SUSE SLES15 Security Update : kernel (SUSE-SU-2024:2896-1)

high Nessus Plugin ID 205492

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:2896-1 advisory.

The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data (bsc#1228408).
- CVE-2024-41013: xfs: do not walk off the end of a directory data block (bsc#1228405).
- CVE-2024-41017: jfs: do not walk off the end of ealist (bsc#1228403).
- CVE-2024-40972: ext4: fold quota accounting into ext4_xattr_inode_lookup_create() (bsc#1227910).
- CVE-2024-39276: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() (bsc#1226993).
- CVE-2024-40925: block: fix request.queuelist usage in flush (bsc#1227789).
- CVE-2024-40998: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() (bsc#1227866).
- CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).
- CVE-2024-39496: btrfs: zoned: fix use-after-free due to race with dev replace (bsc#1227719).
- CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327).
- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
- CVE-2024-40999: net: ena: Add validation for completion descriptors consistency (bsc#1227913).
- CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc (bsc#1227886).
- CVE-2024-40975: platform/x86: x86-android-tablets: Unregister devices in reverse order (bsc#1227926).
- CVE-2024-40970: Avoid hw_desc array overrun in dw-axi-dmac (bsc#1227899).
- CVE-2024-40947: ima: Avoid blocking in RCU read-side critical section (bsc#1227803).
- CVE-2024-40908: bpf: Set run context for rawtp test_run callback (bsc#1227783).
- CVE-2024-40960: ipv6: prevent possible NULL dereference in rt6_probe() (bsc#1227813).
- CVE-2024-40935: cachefiles: flush all requests after setting CACHEFILES_DEAD (bsc#1227797).
- CVE-2024-40961: ipv6: prevent possible NULL deref in fib6_nh_init() (bsc#1227814).
- CVE-2024-39504: netfilter: nft_inner: validate mandatory meta and payload (bsc#1227757).
- CVE-2024-41006: netrom: Fix a memory leak in nr_heartbeat_expiry() (bsc#1227862).
- CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836).
- CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario (bsc#1227730).
- CVE-2024-40940: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail (bsc#1227800).
- CVE-2024-40928: net: ethtool: fix the error condition in ethtool_get_phy_stats_ethtool() (bsc#1227788).
- CVE-2024-26944: btrfs: zoned: fix lock ordering in btrfs_zone_activate() (bsc#1223731).
- CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure (bsc#1227786).
- CVE-2024-40931: mptcp: ensure snd_una is properly initialized on connect (bsc#1227780).
- CVE-2024-40919: bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send() (bsc#1227779).
- CVE-2024-39487: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (bsc#1227573)
- CVE-2024-35908: tls: get psock ref after taking rxlock to avoid leak (bsc#1224490)
- CVE-2024-35899: netfilter: nf_tables: flush pending destroy work before exit_net release (bsc#1224499)
- CVE-2024-35934: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() (bsc#1224641)
- CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512)
- CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory (bsc#1227762).
- CVE-2024-39472: xfs: fix log recovery buffer allocation for the legacy h_size fixup (bsc#1227432).
- CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() (bsc#1227806).
- CVE-2024-27404: mptcp: fix data races on remote_id (bsc#1224422)
- CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (bsc#1223815)
- CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (bsc#1223813)
- CVE-2024-40948: mm/page_table_check: fix crash on ZONE_DEVICE (bsc#1227801).
- CVE-2024-35890: gro: fix ownership transfer (bsc#1224516).
- CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (bsc#1225719).
- CVE-2024-36946: phonet: fix rtm_phonet_notify() skb allocation (bsc#1225851).
- CVE-2024-38586: r8169: Fix possible ring buffer corruption on fragmented Tx packets (bsc#1226750).
- CVE-2024-39468: smb: client: fix deadlock in smb2_find_smb_tcon() (bsc#1227103.
- CVE-2024-40906: net/mlx5: Always stop health timer during driver removal (bsc#1227763).
- CVE-2024-27012: netfilter: nf_tables: restore set elements when delete set fails (bsc#1223804).
- CVE-2024-39498: drm/mst: Fix NULL pointer dereference at drm_dp_add_payload_part2 (bsc#1227723)
- CVE-2024-39502: ionic: fix use after netif_napi_del() (bsc#1227755).
- CVE-2024-27016: netfilter: flowtable: validate pppoe header (bsc#1223807).
- CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711)
- CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1224545)
- CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778)
- CVE-2024-35853: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash (bsc#1224604).
- CVE-2024-35854: Fixed possible use-after-free during rehash (bsc#1224636).
- CVE-2024-27402: phonet/pep: fix racy skb_queue_empty() use (bsc#1224414).
- CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138).
- CVE-2024-27065: netfilter: nf_tables: do not compare internal table flags on updates (bsc#1223836).
- CVE-2024-27015: netfilter: flowtable: incorrect pppoe tuple (bsc#1223806).
- CVE-2024-27064: netfilter: nf_tables: Fix a memory leak in nf_tables_updchain (bsc#1223740).
- CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (bsc#1222326).
- CVE-2023-47210: wifi: iwlwifi: bump FW API to 90 for BZ/SC devices (bsc#1225601, bsc#1225600).
- CVE-2023-52775: net/smc: avoid data corruption caused by decline (bsc#1225088).
- CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for ICMPv6 (bsc#1226783).
- CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core (bsc#1227626).
- CVE-2024-26826: mptcp: fix data re-injection from stale subflow (bsc#1223010).
- CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942).
- CVE-2024-35942: pmdomain: imx8mp-blk-ctrl: imx8mp_blk: Add fdcc clock to hdmimix domain (bsc#1224589).
- CVE-2024-26691: KVM: arm64: Fix circular locking dependency (bsc#1222463).
- CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that couldn't be re-encrypted (bsc#1225744).
- CVE-2024-36910: uio_hv_generic: Do not free decrypted memory (bsc#1225717).
- CVE-2024-36911: hv_netvsc: Do not free decrypted memory (bsc#1225745).
- CVE-2024-36912: Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl (bsc#1225752).
- CVE-2024-36913: Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails (bsc#1225753).
- CVE-2024-26665: tunnels: fix out of bounds access when building IPv6 PMTU error (bsc#1222328).
- CVE-2024-38659: enic: Validate length of nl attributes in enic_set_vf_port (bsc#1226883).
- CVE-2023-52751: smb: client: fix use-after-free in smb2_query_info_compound() (bsc#1225489).
- CVE-2024-39482: bcache: fix variable length array abuse in btree_iter (bsc#1227447).
- CVE-2024-39474: mm/vmalloc: fix vmalloc which may return null if called with __GFP_NOFAIL (bsc#1227434).
- CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes (bsc#1221659).
- CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656).
- CVE-2024-38598: md: fix resync softlockup when bitmap size is less than array size (bsc#1226757).
- CVE-2024-36003: ice: fix LAG and VF lock dependency in ice_reset_vf() (bsc#1224544).
- CVE-2024-38604: block: refine the EOF check in blkdev_iomap_begin (bsc#1226866).
- CVE-2024-26641: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() (bsc#1221654).
- CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node() (bsc#1223021).
- CVE-2024-26633: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() (bsc#1221647).
- CVE-2024-26623: pds_core: Prevent race issues involving the adminq (bsc#1221057).
- CVE-2024-26785: iommufd: Fix protection fault in iommufd_test_syz_conv_iova (bsc#1222779).
- CVE-2024-26734: devlink: fix possible use-after-free and memory leaks in devlink_init() (bsc#1222438).
- CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit (bsc#1224743).
- CVE-2024-39371: io_uring: check for non-NULL file pointer in io_file_can_poll() (bsc#1226990).
- CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225098).
- CVE-2024-38610: drivers/virt/acrn: fix PFNMAP PTE checks in acrn_vm_ram_map() (bsc#1226758).
- CVE-2024-37354: btrfs: fix crash on racing fsync and size-extending write into prealloc (bsc#1227101).
- CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload (bsc#1225767).
- CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785).
- CVE-2024-38570: gfs2: Fix potential glock use-after-free on unmount (bsc#1226775).
- CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225732).
- CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).
- CVE-2024-37353: virtio: fixed a double free in vp_del_vqs() (bsc#1226875).
- CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994).
- CVE-2024-35843: iommu/vt-d: Use device rbtree in iopf reporting path (bsc#1224751).
- CVE-2024-37078: nilfs2: fix potential kernel bug due to lack of writeback flag waiting (bsc#1227066).
- CVE-2024-35247: fpga: region: add owner module and take its refcount (bsc#1226948).
- CVE-2024-36479: fpga: bridge: add owner module and take its refcount (bsc#1226949).
- CVE-2024-37021: fpga: manager: add owner module and take its refcount (bsc#1226950).
- CVE-2024-36281: net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules (bsc#1226799).
- CVE-2024-38580: epoll: be better about file lifetimes (bsc#1226610).
- CVE-2024-36478: null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues' (bsc#1226841).
- CVE-2024-38636: f2fs: multidev: fix to recognize valid zero block address (bsc#1226879).
- CVE-2024-38661: s390/ap: Fix crash in AP internal function modify_bitmap() (bsc#1226996).
- CVE-2024-38564: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (bsc#1226789).
- CVE-2024-38566: bpf: Fix verifier assumptions about socket->sk (bsc#1226790).
- CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).
- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).
- CVE-2024-36917: block: fix overflow in blk_ioctl_discard() (bsc#1225770).
- CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519).
- CVE-2024-38627: stm class: Fix a double free in stm_register_device() (bsc#1226857).
- CVE-2024-38603: drivers/perf: hisi: hns3: Actually use devm_add_action_or_reset() (bsc#1226842).
- CVE-2024-38553: net: fec: remove .ndo_poll_controller to avoid deadlock (bsc#1226744).
- CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607).
- CVE-2024-38556: net/mlx5: Add a timeout to acquire the command queue semaphore (bsc#1226774).
- CVE-2024-38557: net/mlx5: Reload only IB representors upon lag disable/enable (bsc#1226781).
- CVE-2024-38608: net/mlx5e: Fix netif state handling (bsc#1226746).
- CVE-2024-38597: eth: sungem: remove .ndo_poll_controller to avoid deadlocks (bsc#1226749).
- CVE-2024-38594: net: stmmac: move the EST lock to struct stmmac_priv (bsc#1226734).
- CVE-2024-38569: drivers/perf: hisi_pcie: Fix out-of-bound access when valid event group (bsc#1226772).
- CVE-2024-38568: drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group (bsc#1226771).
- CVE-2024-26814: vfio/fsl-mc: Block calling interrupt handler without trigger (bsc#1222810).
- CVE-2024-26813: vfio/platform: Create persistent IRQ handlers (bsc#1222809).
- CVE-2024-36945: net/smc: fix neighbour and rtable leak in smc_ib_find_route() (bsc#1225823).
- CVE-2024-36923: fs/9p: fix uninitialized values during inode evict (bsc#1225815).
- CVE-2024-36971: net: fix __dst_negative_advice() race (bsc#1226145).
- CVE-2024-27414: rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back (bsc#1224439).
- CVE-2024-35900: netfilter: nf_tables: reject new basechain after table flag update (bsc#1224497).
- CVE-2024-35886: ipv6: Fix infinite recursion in fib6_dump_done() (bsc#1224670).
- CVE-2024-36024: drm/amd/display: Disable idle reallow as part of command/gpint execution (bsc#1225702).
- CVE-2024-36903: ipv6: Fix potential uninit-value access in __ip6_make_skb() (bsc#1225741).
- CVE-2024-36914: drm/amd/display: Skip on writeback when it's not applicable (bsc#1225757).
- CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225737).
- CVE-2024-35979: raid1: fix use-after-free for original bio in raid1_write_request() (bsc#1224572).
- CVE-2024-35807: ext4: fix corruption during on-line resize (bsc#1224735).
- CVE-2023-52622: ext4: avoid online resizing failures due to oversized flex bg (bsc#1222080).
- CVE-2023-52843: llc: verify mac len before reading mac header (bsc#1224951).
- CVE-2024-35898: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (bsc#1224498).
- CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758).
- CVE-2024-36017: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation (bsc#1225681).
- CVE-2024-36882: mm: use memalloc_nofs_save() in page_cache_ra_order() (bsc#1225723).
- CVE-2024-36916: blk-iocost: avoid out of bounds shift (bsc#1225759).
- CVE-2024-36900: net: hns3: fix kernel crash when devlink reload during initialization (bsc#1225726).
- CVE-2023-52787: blk-mq: make sure active queue usage is held for bio_integrity_prep() (bsc#1225105).
- CVE-2024-35925: block: prevent division by zero in blk_rq_stat_sum() (bsc#1224661).
- CVE-2023-52837: nbd: fix uaf in nbd_open (bsc#1224935).
- CVE-2023-52786: ext4: fix racy may inline data check in dio write (bsc#1224939).
- CVE-2024-36934: bna: ensure the copied buf is NUL terminated (bsc#1225760).
- CVE-2024-36935: ice: ensure the copied buf is NUL terminated (bsc#1225763).
- CVE-2024-36937: xdp: use flags field to disambiguate broadcast redirect (bsc#1225834).
- CVE-2023-52672: pipe: wakeup wr_wait after setting max_usage (bsc#1224614).
- CVE-2023-52845: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (bsc#1225585).
- CVE-2024-36005: netfilter: nf_tables: honor table dormant flag from netdev release event path (bsc#1224539).
- CVE-2024-26845: scsi: target: core: Add TMF to tmr_list handling (bsc#1223018).
- CVE-2024-35892: net/sched: fix lockdep splat in qdisc_tree_reduce_backlog() (bsc#1224515).
- CVE-2024-35848: eeprom: at24: fix memory corruption race condition (bsc#1224612).
- CVE-2024-35884: udp: do not accept non-tunnel GSO skbs landing in a tunnel (bsc#1224520).
- CVE-2024-35857: icmp: prevent possible NULL dereferences from icmp_build_probe() (bsc#1224619).
- CVE-2023-52735: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself (bsc#1225475).
- CVE-2024-35926: crypto: iaa - Fix async_disable descriptor leak (bsc#1224655).
- CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING (bsc#1224575).
- CVE-2024-36938: Fixed NULL pointer dereference in sk_psock_skb_ingress_enqueue (bsc#1225761).
- CVE-2024-36008: ipv4: check for NULL idev in ip_route_use_hint() (bsc#1224540).
- CVE-2024-35998: Fixed lock ordering potential deadlock in cifs_sync_mid_result (bsc#1224549).
- CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548).
- CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759)
- CVE-2024-36957: octeontx2-af: avoid off-by-one read from userspace (bsc#1225762).
- CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
- CVE-2024-35880: io_uring/kbuf: hold io_buffer_list reference over mmap (bsc#1224523).
- CVE-2024-35831: io_uring: Fix release of pinned pages when __io_uaddr_map fails (bsc#1224698).
- CVE-2024-35827: io_uring/net: fix overflow check in io_recvmsg_mshot_prep() (bsc#1224606).
- CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187).
- CVE-2023-52699: sysv: don't call sb_bread() with pointers_lock held (bsc#1224659).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1186716

https://bugzilla.suse.com/1194869

https://bugzilla.suse.com/1195775

https://bugzilla.suse.com/1204562

https://bugzilla.suse.com/1209834

https://bugzilla.suse.com/1215199

https://bugzilla.suse.com/1215587

https://bugzilla.suse.com/1217481

https://bugzilla.suse.com/1217912

https://bugzilla.suse.com/1218442

https://bugzilla.suse.com/1218730

https://bugzilla.suse.com/1223813

https://bugzilla.suse.com/1223815

https://bugzilla.suse.com/1223836

https://bugzilla.suse.com/1223863

https://bugzilla.suse.com/1224049

https://bugzilla.suse.com/1224187

https://bugzilla.suse.com/1224414

https://bugzilla.suse.com/1224422

https://bugzilla.suse.com/1224439

https://bugzilla.suse.com/1224490

https://bugzilla.suse.com/1224497

https://bugzilla.suse.com/1224498

https://bugzilla.suse.com/1224499

https://bugzilla.suse.com/1224512

https://bugzilla.suse.com/1224515

https://bugzilla.suse.com/1224516

https://bugzilla.suse.com/1224520

https://bugzilla.suse.com/1224523

https://bugzilla.suse.com/1224539

https://bugzilla.suse.com/1224540

https://bugzilla.suse.com/1224544

https://bugzilla.suse.com/1224743

https://bugzilla.suse.com/1224751

https://bugzilla.suse.com/1224759

https://bugzilla.suse.com/1218820

https://bugzilla.suse.com/1219224

https://bugzilla.suse.com/1219478

https://bugzilla.suse.com/1219596

https://bugzilla.suse.com/1219633

https://bugzilla.suse.com/1219832

https://bugzilla.suse.com/1219847

https://bugzilla.suse.com/1219953

https://bugzilla.suse.com/1220138

https://bugzilla.suse.com/1220427

https://bugzilla.suse.com/1220430

https://bugzilla.suse.com/1220942

https://bugzilla.suse.com/1221057

https://bugzilla.suse.com/1221086

https://bugzilla.suse.com/1221647

https://bugzilla.suse.com/1221654

https://bugzilla.suse.com/1221656

https://bugzilla.suse.com/1221659

https://bugzilla.suse.com/1221777

https://bugzilla.suse.com/1221958

https://bugzilla.suse.com/1222011

https://bugzilla.suse.com/1222015

https://bugzilla.suse.com/1222080

https://bugzilla.suse.com/1222241

https://bugzilla.suse.com/1222326

https://bugzilla.suse.com/1222328

https://bugzilla.suse.com/1222380

https://bugzilla.suse.com/1222438

https://bugzilla.suse.com/1222463

https://bugzilla.suse.com/1222588

https://bugzilla.suse.com/1222617

https://bugzilla.suse.com/1222619

https://bugzilla.suse.com/1222768

https://bugzilla.suse.com/1222775

https://bugzilla.suse.com/1222779

https://bugzilla.suse.com/1222809

https://bugzilla.suse.com/1222810

https://bugzilla.suse.com/1222893

https://bugzilla.suse.com/1223010

https://bugzilla.suse.com/1223018

https://bugzilla.suse.com/1223021

https://bugzilla.suse.com/1223265

https://bugzilla.suse.com/1223570

https://bugzilla.suse.com/1223731

https://bugzilla.suse.com/1223740

https://bugzilla.suse.com/1223778

https://bugzilla.suse.com/1223804

https://bugzilla.suse.com/1223806

https://bugzilla.suse.com/1223807

https://bugzilla.suse.com/1224545

https://bugzilla.suse.com/1224549

https://bugzilla.suse.com/1224572

https://bugzilla.suse.com/1224575

https://bugzilla.suse.com/1224583

https://bugzilla.suse.com/1224584

https://bugzilla.suse.com/1224589

https://bugzilla.suse.com/1224604

https://bugzilla.suse.com/1224606

https://bugzilla.suse.com/1224612

https://bugzilla.suse.com/1224767

https://bugzilla.suse.com/1224928

https://bugzilla.suse.com/1224930

https://bugzilla.suse.com/1224932

https://bugzilla.suse.com/1224933

https://bugzilla.suse.com/1224935

https://bugzilla.suse.com/1224937

https://bugzilla.suse.com/1224939

https://bugzilla.suse.com/1225477

https://bugzilla.suse.com/1225478

https://bugzilla.suse.com/1225485

https://bugzilla.suse.com/1225489

https://bugzilla.suse.com/1225490

https://bugzilla.suse.com/1225527

https://bugzilla.suse.com/1225529

https://bugzilla.suse.com/1225530

https://bugzilla.suse.com/1225532

https://bugzilla.suse.com/1225534

https://bugzilla.suse.com/1225548

https://bugzilla.suse.com/1225550

https://bugzilla.suse.com/1225553

https://bugzilla.suse.com/1225554

https://bugzilla.suse.com/1225555

https://bugzilla.suse.com/1225556

https://bugzilla.suse.com/1225557

https://bugzilla.suse.com/1225702

https://bugzilla.suse.com/1225711

https://bugzilla.suse.com/1225717

https://bugzilla.suse.com/1225719

https://bugzilla.suse.com/1225723

https://bugzilla.suse.com/1225726

https://bugzilla.suse.com/1225731

https://bugzilla.suse.com/1225732

https://bugzilla.suse.com/1225737

https://bugzilla.suse.com/1225741

https://bugzilla.suse.com/1225744

https://bugzilla.suse.com/1225745

https://bugzilla.suse.com/1225746

https://bugzilla.suse.com/1225752

https://bugzilla.suse.com/1225753

https://bugzilla.suse.com/1225757

https://bugzilla.suse.com/1225758

https://bugzilla.suse.com/1225759

https://bugzilla.suse.com/1225760

https://bugzilla.suse.com/1225761

https://bugzilla.suse.com/1225762

https://bugzilla.suse.com/1225763

https://bugzilla.suse.com/1225767

https://bugzilla.suse.com/1225895

https://bugzilla.suse.com/1225896

https://bugzilla.suse.com/1225898

https://bugzilla.suse.com/1225903

https://bugzilla.suse.com/1226022

https://bugzilla.suse.com/1226131

https://bugzilla.suse.com/1226145

https://bugzilla.suse.com/1226149

https://bugzilla.suse.com/1226155

https://bugzilla.suse.com/1226158

https://bugzilla.suse.com/1226163

https://bugzilla.suse.com/1226202

https://bugzilla.suse.com/1226211

https://bugzilla.suse.com/1226212

https://bugzilla.suse.com/1226213

https://bugzilla.suse.com/1226226

https://bugzilla.suse.com/1226457

https://bugzilla.suse.com/1226502

https://bugzilla.suse.com/1226503

https://bugzilla.suse.com/1226513

https://bugzilla.suse.com/1226514

https://bugzilla.suse.com/1226519

https://bugzilla.suse.com/1226520

https://bugzilla.suse.com/1226582

https://bugzilla.suse.com/1226587

https://bugzilla.suse.com/1226588

https://bugzilla.suse.com/1226592

https://bugzilla.suse.com/1226593

https://bugzilla.suse.com/1226594

https://bugzilla.suse.com/1226595

https://bugzilla.suse.com/1226597

https://bugzilla.suse.com/1226607

https://bugzilla.suse.com/1226608

https://bugzilla.suse.com/1226610

https://bugzilla.suse.com/1226612

https://bugzilla.suse.com/1226613

https://bugzilla.suse.com/1226630

https://bugzilla.suse.com/1226632

https://bugzilla.suse.com/1226633

https://bugzilla.suse.com/1226634

https://bugzilla.suse.com/1226637

https://bugzilla.suse.com/1226657

https://bugzilla.suse.com/1226658

https://bugzilla.suse.com/1226734

https://bugzilla.suse.com/1226735

https://bugzilla.suse.com/1226928

https://bugzilla.suse.com/1226934

https://bugzilla.suse.com/1226938

https://bugzilla.suse.com/1226939

https://bugzilla.suse.com/1226941

https://bugzilla.suse.com/1226948

https://bugzilla.suse.com/1226949

https://bugzilla.suse.com/1226950

https://bugzilla.suse.com/1226962

https://bugzilla.suse.com/1226976

https://bugzilla.suse.com/1226989

https://bugzilla.suse.com/1226990

https://bugzilla.suse.com/1226992

https://bugzilla.suse.com/1226993

https://bugzilla.suse.com/1226994

https://bugzilla.suse.com/1226995

https://bugzilla.suse.com/1226996

https://bugzilla.suse.com/1227066

https://bugzilla.suse.com/1227447

https://bugzilla.suse.com/1227487

https://bugzilla.suse.com/1227573

https://bugzilla.suse.com/1227626

https://bugzilla.suse.com/1227716

https://bugzilla.suse.com/1227719

https://bugzilla.suse.com/1227723

https://bugzilla.suse.com/1227730

https://bugzilla.suse.com/1227736

https://bugzilla.suse.com/1227755

https://bugzilla.suse.com/1227757

https://bugzilla.suse.com/1227762

https://bugzilla.suse.com/1224614

https://bugzilla.suse.com/1224619

https://bugzilla.suse.com/1224636

https://bugzilla.suse.com/1224641

https://bugzilla.suse.com/1224655

https://bugzilla.suse.com/1224659

https://bugzilla.suse.com/1224661

https://bugzilla.suse.com/1224662

https://bugzilla.suse.com/1224670

https://bugzilla.suse.com/1224673

https://bugzilla.suse.com/1224698

https://bugzilla.suse.com/1224735

https://bugzilla.suse.com/1224941

https://bugzilla.suse.com/1224944

https://bugzilla.suse.com/1224946

https://bugzilla.suse.com/1224947

https://bugzilla.suse.com/1224949

https://bugzilla.suse.com/1224951

https://bugzilla.suse.com/1224988

https://bugzilla.suse.com/1224992

https://bugzilla.suse.com/1224998

https://bugzilla.suse.com/1225000

https://bugzilla.suse.com/1225001

https://bugzilla.suse.com/1225004

https://bugzilla.suse.com/1225006

https://bugzilla.suse.com/1225008

https://bugzilla.suse.com/1225009

https://bugzilla.suse.com/1225014

https://bugzilla.suse.com/1225015

https://bugzilla.suse.com/1225022

https://bugzilla.suse.com/1225025

https://bugzilla.suse.com/1225028

https://bugzilla.suse.com/1225029

https://bugzilla.suse.com/1225031

https://bugzilla.suse.com/1225036

https://bugzilla.suse.com/1225041

https://bugzilla.suse.com/1225044

https://bugzilla.suse.com/1225049

https://bugzilla.suse.com/1225050

https://bugzilla.suse.com/1225076

https://bugzilla.suse.com/1225077

https://bugzilla.suse.com/1225078

https://bugzilla.suse.com/1225081

https://bugzilla.suse.com/1225085

https://bugzilla.suse.com/1225086

https://bugzilla.suse.com/1225088

https://bugzilla.suse.com/1225090

https://bugzilla.suse.com/1225092

https://bugzilla.suse.com/1225096

https://bugzilla.suse.com/1225097

https://bugzilla.suse.com/1225098

https://bugzilla.suse.com/1225101

https://bugzilla.suse.com/1225103

https://bugzilla.suse.com/1225104

https://bugzilla.suse.com/1225105

https://bugzilla.suse.com/1225106

https://bugzilla.suse.com/1225108

https://bugzilla.suse.com/1225120

https://bugzilla.suse.com/1225132

https://bugzilla.suse.com/1225172

https://bugzilla.suse.com/1225180

https://bugzilla.suse.com/1225272

https://bugzilla.suse.com/1225300

https://bugzilla.suse.com/1225391

https://bugzilla.suse.com/1225472

https://bugzilla.suse.com/1225475

https://bugzilla.suse.com/1225476

https://bugzilla.suse.com/1225559

https://bugzilla.suse.com/1225560

https://bugzilla.suse.com/1225564

https://bugzilla.suse.com/1225565

https://bugzilla.suse.com/1225566

https://bugzilla.suse.com/1225568

https://bugzilla.suse.com/1225569

https://bugzilla.suse.com/1225570

https://bugzilla.suse.com/1225571

https://bugzilla.suse.com/1225572

https://bugzilla.suse.com/1225573

https://bugzilla.suse.com/1225577

https://bugzilla.suse.com/1225581

https://bugzilla.suse.com/1225583

https://bugzilla.suse.com/1225584

https://bugzilla.suse.com/1225585

https://bugzilla.suse.com/1225586

https://bugzilla.suse.com/1225587

https://bugzilla.suse.com/1225588

https://bugzilla.suse.com/1225589

https://bugzilla.suse.com/1225590

https://bugzilla.suse.com/1225591

https://bugzilla.suse.com/1225592

https://bugzilla.suse.com/1225594

https://bugzilla.suse.com/1225595

https://bugzilla.suse.com/1225599

https://bugzilla.suse.com/1225600

https://bugzilla.suse.com/1225601

https://bugzilla.suse.com/1225602

https://bugzilla.suse.com/1225605

https://bugzilla.suse.com/1225609

https://bugzilla.suse.com/1225611

https://bugzilla.suse.com/1225681

https://bugzilla.suse.com/1225770

https://bugzilla.suse.com/1225805

https://bugzilla.suse.com/1225810

https://bugzilla.suse.com/1225815

https://bugzilla.suse.com/1225820

https://bugzilla.suse.com/1225823

https://bugzilla.suse.com/1225827

https://bugzilla.suse.com/1225829

https://bugzilla.suse.com/1225830

https://bugzilla.suse.com/1225834

https://bugzilla.suse.com/1225835

https://bugzilla.suse.com/1225839

https://bugzilla.suse.com/1225840

https://bugzilla.suse.com/1225843

https://bugzilla.suse.com/1225847

https://bugzilla.suse.com/1225851

https://bugzilla.suse.com/1225856

https://bugzilla.suse.com/1225866

https://bugzilla.suse.com/1225872

https://bugzilla.suse.com/1225894

https://bugzilla.suse.com/1226737

https://bugzilla.suse.com/1226738

https://bugzilla.suse.com/1226739

https://bugzilla.suse.com/1226740

https://bugzilla.suse.com/1226741

https://bugzilla.suse.com/1226742

https://bugzilla.suse.com/1226744

https://bugzilla.suse.com/1226746

https://bugzilla.suse.com/1226747

https://bugzilla.suse.com/1226749

https://bugzilla.suse.com/1226750

https://bugzilla.suse.com/1226754

https://bugzilla.suse.com/1226757

https://bugzilla.suse.com/1226758

https://bugzilla.suse.com/1226760

https://bugzilla.suse.com/1226761

https://bugzilla.suse.com/1226764

https://bugzilla.suse.com/1226767

https://bugzilla.suse.com/1226768

https://bugzilla.suse.com/1226769

https://bugzilla.suse.com/1226771

https://bugzilla.suse.com/1226772

https://bugzilla.suse.com/1226774

https://bugzilla.suse.com/1226775

https://bugzilla.suse.com/1226776

https://bugzilla.suse.com/1226777

https://bugzilla.suse.com/1226780

https://bugzilla.suse.com/1226781

https://bugzilla.suse.com/1226783

https://bugzilla.suse.com/1226785

https://bugzilla.suse.com/1226786

https://bugzilla.suse.com/1226788

https://bugzilla.suse.com/1226789

https://bugzilla.suse.com/1226790

https://bugzilla.suse.com/1226791

https://bugzilla.suse.com/1226796

https://bugzilla.suse.com/1226799

https://bugzilla.suse.com/1226837

https://bugzilla.suse.com/1226839

https://bugzilla.suse.com/1226840

https://bugzilla.suse.com/1226841

https://bugzilla.suse.com/1226842

https://bugzilla.suse.com/1226844

https://bugzilla.suse.com/1226848

https://bugzilla.suse.com/1226852

https://bugzilla.suse.com/1226856

https://bugzilla.suse.com/1226857

https://bugzilla.suse.com/1226859

https://bugzilla.suse.com/1226861

https://bugzilla.suse.com/1226863

https://bugzilla.suse.com/1226864

https://bugzilla.suse.com/1226866

https://bugzilla.suse.com/1226867

https://bugzilla.suse.com/1226868

https://bugzilla.suse.com/1226875

https://bugzilla.suse.com/1226876

https://bugzilla.suse.com/1226878

https://bugzilla.suse.com/1226879

https://bugzilla.suse.com/1226883

https://bugzilla.suse.com/1226886

https://bugzilla.suse.com/1226890

https://bugzilla.suse.com/1226891

https://bugzilla.suse.com/1226894

https://bugzilla.suse.com/1226895

https://bugzilla.suse.com/1226905

https://bugzilla.suse.com/1226908

https://bugzilla.suse.com/1226909

https://bugzilla.suse.com/1226911

https://bugzilla.suse.com/1226915

https://bugzilla.suse.com/1227072

https://bugzilla.suse.com/1227085

https://bugzilla.suse.com/1227089

https://bugzilla.suse.com/1227090

https://bugzilla.suse.com/1227096

https://bugzilla.suse.com/1227101

https://bugzilla.suse.com/1227103

https://bugzilla.suse.com/1227149

https://bugzilla.suse.com/1227190

https://bugzilla.suse.com/1227282

https://bugzilla.suse.com/1227362

https://bugzilla.suse.com/1227363

https://bugzilla.suse.com/1227383

https://bugzilla.suse.com/1227432

https://bugzilla.suse.com/1227433

https://bugzilla.suse.com/1227434

https://bugzilla.suse.com/1227763

https://bugzilla.suse.com/1227779

https://bugzilla.suse.com/1227780

https://bugzilla.suse.com/1227783

https://bugzilla.suse.com/1227786

https://bugzilla.suse.com/1227788

https://www.suse.com/security/cve/CVE-2023-52786

https://www.suse.com/security/cve/CVE-2023-52787

https://www.suse.com/security/cve/CVE-2023-52788

https://www.suse.com/security/cve/CVE-2023-52789

https://www.suse.com/security/cve/CVE-2023-52791

https://www.suse.com/security/cve/CVE-2023-52792

https://www.suse.com/security/cve/CVE-2023-52794

https://www.suse.com/security/cve/CVE-2023-52795

https://www.suse.com/security/cve/CVE-2023-52796

https://www.suse.com/security/cve/CVE-2023-52798

https://www.suse.com/security/cve/CVE-2023-52799

https://www.suse.com/security/cve/CVE-2023-52800

https://www.suse.com/security/cve/CVE-2023-52801

https://www.suse.com/security/cve/CVE-2023-52803

https://www.suse.com/security/cve/CVE-2023-52804

https://www.suse.com/security/cve/CVE-2023-52805

https://www.suse.com/security/cve/CVE-2023-52806

https://www.suse.com/security/cve/CVE-2023-52807

https://www.suse.com/security/cve/CVE-2023-52808

https://www.suse.com/security/cve/CVE-2023-52809

https://www.suse.com/security/cve/CVE-2023-52844

https://www.suse.com/security/cve/CVE-2023-52845

https://www.suse.com/security/cve/CVE-2023-52846

https://www.suse.com/security/cve/CVE-2023-52847

https://www.suse.com/security/cve/CVE-2023-52849

https://www.suse.com/security/cve/CVE-2023-52850

https://www.suse.com/security/cve/CVE-2023-52851

https://www.suse.com/security/cve/CVE-2023-52853

https://www.suse.com/security/cve/CVE-2023-52854

https://www.suse.com/security/cve/CVE-2023-52855

https://www.suse.com/security/cve/CVE-2023-52856

https://www.suse.com/security/cve/CVE-2023-52857

https://www.suse.com/security/cve/CVE-2023-52858

https://www.suse.com/security/cve/CVE-2023-52861

https://www.suse.com/security/cve/CVE-2023-52862

https://www.suse.com/security/cve/CVE-2023-52863

https://www.suse.com/security/cve/CVE-2023-52864

https://www.suse.com/security/cve/CVE-2023-52865

https://www.suse.com/security/cve/CVE-2023-52866

https://www.suse.com/security/cve/CVE-2023-52867

https://www.suse.com/security/cve/CVE-2023-52868

https://www.suse.com/security/cve/CVE-2023-52869

https://www.suse.com/security/cve/CVE-2023-52870

https://www.suse.com/security/cve/CVE-2023-52871

https://www.suse.com/security/cve/CVE-2023-52872

https://www.suse.com/security/cve/CVE-2023-52873

https://www.suse.com/security/cve/CVE-2023-52874

https://www.suse.com/security/cve/CVE-2023-52875

https://www.suse.com/security/cve/CVE-2023-52876

https://www.suse.com/security/cve/CVE-2023-52877

https://www.suse.com/security/cve/CVE-2023-52878

https://www.suse.com/security/cve/CVE-2024-27015

https://www.suse.com/security/cve/CVE-2024-27016

https://www.suse.com/security/cve/CVE-2024-27019

https://www.suse.com/security/cve/CVE-2024-27020

https://www.suse.com/security/cve/CVE-2024-27025

https://www.suse.com/security/cve/CVE-2024-27064

https://www.suse.com/security/cve/CVE-2024-27065

https://www.suse.com/security/cve/CVE-2024-27402

https://www.suse.com/security/cve/CVE-2024-27404

https://www.suse.com/security/cve/CVE-2024-27414

https://www.suse.com/security/cve/CVE-2024-27419

https://www.suse.com/security/cve/CVE-2024-33619

https://www.suse.com/security/cve/CVE-2024-34777

https://www.suse.com/security/cve/CVE-2024-35247

https://www.suse.com/security/cve/CVE-2024-35805

https://www.suse.com/security/cve/CVE-2024-35807

https://www.suse.com/security/cve/CVE-2024-35827

https://www.suse.com/security/cve/CVE-2024-35831

https://www.suse.com/security/cve/CVE-2024-35843

https://www.suse.com/security/cve/CVE-2024-35848

https://www.suse.com/security/cve/CVE-2024-35853

https://www.suse.com/security/cve/CVE-2024-35854

https://www.suse.com/security/cve/CVE-2024-35857

https://www.suse.com/security/cve/CVE-2024-35880

https://www.suse.com/security/cve/CVE-2024-35884

https://www.suse.com/security/cve/CVE-2024-35886

https://www.suse.com/security/cve/CVE-2024-35890

https://www.suse.com/security/cve/CVE-2024-36938

https://www.suse.com/security/cve/CVE-2024-36940

https://www.suse.com/security/cve/CVE-2024-36941

https://www.suse.com/security/cve/CVE-2024-36942

https://www.suse.com/security/cve/CVE-2024-36944

https://www.suse.com/security/cve/CVE-2024-36945

https://www.suse.com/security/cve/CVE-2024-36946

https://www.suse.com/security/cve/CVE-2024-36947

https://www.suse.com/security/cve/CVE-2024-36949

https://www.suse.com/security/cve/CVE-2024-36950

https://www.suse.com/security/cve/CVE-2024-36951

https://bugzilla.suse.com/1227435

https://bugzilla.suse.com/1227443

https://bugzilla.suse.com/1227446

https://bugzilla.suse.com/1227789

https://bugzilla.suse.com/1227797

https://bugzilla.suse.com/1227800

https://bugzilla.suse.com/1227801

https://bugzilla.suse.com/1227803

https://bugzilla.suse.com/1227806

https://bugzilla.suse.com/1227813

https://bugzilla.suse.com/1227814

https://bugzilla.suse.com/1227836

https://bugzilla.suse.com/1227855

https://bugzilla.suse.com/1227862

https://bugzilla.suse.com/1227866

https://bugzilla.suse.com/1227886

https://bugzilla.suse.com/1227899

https://bugzilla.suse.com/1227910

https://bugzilla.suse.com/1227913

https://bugzilla.suse.com/1227926

https://bugzilla.suse.com/1228090

https://bugzilla.suse.com/1228192

https://bugzilla.suse.com/1228193

https://bugzilla.suse.com/1228211

https://bugzilla.suse.com/1228269

https://bugzilla.suse.com/1228289

https://bugzilla.suse.com/1228327

https://bugzilla.suse.com/1228328

https://bugzilla.suse.com/1228403

https://bugzilla.suse.com/1228405

https://bugzilla.suse.com/1228408

https://bugzilla.suse.com/1228417

http://www.nessus.org/u?dded5262

https://www.suse.com/security/cve/CVE-2021-47432

https://www.suse.com/security/cve/CVE-2022-48772

https://www.suse.com/security/cve/CVE-2023-38417

https://www.suse.com/security/cve/CVE-2023-47210

https://www.suse.com/security/cve/CVE-2023-51780

https://www.suse.com/security/cve/CVE-2023-52435

https://www.suse.com/security/cve/CVE-2023-52472

https://www.suse.com/security/cve/CVE-2023-52622

https://www.suse.com/security/cve/CVE-2023-52656

https://www.suse.com/security/cve/CVE-2023-52672

https://www.suse.com/security/cve/CVE-2023-52699

https://www.suse.com/security/cve/CVE-2023-52735

https://www.suse.com/security/cve/CVE-2023-52749

https://www.suse.com/security/cve/CVE-2023-52750

https://www.suse.com/security/cve/CVE-2023-52751

https://www.suse.com/security/cve/CVE-2023-52753

https://www.suse.com/security/cve/CVE-2023-52754

https://www.suse.com/security/cve/CVE-2023-52757

https://www.suse.com/security/cve/CVE-2023-52759

https://www.suse.com/security/cve/CVE-2023-52762

https://www.suse.com/security/cve/CVE-2023-52763

https://www.suse.com/security/cve/CVE-2023-52764

https://www.suse.com/security/cve/CVE-2023-52765

https://www.suse.com/security/cve/CVE-2023-52766

https://www.suse.com/security/cve/CVE-2023-52767

https://www.suse.com/security/cve/CVE-2023-52768

https://www.suse.com/security/cve/CVE-2023-52769

https://www.suse.com/security/cve/CVE-2023-52773

https://www.suse.com/security/cve/CVE-2023-52774

https://www.suse.com/security/cve/CVE-2023-52775

https://www.suse.com/security/cve/CVE-2023-52776

https://www.suse.com/security/cve/CVE-2023-52777

https://www.suse.com/security/cve/CVE-2023-52780

https://www.suse.com/security/cve/CVE-2023-52781

https://www.suse.com/security/cve/CVE-2023-52782

https://www.suse.com/security/cve/CVE-2023-52783

https://www.suse.com/security/cve/CVE-2023-52784

https://www.suse.com/security/cve/CVE-2023-52810

https://www.suse.com/security/cve/CVE-2023-52811

https://www.suse.com/security/cve/CVE-2023-52812

https://www.suse.com/security/cve/CVE-2023-52813

https://www.suse.com/security/cve/CVE-2023-52814

https://www.suse.com/security/cve/CVE-2023-52815

https://www.suse.com/security/cve/CVE-2023-52816

https://www.suse.com/security/cve/CVE-2023-52817

https://www.suse.com/security/cve/CVE-2023-52818

https://www.suse.com/security/cve/CVE-2023-52819

https://www.suse.com/security/cve/CVE-2023-52821

https://www.suse.com/security/cve/CVE-2023-52825

https://www.suse.com/security/cve/CVE-2023-52826

https://www.suse.com/security/cve/CVE-2023-52827

https://www.suse.com/security/cve/CVE-2023-52829

https://www.suse.com/security/cve/CVE-2023-52832

https://www.suse.com/security/cve/CVE-2023-52833

https://www.suse.com/security/cve/CVE-2023-52834

https://www.suse.com/security/cve/CVE-2023-52835

https://www.suse.com/security/cve/CVE-2023-52836

https://www.suse.com/security/cve/CVE-2023-52837

https://www.suse.com/security/cve/CVE-2023-52838

https://www.suse.com/security/cve/CVE-2023-52840

https://www.suse.com/security/cve/CVE-2023-52841

https://www.suse.com/security/cve/CVE-2023-52842

https://www.suse.com/security/cve/CVE-2023-52843

https://www.suse.com/security/cve/CVE-2023-52879

https://www.suse.com/security/cve/CVE-2023-52880

https://www.suse.com/security/cve/CVE-2023-52881

https://www.suse.com/security/cve/CVE-2023-52883

https://www.suse.com/security/cve/CVE-2023-52884

https://www.suse.com/security/cve/CVE-2024-25741

https://www.suse.com/security/cve/CVE-2024-26615

https://www.suse.com/security/cve/CVE-2024-26623

https://www.suse.com/security/cve/CVE-2024-26625

https://www.suse.com/security/cve/CVE-2024-26633

https://www.suse.com/security/cve/CVE-2024-26635

https://www.suse.com/security/cve/CVE-2024-26636

https://www.suse.com/security/cve/CVE-2024-26641

https://www.suse.com/security/cve/CVE-2024-26663

https://www.suse.com/security/cve/CVE-2024-26665

https://www.suse.com/security/cve/CVE-2024-26676

https://www.suse.com/security/cve/CVE-2024-26691

https://www.suse.com/security/cve/CVE-2024-26734

https://www.suse.com/security/cve/CVE-2024-26750

https://www.suse.com/security/cve/CVE-2024-26758

https://www.suse.com/security/cve/CVE-2024-26767

https://www.suse.com/security/cve/CVE-2024-26780

https://www.suse.com/security/cve/CVE-2024-26785

https://www.suse.com/security/cve/CVE-2024-26813

https://www.suse.com/security/cve/CVE-2024-26814

https://www.suse.com/security/cve/CVE-2024-26826

https://www.suse.com/security/cve/CVE-2024-26845

https://www.suse.com/security/cve/CVE-2024-26863

https://www.suse.com/security/cve/CVE-2024-26889

https://www.suse.com/security/cve/CVE-2024-26920

https://www.suse.com/security/cve/CVE-2024-26944

https://www.suse.com/security/cve/CVE-2024-27012

https://www.suse.com/security/cve/CVE-2024-35892

https://www.suse.com/security/cve/CVE-2024-35893

https://www.suse.com/security/cve/CVE-2024-35896

https://www.suse.com/security/cve/CVE-2024-35898

https://www.suse.com/security/cve/CVE-2024-35899

https://www.suse.com/security/cve/CVE-2024-35900

https://www.suse.com/security/cve/CVE-2024-35908

https://www.suse.com/security/cve/CVE-2024-35925

https://www.suse.com/security/cve/CVE-2024-35926

https://www.suse.com/security/cve/CVE-2024-35934

https://www.suse.com/security/cve/CVE-2024-35942

https://www.suse.com/security/cve/CVE-2024-35957

https://www.suse.com/security/cve/CVE-2024-35962

https://www.suse.com/security/cve/CVE-2024-35970

https://www.suse.com/security/cve/CVE-2024-35976

https://www.suse.com/security/cve/CVE-2024-35979

https://www.suse.com/security/cve/CVE-2024-35998

https://www.suse.com/security/cve/CVE-2024-36003

https://www.suse.com/security/cve/CVE-2024-36004

https://www.suse.com/security/cve/CVE-2024-36005

https://www.suse.com/security/cve/CVE-2024-36008

https://www.suse.com/security/cve/CVE-2024-36010

https://www.suse.com/security/cve/CVE-2024-36017

https://www.suse.com/security/cve/CVE-2024-36024

https://www.suse.com/security/cve/CVE-2024-36281

https://www.suse.com/security/cve/CVE-2024-36477

https://www.suse.com/security/cve/CVE-2024-36478

https://www.suse.com/security/cve/CVE-2024-36479

https://www.suse.com/security/cve/CVE-2024-36882

https://www.suse.com/security/cve/CVE-2024-36887

https://www.suse.com/security/cve/CVE-2024-36889

https://www.suse.com/security/cve/CVE-2024-36899

https://www.suse.com/security/cve/CVE-2024-36900

https://www.suse.com/security/cve/CVE-2024-36901

https://www.suse.com/security/cve/CVE-2024-36902

https://www.suse.com/security/cve/CVE-2024-36903

https://www.suse.com/security/cve/CVE-2024-36904

https://www.suse.com/security/cve/CVE-2024-36909

https://www.suse.com/security/cve/CVE-2024-36910

https://www.suse.com/security/cve/CVE-2024-36911

https://www.suse.com/security/cve/CVE-2024-36912

https://www.suse.com/security/cve/CVE-2024-36913

https://www.suse.com/security/cve/CVE-2024-36914

https://www.suse.com/security/cve/CVE-2024-36915

https://www.suse.com/security/cve/CVE-2024-36916

https://www.suse.com/security/cve/CVE-2024-36917

https://www.suse.com/security/cve/CVE-2024-36919

https://www.suse.com/security/cve/CVE-2024-36922

https://www.suse.com/security/cve/CVE-2024-36923

https://www.suse.com/security/cve/CVE-2024-36952

https://www.suse.com/security/cve/CVE-2024-36955

https://www.suse.com/security/cve/CVE-2024-36957

https://www.suse.com/security/cve/CVE-2024-36959

https://www.suse.com/security/cve/CVE-2024-36960

https://www.suse.com/security/cve/CVE-2024-36962

https://www.suse.com/security/cve/CVE-2024-36964

https://www.suse.com/security/cve/CVE-2024-36965

https://www.suse.com/security/cve/CVE-2024-36967

https://www.suse.com/security/cve/CVE-2024-36969

https://www.suse.com/security/cve/CVE-2024-36971

https://www.suse.com/security/cve/CVE-2024-36972

https://www.suse.com/security/cve/CVE-2024-38587

https://www.suse.com/security/cve/CVE-2024-38588

https://www.suse.com/security/cve/CVE-2024-38590

https://www.suse.com/security/cve/CVE-2024-38591

https://www.suse.com/security/cve/CVE-2024-38592

https://www.suse.com/security/cve/CVE-2024-38594

https://www.suse.com/security/cve/CVE-2024-38595

https://www.suse.com/security/cve/CVE-2024-38597

https://www.suse.com/security/cve/CVE-2024-38598

https://www.suse.com/security/cve/CVE-2024-38599

https://www.suse.com/security/cve/CVE-2024-38600

https://www.suse.com/security/cve/CVE-2024-38601

https://www.suse.com/security/cve/CVE-2024-38602

https://www.suse.com/security/cve/CVE-2024-38603

https://www.suse.com/security/cve/CVE-2024-38604

https://www.suse.com/security/cve/CVE-2024-38605

https://www.suse.com/security/cve/CVE-2024-38608

https://www.suse.com/security/cve/CVE-2024-38610

https://www.suse.com/security/cve/CVE-2024-38611

https://www.suse.com/security/cve/CVE-2024-38615

https://www.suse.com/security/cve/CVE-2024-38616

https://www.suse.com/security/cve/CVE-2024-38617

https://www.suse.com/security/cve/CVE-2024-39472

https://www.suse.com/security/cve/CVE-2024-39473

https://www.suse.com/security/cve/CVE-2024-39474

https://www.suse.com/security/cve/CVE-2024-39475

https://www.suse.com/security/cve/CVE-2024-39479

https://www.suse.com/security/cve/CVE-2024-39481

https://www.suse.com/security/cve/CVE-2024-39482

https://www.suse.com/security/cve/CVE-2024-39487

https://www.suse.com/security/cve/CVE-2024-39490

https://www.suse.com/security/cve/CVE-2024-39494

https://www.suse.com/security/cve/CVE-2024-39496

https://www.suse.com/security/cve/CVE-2024-39498

https://www.suse.com/security/cve/CVE-2024-39502

https://www.suse.com/security/cve/CVE-2024-39504

https://www.suse.com/security/cve/CVE-2024-41013

https://www.suse.com/security/cve/CVE-2024-41014

https://www.suse.com/security/cve/CVE-2024-41017

https://www.suse.com/security/cve/CVE-2024-41090

https://www.suse.com/security/cve/CVE-2024-41091

https://www.suse.com/security/cve/CVE-2024-36924

https://www.suse.com/security/cve/CVE-2024-36926

https://www.suse.com/security/cve/CVE-2024-36930

https://www.suse.com/security/cve/CVE-2024-36934

https://www.suse.com/security/cve/CVE-2024-36935

https://www.suse.com/security/cve/CVE-2024-36937

https://www.suse.com/security/cve/CVE-2024-36973

https://www.suse.com/security/cve/CVE-2024-36974

https://www.suse.com/security/cve/CVE-2024-36975

https://www.suse.com/security/cve/CVE-2024-36977

https://www.suse.com/security/cve/CVE-2024-36978

https://www.suse.com/security/cve/CVE-2024-37021

https://www.suse.com/security/cve/CVE-2024-37078

https://www.suse.com/security/cve/CVE-2024-37353

https://www.suse.com/security/cve/CVE-2024-37354

https://www.suse.com/security/cve/CVE-2024-38381

https://www.suse.com/security/cve/CVE-2024-38384

https://www.suse.com/security/cve/CVE-2024-38385

https://www.suse.com/security/cve/CVE-2024-38388

https://www.suse.com/security/cve/CVE-2024-38390

https://www.suse.com/security/cve/CVE-2024-38391

https://www.suse.com/security/cve/CVE-2024-38539

https://www.suse.com/security/cve/CVE-2024-38540

https://www.suse.com/security/cve/CVE-2024-38541

https://www.suse.com/security/cve/CVE-2024-38543

https://www.suse.com/security/cve/CVE-2024-38544

https://www.suse.com/security/cve/CVE-2024-38545

https://www.suse.com/security/cve/CVE-2024-38546

https://www.suse.com/security/cve/CVE-2024-38547

https://www.suse.com/security/cve/CVE-2024-38548

https://www.suse.com/security/cve/CVE-2024-38549

https://www.suse.com/security/cve/CVE-2024-38550

https://www.suse.com/security/cve/CVE-2024-38551

https://www.suse.com/security/cve/CVE-2024-38552

https://www.suse.com/security/cve/CVE-2024-38553

https://www.suse.com/security/cve/CVE-2024-38554

https://www.suse.com/security/cve/CVE-2024-38555

https://www.suse.com/security/cve/CVE-2024-38556

https://www.suse.com/security/cve/CVE-2024-38557

https://www.suse.com/security/cve/CVE-2024-38558

https://www.suse.com/security/cve/CVE-2024-38559

https://www.suse.com/security/cve/CVE-2024-38560

https://www.suse.com/security/cve/CVE-2024-38562

https://www.suse.com/security/cve/CVE-2024-38564

https://www.suse.com/security/cve/CVE-2024-38565

https://www.suse.com/security/cve/CVE-2024-38566

https://www.suse.com/security/cve/CVE-2024-38567

https://www.suse.com/security/cve/CVE-2024-38568

https://www.suse.com/security/cve/CVE-2024-38569

https://www.suse.com/security/cve/CVE-2024-38570

https://www.suse.com/security/cve/CVE-2024-38571

https://www.suse.com/security/cve/CVE-2024-38572

https://www.suse.com/security/cve/CVE-2024-38573

https://www.suse.com/security/cve/CVE-2024-38575

https://www.suse.com/security/cve/CVE-2024-38578

https://www.suse.com/security/cve/CVE-2024-38579

https://www.suse.com/security/cve/CVE-2024-38580

https://www.suse.com/security/cve/CVE-2024-38581

https://www.suse.com/security/cve/CVE-2024-38582

https://www.suse.com/security/cve/CVE-2024-38583

https://www.suse.com/security/cve/CVE-2024-38586

https://www.suse.com/security/cve/CVE-2024-38618

https://www.suse.com/security/cve/CVE-2024-38619

https://www.suse.com/security/cve/CVE-2024-38621

https://www.suse.com/security/cve/CVE-2024-38622

https://www.suse.com/security/cve/CVE-2024-38627

https://www.suse.com/security/cve/CVE-2024-38628

https://www.suse.com/security/cve/CVE-2024-38629

https://www.suse.com/security/cve/CVE-2024-38630

https://www.suse.com/security/cve/CVE-2024-38633

https://www.suse.com/security/cve/CVE-2024-38634

https://www.suse.com/security/cve/CVE-2024-38635

https://www.suse.com/security/cve/CVE-2024-38636

https://www.suse.com/security/cve/CVE-2024-38659

https://www.suse.com/security/cve/CVE-2024-38661

https://www.suse.com/security/cve/CVE-2024-38663

https://www.suse.com/security/cve/CVE-2024-38664

https://www.suse.com/security/cve/CVE-2024-38780

https://www.suse.com/security/cve/CVE-2024-39276

https://www.suse.com/security/cve/CVE-2024-39277

https://www.suse.com/security/cve/CVE-2024-39291

https://www.suse.com/security/cve/CVE-2024-39296

https://www.suse.com/security/cve/CVE-2024-39301

https://www.suse.com/security/cve/CVE-2024-39362

https://www.suse.com/security/cve/CVE-2024-39371

https://www.suse.com/security/cve/CVE-2024-39463

https://www.suse.com/security/cve/CVE-2024-39466

https://www.suse.com/security/cve/CVE-2024-39468

https://www.suse.com/security/cve/CVE-2024-39469

https://www.suse.com/security/cve/CVE-2024-39471

https://www.suse.com/security/cve/CVE-2024-39507

https://www.suse.com/security/cve/CVE-2024-40901

https://www.suse.com/security/cve/CVE-2024-40906

https://www.suse.com/security/cve/CVE-2024-40908

https://www.suse.com/security/cve/CVE-2024-40919

https://www.suse.com/security/cve/CVE-2024-40923

https://www.suse.com/security/cve/CVE-2024-40925

https://www.suse.com/security/cve/CVE-2024-40928

https://www.suse.com/security/cve/CVE-2024-40931

https://www.suse.com/security/cve/CVE-2024-40935

https://www.suse.com/security/cve/CVE-2024-40937

https://www.suse.com/security/cve/CVE-2024-40940

https://www.suse.com/security/cve/CVE-2024-40947

https://www.suse.com/security/cve/CVE-2024-40948

https://www.suse.com/security/cve/CVE-2024-40953

https://www.suse.com/security/cve/CVE-2024-40960

https://www.suse.com/security/cve/CVE-2024-40961

https://www.suse.com/security/cve/CVE-2024-40966

https://www.suse.com/security/cve/CVE-2024-40970

https://www.suse.com/security/cve/CVE-2024-40972

https://www.suse.com/security/cve/CVE-2024-40975

https://www.suse.com/security/cve/CVE-2024-40979

https://www.suse.com/security/cve/CVE-2024-40998

https://www.suse.com/security/cve/CVE-2024-40999

https://www.suse.com/security/cve/CVE-2024-41006

https://www.suse.com/security/cve/CVE-2024-41011

Plugin Details

Severity: High

ID: 205492

File Name: suse_SU-2024-2896-1.nasl

Version: 1.4

Type: local

Agent: unix

Published: 8/14/2024

Updated: 9/9/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.0

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-41011

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.2

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-source-azure, p-cpe:/a:novell:suse_linux:kernel-syms-azure, p-cpe:/a:novell:suse_linux:kernel-azure-devel, p-cpe:/a:novell:suse_linux:kernel-devel-azure, p-cpe:/a:novell:suse_linux:kernel-azure, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/13/2024

Vulnerability Publication Date: 12/13/2023

CISA Known Exploited Vulnerability Due Dates: 8/28/2024

Reference Information

CVE: CVE-2021-47432, CVE-2022-48772, CVE-2023-38417, CVE-2023-47210, CVE-2023-51780, CVE-2023-52435, CVE-2023-52472, CVE-2023-52622, CVE-2023-52656, CVE-2023-52672, CVE-2023-52699, CVE-2023-52735, CVE-2023-52749, CVE-2023-52750, CVE-2023-52751, CVE-2023-52753, CVE-2023-52754, CVE-2023-52757, CVE-2023-52759, CVE-2023-52762, CVE-2023-52763, CVE-2023-52764, CVE-2023-52765, CVE-2023-52766, CVE-2023-52767, CVE-2023-52768, CVE-2023-52769, CVE-2023-52773, CVE-2023-52774, CVE-2023-52775, CVE-2023-52776, CVE-2023-52777, CVE-2023-52780, CVE-2023-52781, CVE-2023-52782, CVE-2023-52783, CVE-2023-52784, CVE-2023-52786, CVE-2023-52787, CVE-2023-52788, CVE-2023-52789, CVE-2023-52791, CVE-2023-52792, CVE-2023-52794, CVE-2023-52795, CVE-2023-52796, CVE-2023-52798, CVE-2023-52799, CVE-2023-52800, CVE-2023-52801, CVE-2023-52803, CVE-2023-52804, CVE-2023-52805, CVE-2023-52806, CVE-2023-52807, CVE-2023-52808, CVE-2023-52809, CVE-2023-52810, CVE-2023-52811, CVE-2023-52812, CVE-2023-52813, CVE-2023-52814, CVE-2023-52815, CVE-2023-52816, CVE-2023-52817, CVE-2023-52818, CVE-2023-52819, CVE-2023-52821, CVE-2023-52825, CVE-2023-52826, CVE-2023-52827, CVE-2023-52829, CVE-2023-52832, CVE-2023-52833, CVE-2023-52834, CVE-2023-52835, CVE-2023-52836, CVE-2023-52837, CVE-2023-52838, CVE-2023-52840, CVE-2023-52841, CVE-2023-52842, CVE-2023-52843, CVE-2023-52844, CVE-2023-52845, CVE-2023-52846, CVE-2023-52847, CVE-2023-52849, CVE-2023-52850, CVE-2023-52851, CVE-2023-52853, CVE-2023-52854, CVE-2023-52855, CVE-2023-52856, CVE-2023-52857, CVE-2023-52858, CVE-2023-52861, CVE-2023-52862, CVE-2023-52863, CVE-2023-52864, CVE-2023-52865, CVE-2023-52866, CVE-2023-52867, CVE-2023-52868, CVE-2023-52869, CVE-2023-52870, CVE-2023-52871, CVE-2023-52872, CVE-2023-52873, CVE-2023-52874, CVE-2023-52875, CVE-2023-52876, CVE-2023-52877, CVE-2023-52878, CVE-2023-52879, CVE-2023-52880, CVE-2023-52881, CVE-2023-52883, CVE-2023-52884, CVE-2024-25741, CVE-2024-26615, CVE-2024-26623, CVE-2024-26625, CVE-2024-26633, CVE-2024-26635, CVE-2024-26636, CVE-2024-26641, CVE-2024-26663, CVE-2024-26665, CVE-2024-26676, CVE-2024-26691, CVE-2024-26734, CVE-2024-26750, CVE-2024-26758, CVE-2024-26767, CVE-2024-26780, CVE-2024-26785, CVE-2024-26813, CVE-2024-26814, CVE-2024-26826, CVE-2024-26845, CVE-2024-26863, CVE-2024-26889, CVE-2024-26920, CVE-2024-26944, CVE-2024-27012, CVE-2024-27015, CVE-2024-27016, CVE-2024-27019, CVE-2024-27020, CVE-2024-27025, CVE-2024-27064, CVE-2024-27065, CVE-2024-27402, CVE-2024-27404, CVE-2024-27414, CVE-2024-27419, CVE-2024-33619, CVE-2024-34777, CVE-2024-35247, CVE-2024-35805, CVE-2024-35807, CVE-2024-35827, CVE-2024-35831, CVE-2024-35843, CVE-2024-35848, CVE-2024-35853, CVE-2024-35854, CVE-2024-35857, CVE-2024-35880, CVE-2024-35884, CVE-2024-35886, CVE-2024-35890, CVE-2024-35892, CVE-2024-35893, CVE-2024-35896, CVE-2024-35898, CVE-2024-35899, CVE-2024-35900, CVE-2024-35908, CVE-2024-35925, CVE-2024-35926, CVE-2024-35934, CVE-2024-35942, CVE-2024-35957, CVE-2024-35962, CVE-2024-35970, CVE-2024-35976, CVE-2024-35979, CVE-2024-35998, CVE-2024-36003, CVE-2024-36004, CVE-2024-36005, CVE-2024-36008, CVE-2024-36010, CVE-2024-36017, CVE-2024-36024, CVE-2024-36281, CVE-2024-36477, CVE-2024-36478, CVE-2024-36479, CVE-2024-36882, CVE-2024-36887, CVE-2024-36889, CVE-2024-36899, CVE-2024-36900, CVE-2024-36901, CVE-2024-36902, CVE-2024-36903, CVE-2024-36904, CVE-2024-36909, CVE-2024-36910, CVE-2024-36911, CVE-2024-36912, CVE-2024-36913, CVE-2024-36914, CVE-2024-36915, CVE-2024-36916, CVE-2024-36917, CVE-2024-36919, CVE-2024-36922, CVE-2024-36923, CVE-2024-36924, CVE-2024-36926, CVE-2024-36930, CVE-2024-36934, CVE-2024-36935, CVE-2024-36937, CVE-2024-36938, CVE-2024-36940, CVE-2024-36941, CVE-2024-36942, CVE-2024-36944, CVE-2024-36945, CVE-2024-36946, CVE-2024-36947, CVE-2024-36949, CVE-2024-36950, CVE-2024-36951, CVE-2024-36952, CVE-2024-36955, CVE-2024-36957, CVE-2024-36959, CVE-2024-36960, CVE-2024-36962, CVE-2024-36964, CVE-2024-36965, CVE-2024-36967, CVE-2024-36969, CVE-2024-36971, CVE-2024-36972, CVE-2024-36973, CVE-2024-36974, CVE-2024-36975, CVE-2024-36977, CVE-2024-36978, CVE-2024-37021, CVE-2024-37078, CVE-2024-37353, CVE-2024-37354, CVE-2024-38381, CVE-2024-38384, CVE-2024-38385, CVE-2024-38388, CVE-2024-38390, CVE-2024-38391, CVE-2024-38539, CVE-2024-38540, CVE-2024-38541, CVE-2024-38543, CVE-2024-38544, CVE-2024-38545, CVE-2024-38546, CVE-2024-38547, CVE-2024-38548, CVE-2024-38549, CVE-2024-38550, CVE-2024-38551, CVE-2024-38552, CVE-2024-38553, CVE-2024-38554, CVE-2024-38555, CVE-2024-38556, CVE-2024-38557, CVE-2024-38558, CVE-2024-38559, CVE-2024-38560, CVE-2024-38562, CVE-2024-38564, CVE-2024-38565, CVE-2024-38566, CVE-2024-38567, CVE-2024-38568, CVE-2024-38569, CVE-2024-38570, CVE-2024-38571, CVE-2024-38572, CVE-2024-38573, CVE-2024-38575, CVE-2024-38578, CVE-2024-38579, CVE-2024-38580, CVE-2024-38581, CVE-2024-38582, CVE-2024-38583, CVE-2024-38586, CVE-2024-38587, CVE-2024-38588, CVE-2024-38590, CVE-2024-38591, CVE-2024-38592, CVE-2024-38594, CVE-2024-38595, CVE-2024-38597, CVE-2024-38598, CVE-2024-38599, CVE-2024-38600, CVE-2024-38601, CVE-2024-38602, CVE-2024-38603, CVE-2024-38604, CVE-2024-38605, CVE-2024-38608, CVE-2024-38610, CVE-2024-38611, CVE-2024-38615, CVE-2024-38616, CVE-2024-38617, CVE-2024-38618, CVE-2024-38619, CVE-2024-38621, CVE-2024-38622, CVE-2024-38627, CVE-2024-38628, CVE-2024-38629, CVE-2024-38630, CVE-2024-38633, CVE-2024-38634, CVE-2024-38635, CVE-2024-38636, CVE-2024-38659, CVE-2024-38661, CVE-2024-38663, CVE-2024-38664, CVE-2024-38780, CVE-2024-39276, CVE-2024-39277, CVE-2024-39291, CVE-2024-39296, CVE-2024-39301, CVE-2024-39362, CVE-2024-39371, CVE-2024-39463, CVE-2024-39466, CVE-2024-39468, CVE-2024-39469, CVE-2024-39471, CVE-2024-39472, CVE-2024-39473, CVE-2024-39474, CVE-2024-39475, CVE-2024-39479, CVE-2024-39481, CVE-2024-39482, CVE-2024-39487, CVE-2024-39490, CVE-2024-39494, CVE-2024-39496, CVE-2024-39498, CVE-2024-39502, CVE-2024-39504, CVE-2024-39507, CVE-2024-40901, CVE-2024-40906, CVE-2024-40908, CVE-2024-40919, CVE-2024-40923, CVE-2024-40925, CVE-2024-40928, CVE-2024-40931, CVE-2024-40935, CVE-2024-40937, CVE-2024-40940, CVE-2024-40947, CVE-2024-40948, CVE-2024-40953, CVE-2024-40960, CVE-2024-40961, CVE-2024-40966, CVE-2024-40970, CVE-2024-40972, CVE-2024-40975, CVE-2024-40979, CVE-2024-40998, CVE-2024-40999, CVE-2024-41006, CVE-2024-41011, CVE-2024-41013, CVE-2024-41014, CVE-2024-41017, CVE-2024-41090, CVE-2024-41091

SuSE: SUSE-SU-2024:2896-1