
"CVE-2023-52759",
"CVE-2023-52763",
"CVE-2023-52764",
"CVE-2023-52766",
"CVE-2023-52773",
"CVE-2023-52774",
"CVE-2023-52777",
"CVE-2023-52781",
"CVE-2023-52788",
"CVE-2023-52789",
"CVE-2023-52791",
"CVE-2023-52795",
"CVE-2023-52796",
"CVE-2023-52798",
"CVE-2023-52799",
"CVE-2023-52800",
"CVE-2023-52803",
"CVE-2023-52804",
"CVE-2023-52805",
"CVE-2023-52806",
"CVE-2023-52807",
"CVE-2023-52808",
"CVE-2023-52809",
"CVE-2023-52810",
"CVE-2023-52811",
"CVE-2023-52814",
"CVE-2023-52815",
"CVE-2023-52816",
"CVE-2023-52817",
"CVE-2023-52818",
"CVE-2023-52819",
"CVE-2023-52821",
"CVE-2023-52825",
"CVE-2023-52826",
"CVE-2023-52832",
"CVE-2023-52833",
"CVE-2023-52834",
"CVE-2023-52838",
"CVE-2023-52840",
"CVE-2023-52841",
"CVE-2023-52844",
"CVE-2023-52847",
"CVE-2023-52851",
"CVE-2023-52853",
"CVE-2023-52854",
"CVE-2023-52855",
"CVE-2023-52856",
"CVE-2023-52858",
"CVE-2023-52860",
"CVE-2023-52861",
"CVE-2023-52864",
"CVE-2023-52865",
"CVE-2023-52867",
"CVE-2023-52868",
"CVE-2023-52870",
"CVE-2023-52871",
"CVE-2023-52872",
"CVE-2023-52873",
"CVE-2023-52875",
"CVE-2023-52876",
"CVE-2023-52877",
"CVE-2023-52878",
"CVE-2023-52880",
"CVE-2024-2201",
"CVE-2024-26597",
"CVE-2024-26643",
"CVE-2024-26679",
"CVE-2024-26692",
"CVE-2024-26698",
"CVE-2024-26700",
"CVE-2024-26715",
"CVE-2024-26739",
"CVE-2024-26742",
"CVE-2024-26748",
"CVE-2024-26758",
"CVE-2024-26764",
"CVE-2024-26775",
"CVE-2024-26777",
"CVE-2024-26778",
"CVE-2024-26788",
"CVE-2024-26791",
"CVE-2024-26801",
"CVE-2024-26822",
"CVE-2024-26828",
"CVE-2024-26829",
"CVE-2024-26838",
"CVE-2024-26839",
"CVE-2024-26840",
"CVE-2024-26846",
"CVE-2024-26859",
"CVE-2024-26870",
"CVE-2024-26874",
"CVE-2024-26876",
"CVE-2024-26877",
"CVE-2024-26880",
"CVE-2024-26889",
"CVE-2024-26894",
"CVE-2024-26900",
"CVE-2024-26907",
"CVE-2024-26915",
"CVE-2024-26916",
"CVE-2024-26919",
"CVE-2024-26920",
"CVE-2024-26921",
"CVE-2024-26922",
"CVE-2024-26925",
"CVE-2024-26928",
"CVE-2024-26929",
"CVE-2024-26930",
"CVE-2024-26931",
"CVE-2024-26933",
"CVE-2024-26934",
"CVE-2024-26935",
"CVE-2024-26937",
"CVE-2024-26938",
"CVE-2024-26939",
"CVE-2024-26940",
"CVE-2024-26943",
"CVE-2024-26957",
"CVE-2024-26958",
"CVE-2024-26964",
"CVE-2024-26974",
"CVE-2024-26977",
"CVE-2024-26979",
"CVE-2024-26984",
"CVE-2024-26988",
"CVE-2024-26989",
"CVE-2024-26994",
"CVE-2024-26996",
"CVE-2024-26997",
"CVE-2024-26999",
"CVE-2024-27000",
"CVE-2024-27001",
"CVE-2024-27004",
"CVE-2024-27008",
"CVE-2024-27028",
"CVE-2024-27037",
"CVE-2024-27042",
"CVE-2024-27045",
"CVE-2024-27047",
"CVE-2024-27051",
"CVE-2024-27052",
"CVE-2024-27053",
"CVE-2024-27054",
"CVE-2024-27059",
"CVE-2024-27072",
"CVE-2024-27073",
"CVE-2024-27074",
"CVE-2024-27075",
"CVE-2024-27076",
"CVE-2024-27077",
"CVE-2024-27078",
"CVE-2024-27388",
"CVE-2024-27393",
"CVE-2024-27395",
"CVE-2024-27396",
"CVE-2024-27398",
"CVE-2024-27399",
"CVE-2024-27400",
"CVE-2024-27401",
"CVE-2024-27405",
"CVE-2024-27410",
"CVE-2024-27412",
"CVE-2024-27413",
"CVE-2024-27416",
"CVE-2024-27417",
"CVE-2024-27419",
"CVE-2024-27431",
"CVE-2024-27435",
"CVE-2024-27436",
"CVE-2024-35789",
"CVE-2024-35791",
"CVE-2024-35796",
"CVE-2024-35799",
"CVE-2024-35801",
"CVE-2024-35804",
"CVE-2024-35806",
"CVE-2024-35809",
"CVE-2024-35811",
"CVE-2024-35812",
"CVE-2024-35813",
"CVE-2024-35815",
"CVE-2024-35817",
"CVE-2024-35821",
"CVE-2024-35822",
"CVE-2024-35823",
"CVE-2024-35825",
"CVE-2024-35828",
"CVE-2024-35829",
"CVE-2024-35830",
"CVE-2024-35833",
"CVE-2024-35845",
"CVE-2024-35847",
"CVE-2024-35849",
"CVE-2024-35851",
"CVE-2024-35852",
"CVE-2024-35854",
"CVE-2024-35860",
"CVE-2024-35861",
"CVE-2024-35862",
"CVE-2024-35863",
"CVE-2024-35864",
"CVE-2024-35865",
"CVE-2024-35866",
"CVE-2024-35867",
"CVE-2024-35868",
"CVE-2024-35869",
"CVE-2024-35870",
"CVE-2024-35872",
"CVE-2024-35875",
"CVE-2024-35877",
"CVE-2024-35878",
"CVE-2024-35879",
"CVE-2024-35885",
"CVE-2024-35887",
"CVE-2024-35895",
"CVE-2024-35901",
"CVE-2024-35904",
"CVE-2024-35905",
"CVE-2024-35907",
"CVE-2024-35912",
"CVE-2024-35914",
"CVE-2024-35915",
"CVE-2024-35922",
"CVE-2024-35924",
"CVE-2024-35930",
"CVE-2024-35932",
"CVE-2024-35933",
"CVE-2024-35935",
"CVE-2024-35936",
"CVE-2024-35938",
"CVE-2024-35939",
"CVE-2024-35940",
"CVE-2024-35943",
"CVE-2024-35944",
"CVE-2024-35947",
"CVE-2024-35950",
"CVE-2024-35951",
"CVE-2024-35952",
"CVE-2024-35955",
"CVE-2024-35959",
"CVE-2024-35963",
"CVE-2024-35964",
"CVE-2024-35965",
"CVE-2024-35966",
"CVE-2024-35967",
"CVE-2024-35969",
"CVE-2024-35973",
"CVE-2024-35976",
"CVE-2024-35978",
"CVE-2024-35982",
"CVE-2024-35984",
"CVE-2024-35989",
"CVE-2024-35990",
"CVE-2024-35998",
"CVE-2024-35999",
"CVE-2024-36006",
"CVE-2024-36007",
"CVE-2024-36012",
"CVE-2024-36014",
"CVE-2024-36015",
"CVE-2024-36016",
"CVE-2024-36026",
"CVE-2024-36029",
"CVE-2024-36032",
"CVE-2024-36880",
"CVE-2024-36893",
"CVE-2024-36896",
"CVE-2024-36897",
"CVE-2024-36906",
"CVE-2024-36918",
"CVE-2024-36924",
"CVE-2024-36926",
"CVE-2024-36928",
"CVE-2024-36931",
"CVE-2024-36938",
"CVE-2024-36940",
"CVE-2024-36941",
"CVE-2024-36942",
"CVE-2024-36944",
"CVE-2024-36947",
"CVE-2024-36950",
"CVE-2024-36952",
"CVE-2024-36955",
"CVE-2024-36959"
);
script_xref(name:"SuSE", value:"SUSE-SU-2024:2008-1");
script_name(english:"SUSE SLES15 / openSUSE 15 Security Update : kernel (SUSE-SU-2024:2008-1)");
script_set_attribute(attribute:"synopsis", value:
"The remote SUSE host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The remote SUSE Linux SLES15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as
referenced in the SUSE-SU-2024:2008-1 advisory.
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)
- CVE-2022-48689: Fixed data-race in lru_add_fn (bsc#1223959)
- CVE-2022-48691: Fixed memory leak in netfilter (bsc#1223961)
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
- CVE-2023-42755: Check user supplied offsets (bsc#1215702).
- CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081).
- CVE-2023-52618: Fixed string overflow in block/rnbd-srv (bsc#1221615).
- CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187).
- CVE-2023-52660: Fiedx IRQ handling due to shared interrupts (bsc#1224443).
- CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).
- CVE-2023-52671: Fixed hang/underflow when transitioning to ODM4:1 (bsc#1224729).
- CVE-2023-52674: Add clamp() in scarlett2_mixer_ctl_put() (bsc#1224727).
- CVE-2023-52680: Fixed missing error checks to *_ctl_get() (bsc#1224608).
- CVE-2023-52692: Fixed missing error check to scarlett2_usb_set_config() (bsc#1224628).
- CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (CVE-2023-52698 bsc#1224621)
- CVE-2023-52746: Prevent potential spectre v1 gadget in xfrm_xlate32_attr() (bsc#1225114)
- CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548).
- CVE-2023-52795: Fixed use after free in vhost_vdpa_probe() (bsc#1225085).
- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
- CVE-2023-52807: Fixed out-of-bounds access may occur when coalesce info is read via debugfs
(bsc#1225097).
- CVE-2023-52860: Fixed null pointer dereference in hisi_hns3 (bsc#1224936).
- CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
- CVE-2024-26643: Fixed mark set as dead when unbinding anonymous set with timeout (bsc#1221829).
- CVE-2024-26679: Fixed read sk->sk_family once in inet_recv_error() (bsc#1222385).
- CVE-2024-26692: Fixed regression in writes when non-standard maximum write size negotiated
(bsc#1222464).
- CVE-2024-26715: Fixed NULL pointer dereference in dwc3_gadget_suspend (bsc#1222561).
- CVE-2024-26742: Fixed disable_managed_interrupts (git-fixes bsc#1222608).
- CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).
- CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)
- CVE-2024-26822: Set correct id, uid and cruid for multiuser automounts (bsc#1223011).
- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
- CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119).
- CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046).
- CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)
- CVE-2024-26919: Fixed debugfs directory leak (bsc#1223847).
- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
- CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390).
- CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show() (bsc#1223532).
- CVE-2024-26939: Fixed UAF on destroy against retire race (bsc#1223679).
- CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).
- CVE-2024-27042: Fixed potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()'
(bsc#1223823).
- CVE-2024-27395: Fixed Use-After-Free in ovs_ct_exit (bsc#1224098).
- CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
- CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181).
- CVE-2024-27417: Fixed potential 'struct net' leak in inet6_rtm_getaddr() (bsc#1224721)
- CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759)
- CVE-2024-27431: Fixed Zero-initialise xdp_rxq_info struct before running XDP program (bsc#1224718).
- CVE-2024-35791: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (bsc#1224725).
- CVE-2024-35799: Prevent crash when disable stream (bsc#1224740).
- CVE-2024-35804: Mark target gfn of emulated atomic instruction as dirty (bsc#1224638).
- CVE-2024-35852: Fixed memory leak when canceling rehash work (bsc#1224502).
- CVE-2024-35854: Fixed possible use-after-free during rehash (bsc#1224636).
- CVE-2024-35860: struct bpf_link and bpf_link_ops kABI workaround (bsc#1224531).
- CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766).
- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764).
- CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763).
- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765).
- CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break() (bsc#1224668).
- CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key() (bsc#1224667).
- CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664).
- CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write() (bsc#1224678).
- CVE-2024-35869: Guarantee refcounted children from parent session (bsc#1224679).
- CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224672).
- CVE-2024-35872: Fixed GUP-fast succeeding on secretmem folios (bsc#1224530).
- CVE-2024-35875: Require seeding RNG with RDRAND on CoCo systems (bsc#1224665).
- CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
- CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671).
- CVE-2024-35879: kABI workaround for drivers/of/dynamic.c (bsc#1224524).
- CVE-2024-35885: Stop interface during shutdown (bsc#1224519).
- CVE-2024-35904: Fixed dereference of garbage after mount failure (bsc#1224494).
- CVE-2024-35905: Fixed int overflow for stack access size (bsc#1224488).
- CVE-2024-35907: Call request_irq() after NAPI initialized (bsc#1224492).
- CVE-2024-35924: Limit read size on v1.2 (bsc#1224657).
- CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure (bsc#1224535).
- CVE-2024-35943: Fixed a null pointer dereference in omap_prm_domain_init (bsc#1224649).
- CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648).
- CVE-2024-35951: Fixed the error path in panfrost_mmu_map_fault_addr() (bsc#1224701).
- CVE-2024-35959: Fixed mlx5e_priv_init() cleanup flow (bsc#1224666).
- CVE-2024-35964: Fixed not validating setsockopt user input (bsc#1224581).
- CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580).
- CVE-2024-35973: Fixed header validation in geneve[6]_xmit_skb (bsc#1224586).
- CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING (bsc#1224575).
- CVE-2024-35998: Fixed lock ordering potential deadlock in cifs_sync_mid_result (bsc#1224549).
- CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550).
- CVE-2024-36006: Fixed incorrect list API usage (bsc#1224541).
- CVE-2024-36007: Fixed warning during rehash (bsc#1224543).
- CVE-2024-36938: Fixed NULL pointer dereference in sk_psock_skb_ingress_enqueue (bsc#1225761).
The following non-security bugs were fixed:
- 9p: explicitly deny setlease attempts (git-fixes).
- ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes).
- ACPI: disable -Wstringop-truncation (git-fixes).
- ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes).
- ACPI: LPSS: Advertise number of chip selects via property (git-fixes).
- admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET (git-fixes).
- af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384).
- af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- ALSA: core: Fix NULL module pointer assignment at card init (git-fixes).
- ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes).
- ALSA: line6: Zero-initialize message buffers (stable-fixes).
- ARM: 9381/1: kasan: clear stale stack poison (git-fixes).
- ASoC: Intel: avs: Fix ASRC module initialization (git-fixes).
- ASoC: Intel: avs: Fix potential integer overflow (git-fixes).
- ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes).
- ASoC: Intel: Disable route checks for Skylake boards (git-fixes).
- ASoC: kirkwood: Fix potential NULL dereference (git-fixes).
- ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes).
- ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes).
- ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes).
- ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes).
- ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).
- ata: pata_legacy: make legacy_exit() work again (git-fixes).
- ata: sata_gemini: Check clk_enable() result (stable-fixes).
- autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166).
- Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes).
- Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor() (git-fixes).
- Bluetooth: hci_sync: Do not double print name in add/remove adv_monitor (bsc#1216358).
- Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes).
- Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes).
- Bluetooth: qca: add missing firmware sanity checks (git-fixes).
- Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes).
- Bluetooth: qca: fix firmware check error path (git-fixes).
- Bluetooth: qca: fix info leak when fetching fw build id (git-fixes).
- Bluetooth: qca: fix NVM configuration parsing (git-fixes).
- bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git-fixes)
- bpf: decouple prune and jump points (bsc#1225756).
- bpf: fix precision backtracking instruction iteration (bsc#1225756).
- bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes).
- bpf: handle ldimm64 properly in check_cfg() (bsc#1225756).
- bpf: mostly decouple jump history management from is_state_visited() (bsc#1225756).
- bpf: remove unnecessary prune and jump points (bsc#1225756).
- btrfs: add error messages to all unrecognized mount options (git-fixes)
- btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes)
- btrfs: export: handle invalid inode or root reference in btrfs_get_parent() (git-fixes)
- btrfs: extend locking to all space_info members accesses (git-fixes)
- btrfs: fix btrfs_submit_compressed_write cgroup attribution (git-fixes)
- btrfs: fix fallocate to use file_modified to update permissions consistently (git-fixes)
- btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes)
- btrfs: fix missing blkdev_put() call in btrfs_scan_one_device() (git-fixes)
- btrfs: fix off-by-one chunk length calculation at contains_pending_extent() (git-fixes)
- btrfs: fix qgroup reserve overflow the qgroup limit (git-fixes)
- btrfs: fix silent failure when deleting root reference (git-fixes)
- btrfs: fix use-after-free after failure to create a snapshot (git-fixes)
- btrfs: free exchange changeset on failures (git-fixes)
- btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git-fixes)
- btrfs: make search_csum_tree return 0 if we get -EFBIG (git-fixes)
- btrfs: prevent copying too big compressed lzo segment (git-fixes)
- btrfs: remove BUG_ON(!eie) in find_parent_nodes (git-fixes)
- btrfs: remove BUG_ON() in find_parent_nodes() (git-fixes)
- btrfs: repair super block num_devices automatically (git-fixes)
- btrfs: replace the BUG_ON in btrfs_del_root_ref with proper error handling (git-fixes)
- btrfs: send: ensure send_fd is writable (git-fixes)
- btrfs: send: handle path ref underflow in header iterate_inode_ref() (git-fixes)
- btrfs: send: in case of IO error log it (git-fixes)
- btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes)
- btrfs: tree-checker: check item_size for dev_item (git-fixes)
- btrfs: tree-checker: check item_size for inode_item (git-fixes)
- cifs: account for primary channel in the interface list (bsc#1224020).
- cifs: cifs_chan_is_iface_active should be called with chan_lock held (bsc#1224020).
- cifs: distribute channels across interfaces based on speed (bsc#1224020).
- cifs: do not pass cifs_sb when trying to add channels (bsc#1224020).
- cifs: failure to add channel on iface should bump up weight (git-fixes, bsc#1224020).
- cifs: fix charset issue in reconnection (bsc#1224020).
- cifs: fix leak of iface for primary channel (git-fixes, bsc#1224020).
- cifs: handle cases where a channel is closed (bsc#1224020).
- cifs: handle cases where multiple sessions share connection (bsc#1224020).
- cifs: reconnect work should have reference on server struct (bsc#1224020).
- clk: Do not hold prepare_lock when calling kref_put() (stable-fixes).
- clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes).
- counter: stm32-lptimer-cnt: Provide defines for clock polarities (git-fixes).
- counter: stm32-timer-cnt: Provide defines for slave mode selection (git-fixes).
- cppc_cpufreq: Fix possible null pointer dereference (git-fixes).
- cpu/hotplug: Remove the 'cpu' member of cpuhp_cpu_state (git-fixes).
- cpumask: Add for_each_cpu_from() (bsc#1225053).
- crypto: bcm - Fix pointer arithmetic (git-fixes).
- crypto: ccp - drop platform ifdef checks (git-fixes).
- crypto: ecdsa - Fix module auto-load on add-key (git-fixes).
- crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes).
- crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes).
- crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes).
- dmaengine: axi-dmac: fix possible race in remove() (git-fixes).
- dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes).
- dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11 users (git-fixes).
- dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575).
- docs: kernel_include.py: Cope with docutils 0.21 (stable-fixes).
- drivers/nvme: Add quirks for device 126f:2262 (git-fixes).
- drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes).
- drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes).
- drm/amd/display: Fix potential index out of bounds in color transformation function (git-fixes).
- drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes).
- drm/amd: Flush GFXOFF requests in prepare stage (git-fixes).
- drm/amdgpu: Refine IB schedule error logging (stable-fixes).
- drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git-fixes).
- drm/arm/malidp: fix a possible null pointer dereference (git-fixes).
- drm/bridge: anx7625: Do not log an error when DSI host can't be found (git-fixes).
- drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git-fixes).
- drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: icn6211: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: lt9611: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: tc358775: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes).
- drm/connector: Add \n to message about demoting connector force-probes (git-fixes).
- drm/i915/bios: Fix parsing backlight BDB data (git-fixes).
- drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes).
- drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes).
- drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes).
- drm/meson: dw-hdmi: power up phy on device init (git-fixes).
- drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes).
- drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes).
- drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes).
- drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk (git-fixes).
- drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes).
- drm/panel: atna33xc20: Fix unbalanced regulator in the case HPD does not assert (git-fixes).
- drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found (git-fixes).
- drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector (git-fixes).
- drm: vc4: Fix possible null pointer dereference (git-fixes).
- dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes)
- dyndbg: fix old BUG_ON in >control parser (stable-fixes).
- efi: libstub: only free priv.runtime_map when allocated (git-fixes).
- extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes).
- fail_function: fix wrong use of fei_attr_remove().
- fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes).
- fbdev: shmobile: fix snprintf truncation (git-fixes).
- fbdev: sisfb: hide unused variables (git-fixes).
- firewire: ohci: mask bus reset interrupts between ISR and bottom half (stable-fixes).
- firmware: dmi-id: add a release callback function (git-fixes).
- firmware: raspberrypi: Use correct device for DMA mappings (git-fixes).
- fs/9p: drop inodes immediately on non-.L too (git-fixes).
- fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes).
- fs/9p: translate O_TRUNC into OTRUNC (git-fixes).
- gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes).
- gpio: wcove: Use -ENOTSUPP consistently (stable-fixes).
- gpu: host1x: Do not setup DMA for virtual devices (stable-fixes).
- HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes).
- hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock (git-fixes).
- hwmon: (corsair-cpro) Use a separate buffer for sending commands (git-fixes).
- hwmon: (corsair-cpro) Use complete_all() instead of complete() in ccp_raw_event() (git-fixes).
- hwmon: (lm70) fix links in doc and comments (git-fixes).
- hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes).
- i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame (git-fixes).
- i3c: master: svc: fix invalidate IBI type and miss call client IBI handler (git-fixes).
- IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes)
- idpf: extend tx watchdog timeout (bsc#1224137).
- iio: core: Leave private pointer NULL when no private data supplied (git-fixes).
- iio: pressure: dps310: support negative temperature values (git-fixes).
- Input: cyapa - add missing input core locking to suspend/resume functions (git-fixes).
- Input: ims-pcu - fix printf string overflow (git-fixes).
- Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes).
- iomap: Fix inline extent handling in iomap_readpage (git-fixes)
- iomap: iomap: fix memory corruption when recording errors during writeback (git-fixes)
- iomap: Support partial direct I/O on user copy failures (git-fixes)
- iommu/dma: Force swiotlb_max_mapping_size on an untrusted device (bsc#1224331)
- io_uring/unix: drop usage of io_uring socket (git-fixes).
- irqchip/gic-v3-its: Prevent double free on error (git-fixes).
- jffs2: prevent xattr node from overflowing the eraseblock (git-fixes).
- kABI: bpf: struct bpf_insn_aux_data kABI workaround (bsc#1225756).
- kcm: do not sense pfmemalloc status in kcm_sendpage() (git-fixes bsc#1223959)
- KEYS: trusted: Do not use WARN when encode fails (git-fixes).
- KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes).
- KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1224794).
- KVM: x86: Delete duplicate documentation for KVM_X86_SET_MSR_FILTER (git-fixes).
- leds: pwm: Disable PWM when going to suspend (git-fixes).
- libsubcmd: Fix parse-options memory leak (git-fixes).
- locking/atomic: Make test_and_*_bit() ordered on failure (git-fixes).
- media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries (git-fixes).
- media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes).
- media: mc: mark the media devnode as registered from the, start (git-fixes).
- media: ngene: Add dvb_ca_en50221_init return value check (git-fixes).
- media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes).
- mei: me: add lunar lake point M DID (stable-fixes).
- mfd: intel-lpss: Revert 'Add missing check for platform_get_resource' (git-fixes).
- mfd: ti_am335x_tscadc: Support the correctly spelled DT property (git-fixes).
- mfd: tqmx86: Specify IO port register range more precisely (git-fixes).
- mlxbf_gige: Enable the GigE port in mlxbf_gige_open (git-fixes).
- mlxbf_gige: Fix intermittent no ip issue (git-fixes).
- mlxbf_gige: stop PHY during open() error paths (git-fixes).
- mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes).
- mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes).
- mtd: core: Report error if first mtd_otp_size() call fails in mtd_otp_nvmem_add() (git-fixes).
- mtd: rawnand: hynix: fixed typo (git-fixes).
- net: do not sense pfmemalloc status in skb_append_pagefrags() (git-fixes bsc#1223959)
- netfilter: nf_tables: bail out early if hardware offload is not supported (git-fixes bsc#1223961)
- net: introduce __skb_fill_page_desc_noacc (git-fixes bsc#1223959)
- net: nfc: remove inappropriate attrs check (stable-fixes).
- net: qualcomm: rmnet: fix global oob in rmnet_policy (git-fixes).
- net: usb: ax88179_178a: fix link status when link is set to down/up (git-fixes).
- net:usb:qmi_wwan: support Rolling modules (stable-fixes).
- net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).
- net: usb: sr9700: stop lying about skb->truesize (git-fixes).
- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).
- nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git-fixes).
- nfc: nci: Fix uninit-value in nci_rx_work (git-fixes).
- nilfs2: fix out-of-range warning (git-fixes).
- nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes).
- nilfs2: fix use-after-free of timer for log writer thread (git-fixes).
- nilfs2: make superblock data array index computation sparse friendly (git-fixes).
- nvme: ensure disabling pairs with unquiesce (bsc#1224534).
- nvme: fix miss command type check (git-fixes).
- nvme: fix multipath batched completion accounting (git-fixes).
- nvme-multipath: fix io accounting on failover (git-fixes).
- nvmet: fix ns enable/disable possible hang (git-fixes).
- PCI: dwc: Detect iATU settings after getting 'addr_space' resource (git-fixes).
- PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host (git-fixes).
- PCI: dwc: Use the bitmap API to allocate bitmaps (git-fixes).
- PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes).
- PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes).
- PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes).
- PCI: tegra194: Fix probe path for Endpoint mode (git-fixes).
- pinctrl: armada-37xx: remove an unused variable (git-fixes).
- pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes).
- pinctrl: core: handle radix_tree_insert() errors in pinctrl_register_one_pin() (stable-fixes).
- pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes).
- pinctrl/meson: fix typo in PDM's pin name (git-fixes).
- pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git-fixes).
- platform/x86/intel-uncore-freq: Do not present root domain on error (git-fixes).
- platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git-fixes).
- powerpc/eeh: Permanently disable the removed device (bsc#1223991 ltc#205740).
- powerpc/eeh: Small refactor of eeh_handle_normal_event() (bsc#1223991 ltc#205740).
- powerpc/eeh: Use a goto for recovery failures (bsc#1223991 ltc#205740).
- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).
- powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).
- powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783).
- powerpc/uaccess: Fix build errors seen with GCC 13/14 (bsc#1194869).
- powerpc/uaccess: Use YZ asm constraint for ld (bsc#1194869).
- power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes).
- ppdev: Add an error check in register_device (git-fixes).
- printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1225616).
- qibfs: fix dentry leak (git-fixes)
- RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git-fixes)
- RDMA/hns: Fix deadlock on SRQ async events. (git-fixes)
- RDMA/hns: Fix GMV table pagesize (git-fixes)
- RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes)
- RDMA/hns: Fix UAF for cq async event (git-fixes)
- RDMA/hns: Modify the print level of CQE error (git-fixes)
- RDMA/hns: Use complete parentheses in macros (git-fixes)
- RDMA/IPoIB: Fix format truncation compilation errors (git-fixes)
- RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes)
- RDMA/mlx5: Fix port number for counter query in multi-port configuration (git-fixes)
- RDMA/rxe: Add ibdev_dbg macros for rxe (git-fixes)
- RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes)
- RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes)
- RDMA/rxe: Fix the problem 'mutex_destroy missing' (git-fixes)
- RDMA/rxe: Replace pr_xxx by rxe_dbg_xxx in rxe_net.c (git-fixes)
- RDMA/rxe: Split rxe_run_task() into two subroutines (git-fixes)
- regulator: bd71828: Do not overwrite runtime voltages (git-fixes).
- regulator: core: fix debugfs creation regression (git-fixes).
- regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes).
- remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes).
- Rename colliding patches before origin/cve/linux-5.14-LTSS -> SLE15-SP5 merge
- Revert 'cifs: reconnect work should have reference on server struct' (git-fixes, bsc#1224020).
- Revert 'drm/bridge: ti-sn65dsi83: Fix enable error path' (git-fixes).
- ring-buffer: Fix a race between readers and resize checks (git-fixes).
- s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224795).
- s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224796).
- s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224346).
- s390/ipl: Fix incorrect initialization of len fields in nvme reipl block (git-fixes bsc#1225139).
- s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes bsc#1225138).
- sched/topology: Optimize topology_span_sane() (bsc#1225053).
- scsi: arcmsr: Support new PCI device IDs 1883 and 1886 (git-fixes).
- scsi: bfa: Fix function pointer type mismatch for hcb_qe->cbfn (git-fixes).
- scsi: core: Consult supported VPD page list prior to fetching page (git-fixes).
- scsi: core: Fix unremoved procfs host directory regression (git-fixes).
- scsi: csiostor: Avoid function pointer casts (git-fixes).
- scsi: libfc: Do not schedule abort twice (git-fixes).
- scsi: libfc: Fix up timeout error in fc_fcp_rec_error() (git-fixes).
- scsi: lpfc: Add support for 32 byte CDBs (bsc#1225842).
- scsi: lpfc: Change default logging level for unsolicited CT MIB commands (bsc#1225842).
- scsi: lpfc: Change lpfc_hba hba_flag member into a bitmask (bsc#1225842).
- scsi: lpfc: Clear deferred RSCN processing flag when driver is unloading (bsc#1225842).
- scsi: lpfc: Copyright updates for 14.4.0.2 patches (bsc#1225842).
- scsi: lpfc: Introduce rrq_list_lock to protect active_rrq_list (bsc#1225842).
- scsi: lpfc: Update logging of protection type for T10 DIF I/O (bsc#1225842).
- scsi: lpfc: Update lpfc version to 14.4.0.2 (bsc#1225842).
- scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git-fixes).
- scsi: mylex: Fix sysfs buffer lengths (git-fixes).
- scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes).
- scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git-fixes).
- selftests/pidfd: Fix config for pidfd_setns_test (git-fixes).
- serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes).
- serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable-fixes).
- serial: max3100: Fix bitwise types (git-fixes).
- serial: max3100: Lock port->lock when calling uart_handle_cts_change() (git-fixes).
- serial: max3100: Update uart_driver_registered on driver removal (git-fixes).
- serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git-fixes).
- serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler (git-fixes).
- serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes).
- smb3: show beginning time for per share stats (bsc#1224020).
- smb: client: ensure to try all targets when finding nested links (bsc#1224020).
- smb: client: fix mount when dns_resolver key is not available (git-fixes, bsc#1224020).
- smb: client: get rid of dfs code dep in namespace.c (bsc#1224020).
- smb: client: get rid of dfs naming in automount code (bsc#1224020).
- smb: client: introduce DFS_CACHE_TGT_LIST() (bsc#1224020).
- smb: client: reduce stack usage in cifs_try_adding_channels() (bsc#1224020).
- smb: client: remove extra @chan_count check in __cifs_put_smb_ses() (bsc#1224020).
- smb: client: rename cifs_dfs_ref.c to namespace.c (bsc#1224020).
- soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes).
- soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes).
- Sort recent BHI patches
- speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes).
- spmi: Add a check for remove callback when removing a SPMI driver (git-fixes).
- spmi: hisi-spmi-controller: Do not override device identifier (git-fixes).
- swiotlb: extend buffer pre-padding to alloc_align_mask if necessary (bsc#1224331).
- swiotlb: Fix alignment checks when both allocation and DMA masks are (bsc#1224331)
- swiotlb: Fix double-allocation of slots due to broken alignment (bsc#1224331)
- swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc() (bsc#1224331)
- sysv: do not call sb_bread() with pointers_lock held (git-fixes).
- thermal/drivers/tsens: Fix null pointer dereference (git-fixes).
- tools/latency-collector: Fix -Wformat-security compile warns (git-fixes).
- tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer (bsc#1225535)
- tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (git-fixes).
- tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes).
- tracing: hide unused ftrace_event_id_fops (git-fixes).
- tty: n_gsm: fix missing receive state reset after mode switch (git-fixes).
- tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes).
- Update patches.suse/ring-buffer-Fix-a-race-between-readers-and-resize-checks.patch (bsc#1222893).
- Update patches.suse/scsi-qedf-Don-t-process-stag-work-during-unload.patch (bsc#1214852)
- Update patches.suse/scsi-qedf-Wait-for-stag-work-during-unload.patch (bsc#1214852)
- usb: aqc111: stop lying about skb->truesize (git-fixes).
- USB: core: Add hub_get() and hub_put() routines (git-fixes).
- USB: core: Fix access violation during port device removal (git-fixes).
- USB: core: Fix deadlock in port 'disable' sysfs attribute (git-fixes).
- usb: dwc3: core: Prevent phy suspend during init (Git-fixes).
- usb: gadget: u_audio: Clear uac pointer when freed (git-fixes).
- usb: typec: tipd: fix event checking for tps6598x (git-fixes).
- usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes).
- VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes).
- VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler() (stable-fixes).
- vmci: prevent speculation leaks by sanitizing event in event_deliver() (git-fixes).
- watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git-fixes).
- watchdog: ixp4xx: Make sure restart always works (git-fixes).
- watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin (git-fixes).
- wifi: ar5523: enable proper endpoint verification (git-fixes).
- wifi: ath10k: Fix an error code problem in ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes).
- wifi: ath10k: poll service ready message before failing (git-fixes).
- wifi: ath10k: populate board data for WCN3990 (git-fixes).
- wifi: ath11k: do not force enable power save on non-running vdevs (git-fixes).
- wifi: carl9170: add a proper sanity check for endpoints (git-fixes).
- wifi: carl9170: re-fix fortified-memset warning (git-fixes).
- wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes).
- wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes).
- wifi: mwl8k: initialize cmd->addr[] properly (git-fixes).
- x86/boot: Ignore NMIs during very early boot (git-fixes).
- x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes).
- x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file (git-fixes).
- x86/bugs: Fix BHI documentation (git-fixes).
- x86/bugs: Fix BHI handling of RRSBA (git-fixes).
- x86/bugs: Fix BHI retpoline check (git-fixes).
- x86/bugs: Fix return type of spectre_bhi_state() (git-fixes).
- x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-fixes).
- x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr' (git-fixes).
- x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI (git-fixes).
- x86: Fix CPUIDLE_FLAG_IRQ_ENABLE leaking timer reprogram (git-fixes).
- x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes).
- x86/lib: Fix overflow when counting digits (git-fixes).
- x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes).
- x86/nmi: Drop unused declaration of proc_nmi_enabled() (git-fixes).
- x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for !SRSO (git-fixes).
- x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git-fixes).
- x86/sme: Fix memory encryption setting if enabled by default and not overridden (git-fixes).
- x86/tdx: Preserve shared bit on mprotect() (git-fixes).
- xfs: add missing cmap->br_state = XFS_EXT_NORM update (git-fixes).
- xfs: fix exception caused by unexpected illegal bestcount in leaf dir (git-fixes).
- xfs: Fix false ENOSPC when performing direct write on a delalloc extent in cow fork (git-fixes).
- xfs: fix imprecise logic in xchk_btree_check_block_owner (git-fixes).
- xfs: fix inode reservation space for removing transaction (git-fixes).
- xfs: shrink failure needs to hold AGI buffer (git-fixes).
Tenable has extracted the preceding description block directly from the SUSE security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1065729");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1141539");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1174585");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1181674");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1187716");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1190569");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1191949");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1192107");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1193983");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1194288");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1194869");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1196956");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1197915");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1200465");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205205");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207284");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207361");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207948");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1208149");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1209657");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1209799");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1209834");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1209980");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1210335");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1213863");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1214852");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1215322");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1215702");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1216358");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1216702");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1217169");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1217339");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1217515");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1218447");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220021");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220267");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220363");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220783");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221044");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221081");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221615");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221777");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221816");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221829");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222011");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222374");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222385");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222413");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222464");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222513");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222559");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222561");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222608");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222619");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222627");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222721");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222765");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222770");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222783");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222793");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222838");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222870");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222893");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222960");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222961");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222974");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222975");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222976");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223011");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223023");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223027");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223031");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223043");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223046");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223048");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223049");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223084");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223113");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223119");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223137");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223138");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223140");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223188");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223203");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223207");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223315");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223360");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223384");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223390");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223432");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223489");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223505");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223532");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223575");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223595");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223626");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223627");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223628");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223631");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223633");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223638");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223650");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223653");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223666");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223670");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223671");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223675");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223677");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223678");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223679");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223698");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223712");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223715");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223717");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223718");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223737");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223738");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223741");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223744");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223747");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223748");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223750");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223752");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223754");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223756");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223757");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223762");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223769");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223770");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223779");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223780");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223781");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223788");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223802");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223819");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223823");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223826");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223828");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223829");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223837");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223842");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223843");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223844");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223847");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223858");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223875");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223879");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223895");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223959");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223961");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223991");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223996");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224020");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224076");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224096");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224098");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224099");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224137");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224166");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224174");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224177");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224180");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224181");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224187");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224331");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224346");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224423");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224432");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224437");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224438");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224442");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224443");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224445");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224449");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224479");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224482");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224487");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224488");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224492");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224494");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224495");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224502");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224508");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224509");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224511");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224519");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224524");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224525");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224530");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224531");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224534");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224535");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224537");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224541");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224543");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224549");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224550");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224558");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224559");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224566");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224567");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224571");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224575");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224576");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224579");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224580");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224581");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224582");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224586");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224587");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224592");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224598");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224601");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224607");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224608");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224611");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224615");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224617");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224618");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224621");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224622");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224624");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224627");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224628");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224629");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224632");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224636");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224637");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224638");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224640");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224643");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224644");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224645");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224647");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224648");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224649");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224650");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224651");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224657");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224659");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224660");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224663");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224664");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224665");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224666");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224667");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224668");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224671");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224672");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224676");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224678");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224679");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224680");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224681");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224682");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224685");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224686");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224692");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224697");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224699");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224701");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224703");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224705");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224707");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224717");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224718");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224721");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224722");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224723");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224725");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224727");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224728");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224729");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224730");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224731");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224732");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224733");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224736");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224738");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224739");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224740");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224747");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224749");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224759");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224763");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224764");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224765");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224766");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224794");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224795");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224796");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224803");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224816");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224895");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224898");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224900");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224901");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224902");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224903");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224904");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224905");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224907");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224909");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224910");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224911");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224912");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224913");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224914");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224915");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224920");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224928");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224929");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224930");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224931");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224932");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224936");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224937");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224941");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224942");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224944");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224945");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224947");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224956");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224988");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224992");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225000");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225003");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225005");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225008");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225009");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225022");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225031");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225032");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225036");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225041");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225044");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225053");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225076");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225077");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225082");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225085");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225086");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225092");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225095");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225096");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225097");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225106");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225108");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225109");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225114");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225118");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225121");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225122");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225123");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225125");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225126");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225127");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225129");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225131");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225132");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225138");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225139");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225145");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225151");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225153");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225156");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225158");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225160");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225161");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225164");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225167");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225180");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225183");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225184");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225186");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225187");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225189");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225190");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225191");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225192");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225193");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225195");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225198");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225201");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225203");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225205");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225206");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225207");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225208");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225209");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225210");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225214");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225222");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225223");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225224");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225225");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225227");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225228");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225229");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225230");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225232");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225233");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225235");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225236");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225237");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225238");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225239");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225240");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225241");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225242");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225243");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225244");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225245");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225246");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225247");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225248");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225249");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225250");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225251");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225252");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225253");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225254");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225255");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225256");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225257");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225258");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225259");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225260");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225261");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225262");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225263");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225268");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225301");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225303");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225304");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225306");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225316");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225318");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225320");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225321");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225322");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225323");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225326");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225327");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225328");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225329");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225330");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225331");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225332");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225333");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225334");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225335");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225336");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225337");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225338");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225339");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225341");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225342");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225344");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225346");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225347");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225351");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225353");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225354");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225355");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225357");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225358");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225360");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225361");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225366");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225367");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225368");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225369");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225370");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225372");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225373");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225374");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225375");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225376");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225377");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225379");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225380");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225382");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225383");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225384");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225386");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225387");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225388");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225390");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225392");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225393");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225396");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225400");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225404");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225405");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225408");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225409");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225410");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225411");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225424");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225425");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225427");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225431");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225435");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225436");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225437");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225438");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225439");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225441");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225442");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225443");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225444");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225445");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225446");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225447");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225450");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225453");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225455");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225461");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225463");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225464");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225466");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225467");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225468");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225471");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225472");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225478");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225479");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225480");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225482");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225483");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225486");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225488");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225490");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225492");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225495");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225499");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225500");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225501");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225502");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225506");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225508");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225510");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225513");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225515");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225529");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225530");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225532");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225534");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225535");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225548");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225549");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225550");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225553");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225554");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225555");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225556");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225557");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225559");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225560");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225565");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225566");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225568");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225569");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225570");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225571");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225572");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225577");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225583");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225584");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225587");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225588");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225589");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225590");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225591");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225592");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225593");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225595");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225599");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225616");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225640");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225642");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225705");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225708");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225715");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225720");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225722");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225734");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225735");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225747");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225748");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225756");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225761");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225766");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225775");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225810");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225820");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225829");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225835");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225842");
script_set_attribute(attribute:"see_also", value:"https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-36788");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-4148");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-39698");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-42327");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-43056");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-43527");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47200");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47358");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47359");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47360");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47361");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47362");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47363");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47364");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47365");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47366");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47367");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47368");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47369");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47370");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47371");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47372");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47373");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47374");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47375");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47376");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47378");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47379");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47380");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47381");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47382");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47383");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47384");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47385");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47386");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47387");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47388");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47389");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47390");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47391");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47392");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47393");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47394");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47395");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47396");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47397");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47398");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47399");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47400");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47401");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47402");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47403");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47404");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47405");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47406");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47407");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47408");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47409");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47410");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47412");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47413");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47414");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47415");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47416");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47417");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47418");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47419");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47420");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47421");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47422");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47423");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47424");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47425");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47426");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47427");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47428");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47429");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47430");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47431");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47433");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47434");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47435");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47436");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47437");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47438");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47439");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47440");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47441");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47442");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47443");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47444");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47445");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47446");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47447");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47448");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47449");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47450");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47451");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47452");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47453");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47454");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47455");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47456");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47457");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47458");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47459");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47460");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47461");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47462");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47463");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47464");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47465");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47466");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47467");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47468");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47469");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47470");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47471");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47472");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47473");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47474");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47475");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47476");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47477");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47478");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47479");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47480");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47481");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47482");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47483");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47484");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47485");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47486");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47488");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47489");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47490");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47491");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47492");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47493");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47494");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47495");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47496");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47497");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47498");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47499");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47500");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47501");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47502");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47503");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47504");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47505");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47506");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47507");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47508");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47509");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47510");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47511");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47512");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47513");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47514");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47516");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47518");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47520");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47521");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47522");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47523");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47524");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47525");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47526");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47528");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47529");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47530");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47531");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47532");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47533");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47534");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47535");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47536");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47537");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47540");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47541");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47542");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47544");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47548");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47549");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47550");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47551");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47552");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47553");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47554");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47555");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47556");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47557");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47558");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47559");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47560");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47562");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47563");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47564");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47565");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47569");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48633");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48662");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48669");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48689");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48691");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48699");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48705");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48708");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48709");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48710");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-0160");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-1829");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-6531");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-42755");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-47233");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52586");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52591");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52618");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52642");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52643");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52644");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52646");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52650");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52653");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52654");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52655");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52656");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52657");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52659");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52660");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52661");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52662");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52664");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52669");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52671");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52674");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52676");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52678");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52679");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52680");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52683");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52685");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52686");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52690");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52691");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52692");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52693");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52694");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52696");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52698");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52699");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52702");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52703");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52705");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52707");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52708");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52730");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52731");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52732");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52733");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52736");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52738");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52739");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52740");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52741");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52742");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52743");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52744");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52745");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52746");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52747");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52753");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52754");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52756");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52757");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52759");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52763");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52764");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52766");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52773");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52774");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52777");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52781");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52788");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52789");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52791");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52795");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52796");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52798");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52799");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52800");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52803");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52804");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52805");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52806");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52807");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52808");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52809");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52810");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52811");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52814");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52815");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52816");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52817");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52818");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52819");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52821");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52825");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52826");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52832");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52833");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52834");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52838");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52840");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52841");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52844");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52847");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52851");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52853");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52854");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52855");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52856");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52858");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52860");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52861");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52864");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52865");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52867");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52868");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52870");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52871");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52872");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52873");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52875");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52876");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52877");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52878");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52880");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-2201");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26597");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26643");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26679");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26692");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26698");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26700");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26715");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26739");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26742");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26748");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26758");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26764");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26775");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26777");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26778");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26788");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26791");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26801");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26822");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26828");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26829");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26838");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26839");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26840");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26846");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26859");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26870");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26874");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26876");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26877");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26880");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26889");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26894");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26900");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26907");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26915");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26916");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26919");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26920");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26921");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26922");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26925");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26928");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26929");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26930");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26931");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26933");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26934");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26935");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26937");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26938");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26939");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26940");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26943");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26957");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26958");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26964");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26974");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26977");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26979");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26984");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26988");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26989");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26994");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26996");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26997");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26999");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27000");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27001");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27004");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27008");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27028");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27037");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27042");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27045");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27047");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27051");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27052");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27053");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27054");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27059");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27072");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27073");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27074");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27075");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27076");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27077");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27078");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27388");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27393");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27395");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27396");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27398");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27399");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27400");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27401");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27405");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27410");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27412");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27413");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27416");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27417");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27419");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27431");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27435");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27436");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35789");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35791");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35796");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35799");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35801");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35804");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35806");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35809");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35811");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35812");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35813");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35815");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35817");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35821");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35822");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35823");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35825");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35828");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35829");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35830");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35833");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35845");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35847");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35849");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35851");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35852");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35854");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35860");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35861");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35862");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35863");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35864");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35865");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35866");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35867");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35868");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35869");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35870");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35872");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35875");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35877");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35878");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35879");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35885");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35887");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35895");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35901");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35904");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35905");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35907");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35912");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35914");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35915");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35922");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35924");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35930");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35932");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35933");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35935");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35936");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35938");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35939");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35940");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35943");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35944");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35947");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35950");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35951");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35952");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35955");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35959");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35963");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35964");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35965");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35966");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35967");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35969");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35973");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35976");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35978");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35982");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35984");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35989");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35990");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35998");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35999");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36006");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36007");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36012");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36014");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36015");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36016");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36026");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36029");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36032");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36880");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36893");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36896");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36897");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36906");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36918");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36924");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36926");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36928");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36931");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36938");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36940");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36941");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36942");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36944");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36947");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36950");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36952");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36955");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36959");
script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2021-43527");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2021/10/21");
script_set_attribute(attribute:"patch_publication_date", value:"2024/06/12");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/06/13");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-livepatch-5_14_21-150500_13_58-rt");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:15");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"SuSE Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include('rpm.inc');
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item("Host/SuSE/release");
if (isnull(os_release) || os_release !~ "^(SLED|SLES|SUSE)") audit(AUDIT_OS_NOT, "SUSE / openSUSE");
var os_ver = pregmatch(pattern: "^(SLE(S|D)\d+|SUSE([\d.]+))", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'SUSE / openSUSE');
os_ver = os_ver[1];
if (! preg(pattern:"^(SLES15|SUSE15\.5)$", string:os_ver)) audit(AUDIT_OS_NOT, 'SUSE SLES15 / openSUSE 15', 'SUSE / openSUSE (' + os_ver + ')');
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'SUSE / openSUSE (' + os_ver + ')', cpu);
var service_pack = get_kb_item("Host/SuSE/patchlevel");
if (isnull(service_pack)) service_pack = "0";
if (os_ver == "SLES15" && (! preg(pattern:"^(5)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLES15 SP5", os_ver + " SP" + service_pack);
var pkgs = [
{'reference':'cluster-md-kmp-rt-5.14.21-150500.13.58.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dlm-kmp-rt-5.14.21-150500.13.58.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'gfs2-kmp-rt-5.14.21-150500.13.58.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-devel-rt-5.14.21-150500.13.58.1', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-rt-5.14.21-150500.13.58.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-rt-devel-5.14.21-150500.13.58.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-rt-extra-5.14.21-150500.13.58.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-rt-livepatch-5.14.21-150500.13.58.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-rt-livepatch-devel-5.14.21-150500.13.58.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-rt-optional-5.14.21-150500.13.58.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-rt-vdso-5.14.21-150500.13.58.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-rt_debug-5.14.21-150500.13.58.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-rt_debug-devel-5.14.21-150500.13.58.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-rt_debug-vdso-5.14.21-150500.13.58.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-source-rt-5.14.21-150500.13.58.1', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-syms-rt-5.14.21-150500.13.58.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kselftests-kmp-rt-5.14.21-150500.13.58.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'ocfs2-kmp-rt-5.14.21-150500.13.58.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'reiserfs-kmp-rt-5.14.21-150500.13.58.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1', 'sp':'5', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-live-patching-release-15.5']}
];
var ltss_caveat_required = FALSE;
var flag = 0;
foreach var package_array ( pkgs ) {
var reference = NULL;
var _release = NULL;
var sp = NULL;
var _cpu = NULL;
var exists_check = NULL;
var rpm_spec_vers_cmp = NULL;
if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
if (!empty_or_null(package_array['release'])) _release = package_array['release'];
if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];
if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];
if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];
if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
if (reference && _release) {
if (exists_check) {
var check_flag = 0;
foreach var check (exists_check) {
if (!rpm_exists(release:_release, rpm:check)) continue;
check_flag++;
}
if (!check_flag) continue;
}
if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;
}
}
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'cluster-md-kmp-rt / dlm-kmp-rt / gfs2-kmp-rt / kernel-devel-rt / etc');
}
Vendor | Product | Version | CPE |
---|---|---|---|
novell | suse_linux | kernel-livepatch-5_14_21-150500_13_58-rt | p-cpe:/a:novell:suse_linux:kernel-livepatch-5_14_21-150500_13_58-rt |
novell | suse_linux | 15 | cpe:/o:novell:suse_linux:15 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36788
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4148
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42327
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43056
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47200
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47358
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47359
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47360
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47361
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47362
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47363
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47364
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47365
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47366
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47367
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47368
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47369
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47370
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47371
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47372
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47373
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47374
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47375
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47376
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47378
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47379
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47380
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47381
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47382
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47383
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47384
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47385
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47386
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47387
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47388
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47389
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47390
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47391
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47392
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47393
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47394
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47395
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47396
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47397
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47398
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47399
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47400
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47401
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47402
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47403
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47404
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47405
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47406
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47407
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47408
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47409
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47410
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47412
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47413
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47414
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47415
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47416
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47417
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47418
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47419
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47420
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47421
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47422
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47423
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47424
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47425
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47426
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47427
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47428
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47429
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47430
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47431
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47433
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47434
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47435
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47436
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47437
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47438
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47439
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47440
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47441
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47442
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47443
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47444
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47445
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47446
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47447
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47448
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47449
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47450
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47451
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47452
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47453
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47454
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47455
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47456
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47457
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47458
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47459
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47460
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47461
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47462
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47463
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47464
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47465
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47466
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47467
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47468
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47469
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47470
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47471
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47472
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47473
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47474
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47475
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47476
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47477
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47478
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47479
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47480
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47481
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47482
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47483
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47484
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47485
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47486
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47488
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47489
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47490
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47491
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47492
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47493
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47494
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47495
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47496
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47497
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47498
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47499
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47500
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47501
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47502
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47503
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47504
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47505
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47506
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47507
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47508
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47509
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47510
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47511
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47512
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47513
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47514
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47516
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47518
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47520
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47521
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47522
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47523
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47524
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47525
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47526
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47528
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47529
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47530
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47531
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47532
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47533
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47534
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47535
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47536
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47537
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47540
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47541
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47542
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47544
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47548
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47549
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47550
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47551
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47552
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47553
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47554
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47555
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47556
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47557
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47558
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47559
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47560
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47562
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47563
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47564
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47565
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47569
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48633
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48662
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48669
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48689
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48691
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48699
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48705
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48708
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48709
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48710
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0160
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1829
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42755
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52586
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52591
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52643
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52646
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52653
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52654
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52655
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52656
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52657
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52659
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52660
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52661
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52662
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52664
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52669
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52671
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52674
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52676
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52678
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52679
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52680
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52683
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52685
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52686
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52690
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52691
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52692
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52693
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52694
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52696
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52698
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52699
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52702
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52703
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52705
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52707
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52708
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52730
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52731
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52732
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52733
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52736
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52738
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52739
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52740
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52741
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52742
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52743
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52744
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52745
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52746
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52747
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52753
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52754
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52756
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52757
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52759
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52763
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52764
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52766
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52773
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52774
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52777
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52781
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52788
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52789
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52791
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52795
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52796
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52798
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52799
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52800
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52803
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52804
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52805
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52806
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52807
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52808
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52809
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52810
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52811
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52814
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52815
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52816
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52817
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52818
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52819
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52821
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52825
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52826
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52832
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52833
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52834
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52838
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52840
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52841
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52844
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52847
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52851
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52853
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52854
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52855
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52856
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52858
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52860
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52861
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52864
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52865
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52867
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52868
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52870
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52871
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52872
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52873
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52875
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52876
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52877
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52878
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52880
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2201
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26597
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26692
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26700
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26715
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26739
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26742
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26758
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26775
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26822
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26828
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26829
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26838
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26876
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26900
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26915
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26916
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26919
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26920
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26921
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26928
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26929
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26930
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26933
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26938
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26939
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26940
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26943
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26964
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26977
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26979
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26989
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26996
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27037
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27042
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27054
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27072
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27393
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27395
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27396
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27398
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27399
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27400
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27401
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27405
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27410
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27412
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27413
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27416
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27417
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27419
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27431
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27435
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27436
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35789
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35791
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35796
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35799
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35801
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35804
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35806
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35809
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35811
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35812
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35813
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35815
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35817
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35821
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35822
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35823
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35825
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35828
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35829
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35830
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35833
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35845
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35847
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35849
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35851
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35852
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35854
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35860
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35861
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35862
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35863
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35864
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35865
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35866
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35867
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35868
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35869
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35870
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35872
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35875
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35877
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35878
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35879
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35885
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35887
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35895
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35901
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35904
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35905
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35907
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35912
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35914
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35915
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35922
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35924
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35930
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35932
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35933
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35935
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35936
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35938
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35939
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35940
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35943
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35944
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35947
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35950
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35951
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35952
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35955
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35959
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35963
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35964
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35965
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35966
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35967
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35969
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35973
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35976
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35978
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35982
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35984
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35989
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35990
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35998
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35999
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36006
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36007
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36012
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36014
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36015
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36016
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36026
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36029
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36032
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36880
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36893
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36896
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36897
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36906
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36918
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36924
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36926
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36928
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36931
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36938
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36940
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36941
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36942
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36944
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36947
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36950
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36952
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36955
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36959
bugzilla.suse.com/1065729
bugzilla.suse.com/1141539
bugzilla.suse.com/1174585
bugzilla.suse.com/1181674
bugzilla.suse.com/1187716
bugzilla.suse.com/1190569
bugzilla.suse.com/1191949
bugzilla.suse.com/1192107
bugzilla.suse.com/1193983
bugzilla.suse.com/1194288
bugzilla.suse.com/1194869
bugzilla.suse.com/1196956
bugzilla.suse.com/1197915
bugzilla.suse.com/1200465
bugzilla.suse.com/1205205
bugzilla.suse.com/1207284
bugzilla.suse.com/1207361
bugzilla.suse.com/1207948
bugzilla.suse.com/1208149
bugzilla.suse.com/1209657
bugzilla.suse.com/1209799
bugzilla.suse.com/1209834
bugzilla.suse.com/1209980
bugzilla.suse.com/1210335
bugzilla.suse.com/1213863
bugzilla.suse.com/1214852
bugzilla.suse.com/1215322
bugzilla.suse.com/1215702
bugzilla.suse.com/1216358
bugzilla.suse.com/1216702
bugzilla.suse.com/1217169
bugzilla.suse.com/1217339
bugzilla.suse.com/1217515
bugzilla.suse.com/1218447
bugzilla.suse.com/1220021
bugzilla.suse.com/1220267
bugzilla.suse.com/1220363
bugzilla.suse.com/1220783
bugzilla.suse.com/1221044
bugzilla.suse.com/1221081
bugzilla.suse.com/1221615
bugzilla.suse.com/1221777
bugzilla.suse.com/1221816
bugzilla.suse.com/1221829
bugzilla.suse.com/1222011
bugzilla.suse.com/1222374
bugzilla.suse.com/1222385
bugzilla.suse.com/1222413
bugzilla.suse.com/1222464
bugzilla.suse.com/1222513
bugzilla.suse.com/1222559
bugzilla.suse.com/1222561
bugzilla.suse.com/1222608
bugzilla.suse.com/1222619
bugzilla.suse.com/1222627
bugzilla.suse.com/1222721
bugzilla.suse.com/1222765
bugzilla.suse.com/1222770
bugzilla.suse.com/1222783
bugzilla.suse.com/1222793
bugzilla.suse.com/1222838
bugzilla.suse.com/1222870
bugzilla.suse.com/1222893
bugzilla.suse.com/1222960
bugzilla.suse.com/1222961
bugzilla.suse.com/1222974
bugzilla.suse.com/1222975
bugzilla.suse.com/1222976
bugzilla.suse.com/1223011
bugzilla.suse.com/1223023
bugzilla.suse.com/1223027
bugzilla.suse.com/1223031
bugzilla.suse.com/1223043
bugzilla.suse.com/1223046
bugzilla.suse.com/1223048
bugzilla.suse.com/1223049
bugzilla.suse.com/1223084
bugzilla.suse.com/1223113
bugzilla.suse.com/1223119
bugzilla.suse.com/1223137
bugzilla.suse.com/1223138
bugzilla.suse.com/1223140
bugzilla.suse.com/1223188
bugzilla.suse.com/1223203
bugzilla.suse.com/1223207
bugzilla.suse.com/1223315
bugzilla.suse.com/1223360
bugzilla.suse.com/1223384
bugzilla.suse.com/1223390
bugzilla.suse.com/1223432
bugzilla.suse.com/1223489
bugzilla.suse.com/1223505
bugzilla.suse.com/1223532
bugzilla.suse.com/1223575
bugzilla.suse.com/1223595
bugzilla.suse.com/1223626
bugzilla.suse.com/1223627
bugzilla.suse.com/1223628
bugzilla.suse.com/1223631
bugzilla.suse.com/1223633
bugzilla.suse.com/1223638
bugzilla.suse.com/1223650
bugzilla.suse.com/1223653
bugzilla.suse.com/1223666
bugzilla.suse.com/1223670
bugzilla.suse.com/1223671
bugzilla.suse.com/1223675
bugzilla.suse.com/1223677
bugzilla.suse.com/1223678
bugzilla.suse.com/1223679
bugzilla.suse.com/1223698
bugzilla.suse.com/1223712
bugzilla.suse.com/1223715
bugzilla.suse.com/1223717
bugzilla.suse.com/1223718
bugzilla.suse.com/1223737
bugzilla.suse.com/1223738
bugzilla.suse.com/1223741
bugzilla.suse.com/1223744
bugzilla.suse.com/1223747
bugzilla.suse.com/1223748
bugzilla.suse.com/1223750
bugzilla.suse.com/1223752
bugzilla.suse.com/1223754
bugzilla.suse.com/1223756
bugzilla.suse.com/1223757
bugzilla.suse.com/1223762
bugzilla.suse.com/1223769
bugzilla.suse.com/1223770
bugzilla.suse.com/1223779
bugzilla.suse.com/1223780
bugzilla.suse.com/1223781
bugzilla.suse.com/1223788
bugzilla.suse.com/1223802
bugzilla.suse.com/1223819
bugzilla.suse.com/1223823
bugzilla.suse.com/1223826
bugzilla.suse.com/1223828
bugzilla.suse.com/1223829
bugzilla.suse.com/1223837
bugzilla.suse.com/1223842
bugzilla.suse.com/1223843
bugzilla.suse.com/1223844
bugzilla.suse.com/1223847
bugzilla.suse.com/1223858
bugzilla.suse.com/1223875
bugzilla.suse.com/1223879
bugzilla.suse.com/1223895
bugzilla.suse.com/1223959
bugzilla.suse.com/1223961
bugzilla.suse.com/1223991
bugzilla.suse.com/1223996
bugzilla.suse.com/1224020
bugzilla.suse.com/1224076
bugzilla.suse.com/1224096
bugzilla.suse.com/1224098
bugzilla.suse.com/1224099
bugzilla.suse.com/1224137
bugzilla.suse.com/1224166
bugzilla.suse.com/1224174
bugzilla.suse.com/1224177
bugzilla.suse.com/1224180
bugzilla.suse.com/1224181
bugzilla.suse.com/1224187
bugzilla.suse.com/1224331
bugzilla.suse.com/1224346
bugzilla.suse.com/1224423
bugzilla.suse.com/1224432
bugzilla.suse.com/1224437
bugzilla.suse.com/1224438
bugzilla.suse.com/1224442
bugzilla.suse.com/1224443
bugzilla.suse.com/1224445
bugzilla.suse.com/1224449
bugzilla.suse.com/1224479
bugzilla.suse.com/1224482
bugzilla.suse.com/1224487
bugzilla.suse.com/1224488
bugzilla.suse.com/1224492
bugzilla.suse.com/1224494
bugzilla.suse.com/1224495
bugzilla.suse.com/1224502
bugzilla.suse.com/1224508
bugzilla.suse.com/1224509
bugzilla.suse.com/1224511
bugzilla.suse.com/1224519
bugzilla.suse.com/1224524
bugzilla.suse.com/1224525
bugzilla.suse.com/1224530
bugzilla.suse.com/1224531
bugzilla.suse.com/1224534
bugzilla.suse.com/1224535
bugzilla.suse.com/1224537
bugzilla.suse.com/1224541
bugzilla.suse.com/1224543
bugzilla.suse.com/1224549
bugzilla.suse.com/1224550
bugzilla.suse.com/1224558
bugzilla.suse.com/1224559
bugzilla.suse.com/1224566
bugzilla.suse.com/1224567
bugzilla.suse.com/1224571
bugzilla.suse.com/1224575
bugzilla.suse.com/1224576
bugzilla.suse.com/1224579
bugzilla.suse.com/1224580
bugzilla.suse.com/1224581
bugzilla.suse.com/1224582
bugzilla.suse.com/1224586
bugzilla.suse.com/1224587
bugzilla.suse.com/1224592
bugzilla.suse.com/1224598
bugzilla.suse.com/1224601
bugzilla.suse.com/1224607
bugzilla.suse.com/1224608
bugzilla.suse.com/1224611
bugzilla.suse.com/1224615
bugzilla.suse.com/1224617
bugzilla.suse.com/1224618
bugzilla.suse.com/1224621
bugzilla.suse.com/1224622
bugzilla.suse.com/1224624
bugzilla.suse.com/1224627
bugzilla.suse.com/1224628
bugzilla.suse.com/1224629
bugzilla.suse.com/1224632
bugzilla.suse.com/1224636
bugzilla.suse.com/1224637
bugzilla.suse.com/1224638
bugzilla.suse.com/1224640
bugzilla.suse.com/1224643
bugzilla.suse.com/1224644
bugzilla.suse.com/1224645
bugzilla.suse.com/1224647
bugzilla.suse.com/1224648
bugzilla.suse.com/1224649
bugzilla.suse.com/1224650
bugzilla.suse.com/1224651
bugzilla.suse.com/1224657
bugzilla.suse.com/1224659
bugzilla.suse.com/1224660
bugzilla.suse.com/1224663
bugzilla.suse.com/1224664
bugzilla.suse.com/1224665
bugzilla.suse.com/1224666
bugzilla.suse.com/1224667
bugzilla.suse.com/1224668
bugzilla.suse.com/1224671
bugzilla.suse.com/1224672
bugzilla.suse.com/1224676
bugzilla.suse.com/1224678
bugzilla.suse.com/1224679
bugzilla.suse.com/1224680
bugzilla.suse.com/1224681
bugzilla.suse.com/1224682
bugzilla.suse.com/1224685
bugzilla.suse.com/1224686
bugzilla.suse.com/1224692
bugzilla.suse.com/1224697
bugzilla.suse.com/1224699
bugzilla.suse.com/1224701
bugzilla.suse.com/1224703
bugzilla.suse.com/1224705
bugzilla.suse.com/1224707
bugzilla.suse.com/1224717
bugzilla.suse.com/1224718
bugzilla.suse.com/1224721
bugzilla.suse.com/1224722
bugzilla.suse.com/1224723
bugzilla.suse.com/1224725
bugzilla.suse.com/1224727
bugzilla.suse.com/1224728
bugzilla.suse.com/1224729
bugzilla.suse.com/1224730
bugzilla.suse.com/1224731
bugzilla.suse.com/1224732
bugzilla.suse.com/1224733
bugzilla.suse.com/1224736
bugzilla.suse.com/1224738
bugzilla.suse.com/1224739
bugzilla.suse.com/1224740
bugzilla.suse.com/1224747
bugzilla.suse.com/1224749
bugzilla.suse.com/1224759
bugzilla.suse.com/1224763
bugzilla.suse.com/1224764
bugzilla.suse.com/1224765
bugzilla.suse.com/1224766
bugzilla.suse.com/1224794
bugzilla.suse.com/1224795
bugzilla.suse.com/1224796
bugzilla.suse.com/1224803
bugzilla.suse.com/1224816
bugzilla.suse.com/1224895
bugzilla.suse.com/1224898
bugzilla.suse.com/1224900
bugzilla.suse.com/1224901
bugzilla.suse.com/1224902
bugzilla.suse.com/1224903
bugzilla.suse.com/1224904
bugzilla.suse.com/1224905
bugzilla.suse.com/1224907
bugzilla.suse.com/1224909
bugzilla.suse.com/1224910
bugzilla.suse.com/1224911
bugzilla.suse.com/1224912
bugzilla.suse.com/1224913
bugzilla.suse.com/1224914
bugzilla.suse.com/1224915
bugzilla.suse.com/1224920
bugzilla.suse.com/1224928
bugzilla.suse.com/1224929
bugzilla.suse.com/1224930
bugzilla.suse.com/1224931
bugzilla.suse.com/1224932
bugzilla.suse.com/1224936
bugzilla.suse.com/1224937
bugzilla.suse.com/1224941
bugzilla.suse.com/1224942
bugzilla.suse.com/1224944
bugzilla.suse.com/1224945
bugzilla.suse.com/1224947
bugzilla.suse.com/1224956
bugzilla.suse.com/1224988
bugzilla.suse.com/1224992
bugzilla.suse.com/1225000
bugzilla.suse.com/1225003
bugzilla.suse.com/1225005
bugzilla.suse.com/1225008
bugzilla.suse.com/1225009
bugzilla.suse.com/1225022
bugzilla.suse.com/1225031
bugzilla.suse.com/1225032
bugzilla.suse.com/1225036
bugzilla.suse.com/1225041
bugzilla.suse.com/1225044
bugzilla.suse.com/1225053
bugzilla.suse.com/1225076
bugzilla.suse.com/1225077
bugzilla.suse.com/1225082
bugzilla.suse.com/1225085
bugzilla.suse.com/1225086
bugzilla.suse.com/1225092
bugzilla.suse.com/1225095
bugzilla.suse.com/1225096
bugzilla.suse.com/1225097
bugzilla.suse.com/1225106
bugzilla.suse.com/1225108
bugzilla.suse.com/1225109
bugzilla.suse.com/1225114
bugzilla.suse.com/1225118
bugzilla.suse.com/1225121
bugzilla.suse.com/1225122
bugzilla.suse.com/1225123
bugzilla.suse.com/1225125
bugzilla.suse.com/1225126
bugzilla.suse.com/1225127
bugzilla.suse.com/1225129
bugzilla.suse.com/1225131
bugzilla.suse.com/1225132
bugzilla.suse.com/1225138
bugzilla.suse.com/1225139
bugzilla.suse.com/1225145
bugzilla.suse.com/1225151
bugzilla.suse.com/1225153
bugzilla.suse.com/1225156
bugzilla.suse.com/1225158
bugzilla.suse.com/1225160
bugzilla.suse.com/1225161
bugzilla.suse.com/1225164
bugzilla.suse.com/1225167
bugzilla.suse.com/1225180
bugzilla.suse.com/1225183
bugzilla.suse.com/1225184
bugzilla.suse.com/1225186
bugzilla.suse.com/1225187
bugzilla.suse.com/1225189
bugzilla.suse.com/1225190
bugzilla.suse.com/1225191
bugzilla.suse.com/1225192
bugzilla.suse.com/1225193
bugzilla.suse.com/1225195
bugzilla.suse.com/1225198
bugzilla.suse.com/1225201
bugzilla.suse.com/1225203
bugzilla.suse.com/1225205
bugzilla.suse.com/1225206
bugzilla.suse.com/1225207
bugzilla.suse.com/1225208
bugzilla.suse.com/1225209
bugzilla.suse.com/1225210
bugzilla.suse.com/1225214
bugzilla.suse.com/1225222
bugzilla.suse.com/1225223
bugzilla.suse.com/1225224
bugzilla.suse.com/1225225
bugzilla.suse.com/1225227
bugzilla.suse.com/1225228
bugzilla.suse.com/1225229
bugzilla.suse.com/1225230
bugzilla.suse.com/1225232
bugzilla.suse.com/1225233
bugzilla.suse.com/1225235
bugzilla.suse.com/1225236
bugzilla.suse.com/1225237
bugzilla.suse.com/1225238
bugzilla.suse.com/1225239
bugzilla.suse.com/1225240
bugzilla.suse.com/1225241
bugzilla.suse.com/1225242
bugzilla.suse.com/1225243
bugzilla.suse.com/1225244
bugzilla.suse.com/1225245
bugzilla.suse.com/1225246
bugzilla.suse.com/1225247
bugzilla.suse.com/1225248
bugzilla.suse.com/1225249
bugzilla.suse.com/1225250
bugzilla.suse.com/1225251
bugzilla.suse.com/1225252
bugzilla.suse.com/1225253
bugzilla.suse.com/1225254
bugzilla.suse.com/1225255
bugzilla.suse.com/1225256
bugzilla.suse.com/1225257
bugzilla.suse.com/1225258
bugzilla.suse.com/1225259
bugzilla.suse.com/1225260
bugzilla.suse.com/1225261
bugzilla.suse.com/1225262
bugzilla.suse.com/1225263
bugzilla.suse.com/1225268
bugzilla.suse.com/1225301
bugzilla.suse.com/1225303
bugzilla.suse.com/1225304
bugzilla.suse.com/1225306
bugzilla.suse.com/1225316
bugzilla.suse.com/1225318
bugzilla.suse.com/1225320
bugzilla.suse.com/1225321
bugzilla.suse.com/1225322
bugzilla.suse.com/1225323
bugzilla.suse.com/1225326
bugzilla.suse.com/1225327
bugzilla.suse.com/1225328
bugzilla.suse.com/1225329
bugzilla.suse.com/1225330
bugzilla.suse.com/1225331
bugzilla.suse.com/1225332
bugzilla.suse.com/1225333
bugzilla.suse.com/1225334
bugzilla.suse.com/1225335
bugzilla.suse.com/1225336
bugzilla.suse.com/1225337
bugzilla.suse.com/1225338
bugzilla.suse.com/1225339
bugzilla.suse.com/1225341
bugzilla.suse.com/1225342
bugzilla.suse.com/1225344
bugzilla.suse.com/1225346
bugzilla.suse.com/1225347
bugzilla.suse.com/1225351
bugzilla.suse.com/1225353
bugzilla.suse.com/1225354
bugzilla.suse.com/1225355
bugzilla.suse.com/1225357
bugzilla.suse.com/1225358
bugzilla.suse.com/1225360
bugzilla.suse.com/1225361
bugzilla.suse.com/1225366
bugzilla.suse.com/1225367
bugzilla.suse.com/1225368
bugzilla.suse.com/1225369
bugzilla.suse.com/1225370
bugzilla.suse.com/1225372
bugzilla.suse.com/1225373
bugzilla.suse.com/1225374
bugzilla.suse.com/1225375
bugzilla.suse.com/1225376
bugzilla.suse.com/1225377
bugzilla.suse.com/1225379
bugzilla.suse.com/1225380
bugzilla.suse.com/1225382
bugzilla.suse.com/1225383
bugzilla.suse.com/1225384
bugzilla.suse.com/1225386
bugzilla.suse.com/1225387
bugzilla.suse.com/1225388
bugzilla.suse.com/1225390
bugzilla.suse.com/1225392
bugzilla.suse.com/1225393
bugzilla.suse.com/1225396
bugzilla.suse.com/1225400
bugzilla.suse.com/1225404
bugzilla.suse.com/1225405
bugzilla.suse.com/1225408
bugzilla.suse.com/1225409
bugzilla.suse.com/1225410
bugzilla.suse.com/1225411
bugzilla.suse.com/1225424
bugzilla.suse.com/1225425
bugzilla.suse.com/1225427
bugzilla.suse.com/1225431
bugzilla.suse.com/1225435
bugzilla.suse.com/1225436
bugzilla.suse.com/1225437
bugzilla.suse.com/1225438
bugzilla.suse.com/1225439
bugzilla.suse.com/1225441
bugzilla.suse.com/1225442
bugzilla.suse.com/1225443
bugzilla.suse.com/1225444
bugzilla.suse.com/1225445
bugzilla.suse.com/1225446
bugzilla.suse.com/1225447
bugzilla.suse.com/1225450
bugzilla.suse.com/1225453
bugzilla.suse.com/1225455
bugzilla.suse.com/1225461
bugzilla.suse.com/1225463
bugzilla.suse.com/1225464
bugzilla.suse.com/1225466
bugzilla.suse.com/1225467
bugzilla.suse.com/1225468
bugzilla.suse.com/1225471
bugzilla.suse.com/1225472
bugzilla.suse.com/1225478
bugzilla.suse.com/1225479
bugzilla.suse.com/1225480
bugzilla.suse.com/1225482
bugzilla.suse.com/1225483
bugzilla.suse.com/1225486
bugzilla.suse.com/1225488
bugzilla.suse.com/1225490
bugzilla.suse.com/1225492
bugzilla.suse.com/1225495
bugzilla.suse.com/1225499
bugzilla.suse.com/1225500
bugzilla.suse.com/1225501
bugzilla.suse.com/1225502
bugzilla.suse.com/1225506
bugzilla.suse.com/1225508
bugzilla.suse.com/1225510
bugzilla.suse.com/1225513
bugzilla.suse.com/1225515
bugzilla.suse.com/1225529
bugzilla.suse.com/1225530
bugzilla.suse.com/1225532
bugzilla.suse.com/1225534
bugzilla.suse.com/1225535
bugzilla.suse.com/1225548
bugzilla.suse.com/1225549
bugzilla.suse.com/1225550
bugzilla.suse.com/1225553
bugzilla.suse.com/1225554
bugzilla.suse.com/1225555
bugzilla.suse.com/1225556
bugzilla.suse.com/1225557
bugzilla.suse.com/1225559
bugzilla.suse.com/1225560
bugzilla.suse.com/1225565
bugzilla.suse.com/1225566
bugzilla.suse.com/1225568
bugzilla.suse.com/1225569
bugzilla.suse.com/1225570
bugzilla.suse.com/1225571
bugzilla.suse.com/1225572
bugzilla.suse.com/1225577
bugzilla.suse.com/1225583
bugzilla.suse.com/1225584
bugzilla.suse.com/1225587
bugzilla.suse.com/1225588
bugzilla.suse.com/1225589
bugzilla.suse.com/1225590
bugzilla.suse.com/1225591
bugzilla.suse.com/1225592
bugzilla.suse.com/1225593
bugzilla.suse.com/1225595
bugzilla.suse.com/1225599
bugzilla.suse.com/1225616
bugzilla.suse.com/1225640
bugzilla.suse.com/1225642
bugzilla.suse.com/1225705
bugzilla.suse.com/1225708
bugzilla.suse.com/1225715
bugzilla.suse.com/1225720
bugzilla.suse.com/1225722
bugzilla.suse.com/1225734
bugzilla.suse.com/1225735
bugzilla.suse.com/1225747
bugzilla.suse.com/1225748
bugzilla.suse.com/1225756
bugzilla.suse.com/1225761
bugzilla.suse.com/1225766
bugzilla.suse.com/1225775
bugzilla.suse.com/1225810
bugzilla.suse.com/1225820
bugzilla.suse.com/1225829
bugzilla.suse.com/1225835
bugzilla.suse.com/1225842
lists.suse.com/pipermail/sle-updates/2024-June/035569.html
www.suse.com/security/cve/CVE-2020-36788
www.suse.com/security/cve/CVE-2021-39698
www.suse.com/security/cve/CVE-2021-4148
www.suse.com/security/cve/CVE-2021-42327
www.suse.com/security/cve/CVE-2021-43056
www.suse.com/security/cve/CVE-2021-43527
www.suse.com/security/cve/CVE-2021-47200
www.suse.com/security/cve/CVE-2021-47358
www.suse.com/security/cve/CVE-2021-47359
www.suse.com/security/cve/CVE-2021-47360
www.suse.com/security/cve/CVE-2021-47361
www.suse.com/security/cve/CVE-2021-47362
www.suse.com/security/cve/CVE-2021-47363
www.suse.com/security/cve/CVE-2021-47364
www.suse.com/security/cve/CVE-2021-47365
www.suse.com/security/cve/CVE-2021-47366
www.suse.com/security/cve/CVE-2021-47367
www.suse.com/security/cve/CVE-2021-47368
www.suse.com/security/cve/CVE-2021-47369
www.suse.com/security/cve/CVE-2021-47370
www.suse.com/security/cve/CVE-2021-47371
www.suse.com/security/cve/CVE-2021-47372
www.suse.com/security/cve/CVE-2021-47373
www.suse.com/security/cve/CVE-2021-47374
www.suse.com/security/cve/CVE-2021-47375
www.suse.com/security/cve/CVE-2021-47376
www.suse.com/security/cve/CVE-2021-47378
www.suse.com/security/cve/CVE-2021-47379
www.suse.com/security/cve/CVE-2021-47380
www.suse.com/security/cve/CVE-2021-47381
www.suse.com/security/cve/CVE-2021-47382
www.suse.com/security/cve/CVE-2021-47383
www.suse.com/security/cve/CVE-2021-47384
www.suse.com/security/cve/CVE-2021-47385
www.suse.com/security/cve/CVE-2021-47386
www.suse.com/security/cve/CVE-2021-47387
www.suse.com/security/cve/CVE-2021-47388
www.suse.com/security/cve/CVE-2021-47389
www.suse.com/security/cve/CVE-2021-47390
www.suse.com/security/cve/CVE-2021-47391
www.suse.com/security/cve/CVE-2021-47392
www.suse.com/security/cve/CVE-2021-47393
www.suse.com/security/cve/CVE-2021-47394
www.suse.com/security/cve/CVE-2021-47395
www.suse.com/security/cve/CVE-2021-47396
www.suse.com/security/cve/CVE-2021-47397
www.suse.com/security/cve/CVE-2021-47398
www.suse.com/security/cve/CVE-2021-47399
www.suse.com/security/cve/CVE-2021-47400
www.suse.com/security/cve/CVE-2021-47401
www.suse.com/security/cve/CVE-2021-47402
www.suse.com/security/cve/CVE-2021-47403
www.suse.com/security/cve/CVE-2021-47404
www.suse.com/security/cve/CVE-2021-47405
www.suse.com/security/cve/CVE-2021-47406
www.suse.com/security/cve/CVE-2021-47407
www.suse.com/security/cve/CVE-2021-47408
www.suse.com/security/cve/CVE-2021-47409
www.suse.com/security/cve/CVE-2021-47410
www.suse.com/security/cve/CVE-2021-47412
www.suse.com/security/cve/CVE-2021-47413
www.suse.com/security/cve/CVE-2021-47414
www.suse.com/security/cve/CVE-2021-47415
www.suse.com/security/cve/CVE-2021-47416
www.suse.com/security/cve/CVE-2021-47417
www.suse.com/security/cve/CVE-2021-47418
www.suse.com/security/cve/CVE-2021-47419
www.suse.com/security/cve/CVE-2021-47420
www.suse.com/security/cve/CVE-2021-47421
www.suse.com/security/cve/CVE-2021-47422
www.suse.com/security/cve/CVE-2021-47423
www.suse.com/security/cve/CVE-2021-47424
www.suse.com/security/cve/CVE-2021-47425
www.suse.com/security/cve/CVE-2021-47426
www.suse.com/security/cve/CVE-2021-47427
www.suse.com/security/cve/CVE-2021-47428
www.suse.com/security/cve/CVE-2021-47429
www.suse.com/security/cve/CVE-2021-47430
www.suse.com/security/cve/CVE-2021-47431
www.suse.com/security/cve/CVE-2021-47433
www.suse.com/security/cve/CVE-2021-47434
www.suse.com/security/cve/CVE-2021-47435
www.suse.com/security/cve/CVE-2021-47436
www.suse.com/security/cve/CVE-2021-47437
www.suse.com/security/cve/CVE-2021-47438
www.suse.com/security/cve/CVE-2021-47439
www.suse.com/security/cve/CVE-2021-47440
www.suse.com/security/cve/CVE-2021-47441
www.suse.com/security/cve/CVE-2021-47442
www.suse.com/security/cve/CVE-2021-47443
www.suse.com/security/cve/CVE-2021-47444
www.suse.com/security/cve/CVE-2021-47445
www.suse.com/security/cve/CVE-2021-47446
www.suse.com/security/cve/CVE-2021-47447
www.suse.com/security/cve/CVE-2021-47448
www.suse.com/security/cve/CVE-2021-47449
www.suse.com/security/cve/CVE-2021-47450
www.suse.com/security/cve/CVE-2021-47451
www.suse.com/security/cve/CVE-2021-47452
www.suse.com/security/cve/CVE-2021-47453
www.suse.com/security/cve/CVE-2021-47454
www.suse.com/security/cve/CVE-2021-47455
www.suse.com/security/cve/CVE-2021-47456
www.suse.com/security/cve/CVE-2021-47457
www.suse.com/security/cve/CVE-2021-47458
www.suse.com/security/cve/CVE-2021-47459
www.suse.com/security/cve/CVE-2021-47460
www.suse.com/security/cve/CVE-2021-47461
www.suse.com/security/cve/CVE-2021-47462
www.suse.com/security/cve/CVE-2021-47463
www.suse.com/security/cve/CVE-2021-47464
www.suse.com/security/cve/CVE-2021-47465
www.suse.com/security/cve/CVE-2021-47466
www.suse.com/security/cve/CVE-2021-47467
www.suse.com/security/cve/CVE-2021-47468
www.suse.com/security/cve/CVE-2021-47469
www.suse.com/security/cve/CVE-2021-47470
www.suse.com/security/cve/CVE-2021-47471
www.suse.com/security/cve/CVE-2021-47472
www.suse.com/security/cve/CVE-2021-47473
www.suse.com/security/cve/CVE-2021-47474
www.suse.com/security/cve/CVE-2021-47475
www.suse.com/security/cve/CVE-2021-47476
www.suse.com/security/cve/CVE-2021-47477
www.suse.com/security/cve/CVE-2021-47478
www.suse.com/security/cve/CVE-2021-47479
www.suse.com/security/cve/CVE-2021-47480
www.suse.com/security/cve/CVE-2021-47481
www.suse.com/security/cve/CVE-2021-47482
www.suse.com/security/cve/CVE-2021-47483
www.suse.com/security/cve/CVE-2021-47484
www.suse.com/security/cve/CVE-2021-47485
www.suse.com/security/cve/CVE-2021-47486
www.suse.com/security/cve/CVE-2021-47488
www.suse.com/security/cve/CVE-2021-47489
www.suse.com/security/cve/CVE-2021-47490
www.suse.com/security/cve/CVE-2021-47491
www.suse.com/security/cve/CVE-2021-47492
www.suse.com/security/cve/CVE-2021-47493
www.suse.com/security/cve/CVE-2021-47494
www.suse.com/security/cve/CVE-2021-47495
www.suse.com/security/cve/CVE-2021-47496
www.suse.com/security/cve/CVE-2021-47497
www.suse.com/security/cve/CVE-2021-47498
www.suse.com/security/cve/CVE-2021-47499
www.suse.com/security/cve/CVE-2021-47500
www.suse.com/security/cve/CVE-2021-47501
www.suse.com/security/cve/CVE-2021-47502
www.suse.com/security/cve/CVE-2021-47503
www.suse.com/security/cve/CVE-2021-47504
www.suse.com/security/cve/CVE-2021-47505
www.suse.com/security/cve/CVE-2021-47506
www.suse.com/security/cve/CVE-2021-47507
www.suse.com/security/cve/CVE-2021-47508
www.suse.com/security/cve/CVE-2021-47509
www.suse.com/security/cve/CVE-2021-47510
www.suse.com/security/cve/CVE-2021-47511
www.suse.com/security/cve/CVE-2021-47512
www.suse.com/security/cve/CVE-2021-47513
www.suse.com/security/cve/CVE-2021-47514
www.suse.com/security/cve/CVE-2021-47516
www.suse.com/security/cve/CVE-2021-47518
www.suse.com/security/cve/CVE-2021-47520
www.suse.com/security/cve/CVE-2021-47521
www.suse.com/security/cve/CVE-2021-47522
www.suse.com/security/cve/CVE-2021-47523
www.suse.com/security/cve/CVE-2021-47524
www.suse.com/security/cve/CVE-2021-47525
www.suse.com/security/cve/CVE-2021-47526
www.suse.com/security/cve/CVE-2021-47528
www.suse.com/security/cve/CVE-2021-47529
www.suse.com/security/cve/CVE-2021-47530
www.suse.com/security/cve/CVE-2021-47531
www.suse.com/security/cve/CVE-2021-47532
www.suse.com/security/cve/CVE-2021-47533
www.suse.com/security/cve/CVE-2021-47534
www.suse.com/security/cve/CVE-2021-47535
www.suse.com/security/cve/CVE-2021-47536
www.suse.com/security/cve/CVE-2021-47537
www.suse.com/security/cve/CVE-2021-47540
www.suse.com/security/cve/CVE-2021-47541
www.suse.com/security/cve/CVE-2021-47542
www.suse.com/security/cve/CVE-2021-47544
www.suse.com/security/cve/CVE-2021-47548
www.suse.com/security/cve/CVE-2021-47549
www.suse.com/security/cve/CVE-2021-47550
www.suse.com/security/cve/CVE-2021-47551
www.suse.com/security/cve/CVE-2021-47552
www.suse.com/security/cve/CVE-2021-47553
www.suse.com/security/cve/CVE-2021-47554
www.suse.com/security/cve/CVE-2021-47555
www.suse.com/security/cve/CVE-2021-47556
www.suse.com/security/cve/CVE-2021-47557
www.suse.com/security/cve/CVE-2021-47558
www.suse.com/security/cve/CVE-2021-47559
www.suse.com/security/cve/CVE-2021-47560
www.suse.com/security/cve/CVE-2021-47562
www.suse.com/security/cve/CVE-2021-47563
www.suse.com/security/cve/CVE-2021-47564
www.suse.com/security/cve/CVE-2021-47565
www.suse.com/security/cve/CVE-2021-47569
www.suse.com/security/cve/CVE-2022-48633
www.suse.com/security/cve/CVE-2022-48662
www.suse.com/security/cve/CVE-2022-48669
www.suse.com/security/cve/CVE-2022-48689
www.suse.com/security/cve/CVE-2022-48691
www.suse.com/security/cve/CVE-2022-48699
www.suse.com/security/cve/CVE-2022-48705
www.suse.com/security/cve/CVE-2022-48708
www.suse.com/security/cve/CVE-2022-48709
www.suse.com/security/cve/CVE-2022-48710
www.suse.com/security/cve/CVE-2023-0160
www.suse.com/security/cve/CVE-2023-1829
www.suse.com/security/cve/CVE-2023-42755
www.suse.com/security/cve/CVE-2023-47233
www.suse.com/security/cve/CVE-2023-52586
www.suse.com/security/cve/CVE-2023-52591
www.suse.com/security/cve/CVE-2023-52618
www.suse.com/security/cve/CVE-2023-52642
www.suse.com/security/cve/CVE-2023-52643
www.suse.com/security/cve/CVE-2023-52644
www.suse.com/security/cve/CVE-2023-52646
www.suse.com/security/cve/CVE-2023-52650
www.suse.com/security/cve/CVE-2023-52653
www.suse.com/security/cve/CVE-2023-52654
www.suse.com/security/cve/CVE-2023-52655
www.suse.com/security/cve/CVE-2023-52656
www.suse.com/security/cve/CVE-2023-52657
www.suse.com/security/cve/CVE-2023-52659
www.suse.com/security/cve/CVE-2023-52660
www.suse.com/security/cve/CVE-2023-52661
www.suse.com/security/cve/CVE-2023-52662
www.suse.com/security/cve/CVE-2023-52664
www.suse.com/security/cve/CVE-2023-52669
www.suse.com/security/cve/CVE-2023-52671
www.suse.com/security/cve/CVE-2023-52674
www.suse.com/security/cve/CVE-2023-52676
www.suse.com/security/cve/CVE-2023-52678
www.suse.com/security/cve/CVE-2023-52679
www.suse.com/security/cve/CVE-2023-52680
www.suse.com/security/cve/CVE-2023-52683
www.suse.com/security/cve/CVE-2023-52685
www.suse.com/security/cve/CVE-2023-52686
www.suse.com/security/cve/CVE-2023-52690
www.suse.com/security/cve/CVE-2023-52691
www.suse.com/security/cve/CVE-2023-52692
www.suse.com/security/cve/CVE-2023-52693
www.suse.com/security/cve/CVE-2023-52694
www.suse.com/security/cve/CVE-2023-52696
www.suse.com/security/cve/CVE-2023-52698
www.suse.com/security/cve/CVE-2023-52699
www.suse.com/security/cve/CVE-2023-52702
www.suse.com/security/cve/CVE-2023-52703
www.suse.com/security/cve/CVE-2023-52705
www.suse.com/security/cve/CVE-2023-52707
www.suse.com/security/cve/CVE-2023-52708
www.suse.com/security/cve/CVE-2023-52730
www.suse.com/security/cve/CVE-2023-52731
www.suse.com/security/cve/CVE-2023-52732
www.suse.com/security/cve/CVE-2023-52733
www.suse.com/security/cve/CVE-2023-52736
www.suse.com/security/cve/CVE-2023-52738
www.suse.com/security/cve/CVE-2023-52739
www.suse.com/security/cve/CVE-2023-52740
www.suse.com/security/cve/CVE-2023-52741
www.suse.com/security/cve/CVE-2023-52742
www.suse.com/security/cve/CVE-2023-52743
www.suse.com/security/cve/CVE-2023-52744
www.suse.com/security/cve/CVE-2023-52745
www.suse.com/security/cve/CVE-2023-52746
www.suse.com/security/cve/CVE-2023-52747
www.suse.com/security/cve/CVE-2023-52753
www.suse.com/security/cve/CVE-2023-52754
www.suse.com/security/cve/CVE-2023-52756
www.suse.com/security/cve/CVE-2023-52757
www.suse.com/security/cve/CVE-2023-52759
www.suse.com/security/cve/CVE-2023-52763
www.suse.com/security/cve/CVE-2023-52764
www.suse.com/security/cve/CVE-2023-52766
www.suse.com/security/cve/CVE-2023-52773
www.suse.com/security/cve/CVE-2023-52774
www.suse.com/security/cve/CVE-2023-52777
www.suse.com/security/cve/CVE-2023-52781
www.suse.com/security/cve/CVE-2023-52788
www.suse.com/security/cve/CVE-2023-52789
www.suse.com/security/cve/CVE-2023-52791
www.suse.com/security/cve/CVE-2023-52795
www.suse.com/security/cve/CVE-2023-52796
www.suse.com/security/cve/CVE-2023-52798
www.suse.com/security/cve/CVE-2023-52799
www.suse.com/security/cve/CVE-2023-52800
www.suse.com/security/cve/CVE-2023-52803
www.suse.com/security/cve/CVE-2023-52804
www.suse.com/security/cve/CVE-2023-52805
www.suse.com/security/cve/CVE-2023-52806
www.suse.com/security/cve/CVE-2023-52807
www.suse.com/security/cve/CVE-2023-52808
www.suse.com/security/cve/CVE-2023-52809
www.suse.com/security/cve/CVE-2023-52810
www.suse.com/security/cve/CVE-2023-52811
www.suse.com/security/cve/CVE-2023-52814
www.suse.com/security/cve/CVE-2023-52815
www.suse.com/security/cve/CVE-2023-52816
www.suse.com/security/cve/CVE-2023-52817
www.suse.com/security/cve/CVE-2023-52818
www.suse.com/security/cve/CVE-2023-52819
www.suse.com/security/cve/CVE-2023-52821
www.suse.com/security/cve/CVE-2023-52825
www.suse.com/security/cve/CVE-2023-52826
www.suse.com/security/cve/CVE-2023-52832
www.suse.com/security/cve/CVE-2023-52833
www.suse.com/security/cve/CVE-2023-52834
www.suse.com/security/cve/CVE-2023-52838
www.suse.com/security/cve/CVE-2023-52840
www.suse.com/security/cve/CVE-2023-52841
www.suse.com/security/cve/CVE-2023-52844
www.suse.com/security/cve/CVE-2023-52847
www.suse.com/security/cve/CVE-2023-52851
www.suse.com/security/cve/CVE-2023-52853
www.suse.com/security/cve/CVE-2023-52854
www.suse.com/security/cve/CVE-2023-52855
www.suse.com/security/cve/CVE-2023-52856
www.suse.com/security/cve/CVE-2023-52858
www.suse.com/security/cve/CVE-2023-52860
www.suse.com/security/cve/CVE-2023-52861
www.suse.com/security/cve/CVE-2023-52864
www.suse.com/security/cve/CVE-2023-52865
www.suse.com/security/cve/CVE-2023-52867
www.suse.com/security/cve/CVE-2023-52868
www.suse.com/security/cve/CVE-2023-52870
www.suse.com/security/cve/CVE-2023-52871
www.suse.com/security/cve/CVE-2023-52872
www.suse.com/security/cve/CVE-2023-52873
www.suse.com/security/cve/CVE-2023-52875
www.suse.com/security/cve/CVE-2023-52876
www.suse.com/security/cve/CVE-2023-52877
www.suse.com/security/cve/CVE-2023-52878
www.suse.com/security/cve/CVE-2023-52880
www.suse.com/security/cve/CVE-2023-6531
www.suse.com/security/cve/CVE-2024-2201
www.suse.com/security/cve/CVE-2024-26597
www.suse.com/security/cve/CVE-2024-26643
www.suse.com/security/cve/CVE-2024-26679
www.suse.com/security/cve/CVE-2024-26692
www.suse.com/security/cve/CVE-2024-26698
www.suse.com/security/cve/CVE-2024-26700
www.suse.com/security/cve/CVE-2024-26715
www.suse.com/security/cve/CVE-2024-26739
www.suse.com/security/cve/CVE-2024-26742
www.suse.com/security/cve/CVE-2024-26748
www.suse.com/security/cve/CVE-2024-26758
www.suse.com/security/cve/CVE-2024-26764
www.suse.com/security/cve/CVE-2024-26775
www.suse.com/security/cve/CVE-2024-26777
www.suse.com/security/cve/CVE-2024-26778
www.suse.com/security/cve/CVE-2024-26788
www.suse.com/security/cve/CVE-2024-26791
www.suse.com/security/cve/CVE-2024-26801
www.suse.com/security/cve/CVE-2024-26822
www.suse.com/security/cve/CVE-2024-26828
www.suse.com/security/cve/CVE-2024-26829
www.suse.com/security/cve/CVE-2024-26838
www.suse.com/security/cve/CVE-2024-26839
www.suse.com/security/cve/CVE-2024-26840
www.suse.com/security/cve/CVE-2024-26846
www.suse.com/security/cve/CVE-2024-26859
www.suse.com/security/cve/CVE-2024-26870
www.suse.com/security/cve/CVE-2024-26874
www.suse.com/security/cve/CVE-2024-26876
www.suse.com/security/cve/CVE-2024-26877
www.suse.com/security/cve/CVE-2024-26880
www.suse.com/security/cve/CVE-2024-26889
www.suse.com/security/cve/CVE-2024-26894
www.suse.com/security/cve/CVE-2024-26900
www.suse.com/security/cve/CVE-2024-26907
www.suse.com/security/cve/CVE-2024-26915
www.suse.com/security/cve/CVE-2024-26916
www.suse.com/security/cve/CVE-2024-26919
www.suse.com/security/cve/CVE-2024-26920
www.suse.com/security/cve/CVE-2024-26921
www.suse.com/security/cve/CVE-2024-26922
www.suse.com/security/cve/CVE-2024-26925
www.suse.com/security/cve/CVE-2024-26928
www.suse.com/security/cve/CVE-2024-26929
www.suse.com/security/cve/CVE-2024-26930
www.suse.com/security/cve/CVE-2024-26931
www.suse.com/security/cve/CVE-2024-26933
www.suse.com/security/cve/CVE-2024-26934
www.suse.com/security/cve/CVE-2024-26935
www.suse.com/security/cve/CVE-2024-26937
www.suse.com/security/cve/CVE-2024-26938
www.suse.com/security/cve/CVE-2024-26939
www.suse.com/security/cve/CVE-2024-26940
www.suse.com/security/cve/CVE-2024-26943
www.suse.com/security/cve/CVE-2024-26957
www.suse.com/security/cve/CVE-2024-26958
www.suse.com/security/cve/CVE-2024-26964
www.suse.com/security/cve/CVE-2024-26974
www.suse.com/security/cve/CVE-2024-26977
www.suse.com/security/cve/CVE-2024-26979
www.suse.com/security/cve/CVE-2024-26984
www.suse.com/security/cve/CVE-2024-26988
www.suse.com/security/cve/CVE-2024-26989
www.suse.com/security/cve/CVE-2024-26994
www.suse.com/security/cve/CVE-2024-26996
www.suse.com/security/cve/CVE-2024-26997
www.suse.com/security/cve/CVE-2024-26999
www.suse.com/security/cve/CVE-2024-27000
www.suse.com/security/cve/CVE-2024-27001
www.suse.com/security/cve/CVE-2024-27004
www.suse.com/security/cve/CVE-2024-27008
www.suse.com/security/cve/CVE-2024-27028
www.suse.com/security/cve/CVE-2024-27037
www.suse.com/security/cve/CVE-2024-27042
www.suse.com/security/cve/CVE-2024-27045
www.suse.com/security/cve/CVE-2024-27047
www.suse.com/security/cve/CVE-2024-27051
www.suse.com/security/cve/CVE-2024-27052
www.suse.com/security/cve/CVE-2024-27053
www.suse.com/security/cve/CVE-2024-27054
www.suse.com/security/cve/CVE-2024-27059
www.suse.com/security/cve/CVE-2024-27072
www.suse.com/security/cve/CVE-2024-27073
www.suse.com/security/cve/CVE-2024-27074
www.suse.com/security/cve/CVE-2024-27075
www.suse.com/security/cve/CVE-2024-27076
www.suse.com/security/cve/CVE-2024-27077
www.suse.com/security/cve/CVE-2024-27078
www.suse.com/security/cve/CVE-2024-27388
www.suse.com/security/cve/CVE-2024-27393
www.suse.com/security/cve/CVE-2024-27395
www.suse.com/security/cve/CVE-2024-27396
www.suse.com/security/cve/CVE-2024-27398
www.suse.com/security/cve/CVE-2024-27399
www.suse.com/security/cve/CVE-2024-27400
www.suse.com/security/cve/CVE-2024-27401
www.suse.com/security/cve/CVE-2024-27405
www.suse.com/security/cve/CVE-2024-27410
www.suse.com/security/cve/CVE-2024-27412
www.suse.com/security/cve/CVE-2024-27413
www.suse.com/security/cve/CVE-2024-27416
www.suse.com/security/cve/CVE-2024-27417
www.suse.com/security/cve/CVE-2024-27419
www.suse.com/security/cve/CVE-2024-27431
www.suse.com/security/cve/CVE-2024-27435
www.suse.com/security/cve/CVE-2024-27436
www.suse.com/security/cve/CVE-2024-35789
www.suse.com/security/cve/CVE-2024-35791
www.suse.com/security/cve/CVE-2024-35796
www.suse.com/security/cve/CVE-2024-35799
www.suse.com/security/cve/CVE-2024-35801
www.suse.com/security/cve/CVE-2024-35804
www.suse.com/security/cve/CVE-2024-35806
www.suse.com/security/cve/CVE-2024-35809
www.suse.com/security/cve/CVE-2024-35811
www.suse.com/security/cve/CVE-2024-35812
www.suse.com/security/cve/CVE-2024-35813
www.suse.com/security/cve/CVE-2024-35815
www.suse.com/security/cve/CVE-2024-35817
www.suse.com/security/cve/CVE-2024-35821
www.suse.com/security/cve/CVE-2024-35822
www.suse.com/security/cve/CVE-2024-35823
www.suse.com/security/cve/CVE-2024-35825
www.suse.com/security/cve/CVE-2024-35828
www.suse.com/security/cve/CVE-2024-35829
www.suse.com/security/cve/CVE-2024-35830
www.suse.com/security/cve/CVE-2024-35833
www.suse.com/security/cve/CVE-2024-35845
www.suse.com/security/cve/CVE-2024-35847
www.suse.com/security/cve/CVE-2024-35849
www.suse.com/security/cve/CVE-2024-35851
www.suse.com/security/cve/CVE-2024-35852
www.suse.com/security/cve/CVE-2024-35854
www.suse.com/security/cve/CVE-2024-35860
www.suse.com/security/cve/CVE-2024-35861
www.suse.com/security/cve/CVE-2024-35862
www.suse.com/security/cve/CVE-2024-35863
www.suse.com/security/cve/CVE-2024-35864
www.suse.com/security/cve/CVE-2024-35865
www.suse.com/security/cve/CVE-2024-35866
www.suse.com/security/cve/CVE-2024-35867
www.suse.com/security/cve/CVE-2024-35868
www.suse.com/security/cve/CVE-2024-35869
www.suse.com/security/cve/CVE-2024-35870
www.suse.com/security/cve/CVE-2024-35872
www.suse.com/security/cve/CVE-2024-35875
www.suse.com/security/cve/CVE-2024-35877
www.suse.com/security/cve/CVE-2024-35878
www.suse.com/security/cve/CVE-2024-35879
www.suse.com/security/cve/CVE-2024-35885
www.suse.com/security/cve/CVE-2024-35887
www.suse.com/security/cve/CVE-2024-35895
www.suse.com/security/cve/CVE-2024-35901
www.suse.com/security/cve/CVE-2024-35904
www.suse.com/security/cve/CVE-2024-35905
www.suse.com/security/cve/CVE-2024-35907
www.suse.com/security/cve/CVE-2024-35912
www.suse.com/security/cve/CVE-2024-35914
www.suse.com/security/cve/CVE-2024-35915
www.suse.com/security/cve/CVE-2024-35922
www.suse.com/security/cve/CVE-2024-35924
www.suse.com/security/cve/CVE-2024-35930
www.suse.com/security/cve/CVE-2024-35932
www.suse.com/security/cve/CVE-2024-35933
www.suse.com/security/cve/CVE-2024-35935
www.suse.com/security/cve/CVE-2024-35936
www.suse.com/security/cve/CVE-2024-35938
www.suse.com/security/cve/CVE-2024-35939
www.suse.com/security/cve/CVE-2024-35940
www.suse.com/security/cve/CVE-2024-35943
www.suse.com/security/cve/CVE-2024-35944
www.suse.com/security/cve/CVE-2024-35947
www.suse.com/security/cve/CVE-2024-35950
www.suse.com/security/cve/CVE-2024-35951
www.suse.com/security/cve/CVE-2024-35952
www.suse.com/security/cve/CVE-2024-35955
www.suse.com/security/cve/CVE-2024-35959
www.suse.com/security/cve/CVE-2024-35963
www.suse.com/security/cve/CVE-2024-35964
www.suse.com/security/cve/CVE-2024-35965
www.suse.com/security/cve/CVE-2024-35966
www.suse.com/security/cve/CVE-2024-35967
www.suse.com/security/cve/CVE-2024-35969
www.suse.com/security/cve/CVE-2024-35973
www.suse.com/security/cve/CVE-2024-35976
www.suse.com/security/cve/CVE-2024-35978
www.suse.com/security/cve/CVE-2024-35982
www.suse.com/security/cve/CVE-2024-35984
www.suse.com/security/cve/CVE-2024-35989
www.suse.com/security/cve/CVE-2024-35990
www.suse.com/security/cve/CVE-2024-35998
www.suse.com/security/cve/CVE-2024-35999
www.suse.com/security/cve/CVE-2024-36006
www.suse.com/security/cve/CVE-2024-36007
www.suse.com/security/cve/CVE-2024-36012
www.suse.com/security/cve/CVE-2024-36014
www.suse.com/security/cve/CVE-2024-36015
www.suse.com/security/cve/CVE-2024-36016
www.suse.com/security/cve/CVE-2024-36026
www.suse.com/security/cve/CVE-2024-36029
www.suse.com/security/cve/CVE-2024-36032
www.suse.com/security/cve/CVE-2024-36880
www.suse.com/security/cve/CVE-2024-36893
www.suse.com/security/cve/CVE-2024-36896
www.suse.com/security/cve/CVE-2024-36897
www.suse.com/security/cve/CVE-2024-36906
www.suse.com/security/cve/CVE-2024-36918
www.suse.com/security/cve/CVE-2024-36924
www.suse.com/security/cve/CVE-2024-36926
www.suse.com/security/cve/CVE-2024-36928
www.suse.com/security/cve/CVE-2024-36931
www.suse.com/security/cve/CVE-2024-36938
www.suse.com/security/cve/CVE-2024-36940
www.suse.com/security/cve/CVE-2024-36941
www.suse.com/security/cve/CVE-2024-36942
www.suse.com/security/cve/CVE-2024-36944
www.suse.com/security/cve/CVE-2024-36947
www.suse.com/security/cve/CVE-2024-36950
www.suse.com/security/cve/CVE-2024-36952
www.suse.com/security/cve/CVE-2024-36955
www.suse.com/security/cve/CVE-2024-36959
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 High
AI Score
Confidence
High
0.005 Low
EPSS
Percentile
77.1%