SUSE SLES15 / openSUSE 15 Security Update : kernel (SUSE-SU-2025:0117-1)

high Nessus Plugin ID 214250

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:0117-1 advisory.

The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).
- CVE-2024-27397: netfilter: nf_tables: use timestamp to check for set element timeout (bsc#1224095).
- CVE-2024-35839: kABI fix for netfilter: bridge: replace physindev with physinif in nf_bridge_info (bsc#1224726).
- CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758).
- CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526).
- CVE-2024-44934: net: bridge: mcast: wait for previous gc cycles when removing port (bsc#1229809).
- CVE-2024-44996: vsock: fix recursive ->recvmsg calls (bsc#1230205).
- CVE-2024-47678: icmp: change the order of rate limits (bsc#1231854).
- CVE-2024-50018: net: napi: Prevent overflow of napi_defer_hard_irqs (bsc#1232419).
- CVE-2024-50039: kABI: Restore deleted EXPORT_SYMBOL(__qdisc_calculate_pkt_len) (bsc#1231909).
- CVE-2024-50202: nilfs2: propagate directory read errors from nilfs_find_entry() (bsc#1233324).
- CVE-2024-50256: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (bsc#1233200).
- CVE-2024-50262: bpf: Fix out-of-bounds write in trie_get_next_key() (bsc#1233239).
- CVE-2024-50278, CVE-2024-50280: dm cache: fix flushing uninitialized delayed_work on cache_ctr error (bsc#1233467).
- CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first resume (bsc#1233467).
- CVE-2024-53050: drm/i915/hdcp: Add encoder check in hdcp2_get_capability (bsc#1233546).
- CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558).
- CVE-2024-53090: afs: Fix lock recursion (bsc#1233637).
- CVE-2024-53099: bpf: Check validity of link->type in bpf_link_show_fdinfo() (bsc#1233772).
- CVE-2024-53105: mm: page_alloc: move mlocked flag clearance into free_pages_prepare() (bsc#1234069).
- CVE-2024-53111: mm/mremap: fix address wraparound in move_page_tables() (bsc#1234086).
- CVE-2024-53113: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof (bsc#1234077).
- CVE-2024-53117: virtio/vsock: Improve MSG_ZEROCOPY error handling (bsc#1234079).
- CVE-2024-53118: vsock: Fix sk_error_queue memory leak (bsc#1234071).
- CVE-2024-53119: virtio/vsock: Fix accept_queue memory leak (bsc#1234073).
- CVE-2024-53122: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (bsc#1234076).
- CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156).
- CVE-2024-53130: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint (bsc#1234219).
- CVE-2024-53131: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint (bsc#1234220).
- CVE-2024-53133: drm/amd/display: Handle dml allocation failure to avoid crash (bsc#1234221)
- CVE-2024-53134: pmdomain: imx93-blk-ctrl: correct remove path (bsc#1234159).
- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).
- CVE-2024-53160: rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu (bsc#1234810).
- CVE-2024-53161: EDAC/bluefield: Fix potential integer overflow (bsc#1234856).
- CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921).
- CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004).
- CVE-2024-53216: nfsd: fix UAF when access ex_uuid or ex_stats (bsc#1235003).
- CVE-2024-53222: zram: fix NULL pointer in comp_algorithm_show() (bsc#1234974).
- CVE-2024-53234: erofs: handle NONHEAD !delta[1] lclusters gracefully (bsc#1235045).
- CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281).
- CVE-2024-53241: x86/xen: use new hypercall functions instead of hypercall page (bsc#1234282).
- CVE-2024-56549: cachefiles: Fix NULL pointer dereference in object->file (bsc#1234912).
- CVE-2024-56566: mm/slub: Avoid list corruption when removing a slab from the full list (bsc#1235033).
- CVE-2024-56582: btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235128).
- CVE-2024-56599: wifi: ath10k: avoid NULL pointer error during sdio remove (bsc#1235138).
- CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056).
- CVE-2024-56755: netfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING (bsc#1234920).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1214954

https://bugzilla.suse.com/1216813

https://bugzilla.suse.com/1220773

https://bugzilla.suse.com/1224095

https://bugzilla.suse.com/1224726

https://bugzilla.suse.com/1225743

https://bugzilla.suse.com/1225758

https://bugzilla.suse.com/1225820

https://bugzilla.suse.com/1227445

https://bugzilla.suse.com/1228526

https://bugzilla.suse.com/1229809

https://bugzilla.suse.com/1230205

https://bugzilla.suse.com/1230413

https://bugzilla.suse.com/1230697

https://bugzilla.suse.com/1231854

https://bugzilla.suse.com/1231909

https://bugzilla.suse.com/1231963

https://bugzilla.suse.com/1232193

https://bugzilla.suse.com/1232198

https://bugzilla.suse.com/1232201

https://bugzilla.suse.com/1232418

https://bugzilla.suse.com/1232419

https://bugzilla.suse.com/1232420

https://bugzilla.suse.com/1232421

https://bugzilla.suse.com/1232436

https://bugzilla.suse.com/1233038

https://bugzilla.suse.com/1233070

https://bugzilla.suse.com/1233096

https://bugzilla.suse.com/1233200

https://bugzilla.suse.com/1233204

https://bugzilla.suse.com/1233239

https://bugzilla.suse.com/1233259

https://bugzilla.suse.com/1233260

https://bugzilla.suse.com/1233324

https://bugzilla.suse.com/1233328

https://bugzilla.suse.com/1233461

https://bugzilla.suse.com/1233467

https://www.suse.com/security/cve/CVE-2024-53126

https://www.suse.com/security/cve/CVE-2024-53127

https://www.suse.com/security/cve/CVE-2024-53129

https://www.suse.com/security/cve/CVE-2024-53130

https://www.suse.com/security/cve/CVE-2024-53131

https://www.suse.com/security/cve/CVE-2024-53133

https://www.suse.com/security/cve/CVE-2024-53134

https://www.suse.com/security/cve/CVE-2024-53136

https://www.suse.com/security/cve/CVE-2024-53141

https://www.suse.com/security/cve/CVE-2024-53142

https://www.suse.com/security/cve/CVE-2024-53144

https://www.suse.com/security/cve/CVE-2024-53146

https://www.suse.com/security/cve/CVE-2024-53148

https://www.suse.com/security/cve/CVE-2024-53150

https://www.suse.com/security/cve/CVE-2024-53151

https://www.suse.com/security/cve/CVE-2024-53154

https://www.suse.com/security/cve/CVE-2024-53155

https://www.suse.com/security/cve/CVE-2024-53156

https://www.suse.com/security/cve/CVE-2024-53157

https://www.suse.com/security/cve/CVE-2024-53158

https://www.suse.com/security/cve/CVE-2024-53159

https://www.suse.com/security/cve/CVE-2024-53160

https://www.suse.com/security/cve/CVE-2024-53161

https://www.suse.com/security/cve/CVE-2024-53162

https://www.suse.com/security/cve/CVE-2024-53166

https://www.suse.com/security/cve/CVE-2024-53169

https://www.suse.com/security/cve/CVE-2024-53171

https://www.suse.com/security/cve/CVE-2024-53173

https://www.suse.com/security/cve/CVE-2024-53174

https://www.suse.com/security/cve/CVE-2024-53179

https://www.suse.com/security/cve/CVE-2024-53180

https://www.suse.com/security/cve/CVE-2024-53188

https://www.suse.com/security/cve/CVE-2024-53190

https://www.suse.com/security/cve/CVE-2024-53191

https://www.suse.com/security/cve/CVE-2024-53200

https://www.suse.com/security/cve/CVE-2024-53201

https://www.suse.com/security/cve/CVE-2024-53202

https://www.suse.com/security/cve/CVE-2024-53206

https://www.suse.com/security/cve/CVE-2024-53207

https://www.suse.com/security/cve/CVE-2024-53208

https://www.suse.com/security/cve/CVE-2024-53209

https://www.suse.com/security/cve/CVE-2024-53210

https://www.suse.com/security/cve/CVE-2024-53213

https://www.suse.com/security/cve/CVE-2024-53214

https://www.suse.com/security/cve/CVE-2024-53215

https://www.suse.com/security/cve/CVE-2024-53216

https://www.suse.com/security/cve/CVE-2024-53217

https://www.suse.com/security/cve/CVE-2024-53222

https://www.suse.com/security/cve/CVE-2024-53224

https://www.suse.com/security/cve/CVE-2024-53229

https://www.suse.com/security/cve/CVE-2024-53234

https://www.suse.com/security/cve/CVE-2024-53237

https://www.suse.com/security/cve/CVE-2024-53240

https://www.suse.com/security/cve/CVE-2024-53241

https://www.suse.com/security/cve/CVE-2024-56536

https://www.suse.com/security/cve/CVE-2024-56539

https://www.suse.com/security/cve/CVE-2024-56549

https://www.suse.com/security/cve/CVE-2024-56551

https://www.suse.com/security/cve/CVE-2024-56562

https://www.suse.com/security/cve/CVE-2024-56566

https://www.suse.com/security/cve/CVE-2024-56567

https://bugzilla.suse.com/1233468

https://bugzilla.suse.com/1233469

https://bugzilla.suse.com/1233546

https://bugzilla.suse.com/1233558

https://bugzilla.suse.com/1233637

https://bugzilla.suse.com/1233642

https://bugzilla.suse.com/1233772

https://bugzilla.suse.com/1233837

https://bugzilla.suse.com/1234024

https://bugzilla.suse.com/1234069

https://bugzilla.suse.com/1234071

https://bugzilla.suse.com/1234073

https://bugzilla.suse.com/1234075

https://bugzilla.suse.com/1234076

https://bugzilla.suse.com/1234077

https://bugzilla.suse.com/1234079

https://bugzilla.suse.com/1234086

https://bugzilla.suse.com/1234139

https://bugzilla.suse.com/1234140

https://bugzilla.suse.com/1234141

https://bugzilla.suse.com/1234142

https://bugzilla.suse.com/1234143

https://bugzilla.suse.com/1234144

https://bugzilla.suse.com/1234145

https://bugzilla.suse.com/1234146

https://bugzilla.suse.com/1234147

https://bugzilla.suse.com/1234148

https://bugzilla.suse.com/1234149

https://bugzilla.suse.com/1234150

https://bugzilla.suse.com/1234153

https://bugzilla.suse.com/1234155

https://bugzilla.suse.com/1234156

https://bugzilla.suse.com/1234158

https://bugzilla.suse.com/1234159

https://bugzilla.suse.com/1234160

https://bugzilla.suse.com/1234161

https://bugzilla.suse.com/1234162

https://bugzilla.suse.com/1234163

https://bugzilla.suse.com/1234164

https://bugzilla.suse.com/1234165

https://bugzilla.suse.com/1234166

https://bugzilla.suse.com/1234167

https://bugzilla.suse.com/1234168

https://bugzilla.suse.com/1234169

https://bugzilla.suse.com/1234170

https://bugzilla.suse.com/1234171

https://bugzilla.suse.com/1234172

https://bugzilla.suse.com/1234173

https://bugzilla.suse.com/1234174

https://bugzilla.suse.com/1234175

https://bugzilla.suse.com/1234176

https://bugzilla.suse.com/1234177

https://bugzilla.suse.com/1234178

https://bugzilla.suse.com/1234179

https://bugzilla.suse.com/1234180

https://bugzilla.suse.com/1234181

https://bugzilla.suse.com/1234182

https://bugzilla.suse.com/1234183

https://bugzilla.suse.com/1234184

https://bugzilla.suse.com/1234185

https://bugzilla.suse.com/1234186

https://bugzilla.suse.com/1234187

https://bugzilla.suse.com/1234188

https://bugzilla.suse.com/1234189

https://bugzilla.suse.com/1234190

https://bugzilla.suse.com/1234191

https://bugzilla.suse.com/1234192

https://bugzilla.suse.com/1234193

https://bugzilla.suse.com/1234194

https://bugzilla.suse.com/1234195

https://bugzilla.suse.com/1234196

https://bugzilla.suse.com/1234197

https://bugzilla.suse.com/1234198

https://bugzilla.suse.com/1234199

https://bugzilla.suse.com/1234200

https://bugzilla.suse.com/1234201

https://bugzilla.suse.com/1234203

https://bugzilla.suse.com/1234204

https://bugzilla.suse.com/1234205

https://bugzilla.suse.com/1234207

https://bugzilla.suse.com/1234208

https://bugzilla.suse.com/1234209

https://bugzilla.suse.com/1234219

https://bugzilla.suse.com/1234220

https://bugzilla.suse.com/1234221

https://bugzilla.suse.com/1234237

https://bugzilla.suse.com/1234238

https://bugzilla.suse.com/1234239

https://bugzilla.suse.com/1234240

https://bugzilla.suse.com/1234241

https://bugzilla.suse.com/1234242

https://bugzilla.suse.com/1234243

https://bugzilla.suse.com/1234278

https://bugzilla.suse.com/1234279

https://bugzilla.suse.com/1234280

https://bugzilla.suse.com/1234281

https://bugzilla.suse.com/1234282

https://bugzilla.suse.com/1234294

https://bugzilla.suse.com/1234338

https://bugzilla.suse.com/1234357

https://bugzilla.suse.com/1234381

https://bugzilla.suse.com/1234454

https://bugzilla.suse.com/1234464

https://bugzilla.suse.com/1234605

https://bugzilla.suse.com/1234651

https://bugzilla.suse.com/1234652

https://bugzilla.suse.com/1234654

https://bugzilla.suse.com/1234655

https://bugzilla.suse.com/1234657

https://bugzilla.suse.com/1234658

https://bugzilla.suse.com/1234659

https://bugzilla.suse.com/1234668

https://bugzilla.suse.com/1234690

https://bugzilla.suse.com/1234725

https://bugzilla.suse.com/1234726

https://bugzilla.suse.com/1234810

https://bugzilla.suse.com/1234811

https://bugzilla.suse.com/1234826

https://bugzilla.suse.com/1234827

https://bugzilla.suse.com/1234829

https://www.suse.com/security/cve/CVE-2024-56576

https://www.suse.com/security/cve/CVE-2024-56582

https://www.suse.com/security/cve/CVE-2024-56599

https://www.suse.com/security/cve/CVE-2024-56604

https://www.suse.com/security/cve/CVE-2024-56605

https://www.suse.com/security/cve/CVE-2024-56645

https://www.suse.com/security/cve/CVE-2024-56667

https://www.suse.com/security/cve/CVE-2024-56752

https://www.suse.com/security/cve/CVE-2024-56754

https://www.suse.com/security/cve/CVE-2024-56755

https://www.suse.com/security/cve/CVE-2024-56756

https://www.suse.com/security/cve/CVE-2024-8805

https://bugzilla.suse.com/1234832

https://bugzilla.suse.com/1234834

https://bugzilla.suse.com/1234843

https://bugzilla.suse.com/1234846

https://bugzilla.suse.com/1234848

https://bugzilla.suse.com/1234853

https://bugzilla.suse.com/1234855

https://bugzilla.suse.com/1234856

https://bugzilla.suse.com/1234884

https://bugzilla.suse.com/1234889

https://bugzilla.suse.com/1234891

https://bugzilla.suse.com/1234899

https://bugzilla.suse.com/1234900

https://bugzilla.suse.com/1234905

https://bugzilla.suse.com/1234907

https://bugzilla.suse.com/1234909

https://bugzilla.suse.com/1234911

https://bugzilla.suse.com/1234912

https://bugzilla.suse.com/1234916

https://bugzilla.suse.com/1234918

https://bugzilla.suse.com/1234920

https://bugzilla.suse.com/1234921

https://bugzilla.suse.com/1234922

https://bugzilla.suse.com/1234929

https://bugzilla.suse.com/1234930

https://bugzilla.suse.com/1234937

https://bugzilla.suse.com/1234948

https://bugzilla.suse.com/1234950

https://bugzilla.suse.com/1234952

https://bugzilla.suse.com/1234960

https://bugzilla.suse.com/1234962

https://bugzilla.suse.com/1234963

https://bugzilla.suse.com/1234968

https://bugzilla.suse.com/1234969

https://bugzilla.suse.com/1234970

https://bugzilla.suse.com/1234971

https://bugzilla.suse.com/1234973

https://bugzilla.suse.com/1234974

https://bugzilla.suse.com/1234989

https://bugzilla.suse.com/1234999

https://bugzilla.suse.com/1235002

https://bugzilla.suse.com/1235003

https://bugzilla.suse.com/1235004

https://bugzilla.suse.com/1235007

https://bugzilla.suse.com/1235009

https://bugzilla.suse.com/1235016

https://bugzilla.suse.com/1235019

https://bugzilla.suse.com/1235033

https://bugzilla.suse.com/1235045

https://bugzilla.suse.com/1235056

https://bugzilla.suse.com/1235061

https://bugzilla.suse.com/1235075

https://bugzilla.suse.com/1235108

https://bugzilla.suse.com/1235128

https://bugzilla.suse.com/1235134

https://bugzilla.suse.com/1235138

https://bugzilla.suse.com/1235246

https://bugzilla.suse.com/1235406

https://bugzilla.suse.com/1235409

https://bugzilla.suse.com/1235416

https://bugzilla.suse.com/1235507

https://bugzilla.suse.com/1235550

http://www.nessus.org/u?3a58d0fb

https://www.suse.com/security/cve/CVE-2024-26924

https://www.suse.com/security/cve/CVE-2024-27397

https://www.suse.com/security/cve/CVE-2024-35839

https://www.suse.com/security/cve/CVE-2024-36908

https://www.suse.com/security/cve/CVE-2024-36915

https://www.suse.com/security/cve/CVE-2024-39480

https://www.suse.com/security/cve/CVE-2024-41042

https://www.suse.com/security/cve/CVE-2024-44934

https://www.suse.com/security/cve/CVE-2024-44996

https://www.suse.com/security/cve/CVE-2024-47678

https://www.suse.com/security/cve/CVE-2024-49854

https://www.suse.com/security/cve/CVE-2024-49884

https://www.suse.com/security/cve/CVE-2024-49915

https://www.suse.com/security/cve/CVE-2024-50016

https://www.suse.com/security/cve/CVE-2024-50018

https://www.suse.com/security/cve/CVE-2024-50039

https://www.suse.com/security/cve/CVE-2024-50047

https://www.suse.com/security/cve/CVE-2024-50143

https://www.suse.com/security/cve/CVE-2024-50154

https://www.suse.com/security/cve/CVE-2024-50202

https://www.suse.com/security/cve/CVE-2024-50203

https://www.suse.com/security/cve/CVE-2024-50211

https://www.suse.com/security/cve/CVE-2024-50228

https://www.suse.com/security/cve/CVE-2024-50256

https://www.suse.com/security/cve/CVE-2024-50262

https://www.suse.com/security/cve/CVE-2024-50272

https://www.suse.com/security/cve/CVE-2024-50278

https://www.suse.com/security/cve/CVE-2024-50279

https://www.suse.com/security/cve/CVE-2024-50280

https://www.suse.com/security/cve/CVE-2024-53050

https://www.suse.com/security/cve/CVE-2024-53064

https://www.suse.com/security/cve/CVE-2024-53090

https://www.suse.com/security/cve/CVE-2024-53099

https://www.suse.com/security/cve/CVE-2024-53103

https://www.suse.com/security/cve/CVE-2024-53105

https://www.suse.com/security/cve/CVE-2024-53111

https://www.suse.com/security/cve/CVE-2024-53113

https://www.suse.com/security/cve/CVE-2024-53117

https://www.suse.com/security/cve/CVE-2024-53118

https://www.suse.com/security/cve/CVE-2024-53119

https://www.suse.com/security/cve/CVE-2024-53120

https://www.suse.com/security/cve/CVE-2024-53122

https://www.suse.com/security/cve/CVE-2024-53125

Plugin Details

Severity: High

ID: 214250

File Name: suse_SU-2025-0117-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 1/16/2025

Updated: 1/16/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 8.3

Temporal Score: 6.1

Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2024-8805

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-source-azure, p-cpe:/a:novell:suse_linux:kernel-syms-azure, p-cpe:/a:novell:suse_linux:kernel-azure-devel, p-cpe:/a:novell:suse_linux:kernel-devel-azure, p-cpe:/a:novell:suse_linux:kernel-azure, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 1/15/2025

Vulnerability Publication Date: 2/15/2024

Reference Information

CVE: CVE-2024-26924, CVE-2024-27397, CVE-2024-35839, CVE-2024-36908, CVE-2024-36915, CVE-2024-39480, CVE-2024-41042, CVE-2024-44934, CVE-2024-44996, CVE-2024-47678, CVE-2024-49854, CVE-2024-49884, CVE-2024-49915, CVE-2024-50016, CVE-2024-50018, CVE-2024-50039, CVE-2024-50047, CVE-2024-50143, CVE-2024-50154, CVE-2024-50202, CVE-2024-50203, CVE-2024-50211, CVE-2024-50228, CVE-2024-50256, CVE-2024-50262, CVE-2024-50272, CVE-2024-50278, CVE-2024-50279, CVE-2024-50280, CVE-2024-53050, CVE-2024-53064, CVE-2024-53090, CVE-2024-53099, CVE-2024-53103, CVE-2024-53105, CVE-2024-53111, CVE-2024-53113, CVE-2024-53117, CVE-2024-53118, CVE-2024-53119, CVE-2024-53120, CVE-2024-53122, CVE-2024-53125, CVE-2024-53126, CVE-2024-53127, CVE-2024-53129, CVE-2024-53130, CVE-2024-53131, CVE-2024-53133, CVE-2024-53134, CVE-2024-53136, CVE-2024-53141, CVE-2024-53142, CVE-2024-53144, CVE-2024-53146, CVE-2024-53148, CVE-2024-53150, CVE-2024-53151, CVE-2024-53154, CVE-2024-53155, CVE-2024-53156, CVE-2024-53157, CVE-2024-53158, CVE-2024-53159, CVE-2024-53160, CVE-2024-53161, CVE-2024-53162, CVE-2024-53166, CVE-2024-53169, CVE-2024-53171, CVE-2024-53173, CVE-2024-53174, CVE-2024-53179, CVE-2024-53180, CVE-2024-53188, CVE-2024-53190, CVE-2024-53191, CVE-2024-53200, CVE-2024-53201, CVE-2024-53202, CVE-2024-53206, CVE-2024-53207, CVE-2024-53208, CVE-2024-53209, CVE-2024-53210, CVE-2024-53213, CVE-2024-53214, CVE-2024-53215, CVE-2024-53216, CVE-2024-53217, CVE-2024-53222, CVE-2024-53224, CVE-2024-53229, CVE-2024-53234, CVE-2024-53237, CVE-2024-53240, CVE-2024-53241, CVE-2024-56536, CVE-2024-56539, CVE-2024-56549, CVE-2024-56551, CVE-2024-56562, CVE-2024-56566, CVE-2024-56567, CVE-2024-56576, CVE-2024-56582, CVE-2024-56599, CVE-2024-56604, CVE-2024-56605, CVE-2024-56645, CVE-2024-56667, CVE-2024-56752, CVE-2024-56754, CVE-2024-56755, CVE-2024-56756, CVE-2024-8805

SuSE: SUSE-SU-2025:0117-1