# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:0117-1  
Release Date: 2025-01-15T09:07:51Z  
Rating: important  
References:

  * bsc#1214954
  * bsc#1216813
  * bsc#1220773
  * bsc#1224095
  * bsc#1224726
  * bsc#1225743
  * bsc#1225758
  * bsc#1225820
  * bsc#1227445
  * bsc#1228526
  * bsc#1229809
  * bsc#1230205
  * bsc#1230413
  * bsc#1230697
  * bsc#1231854
  * bsc#1231909
  * bsc#1231963
  * bsc#1232193
  * bsc#1232198
  * bsc#1232201
  * bsc#1232418
  * bsc#1232419
  * bsc#1232420
  * bsc#1232421
  * bsc#1232436
  * bsc#1233038
  * bsc#1233070
  * bsc#1233096
  * bsc#1233200
  * bsc#1233204
  * bsc#1233239
  * bsc#1233259
  * bsc#1233260
  * bsc#1233324
  * bsc#1233328
  * bsc#1233461
  * bsc#1233467
  * bsc#1233468
  * bsc#1233469
  * bsc#1233546
  * bsc#1233558
  * bsc#1233637
  * bsc#1233642
  * bsc#1233772
  * bsc#1233837
  * bsc#1234024
  * bsc#1234069
  * bsc#1234071
  * bsc#1234073
  * bsc#1234075
  * bsc#1234076
  * bsc#1234077
  * bsc#1234079
  * bsc#1234086
  * bsc#1234139
  * bsc#1234140
  * bsc#1234141
  * bsc#1234142
  * bsc#1234143
  * bsc#1234144
  * bsc#1234145
  * bsc#1234146
  * bsc#1234147
  * bsc#1234148
  * bsc#1234149
  * bsc#1234150
  * bsc#1234153
  * bsc#1234155
  * bsc#1234156
  * bsc#1234158
  * bsc#1234159
  * bsc#1234160
  * bsc#1234161
  * bsc#1234162
  * bsc#1234163
  * bsc#1234164
  * bsc#1234165
  * bsc#1234166
  * bsc#1234167
  * bsc#1234168
  * bsc#1234169
  * bsc#1234170
  * bsc#1234171
  * bsc#1234172
  * bsc#1234173
  * bsc#1234174
  * bsc#1234175
  * bsc#1234176
  * bsc#1234177
  * bsc#1234178
  * bsc#1234179
  * bsc#1234180
  * bsc#1234181
  * bsc#1234182
  * bsc#1234183
  * bsc#1234184
  * bsc#1234185
  * bsc#1234186
  * bsc#1234187
  * bsc#1234188
  * bsc#1234189
  * bsc#1234190
  * bsc#1234191
  * bsc#1234192
  * bsc#1234193
  * bsc#1234194
  * bsc#1234195
  * bsc#1234196
  * bsc#1234197
  * bsc#1234198
  * bsc#1234199
  * bsc#1234200
  * bsc#1234201
  * bsc#1234203
  * bsc#1234204
  * bsc#1234205
  * bsc#1234207
  * bsc#1234208
  * bsc#1234209
  * bsc#1234219
  * bsc#1234220
  * bsc#1234221
  * bsc#1234237
  * bsc#1234238
  * bsc#1234239
  * bsc#1234240
  * bsc#1234241
  * bsc#1234242
  * bsc#1234243
  * bsc#1234278
  * bsc#1234279
  * bsc#1234280
  * bsc#1234281
  * bsc#1234282
  * bsc#1234294
  * bsc#1234338
  * bsc#1234357
  * bsc#1234381
  * bsc#1234454
  * bsc#1234464
  * bsc#1234605
  * bsc#1234651
  * bsc#1234652
  * bsc#1234654
  * bsc#1234655
  * bsc#1234657
  * bsc#1234658
  * bsc#1234659
  * bsc#1234668
  * bsc#1234690
  * bsc#1234725
  * bsc#1234726
  * bsc#1234810
  * bsc#1234811
  * bsc#1234826
  * bsc#1234827
  * bsc#1234829
  * bsc#1234832
  * bsc#1234834
  * bsc#1234843
  * bsc#1234846
  * bsc#1234848
  * bsc#1234853
  * bsc#1234855
  * bsc#1234856
  * bsc#1234884
  * bsc#1234889
  * bsc#1234891
  * bsc#1234899
  * bsc#1234900
  * bsc#1234905
  * bsc#1234907
  * bsc#1234909
  * bsc#1234911
  * bsc#1234912
  * bsc#1234916
  * bsc#1234918
  * bsc#1234920
  * bsc#1234921
  * bsc#1234922
  * bsc#1234929
  * bsc#1234930
  * bsc#1234937
  * bsc#1234948
  * bsc#1234950
  * bsc#1234952
  * bsc#1234960
  * bsc#1234962
  * bsc#1234963
  * bsc#1234968
  * bsc#1234969
  * bsc#1234970
  * bsc#1234971
  * bsc#1234973
  * bsc#1234974
  * bsc#1234989
  * bsc#1234999
  * bsc#1235002
  * bsc#1235003
  * bsc#1235004
  * bsc#1235007
  * bsc#1235009
  * bsc#1235016
  * bsc#1235019
  * bsc#1235033
  * bsc#1235045
  * bsc#1235056
  * bsc#1235061
  * bsc#1235075
  * bsc#1235108
  * bsc#1235128
  * bsc#1235134
  * bsc#1235138
  * bsc#1235246
  * bsc#1235406
  * bsc#1235409
  * bsc#1235416
  * bsc#1235507
  * bsc#1235550
  * jsc#PED-10467

  
Cross-References:

  * CVE-2024-26924
  * CVE-2024-27397
  * CVE-2024-35839
  * CVE-2024-36908
  * CVE-2024-36915
  * CVE-2024-39480
  * CVE-2024-41042
  * CVE-2024-44934
  * CVE-2024-44996
  * CVE-2024-47678
  * CVE-2024-49854
  * CVE-2024-49884
  * CVE-2024-49915
  * CVE-2024-50016
  * CVE-2024-50018
  * CVE-2024-50039
  * CVE-2024-50047
  * CVE-2024-50143
  * CVE-2024-50154
  * CVE-2024-50202
  * CVE-2024-50203
  * CVE-2024-50211
  * CVE-2024-50228
  * CVE-2024-50256
  * CVE-2024-50262
  * CVE-2024-50272
  * CVE-2024-50278
  * CVE-2024-50279
  * CVE-2024-50280
  * CVE-2024-53050
  * CVE-2024-53064
  * CVE-2024-53090
  * CVE-2024-53099
  * CVE-2024-53103
  * CVE-2024-53105
  * CVE-2024-53111
  * CVE-2024-53113
  * CVE-2024-53117
  * CVE-2024-53118
  * CVE-2024-53119
  * CVE-2024-53120
  * CVE-2024-53122
  * CVE-2024-53125
  * CVE-2024-53126
  * CVE-2024-53127
  * CVE-2024-53129
  * CVE-2024-53130
  * CVE-2024-53131
  * CVE-2024-53133
  * CVE-2024-53134
  * CVE-2024-53136
  * CVE-2024-53141
  * CVE-2024-53142
  * CVE-2024-53144
  * CVE-2024-53146
  * CVE-2024-53148
  * CVE-2024-53150
  * CVE-2024-53151
  * CVE-2024-53154
  * CVE-2024-53155
  * CVE-2024-53156
  * CVE-2024-53157
  * CVE-2024-53158
  * CVE-2024-53159
  * CVE-2024-53160
  * CVE-2024-53161
  * CVE-2024-53162
  * CVE-2024-53166
  * CVE-2024-53169
  * CVE-2024-53171
  * CVE-2024-53173
  * CVE-2024-53174
  * CVE-2024-53179
  * CVE-2024-53180
  * CVE-2024-53188
  * CVE-2024-53190
  * CVE-2024-53191
  * CVE-2024-53200
  * CVE-2024-53201
  * CVE-2024-53202
  * CVE-2024-53206
  * CVE-2024-53207
  * CVE-2024-53208
  * CVE-2024-53209
  * CVE-2024-53210
  * CVE-2024-53213
  * CVE-2024-53214
  * CVE-2024-53215
  * CVE-2024-53216
  * CVE-2024-53217
  * CVE-2024-53222
  * CVE-2024-53224
  * CVE-2024-53229
  * CVE-2024-53234
  * CVE-2024-53237
  * CVE-2024-53240
  * CVE-2024-53241
  * CVE-2024-56536
  * CVE-2024-56539
  * CVE-2024-56549
  * CVE-2024-56551
  * CVE-2024-56562
  * CVE-2024-56566
  * CVE-2024-56567
  * CVE-2024-56576
  * CVE-2024-56582
  * CVE-2024-56599
  * CVE-2024-56604
  * CVE-2024-56605
  * CVE-2024-56645
  * CVE-2024-56667
  * CVE-2024-56752
  * CVE-2024-56754
  * CVE-2024-56755
  * CVE-2024-56756
  * CVE-2024-8805

  
CVSS scores:

  * CVE-2024-26924 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26924 ( NVD ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27397 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35839 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36908 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36908 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-36915 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-39480 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L
  * CVE-2024-39480 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41042 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44934 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44934 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-44996 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44996 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47678 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-47678 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-47678 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-49854 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49854 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49854 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49884 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49884 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49915 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49915 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49915 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50016 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50016 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50018 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-50018 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50039 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50039 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50047 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50047 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50143 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50143 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-50143 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50154 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50154 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50154 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50154 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50202 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50202 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50202 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50203 ( SUSE ):  8.4
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50203 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50203 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50211 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50211 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50211 ( NVD ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-50228 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-50228 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-50228 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50256 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50256 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50256 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50262 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50262 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-50262 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50262 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50272 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50272 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50278 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
  * CVE-2024-50278 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50279 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-50279 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50280 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50280 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53050 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53050 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53064 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53064 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53090 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53090 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53099 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53099 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-53099 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-53103 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53103 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53105 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53111 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53111 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53111 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53113 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53113 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53117 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53117 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53118 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53118 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53119 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53119 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53120 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53120 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53122 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53122 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53125 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53126 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53126 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53127 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53129 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53129 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53130 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53130 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53131 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53131 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53133 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53133 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53134 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53134 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53136 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53136 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53141 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53141 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53141 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53142 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-53142 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53144 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53146 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53146 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53146 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53148 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53148 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53150 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53150 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-53150 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-53151 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53151 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-53151 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53154 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53154 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53154 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53155 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53155 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-53155 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-53156 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53156 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53156 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53157 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53157 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53157 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53158 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53158 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-53159 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-53159 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-53160 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53160 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-53161 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53161 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-53162 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53162 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-53166 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53166 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53169 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53169 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53171 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53171 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53171 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53173 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53173 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53173 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53174 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53174 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53179 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53179 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53179 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53180 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53180 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53188 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53188 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53190 ( SUSE ):  1.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-53190 ( SUSE ):  2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-53191 ( SUSE ):  7.5
    CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53191 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53200 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53200 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53200 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53201 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53201 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53201 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53202 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-53202 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-53202 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53206 ( SUSE ):  5.9
    CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53206 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-53206 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53207 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53207 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53207 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53208 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53208 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53209 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53209 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-53210 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53210 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53210 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53213 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53213 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-53213 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53214 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53214 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53215 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53215 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53216 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53216 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-53217 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53217 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53222 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53222 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53222 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53224 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53224 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53229 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53229 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53234 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53234 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53237 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53237 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53237 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53241 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-53241 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-56536 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56536 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56536 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56539 ( SUSE ):  8.6
    CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56539 ( SUSE ):  8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2024-56549 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56549 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56549 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56551 ( SUSE ):  8.4
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56551 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56562 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56562 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56566 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56566 ( SUSE ):  6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-56567 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56567 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56567 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56576 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56576 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56582 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56582 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56582 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56599 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56599 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56599 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56604 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56604 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56604 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56605 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56605 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56605 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56645 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56645 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56667 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56667 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56667 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56752 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56752 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56752 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56754 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56754 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-56754 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56755 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-56755 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-56755 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56756 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56756 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-56756 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-8805 ( SUSE ):  8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-8805 ( NVD ):  8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-8805 ( NVD ):  8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

  
Affected Products:

  * openSUSE Leap 15.6
  * Public Cloud Module 15-SP6
  * SUSE Linux Enterprise Server 15 SP6
  * SUSE Linux Enterprise Server for SAP Applications 15 SP6

  
  
An update that solves 116 vulnerabilities, contains one feature and has 103
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

  * CVE-2024-26924: scsi: lpfc: Release hbalock before calling
    lpfc_worker_wake_up() (bsc#1225820).
  * CVE-2024-27397: netfilter: nf_tables: use timestamp to check for set element
    timeout (bsc#1224095).
  * CVE-2024-35839: kABI fix for netfilter: bridge: replace physindev with
    physinif in nf_bridge_info (bsc#1224726).
  * CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies
    (bsc#1225758).
  * CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526).
  * CVE-2024-44934: net: bridge: mcast: wait for previous gc cycles when
    removing port (bsc#1229809).
  * CVE-2024-44996: vsock: fix recursive ->recvmsg calls (bsc#1230205).
  * CVE-2024-47678: icmp: change the order of rate limits (bsc#1231854).
  * CVE-2024-50018: net: napi: Prevent overflow of napi_defer_hard_irqs
    (bsc#1232419).
  * CVE-2024-50039: kABI: Restore deleted
    EXPORT_SYMBOL(__qdisc_calculate_pkt_len) (bsc#1231909).
  * CVE-2024-50202: nilfs2: propagate directory read errors from
    nilfs_find_entry() (bsc#1233324).
  * CVE-2024-50256: netfilter: nf_reject_ipv6: fix potential crash in
    nf_send_reset6() (bsc#1233200).
  * CVE-2024-50262: bpf: Fix out-of-bounds write in trie_get_next_key()
    (bsc#1233239).
  * CVE-2024-50278, CVE-2024-50280: dm cache: fix flushing uninitialized
    delayed_work on cache_ctr error (bsc#1233467).
  * CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first
    resume (bsc#1233467).
  * CVE-2024-53050: drm/i915/hdcp: Add encoder check in hdcp2_get_capability
    (bsc#1233546).
  * CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558).
  * CVE-2024-53090: afs: Fix lock recursion (bsc#1233637).
  * CVE-2024-53099: bpf: Check validity of link->type in bpf_link_show_fdinfo()
    (bsc#1233772).
  * CVE-2024-53105: mm: page_alloc: move mlocked flag clearance into
    free_pages_prepare() (bsc#1234069).
  * CVE-2024-53111: mm/mremap: fix address wraparound in move_page_tables()
    (bsc#1234086).
  * CVE-2024-53113: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof
    (bsc#1234077).
  * CVE-2024-53117: virtio/vsock: Improve MSG_ZEROCOPY error handling
    (bsc#1234079).
  * CVE-2024-53118: vsock: Fix sk_error_queue memory leak (bsc#1234071).
  * CVE-2024-53119: virtio/vsock: Fix accept_queue memory leak (bsc#1234073).
  * CVE-2024-53122: mptcp: cope racing subflow creation in
    mptcp_rcv_space_adjust (bsc#1234076).
  * CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def
    (bsc#1234156).
  * CVE-2024-53130: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint
    (bsc#1234219).
  * CVE-2024-53131: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint
    (bsc#1234220).
  * CVE-2024-53133: drm/amd/display: Handle dml allocation failure to avoid
    crash (bsc#1234221)
  * CVE-2024-53134: pmdomain: imx93-blk-ctrl: correct remove path (bsc#1234159).
  * CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt
    (bsc#1234381).
  * CVE-2024-53160: rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu
    (bsc#1234810).
  * CVE-2024-53161: EDAC/bluefield: Fix potential integer overflow
    (bsc#1234856).
  * CVE-2024-53179: smb: client: fix use-after-free of signing key
    (bsc#1234921).
  * CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended
    capability (bsc#1235004).
  * CVE-2024-53216: nfsd: fix UAF when access ex_uuid or ex_stats (bsc#1235003).
  * CVE-2024-53222: zram: fix NULL pointer in comp_algorithm_show()
    (bsc#1234974).
  * CVE-2024-53234: erofs: handle NONHEAD !delta[1] lclusters gracefully
    (bsc#1235045).
  * CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281).
  * CVE-2024-53241: x86/xen: use new hypercall functions instead of hypercall
    page (bsc#1234282).
  * CVE-2024-56549: cachefiles: Fix NULL pointer dereference in object->file
    (bsc#1234912).
  * CVE-2024-56566: mm/slub: Avoid list corruption when removing a slab from the
    full list (bsc#1235033).
  * CVE-2024-56582: btrfs: fix use-after-free in btrfs_encoded_read_endio()
    (bsc#1235128).
  * CVE-2024-56599: wifi: ath10k: avoid NULL pointer error during sdio remove
    (bsc#1235138).
  * CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in
    rfcomm_sock_alloc() (bsc#1235056).
  * CVE-2024-56755: netfs/fscache: Add a memory barrier for
    FSCACHE_VOLUME_CREATING (bsc#1234920).

The following non-security bugs were fixed:

  * 9p: v9fs_fid_find: also lookup by inode if not found dentry (git-fixes).
  * accel/habanalabs: export dma-buf only if size/offset multiples of PAGE_SIZE
    (stable-fixes).
  * accel/habanalabs: fix debugfs files permissions (stable-fixes).
  * accel/habanalabs: increase HL_MAX_STR to 64 bytes to avoid warnings (stable-
    fixes).
  * accel/habanalabs/gaudi2: unsecure tpc count registers (stable-fixes).
  * acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl (git-fixes).
  * ACPI: PRM: Add PRM handler direct call support (jsc#PED-10467).
  * ACPI: resource: Fix memory resource type union access (git-fixes).
  * ACPI: x86: Add skip i2c clients quirk for Acer Iconia One 8 A1-840 (stable-
    fixes).
  * ACPI: x86: Clean up Asus entries in acpi_quirk_skip_dmi_ids[] (stable-
    fixes).
  * ACPI: x86: Make UART skip quirks work on PCI UARTs without an UID (stable-
    fixes).
  * ACPI/HMAT: Move HMAT messages to pr_debug() (bsc#1234294)
  * ACPICA: events/evxfregn: do not release the ContextMutex that was never
    acquired (git-fixes).
  * af_unix: Call manage_oob() for every skb in unix_stream_read_generic()
    (bsc#1234725).
  * afs: Automatically generate trace tag enums (git-fixes).
  * afs: Fix missing subdir edit when renamed between parent dirs (git-fixes).
  * ALSA hda/realtek: Add quirk for Framework F111:000C (stable-fixes).
  * ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-
    fixes).
  * ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).
  * ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks
    (stable-fixes).
  * ALSA: hda/realtek: Fix headset mic on Acer Nitro 5 (stable-fixes).
  * ALSA: line6: Fix racy access to midibuf (stable-fixes).
  * ALSA: seq: Check UMP support for midi_version change (git-fixes).
  * ALSA: seq: oss: Fix races at processing SysEx messages (stable-fixes).
  * ALSA: seq: ump: Fix seq port updates per FB info notify (git-fixes).
  * ALSA: seq: ump: Use automatic cleanup of kfree() (stable-fixes).
  * ALSA: seq: ump: Use guard() for locking (stable-fixes).
  * ALSA: usb-audio: Add implicit feedback quirk for Yamaha THR5 (stable-fixes).
  * ALSA: usb-audio: Notify xrun for low-latency mode (git-fixes).
  * ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).
  * ALSA: usb-audio: US16x08: Initialize array before use (git-fixes).
  * amdgpu/uvd: get ring reference from rq scheduler (git-fixes).
  * arch: consolidate arch_irq_work_raise prototypes (git-fixes).
  * arch: Introduce arch_{,try_}_cmpxchg128{,_local}() (bsc#1220773).
  * arch: Remove cmpxchg_double (bsc#1220773).
  * arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes).
  * arm64: Ensure bits ASID[15:8] are masked out when the kernel uses
    (bsc#1234605)
  * arm64: Force position-independent veneers (git-fixes).
  * ASoC: amd: yc: Add a quirk for microfone on Lenovo ThinkPad P14s Gen 5
    21MES00B00 (stable-fixes).
  * ASoC: amd: yc: Add quirk for microphone on Lenovo Thinkpad T14s Gen 6
    21M1CTO1WW (stable-fixes).
  * ASoC: amd: yc: fix internal mic on Redmi G 2022 (stable-fixes).
  * ASoC: amd: yc: Fix the wrong return value (git-fixes).
  * ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes).
  * ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes).
  * ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).
  * ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).
  * ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes).
  * ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes).
  * ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes).
  * ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable-
    fixes).
  * ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes).
  * ASoC: hdmi-codec: reorder channel allocation list (stable-fixes).
  * ASoC: Intel: sof_sdw: add quirk for Dell SKU 0B8C (stable-fixes).
  * ASoC: Intel: sof_sdw: fix jack detection on ADL-N variant RVP (stable-
    fixes).
  * ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes).
  * ASoC: nau8822: Lower debug print priority (stable-fixes).
  * ASoC: SOF: Remove libraries from topology lookups (git-fixes).
  * autofs: fix memory leak of waitqueues in autofs_catatonic_mode (git-fixes).
  * batman-adv: Do not let TT changes list grows indefinitely (git-fixes).
  * batman-adv: Do not send uninitialized TT changes (git-fixes).
  * batman-adv: Remove uninitialized data in full table TT response (git-fixes).
  * blk-cgroup: Fix UAF in blkcg_unpin_online() (bsc#1234726).
  * blk-core: use pr_warn_ratelimited() in bio_check_ro() (bsc#1234139).
  * blk-iocost: do not WARN if iocg was already offlined (bsc#1234147).
  * blk-iocost: Fix an UBSAN shift-out-of-bounds warning (bsc#1234144).
  * blk-throttle: fix lockdep warning of "cgroup_mutex or RCU read lock
    required!" (bsc#1234140).
  * block, bfq: choose the last bfqq from merge chain in bfq_setup_cooperator()
    (bsc#1234149).
  * block, bfq: do not break merge chain in bfq_split_bfqq() (bsc#1234150).
  * block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234160).
  * block, bfq: fix procress reference leakage for bfqq in merge chain
    (bsc#1234280).
  * block, bfq: fix uaf for accessing waker_bfqq after splitting (bsc#1234279).
  * block: Call .limit_depth() after .hctx has been set (bsc#1234148).
  * block: Fix where bio IO priority gets set (bsc#1234145).
  * block: prevent an integer overflow in bvec_try_merge_hw_page (bsc#1234142).
  * block: update the stable_writes flag in bdev_add (bsc#1234141).
  * block/mq-deadline: Fix the tag reservation code (bsc#1234148).
  * Bluetooth: btusb: Add RTL8852BE device 0489:e123 to device tables (stable-
    fixes).
  * Bluetooth: Fix type of len in rfcomm_sock_getsockopt{,_old}() (stable-
    fixes).
  * Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet
    (stable-fixes).
  * Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating (git-
    fixes).
  * Bluetooth: iso: Fix recursive locking warning (git-fixes).
  * Bluetooth: ISO: Reassociate a socket with an active BIS (stable-fixes).
  * Bluetooth: L2CAP: do not leave dangling sk pointer on error in
    l2cap_sock_create() (stable-fixes).
  * Bluetooth: MGMT: Fix possible deadlocks (git-fixes).
  * Bluetooth: SCO: Add support for 16 bits transparent voice setting (git-
    fixes).
  * bnxt_en: Fix receive ring space parameters when XDP is active (git-fixes).
  * bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down
    (git-fixes).
  * bnxt_en: Set backplane link modes correctly for ethtool (git-fixes).
  * bpf, x86: Fix PROBE_MEM runtime load check (git-fixes).
  * bpf: verifier: prevent userspace memory access (git-fixes).
  * btrfs: fix use-after-free waiting for encoded read endios (bsc#1235128)
  * can: gs_usb: add VID/PID for Xylanta SAINT3 product family (stable-fixes).
  * can: j1939: fix error in J1939 documentation (stable-fixes).
  * checkpatch: always parse orig_commit in fixes tag (git-fixes).
  * checkpatch: check for missing Fixes tags (stable-fixes).
  * clocksource/drivers:sp804: Make user selectable (git-fixes).
  * clocksource/drivers/timer-ti-dm: Fix child node refcount handling (git-
    fixes).
  * counter: stm32-timer-cnt: Add check for clk_enable() (git-fixes).
  * counter: ti-ecap-capture: Add check for clk_enable() (git-fixes).
  * crypto: qat - disable IOV in adf_dev_stop() (git-fixes).
  * crypto: x86/sha256 - Add parentheses around macros' single arguments
    (stable-fixes).
  * cyrpto/b128ops: Remove struct u128 (bsc#1220773).
  * devlink: Fix length of eswitch inline-mode (git-fixes).
  * dma-buf: fix dma_fence_array_signaled v4 (stable-fixes).
  * dma-debug: fix a possible deadlock on radix_lock (stable-fixes).
  * dmaengine: apple-admac: Avoid accessing registers in probe (git-fixes).
  * dmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset (git-
    fixes).
  * dmaengine: dw: Select only supported masters for ACPI devices (git-fixes).
  * dmaengine: idxd: Check for driver name match before sva user feature
    (bsc#1234357).
  * dmaengine: mv_xor: fix child node refcount handling in early exit (git-
    fixes).
  * dmaengine: tegra: Return correct DMA status when paused (git-fixes).
  * Documentation: PM: Clarify pm_runtime_resume_and_get() return value (git-
    fixes).
  * driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link
    (stable-fixes).
  * driver core: fw_devlink: Improve logs for cycle detection (stable-fixes).
  * driver core: fw_devlink: Stop trying to optimize cycle detection logic (git-
    fixes).
  * Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet (git-
    fixes).
  * drivers: net: ionic: add missed debugfs cleanup to ionic_probe() error path
    (git-fixes).
  * drm: adv7511: Drop dsi single lane support (git-fixes).
  * drm: adv7511: Fix use-after-free in adv7533_attach_dsi() (git-fixes).
  * drm: panel-orientation-quirks: Add quirk for AYA NEO 2 model (stable-fixes).
  * drm: panel-orientation-quirks: Add quirk for AYA NEO Founder edition
    (stable-fixes).
  * drm: panel-orientation-quirks: Add quirk for AYA NEO GEEK (stable-fixes).
  * drm: panel-orientation-quirks: Make Lenovo Yoga Tab 3 X90F DMI match less
    strict (stable-fixes).
  * drm/amd/display: Add HDR workaround for specific eDP (stable-fixes).
  * drm/amd/display: Add NULL check for clk_mgr in dcn32_init_hw (stable-fixes).
  * drm/amd/display: Allow backlight to go below
    `AMDGPU_DM_DEFAULT_MIN_BACKLIGHT` (stable-fixes).
  * drm/amd/display: Avoid overflow assignment in link_dp_cts (stable-fixes).
  * drm/amd/display: Fix Synaptics Cascaded Panamera DSC Determination (stable-
    fixes).
  * drm/amd/display: Revert Avoid overflow assignment (stable-fixes).
  * drm/amd/display: Use gpuvm_min_page_size_kbytes for DML2 surfaces (stable-
    fixes).
  * drm/amd/pm: fix the high voltage issue after unload (stable-fixes).
  * drm/amd/pm: update current_socclk and current_uclk in gpu_metrics on smu
    v13.0.7 (stable-fixes).
  * drm/amdgpu: add raven1 gfxoff quirk (stable-fixes).
  * drm/amdgpu: add smu 14.0.1 discovery support (stable-fixes).
  * drm/amdgpu: Block MMR_READ IOCTL in reset (stable-fixes).
  * drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts for vega20_ih
    (stable-fixes).
  * drm/amdgpu: Dereference the ATCS ACPI buffer (stable-fixes).
  * drm/amdgpu: differentiate external rev id for gfx 11.5.0 (stable-fixes).
  * drm/amdgpu: disallow multiple BO_HANDLES chunks in one submit (stable-
    fixes).
  * drm/amdgpu: do not access invalid sched (git-fixes).
  * drm/amdgpu: enable gfxoff quirk on HP 705G4 (stable-fixes).
  * drm/amdgpu: fix unchecked return value warning for amdgpu_gfx (stable-
    fixes).
  * drm/amdgpu: fix usage slab after free (stable-fixes).
  * drm/amdgpu: prevent BO_HANDLES error from being overwritten (git-fixes).
  * drm/amdgpu: refine error handling in amdgpu_ttm_tt_pin_userptr (stable-
    fixes).
  * drm/amdgpu: set the right AMDGPU sg segment limitation (stable-fixes).
  * drm/amdgpu: skip amdgpu_device_cache_pci_state under sriov (stable-fixes).
  * drm/amdgpu/gfx10: use rlc safe mode for soft recovery (stable-fixes).
  * drm/amdgpu/gfx11: use rlc safe mode for soft recovery (stable-fixes).
  * drm/amdgpu/gfx9: properly handle error ints on all pipes (stable-fixes).
  * drm/amdgpu/gfx9: use rlc safe mode for soft recovery (stable-fixes).
  * drm/amdgpu/hdp5.2: do a posting read when flushing HDP (stable-fixes).
  * drm/amdgpu/pm: Remove gpu_od if it's an empty directory (stable-fixes).
  * drm/amdgpu/umsch: do not execute umsch test when GPU is in reset/suspend
    (stable-fixes).
  * drm/amdgpu/umsch: reinitialize write pointer in hw init (stable-fixes).
  * drm/amdgpu/vcn: reset fw_shared when VCPU buffers corrupted on vcn v4.0.3
    (stable-fixes).
  * drm/amdkfd: Fix resource leak in criu restore queue (stable-fixes).
  * drm/amdkfd: pause autosuspend when creating pdd (stable-fixes).
  * drm/amdkfd: Use device based logging for errors (stable-fixes).
  * drm/amdkfd: Use the correct wptr size (stable-fixes).
  * drm/bridge: adv7511_audio: Update Audio InfoFrame properly (git-fixes).
  * drm/bridge: it6505: Enable module autoloading (stable-fixes).
  * drm/bridge: it6505: Fix inverted reset polarity (git-fixes).
  * drm/bridge: it6505: update usleep_range for RC circuit charge time (stable-
    fixes).
  * drm/display: Fix building with GCC 15 (stable-fixes).
  * drm/dp_mst: Ensure mst_primary pointer is valid in
    drm_dp_mst_handle_up_req() (stable-fixes).
  * drm/dp_mst: Fix MST sideband message body length check (stable-fixes).
  * drm/dp_mst: Fix resetting msg rx state after topology removal (git-fixes).
  * drm/dp_mst: Verify request type in the corresponding down message reply
    (stable-fixes).
  * drm/etnaviv: flush shader L1 cache after user commandstream (stable-fixes).
  * drm/i915: Fix memory leak by correcting cache object name in error handler
    (git-fixes).
  * drm/i915: Fix NULL pointer dereference in capture_engine (git-fixes).
  * drm/i915/dg1: Fix power gate sequence (git-fixes).
  * drm/mcde: Enable module autoloading (stable-fixes).
  * drm/modes: Avoid divide by zero harder in drm_mode_vrefresh() (stable-
    fixes).
  * drm/nouveau/gsp: Use the sg allocator for level 2 of radix3 (stable-fixes).
  * drm/panel: novatek-nt35950: fix return value check in nt35950_probe() (git-
    fixes).
  * drm/panel: simple: Add Microchip AC69T88A LVDS Display panel (stable-fixes).
  * drm/printer: Allow NULL data in devcoredump printer (stable-fixes).
  * drm/radeon: add helper rdev_to_drm(rdev) (stable-fixes).
  * drm/radeon: change rdev->ddev to rdev_to_drm(rdev) (stable-fixes).
  * drm/radeon: Fix spurious unplug event on radeon HDMI (git-fixes).
  * drm/radeon/r100: Handle unknown family in r100_cp_init_microcode() (stable-
    fixes).
  * drm/radeon/r600_cs: Fix possible int overflow in r600_packet3_check()
    (stable-fixes).
  * drm/sched: memset() 'job' in drm_sched_job_init() (stable-fixes).
  * drm/vc4: hdmi: Avoid log spam for audio start failure (stable-fixes).
  * drm/vc4: hvs: Set AXI panic modes for the HVS (stable-fixes).
  * erofs: avoid debugging output for (de)compressed data (git-fixes).
  * exfat: fix uninit-value in __exfat_get_dentry_set (git-fixes).
  * ext4: add a new helper to check if es must be kept (bsc#1234170).
  * ext4: add correct group descriptors and reserved GDT blocks to system zone
    (bsc#1234164).
  * ext4: add missed brelse in update_backups (bsc#1234171).
  * ext4: allow for the last group to be marked as trimmed (bsc#1234278).
  * ext4: avoid buffer_head leak in ext4_mark_inode_used() (bsc#1234191).
  * ext4: avoid excessive credit estimate in ext4_tmpfile() (bsc#1234180).
  * ext4: avoid negative min_clusters in find_group_orlov() (bsc#1234193).
  * ext4: avoid overlapping preallocations due to overflow (bsc#1234162).
  * ext4: avoid potential buffer_head leak in __ext4_new_inode() (bsc#1234192).
  * ext4: avoid writing unitialized memory to disk in EA inodes (bsc#1234187).
  * ext4: check the extent status again before inserting delalloc block
    (bsc#1234186).
  * ext4: clear EXT4_GROUP_INFO_WAS_TRIMMED_BIT even mount with discard
    (bsc#1234190).
  * ext4: convert to exclusive lock while inserting delalloc extents
    (bsc#1234178).
  * ext4: correct best extent lstart adjustment logic (bsc#1234179).
  * ext4: correct grp validation in ext4_mb_good_group (bsc#1234163).
  * ext4: correct return value of ext4_convert_meta_bg (bsc#1234172).
  * ext4: correct the hole length returned by ext4_map_blocks() (bsc#1234178).
  * ext4: correct the start block of counting reserved clusters (bsc#1234169).
  * ext4: do not let fstrim block system suspend
    (https://bugzilla.kernel.org/show_bug.cgi?id=216322 bsc#1234166).
  * ext4: do not trim the group with corrupted block bitmap (bsc#1234177).
  * ext4: factor out __es_alloc_extent() and __es_free_extent() (bsc#1234170).
  * ext4: factor out a common helper to query extent map (bsc#1234186).
  * ext4: fix inconsistent between segment fstrim and full fstrim (bsc#1234176).
  * ext4: fix incorrect tid assumption in __jbd2_log_wait_for_space()
    (bsc#1234188).
  * ext4: fix incorrect tid assumption in ext4_wait_for_tail_page_commit()
    (bsc#1234188).
  * ext4: fix incorrect tid assumption in jbd2_journal_shrink_checkpoint_list()
    (bsc#1234188).
  * ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup}
    (bsc#1214954).
  * ext4: fix potential unnitialized variable (bsc#1234183).
  * ext4: fix race between writepages and remount (bsc#1234168).
  * ext4: fix rec_len verify error (bsc#1234167).
  * ext4: fix slab-use-after-free in ext4_es_insert_extent() (bsc#1234170).
  * ext4: fix uninitialized variable in ext4_inlinedir_to_tree (bsc#1234185).
  * ext4: forbid commit inconsistent quota data when errors=remount-ro
    (bsc#1234178).
  * ext4: make ext4_es_insert_delayed_block() return void (bsc#1234170).
  * ext4: make ext4_es_insert_extent() return void (bsc#1234170).
  * ext4: make ext4_es_remove_extent() return void (bsc#1234170).
  * ext4: make ext4_zeroout_es() return void (bsc#1234170).
  * ext4: make sure allocate pending entry not fail (bsc#1234170).
  * ext4: mark buffer new if it is unwritten to avoid stale data exposure
    (bsc#1234175).
  * ext4: move 'ix' sanity check to corrent position (bsc#1234174).
  * ext4: move setting of trimmed bit into ext4_try_to_trim_range()
    (bsc#1234165).
  * ext4: nested locking for xattr inode (bsc#1234189).
  * ext4: propagate errors from ext4_find_extent() in ext4_insert_range()
    (bsc#1234194).
  * ext4: refactor ext4_da_map_blocks() (bsc#1234178).
  * ext4: remove gdb backup copy for meta bg in setup_new_flex_group_blocks
    (bsc#1234173).
  * ext4: remove the redundant folio_wait_stable() (bsc#1234184).
  * ext4: set the type of max_zeroout to unsigned int to avoid overflow
    (bsc#1234182).
  * ext4: set type of ac_groups_linear_remaining to __u32 to avoid overflow
    (bsc#1234181).
  * ext4: use pre-allocated es in __es_insert_extent() (bsc#1234170).
  * ext4: use pre-allocated es in __es_remove_extent() (bsc#1234170).
  * ext4: using nofail preallocation in ext4_es_insert_delayed_block()
    (bsc#1234170).
  * ext4: using nofail preallocation in ext4_es_insert_extent() (bsc#1234170).
  * ext4: using nofail preallocation in ext4_es_remove_extent() (bsc#1234170).
  * filemap: add a per-mapping stable writes flag (bsc#1234141).
  * filemap: Fix bounds checking in filemap_read() (bsc#1234209).
  * firmware: arm_scmi: Reject clear channel request on A2P (stable-fixes).
  * fs-writeback: do not requeue a clean inode having skipped pages
    (bsc#1234200).
  * fs/writeback: bail out if there is no more inodes for IO and queued once
    (bsc#1234207).
  * fsnotify: fix sending inotify event with unexpected filename (bsc#1234198).
  * genirq/cpuhotplug: Retry with cpu_online_mask when migration fails (git-
    fixes).
  * genirq/cpuhotplug: Skip suspended interrupts when restoring affinity (git-
    fixes).
  * genirq/irqdesc: Honor caller provided affinity in alloc_desc() (git-fixes).
  * gpio: grgpio: Add NULL check in grgpio_probe (git-fixes).
  * gpio: grgpio: use a helper variable to store the address of ofdev->dev
    (stable-fixes).
  * hfsplus: do not query the device logical block size multiple times (git-
    fixes).
  * HID: magicmouse: Apple Magic Trackpad 2 USB-C driver support (stable-fixes).
  * hvc/xen: fix console unplug (git-fixes).
  * hvc/xen: fix error path in xen_hvc_init() to always register frontend driver
    (git-fixes).
  * hvc/xen: fix event channel handling for secondary consoles (git-fixes).
  * hwmon: (nct6775) Add 665-ACE/600M-CL to ASUS WMI monitoring list (stable-
    fixes).
  * hwmon: (pmbus_core) Allow to hook PMBUS_SMBALERT_MASK (stable-fixes).
  * hwmon: (pmbus/core) clear faults after setting smbalert mask (git-fixes).
  * hwmon: (tmp513) Do not use "proxy" headers (stable-fixes).
  * hwmon: (tmp513) Fix Current Register value interpretation (git-fixes).
  * hwmon: (tmp513) Fix interpretation of values of Shunt Voltage and Limit
    Registers (git-fixes).
  * hwmon: (tmp513) Fix interpretation of values of Temperature Result and Limit
    Registers (git-fixes).
  * hwmon: (tmp513) Simplify with dev_err_probe() (stable-fixes).
  * hwmon: (tmp513) Use SI constants from units.h (stable-fixes).
  * i2c: imx: add imx7d compatible string for applying erratum ERR007805 (git-
    fixes).
  * i2c: microchip-core: actually use repeated sends (git-fixes).
  * i2c: microchip-core: fix "ghost" detections (git-fixes).
  * i2c: pnx: Fix timeout in wait functions (git-fixes).
  * i2c: riic: Always round-up when calculating bus period (git-fixes).
  * i40e: Fix handling changed priv flags (git-fixes).
  * i915/guc: Accumulate active runtime on gt reset (git-fixes).
  * i915/guc: Ensure busyness counter increases motonically (git-fixes).
  * i915/guc: Reset engine utilization buffer before registration (git-fixes).
  * ice: change q_index variable type to s16 to store -1 value (git-fixes).
  * ice: consistently use q_idx in ice_vc_cfg_qs_msg() (git-fixes).
  * ice: fix PHY Clock Recovery availability check (git-fixes).
  * ice: Unbind the workqueue (bsc#1234989)
  * idpf: add support for SW triggered interrupts (bsc#1235507).
  * idpf: enable WB_ON_ITR (bsc#1235507).
  * idpf: trigger SW interrupt when exiting wb_on_itr mode (bsc#1235507).
  * igb: Fix potential invalid memory access in igb_init_module() (git-fixes).
  * iio: magnetometer: yas530: use signed integer type for clamp limits (git-
    fixes).
  * instrumentation: Wire up cmpxchg128() (bsc#1220773).
  * io_uring: always lock __io_cqring_overflow_flush (git-fixes).
  * io_uring: check if iowq is killed before queuing (git-fixes).
  * io_uring: Fix registered ring file refcount leak (git-fixes).
  * io_uring/rw: avoid punting to io-wq directly (git-fixes).
  * io_uring/tctx: work around xa_store() allocation error issue (git-fixes).
  * iommu/io-pgtable-arm: Fix stage-2 map/unmap for concatenated tables (git-
    fixes).
  * irqflags: Explicitly ignore lockdep_hrtimer_exit() argument (git-fixes).
  * isofs: handle CDs with bad root inode but good Joliet root directory
    (bsc#1234199).
  * ixgbe: downgrade logging of unsupported VF API version to debug (git-fixes).
  * ixgbevf: stop attempting IPSEC offload on Mailbox API 1.5 (git-fixes).
  * jffs2: Fix rtime decompressor (git-fixes).
  * jffs2: fix use of uninitialized variable (git-fixes).
  * jffs2: Prevent rtime decompress memory corruption (git-fixes).
  * jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree (git-
    fixes).
  * jfs: array-index-out-of-bounds fix in dtReadFirst (git-fixes).
  * jfs: fix array-index-out-of-bounds in jfs_readdir (git-fixes).
  * jfs: fix shift-out-of-bounds in dbSplit (git-fixes).
  * jfs: xattr: check invalid xattr size more strictly (git-fixes).
  * kasan: make report_lock a raw spinlock (git-fixes).
  * kdb: address -Wformat-security warnings (bsc#1234659).
  * kdb: Fix buffer overflow during tab-complete (bsc#1234652).
  * kdb: Fix console handling when editing and tab-completing commands
    (bsc#1234655).
  * kdb: Merge identical case statements in kdb_read() (bsc#1234657).
  * kdb: Use format-specifiers rather than memset() for padding in kdb_read()
    (bsc#1234658).
  * kdb: Use format-strings rather than '\0' injection in kdb_read()
    (bsc#1234654).
  * kdb: Use the passed prompt in kdb_position_cursor() (bsc#1234654).
  * kgdb: Flush console before entering kgdb on panic (bsc#1234651).
  * leds: class: Protect brightness_show() with led_cdev->led_access mutex
    (stable-fixes).
  * linux/dmaengine.h: fix a few kernel-doc warnings (git-fixes).
  * locking/atomic/x86: Correct the definition of __arch_try_cmpxchg128()
    (bsc#1220773 git-fix).
  * loop: fix the the direct I/O support check when used on top of block devices
    (bsc#1234143).
  * mac80211: fix user-power when emulating chanctx (stable-fixes).
  * media: cx231xx: Add support for Dexatek USB Video Grabber 1d19:6108 (stable-
    fixes).
  * media: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg (git-
    fixes).
  * media: uvcvideo: Add a quirk for the Kaiweets KTI-W02 infrared camera
    (stable-fixes).
  * media: uvcvideo: RealSense D421 Depth module metadata (stable-fixes).
  * mfd: da9052-spi: Change read-mask to write-mask (git-fixes).
  * mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices (git-fixes).
  * mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device (git-fixes).
  * mfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device (git-fixes).
  * mm/filemap: avoid buffered read/write race to read inconsistent data
    (bsc#1234204).
  * mm/readahead: do not allow order-1 folio (bsc#1234205).
  * mm/readahead: limit page cache size in page_cache_ra_order() (bsc#1234208).
  * mmc: core: Add SD card quirk for broken poweroff notification (stable-
    fixes).
  * mmc: mtk-sd: fix devm_clk_get_optional usage (stable-fixes).
  * mmc: mtk-sd: Fix MMC_CAP2_CRYPTO flag setting (git-fixes).
  * mmc: sdhci-esdhc-imx: enable quirks SDHCI_QUIRK_NO_LED (stable-fixes).
  * mmc: sdhci-pci: Add DMI quirk for missing CD GPIO on Vexia Edu Atla 10
    tablet (stable-fixes).
  * mmc: sdhci-tegra: Remove SDHCI_QUIRK_BROKEN_ADMA_ZEROLEN_DESC quirk (git-
    fixes).
  * mtd: diskonchip: Cast an operand to prevent potential overflow (git-fixes).
  * mtd: hyperbus: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes).
  * mtd: hyperbus: rpc-if: Convert to platform remove callback returning void
    (stable-fixes).
  * mtd: rawnand: arasan: Fix double assertion of chip-select (git-fixes).
  * mtd: rawnand: arasan: Fix missing de-registration of NAND (git-fixes).
  * mtd: rawnand: fix double free in atmel_pmecc_create_user() (git-fixes).
  * net :mana :Request a V2 response version for MANA_QUERY_GF_STAT (git-fixes).
  * net: mana: Increase the DEF_RX_BUFFERS_PER_QUEUE to 1024 (bsc#1235246).
  * net: Return error from sk_stream_wait_connect() if sk_wait_event() fails
    (git-fixes).
  * net: usb: qmi_wwan: add Quectel RG650V (stable-fixes).
  * net/ipv6: release expired exception dst cached in socket (bsc#1216813).
  * net/mlx5e: clear xdp features on non-uplink representors (git-fixes).
  * net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes).
  * net/mlx5e: Remove workaround to avoid syndrome for internal port (git-
    fixes).
  * net/qed: allow old cards not supporting "num_images" to work (git-fixes).
  * nfs: ignore SB_RDONLY when mounting nfs (git-fixes).
  * NFS/pnfs: Fix a live lock between recalled layouts and layoutget (git-
    fixes).
  * NFSD: Async COPY result needs to return a write verifier (git-fixes).
  * NFSD: Cap the number of bytes copied by nfs4_reset_recoverydir() (git-
    fixes).
  * nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur (git-fixes).
  * NFSD: Fix nfsd4_shutdown_copy() (git-fixes).
  * NFSD: initialize copy->cp_clp early in nfsd4_copy for use by trace point
    (git-fixes).
  * nfsd: make sure exp active before svc_export_show (git-fixes).
  * NFSD: Prevent a potential integer overflow (git-fixes).
  * NFSD: Prevent NULL dereference in nfsd4_process_cb_update() (git-fixes).
  * nfsd: release svc_expkey/svc_export with rcu_work (git-fixes).
  * NFSD: Remove a never-true comparison (git-fixes).
  * nfsd: restore callback functionality for NFSv4.0 (git-fixes).
  * NFSv4.0: Fix a use-after-free problem in the asynchronous open() (git-
    fixes).
  * nilfs2: fix buffer head leaks in calls to truncate_inode_pages() (git-
    fixes).
  * nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()
    (git-fixes).
  * nilfs2: prevent use of deleted inode (git-fixes).
  * nvme-pci: 512 byte aligned dma pool segment quirk (git-fixes).
  * nvme-rdma: unquiesce admin_q before destroy it (git-fixes).
  * nvme-tcp: fix the memleak while create new ctrl failed (git-fixes).
  * nvme: apple: fix device reference counting (git-fixes).
  * nvme: fix metadata handling in nvme-passthrough (git-fixes).
  * nvme/multipath: Fix RCU list traversal to use SRCU primitive (git-fixes).
  * nvmet-loop: avoid using mutex in IO hotpath (git-fixes).
  * ocfs2: fix uninitialized value in ocfs2_file_read_iter() (git-fixes).
  * ocfs2: free inode when ocfs2_get_init_inode() fails (git-fixes).
  * Octeontx2-pf: Free send queue buffers incase of leaf to inner (git-fixes).
  * of: address: Report error on resource bounds overflow (stable-fixes).
  * of: Fix error path in of_parse_phandle_with_args_map() (git-fixes).
  * of: Fix refcount leakage for OF node returned by __of_get_dma_parent() (git-
    fixes).
  * of/irq: Fix using uninitialized variable @addr_len in API of_irq_parse_one()
    (git-fixes).
  * parisc: Raise minimal GCC version (bsc#1220773).
  * parisc: Raise minimal GCC version to 12.0.0 (bsc#1220773 git-fix).
  * PCI: Add 'reset_subordinate' to reset hierarchy below bridge (stable-fixes).
  * PCI: Add ACS quirk for Broadcom BCM5760X NIC (stable-fixes).
  * PCI: Add ACS quirk for Wangxun FF5xxx NICs (stable-fixes).
  * PCI: Add T_PERST_CLK_US macro (git-fixes).
  * PCI: cadence: Extract link setup sequence from cdns_pcie_host_setup()
    (stable-fixes).
  * PCI: cadence: Set cdns_pcie_host_init() global (stable-fixes).
  * PCI: cpqphp: Use PCI_POSSIBLE_ERROR() to check config reads (stable-fixes).
  * PCI: Detect and trust built-in Thunderbolt chips (stable-fixes).
  * PCI: Fix use-after-free of slot->bus on hot remove (stable-fixes).
  * PCI: j721e: Add PCIe 4x lane selection support (stable-fixes).
  * PCI: j721e: Add per platform maximum lane settings (stable-fixes).
  * PCI: j721e: Add reset GPIO to struct j721e_pcie (stable-fixes).
  * PCI: j721e: Add suspend and resume support (git-fixes).
  * PCI: j721e: Use T_PERST_CLK_US macro (git-fixes).
  * PCI: qcom: Add support for IPQ9574 (stable-fixes).
  * PCI: Use preserve_config in place of pci_flags (stable-fixes).
  * PCI: vmd: Add DID 8086:B06F and 8086:B60B for Intel client SKUs (stable-
    fixes).
  * PCI: vmd: Set devices to D0 before enabling PM L1 Substates (stable-fixes).
  * PCI/AER: Disable AER service on suspend (stable-fixes).
  * PCI/MSI: Handle lack of irqdomain gracefully (git-fixes).
  * percpu: Add {raw,this}_cpu_try_cmpxchg() (bsc#1220773).
  * percpu: Fix self-assignment of __old in raw_cpu_generic_try_cmpxchg()
    (bsc#1220773 git-fix).
  * percpu: Wire up cmpxchg128 (bsc#1220773).
  * phy: core: Fix an OF node refcount leakage in _of_phy_get() (git-fixes).
  * phy: core: Fix an OF node refcount leakage in of_phy_provider_lookup() (git-
    fixes).
  * phy: core: Fix that API devm_of_phy_provider_unregister() fails to
    unregister the phy provider (git-fixes).
  * phy: core: Fix that API devm_phy_destroy() fails to destroy the phy (git-
    fixes).
  * phy: core: Fix that API devm_phy_put() fails to release the phy (git-fixes).
  * phy: qcom-qmp: Fix register name in RX Lane config of SC8280XP (git-fixes).
  * phy: rockchip: naneng-combphy: fix phy reset (git-fixes).
  * phy: usb: Toggle the PHY power during init (git-fixes).
  * pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking
    (git-fixes).
  * pinctrl: qcom-pmic-gpio: add support for PM8937 (stable-fixes).
  * pinctrl: qcom: spmi-mpp: Add PM8937 compatible (stable-fixes).
  * pinmux: Use sequential access to access desc->pinmux data (stable-fixes).
  * platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git-
    fixes).
  * platform/x86: asus-nb-wmi: Ignore unknown event 0xCF (stable-fixes).
  * platform/x86: dell-smbios-base: Extends support to Alienware products
    (stable-fixes).
  * platform/x86: dell-wmi-base: Handle META key Lock/Unlock events (stable-
    fixes).
  * platform/x86: thinkpad_acpi: Fix for ThinkPad's with ECFW showing incorrect
    fan speed (stable-fixes).
  * power: supply: gpio-charger: Fix set charge current limits (git-fixes).
  * powerpc/book3s64/hugetlb: Fix disabling hugetlb when fadump is active
    (bsc#1235108).
  * proc/softirqs: replace seq_printf with seq_put_decimal_ull_width (git-
    fixes).
  * quota: explicitly forbid quota files from being encrypted (bsc#1234196).
  * quota: Fix rcu annotations of inode dquot pointers (bsc#1234197).
  * quota: flush quota_release_work upon quota writeback (bsc#1234195).
  * quota: simplify drop_dquot_ref() (bsc#1234197).
  * RAS/AMD/ATL: Translate normalized to system physical addresses using PRM
    (jsc#PED-10467).
  * RDMA/bnxt_re: Add check for path mtu in modify_qp (git-fixes)
  * RDMA/bnxt_re: Avoid initializing the software queue for user queues (git-
    fixes)
  * RDMA/bnxt_re: Avoid sending the modify QP workaround for latest adapters
    (git-fixes)
  * RDMA/bnxt_re: Disable use of reserved wqes (git-fixes)
  * RDMA/bnxt_re: Fix max_qp_wrs reported (git-fixes)
  * RDMA/bnxt_re: Fix reporting hw_ver in query_device (git-fixes)
  * RDMA/bnxt_re: Fix the check for 9060 condition (git-fixes)
  * RDMA/bnxt_re: Fix the locking while accessing the QP table (git-fixes)
  * RDMA/bnxt_re: Remove always true dattr validity check (git-fixes)
  * RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes)
  * RDMA/hns: Fix accessing invalid dip_ctx during destroying QP (git-fixes)
  * RDMA/hns: Fix mapping error of zero-hop WQE buffer (git-fixes)
  * RDMA/hns: Fix missing flush CQE for DWQE (git-fixes)
  * RDMA/hns: Fix warning storm caused by invalid input in IO path (git-fixes)
  * RDMA/mlx5: Enforce same type port association for multiport RoCE (git-fixes)
  * RDMA/rtrs: Ensure 'ib_sge list' is accessible (git-fixes)
  * RDMA/uverbs: Prevent integer overflow issue (git-fixes)
  * readahead: use ilog2 instead of a while loop in page_cache_ra_order()
    (bsc#1234208).
  * regmap: Use correct format specifier for logging range errors (stable-
    fixes).
  * regulator: rk808: Add apply_bit for BUCK3 on RK809 (stable-fixes).
  * rtc: cmos: avoid taking rtc_lock for extended period of time (stable-fixes).
  * s390/cio: Do not unregister the subchannel based on DNV (git-fixes).
  * s390/cpum_sf: Convert to cmpxchg128() (bsc#1220773).
  * s390/cpum_sf: Handle CPU hotplug remove during sampling (git-fixes).
  * s390/cpum_sf: Remove WARN_ON_ONCE statements (git-fixes).
  * s390/facility: Disable compile time optimization for decompressor code (git-
    fixes).
  * s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct() (git-fixes).
  * s390/pageattr: Implement missing kernel_page_present() (git-fixes).
  * scatterlist: fix incorrect func name in kernel-doc (git-fixes).
  * sched/numa: fix memory leak due to the overwritten vma->numab_state (git
    fixes (sched/numa)).
  * scsi: lpfc: Add handling for LS_RJT reason explanation authentication
    required (bsc#1235409).
  * scsi: lpfc: Add support for large fw object application layer reads
    (bsc#1235409).
  * scsi: lpfc: Change lpfc_nodelist save_flags member into a bitmask
    (bsc#1235409).
  * scsi: lpfc: Copyright updates for 14.4.0.7 patches (bsc#1235409).
  * scsi: lpfc: Delete NLP_TARGET_REMOVE flag due to obsolete usage
    (bsc#1235409).
  * scsi: lpfc: Modify handling of ADISC based on ndlp state and RPI
    registration (bsc#1235409).
  * scsi: lpfc: Redefine incorrect type in lpfc_create_device_data()
    (bsc#1235409).
  * scsi: lpfc: Restrict the REG_FCFI MAM field to FCoE adapters only
    (bsc#1235409).
  * scsi: lpfc: Update definition of firmware configuration mbox cmds
    (bsc#1235409).
  * scsi: lpfc: Update lpfc version to 14.4.0.7 (bsc#1235409).
  * scsi: qla2xxx: Fix abort in bsg timeout (bsc#1235406).
  * scsi: qla2xxx: Fix NVMe and NPIV connect issue (bsc#1235406).
  * scsi: qla2xxx: Fix use after free on unload (bsc#1235406).
  * scsi: qla2xxx: Remove check req_sg_cnt should be equal to rsp_sg_cnt
    (bsc#1235406).
  * scsi: qla2xxx: Remove the unused 'del_list_entry' field in struct fc_port
    (bsc#1235406).
  * scsi: qla2xxx: Supported speed displayed incorrectly for VPorts
    (bsc#1235406).
  * scsi: qla2xxx: Update version to 10.02.09.400-k (bsc#1235406).
  * scsi: storvsc: Do not flag MAINTENANCE_IN return of SRB_STATUS_DATA_OVERRUN
    as an error (git-fixes).
  * selftests/bpf: Test PROBE_MEM of VSYSCALL_ADDR on x86-64 (git-fixes).
  * serial: 8250_dw: Add Sophgo SG2044 quirk (stable-fixes).
  * serial: 8250_dw: Do not use struct dw8250_data outside of 8250_dw (git-
    fixes).
  * serial: 8250_dw: Replace ACPI device check by a quirk (git-fixes).
  * serial: 8250_fintek: Add support for F81216E (stable-fixes).
  * serial: amba-pl011: fix build regression (git-fixes).
  * serial: amba-pl011: Fix RX stall when DMA is used (git-fixes).
  * serial: amba-pl011: Use port lock wrappers (stable-fixes).
  * serial: Do not hold the port lock when setting rx-during-tx GPIO (git-
    fixes).
  * serial: do not use uninitialized value in uart_poll_init() (git-fixes).
  * serial: imx: only set receiver level if it is zero (git-fixes).
  * serial: imx: set receiver level before starting uart (git-fixes).
  * serial: qcom-geni: disable interrupts during console writes (git-fixes).
  * serial: qcom-geni: Do not cancel/abort if we can't get the port lock (git-
    fixes).
  * serial: qcom-geni: fix arg types for qcom_geni_serial_poll_bit() (git-
    fixes).
  * serial: qcom-geni: fix console corruption (git-fixes).
  * serial: qcom-geni: fix dma rx cancellation (git-fixes).
  * serial: qcom-geni: fix false console tx restart (git-fixes).
  * serial: qcom-geni: fix fifo polling timeout (git-fixes).
  * serial: qcom-geni: fix hard lockup on buffer flush (git-fixes).
  * serial: qcom-geni: fix polled console corruption (git-fixes).
  * serial: qcom-geni: fix polled console initialisation (git-fixes).
  * serial: qcom-geni: fix receiver enable (git-fixes).
  * serial: qcom-geni: fix shutdown race (git-fixes).
  * serial: qcom-geni: fix soft lockup on sw flow control and suspend (git-
    fixes).
  * serial: qcom-geni: introduce qcom_geni_serial_poll_bitfield() (git-fixes).
  * serial: qcom-geni: revert broken hibernation support (git-fixes).
  * serial: stm32: do not always set SER_RS485_RX_DURING_TX if RS485 is enabled
    (git-fixes).
  * serial: stm32: Return IRQ_NONE in the ISR if no handling happend (git-
    fixes).
  * slub: Replace cmpxchg_double() - KABI fix (bsc#1220773).
  * slub: Replace cmpxchg_double() (bsc#1220773).
  * smb: client: fix TCP timers deadlock after rmmod (git-fixes) [hcarvalho: fix
    issue described in bsc#1233642]
  * soc: fsl: cpm1: qmc: Fix blank line and spaces (stable-fixes).
  * soc: fsl: cpm1: qmc: Introduce qmc_{init,exit}_xcc() and their CPM1 version
    (stable-fixes).
  * soc: fsl: cpm1: qmc: Introduce qmc_init_resource() and its CPM1 version
    (stable-fixes).
  * soc: fsl: cpm1: qmc: Re-order probe() operations (stable-fixes).
  * soc: fsl: cpm1: qmc: Set the ret error code on platform_get_irq() failure
    (git-fixes).
  * soc: imx8m: Probe the SoC driver as platform driver (stable-fixes).
  * soc: qcom: Add check devm_kasprintf() returned value (stable-fixes).
  * soc: qcom: geni-se: add GP_LENGTH/IRQ_EN_SET/IRQ_EN_CLEAR registers (git-
    fixes).
  * soc: qcom: geni-se: Add M_TX_FIFO_NOT_EMPTY bit definition (git-fixes).
  * soc: qcom: socinfo: fix revision check in qcom_socinfo_probe() (git-fixes).
  * soc/fsl: cpm: qmc: Convert to platform remove callback returning void
    (stable-fixes).
  * spi: aspeed: Fix an error handling path in aspeed_spi_[read|write]_user()
    (git-fixes).
  * sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport (git-fixes).
  * sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (git-fixes).
  * sunrpc: handle -ENOTCONN in xs_tcp_setup_socket() (git-fixes).
  * SUNRPC: make sure cache entry active before cache_show (git-fixes).
  * SUNRPC: timeout and cancel TLS handshake with -ETIMEDOUT (git-fixes).
  * svcrdma: Address an integer overflow (git-fixes).
  * svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init() (git-
    fixes).
  * swiotlb: Enforce page alignment in swiotlb_alloc() (git-fixes).
  * swiotlb: Reinstate page-alignment for mappings >= PAGE_SIZE (git-fixes).
  * thermal/drivers/qcom/tsens-v1: Add support for MSM8937 tsens (stable-fixes).
  * tools: hv: change permissions of NetworkManager configuration file (git-
    fixes).
  * tpm_tis_spi: Release chip select when flow control fails (bsc#1234338)
  * tpm/eventlog: Limit memory allocations for event logs with excessive size
    (bsc#1233260 bsc#1233259 bsc#1232421).
  * tty: serial: kgdboc: Fix 8250_* kgdb over serial (git-fixes).
  * types: Introduce [us]128 (bsc#1220773).
  * ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit (git-
    fixes).
  * ubifs: Correct the total block count by deducting journal reservation (git-
    fixes).
  * udf: Fix lock ordering in udf_evict_inode() (bsc#1234238).
  * udf: fix uninit-value use in udf_get_fileshortad (bsc#1234243).
  * udf: prevent integer overflow in udf_bitmap_free_blocks() (bsc#1234239).
  * udf: refactor inode_bmap() to handle error (bsc#1234242).
  * udf: refactor udf_current_aext() to handle error (bsc#1234240).
  * udf: refactor udf_next_aext() to handle error (bsc#1234241).
  * udf: udftime: prevent overflow in udf_disk_stamp_to_time() (bsc#1234237).
  * usb: add support for new USB device ID 0x17EF:0x3098 for the r8152 driver
    (stable-fixes).
  * usb: cdns3-ti: Add workaround for Errata i2409 (stable-fixes).
  * usb: cdns3: Add quirk flag to enable suspend residency (stable-fixes).
  * usb: chipidea: udc: handle USB Error Interrupt if IOC not set (stable-
    fixes).
  * usb: dwc2: Fix HCD port connection race (git-fixes).
  * usb: dwc2: Fix HCD resume (git-fixes).
  * usb: dwc2: gadget: Do not write invalid mapped sg entries into dma_desc with
    iommu enabled (stable-fixes).
  * usb: dwc2: hcd: Fix GetPortStatus & SetPortFeature (git-fixes).
  * usb: dwc3: ep0: Do not clear ep0 DWC3_EP_TRANSFER_STARTED (git-fixes).
  * usb: dwc3: ep0: Do not reset resource alloc flag (git-fixes).
  * usb: dwc3: ep0: Do not reset resource alloc flag (including ep0) (git-
    fixes).
  * usb: dwc3: gadget: Rewrite endpoint allocation flow (stable-fixes).
  * usb: dwc3: xilinx: make sure pipe clock is deselected in usb2 only mode
    (git-fixes).
  * usb: ehci-hcd: fix call balance of clocks handling routines (git-fixes).
  * usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to
    accessing null pointer (git-fixes).
  * usb: host: max3421-hcd: Correctly abort a USB request (git-fixes).
  * USB: serial: option: add MediaTek T7XX compositions (stable-fixes).
  * USB: serial: option: add MeiG Smart SLM770A (stable-fixes).
  * USB: serial: option: add Netprisma LCUK54 modules for WWAN Ready (stable-
    fixes).
  * USB: serial: option: add TCL IK512 MBIM & ECM (stable-fixes).
  * USB: serial: option: add Telit FE910C04 rmnet compositions (stable-fixes).
  * usb: typec: anx7411: fix fwnode_handle reference leak (git-fixes).
  * usb: typec: anx7411: fix OF node reference leaks in
    anx7411_typec_switch_probe() (git-fixes).
  * usb: typec: use cleanup facility for 'altmodes_node' (stable-fixes).
  * vdpa: solidrun: Fix UB bug with devres (git-fixes).
  * vDPA/ifcvf: Fix pci_read_config_byte() return code handling (git-fixes).
  * vdpa/mlx5: Fix PA offset with unaligned starting iotlb map (git-fixes).
  * vdpa/mlx5: Fix suboptimal range on iotlb iteration (git-fixes).
  * vfs: fix readahead(2) on block devices (bsc#1234201).
  * wifi: ath5k: add PCI ID for Arcadyan devices (git-fixes).
  * wifi: ath5k: add PCI ID for SX76X (git-fixes).
  * wifi: brcmfmac: Fix oops due to NULL pointer dereference in
    brcmf_sdiod_sglist_rw() (stable-fixes).
  * wifi: cfg80211: sme: init n_channels before channels[] access (git-fixes).
  * wifi: cw1200: Fix potential NULL dereference (git-fixes).
  * wifi: ipw2x00: libipw_rx_any(): fix bad alignment (stable-fixes).
  * wifi: iwlwifi: mvm: Use the sync timepoint API in suspend (stable-fixes).
  * wifi: mac80211: clean up 'ret' in sta_link_apply_parameters() (stable-
    fixes).
  * wifi: mac80211: fix station NSS capability initialization order (git-fixes).
  * wifi: mac80211: init cnt before accessing elem in
    ieee80211_copy_mbssid_beacon (git-fixes).
  * wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one (git-fixes).
  * wifi: rtlwifi: Drastically reduce the attempts to read efuse in case of
    failures (stable-fixes).
  * wifi: rtw89: check return value of ieee80211_probereq_get() for RNR (stable-
    fixes).
  * workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from
    !WQ_MEM_RECLAIM worker (bsc#1235416).
  * writeback, cgroup: switch inodes with dirty timestamps to release dying
    cgwbs (bsc#1234203).
  * x86,amd_iommu: Replace cmpxchg_double() (bsc#1220773).
  * x86,intel_iommu: Replace cmpxchg_double() (bsc#1220773).
  * x86/hyperv: Fix hv tsc page based sched_clock for hibernation (git-fixes).
  * xfs: do not allocate COW extents when unsharing a hole (git-fixes).
  * xfs: fix sb_spino_align checks for large fsblock sizes (git-fixes).
  * xfs: remove unknown compat feature check in superblock write validation
    (git-fixes).
  * xfs: return from xfs_symlink_verify early on V4 filesystems (git-fixes).
  * xfs: sb_spino_align is not verified (git-fixes).
  * xhci: Add usb cold attach (CAS) as a reason to resume root hub (git-fixes).
  * xhci: Allow RPM on the USB controller (1022:43f7) by default (stable-fixes).
  * xhci: fix possible null pointer deref during xhci urb enqueue (git-fixes).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * openSUSE Leap 15.6  
    zypper in -t patch SUSE-2025-117=1 openSUSE-SLE-15.6-2025-117=1

  * Public Cloud Module 15-SP6  
    zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-117=1

## Package List:

  * openSUSE Leap 15.6 (aarch64 x86_64)
    * kernel-azure-extra-debuginfo-6.4.0-150600.8.23.1
    * cluster-md-kmp-azure-debuginfo-6.4.0-150600.8.23.1
    * ocfs2-kmp-azure-6.4.0-150600.8.23.1
    * kselftests-kmp-azure-6.4.0-150600.8.23.1
    * dlm-kmp-azure-debuginfo-6.4.0-150600.8.23.1
    * kernel-azure-optional-6.4.0-150600.8.23.1
    * reiserfs-kmp-azure-6.4.0-150600.8.23.1
    * cluster-md-kmp-azure-6.4.0-150600.8.23.1
    * reiserfs-kmp-azure-debuginfo-6.4.0-150600.8.23.1
    * kernel-azure-devel-debuginfo-6.4.0-150600.8.23.1
    * kernel-azure-optional-debuginfo-6.4.0-150600.8.23.1
    * gfs2-kmp-azure-debuginfo-6.4.0-150600.8.23.1
    * kernel-azure-debugsource-6.4.0-150600.8.23.1
    * kernel-azure-devel-6.4.0-150600.8.23.1
    * kselftests-kmp-azure-debuginfo-6.4.0-150600.8.23.1
    * dlm-kmp-azure-6.4.0-150600.8.23.1
    * kernel-azure-extra-6.4.0-150600.8.23.1
    * kernel-syms-azure-6.4.0-150600.8.23.1
    * ocfs2-kmp-azure-debuginfo-6.4.0-150600.8.23.1
    * kernel-azure-debuginfo-6.4.0-150600.8.23.1
    * gfs2-kmp-azure-6.4.0-150600.8.23.1
  * openSUSE Leap 15.6 (aarch64 nosrc x86_64)
    * kernel-azure-6.4.0-150600.8.23.1
  * openSUSE Leap 15.6 (x86_64)
    * kernel-azure-vdso-6.4.0-150600.8.23.1
    * kernel-azure-vdso-debuginfo-6.4.0-150600.8.23.1
  * openSUSE Leap 15.6 (noarch)
    * kernel-source-azure-6.4.0-150600.8.23.1
    * kernel-devel-azure-6.4.0-150600.8.23.1
  * Public Cloud Module 15-SP6 (aarch64 nosrc x86_64)
    * kernel-azure-6.4.0-150600.8.23.1
  * Public Cloud Module 15-SP6 (aarch64 x86_64)
    * kernel-azure-devel-debuginfo-6.4.0-150600.8.23.1
    * kernel-syms-azure-6.4.0-150600.8.23.1
    * kernel-azure-debugsource-6.4.0-150600.8.23.1
    * kernel-azure-debuginfo-6.4.0-150600.8.23.1
    * kernel-azure-devel-6.4.0-150600.8.23.1
  * Public Cloud Module 15-SP6 (noarch)
    * kernel-source-azure-6.4.0-150600.8.23.1
    * kernel-devel-azure-6.4.0-150600.8.23.1

## References:

  * https://www.suse.com/security/cve/CVE-2024-26924.html
  * https://www.suse.com/security/cve/CVE-2024-27397.html
  * https://www.suse.com/security/cve/CVE-2024-35839.html
  * https://www.suse.com/security/cve/CVE-2024-36908.html
  * https://www.suse.com/security/cve/CVE-2024-36915.html
  * https://www.suse.com/security/cve/CVE-2024-39480.html
  * https://www.suse.com/security/cve/CVE-2024-41042.html
  * https://www.suse.com/security/cve/CVE-2024-44934.html
  * https://www.suse.com/security/cve/CVE-2024-44996.html
  * https://www.suse.com/security/cve/CVE-2024-47678.html
  * https://www.suse.com/security/cve/CVE-2024-49854.html
  * https://www.suse.com/security/cve/CVE-2024-49884.html
  * https://www.suse.com/security/cve/CVE-2024-49915.html
  * https://www.suse.com/security/cve/CVE-2024-50016.html
  * https://www.suse.com/security/cve/CVE-2024-50018.html
  * https://www.suse.com/security/cve/CVE-2024-50039.html
  * https://www.suse.com/security/cve/CVE-2024-50047.html
  * https://www.suse.com/security/cve/CVE-2024-50143.html
  * https://www.suse.com/security/cve/CVE-2024-50154.html
  * https://www.suse.com/security/cve/CVE-2024-50202.html
  * https://www.suse.com/security/cve/CVE-2024-50203.html
  * https://www.suse.com/security/cve/CVE-2024-50211.html
  * https://www.suse.com/security/cve/CVE-2024-50228.html
  * https://www.suse.com/security/cve/CVE-2024-50256.html
  * https://www.suse.com/security/cve/CVE-2024-50262.html
  * https://www.suse.com/security/cve/CVE-2024-50272.html
  * https://www.suse.com/security/cve/CVE-2024-50278.html
  * https://www.suse.com/security/cve/CVE-2024-50279.html
  * https://www.suse.com/security/cve/CVE-2024-50280.html
  * https://www.suse.com/security/cve/CVE-2024-53050.html
  * https://www.suse.com/security/cve/CVE-2024-53064.html
  * https://www.suse.com/security/cve/CVE-2024-53090.html
  * https://www.suse.com/security/cve/CVE-2024-53099.html
  * https://www.suse.com/security/cve/CVE-2024-53103.html
  * https://www.suse.com/security/cve/CVE-2024-53105.html
  * https://www.suse.com/security/cve/CVE-2024-53111.html
  * https://www.suse.com/security/cve/CVE-2024-53113.html
  * https://www.suse.com/security/cve/CVE-2024-53117.html
  * https://www.suse.com/security/cve/CVE-2024-53118.html
  * https://www.suse.com/security/cve/CVE-2024-53119.html
  * https://www.suse.com/security/cve/CVE-2024-53120.html
  * https://www.suse.com/security/cve/CVE-2024-53122.html
  * https://www.suse.com/security/cve/CVE-2024-53125.html
  * https://www.suse.com/security/cve/CVE-2024-53126.html
  * https://www.suse.com/security/cve/CVE-2024-53127.html
  * https://www.suse.com/security/cve/CVE-2024-53129.html
  * https://www.suse.com/security/cve/CVE-2024-53130.html
  * https://www.suse.com/security/cve/CVE-2024-53131.html
  * https://www.suse.com/security/cve/CVE-2024-53133.html
  * https://www.suse.com/security/cve/CVE-2024-53134.html
  * https://www.suse.com/security/cve/CVE-2024-53136.html
  * https://www.suse.com/security/cve/CVE-2024-53141.html
  * https://www.suse.com/security/cve/CVE-2024-53142.html
  * https://www.suse.com/security/cve/CVE-2024-53144.html
  * https://www.suse.com/security/cve/CVE-2024-53146.html
  * https://www.suse.com/security/cve/CVE-2024-53148.html
  * https://www.suse.com/security/cve/CVE-2024-53150.html
  * https://www.suse.com/security/cve/CVE-2024-53151.html
  * https://www.suse.com/security/cve/CVE-2024-53154.html
  * https://www.suse.com/security/cve/CVE-2024-53155.html
  * https://www.suse.com/security/cve/CVE-2024-53156.html
  * https://www.suse.com/security/cve/CVE-2024-53157.html
  * https://www.suse.com/security/cve/CVE-2024-53158.html
  * https://www.suse.com/security/cve/CVE-2024-53159.html
  * https://www.suse.com/security/cve/CVE-2024-53160.html
  * https://www.suse.com/security/cve/CVE-2024-53161.html
  * https://www.suse.com/security/cve/CVE-2024-53162.html
  * https://www.suse.com/security/cve/CVE-2024-53166.html
  * https://www.suse.com/security/cve/CVE-2024-53169.html
  * https://www.suse.com/security/cve/CVE-2024-53171.html
  * https://www.suse.com/security/cve/CVE-2024-53173.html
  * https://www.suse.com/security/cve/CVE-2024-53174.html
  * https://www.suse.com/security/cve/CVE-2024-53179.html
  * https://www.suse.com/security/cve/CVE-2024-53180.html
  * https://www.suse.com/security/cve/CVE-2024-53188.html
  * https://www.suse.com/security/cve/CVE-2024-53190.html
  * https://www.suse.com/security/cve/CVE-2024-53191.html
  * https://www.suse.com/security/cve/CVE-2024-53200.html
  * https://www.suse.com/security/cve/CVE-2024-53201.html
  * https://www.suse.com/security/cve/CVE-2024-53202.html
  * https://www.suse.com/security/cve/CVE-2024-53206.html
  * https://www.suse.com/security/cve/CVE-2024-53207.html
  * https://www.suse.com/security/cve/CVE-2024-53208.html
  * https://www.suse.com/security/cve/CVE-2024-53209.html
  * https://www.suse.com/security/cve/CVE-2024-53210.html
  * https://www.suse.com/security/cve/CVE-2024-53213.html
  * https://www.suse.com/security/cve/CVE-2024-53214.html
  * https://www.suse.com/security/cve/CVE-2024-53215.html
  * https://www.suse.com/security/cve/CVE-2024-53216.html
  * https://www.suse.com/security/cve/CVE-2024-53217.html
  * https://www.suse.com/security/cve/CVE-2024-53222.html
  * https://www.suse.com/security/cve/CVE-2024-53224.html
  * https://www.suse.com/security/cve/CVE-2024-53229.html
  * https://www.suse.com/security/cve/CVE-2024-53234.html
  * https://www.suse.com/security/cve/CVE-2024-53237.html
  * https://www.suse.com/security/cve/CVE-2024-53240.html
  * https://www.suse.com/security/cve/CVE-2024-53241.html
  * https://www.suse.com/security/cve/CVE-2024-56536.html
  * https://www.suse.com/security/cve/CVE-2024-56539.html
  * https://www.suse.com/security/cve/CVE-2024-56549.html
  * https://www.suse.com/security/cve/CVE-2024-56551.html
  * https://www.suse.com/security/cve/CVE-2024-56562.html
  * https://www.suse.com/security/cve/CVE-2024-56566.html
  * https://www.suse.com/security/cve/CVE-2024-56567.html
  * https://www.suse.com/security/cve/CVE-2024-56576.html
  * https://www.suse.com/security/cve/CVE-2024-56582.html
  * https://www.suse.com/security/cve/CVE-2024-56599.html
  * https://www.suse.com/security/cve/CVE-2024-56604.html
  * https://www.suse.com/security/cve/CVE-2024-56605.html
  * https://www.suse.com/security/cve/CVE-2024-56645.html
  * https://www.suse.com/security/cve/CVE-2024-56667.html
  * https://www.suse.com/security/cve/CVE-2024-56752.html
  * https://www.suse.com/security/cve/CVE-2024-56754.html
  * https://www.suse.com/security/cve/CVE-2024-56755.html
  * https://www.suse.com/security/cve/CVE-2024-56756.html
  * https://www.suse.com/security/cve/CVE-2024-8805.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1214954
  * https://bugzilla.suse.com/show_bug.cgi?id=1216813
  * https://bugzilla.suse.com/show_bug.cgi?id=1220773
  * https://bugzilla.suse.com/show_bug.cgi?id=1224095
  * https://bugzilla.suse.com/show_bug.cgi?id=1224726
  * https://bugzilla.suse.com/show_bug.cgi?id=1225743
  * https://bugzilla.suse.com/show_bug.cgi?id=1225758
  * https://bugzilla.suse.com/show_bug.cgi?id=1225820
  * https://bugzilla.suse.com/show_bug.cgi?id=1227445
  * https://bugzilla.suse.com/show_bug.cgi?id=1228526
  * https://bugzilla.suse.com/show_bug.cgi?id=1229809
  * https://bugzilla.suse.com/show_bug.cgi?id=1230205
  * https://bugzilla.suse.com/show_bug.cgi?id=1230413
  * https://bugzilla.suse.com/show_bug.cgi?id=1230697
  * https://bugzilla.suse.com/show_bug.cgi?id=1231854
  * https://bugzilla.suse.com/show_bug.cgi?id=1231909
  * https://bugzilla.suse.com/show_bug.cgi?id=1231963
  * https://bugzilla.suse.com/show_bug.cgi?id=1232193
  * https://bugzilla.suse.com/show_bug.cgi?id=1232198
  * https://bugzilla.suse.com/show_bug.cgi?id=1232201
  * https://bugzilla.suse.com/show_bug.cgi?id=1232418
  * https://bugzilla.suse.com/show_bug.cgi?id=1232419
  * https://bugzilla.suse.com/show_bug.cgi?id=1232420
  * https://bugzilla.suse.com/show_bug.cgi?id=1232421
  * https://bugzilla.suse.com/show_bug.cgi?id=1232436
  * https://bugzilla.suse.com/show_bug.cgi?id=1233038
  * https://bugzilla.suse.com/show_bug.cgi?id=1233070
  * https://bugzilla.suse.com/show_bug.cgi?id=1233096
  * https://bugzilla.suse.com/show_bug.cgi?id=1233200
  * https://bugzilla.suse.com/show_bug.cgi?id=1233204
  * https://bugzilla.suse.com/show_bug.cgi?id=1233239
  * https://bugzilla.suse.com/show_bug.cgi?id=1233259
  * https://bugzilla.suse.com/show_bug.cgi?id=1233260
  * https://bugzilla.suse.com/show_bug.cgi?id=1233324
  * https://bugzilla.suse.com/show_bug.cgi?id=1233328
  * https://bugzilla.suse.com/show_bug.cgi?id=1233461
  * https://bugzilla.suse.com/show_bug.cgi?id=1233467
  * https://bugzilla.suse.com/show_bug.cgi?id=1233468
  * https://bugzilla.suse.com/show_bug.cgi?id=1233469
  * https://bugzilla.suse.com/show_bug.cgi?id=1233546
  * https://bugzilla.suse.com/show_bug.cgi?id=1233558
  * https://bugzilla.suse.com/show_bug.cgi?id=1233637
  * https://bugzilla.suse.com/show_bug.cgi?id=1233642
  * https://bugzilla.suse.com/show_bug.cgi?id=1233772
  * https://bugzilla.suse.com/show_bug.cgi?id=1233837
  * https://bugzilla.suse.com/show_bug.cgi?id=1234024
  * https://bugzilla.suse.com/show_bug.cgi?id=1234069
  * https://bugzilla.suse.com/show_bug.cgi?id=1234071
  * https://bugzilla.suse.com/show_bug.cgi?id=1234073
  * https://bugzilla.suse.com/show_bug.cgi?id=1234075
  * https://bugzilla.suse.com/show_bug.cgi?id=1234076
  * https://bugzilla.suse.com/show_bug.cgi?id=1234077
  * https://bugzilla.suse.com/show_bug.cgi?id=1234079
  * https://bugzilla.suse.com/show_bug.cgi?id=1234086
  * https://bugzilla.suse.com/show_bug.cgi?id=1234139
  * https://bugzilla.suse.com/show_bug.cgi?id=1234140
  * https://bugzilla.suse.com/show_bug.cgi?id=1234141
  * https://bugzilla.suse.com/show_bug.cgi?id=1234142
  * https://bugzilla.suse.com/show_bug.cgi?id=1234143
  * https://bugzilla.suse.com/show_bug.cgi?id=1234144
  * https://bugzilla.suse.com/show_bug.cgi?id=1234145
  * https://bugzilla.suse.com/show_bug.cgi?id=1234146
  * https://bugzilla.suse.com/show_bug.cgi?id=1234147
  * https://bugzilla.suse.com/show_bug.cgi?id=1234148
  * https://bugzilla.suse.com/show_bug.cgi?id=1234149
  * https://bugzilla.suse.com/show_bug.cgi?id=1234150
  * https://bugzilla.suse.com/show_bug.cgi?id=1234153
  * https://bugzilla.suse.com/show_bug.cgi?id=1234155
  * https://bugzilla.suse.com/show_bug.cgi?id=1234156
  * https://bugzilla.suse.com/show_bug.cgi?id=1234158
  * https://bugzilla.suse.com/show_bug.cgi?id=1234159
  * https://bugzilla.suse.com/show_bug.cgi?id=1234160
  * https://bugzilla.suse.com/show_bug.cgi?id=1234161
  * https://bugzilla.suse.com/show_bug.cgi?id=1234162
  * https://bugzilla.suse.com/show_bug.cgi?id=1234163
  * https://bugzilla.suse.com/show_bug.cgi?id=1234164
  * https://bugzilla.suse.com/show_bug.cgi?id=1234165
  * https://bugzilla.suse.com/show_bug.cgi?id=1234166
  * https://bugzilla.suse.com/show_bug.cgi?id=1234167
  * https://bugzilla.suse.com/show_bug.cgi?id=1234168
  * https://bugzilla.suse.com/show_bug.cgi?id=1234169
  * https://bugzilla.suse.com/show_bug.cgi?id=1234170
  * https://bugzilla.suse.com/show_bug.cgi?id=1234171
  * https://bugzilla.suse.com/show_bug.cgi?id=1234172
  * https://bugzilla.suse.com/show_bug.cgi?id=1234173
  * https://bugzilla.suse.com/show_bug.cgi?id=1234174
  * https://bugzilla.suse.com/show_bug.cgi?id=1234175
  * https://bugzilla.suse.com/show_bug.cgi?id=1234176
  * https://bugzilla.suse.com/show_bug.cgi?id=1234177
  * https://bugzilla.suse.com/show_bug.cgi?id=1234178
  * https://bugzilla.suse.com/show_bug.cgi?id=1234179
  * https://bugzilla.suse.com/show_bug.cgi?id=1234180
  * https://bugzilla.suse.com/show_bug.cgi?id=1234181
  * https://bugzilla.suse.com/show_bug.cgi?id=1234182
  * https://bugzilla.suse.com/show_bug.cgi?id=1234183
  * https://bugzilla.suse.com/show_bug.cgi?id=1234184
  * https://bugzilla.suse.com/show_bug.cgi?id=1234185
  * https://bugzilla.suse.com/show_bug.cgi?id=1234186
  * https://bugzilla.suse.com/show_bug.cgi?id=1234187
  * https://bugzilla.suse.com/show_bug.cgi?id=1234188
  * https://bugzilla.suse.com/show_bug.cgi?id=1234189
  * https://bugzilla.suse.com/show_bug.cgi?id=1234190
  * https://bugzilla.suse.com/show_bug.cgi?id=1234191
  * https://bugzilla.suse.com/show_bug.cgi?id=1234192
  * https://bugzilla.suse.com/show_bug.cgi?id=1234193
  * https://bugzilla.suse.com/show_bug.cgi?id=1234194
  * https://bugzilla.suse.com/show_bug.cgi?id=1234195
  * https://bugzilla.suse.com/show_bug.cgi?id=1234196
  * https://bugzilla.suse.com/show_bug.cgi?id=1234197
  * https://bugzilla.suse.com/show_bug.cgi?id=1234198
  * https://bugzilla.suse.com/show_bug.cgi?id=1234199
  * https://bugzilla.suse.com/show_bug.cgi?id=1234200
  * https://bugzilla.suse.com/show_bug.cgi?id=1234201
  * https://bugzilla.suse.com/show_bug.cgi?id=1234203
  * https://bugzilla.suse.com/show_bug.cgi?id=1234204
  * https://bugzilla.suse.com/show_bug.cgi?id=1234205
  * https://bugzilla.suse.com/show_bug.cgi?id=1234207
  * https://bugzilla.suse.com/show_bug.cgi?id=1234208
  * https://bugzilla.suse.com/show_bug.cgi?id=1234209
  * https://bugzilla.suse.com/show_bug.cgi?id=1234219
  * https://bugzilla.suse.com/show_bug.cgi?id=1234220
  * https://bugzilla.suse.com/show_bug.cgi?id=1234221
  * https://bugzilla.suse.com/show_bug.cgi?id=1234237
  * https://bugzilla.suse.com/show_bug.cgi?id=1234238
  * https://bugzilla.suse.com/show_bug.cgi?id=1234239
  * https://bugzilla.suse.com/show_bug.cgi?id=1234240
  * https://bugzilla.suse.com/show_bug.cgi?id=1234241
  * https://bugzilla.suse.com/show_bug.cgi?id=1234242
  * https://bugzilla.suse.com/show_bug.cgi?id=1234243
  * https://bugzilla.suse.com/show_bug.cgi?id=1234278
  * https://bugzilla.suse.com/show_bug.cgi?id=1234279
  * https://bugzilla.suse.com/show_bug.cgi?id=1234280
  * https://bugzilla.suse.com/show_bug.cgi?id=1234281
  * https://bugzilla.suse.com/show_bug.cgi?id=1234282
  * https://bugzilla.suse.com/show_bug.cgi?id=1234294
  * https://bugzilla.suse.com/show_bug.cgi?id=1234338
  * https://bugzilla.suse.com/show_bug.cgi?id=1234357
  * https://bugzilla.suse.com/show_bug.cgi?id=1234381
  * https://bugzilla.suse.com/show_bug.cgi?id=1234454
  * https://bugzilla.suse.com/show_bug.cgi?id=1234464
  * https://bugzilla.suse.com/show_bug.cgi?id=1234605
  * https://bugzilla.suse.com/show_bug.cgi?id=1234651
  * https://bugzilla.suse.com/show_bug.cgi?id=1234652
  * https://bugzilla.suse.com/show_bug.cgi?id=1234654
  * https://bugzilla.suse.com/show_bug.cgi?id=1234655
  * https://bugzilla.suse.com/show_bug.cgi?id=1234657
  * https://bugzilla.suse.com/show_bug.cgi?id=1234658
  * https://bugzilla.suse.com/show_bug.cgi?id=1234659
  * https://bugzilla.suse.com/show_bug.cgi?id=1234668
  * https://bugzilla.suse.com/show_bug.cgi?id=1234690
  * https://bugzilla.suse.com/show_bug.cgi?id=1234725
  * https://bugzilla.suse.com/show_bug.cgi?id=1234726
  * https://bugzilla.suse.com/show_bug.cgi?id=1234810
  * https://bugzilla.suse.com/show_bug.cgi?id=1234811
  * https://bugzilla.suse.com/show_bug.cgi?id=1234826
  * https://bugzilla.suse.com/show_bug.cgi?id=1234827
  * https://bugzilla.suse.com/show_bug.cgi?id=1234829
  * https://bugzilla.suse.com/show_bug.cgi?id=1234832
  * https://bugzilla.suse.com/show_bug.cgi?id=1234834
  * https://bugzilla.suse.com/show_bug.cgi?id=1234843
  * https://bugzilla.suse.com/show_bug.cgi?id=1234846
  * https://bugzilla.suse.com/show_bug.cgi?id=1234848
  * https://bugzilla.suse.com/show_bug.cgi?id=1234853
  * https://bugzilla.suse.com/show_bug.cgi?id=1234855
  * https://bugzilla.suse.com/show_bug.cgi?id=1234856
  * https://bugzilla.suse.com/show_bug.cgi?id=1234884
  * https://bugzilla.suse.com/show_bug.cgi?id=1234889
  * https://bugzilla.suse.com/show_bug.cgi?id=1234891
  * https://bugzilla.suse.com/show_bug.cgi?id=1234899
  * https://bugzilla.suse.com/show_bug.cgi?id=1234900
  * https://bugzilla.suse.com/show_bug.cgi?id=1234905
  * https://bugzilla.suse.com/show_bug.cgi?id=1234907
  * https://bugzilla.suse.com/show_bug.cgi?id=1234909
  * https://bugzilla.suse.com/show_bug.cgi?id=1234911
  * https://bugzilla.suse.com/show_bug.cgi?id=1234912
  * https://bugzilla.suse.com/show_bug.cgi?id=1234916
  * https://bugzilla.suse.com/show_bug.cgi?id=1234918
  * https://bugzilla.suse.com/show_bug.cgi?id=1234920
  * https://bugzilla.suse.com/show_bug.cgi?id=1234921
  * https://bugzilla.suse.com/show_bug.cgi?id=1234922
  * https://bugzilla.suse.com/show_bug.cgi?id=1234929
  * https://bugzilla.suse.com/show_bug.cgi?id=1234930
  * https://bugzilla.suse.com/show_bug.cgi?id=1234937
  * https://bugzilla.suse.com/show_bug.cgi?id=1234948
  * https://bugzilla.suse.com/show_bug.cgi?id=1234950
  * https://bugzilla.suse.com/show_bug.cgi?id=1234952
  * https://bugzilla.suse.com/show_bug.cgi?id=1234960
  * https://bugzilla.suse.com/show_bug.cgi?id=1234962
  * https://bugzilla.suse.com/show_bug.cgi?id=1234963
  * https://bugzilla.suse.com/show_bug.cgi?id=1234968
  * https://bugzilla.suse.com/show_bug.cgi?id=1234969
  * https://bugzilla.suse.com/show_bug.cgi?id=1234970
  * https://bugzilla.suse.com/show_bug.cgi?id=1234971
  * https://bugzilla.suse.com/show_bug.cgi?id=1234973
  * https://bugzilla.suse.com/show_bug.cgi?id=1234974
  * https://bugzilla.suse.com/show_bug.cgi?id=1234989
  * https://bugzilla.suse.com/show_bug.cgi?id=1234999
  * https://bugzilla.suse.com/show_bug.cgi?id=1235002
  * https://bugzilla.suse.com/show_bug.cgi?id=1235003
  * https://bugzilla.suse.com/show_bug.cgi?id=1235004
  * https://bugzilla.suse.com/show_bug.cgi?id=1235007
  * https://bugzilla.suse.com/show_bug.cgi?id=1235009
  * https://bugzilla.suse.com/show_bug.cgi?id=1235016
  * https://bugzilla.suse.com/show_bug.cgi?id=1235019
  * https://bugzilla.suse.com/show_bug.cgi?id=1235033
  * https://bugzilla.suse.com/show_bug.cgi?id=1235045
  * https://bugzilla.suse.com/show_bug.cgi?id=1235056
  * https://bugzilla.suse.com/show_bug.cgi?id=1235061
  * https://bugzilla.suse.com/show_bug.cgi?id=1235075
  * https://bugzilla.suse.com/show_bug.cgi?id=1235108
  * https://bugzilla.suse.com/show_bug.cgi?id=1235128
  * https://bugzilla.suse.com/show_bug.cgi?id=1235134
  * https://bugzilla.suse.com/show_bug.cgi?id=1235138
  * https://bugzilla.suse.com/show_bug.cgi?id=1235246
  * https://bugzilla.suse.com/show_bug.cgi?id=1235406
  * https://bugzilla.suse.com/show_bug.cgi?id=1235409
  * https://bugzilla.suse.com/show_bug.cgi?id=1235416
  * https://bugzilla.suse.com/show_bug.cgi?id=1235507
  * https://bugzilla.suse.com/show_bug.cgi?id=1235550
  * https://jira.suse.com/browse/PED-10467

openSUSE: 2025:0117-1 important: the Linux Kernel Advisory Security Update

January 15, 2025

Description

The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820). * CVE-2024-27397: netfilter: nf_tables: use timestamp to check for set element timeout (bsc#1224095). * CVE-2024-35839: kABI fix for netfilter: bridge: replace physindev with physinif in nf_bridge_info (bsc#1224726). * CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758). * CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526). * CVE-2024-44934: net: bridge: mcast: wait for previous gc cycles when removing port (bsc#1229809). * CVE-2024-44996: vsock: fix recursive ->recvmsg calls (bsc#1230205). * CVE-2024-47678: icmp: change the order of rate limits (bsc#1231854). * CVE-2024-50018: net: napi: Prevent overflow of napi_defer_hard_irqs (bsc#1232419). * CVE-2024-50039: kABI: Restore d...

Read the Full Advisory

 

Patch

## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-117=1 openSUSE-SLE-15.6-2025-117=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-117=1


Package List

* openSUSE Leap 15.6 (aarch64 x86_64) * kernel-azure-extra-debuginfo-6.4.0-150600.8.23.1 * cluster-md-kmp-azure-debuginfo-6.4.0-150600.8.23.1 * ocfs2-kmp-azure-6.4.0-150600.8.23.1 * kselftests-kmp-azure-6.4.0-150600.8.23.1 * dlm-kmp-azure-debuginfo-6.4.0-150600.8.23.1 * kernel-azure-optional-6.4.0-150600.8.23.1 * reiserfs-kmp-azure-6.4.0-150600.8.23.1 * cluster-md-kmp-azure-6.4.0-150600.8.23.1 * reiserfs-kmp-azure-debuginfo-6.4.0-150600.8.23.1 * kernel-azure-devel-debuginfo-6.4.0-150600.8.23.1 * kernel-azure-optional-debuginfo-6.4.0-150600.8.23.1 * gfs2-kmp-azure-debuginfo-6.4.0-150600.8.23.1 * kernel-azure-debugsource-6.4.0-150600.8.23.1 * kernel-azure-devel-6.4.0-150600.8.23.1 * kselftests-kmp-azure-debuginfo-6.4.0-150600.8.23.1 * dlm-kmp-azure-6.4.0-150600.8.23.1 * kernel-azure-extra-6.4.0-150600.8.23.1 * kernel-syms-azure-6.4.0-150600.8.23.1 * ocfs2-kmp-azure-debuginfo-6.4.0-150600.8.23.1 * kernel-azure-debuginfo-6.4.0-150600.8.23.1 * gfs2-kmp-azure-6.4.0-150600.8.23.1 * openSUSE Leap 15.6 (aarch64 nosrc x86_64) * kernel-azure-6.4.0-150600.8.23.1 * openSUSE Leap 15.6 (x86_64) * kernel-azure-vdso-6.4.0-150600.8.23.1 * kernel-azure-vdso-debuginfo-6.4.0-150600.8.23.1 * openSUSE Leap 15.6 (noarch) * kernel-source-azure-6.4.0-150600.8.23.1 * kernel-devel-azure-6.4.0-150600.8.23.1 * Public Cloud Module 15-SP6 (aarch64 nosrc x86_64) * kernel-azure-6.4.0-150600.8.23.1 * Public Cloud Module 15-SP6 (aarch64 x86_64) * kernel-azure-devel-debuginfo-6.4.0-150600.8.23.1 * kernel-syms-azure-6.4.0-150600.8.23.1 * kernel-azure-debugsource-6.4.0-150600.8.23.1 * kernel-azure-debuginfo-6.4.0-150600.8.23.1 * kernel-azure-devel-6.4.0-150600.8.23.1 * Public Cloud Module 15-SP6 (noarch) * kernel-source-azure-6.4.0-150600.8.23.1 * kernel-devel-azure-6.4.0-150600.8.23.1


References

* bsc#1214954 * bsc#1216813 * bsc#1220773 * bsc#1224095 * bsc#1224726 * bsc#1225743 * bsc#1225758 * bsc#1225820 * bsc#1227445 * bsc#1228526 * bsc#1229809 * bsc#1230205 * bsc#1230413 * bsc#1230697 * bsc#1231854 * bsc#1231909 * bsc#1231963 * bsc#1232193 * bsc#1232198 * bsc#1232201 * bsc#1232418 * bsc#1232419 * bsc#1232420 * bsc#1232421 * bsc#1232436 * bsc#1233038 * bsc#1233070 * bsc#1233096 * bsc#1233200 * bsc#1233204 * bsc#1233239 * bsc#1233259 * bsc#1233260 * bsc#1233324 * bsc#1233328 * bsc#1233461 * bsc#1233467 * bsc#1233468 * bsc#1233469 * bsc#1233546 * bsc#1233558 * bsc#1233637 * bsc#1233642 * bsc#1233772 * bsc#1233837 * bsc#1234024 * bsc#1234069 * bsc#1234071 * bsc#1234073 * bsc#1234075 * bsc#1234076 * bsc#1234077 * bsc#1234079 * bsc#1234086 * bsc#1234139 * bsc#1234140 * bsc#1234141 * bsc#1234142 * bsc#1234143 * bsc#1234144 * bsc#1234145 * bsc#1234146 * bsc#1234147 * bsc#1234148 * bsc#1234149 * bsc#1234150 * bsc#1234153 * bsc#1234155 * bsc#1234156 * bsc#1234158 * bsc#1234159 * bsc#1234160 * bsc#1234161 * bsc#1234162 * bsc#1234163 * bsc#1234164 * bsc#1234165 * bsc#1234166 * bsc#1234167 * bsc#1234168 * bsc#1234169 * bsc#1234170 * bsc#1234171 * bsc#1234172 * bsc#1234173 * bsc#1234174 * bsc#1234175 * bsc#1234176 * bsc#1234177 * bsc#1234178 * bsc#1234179 * bsc#1234180 * bsc#1234181 * bsc#1234182 * bsc#1234183 * bsc#1234184 * bsc#1234185 * bsc#1234186 * bsc#1234187 * bsc#1234188 * bsc#1234189 * bsc#1234190 * bsc#1234191 * bsc#1234192 * bsc#1234193 * bsc#1234194 * bsc#1234195 * bsc#1234196 * bsc#1234197 * bsc#1234198 * bsc#1234199 * bsc#1234200 * bsc#1234201 * bsc#1234203 * bsc#1234204 * bsc#1234205 * bsc#1234207 * bsc#1234208 * bsc#1234209 * bsc#1234219 * bsc#1234220 * bsc#1234221 * bsc#1234237 * bsc#1234238 * bsc#1234239 * bsc#1234240 * bsc#1234241 * bsc#1234242 * bsc#1234243 * bsc#1234278 * bsc#1234279 * bsc#1234280 * bsc#1234281 * bsc#1234282 * bsc#1234294 * bsc#1234338 * bsc#1234357 * bsc#1234381 * bsc#1234454 * bsc#1234464 * bsc#1234605 * bsc#1234651 * bsc#1234652 * bsc#1234654 * bsc#1234655 * bsc#1234657 * bsc#1234658 * bsc#1234659 * bsc#1234668 * bsc#1234690 * bsc#1234725 * bsc#1234726 * bsc#1234810 * bsc#1234811 * bsc#1234826 * bsc#1234827 * bsc#1234829 * bsc#1234832 * bsc#1234834 * bsc#1234843 * bsc#1234846 * bsc#1234848 * bsc#1234853 * bsc#1234855 * bsc#1234856 * bsc#1234884 * bsc#1234889 * bsc#1234891 * bsc#1234899 * bsc#1234900 * bsc#1234905 * bsc#1234907 * bsc#1234909 * bsc#1234911 * bsc#1234912 * bsc#1234916 * bsc#1234918 * bsc#1234920 * bsc#1234921 * bsc#1234922 * bsc#1234929 * bsc#1234930 * bsc#1234937 * bsc#1234948 * bsc#1234950 * bsc#1234952 * bsc#1234960 * bsc#1234962 * bsc#1234963 * bsc#1234968 * bsc#1234969 * bsc#1234970 * bsc#1234971 * bsc#1234973 * bsc#1234974 * bsc#1234989 * bsc#1234999 * bsc#1235002 * bsc#1235003 * bsc#1235004 * bsc#1235007 * bsc#1235009 * bsc#1235016 * bsc#1235019 * bsc#1235033 * bsc#1235045 * bsc#1235056 * bsc#1235061 * bsc#1235075 * bsc#1235108 * bsc#1235128 * bsc#1235134 * bsc#1235138 * bsc#1235246 * bsc#1235406 * bsc#1235409 * bsc#1235416 * bsc#1235507 * bsc#1235550 * jsc#PED-10467 ## References: * https://www.suse.com/security/cve/CVE-2024-26924.html * https://www.suse.com/security/cve/CVE-2024-27397.html * https://www.suse.com/security/cve/CVE-2024-35839.html * https://www.suse.com/security/cve/CVE-2024-36908.html * https://www.suse.com/security/cve/CVE-2024-36915.html * https://www.suse.com/security/cve/CVE-2024-39480.html * https://www.suse.com/security/cve/CVE-2024-41042.html * https://www.suse.com/security/cve/CVE-2024-44934.html * https://www.suse.com/security/cve/CVE-2024-44996.html * https://www.suse.com/security/cve/CVE-2024-47678.html * https://www.suse.com/security/cve/CVE-2024-49854.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49915.html * https://www.suse.com/security/cve/CVE-2024-50016.html * https://www.suse.com/security/cve/CVE-2024-50018.html * https://www.suse.com/security/cve/CVE-2024-50039.html * https://www.suse.com/security/cve/CVE-2024-50047.html * https://www.suse.com/security/cve/CVE-2024-50143.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50202.html * https://www.suse.com/security/cve/CVE-2024-50203.html * https://www.suse.com/security/cve/CVE-2024-50211.html * https://www.suse.com/security/cve/CVE-2024-50228.html * https://www.suse.com/security/cve/CVE-2024-50256.html * https://www.suse.com/security/cve/CVE-2024-50262.html * https://www.suse.com/security/cve/CVE-2024-50272.html * https://www.suse.com/security/cve/CVE-2024-50278.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50280.html * https://www.suse.com/security/cve/CVE-2024-53050.html * https://www.suse.com/security/cve/CVE-2024-53064.html * https://www.suse.com/security/cve/CVE-2024-53090.html * https://www.suse.com/security/cve/CVE-2024-53099.html * https://www.suse.com/security/cve/CVE-2024-53103.html * https://www.suse.com/security/cve/CVE-2024-53105.html * https://www.suse.com/security/cve/CVE-2024-53111.html * https://www.suse.com/security/cve/CVE-2024-53113.html * https://www.suse.com/security/cve/CVE-2024-53117.html * https://www.suse.com/security/cve/CVE-2024-53118.html * https://www.suse.com/security/cve/CVE-2024-53119.html * https://www.suse.com/security/cve/CVE-2024-53120.html * https://www.suse.com/security/cve/CVE-2024-53122.html * https://www.suse.com/security/cve/CVE-2024-53125.html * https://www.suse.com/security/cve/CVE-2024-53126.html * https://www.suse.com/security/cve/CVE-2024-53127.html * https://www.suse.com/security/cve/CVE-2024-53129.html * https://www.suse.com/security/cve/CVE-2024-53130.html * https://www.suse.com/security/cve/CVE-2024-53131.html * https://www.suse.com/security/cve/CVE-2024-53133.html * https://www.suse.com/security/cve/CVE-2024-53134.html * https://www.suse.com/security/cve/CVE-2024-53136.html * https://www.suse.com/security/cve/CVE-2024-53141.html * https://www.suse.com/security/cve/CVE-2024-53142.html * https://www.suse.com/security/cve/CVE-2024-53144.html * https://www.suse.com/security/cve/CVE-2024-53146.html * https://www.suse.com/security/cve/CVE-2024-53148.html * https://www.suse.com/security/cve/CVE-2024-53150.html * https://www.suse.com/security/cve/CVE-2024-53151.html * https://www.suse.com/security/cve/CVE-2024-53154.html * https://www.suse.com/security/cve/CVE-2024-53155.html * https://www.suse.com/security/cve/CVE-2024-53156.html * https://www.suse.com/security/cve/CVE-2024-53157.html * https://www.suse.com/security/cve/CVE-2024-53158.html * https://www.suse.com/security/cve/CVE-2024-53159.html * https://www.suse.com/security/cve/CVE-2024-53160.html * https://www.suse.com/security/cve/CVE-2024-53161.html * https://www.suse.com/security/cve/CVE-2024-53162.html * https://www.suse.com/security/cve/CVE-2024-53166.html * https://www.suse.com/security/cve/CVE-2024-53169.html * https://www.suse.com/security/cve/CVE-2024-53171.html * https://www.suse.com/security/cve/CVE-2024-53173.html * https://www.suse.com/security/cve/CVE-2024-53174.html * https://www.suse.com/security/cve/CVE-2024-53179.html * https://www.suse.com/security/cve/CVE-2024-53180.html * https://www.suse.com/security/cve/CVE-2024-53188.html * https://www.suse.com/security/cve/CVE-2024-53190.html * https://www.suse.com/security/cve/CVE-2024-53191.html * https://www.suse.com/security/cve/CVE-2024-53200.html * https://www.suse.com/security/cve/CVE-2024-53201.html * https://www.suse.com/security/cve/CVE-2024-53202.html * https://www.suse.com/security/cve/CVE-2024-53206.html * https://www.suse.com/security/cve/CVE-2024-53207.html * https://www.suse.com/security/cve/CVE-2024-53208.html * https://www.suse.com/security/cve/CVE-2024-53209.html * https://www.suse.com/security/cve/CVE-2024-53210.html * https://www.suse.com/security/cve/CVE-2024-53213.html * https://www.suse.com/security/cve/CVE-2024-53214.html * https://www.suse.com/security/cve/CVE-2024-53215.html * https://www.suse.com/security/cve/CVE-2024-53216.html * https://www.suse.com/security/cve/CVE-2024-53217.html * https://www.suse.com/security/cve/CVE-2024-53222.html * https://www.suse.com/security/cve/CVE-2024-53224.html * https://www.suse.com/security/cve/CVE-2024-53229.html * https://www.suse.com/security/cve/CVE-2024-53234.html * https://www.suse.com/security/cve/CVE-2024-53237.html * https://www.suse.com/security/cve/CVE-2024-53240.html * https://www.suse.com/security/cve/CVE-2024-53241.html * https://www.suse.com/security/cve/CVE-2024-56536.html * https://www.suse.com/security/cve/CVE-2024-56539.html * https://www.suse.com/security/cve/CVE-2024-56549.html * https://www.suse.com/security/cve/CVE-2024-56551.html * https://www.suse.com/security/cve/CVE-2024-56562.html * https://www.suse.com/security/cve/CVE-2024-56566.html * https://www.suse.com/security/cve/CVE-2024-56567.html * https://www.suse.com/security/cve/CVE-2024-56576.html * https://www.suse.com/security/cve/CVE-2024-56582.html * https://www.suse.com/security/cve/CVE-2024-56599.html * https://www.suse.com/security/cve/CVE-2024-56604.html * https://www.suse.com/security/cve/CVE-2024-56605.html * https://www.suse.com/security/cve/CVE-2024-56645.html * https://www.suse.com/security/cve/CVE-2024-56667.html * https://www.suse.com/security/cve/CVE-2024-56752.html * https://www.suse.com/security/cve/CVE-2024-56754.html * https://www.suse.com/security/cve/CVE-2024-56755.html * https://www.suse.com/security/cve/CVE-2024-56756.html * https://www.suse.com/security/cve/CVE-2024-8805.html * https://bugzilla.suse.com/show_bug.cgi?id=1214954 * https://bugzilla.suse.com/show_bug.cgi?id=1216813 * https://bugzilla.suse.com/show_bug.cgi?id=1220773 * https://bugzilla.suse.com/show_bug.cgi?id=1224095 * https://bugzilla.suse.com/show_bug.cgi?id=1224726 * https://bugzilla.suse.com/show_bug.cgi?id=1225743 * https://bugzilla.suse.com/show_bug.cgi?id=1225758 * https://bugzilla.suse.com/show_bug.cgi?id=1225820 * https://bugzilla.suse.com/show_bug.cgi?id=1227445 * https://bugzilla.suse.com/show_bug.cgi?id=1228526 * https://bugzilla.suse.com/show_bug.cgi?id=1229809 * https://bugzilla.suse.com/show_bug.cgi?id=1230205 * https://bugzilla.suse.com/show_bug.cgi?id=1230413 * https://bugzilla.suse.com/show_bug.cgi?id=1230697 * https://bugzilla.suse.com/show_bug.cgi?id=1231854 * https://bugzilla.suse.com/show_bug.cgi?id=1231909 * https://bugzilla.suse.com/show_bug.cgi?id=1231963 * https://bugzilla.suse.com/show_bug.cgi?id=1232193 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232418 * https://bugzilla.suse.com/show_bug.cgi?id=1232419 * https://bugzilla.suse.com/show_bug.cgi?id=1232420 * https://bugzilla.suse.com/show_bug.cgi?id=1232421 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1233038 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233096 * https://bugzilla.suse.com/show_bug.cgi?id=1233200 * https://bugzilla.suse.com/show_bug.cgi?id=1233204 * https://bugzilla.suse.com/show_bug.cgi?id=1233239 * https://bugzilla.suse.com/show_bug.cgi?id=1233259 * https://bugzilla.suse.com/show_bug.cgi?id=1233260 * https://bugzilla.suse.com/show_bug.cgi?id=1233324 * https://bugzilla.suse.com/show_bug.cgi?id=1233328 * https://bugzilla.suse.com/show_bug.cgi?id=1233461 * https://bugzilla.suse.com/show_bug.cgi?id=1233467 * https://bugzilla.suse.com/show_bug.cgi?id=1233468 * https://bugzilla.suse.com/show_bug.cgi?id=1233469 * https://bugzilla.suse.com/show_bug.cgi?id=1233546 * https://bugzilla.suse.com/show_bug.cgi?id=1233558 * https://bugzilla.suse.com/show_bug.cgi?id=1233637 * https://bugzilla.suse.com/show_bug.cgi?id=1233642 * https://bugzilla.suse.com/show_bug.cgi?id=1233772 * https://bugzilla.suse.com/show_bug.cgi?id=1233837 * https://bugzilla.suse.com/show_bug.cgi?id=1234024 * https://bugzilla.suse.com/show_bug.cgi?id=1234069 * https://bugzilla.suse.com/show_bug.cgi?id=1234071 * https://bugzilla.suse.com/show_bug.cgi?id=1234073 * https://bugzilla.suse.com/show_bug.cgi?id=1234075 * https://bugzilla.suse.com/show_bug.cgi?id=1234076 * https://bugzilla.suse.com/show_bug.cgi?id=1234077 * https://bugzilla.suse.com/show_bug.cgi?id=1234079 * https://bugzilla.suse.com/show_bug.cgi?id=1234086 * https://bugzilla.suse.com/show_bug.cgi?id=1234139 * https://bugzilla.suse.com/show_bug.cgi?id=1234140 * https://bugzilla.suse.com/show_bug.cgi?id=1234141 * https://bugzilla.suse.com/show_bug.cgi?id=1234142 * https://bugzilla.suse.com/show_bug.cgi?id=1234143 * https://bugzilla.suse.com/show_bug.cgi?id=1234144 * https://bugzilla.suse.com/show_bug.cgi?id=1234145 * https://bugzilla.suse.com/show_bug.cgi?id=1234146 * https://bugzilla.suse.com/show_bug.cgi?id=1234147 * https://bugzilla.suse.com/show_bug.cgi?id=1234148 * https://bugzilla.suse.com/show_bug.cgi?id=1234149 * https://bugzilla.suse.com/show_bug.cgi?id=1234150 * https://bugzilla.suse.com/show_bug.cgi?id=1234153 * https://bugzilla.suse.com/show_bug.cgi?id=1234155 * https://bugzilla.suse.com/show_bug.cgi?id=1234156 * https://bugzilla.suse.com/show_bug.cgi?id=1234158 * https://bugzilla.suse.com/show_bug.cgi?id=1234159 * https://bugzilla.suse.com/show_bug.cgi?id=1234160 * https://bugzilla.suse.com/show_bug.cgi?id=1234161 * https://bugzilla.suse.com/show_bug.cgi?id=1234162 * https://bugzilla.suse.com/show_bug.cgi?id=1234163 * https://bugzilla.suse.com/show_bug.cgi?id=1234164 * https://bugzilla.suse.com/show_bug.cgi?id=1234165 * https://bugzilla.suse.com/show_bug.cgi?id=1234166 * https://bugzilla.suse.com/show_bug.cgi?id=1234167 * https://bugzilla.suse.com/show_bug.cgi?id=1234168 * https://bugzilla.suse.com/show_bug.cgi?id=1234169 * https://bugzilla.suse.com/show_bug.cgi?id=1234170 * https://bugzilla.suse.com/show_bug.cgi?id=1234171 * https://bugzilla.suse.com/show_bug.cgi?id=1234172 * https://bugzilla.suse.com/show_bug.cgi?id=1234173 * https://bugzilla.suse.com/show_bug.cgi?id=1234174 * https://bugzilla.suse.com/show_bug.cgi?id=1234175 * https://bugzilla.suse.com/show_bug.cgi?id=1234176 * https://bugzilla.suse.com/show_bug.cgi?id=1234177 * https://bugzilla.suse.com/show_bug.cgi?id=1234178 * https://bugzilla.suse.com/show_bug.cgi?id=1234179 * https://bugzilla.suse.com/show_bug.cgi?id=1234180 * https://bugzilla.suse.com/show_bug.cgi?id=1234181 * https://bugzilla.suse.com/show_bug.cgi?id=1234182 * https://bugzilla.suse.com/show_bug.cgi?id=1234183 * https://bugzilla.suse.com/show_bug.cgi?id=1234184 * https://bugzilla.suse.com/show_bug.cgi?id=1234185 * https://bugzilla.suse.com/show_bug.cgi?id=1234186 * https://bugzilla.suse.com/show_bug.cgi?id=1234187 * https://bugzilla.suse.com/show_bug.cgi?id=1234188 * https://bugzilla.suse.com/show_bug.cgi?id=1234189 * https://bugzilla.suse.com/show_bug.cgi?id=1234190 * https://bugzilla.suse.com/show_bug.cgi?id=1234191 * https://bugzilla.suse.com/show_bug.cgi?id=1234192 * https://bugzilla.suse.com/show_bug.cgi?id=1234193 * https://bugzilla.suse.com/show_bug.cgi?id=1234194 * https://bugzilla.suse.com/show_bug.cgi?id=1234195 * https://bugzilla.suse.com/show_bug.cgi?id=1234196 * https://bugzilla.suse.com/show_bug.cgi?id=1234197 * https://bugzilla.suse.com/show_bug.cgi?id=1234198 * https://bugzilla.suse.com/show_bug.cgi?id=1234199 * https://bugzilla.suse.com/show_bug.cgi?id=1234200 * https://bugzilla.suse.com/show_bug.cgi?id=1234201 * https://bugzilla.suse.com/show_bug.cgi?id=1234203 * https://bugzilla.suse.com/show_bug.cgi?id=1234204 * https://bugzilla.suse.com/show_bug.cgi?id=1234205 * https://bugzilla.suse.com/show_bug.cgi?id=1234207 * https://bugzilla.suse.com/show_bug.cgi?id=1234208 * https://bugzilla.suse.com/show_bug.cgi?id=1234209 * https://bugzilla.suse.com/show_bug.cgi?id=1234219 * https://bugzilla.suse.com/show_bug.cgi?id=1234220 * https://bugzilla.suse.com/show_bug.cgi?id=1234221 * https://bugzilla.suse.com/show_bug.cgi?id=1234237 * https://bugzilla.suse.com/show_bug.cgi?id=1234238 * https://bugzilla.suse.com/show_bug.cgi?id=1234239 * https://bugzilla.suse.com/show_bug.cgi?id=1234240 * https://bugzilla.suse.com/show_bug.cgi?id=1234241 * https://bugzilla.suse.com/show_bug.cgi?id=1234242 * https://bugzilla.suse.com/show_bug.cgi?id=1234243 * https://bugzilla.suse.com/show_bug.cgi?id=1234278 * https://bugzilla.suse.com/show_bug.cgi?id=1234279 * https://bugzilla.suse.com/show_bug.cgi?id=1234280 * https://bugzilla.suse.com/show_bug.cgi?id=1234281 * https://bugzilla.suse.com/show_bug.cgi?id=1234282 * https://bugzilla.suse.com/show_bug.cgi?id=1234294 * https://bugzilla.suse.com/show_bug.cgi?id=1234338 * https://bugzilla.suse.com/show_bug.cgi?id=1234357 * https://bugzilla.suse.com/show_bug.cgi?id=1234381 * https://bugzilla.suse.com/show_bug.cgi?id=1234454 * https://bugzilla.suse.com/show_bug.cgi?id=1234464 * https://bugzilla.suse.com/show_bug.cgi?id=1234605 * https://bugzilla.suse.com/show_bug.cgi?id=1234651 * https://bugzilla.suse.com/show_bug.cgi?id=1234652 * https://bugzilla.suse.com/show_bug.cgi?id=1234654 * https://bugzilla.suse.com/show_bug.cgi?id=1234655 * https://bugzilla.suse.com/show_bug.cgi?id=1234657 * https://bugzilla.suse.com/show_bug.cgi?id=1234658 * https://bugzilla.suse.com/show_bug.cgi?id=1234659 * https://bugzilla.suse.com/show_bug.cgi?id=1234668 * https://bugzilla.suse.com/show_bug.cgi?id=1234690 * https://bugzilla.suse.com/show_bug.cgi?id=1234725 * https://bugzilla.suse.com/show_bug.cgi?id=1234726 * https://bugzilla.suse.com/show_bug.cgi?id=1234810 * https://bugzilla.suse.com/show_bug.cgi?id=1234811 * https://bugzilla.suse.com/show_bug.cgi?id=1234826 * https://bugzilla.suse.com/show_bug.cgi?id=1234827 * https://bugzilla.suse.com/show_bug.cgi?id=1234829 * https://bugzilla.suse.com/show_bug.cgi?id=1234832 * https://bugzilla.suse.com/show_bug.cgi?id=1234834 * https://bugzilla.suse.com/show_bug.cgi?id=1234843 * https://bugzilla.suse.com/show_bug.cgi?id=1234846 * https://bugzilla.suse.com/show_bug.cgi?id=1234848 * https://bugzilla.suse.com/show_bug.cgi?id=1234853 * https://bugzilla.suse.com/show_bug.cgi?id=1234855 * https://bugzilla.suse.com/show_bug.cgi?id=1234856 * https://bugzilla.suse.com/show_bug.cgi?id=1234884 * https://bugzilla.suse.com/show_bug.cgi?id=1234889 * https://bugzilla.suse.com/show_bug.cgi?id=1234891 * https://bugzilla.suse.com/show_bug.cgi?id=1234899 * https://bugzilla.suse.com/show_bug.cgi?id=1234900 * https://bugzilla.suse.com/show_bug.cgi?id=1234905 * https://bugzilla.suse.com/show_bug.cgi?id=1234907 * https://bugzilla.suse.com/show_bug.cgi?id=1234909 * https://bugzilla.suse.com/show_bug.cgi?id=1234911 * https://bugzilla.suse.com/show_bug.cgi?id=1234912 * https://bugzilla.suse.com/show_bug.cgi?id=1234916 * https://bugzilla.suse.com/show_bug.cgi?id=1234918 * https://bugzilla.suse.com/show_bug.cgi?id=1234920 * https://bugzilla.suse.com/show_bug.cgi?id=1234921 * https://bugzilla.suse.com/show_bug.cgi?id=1234922 * https://bugzilla.suse.com/show_bug.cgi?id=1234929 * https://bugzilla.suse.com/show_bug.cgi?id=1234930 * https://bugzilla.suse.com/show_bug.cgi?id=1234937 * https://bugzilla.suse.com/show_bug.cgi?id=1234948 * https://bugzilla.suse.com/show_bug.cgi?id=1234950 * https://bugzilla.suse.com/show_bug.cgi?id=1234952 * https://bugzilla.suse.com/show_bug.cgi?id=1234960 * https://bugzilla.suse.com/show_bug.cgi?id=1234962 * https://bugzilla.suse.com/show_bug.cgi?id=1234963 * https://bugzilla.suse.com/show_bug.cgi?id=1234968 * https://bugzilla.suse.com/show_bug.cgi?id=1234969 * https://bugzilla.suse.com/show_bug.cgi?id=1234970 * https://bugzilla.suse.com/show_bug.cgi?id=1234971 * https://bugzilla.suse.com/show_bug.cgi?id=1234973 * https://bugzilla.suse.com/show_bug.cgi?id=1234974 * https://bugzilla.suse.com/show_bug.cgi?id=1234989 * https://bugzilla.suse.com/show_bug.cgi?id=1234999 * https://bugzilla.suse.com/show_bug.cgi?id=1235002 * https://bugzilla.suse.com/show_bug.cgi?id=1235003 * https://bugzilla.suse.com/show_bug.cgi?id=1235004 * https://bugzilla.suse.com/show_bug.cgi?id=1235007 * https://bugzilla.suse.com/show_bug.cgi?id=1235009 * https://bugzilla.suse.com/show_bug.cgi?id=1235016 * https://bugzilla.suse.com/show_bug.cgi?id=1235019 * https://bugzilla.suse.com/show_bug.cgi?id=1235033 * https://bugzilla.suse.com/show_bug.cgi?id=1235045 * https://bugzilla.suse.com/show_bug.cgi?id=1235056 * https://bugzilla.suse.com/show_bug.cgi?id=1235061 * https://bugzilla.suse.com/show_bug.cgi?id=1235075 * https://bugzilla.suse.com/show_bug.cgi?id=1235108 * https://bugzilla.suse.com/show_bug.cgi?id=1235128 * https://bugzilla.suse.com/show_bug.cgi?id=1235134 * https://bugzilla.suse.com/show_bug.cgi?id=1235138 * https://bugzilla.suse.com/show_bug.cgi?id=1235246 * https://bugzilla.suse.com/show_bug.cgi?id=1235406 * https://bugzilla.suse.com/show_bug.cgi?id=1235409 * https://bugzilla.suse.com/show_bug.cgi?id=1235416 * https://bugzilla.suse.com/show_bug.cgi?id=1235507 * https://bugzilla.suse.com/show_bug.cgi?id=1235550 * https://jira.suse.com/browse/PED-10467


Severity
Announcement ID: SUSE-SU-2025:0117-1
Release Date: 2025-01-15T09:07:51Z
Affected Products: * openSUSE Leap 15.6 * Public Cloud Module 15-SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves 116 vulnerabilities, contains one feature and has 103 security fixes can now be installed.

Related News