CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
71.6%
The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:2939-1 advisory.
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2021-47086: phonet/pep: refuse to enable an unbound pipe (bsc#1220952).
- CVE-2021-47089: kfence: fix memory leak when cat kfence objects (bsc#1220958).
- CVE-2021-47103: net: sock: preserve kabi for sock (bsc#1221010).
- CVE-2021-47186: tipc: check for null after calling kmemdup (bsc#1222702).
- CVE-2021-47432: lib/generic-radix-tree.c: Do not overflow in peek() (bsc#1225391).
- CVE-2021-47515: seg6: fix the iif in the IPv6 socket control block (bsc#1225426).
- CVE-2021-47538: rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() (bsc#1225448).
- CVE-2021-47539: rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle() (bsc#1225452).
- CVE-2021-47546: ipv6: fix memory leak in fib6_rule_suppress (bsc#1225504).
- CVE-2021-47547: net: tulip: de4x5: fix the problem that the array 'lp->phy' may be out of bound (bsc#1225505).
- CVE-2021-47555: net: vlan: fix underflow for the real_dev refcnt (bsc#1225467).
- CVE-2021-47566: Fix clearing user buffer by properly using clear_user() (bsc#1225514).
- CVE-2021-47571: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() (bsc#1225518).
- CVE-2021-47572: net: nexthop: fix null pointer dereference when IPv6 is not enabled (bsc#1225389).
- CVE-2021-47588: sit: do not call ipip6_dev_free() from sit_init_net() (bsc#1226568).
- CVE-2021-47590: mptcp: fix deadlock in __mptcp_push_pending() (bsc#1226565).
- CVE-2021-47591: mptcp: remove tcp ulp setsockopt support (bsc#1226570).
- CVE-2021-47593: mptcp: clear 'kern' flag from fallback sockets (bsc#1226551).
- CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1226574).
- CVE-2021-47599: btrfs: use latest_dev in btrfs_show_devname (bsc#1226571).
- CVE-2021-47606: net: netlink: af_netlink: Prevent empty skb by adding a check on len. (bsc#1226555).
- CVE-2021-47623: powerpc/fixmap: Fix VM debug warning on unmap (bsc#1227919).
- CVE-2022-48716: ASoC: codecs: wcd938x: fix incorrect used of portid (bsc#1226678).
- CVE-2022-48785: ipv6: mcast: use rcu-safe version of ipv6_get_lladdr() (bsc#1227927)
- CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path (bsc#1227936).
- CVE-2022-48850: net-sysfs: add check for netdevice being present to speed_show (bsc#1228071).
- CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets (bsc#1228003).
- CVE-2023-24023: Bluetooth: Add more enc key size check (bsc#1218148).
- CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138).
- CVE-2023-52573: net: rds: Fix possible NULL-pointer dereference (bsc#1220869).
- CVE-2023-52580: net/core: Fix ETH_P_1588 flow dissector (bsc#1220876).
- CVE-2023-52622: ext4: avoid online resizing failures due to oversized flex bg (bsc#1222080).
- CVE-2023-52658: Revert 'net/mlx5: Block entering switchdev mode with ns inconsistency' (bsc#1224719).
- CVE-2023-52667: net/mlx5e: fix a potential double-free in fs_any_create_groups (bsc#1224603).
- CVE-2023-52670: rpmsg: virtio: Free driver_override when rpmsg_remove() (bsc#1224696).
- CVE-2023-52672: pipe: wakeup wr_wait after setting max_usage (bsc#1224614).
- CVE-2023-52675: powerpc/imc-pmu: Add a null pointer check in update_events_in_group() (bsc#1224504).
- CVE-2023-52735: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself (bsc#1225475).
- CVE-2023-52737: btrfs: lock the inode in shared mode before starting fiemap (bsc#1225484).
- CVE-2023-52751: smb: client: fix use-after-free in smb2_query_info_compound() (bsc#1225489).
- CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487).
- CVE-2023-52762: virtio-blk: fix implicit overflow on virtio_max_dma_size (bsc#1225573).
- CVE-2023-52775: net/smc: avoid data corruption caused by decline (bsc#1225088).
- CVE-2023-52784: bonding: stop the device in bond_setup_by_slave() (bsc#1224946).
- CVE-2023-52787: blk-mq: make sure active queue usage is held for bio_integrity_prep() (bsc#1225105).
- CVE-2023-52812: drm/amd: check num of link levels when update pcie param (bsc#1225564).
- CVE-2023-52835: perf/core: Bail out early if the request AUX area is out of bound (bsc#1225602).
- CVE-2023-52837: nbd: fix uaf in nbd_open (bsc#1224935).
- CVE-2023-52843: llc: verify mac len before reading mac header (bsc#1224951).
- CVE-2023-52845: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (bsc#1225585).
- CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225098).
- CVE-2023-52857: drm/mediatek: Fix coverity issue with unintentional integer overflow (bsc#1225581).
- CVE-2023-52863: hwmon: (axi-fan-control) Fix possible NULL pointer dereference (bsc#1225586).
- CVE-2023-52869: pstore/platform: Add check for kstrdup (bsc#1225050).
- CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).
- CVE-2023-52882: clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change (bsc#1225692).
- CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942).
- CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
- CVE-2024-26633: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() (bsc#1221647).
- CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656).
- CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes (bsc#1221659).
- CVE-2024-26641: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() (bsc#1221654).
- CVE-2024-26644: btrfs: do not abort filesystem when attempting to snapshot deleted subvolume (bsc#1221282, bsc#1222072).
- CVE-2024-26661: drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' (bsc#1222323).
- CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (bsc#1222326).
- CVE-2024-26665: tunnels: fix out of bounds access when building IPv6 PMTU error (bsc#1222328).
- CVE-2024-26720: mm: Avoid overflows in dirty throttling logic (bsc#1222364).
- CVE-2024-26802: stmmac: Clear variable when destroying workqueue (bsc#1222799).
- CVE-2024-26813: vfio/platform: Create persistent IRQ handlers (bsc#1222809).
- CVE-2024-26814: vfio/fsl-mc: Block calling interrupt handler without trigger (bsc#1222810).
- CVE-2024-26842: scsi: target: core: Add TMF to tmr_list handling (bsc#1223013).
- CVE-2024-26845: scsi: target: core: Add TMF to tmr_list handling (bsc#1223018).
- CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node() (bsc#1223021).
- CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384).
- CVE-2024-26961: mac802154: fix llsec key resources release in mac802154_llsec_key_del (bsc#1223652).
- CVE-2024-26973: fat: fix uninitialized field in nostale filehandles (bsc#1223641).
- CVE-2024-27015: netfilter: flowtable: incorrect pppoe tuple (bsc#1223806).
- CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (bsc#1223813)
- CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (bsc#1223815)
- CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778)
- CVE-2024-27065: netfilter: nf_tables: do not compare internal table flags on updates (bsc#1223836).
- CVE-2024-27402: phonet/pep: fix racy skb_queue_empty() use (bsc#1224414).
- CVE-2024-27432: net: ethernet: mtk_eth_soc: fix PPE hanging issue (bsc#1224716).
- CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ (bsc#1222625).
- CVE-2024-35247: fpga: region: add owner module and take its refcount (bsc#1226948).
- CVE-2024-35789: Check fast rx for non-4addr sta VLAN changes (bsc#1224749).
- CVE-2024-35790: usb: typec: altmodes/displayport: create sysfs nodes as driver's default device attribute group (bsc#1224712).
- CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit (bsc#1224743).
- CVE-2024-35807: ext4: fix corruption during on-line resize (bsc#1224735).
- CVE-2024-35819: soc: fsl: qbman: Use raw spinlock for cgr_lock (bsc#1224683).
- CVE-2024-35835: net/mlx5e: fix a double-free in arfs_create_groups (bsc#1224605).
- CVE-2024-35837: net: mvpp2: clear BM pool before initialization (bsc#1224500).
- CVE-2024-35848: eeprom: at24: fix memory corruption race condition (bsc#1224612).
- CVE-2024-35853: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash (bsc#1224604).
- CVE-2024-35857: icmp: prevent possible NULL dereferences from icmp_build_probe() (bsc#1224619).
- CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766).
- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764).
- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765).
- CVE-2024-35869: smb: client: guarantee refcounted children from parent session (bsc#1224679).
- CVE-2024-35884: udp: do not accept non-tunnel GSO skbs landing in a tunnel (bsc#1224520).
- CVE-2024-35886: ipv6: Fix infinite recursion in fib6_dump_done() (bsc#1224670).
- CVE-2024-35889: idpf: fix kernel panic on unknown packet types (bsc#1224517).
- CVE-2024-35890: gro: fix ownership transfer (bsc#1224516).
- CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512)
- CVE-2024-35898: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (bsc#1224498).
- CVE-2024-35899: netfilter: nf_tables: flush pending destroy work before exit_net release (bsc#1224499)
- CVE-2024-35900: netfilter: nf_tables: reject new basechain after table flag update (bsc#1224497).
- CVE-2024-35925: block: prevent division by zero in blk_rq_stat_sum() (bsc#1224661).
- CVE-2024-35934: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() (bsc#1224641)
- CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700).
- CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1224703).
- CVE-2024-35956: Fixed qgroup prealloc rsv leak in subvolume operations (bsc#1224674)
- CVE-2024-35958: net: ena: Fix incorrect descriptor free behavior (bsc#1224677).
- CVE-2024-35960: net/mlx5: Properly link new fs rules into the tree (bsc#1224588).
- CVE-2024-35961: net/mlx5: Register devlink first under devlink lock (bsc#1224585).
- CVE-2024-35979: raid1: fix use-after-free for original bio in raid1_write_request() (bsc#1224572).
- CVE-2024-35995: ACPI: CPPC: Use access_width over bit_width for system memory accesses (bsc#1224557).
- CVE-2024-35997: Remove I2C_HID_READ_PENDING flag to prevent lock-up (bsc#1224552).
- CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (bsc#1224548).
- CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1224545)
- CVE-2024-36005: netfilter: nf_tables: honor table dormant flag from netdev release event path (bsc#1224539).
- CVE-2024-36008: ipv4: check for NULL idev in ip_route_use_hint() (bsc#1224540).
- CVE-2024-36017: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation (bsc#1225681).
- CVE-2024-36020: i40e: fix vf may be used uninitialized in this function warning (bsc#1225698).
- CVE-2024-36021: net: hns3: fix kernel crash when devlink reload during pf initialization (bsc#1225699).
- CVE-2024-36478: null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues' (bsc#1226841).
- CVE-2024-36479: fpga: bridge: add owner module and take its refcount (bsc#1226949).
- CVE-2024-36890: mm/slab: make __free(kfree) accept error pointers (bsc#1225714).
- CVE-2024-36894: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (bsc#1225749).
- CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225737).
- CVE-2024-36900: net: hns3: fix kernel crash when devlink reload during initialization (bsc#1225726).
- CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711)
- CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (bsc#1225719).
- CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225732).
- CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that couldn't be re-encrypted (bsc#1225744).
- CVE-2024-36910: uio_hv_generic: Do not free decrypted memory (bsc#1225717).
- CVE-2024-36911: hv_netvsc: Do not free decrypted memory (bsc#1225745).
- CVE-2024-36912: Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl (bsc#1225752).
- CVE-2024-36913: Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails (bsc#1225753).
- CVE-2024-36914: drm/amd/display: Skip on writeback when it's not applicable (bsc#1225757).
- CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758).
- CVE-2024-36916: blk-iocost: avoid out of bounds shift (bsc#1225759).
- CVE-2024-36917: block: fix overflow in blk_ioctl_discard() (bsc#1225770).
- CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload (bsc#1225767).
- CVE-2024-36923: fs/9p: fix uninitialized values during inode evict (bsc#1225815).
- CVE-2024-36934: bna: ensure the copied buf is NUL terminated (bsc#1225760).
- CVE-2024-36937: xdp: use flags field to disambiguate broadcast redirect (bsc#1225834).
- CVE-2024-36939: nfs: Handle error of rpc_proc_register() in nfs_net_init() (bsc#1225838).
- CVE-2024-36940: pinctrl: core: delete incorrect free in pinctrl_enable() (bsc#1225840).
- CVE-2024-36945: net/smc: fix neighbour and rtable leak in smc_ib_find_route() (bsc#1225823).
- CVE-2024-36946: phonet: fix rtm_phonet_notify() skb allocation (bsc#1225851).
- CVE-2024-36949: amd/amdkfd: sync all devices to wait all processes being evicted (bsc#1225872)
- CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866).
- CVE-2024-36971: net: fix __dst_negative_advice() race (bsc#1226145).
- CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519).
- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).
- CVE-2024-37021: fpga: manager: add owner module and take its refcount (bsc#1226950).
- CVE-2024-37078: nilfs2: fix potential kernel bug due to lack of writeback flag waiting (bsc#1227066).
- CVE-2024-37354: btrfs: fix crash on racing fsync and size-extending write into prealloc (bsc#1227101).
- CVE-2024-38545: RDMA/hns: Fix UAF for cq async event (bsc#1226595).
- CVE-2024-38553: net: fec: remove .ndo_poll_controller to avoid deadlock (bsc#1226744).
- CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607).
- CVE-2024-38556: net/mlx5: Add a timeout to acquire the command queue semaphore (bsc#1226774).
- CVE-2024-38557: net/mlx5: Reload only IB representors upon lag disable/enable (bsc#1226781).
- CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for ICMPv6 (bsc#1226783).
- CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785).
- CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).
- CVE-2024-38564: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (bsc#1226789).
- CVE-2024-38568: drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group (bsc#1226771).
- CVE-2024-38570: gfs2: Fix potential glock use-after-free on unmount (bsc#1226775).
- CVE-2024-38578: ecryptfs: Fix buffer size for tag 66 packet (bsc#1226634).
- CVE-2024-38580: epoll: be better about file lifetimes (bsc#1226610).
- CVE-2024-38586: r8169: Fix possible ring buffer corruption on fragmented Tx packets (bsc#1226750).
- CVE-2024-38594: net: stmmac: move the EST lock to struct stmmac_priv (bsc#1226734).
- CVE-2024-38597: eth: sungem: remove .ndo_poll_controller to avoid deadlocks (bsc#1226749).
- CVE-2024-38598: md: fix resync softlockup when bitmap size is less than array size (bsc#1226757).
- CVE-2024-38603: drivers/perf: hisi: hns3: Actually use devm_add_action_or_reset() (bsc#1226842).
- CVE-2024-38608: net/mlx5e: Fix netif state handling (bsc#1226746).
- CVE-2024-38627: stm class: Fix a double free in stm_register_device() (bsc#1226857).
- CVE-2024-38628: usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind (bsc#1226911).
- CVE-2024-38659: enic: Validate length of nl attributes in enic_set_vf_port (bsc#1226883).
- CVE-2024-38661: s390/ap: Fix crash in AP internal function modify_bitmap() (bsc#1226996).
- CVE-2024-38780: dma-buf/sw-sync: do not enable IRQ from sync_print_obj() (bsc#1226886).
- CVE-2024-39276: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() (bsc#1226993).
- CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994).
- CVE-2024-39371: io_uring: check for non-NULL file pointer in io_file_can_poll() (bsc#1226990).
- CVE-2024-39463: 9p: add missing locking around taking dentry fid list (bsc#1227090).
- CVE-2024-39468: smb: client: fix deadlock in smb2_find_smb_tcon() (bsc#1227103).
- CVE-2024-39469: nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors (bsc#1226992).
- CVE-2024-39472: xfs: fix log recovery buffer allocation for the legacy h_size fixup (bsc#1227432).
- CVE-2024-39475: fbdev: savage: Handle err return when savagefb_check_var failed (bsc#1227435)
- CVE-2024-39482: bcache: fix variable length array abuse in btree_iter (bsc#1227447).
- CVE-2024-39487: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (bsc#1227573)
- CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core (bsc#1227626).
- CVE-2024-39493: crypto: qat - fix ADF_DEV_RESET_SYNC memory leak (bsc#1227620).
- CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).
- CVE-2024-39497: drm/shmem-helper: fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) (bsc#1227722).
- CVE-2024-39502: ionic: fix use after netif_napi_del() (bsc#1227755).
- CVE-2024-39506: liquidio: adjust a NULL pointer handling path in lio_vf_rep_copy_packet (bsc#1227729).
- CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario (bsc#1227730).
- CVE-2024-39508: io_uring/io-wq: use set_bit() and test_bit() at worker->flags (bsc#1227732).
- CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory (bsc#1227762).
- CVE-2024-40906: net/mlx5: Always stop health timer during driver removal (bsc#1227763).
- CVE-2024-40908: bpf: Set run context for rawtp test_run callback (bsc#1227783).
- CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1227798).
- CVE-2024-40919: bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send() (bsc#1227779).
- CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure (bsc#1227786).
- CVE-2024-40931: mptcp: ensure snd_una is properly initialized on connect (bsc#1227780).
- CVE-2024-40935: cachefiles: flush all requests after setting CACHEFILES_DEAD (bsc#1227797).
- CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836).
- CVE-2024-40940: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail (bsc#1227800).
- CVE-2024-40943: ocfs2: fix races between hole punching and AIO+DIO (bsc#1227849).
- CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() (bsc#1227806).
- CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808)
- CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (bsc#1227810).
- CVE-2024-40958: netns: Make get_net_ns() handle zero refcount net (bsc#1227812).
- CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (bsc#1227884).
- CVE-2024-40960: ipv6: prevent possible NULL dereference in rt6_probe() (bsc#1227813).
- CVE-2024-40961: ipv6: prevent possible NULL deref in fib6_nh_init() (bsc#1227814).
- CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc (bsc#1227886).
- CVE-2024-40967: serial: imx: Introduce timeout when waiting on transmitter empty (bsc#1227891).
- CVE-2024-40970: Avoid hw_desc array overrun in dw-axi-dmac (bsc#1227899).
- CVE-2024-40972: ext4: fold quota accounting into ext4_xattr_inode_lookup_create() (bsc#1227910).
- CVE-2024-40977: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery (bsc#1227950).
- CVE-2024-40982: ssb: fix potential NULL pointer dereference in ssb_device_uevent() (bsc#1227865).
- CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on teardown (bsc#1227823).
- CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store (bsc#1227829).
- CVE-2024-40998: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() (bsc#1227866).
- CVE-2024-40999: net: ena: Add validation for completion descriptors consistency (bsc#1227913).
- CVE-2024-41006: netrom: Fix a memory leak in nr_heartbeat_expiry() (bsc#1227862).
- CVE-2024-41009: bpf: Fix overrunning reservations in ringbuf (bsc#1228020).
- CVE-2024-41011: drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (bsc#1228114).
- CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is detected (bsc#1228247).
- CVE-2024-41013: xfs: do not walk off the end of a directory data block (bsc#1228405).
- CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data (bsc#1228408).
- CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry() (bsc#1228409).
- CVE-2024-41016: ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410).
- CVE-2024-41017: jfs: do not walk off the end of ealist (bsc#1228403).
- CVE-2024-41040: net/sched: Fix UAF when resolving a clash (bsc#1228518).
- CVE-2024-41041: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() (bsc#1228520).
- CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets (bsc#1228530).
- CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565).
- CVE-2024-41057: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() (bsc#1228462).
- CVE-2024-41058: cachefiles: fix slab-use-after-free in fscache_withdraw_volume() (bsc#1228459).
- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
- CVE-2024-41063: bluetooth: hci_core: cancel all works upon hci_unregister_dev() (bsc#1228580).
- CVE-2024-41064: powerpc/eeh: avoid possible crash when edev->pdev changes (bsc#1228599).
- CVE-2024-41066: ibmvnic: add tx check to prevent skb leak (bsc#1228640).
- CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).
- CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() (bsc#1228581).
- CVE-2024-41071: wifi: mac80211: Avoid address calculations via out of bounds array indexing (bsc#1228625).
- CVE-2024-41072: wifi: cfg80211: wext: add extra SIOCSIWSCAN data check (bsc#1228626).
- CVE-2024-41076: NFSv4: Fix memory leak in nfs4_set_security_label (bsc#1228649).
- CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable failure (bsc#1228655).
- CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617).
- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
- CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327).
- CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (bsc#1228470).
- CVE-2024-42079: gfs2: Fix NULL pointer dereference in gfs2_log_flush (bsc#1228672).
- CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680).
- CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633).
- CVE-2024-42122: drm/amd/display: Add NULL pointer check for kzalloc (bsc#1228591).
- CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible (bsc#1228705).
- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743)
- CVE-2024-42161: bpf: avoid uninitialized value in BPF_CORE_READ_BITFIELD (bsc#1228756).
- CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list (bsc#1228723).
- CVE-2024-42230: powerpc/pseries: Fix scv instruction crash with kexec (bsc#1194869).
Tenable has extracted the preceding description block directly from the SUSE security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The package checks in this plugin were extracted from
# SUSE update advisory SUSE-SU-2024:2939-1. The text itself
# is copyright (C) SUSE.
##
include('compat.inc');
if (description)
{
script_id(205734);
script_version("1.2");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/08/28");
script_cve_id(
"CVE-2021-4439",
"CVE-2021-47086",
"CVE-2021-47089",
"CVE-2021-47103",
"CVE-2021-47186",
"CVE-2021-47432",
"CVE-2021-47515",
"CVE-2021-47534",
"CVE-2021-47538",
"CVE-2021-47539",
"CVE-2021-47546",
"CVE-2021-47547",
"CVE-2021-47555",
"CVE-2021-47566",
"CVE-2021-47571",
"CVE-2021-47572",
"CVE-2021-47576",
"CVE-2021-47577",
"CVE-2021-47578",
"CVE-2021-47580",
"CVE-2021-47582",
"CVE-2021-47583",
"CVE-2021-47584",
"CVE-2021-47585",
"CVE-2021-47586",
"CVE-2021-47587",
"CVE-2021-47588",
"CVE-2021-47589",
"CVE-2021-47590",
"CVE-2021-47591",
"CVE-2021-47592",
"CVE-2021-47593",
"CVE-2021-47595",
"CVE-2021-47596",
"CVE-2021-47597",
"CVE-2021-47598",
"CVE-2021-47599",
"CVE-2021-47600",
"CVE-2021-47601",
"CVE-2021-47602",
"CVE-2021-47603",
"CVE-2021-47604",
"CVE-2021-47605",
"CVE-2021-47606",
"CVE-2021-47607",
"CVE-2021-47608",
"CVE-2021-47609",
"CVE-2021-47610",
"CVE-2021-47611",
"CVE-2021-47612",
"CVE-2021-47614",
"CVE-2021-47615",
"CVE-2021-47616",
"CVE-2021-47617",
"CVE-2021-47618",
"CVE-2021-47619",
"CVE-2021-47620",
"CVE-2021-47622",
"CVE-2021-47623",
"CVE-2021-47624",
"CVE-2022-48711",
"CVE-2022-48712",
"CVE-2022-48713",
"CVE-2022-48714",
"CVE-2022-48715",
"CVE-2022-48716",
"CVE-2022-48717",
"CVE-2022-48718",
"CVE-2022-48720",
"CVE-2022-48721",
"CVE-2022-48722",
"CVE-2022-48723",
"CVE-2022-48724",
"CVE-2022-48725",
"CVE-2022-48726",
"CVE-2022-48727",
"CVE-2022-48728",
"CVE-2022-48729",
"CVE-2022-48730",
"CVE-2022-48732",
"CVE-2022-48733",
"CVE-2022-48734",
"CVE-2022-48735",
"CVE-2022-48736",
"CVE-2022-48737",
"CVE-2022-48738",
"CVE-2022-48739",
"CVE-2022-48740",
"CVE-2022-48743",
"CVE-2022-48744",
"CVE-2022-48745",
"CVE-2022-48746",
"CVE-2022-48747",
"CVE-2022-48748",
"CVE-2022-48749",
"CVE-2022-48751",
"CVE-2022-48752",
"CVE-2022-48753",
"CVE-2022-48754",
"CVE-2022-48755",
"CVE-2022-48756",
"CVE-2022-48758",
"CVE-2022-48759",
"CVE-2022-48760",
"CVE-2022-48761",
"CVE-2022-48763",
"CVE-2022-48765",
"CVE-2022-48766",
"CVE-2022-48767",
"CVE-2022-48768",
"CVE-2022-48769",
"CVE-2022-48770",
"CVE-2022-48771",
"CVE-2022-48772",
"CVE-2022-48773",
"CVE-2022-48774",
"CVE-2022-48775",
"CVE-2022-48776",
"CVE-2022-48777",
"CVE-2022-48778",
"CVE-2022-48780",
"CVE-2022-48783",
"CVE-2022-48784",
"CVE-2022-48785",
"CVE-2022-48786",
"CVE-2022-48787",
"CVE-2022-48788",
"CVE-2022-48789",
"CVE-2022-48790",
"CVE-2022-48791",
"CVE-2022-48792",
"CVE-2022-48793",
"CVE-2022-48794",
"CVE-2022-48796",
"CVE-2022-48797",
"CVE-2022-48798",
"CVE-2022-48799",
"CVE-2022-48800",
"CVE-2022-48801",
"CVE-2022-48802",
"CVE-2022-48803",
"CVE-2022-48804",
"CVE-2022-48805",
"CVE-2022-48806",
"CVE-2022-48807",
"CVE-2022-48809",
"CVE-2022-48810",
"CVE-2022-48811",
"CVE-2022-48812",
"CVE-2022-48813",
"CVE-2022-48814",
"CVE-2022-48815",
"CVE-2022-48816",
"CVE-2022-48817",
"CVE-2022-48818",
"CVE-2022-48820",
"CVE-2022-48821",
"CVE-2022-48822",
"CVE-2022-48823",
"CVE-2022-48824",
"CVE-2022-48825",
"CVE-2022-48826",
"CVE-2022-48827",
"CVE-2022-48828",
"CVE-2022-48829",
"CVE-2022-48830",
"CVE-2022-48831",
"CVE-2022-48834",
"CVE-2022-48835",
"CVE-2022-48836",
"CVE-2022-48837",
"CVE-2022-48838",
"CVE-2022-48839",
"CVE-2022-48840",
"CVE-2022-48841",
"CVE-2022-48842",
"CVE-2022-48843",
"CVE-2022-48844",
"CVE-2022-48846",
"CVE-2022-48847",
"CVE-2022-48849",
"CVE-2022-48850",
"CVE-2022-48851",
"CVE-2022-48852",
"CVE-2022-48853",
"CVE-2022-48855",
"CVE-2022-48856",
"CVE-2022-48857",
"CVE-2022-48858",
"CVE-2022-48859",
"CVE-2022-48860",
"CVE-2022-48861",
"CVE-2022-48862",
"CVE-2022-48863",
"CVE-2022-48864",
"CVE-2022-48866",
"CVE-2023-24023",
"CVE-2023-52435",
"CVE-2023-52573",
"CVE-2023-52580",
"CVE-2023-52622",
"CVE-2023-52658",
"CVE-2023-52667",
"CVE-2023-52670",
"CVE-2023-52672",
"CVE-2023-52675",
"CVE-2023-52735",
"CVE-2023-52737",
"CVE-2023-52751",
"CVE-2023-52752",
"CVE-2023-52762",
"CVE-2023-52766",
"CVE-2023-52775",
"CVE-2023-52784",
"CVE-2023-52787",
"CVE-2023-52800",
"CVE-2023-52812",
"CVE-2023-52835",
"CVE-2023-52837",
"CVE-2023-52843",
"CVE-2023-52845",
"CVE-2023-52846",
"CVE-2023-52857",
"CVE-2023-52863",
"CVE-2023-52869",
"CVE-2023-52881",
"CVE-2023-52882",
"CVE-2023-52884",
"CVE-2023-52885",
"CVE-2023-52886",
"CVE-2024-25741",
"CVE-2024-26583",
"CVE-2024-26584",
"CVE-2024-26615",
"CVE-2024-26625",
"CVE-2024-26633",
"CVE-2024-26635",
"CVE-2024-26636",
"CVE-2024-26641",
"CVE-2024-26644",
"CVE-2024-26661",
"CVE-2024-26663",
"CVE-2024-26665",
"CVE-2024-26720",
"CVE-2024-26800",
"CVE-2024-26802",
"CVE-2024-26813",
"CVE-2024-26814",
"CVE-2024-26842",
"CVE-2024-26845",
"CVE-2024-26863",
"CVE-2024-26923",
"CVE-2024-26935",
"CVE-2024-26961",
"CVE-2024-26973",
"CVE-2024-26976",
"CVE-2024-27015",
"CVE-2024-27019",
"CVE-2024-27020",
"CVE-2024-27025",
"CVE-2024-27065",
"CVE-2024-27402",
"CVE-2024-27432",
"CVE-2024-27437",
"CVE-2024-33619",
"CVE-2024-35247",
"CVE-2024-35789",
"CVE-2024-35790",
"CVE-2024-35805",
"CVE-2024-35807",
"CVE-2024-35814",
"CVE-2024-35819",
"CVE-2024-35835",
"CVE-2024-35837",
"CVE-2024-35848",
"CVE-2024-35853",
"CVE-2024-35855",
"CVE-2024-35857",
"CVE-2024-35861",
"CVE-2024-35862",
"CVE-2024-35864",
"CVE-2024-35869",
"CVE-2024-35878",
"CVE-2024-35884",
"CVE-2024-35886",
"CVE-2024-35889",
"CVE-2024-35890",
"CVE-2024-35893",
"CVE-2024-35896",
"CVE-2024-35898",
"CVE-2024-35899",
"CVE-2024-35900",
"CVE-2024-35905",
"CVE-2024-35925",
"CVE-2024-35934",
"CVE-2024-35949",
"CVE-2024-35950",
"CVE-2024-35956",
"CVE-2024-35958",
"CVE-2024-35960",
"CVE-2024-35961",
"CVE-2024-35962",
"CVE-2024-35979",
"CVE-2024-35995",
"CVE-2024-35997",
"CVE-2024-36000",
"CVE-2024-36004",
"CVE-2024-36005",
"CVE-2024-36008",
"CVE-2024-36017",
"CVE-2024-36020",
"CVE-2024-36021",
"CVE-2024-36025",
"CVE-2024-36288",
"CVE-2024-36477",
"CVE-2024-36478",
"CVE-2024-36479",
"CVE-2024-36889",
"CVE-2024-36890",
"CVE-2024-36894",
"CVE-2024-36899",
"CVE-2024-36900",
"CVE-2024-36901",
"CVE-2024-36902",
"CVE-2024-36904",
"CVE-2024-36909",
"CVE-2024-36910",
"CVE-2024-36911",
"CVE-2024-36912",
"CVE-2024-36913",
"CVE-2024-36914",
"CVE-2024-36915",
"CVE-2024-36916",
"CVE-2024-36917",
"CVE-2024-36919",
"CVE-2024-36923",
"CVE-2024-36934",
"CVE-2024-36937",
"CVE-2024-36939",
"CVE-2024-36940",
"CVE-2024-36945",
"CVE-2024-36946",
"CVE-2024-36949",
"CVE-2024-36960",
"CVE-2024-36964",
"CVE-2024-36965",
"CVE-2024-36967",
"CVE-2024-36969",
"CVE-2024-36971",
"CVE-2024-36974",
"CVE-2024-36975",
"CVE-2024-36978",
"CVE-2024-37021",
"CVE-2024-37078",
"CVE-2024-37354",
"CVE-2024-38381",
"CVE-2024-38388",
"CVE-2024-38390",
"CVE-2024-38540",
"CVE-2024-38541",
"CVE-2024-38544",
"CVE-2024-38545",
"CVE-2024-38546",
"CVE-2024-38547",
"CVE-2024-38548",
"CVE-2024-38549",
"CVE-2024-38550",
"CVE-2024-38552",
"CVE-2024-38553",
"CVE-2024-38555",
"CVE-2024-38556",
"CVE-2024-38557",
"CVE-2024-38558",
"CVE-2024-38559",
"CVE-2024-38560",
"CVE-2024-38564",
"CVE-2024-38565",
"CVE-2024-38567",
"CVE-2024-38568",
"CVE-2024-38570",
"CVE-2024-38571",
"CVE-2024-38573",
"CVE-2024-38578",
"CVE-2024-38579",
"CVE-2024-38580",
"CVE-2024-38581",
"CVE-2024-38582",
"CVE-2024-38583",
"CVE-2024-38586",
"CVE-2024-38587",
"CVE-2024-38588",
"CVE-2024-38590",
"CVE-2024-38591",
"CVE-2024-38594",
"CVE-2024-38597",
"CVE-2024-38598",
"CVE-2024-38599",
"CVE-2024-38600",
"CVE-2024-38601",
"CVE-2024-38603",
"CVE-2024-38605",
"CVE-2024-38608",
"CVE-2024-38616",
"CVE-2024-38618",
"CVE-2024-38619",
"CVE-2024-38621",
"CVE-2024-38627",
"CVE-2024-38628",
"CVE-2024-38630",
"CVE-2024-38633",
"CVE-2024-38634",
"CVE-2024-38635",
"CVE-2024-38659",
"CVE-2024-38661",
"CVE-2024-38780",
"CVE-2024-39276",
"CVE-2024-39301",
"CVE-2024-39371",
"CVE-2024-39463",
"CVE-2024-39468",
"CVE-2024-39469",
"CVE-2024-39471",
"CVE-2024-39472",
"CVE-2024-39475",
"CVE-2024-39482",
"CVE-2024-39487",
"CVE-2024-39488",
"CVE-2024-39490",
"CVE-2024-39493",
"CVE-2024-39494",
"CVE-2024-39497",
"CVE-2024-39499",
"CVE-2024-39500",
"CVE-2024-39501",
"CVE-2024-39502",
"CVE-2024-39505",
"CVE-2024-39506",
"CVE-2024-39507",
"CVE-2024-39508",
"CVE-2024-39509",
"CVE-2024-40900",
"CVE-2024-40901",
"CVE-2024-40902",
"CVE-2024-40903",
"CVE-2024-40904",
"CVE-2024-40906",
"CVE-2024-40908",
"CVE-2024-40909",
"CVE-2024-40911",
"CVE-2024-40912",
"CVE-2024-40916",
"CVE-2024-40919",
"CVE-2024-40923",
"CVE-2024-40924",
"CVE-2024-40927",
"CVE-2024-40929",
"CVE-2024-40931",
"CVE-2024-40932",
"CVE-2024-40934",
"CVE-2024-40935",
"CVE-2024-40937",
"CVE-2024-40940",
"CVE-2024-40941",
"CVE-2024-40942",
"CVE-2024-40943",
"CVE-2024-40945",
"CVE-2024-40953",
"CVE-2024-40954",
"CVE-2024-40956",
"CVE-2024-40958",
"CVE-2024-40959",
"CVE-2024-40960",
"CVE-2024-40961",
"CVE-2024-40966",
"CVE-2024-40967",
"CVE-2024-40970",
"CVE-2024-40972",
"CVE-2024-40976",
"CVE-2024-40977",
"CVE-2024-40981",
"CVE-2024-40982",
"CVE-2024-40984",
"CVE-2024-40987",
"CVE-2024-40988",
"CVE-2024-40989",
"CVE-2024-40990",
"CVE-2024-40994",
"CVE-2024-40998",
"CVE-2024-40999",
"CVE-2024-41002",
"CVE-2024-41004",
"CVE-2024-41006",
"CVE-2024-41009",
"CVE-2024-41011",
"CVE-2024-41012",
"CVE-2024-41013",
"CVE-2024-41014",
"CVE-2024-41015",
"CVE-2024-41016",
"CVE-2024-41017",
"CVE-2024-41040",
"CVE-2024-41041",
"CVE-2024-41044",
"CVE-2024-41048",
"CVE-2024-41057",
"CVE-2024-41058",
"CVE-2024-41059",
"CVE-2024-41063",
"CVE-2024-41064",
"CVE-2024-41066",
"CVE-2024-41069",
"CVE-2024-41070",
"CVE-2024-41071",
"CVE-2024-41072",
"CVE-2024-41076",
"CVE-2024-41078",
"CVE-2024-41081",
"CVE-2024-41087",
"CVE-2024-41090",
"CVE-2024-41091",
"CVE-2024-42070",
"CVE-2024-42079",
"CVE-2024-42093",
"CVE-2024-42096",
"CVE-2024-42105",
"CVE-2024-42122",
"CVE-2024-42124",
"CVE-2024-42145",
"CVE-2024-42161",
"CVE-2024-42224",
"CVE-2024-42230"
);
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2024/08/28");
script_xref(name:"SuSE", value:"SUSE-SU-2024:2939-1");
script_name(english:"SUSE SLED15 / SLES15 / openSUSE 15 Security Update : kernel (SUSE-SU-2024:2939-1)");
script_set_attribute(attribute:"synopsis", value:
"The remote SUSE host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are
affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:2939-1 advisory.
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2021-47086: phonet/pep: refuse to enable an unbound pipe (bsc#1220952).
- CVE-2021-47089: kfence: fix memory leak when cat kfence objects (bsc#1220958).
- CVE-2021-47103: net: sock: preserve kabi for sock (bsc#1221010).
- CVE-2021-47186: tipc: check for null after calling kmemdup (bsc#1222702).
- CVE-2021-47432: lib/generic-radix-tree.c: Do not overflow in peek() (bsc#1225391).
- CVE-2021-47515: seg6: fix the iif in the IPv6 socket control block (bsc#1225426).
- CVE-2021-47538: rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() (bsc#1225448).
- CVE-2021-47539: rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle() (bsc#1225452).
- CVE-2021-47546: ipv6: fix memory leak in fib6_rule_suppress (bsc#1225504).
- CVE-2021-47547: net: tulip: de4x5: fix the problem that the array 'lp->phy' may be out of bound
(bsc#1225505).
- CVE-2021-47555: net: vlan: fix underflow for the real_dev refcnt (bsc#1225467).
- CVE-2021-47566: Fix clearing user buffer by properly using clear_user() (bsc#1225514).
- CVE-2021-47571: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() (bsc#1225518).
- CVE-2021-47572: net: nexthop: fix null pointer dereference when IPv6 is not enabled (bsc#1225389).
- CVE-2021-47588: sit: do not call ipip6_dev_free() from sit_init_net() (bsc#1226568).
- CVE-2021-47590: mptcp: fix deadlock in __mptcp_push_pending() (bsc#1226565).
- CVE-2021-47591: mptcp: remove tcp ulp setsockopt support (bsc#1226570).
- CVE-2021-47593: mptcp: clear 'kern' flag from fallback sockets (bsc#1226551).
- CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1226574).
- CVE-2021-47599: btrfs: use latest_dev in btrfs_show_devname (bsc#1226571).
- CVE-2021-47606: net: netlink: af_netlink: Prevent empty skb by adding a check on len. (bsc#1226555).
- CVE-2021-47623: powerpc/fixmap: Fix VM debug warning on unmap (bsc#1227919).
- CVE-2022-48716: ASoC: codecs: wcd938x: fix incorrect used of portid (bsc#1226678).
- CVE-2022-48785: ipv6: mcast: use rcu-safe version of ipv6_get_lladdr() (bsc#1227927)
- CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path
(bsc#1227936).
- CVE-2022-48850: net-sysfs: add check for netdevice being present to speed_show (bsc#1228071).
- CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets (bsc#1228003).
- CVE-2023-24023: Bluetooth: Add more enc key size check (bsc#1218148).
- CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138).
- CVE-2023-52573: net: rds: Fix possible NULL-pointer dereference (bsc#1220869).
- CVE-2023-52580: net/core: Fix ETH_P_1588 flow dissector (bsc#1220876).
- CVE-2023-52622: ext4: avoid online resizing failures due to oversized flex bg (bsc#1222080).
- CVE-2023-52658: Revert 'net/mlx5: Block entering switchdev mode with ns inconsistency' (bsc#1224719).
- CVE-2023-52667: net/mlx5e: fix a potential double-free in fs_any_create_groups (bsc#1224603).
- CVE-2023-52670: rpmsg: virtio: Free driver_override when rpmsg_remove() (bsc#1224696).
- CVE-2023-52672: pipe: wakeup wr_wait after setting max_usage (bsc#1224614).
- CVE-2023-52675: powerpc/imc-pmu: Add a null pointer check in update_events_in_group() (bsc#1224504).
- CVE-2023-52735: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself (bsc#1225475).
- CVE-2023-52737: btrfs: lock the inode in shared mode before starting fiemap (bsc#1225484).
- CVE-2023-52751: smb: client: fix use-after-free in smb2_query_info_compound() (bsc#1225489).
- CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487).
- CVE-2023-52762: virtio-blk: fix implicit overflow on virtio_max_dma_size (bsc#1225573).
- CVE-2023-52775: net/smc: avoid data corruption caused by decline (bsc#1225088).
- CVE-2023-52784: bonding: stop the device in bond_setup_by_slave() (bsc#1224946).
- CVE-2023-52787: blk-mq: make sure active queue usage is held for bio_integrity_prep() (bsc#1225105).
- CVE-2023-52812: drm/amd: check num of link levels when update pcie param (bsc#1225564).
- CVE-2023-52835: perf/core: Bail out early if the request AUX area is out of bound (bsc#1225602).
- CVE-2023-52837: nbd: fix uaf in nbd_open (bsc#1224935).
- CVE-2023-52843: llc: verify mac len before reading mac header (bsc#1224951).
- CVE-2023-52845: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (bsc#1225585).
- CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225098).
- CVE-2023-52857: drm/mediatek: Fix coverity issue with unintentional integer overflow (bsc#1225581).
- CVE-2023-52863: hwmon: (axi-fan-control) Fix possible NULL pointer dereference (bsc#1225586).
- CVE-2023-52869: pstore/platform: Add check for kstrdup (bsc#1225050).
- CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).
- CVE-2023-52882: clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change (bsc#1225692).
- CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942).
- CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
- CVE-2024-26633: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() (bsc#1221647).
- CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656).
- CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes (bsc#1221659).
- CVE-2024-26641: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() (bsc#1221654).
- CVE-2024-26644: btrfs: do not abort filesystem when attempting to snapshot deleted subvolume
(bsc#1221282, bsc#1222072).
- CVE-2024-26661: drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'
(bsc#1222323).
- CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (bsc#1222326).
- CVE-2024-26665: tunnels: fix out of bounds access when building IPv6 PMTU error (bsc#1222328).
- CVE-2024-26720: mm: Avoid overflows in dirty throttling logic (bsc#1222364).
- CVE-2024-26802: stmmac: Clear variable when destroying workqueue (bsc#1222799).
- CVE-2024-26813: vfio/platform: Create persistent IRQ handlers (bsc#1222809).
- CVE-2024-26814: vfio/fsl-mc: Block calling interrupt handler without trigger (bsc#1222810).
- CVE-2024-26842: scsi: target: core: Add TMF to tmr_list handling (bsc#1223013).
- CVE-2024-26845: scsi: target: core: Add TMF to tmr_list handling (bsc#1223018).
- CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node() (bsc#1223021).
- CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384).
- CVE-2024-26961: mac802154: fix llsec key resources release in mac802154_llsec_key_del (bsc#1223652).
- CVE-2024-26973: fat: fix uninitialized field in nostale filehandles (bsc#1223641).
- CVE-2024-27015: netfilter: flowtable: incorrect pppoe tuple (bsc#1223806).
- CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (bsc#1223813)
- CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (bsc#1223815)
- CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778)
- CVE-2024-27065: netfilter: nf_tables: do not compare internal table flags on updates (bsc#1223836).
- CVE-2024-27402: phonet/pep: fix racy skb_queue_empty() use (bsc#1224414).
- CVE-2024-27432: net: ethernet: mtk_eth_soc: fix PPE hanging issue (bsc#1224716).
- CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ (bsc#1222625).
- CVE-2024-35247: fpga: region: add owner module and take its refcount (bsc#1226948).
- CVE-2024-35789: Check fast rx for non-4addr sta VLAN changes (bsc#1224749).
- CVE-2024-35790: usb: typec: altmodes/displayport: create sysfs nodes as driver's default device
attribute group (bsc#1224712).
- CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit (bsc#1224743).
- CVE-2024-35807: ext4: fix corruption during on-line resize (bsc#1224735).
- CVE-2024-35819: soc: fsl: qbman: Use raw spinlock for cgr_lock (bsc#1224683).
- CVE-2024-35835: net/mlx5e: fix a double-free in arfs_create_groups (bsc#1224605).
- CVE-2024-35837: net: mvpp2: clear BM pool before initialization (bsc#1224500).
- CVE-2024-35848: eeprom: at24: fix memory corruption race condition (bsc#1224612).
- CVE-2024-35853: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash (bsc#1224604).
- CVE-2024-35857: icmp: prevent possible NULL dereferences from icmp_build_probe() (bsc#1224619).
- CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766).
- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764).
- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765).
- CVE-2024-35869: smb: client: guarantee refcounted children from parent session (bsc#1224679).
- CVE-2024-35884: udp: do not accept non-tunnel GSO skbs landing in a tunnel (bsc#1224520).
- CVE-2024-35886: ipv6: Fix infinite recursion in fib6_dump_done() (bsc#1224670).
- CVE-2024-35889: idpf: fix kernel panic on unknown packet types (bsc#1224517).
- CVE-2024-35890: gro: fix ownership transfer (bsc#1224516).
- CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512)
- CVE-2024-35898: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()
(bsc#1224498).
- CVE-2024-35899: netfilter: nf_tables: flush pending destroy work before exit_net release (bsc#1224499)
- CVE-2024-35900: netfilter: nf_tables: reject new basechain after table flag update (bsc#1224497).
- CVE-2024-35925: block: prevent division by zero in blk_rq_stat_sum() (bsc#1224661).
- CVE-2024-35934: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() (bsc#1224641)
- CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700).
- CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1224703).
- CVE-2024-35956: Fixed qgroup prealloc rsv leak in subvolume operations (bsc#1224674)
- CVE-2024-35958: net: ena: Fix incorrect descriptor free behavior (bsc#1224677).
- CVE-2024-35960: net/mlx5: Properly link new fs rules into the tree (bsc#1224588).
- CVE-2024-35961: net/mlx5: Register devlink first under devlink lock (bsc#1224585).
- CVE-2024-35979: raid1: fix use-after-free for original bio in raid1_write_request() (bsc#1224572).
- CVE-2024-35995: ACPI: CPPC: Use access_width over bit_width for system memory accesses (bsc#1224557).
- CVE-2024-35997: Remove I2C_HID_READ_PENDING flag to prevent lock-up (bsc#1224552).
- CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (bsc#1224548).
- CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1224545)
- CVE-2024-36005: netfilter: nf_tables: honor table dormant flag from netdev release event path
(bsc#1224539).
- CVE-2024-36008: ipv4: check for NULL idev in ip_route_use_hint() (bsc#1224540).
- CVE-2024-36017: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation (bsc#1225681).
- CVE-2024-36020: i40e: fix vf may be used uninitialized in this function warning (bsc#1225698).
- CVE-2024-36021: net: hns3: fix kernel crash when devlink reload during pf initialization (bsc#1225699).
- CVE-2024-36478: null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues'
(bsc#1226841).
- CVE-2024-36479: fpga: bridge: add owner module and take its refcount (bsc#1226949).
- CVE-2024-36890: mm/slab: make __free(kfree) accept error pointers (bsc#1225714).
- CVE-2024-36894: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (bsc#1225749).
- CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225737).
- CVE-2024-36900: net: hns3: fix kernel crash when devlink reload during initialization (bsc#1225726).
- CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711)
- CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (bsc#1225719).
- CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225732).
- CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that couldn't be re-encrypted
(bsc#1225744).
- CVE-2024-36910: uio_hv_generic: Do not free decrypted memory (bsc#1225717).
- CVE-2024-36911: hv_netvsc: Do not free decrypted memory (bsc#1225745).
- CVE-2024-36912: Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl (bsc#1225752).
- CVE-2024-36913: Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails (bsc#1225753).
- CVE-2024-36914: drm/amd/display: Skip on writeback when it's not applicable (bsc#1225757).
- CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758).
- CVE-2024-36916: blk-iocost: avoid out of bounds shift (bsc#1225759).
- CVE-2024-36917: block: fix overflow in blk_ioctl_discard() (bsc#1225770).
- CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload (bsc#1225767).
- CVE-2024-36923: fs/9p: fix uninitialized values during inode evict (bsc#1225815).
- CVE-2024-36934: bna: ensure the copied buf is NUL terminated (bsc#1225760).
- CVE-2024-36937: xdp: use flags field to disambiguate broadcast redirect (bsc#1225834).
- CVE-2024-36939: nfs: Handle error of rpc_proc_register() in nfs_net_init() (bsc#1225838).
- CVE-2024-36940: pinctrl: core: delete incorrect free in pinctrl_enable() (bsc#1225840).
- CVE-2024-36945: net/smc: fix neighbour and rtable leak in smc_ib_find_route() (bsc#1225823).
- CVE-2024-36946: phonet: fix rtm_phonet_notify() skb allocation (bsc#1225851).
- CVE-2024-36949: amd/amdkfd: sync all devices to wait all processes being evicted (bsc#1225872)
- CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866).
- CVE-2024-36971: net: fix __dst_negative_advice() race (bsc#1226145).
- CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519).
- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).
- CVE-2024-37021: fpga: manager: add owner module and take its refcount (bsc#1226950).
- CVE-2024-37078: nilfs2: fix potential kernel bug due to lack of writeback flag waiting (bsc#1227066).
- CVE-2024-37354: btrfs: fix crash on racing fsync and size-extending write into prealloc (bsc#1227101).
- CVE-2024-38545: RDMA/hns: Fix UAF for cq async event (bsc#1226595).
- CVE-2024-38553: net: fec: remove .ndo_poll_controller to avoid deadlock (bsc#1226744).
- CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607).
- CVE-2024-38556: net/mlx5: Add a timeout to acquire the command queue semaphore (bsc#1226774).
- CVE-2024-38557: net/mlx5: Reload only IB representors upon lag disable/enable (bsc#1226781).
- CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for ICMPv6 (bsc#1226783).
- CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785).
- CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).
- CVE-2024-38564: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE
(bsc#1226789).
- CVE-2024-38568: drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group (bsc#1226771).
- CVE-2024-38570: gfs2: Fix potential glock use-after-free on unmount (bsc#1226775).
- CVE-2024-38578: ecryptfs: Fix buffer size for tag 66 packet (bsc#1226634).
- CVE-2024-38580: epoll: be better about file lifetimes (bsc#1226610).
- CVE-2024-38586: r8169: Fix possible ring buffer corruption on fragmented Tx packets (bsc#1226750).
- CVE-2024-38594: net: stmmac: move the EST lock to struct stmmac_priv (bsc#1226734).
- CVE-2024-38597: eth: sungem: remove .ndo_poll_controller to avoid deadlocks (bsc#1226749).
- CVE-2024-38598: md: fix resync softlockup when bitmap size is less than array size (bsc#1226757).
- CVE-2024-38603: drivers/perf: hisi: hns3: Actually use devm_add_action_or_reset() (bsc#1226842).
- CVE-2024-38608: net/mlx5e: Fix netif state handling (bsc#1226746).
- CVE-2024-38627: stm class: Fix a double free in stm_register_device() (bsc#1226857).
- CVE-2024-38628: usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind
(bsc#1226911).
- CVE-2024-38659: enic: Validate length of nl attributes in enic_set_vf_port (bsc#1226883).
- CVE-2024-38661: s390/ap: Fix crash in AP internal function modify_bitmap() (bsc#1226996).
- CVE-2024-38780: dma-buf/sw-sync: do not enable IRQ from sync_print_obj() (bsc#1226886).
- CVE-2024-39276: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() (bsc#1226993).
- CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994).
- CVE-2024-39371: io_uring: check for non-NULL file pointer in io_file_can_poll() (bsc#1226990).
- CVE-2024-39463: 9p: add missing locking around taking dentry fid list (bsc#1227090).
- CVE-2024-39468: smb: client: fix deadlock in smb2_find_smb_tcon() (bsc#1227103).
- CVE-2024-39469: nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors (bsc#1226992).
- CVE-2024-39472: xfs: fix log recovery buffer allocation for the legacy h_size fixup (bsc#1227432).
- CVE-2024-39475: fbdev: savage: Handle err return when savagefb_check_var failed (bsc#1227435)
- CVE-2024-39482: bcache: fix variable length array abuse in btree_iter (bsc#1227447).
- CVE-2024-39487: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (bsc#1227573)
- CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core (bsc#1227626).
- CVE-2024-39493: crypto: qat - fix ADF_DEV_RESET_SYNC memory leak (bsc#1227620).
- CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).
- CVE-2024-39497: drm/shmem-helper: fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) (bsc#1227722).
- CVE-2024-39502: ionic: fix use after netif_napi_del() (bsc#1227755).
- CVE-2024-39506: liquidio: adjust a NULL pointer handling path in lio_vf_rep_copy_packet (bsc#1227729).
- CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario (bsc#1227730).
- CVE-2024-39508: io_uring/io-wq: use set_bit() and test_bit() at worker->flags (bsc#1227732).
- CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory (bsc#1227762).
- CVE-2024-40906: net/mlx5: Always stop health timer during driver removal (bsc#1227763).
- CVE-2024-40908: bpf: Set run context for rawtp test_run callback (bsc#1227783).
- CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1227798).
- CVE-2024-40919: bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send()
(bsc#1227779).
- CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure (bsc#1227786).
- CVE-2024-40931: mptcp: ensure snd_una is properly initialized on connect (bsc#1227780).
- CVE-2024-40935: cachefiles: flush all requests after setting CACHEFILES_DEAD (bsc#1227797).
- CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836).
- CVE-2024-40940: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail (bsc#1227800).
- CVE-2024-40943: ocfs2: fix races between hole punching and AIO+DIO (bsc#1227849).
- CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() (bsc#1227806).
- CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808)
- CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (bsc#1227810).
- CVE-2024-40958: netns: Make get_net_ns() handle zero refcount net (bsc#1227812).
- CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (bsc#1227884).
- CVE-2024-40960: ipv6: prevent possible NULL dereference in rt6_probe() (bsc#1227813).
- CVE-2024-40961: ipv6: prevent possible NULL deref in fib6_nh_init() (bsc#1227814).
- CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc (bsc#1227886).
- CVE-2024-40967: serial: imx: Introduce timeout when waiting on transmitter empty (bsc#1227891).
- CVE-2024-40970: Avoid hw_desc array overrun in dw-axi-dmac (bsc#1227899).
- CVE-2024-40972: ext4: fold quota accounting into ext4_xattr_inode_lookup_create() (bsc#1227910).
- CVE-2024-40977: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery (bsc#1227950).
- CVE-2024-40982: ssb: fix potential NULL pointer dereference in ssb_device_uevent() (bsc#1227865).
- CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on teardown (bsc#1227823).
- CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store (bsc#1227829).
- CVE-2024-40998: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super()
(bsc#1227866).
- CVE-2024-40999: net: ena: Add validation for completion descriptors consistency (bsc#1227913).
- CVE-2024-41006: netrom: Fix a memory leak in nr_heartbeat_expiry() (bsc#1227862).
- CVE-2024-41009: bpf: Fix overrunning reservations in ringbuf (bsc#1228020).
- CVE-2024-41011: drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (bsc#1228114).
- CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is detected (bsc#1228247).
- CVE-2024-41013: xfs: do not walk off the end of a directory data block (bsc#1228405).
- CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data (bsc#1228408).
- CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry() (bsc#1228409).
- CVE-2024-41016: ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410).
- CVE-2024-41017: jfs: do not walk off the end of ealist (bsc#1228403).
- CVE-2024-41040: net/sched: Fix UAF when resolving a clash (bsc#1228518).
- CVE-2024-41041: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() (bsc#1228520).
- CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets (bsc#1228530).
- CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565).
- CVE-2024-41057: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() (bsc#1228462).
- CVE-2024-41058: cachefiles: fix slab-use-after-free in fscache_withdraw_volume() (bsc#1228459).
- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
- CVE-2024-41063: bluetooth: hci_core: cancel all works upon hci_unregister_dev() (bsc#1228580).
- CVE-2024-41064: powerpc/eeh: avoid possible crash when edev->pdev changes (bsc#1228599).
- CVE-2024-41066: ibmvnic: add tx check to prevent skb leak (bsc#1228640).
- CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).
- CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() (bsc#1228581).
- CVE-2024-41071: wifi: mac80211: Avoid address calculations via out of bounds array indexing
(bsc#1228625).
- CVE-2024-41072: wifi: cfg80211: wext: add extra SIOCSIWSCAN data check (bsc#1228626).
- CVE-2024-41076: NFSv4: Fix memory leak in nfs4_set_security_label (bsc#1228649).
- CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable failure (bsc#1228655).
- CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617).
- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
- CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327).
- CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers
(bsc#1228470).
- CVE-2024-42079: gfs2: Fix NULL pointer dereference in gfs2_log_flush (bsc#1228672).
- CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680).
- CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633).
- CVE-2024-42122: drm/amd/display: Add NULL pointer check for kzalloc (bsc#1228591).
- CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible (bsc#1228705).
- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743)
- CVE-2024-42161: bpf: avoid uninitialized value in BPF_CORE_READ_BITFIELD (bsc#1228756).
- CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list (bsc#1228723).
- CVE-2024-42230: powerpc/pseries: Fix scv instruction crash with kexec (bsc#1194869).
Tenable has extracted the preceding description block directly from the SUSE security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1082555");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1156395");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1190336");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1191958");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1193454");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1193554");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1193787");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1193883");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1194324");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1194826");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1194869");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1195065");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1195254");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1195341");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1195349");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1195357");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1195668");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1195775");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1195927");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1195957");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1196018");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1196746");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1196823");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1197146");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1197246");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1197762");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1197915");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1198014");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1199295");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1202346");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1202686");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1202767");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1202780");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205205");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207361");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1208783");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1209636");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1213123");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1215492");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1215587");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1216834");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1217912");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1218148");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1218570");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1218820");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1219224");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1219633");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1219832");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1219847");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220138");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220185");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220186");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220368");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220812");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220869");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220876");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220942");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220952");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1220958");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221010");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221086");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221282");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221647");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221654");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221656");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221659");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1221958");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222015");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222072");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222080");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222241");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222254");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222323");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222326");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222328");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222364");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222625");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222702");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222728");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222799");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222809");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222810");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1222893");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223013");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223018");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223021");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223180");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223265");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223384");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223635");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223641");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223652");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223675");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223778");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223806");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223813");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223815");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223836");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1223863");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224020");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224331");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224414");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224488");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224497");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224498");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224499");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224500");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224504");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224512");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224516");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224517");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224520");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224539");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224540");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224545");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224548");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224552");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224557");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224572");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224573");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224583");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224585");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224588");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224602");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224603");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224604");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224605");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224612");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224614");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224619");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224636");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224641");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224661");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224662");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224670");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224671");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224674");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224677");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224679");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224683");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224694");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224696");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224700");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224703");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224712");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224716");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224719");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224735");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224743");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224749");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224764");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224765");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224766");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224935");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224946");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1224951");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225050");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225088");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225098");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225105");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225272");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225300");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225389");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225391");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225419");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225426");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225448");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225452");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225467");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225475");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225484");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225487");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225489");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225504");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225505");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225514");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225518");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225535");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225564");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225573");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225581");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225585");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225586");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225602");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225611");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225681");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225692");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225698");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225699");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225704");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225711");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225714");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225717");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225719");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225726");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225732");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225737");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225744");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225745");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225746");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225749");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225752");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225753");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225757");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225758");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225759");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225760");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225767");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225770");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225815");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225823");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225834");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225838");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225840");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225851");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225866");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225872");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225894");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1225903");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226022");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226131");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226145");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226149");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226155");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226202");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226211");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226212");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226226");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226502");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226514");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226519");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226520");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226537");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226538");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226539");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226550");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226551");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226552");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226553");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226554");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226555");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226556");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226557");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226558");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226559");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226561");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226562");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226563");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226564");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226565");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226566");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226567");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226568");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226569");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226570");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226571");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226572");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226574");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226575");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226576");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226577");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226579");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226580");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226581");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226582");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226583");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226585");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226587");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226588");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226593");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226595");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226597");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226601");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226602");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226603");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226607");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226610");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226614");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226616");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226617");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226618");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226619");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226621");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226622");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226624");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226626");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226628");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226629");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226632");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226633");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226634");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226637");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226643");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226644");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226645");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226647");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226650");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226653");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226657");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226658");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226669");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226670");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226672");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226673");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226674");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226675");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226678");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226679");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226683");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226685");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226686");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226690");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226691");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226692");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226693");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226696");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226697");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226698");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226699");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226701");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226702");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226703");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226704");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226705");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226706");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226708");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226709");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226710");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226711");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226712");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226713");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226715");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226716");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226718");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226719");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226720");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226721");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226730");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226732");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226734");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226735");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226737");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226738");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226739");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226740");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226744");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226746");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226747");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226749");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226750");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226754");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226757");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226762");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226764");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226767");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226768");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226769");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226771");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226774");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226775");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226777");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226780");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226781");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226783");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226785");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226786");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226789");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226791");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226834");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226837");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226839");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226840");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226841");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226842");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226848");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226852");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226857");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226861");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226863");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226864");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226867");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226868");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226876");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226878");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226883");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226886");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226890");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226891");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226895");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226908");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226911");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226915");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226928");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226948");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226949");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226950");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226953");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226962");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226976");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226990");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226992");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226993");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226994");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1226996");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227066");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227090");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227096");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227101");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227103");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227121");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227157");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227162");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227274");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227362");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227383");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227432");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227435");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227447");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227487");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227573");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227618");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227620");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227626");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227635");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227661");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227716");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227722");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227724");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227725");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227728");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227729");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227730");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227732");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227733");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227750");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227754");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227755");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227760");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227762");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227763");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227764");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227766");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227770");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227771");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227772");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227774");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227779");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227780");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227783");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227786");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227787");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227790");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227792");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227796");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227797");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227798");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227800");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227802");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227806");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227808");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227810");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227812");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227813");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227814");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227816");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227820");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227823");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227824");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227828");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227829");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227836");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227846");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227849");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227851");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227862");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227864");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227865");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227866");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227870");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227884");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227886");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227891");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227893");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227899");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227900");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227910");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227913");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227917");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227919");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227920");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227921");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227922");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227923");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227924");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227925");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227927");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227928");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227931");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227932");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227933");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227935");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227936");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227938");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227941");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227942");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227944");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227945");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227947");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227948");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227949");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227950");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227952");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227953");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227954");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227956");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227957");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227963");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227964");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227965");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227968");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227969");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227970");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227971");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227972");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227975");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227976");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227981");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227982");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227985");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227986");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227987");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227988");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227989");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227990");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227991");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227992");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227993");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227995");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227996");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1227997");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228000");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228002");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228003");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228004");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228005");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228006");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228007");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228008");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228009");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228010");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228011");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228013");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228014");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228015");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228019");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228020");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228025");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228028");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228035");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228037");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228038");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228039");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228040");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228045");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228054");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228055");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228056");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228060");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228061");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228062");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228063");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228064");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228066");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228067");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228068");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228071");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228079");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228090");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228114");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228140");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228190");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228191");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228226");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228235");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228247");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228327");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228328");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228330");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228403");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228405");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228408");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228409");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228410");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228418");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228459");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228462");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228470");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228518");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228520");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228530");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228561");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228565");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228580");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228581");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228591");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228599");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228617");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228625");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228626");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228633");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228640");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228644");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228649");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228655");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228665");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228672");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228680");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228705");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228723");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228743");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228756");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228801");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228850");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1228857");
# https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?7101909b");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-4439");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47086");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47089");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47103");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47186");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47432");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47515");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47534");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47538");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47539");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47546");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47547");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47555");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47566");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47571");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47572");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47576");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47577");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47578");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47580");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47582");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47583");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47584");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47585");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47586");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47587");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47588");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47589");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47590");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47591");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47592");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47593");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47595");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47596");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47597");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47598");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47599");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47600");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47601");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47602");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47603");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47604");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47605");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47606");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47607");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47608");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47609");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47610");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47611");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47612");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47614");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47615");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47616");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47617");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47618");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47619");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47620");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47622");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47623");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2021-47624");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48711");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48712");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48713");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48714");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48715");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48716");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48717");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48718");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48720");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48721");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48722");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48723");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48724");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48725");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48726");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48727");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48728");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48729");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48730");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48732");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48733");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48734");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48735");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48736");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48737");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48738");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48739");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48740");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48743");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48744");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48745");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48746");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48747");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48748");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48749");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48751");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48752");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48753");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48754");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48755");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48756");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48758");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48759");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48760");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48761");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48763");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48765");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48766");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48767");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48768");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48769");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48770");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48771");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48772");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48773");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48774");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48775");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48776");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48777");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48778");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48780");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48783");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48784");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48785");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48786");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48787");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48788");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48789");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48790");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48791");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48792");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48793");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48794");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48796");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48797");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48798");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48799");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48800");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48801");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48802");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48803");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48804");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48805");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48806");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48807");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48809");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48810");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48811");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48812");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48813");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48814");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48815");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48816");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48817");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48818");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48820");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48821");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48822");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48823");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48824");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48825");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48826");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48827");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48828");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48829");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48830");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48831");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48834");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48835");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48836");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48837");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48838");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48839");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48840");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48841");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48842");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48843");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48844");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48846");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48847");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48849");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48850");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48851");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48852");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48853");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48855");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48856");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48857");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48858");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48859");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48860");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48861");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48862");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48863");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48864");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-48866");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-24023");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52435");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52573");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52580");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52622");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52658");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52667");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52670");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52672");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52675");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52735");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52737");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52751");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52752");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52762");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52766");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52775");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52784");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52787");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52800");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52812");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52835");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52837");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52843");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52845");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52846");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52857");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52863");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52869");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52881");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52882");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52884");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52885");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-52886");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-25741");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26583");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26584");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26615");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26625");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26633");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26635");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26636");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26641");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26644");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26661");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26663");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26665");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26720");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26800");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26802");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26813");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26814");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26842");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26845");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26863");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26923");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26935");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26961");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26973");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-26976");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27015");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27019");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27020");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27025");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27065");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27402");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27432");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-27437");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-33619");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35247");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35789");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35790");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35805");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35807");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35814");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35819");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35835");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35837");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35848");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35853");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35855");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35857");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35861");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35862");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35864");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35869");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35878");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35884");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35886");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35889");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35890");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35893");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35896");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35898");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35899");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35900");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35905");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35925");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35934");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35949");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35950");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35956");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35958");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35960");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35961");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35962");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35979");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35995");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-35997");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36000");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36004");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36005");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36008");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36017");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36020");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36021");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36025");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36288");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36477");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36478");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36479");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36889");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36890");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36894");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36899");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36900");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36901");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36902");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36904");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36909");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36910");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36911");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36912");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36913");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36914");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36915");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36916");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36917");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36919");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36923");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36934");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36937");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36939");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36940");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36945");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36946");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36949");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36960");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36964");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36965");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36967");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36969");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36971");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36974");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36975");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-36978");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-37021");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-37078");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-37354");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38381");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38388");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38390");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38540");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38541");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38544");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38545");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38546");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38547");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38548");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38549");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38550");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38552");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38553");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38555");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38556");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38557");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38558");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38559");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38560");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38564");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38565");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38567");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38568");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38570");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38571");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38573");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38578");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38579");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38580");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38581");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38582");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38583");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38586");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38587");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38588");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38590");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38591");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38594");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38597");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38598");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38599");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38600");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38601");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38603");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38605");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38608");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38616");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38618");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38619");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38621");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38627");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38628");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38630");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38633");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38634");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38635");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38659");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38661");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-38780");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39276");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39301");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39371");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39463");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39468");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39469");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39471");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39472");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39475");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39482");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39487");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39488");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39490");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39493");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39494");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39497");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39499");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39500");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39501");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39502");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39505");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39506");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39507");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39508");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-39509");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40900");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40901");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40902");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40903");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40904");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40906");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40908");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40909");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40911");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40912");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40916");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40919");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40923");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40924");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40927");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40929");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40931");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40932");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40934");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40935");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40937");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40940");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40941");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40942");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40943");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40945");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40953");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40954");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40956");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40958");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40959");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40960");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40961");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40966");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40967");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40970");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40972");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40976");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40977");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40981");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40982");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40984");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40987");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40988");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40989");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40990");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40994");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40998");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-40999");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41002");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41004");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41006");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41009");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41011");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41012");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41013");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41014");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41015");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41016");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41017");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41040");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41041");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41044");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41048");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41057");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41058");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41059");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41063");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41064");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41066");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41069");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41070");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41071");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41072");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41076");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41078");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41081");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41087");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41090");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-41091");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42070");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42079");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42093");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42096");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42105");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42122");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42124");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42145");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42161");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42224");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2024-42230");
script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-42224");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2022/03/07");
script_set_attribute(attribute:"patch_publication_date", value:"2024/08/16");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/08/17");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:cluster-md-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:dlm-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gfs2-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-64kb");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-64kb-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-extra");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-livepatch");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-livepatch-5_14_21-150500_55_73-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-macros");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-obs-build");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-source");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-syms");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-zfcpdump");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ocfs2-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:15");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"SuSE Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include('rpm.inc');
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item("Host/SuSE/release");
if (isnull(os_release) || os_release !~ "^(SLED|SLES|SUSE)") audit(AUDIT_OS_NOT, "SUSE / openSUSE");
var os_ver = pregmatch(pattern: "^(SLE(S|D)(?:_SAP)?\d+|SUSE([\d.]+))", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'SUSE / openSUSE');
os_ver = os_ver[1];
if (! preg(pattern:"^(SLED15|SLED_SAP15|SLES15|SLES_SAP15|SUSE15\.5)$", string:os_ver)) audit(AUDIT_OS_NOT, 'SUSE SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15', 'SUSE / openSUSE (' + os_ver + ')');
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'SUSE / openSUSE (' + os_ver + ')', cpu);
var service_pack = get_kb_item("Host/SuSE/patchlevel");
if (isnull(service_pack)) service_pack = "0";
if (os_ver == "SLED15" && (! preg(pattern:"^(5)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLED15 SP5", os_ver + " SP" + service_pack);
if (os_ver == "SLED_SAP15" && (! preg(pattern:"^(5)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLED_SAP15 SP5", os_ver + " SP" + service_pack);
if (os_ver == "SLES15" && (! preg(pattern:"^(5)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLES15 SP5", os_ver + " SP" + service_pack);
if (os_ver == "SLES_SAP15" && (! preg(pattern:"^(5)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLES_SAP15 SP5", os_ver + " SP" + service_pack);
var pkgs = [
{'reference':'kernel-64kb-5.14.21-150500.55.73.1', 'sp':'5', 'cpu':'aarch64', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-64kb-5.14.21-150500.55.73.1', 'sp':'5', 'cpu':'aarch64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-64kb-devel-5.14.21-150500.55.73.1', 'sp':'5', 'cpu':'aarch64', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-64kb-devel-5.14.21-150500.55.73.1', 'sp':'5', 'cpu':'aarch64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-default-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-default-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8', 'sp':'5', 'cpu':'aarch64', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8', 'sp':'5', 'cpu':'x86_64', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8', 'sp':'5', 'cpu':'aarch64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8', 'sp':'5', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-default-devel-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-default-devel-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-default-extra-5.14.21-150500.55.73.1', 'sp':'5', 'cpu':'x86_64', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-default-extra-5.14.21-150500.55.73.1', 'sp':'5', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-devel-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-devel-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-macros-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-macros-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-obs-build-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-obs-build-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-source-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-source-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-syms-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-syms-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-zfcpdump-5.14.21-150500.55.73.1', 'sp':'5', 'cpu':'s390x', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-zfcpdump-5.14.21-150500.55.73.1', 'sp':'5', 'cpu':'s390x', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'reiserfs-kmp-default-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.5']},
{'reference':'kernel-64kb-5.14.21-150500.55.73.1', 'sp':'5', 'cpu':'aarch64', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-basesystem-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'kernel-64kb-5.14.21-150500.55.73.1', 'sp':'5', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-basesystem-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'kernel-64kb-devel-5.14.21-150500.55.73.1', 'sp':'5', 'cpu':'aarch64', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-basesystem-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'kernel-64kb-devel-5.14.21-150500.55.73.1', 'sp':'5', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-basesystem-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'kernel-default-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-basesystem-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'kernel-default-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-basesystem-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8', 'sp':'5', 'cpu':'aarch64', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-basesystem-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8', 'sp':'5', 'cpu':'x86_64', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-basesystem-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8', 'sp':'5', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-basesystem-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8', 'sp':'5', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-basesystem-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'kernel-default-devel-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-basesystem-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'kernel-default-devel-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-basesystem-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'kernel-devel-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-basesystem-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'kernel-devel-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-basesystem-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'kernel-macros-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-basesystem-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'kernel-macros-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-basesystem-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'kernel-obs-build-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-development-tools-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'kernel-obs-build-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-development-tools-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'kernel-source-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-development-tools-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'kernel-source-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-development-tools-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'kernel-syms-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-development-tools-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'kernel-syms-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-development-tools-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'kernel-zfcpdump-5.14.21-150500.55.73.1', 'sp':'5', 'cpu':'s390x', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-basesystem-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'kernel-zfcpdump-5.14.21-150500.55.73.1', 'sp':'5', 'cpu':'s390x', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-basesystem-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'reiserfs-kmp-default-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.5', 'sle-module-legacy-release-15.5', 'sles-release-15.5']},
{'reference':'cluster-md-kmp-64kb-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'cluster-md-kmp-default-5.14.21-150500.55.73.1', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dlm-kmp-64kb-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dlm-kmp-default-5.14.21-150500.55.73.1', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dtb-allwinner-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dtb-altera-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dtb-amazon-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dtb-amd-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dtb-amlogic-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dtb-apm-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dtb-apple-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dtb-arm-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dtb-broadcom-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dtb-cavium-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dtb-exynos-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dtb-freescale-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dtb-hisilicon-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dtb-lg-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dtb-marvell-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dtb-mediatek-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dtb-nvidia-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dtb-qcom-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dtb-renesas-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dtb-rockchip-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dtb-socionext-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dtb-sprd-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'dtb-xilinx-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'gfs2-kmp-64kb-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'gfs2-kmp-default-5.14.21-150500.55.73.1', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-64kb-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-64kb-devel-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-64kb-extra-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-64kb-livepatch-devel-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-64kb-optional-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-debug-5.14.21-150500.55.73.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-debug-devel-5.14.21-150500.55.73.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-debug-livepatch-devel-5.14.21-150500.55.73.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-debug-vdso-5.14.21-150500.55.73.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-default-5.14.21-150500.55.73.1', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-default-base-rebuild-5.14.21-150500.55.73.1.150500.6.33.8', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-default-base-rebuild-5.14.21-150500.55.73.1.150500.6.33.8', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-default-devel-5.14.21-150500.55.73.1', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-default-extra-5.14.21-150500.55.73.1', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-default-livepatch-5.14.21-150500.55.73.1', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-default-livepatch-devel-5.14.21-150500.55.73.1', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-default-optional-5.14.21-150500.55.73.1', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-default-vdso-5.14.21-150500.55.73.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-devel-5.14.21-150500.55.73.1', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-kvmsmall-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-kvmsmall-5.14.21-150500.55.73.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-kvmsmall-devel-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-kvmsmall-devel-5.14.21-150500.55.73.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.73.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-kvmsmall-vdso-5.14.21-150500.55.73.1', 'cpu':'x86_64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-macros-5.14.21-150500.55.73.1', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-obs-build-5.14.21-150500.55.73.1', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-obs-qa-5.14.21-150500.55.73.1', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-source-5.14.21-150500.55.73.1', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-source-vanilla-5.14.21-150500.55.73.1', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-syms-5.14.21-150500.55.73.1', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kernel-zfcpdump-5.14.21-150500.55.73.1', 'cpu':'s390x', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kselftests-kmp-64kb-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'kselftests-kmp-default-5.14.21-150500.55.73.1', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'ocfs2-kmp-64kb-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'ocfs2-kmp-default-5.14.21-150500.55.73.1', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'reiserfs-kmp-64kb-5.14.21-150500.55.73.1', 'cpu':'aarch64', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'reiserfs-kmp-default-5.14.21-150500.55.73.1', 'release':'SUSE15.5', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.5']},
{'reference':'cluster-md-kmp-default-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-15.5']},
{'reference':'dlm-kmp-default-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-15.5']},
{'reference':'gfs2-kmp-default-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-15.5']},
{'reference':'ocfs2-kmp-default-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-15.5']},
{'reference':'kernel-default-livepatch-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-live-patching-release-15.5']},
{'reference':'kernel-default-livepatch-devel-5.14.21-150500.55.73.1', 'sp':'5', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-live-patching-release-15.5']},
{'reference':'kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1', 'sp':'5', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-live-patching-release-15.5']},
{'reference':'kernel-default-extra-5.14.21-150500.55.73.1', 'sp':'5', 'cpu':'x86_64', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-we-release-15.5', 'sled-release-15.5', 'sles-release-15.5']},
{'reference':'kernel-default-extra-5.14.21-150500.55.73.1', 'sp':'5', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-we-release-15.5', 'sled-release-15.5', 'sles-release-15.5']}
];
var ltss_caveat_required = FALSE;
var flag = 0;
foreach var package_array ( pkgs ) {
var reference = NULL;
var _release = NULL;
var sp = NULL;
var _cpu = NULL;
var exists_check = NULL;
var rpm_spec_vers_cmp = NULL;
if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
if (!empty_or_null(package_array['release'])) _release = package_array['release'];
if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];
if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];
if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];
if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
if (reference && _release) {
if (exists_check) {
var check_flag = 0;
foreach var check (exists_check) {
if (!rpm_exists(release:_release, rpm:check)) continue;
check_flag++;
}
if (!check_flag) continue;
}
if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;
}
}
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'cluster-md-kmp-64kb / cluster-md-kmp-default / dlm-kmp-64kb / etc');
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4439
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47086
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47089
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47103
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47186
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47432
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47515
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47534
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47538
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47539
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47546
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47547
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47555
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47566
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47571
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47572
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47576
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47577
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47578
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47580
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47582
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47583
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47584
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47585
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47586
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47587
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47588
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47589
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47590
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47591
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47592
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47593
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47595
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47596
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47597
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47598
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47599
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47600
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47601
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47602
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47603
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47604
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47605
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47606
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47607
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47608
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47609
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47610
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47611
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47612
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47614
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47615
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47616
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47617
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47618
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47619
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47620
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47622
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47623
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47624
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48711
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48712
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48713
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48714
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48715
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48716
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48717
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48718
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48720
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48721
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48722
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48723
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48724
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48725
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48726
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48727
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48728
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48729
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48730
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48732
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48733
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48734
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48735
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48736
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48737
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48738
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48739
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48740
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48743
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48744
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48745
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48746
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48747
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48748
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48749
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48751
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48752
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48753
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48754
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48755
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48756
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48758
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48759
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48760
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48761
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48763
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48765
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48766
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48767
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48768
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48769
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48770
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48771
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48772
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48773
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48774
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48775
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48776
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48777
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48778
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48780
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48783
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48784
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48785
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48786
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48787
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48788
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48789
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48790
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48791
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48792
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48793
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48794
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48796
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48797
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48798
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48799
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48800
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48801
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48802
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48803
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48804
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48805
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48806
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48807
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48809
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48810
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48811
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48812
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48813
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48814
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48815
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48816
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48817
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48818
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48820
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48821
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48822
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48823
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48824
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48825
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48826
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48827
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48828
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48829
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48830
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48831
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48834
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48835
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48836
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48837
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48838
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48839
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48840
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48841
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48842
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48843
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48844
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48846
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48847
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48849
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48850
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48851
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48852
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48853
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48855
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48856
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48857
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48858
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48859
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48860
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48861
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48862
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48863
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48864
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48866
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24023
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52573
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52580
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52658
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52667
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52670
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52672
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52675
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52735
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52737
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52751
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52752
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52762
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52766
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52775
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52784
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52787
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52800
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52812
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52835
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52837
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52843
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52845
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52846
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52857
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52863
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52869
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52881
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52882
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52884
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52885
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52886
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25741
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26583
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26584
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26633
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26661
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26720
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26800
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26802
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26842
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27015
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27402
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27432
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33619
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35247
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35789
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35790
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35805
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35807
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35814
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35819
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35835
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35837
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35848
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35853
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35855
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35857
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35861
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35862
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35864
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35869
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35878
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35884
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35886
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35889
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35890
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35893
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35896
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35898
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35899
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35900
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35905
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35925
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35934
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35949
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35950
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35956
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35958
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35960
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35961
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35962
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35979
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35995
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35997
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36000
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36004
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36005
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36008
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36017
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36020
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36021
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36025
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36288
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36477
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36478
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36479
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36889
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36890
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36894
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36899
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36900
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36901
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36902
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36904
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36909
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36910
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36911
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36912
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36913
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36914
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36915
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36916
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36917
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36919
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36923
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36934
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36937
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36939
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36940
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36945
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36946
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36949
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36960
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36964
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36965
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36967
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36969
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36974
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36975
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36978
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37021
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37078
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37354
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38381
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38388
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38390
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38540
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38541
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38544
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38545
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38546
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38547
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38548
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38549
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38550
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38552
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38553
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38555
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38556
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38557
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38558
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38559
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38560
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38564
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38565
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38567
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38568
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38570
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38571
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38573
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38578
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38579
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38580
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38581
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38582
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38583
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38586
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38587
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38588
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38590
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38591
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38594
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38597
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38598
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38599
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38600
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38601
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38603
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38605
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38608
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38616
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38618
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38619
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38621
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38627
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38628
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38630
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38633
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38634
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38635
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38659
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38661
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38780
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39276
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39301
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39371
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39463
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39468
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39469
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39471
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39472
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39475
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39482
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39487
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39488
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39490
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39493
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39494
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39497
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39499
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39500
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39501
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39502
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39505
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39506
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39507
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39508
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39509
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40900
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40901
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40902
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40903
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40904
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40906
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40908
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40909
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40911
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40912
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40916
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40919
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40923
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40924
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40927
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40929
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40931
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40932
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40934
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40935
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40937
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40940
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40941
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40942
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40943
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40945
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40953
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40954
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40956
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40958
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40959
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40960
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40961
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40966
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40967
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40970
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40972
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40976
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40977
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40981
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40982
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40984
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40987
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40988
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40989
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40990
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40994
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40998
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40999
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41002
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41004
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41006
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41009
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41011
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41012
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41013
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41014
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41015
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41016
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41017
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41040
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41041
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41048
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41057
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41058
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41059
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41063
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41064
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41066
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41069
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41070
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41071
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41072
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41076
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41078
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41081
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41087
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42070
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42079
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42093
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42096
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42105
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42122
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42124
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42145
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42161
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42224
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42230
www.nessus.org/u?7101909b
bugzilla.suse.com/1082555
bugzilla.suse.com/1156395
bugzilla.suse.com/1190336
bugzilla.suse.com/1191958
bugzilla.suse.com/1193454
bugzilla.suse.com/1193554
bugzilla.suse.com/1193787
bugzilla.suse.com/1193883
bugzilla.suse.com/1194324
bugzilla.suse.com/1194826
bugzilla.suse.com/1194869
bugzilla.suse.com/1195065
bugzilla.suse.com/1195254
bugzilla.suse.com/1195341
bugzilla.suse.com/1195349
bugzilla.suse.com/1195357
bugzilla.suse.com/1195668
bugzilla.suse.com/1195775
bugzilla.suse.com/1195927
bugzilla.suse.com/1195957
bugzilla.suse.com/1196018
bugzilla.suse.com/1196746
bugzilla.suse.com/1196823
bugzilla.suse.com/1197146
bugzilla.suse.com/1197246
bugzilla.suse.com/1197762
bugzilla.suse.com/1197915
bugzilla.suse.com/1198014
bugzilla.suse.com/1199295
bugzilla.suse.com/1202346
bugzilla.suse.com/1202686
bugzilla.suse.com/1202767
bugzilla.suse.com/1202780
bugzilla.suse.com/1205205
bugzilla.suse.com/1207361
bugzilla.suse.com/1208783
bugzilla.suse.com/1209636
bugzilla.suse.com/1213123
bugzilla.suse.com/1215492
bugzilla.suse.com/1215587
bugzilla.suse.com/1216834
bugzilla.suse.com/1217912
bugzilla.suse.com/1218148
bugzilla.suse.com/1218570
bugzilla.suse.com/1218820
bugzilla.suse.com/1219224
bugzilla.suse.com/1219633
bugzilla.suse.com/1219832
bugzilla.suse.com/1219847
bugzilla.suse.com/1220138
bugzilla.suse.com/1220185
bugzilla.suse.com/1220186
bugzilla.suse.com/1220368
bugzilla.suse.com/1220812
bugzilla.suse.com/1220869
bugzilla.suse.com/1220876
bugzilla.suse.com/1220942
bugzilla.suse.com/1220952
bugzilla.suse.com/1220958
bugzilla.suse.com/1221010
bugzilla.suse.com/1221086
bugzilla.suse.com/1221282
bugzilla.suse.com/1221647
bugzilla.suse.com/1221654
bugzilla.suse.com/1221656
bugzilla.suse.com/1221659
bugzilla.suse.com/1221958
bugzilla.suse.com/1222015
bugzilla.suse.com/1222072
bugzilla.suse.com/1222080
bugzilla.suse.com/1222241
bugzilla.suse.com/1222254
bugzilla.suse.com/1222323
bugzilla.suse.com/1222326
bugzilla.suse.com/1222328
bugzilla.suse.com/1222364
bugzilla.suse.com/1222625
bugzilla.suse.com/1222702
bugzilla.suse.com/1222728
bugzilla.suse.com/1222799
bugzilla.suse.com/1222809
bugzilla.suse.com/1222810
bugzilla.suse.com/1222893
bugzilla.suse.com/1223013
bugzilla.suse.com/1223018
bugzilla.suse.com/1223021
bugzilla.suse.com/1223180
bugzilla.suse.com/1223265
bugzilla.suse.com/1223384
bugzilla.suse.com/1223635
bugzilla.suse.com/1223641
bugzilla.suse.com/1223652
bugzilla.suse.com/1223675
bugzilla.suse.com/1223778
bugzilla.suse.com/1223806
bugzilla.suse.com/1223813
bugzilla.suse.com/1223815
bugzilla.suse.com/1223836
bugzilla.suse.com/1223863
bugzilla.suse.com/1224020
bugzilla.suse.com/1224331
bugzilla.suse.com/1224414
bugzilla.suse.com/1224488
bugzilla.suse.com/1224497
bugzilla.suse.com/1224498
bugzilla.suse.com/1224499
bugzilla.suse.com/1224500
bugzilla.suse.com/1224504
bugzilla.suse.com/1224512
bugzilla.suse.com/1224516
bugzilla.suse.com/1224517
bugzilla.suse.com/1224520
bugzilla.suse.com/1224539
bugzilla.suse.com/1224540
bugzilla.suse.com/1224545
bugzilla.suse.com/1224548
bugzilla.suse.com/1224552
bugzilla.suse.com/1224557
bugzilla.suse.com/1224572
bugzilla.suse.com/1224573
bugzilla.suse.com/1224583
bugzilla.suse.com/1224585
bugzilla.suse.com/1224588
bugzilla.suse.com/1224602
bugzilla.suse.com/1224603
bugzilla.suse.com/1224604
bugzilla.suse.com/1224605
bugzilla.suse.com/1224612
bugzilla.suse.com/1224614
bugzilla.suse.com/1224619
bugzilla.suse.com/1224636
bugzilla.suse.com/1224641
bugzilla.suse.com/1224661
bugzilla.suse.com/1224662
bugzilla.suse.com/1224670
bugzilla.suse.com/1224671
bugzilla.suse.com/1224674
bugzilla.suse.com/1224677
bugzilla.suse.com/1224679
bugzilla.suse.com/1224683
bugzilla.suse.com/1224694
bugzilla.suse.com/1224696
bugzilla.suse.com/1224700
bugzilla.suse.com/1224703
bugzilla.suse.com/1224712
bugzilla.suse.com/1224716
bugzilla.suse.com/1224719
bugzilla.suse.com/1224735
bugzilla.suse.com/1224743
bugzilla.suse.com/1224749
bugzilla.suse.com/1224764
bugzilla.suse.com/1224765
bugzilla.suse.com/1224766
bugzilla.suse.com/1224935
bugzilla.suse.com/1224946
bugzilla.suse.com/1224951
bugzilla.suse.com/1225050
bugzilla.suse.com/1225088
bugzilla.suse.com/1225098
bugzilla.suse.com/1225105
bugzilla.suse.com/1225272
bugzilla.suse.com/1225300
bugzilla.suse.com/1225389
bugzilla.suse.com/1225391
bugzilla.suse.com/1225419
bugzilla.suse.com/1225426
bugzilla.suse.com/1225448
bugzilla.suse.com/1225452
bugzilla.suse.com/1225467
bugzilla.suse.com/1225475
bugzilla.suse.com/1225484
bugzilla.suse.com/1225487
bugzilla.suse.com/1225489
bugzilla.suse.com/1225504
bugzilla.suse.com/1225505
bugzilla.suse.com/1225514
bugzilla.suse.com/1225518
bugzilla.suse.com/1225535
bugzilla.suse.com/1225564
bugzilla.suse.com/1225573
bugzilla.suse.com/1225581
bugzilla.suse.com/1225585
bugzilla.suse.com/1225586
bugzilla.suse.com/1225602
bugzilla.suse.com/1225611
bugzilla.suse.com/1225681
bugzilla.suse.com/1225692
bugzilla.suse.com/1225698
bugzilla.suse.com/1225699
bugzilla.suse.com/1225704
bugzilla.suse.com/1225711
bugzilla.suse.com/1225714
bugzilla.suse.com/1225717
bugzilla.suse.com/1225719
bugzilla.suse.com/1225726
bugzilla.suse.com/1225732
bugzilla.suse.com/1225737
bugzilla.suse.com/1225744
bugzilla.suse.com/1225745
bugzilla.suse.com/1225746
bugzilla.suse.com/1225749
bugzilla.suse.com/1225752
bugzilla.suse.com/1225753
bugzilla.suse.com/1225757
bugzilla.suse.com/1225758
bugzilla.suse.com/1225759
bugzilla.suse.com/1225760
bugzilla.suse.com/1225767
bugzilla.suse.com/1225770
bugzilla.suse.com/1225815
bugzilla.suse.com/1225823
bugzilla.suse.com/1225834
bugzilla.suse.com/1225838
bugzilla.suse.com/1225840
bugzilla.suse.com/1225851
bugzilla.suse.com/1225866
bugzilla.suse.com/1225872
bugzilla.suse.com/1225894
bugzilla.suse.com/1225903
bugzilla.suse.com/1226022
bugzilla.suse.com/1226131
bugzilla.suse.com/1226145
bugzilla.suse.com/1226149
bugzilla.suse.com/1226155
bugzilla.suse.com/1226202
bugzilla.suse.com/1226211
bugzilla.suse.com/1226212
bugzilla.suse.com/1226226
bugzilla.suse.com/1226502
bugzilla.suse.com/1226514
bugzilla.suse.com/1226519
bugzilla.suse.com/1226520
bugzilla.suse.com/1226537
bugzilla.suse.com/1226538
bugzilla.suse.com/1226539
bugzilla.suse.com/1226550
bugzilla.suse.com/1226551
bugzilla.suse.com/1226552
bugzilla.suse.com/1226553
bugzilla.suse.com/1226554
bugzilla.suse.com/1226555
bugzilla.suse.com/1226556
bugzilla.suse.com/1226557
bugzilla.suse.com/1226558
bugzilla.suse.com/1226559
bugzilla.suse.com/1226561
bugzilla.suse.com/1226562
bugzilla.suse.com/1226563
bugzilla.suse.com/1226564
bugzilla.suse.com/1226565
bugzilla.suse.com/1226566
bugzilla.suse.com/1226567
bugzilla.suse.com/1226568
bugzilla.suse.com/1226569
bugzilla.suse.com/1226570
bugzilla.suse.com/1226571
bugzilla.suse.com/1226572
bugzilla.suse.com/1226574
bugzilla.suse.com/1226575
bugzilla.suse.com/1226576
bugzilla.suse.com/1226577
bugzilla.suse.com/1226579
bugzilla.suse.com/1226580
bugzilla.suse.com/1226581
bugzilla.suse.com/1226582
bugzilla.suse.com/1226583
bugzilla.suse.com/1226585
bugzilla.suse.com/1226587
bugzilla.suse.com/1226588
bugzilla.suse.com/1226593
bugzilla.suse.com/1226595
bugzilla.suse.com/1226597
bugzilla.suse.com/1226601
bugzilla.suse.com/1226602
bugzilla.suse.com/1226603
bugzilla.suse.com/1226607
bugzilla.suse.com/1226610
bugzilla.suse.com/1226614
bugzilla.suse.com/1226616
bugzilla.suse.com/1226617
bugzilla.suse.com/1226618
bugzilla.suse.com/1226619
bugzilla.suse.com/1226621
bugzilla.suse.com/1226622
bugzilla.suse.com/1226624
bugzilla.suse.com/1226626
bugzilla.suse.com/1226628
bugzilla.suse.com/1226629
bugzilla.suse.com/1226632
bugzilla.suse.com/1226633
bugzilla.suse.com/1226634
bugzilla.suse.com/1226637
bugzilla.suse.com/1226643
bugzilla.suse.com/1226644
bugzilla.suse.com/1226645
bugzilla.suse.com/1226647
bugzilla.suse.com/1226650
bugzilla.suse.com/1226653
bugzilla.suse.com/1226657
bugzilla.suse.com/1226658
bugzilla.suse.com/1226669
bugzilla.suse.com/1226670
bugzilla.suse.com/1226672
bugzilla.suse.com/1226673
bugzilla.suse.com/1226674
bugzilla.suse.com/1226675
bugzilla.suse.com/1226678
bugzilla.suse.com/1226679
bugzilla.suse.com/1226683
bugzilla.suse.com/1226685
bugzilla.suse.com/1226686
bugzilla.suse.com/1226690
bugzilla.suse.com/1226691
bugzilla.suse.com/1226692
bugzilla.suse.com/1226693
bugzilla.suse.com/1226696
bugzilla.suse.com/1226697
bugzilla.suse.com/1226698
bugzilla.suse.com/1226699
bugzilla.suse.com/1226701
bugzilla.suse.com/1226702
bugzilla.suse.com/1226703
bugzilla.suse.com/1226704
bugzilla.suse.com/1226705
bugzilla.suse.com/1226706
bugzilla.suse.com/1226708
bugzilla.suse.com/1226709
bugzilla.suse.com/1226710
bugzilla.suse.com/1226711
bugzilla.suse.com/1226712
bugzilla.suse.com/1226713
bugzilla.suse.com/1226715
bugzilla.suse.com/1226716
bugzilla.suse.com/1226718
bugzilla.suse.com/1226719
bugzilla.suse.com/1226720
bugzilla.suse.com/1226721
bugzilla.suse.com/1226730
bugzilla.suse.com/1226732
bugzilla.suse.com/1226734
bugzilla.suse.com/1226735
bugzilla.suse.com/1226737
bugzilla.suse.com/1226738
bugzilla.suse.com/1226739
bugzilla.suse.com/1226740
bugzilla.suse.com/1226744
bugzilla.suse.com/1226746
bugzilla.suse.com/1226747
bugzilla.suse.com/1226749
bugzilla.suse.com/1226750
bugzilla.suse.com/1226754
bugzilla.suse.com/1226757
bugzilla.suse.com/1226762
bugzilla.suse.com/1226764
bugzilla.suse.com/1226767
bugzilla.suse.com/1226768
bugzilla.suse.com/1226769
bugzilla.suse.com/1226771
bugzilla.suse.com/1226774
bugzilla.suse.com/1226775
bugzilla.suse.com/1226777
bugzilla.suse.com/1226780
bugzilla.suse.com/1226781
bugzilla.suse.com/1226783
bugzilla.suse.com/1226785
bugzilla.suse.com/1226786
bugzilla.suse.com/1226789
bugzilla.suse.com/1226791
bugzilla.suse.com/1226834
bugzilla.suse.com/1226837
bugzilla.suse.com/1226839
bugzilla.suse.com/1226840
bugzilla.suse.com/1226841
bugzilla.suse.com/1226842
bugzilla.suse.com/1226848
bugzilla.suse.com/1226852
bugzilla.suse.com/1226857
bugzilla.suse.com/1226861
bugzilla.suse.com/1226863
bugzilla.suse.com/1226864
bugzilla.suse.com/1226867
bugzilla.suse.com/1226868
bugzilla.suse.com/1226876
bugzilla.suse.com/1226878
bugzilla.suse.com/1226883
bugzilla.suse.com/1226886
bugzilla.suse.com/1226890
bugzilla.suse.com/1226891
bugzilla.suse.com/1226895
bugzilla.suse.com/1226908
bugzilla.suse.com/1226911
bugzilla.suse.com/1226915
bugzilla.suse.com/1226928
bugzilla.suse.com/1226948
bugzilla.suse.com/1226949
bugzilla.suse.com/1226950
bugzilla.suse.com/1226953
bugzilla.suse.com/1226962
bugzilla.suse.com/1226976
bugzilla.suse.com/1226990
bugzilla.suse.com/1226992
bugzilla.suse.com/1226993
bugzilla.suse.com/1226994
bugzilla.suse.com/1226996
bugzilla.suse.com/1227066
bugzilla.suse.com/1227090
bugzilla.suse.com/1227096
bugzilla.suse.com/1227101
bugzilla.suse.com/1227103
bugzilla.suse.com/1227121
bugzilla.suse.com/1227157
bugzilla.suse.com/1227162
bugzilla.suse.com/1227274
bugzilla.suse.com/1227362
bugzilla.suse.com/1227383
bugzilla.suse.com/1227432
bugzilla.suse.com/1227435
bugzilla.suse.com/1227447
bugzilla.suse.com/1227487
bugzilla.suse.com/1227573
bugzilla.suse.com/1227618
bugzilla.suse.com/1227620
bugzilla.suse.com/1227626
bugzilla.suse.com/1227635
bugzilla.suse.com/1227661
bugzilla.suse.com/1227716
bugzilla.suse.com/1227722
bugzilla.suse.com/1227724
bugzilla.suse.com/1227725
bugzilla.suse.com/1227728
bugzilla.suse.com/1227729
bugzilla.suse.com/1227730
bugzilla.suse.com/1227732
bugzilla.suse.com/1227733
bugzilla.suse.com/1227750
bugzilla.suse.com/1227754
bugzilla.suse.com/1227755
bugzilla.suse.com/1227760
bugzilla.suse.com/1227762
bugzilla.suse.com/1227763
bugzilla.suse.com/1227764
bugzilla.suse.com/1227766
bugzilla.suse.com/1227770
bugzilla.suse.com/1227771
bugzilla.suse.com/1227772
bugzilla.suse.com/1227774
bugzilla.suse.com/1227779
bugzilla.suse.com/1227780
bugzilla.suse.com/1227783
bugzilla.suse.com/1227786
bugzilla.suse.com/1227787
bugzilla.suse.com/1227790
bugzilla.suse.com/1227792
bugzilla.suse.com/1227796
bugzilla.suse.com/1227797
bugzilla.suse.com/1227798
bugzilla.suse.com/1227800
bugzilla.suse.com/1227802
bugzilla.suse.com/1227806
bugzilla.suse.com/1227808
bugzilla.suse.com/1227810
bugzilla.suse.com/1227812
bugzilla.suse.com/1227813
bugzilla.suse.com/1227814
bugzilla.suse.com/1227816
bugzilla.suse.com/1227820
bugzilla.suse.com/1227823
bugzilla.suse.com/1227824
bugzilla.suse.com/1227828
bugzilla.suse.com/1227829
bugzilla.suse.com/1227836
bugzilla.suse.com/1227846
bugzilla.suse.com/1227849
bugzilla.suse.com/1227851
bugzilla.suse.com/1227862
bugzilla.suse.com/1227864
bugzilla.suse.com/1227865
bugzilla.suse.com/1227866
bugzilla.suse.com/1227870
bugzilla.suse.com/1227884
bugzilla.suse.com/1227886
bugzilla.suse.com/1227891
bugzilla.suse.com/1227893
bugzilla.suse.com/1227899
bugzilla.suse.com/1227900
bugzilla.suse.com/1227910
bugzilla.suse.com/1227913
bugzilla.suse.com/1227917
bugzilla.suse.com/1227919
bugzilla.suse.com/1227920
bugzilla.suse.com/1227921
bugzilla.suse.com/1227922
bugzilla.suse.com/1227923
bugzilla.suse.com/1227924
bugzilla.suse.com/1227925
bugzilla.suse.com/1227927
bugzilla.suse.com/1227928
bugzilla.suse.com/1227931
bugzilla.suse.com/1227932
bugzilla.suse.com/1227933
bugzilla.suse.com/1227935
bugzilla.suse.com/1227936
bugzilla.suse.com/1227938
bugzilla.suse.com/1227941
bugzilla.suse.com/1227942
bugzilla.suse.com/1227944
bugzilla.suse.com/1227945
bugzilla.suse.com/1227947
bugzilla.suse.com/1227948
bugzilla.suse.com/1227949
bugzilla.suse.com/1227950
bugzilla.suse.com/1227952
bugzilla.suse.com/1227953
bugzilla.suse.com/1227954
bugzilla.suse.com/1227956
bugzilla.suse.com/1227957
bugzilla.suse.com/1227963
bugzilla.suse.com/1227964
bugzilla.suse.com/1227965
bugzilla.suse.com/1227968
bugzilla.suse.com/1227969
bugzilla.suse.com/1227970
bugzilla.suse.com/1227971
bugzilla.suse.com/1227972
bugzilla.suse.com/1227975
bugzilla.suse.com/1227976
bugzilla.suse.com/1227981
bugzilla.suse.com/1227982
bugzilla.suse.com/1227985
bugzilla.suse.com/1227986
bugzilla.suse.com/1227987
bugzilla.suse.com/1227988
bugzilla.suse.com/1227989
bugzilla.suse.com/1227990
bugzilla.suse.com/1227991
bugzilla.suse.com/1227992
bugzilla.suse.com/1227993
bugzilla.suse.com/1227995
bugzilla.suse.com/1227996
bugzilla.suse.com/1227997
bugzilla.suse.com/1228000
bugzilla.suse.com/1228002
bugzilla.suse.com/1228003
bugzilla.suse.com/1228004
bugzilla.suse.com/1228005
bugzilla.suse.com/1228006
bugzilla.suse.com/1228007
bugzilla.suse.com/1228008
bugzilla.suse.com/1228009
bugzilla.suse.com/1228010
bugzilla.suse.com/1228011
bugzilla.suse.com/1228013
bugzilla.suse.com/1228014
bugzilla.suse.com/1228015
bugzilla.suse.com/1228019
bugzilla.suse.com/1228020
bugzilla.suse.com/1228025
bugzilla.suse.com/1228028
bugzilla.suse.com/1228035
bugzilla.suse.com/1228037
bugzilla.suse.com/1228038
bugzilla.suse.com/1228039
bugzilla.suse.com/1228040
bugzilla.suse.com/1228045
bugzilla.suse.com/1228054
bugzilla.suse.com/1228055
bugzilla.suse.com/1228056
bugzilla.suse.com/1228060
bugzilla.suse.com/1228061
bugzilla.suse.com/1228062
bugzilla.suse.com/1228063
bugzilla.suse.com/1228064
bugzilla.suse.com/1228066
bugzilla.suse.com/1228067
bugzilla.suse.com/1228068
bugzilla.suse.com/1228071
bugzilla.suse.com/1228079
bugzilla.suse.com/1228090
bugzilla.suse.com/1228114
bugzilla.suse.com/1228140
bugzilla.suse.com/1228190
bugzilla.suse.com/1228191
bugzilla.suse.com/1228226
bugzilla.suse.com/1228235
bugzilla.suse.com/1228247
bugzilla.suse.com/1228327
bugzilla.suse.com/1228328
bugzilla.suse.com/1228330
bugzilla.suse.com/1228403
bugzilla.suse.com/1228405
bugzilla.suse.com/1228408
bugzilla.suse.com/1228409
bugzilla.suse.com/1228410
bugzilla.suse.com/1228418
bugzilla.suse.com/1228459
bugzilla.suse.com/1228462
bugzilla.suse.com/1228470
bugzilla.suse.com/1228518
bugzilla.suse.com/1228520
bugzilla.suse.com/1228530
bugzilla.suse.com/1228561
bugzilla.suse.com/1228565
bugzilla.suse.com/1228580
bugzilla.suse.com/1228581
bugzilla.suse.com/1228591
bugzilla.suse.com/1228599
bugzilla.suse.com/1228617
bugzilla.suse.com/1228625
bugzilla.suse.com/1228626
bugzilla.suse.com/1228633
bugzilla.suse.com/1228640
bugzilla.suse.com/1228644
bugzilla.suse.com/1228649
bugzilla.suse.com/1228655
bugzilla.suse.com/1228665
bugzilla.suse.com/1228672
bugzilla.suse.com/1228680
bugzilla.suse.com/1228705
bugzilla.suse.com/1228723
bugzilla.suse.com/1228743
bugzilla.suse.com/1228756
bugzilla.suse.com/1228801
bugzilla.suse.com/1228850
bugzilla.suse.com/1228857
www.suse.com/security/cve/CVE-2021-4439
www.suse.com/security/cve/CVE-2021-47086
www.suse.com/security/cve/CVE-2021-47089
www.suse.com/security/cve/CVE-2021-47103
www.suse.com/security/cve/CVE-2021-47186
www.suse.com/security/cve/CVE-2021-47432
www.suse.com/security/cve/CVE-2021-47515
www.suse.com/security/cve/CVE-2021-47534
www.suse.com/security/cve/CVE-2021-47538
www.suse.com/security/cve/CVE-2021-47539
www.suse.com/security/cve/CVE-2021-47546
www.suse.com/security/cve/CVE-2021-47547
www.suse.com/security/cve/CVE-2021-47555
www.suse.com/security/cve/CVE-2021-47566
www.suse.com/security/cve/CVE-2021-47571
www.suse.com/security/cve/CVE-2021-47572
www.suse.com/security/cve/CVE-2021-47576
www.suse.com/security/cve/CVE-2021-47577
www.suse.com/security/cve/CVE-2021-47578
www.suse.com/security/cve/CVE-2021-47580
www.suse.com/security/cve/CVE-2021-47582
www.suse.com/security/cve/CVE-2021-47583
www.suse.com/security/cve/CVE-2021-47584
www.suse.com/security/cve/CVE-2021-47585
www.suse.com/security/cve/CVE-2021-47586
www.suse.com/security/cve/CVE-2021-47587
www.suse.com/security/cve/CVE-2021-47588
www.suse.com/security/cve/CVE-2021-47589
www.suse.com/security/cve/CVE-2021-47590
www.suse.com/security/cve/CVE-2021-47591
www.suse.com/security/cve/CVE-2021-47592
www.suse.com/security/cve/CVE-2021-47593
www.suse.com/security/cve/CVE-2021-47595
www.suse.com/security/cve/CVE-2021-47596
www.suse.com/security/cve/CVE-2021-47597
www.suse.com/security/cve/CVE-2021-47598
www.suse.com/security/cve/CVE-2021-47599
www.suse.com/security/cve/CVE-2021-47600
www.suse.com/security/cve/CVE-2021-47601
www.suse.com/security/cve/CVE-2021-47602
www.suse.com/security/cve/CVE-2021-47603
www.suse.com/security/cve/CVE-2021-47604
www.suse.com/security/cve/CVE-2021-47605
www.suse.com/security/cve/CVE-2021-47606
www.suse.com/security/cve/CVE-2021-47607
www.suse.com/security/cve/CVE-2021-47608
www.suse.com/security/cve/CVE-2021-47609
www.suse.com/security/cve/CVE-2021-47610
www.suse.com/security/cve/CVE-2021-47611
www.suse.com/security/cve/CVE-2021-47612
www.suse.com/security/cve/CVE-2021-47614
www.suse.com/security/cve/CVE-2021-47615
www.suse.com/security/cve/CVE-2021-47616
www.suse.com/security/cve/CVE-2021-47617
www.suse.com/security/cve/CVE-2021-47618
www.suse.com/security/cve/CVE-2021-47619
www.suse.com/security/cve/CVE-2021-47620
www.suse.com/security/cve/CVE-2021-47622
www.suse.com/security/cve/CVE-2021-47623
www.suse.com/security/cve/CVE-2021-47624
www.suse.com/security/cve/CVE-2022-48711
www.suse.com/security/cve/CVE-2022-48712
www.suse.com/security/cve/CVE-2022-48713
www.suse.com/security/cve/CVE-2022-48714
www.suse.com/security/cve/CVE-2022-48715
www.suse.com/security/cve/CVE-2022-48716
www.suse.com/security/cve/CVE-2022-48717
www.suse.com/security/cve/CVE-2022-48718
www.suse.com/security/cve/CVE-2022-48720
www.suse.com/security/cve/CVE-2022-48721
www.suse.com/security/cve/CVE-2022-48722
www.suse.com/security/cve/CVE-2022-48723
www.suse.com/security/cve/CVE-2022-48724
www.suse.com/security/cve/CVE-2022-48725
www.suse.com/security/cve/CVE-2022-48726
www.suse.com/security/cve/CVE-2022-48727
www.suse.com/security/cve/CVE-2022-48728
www.suse.com/security/cve/CVE-2022-48729
www.suse.com/security/cve/CVE-2022-48730
www.suse.com/security/cve/CVE-2022-48732
www.suse.com/security/cve/CVE-2022-48733
www.suse.com/security/cve/CVE-2022-48734
www.suse.com/security/cve/CVE-2022-48735
www.suse.com/security/cve/CVE-2022-48736
www.suse.com/security/cve/CVE-2022-48737
www.suse.com/security/cve/CVE-2022-48738
www.suse.com/security/cve/CVE-2022-48739
www.suse.com/security/cve/CVE-2022-48740
www.suse.com/security/cve/CVE-2022-48743
www.suse.com/security/cve/CVE-2022-48744
www.suse.com/security/cve/CVE-2022-48745
www.suse.com/security/cve/CVE-2022-48746
www.suse.com/security/cve/CVE-2022-48747
www.suse.com/security/cve/CVE-2022-48748
www.suse.com/security/cve/CVE-2022-48749
www.suse.com/security/cve/CVE-2022-48751
www.suse.com/security/cve/CVE-2022-48752
www.suse.com/security/cve/CVE-2022-48753
www.suse.com/security/cve/CVE-2022-48754
www.suse.com/security/cve/CVE-2022-48755
www.suse.com/security/cve/CVE-2022-48756
www.suse.com/security/cve/CVE-2022-48758
www.suse.com/security/cve/CVE-2022-48759
www.suse.com/security/cve/CVE-2022-48760
www.suse.com/security/cve/CVE-2022-48761
www.suse.com/security/cve/CVE-2022-48763
www.suse.com/security/cve/CVE-2022-48765
www.suse.com/security/cve/CVE-2022-48766
www.suse.com/security/cve/CVE-2022-48767
www.suse.com/security/cve/CVE-2022-48768
www.suse.com/security/cve/CVE-2022-48769
www.suse.com/security/cve/CVE-2022-48770
www.suse.com/security/cve/CVE-2022-48771
www.suse.com/security/cve/CVE-2022-48772
www.suse.com/security/cve/CVE-2022-48773
www.suse.com/security/cve/CVE-2022-48774
www.suse.com/security/cve/CVE-2022-48775
www.suse.com/security/cve/CVE-2022-48776
www.suse.com/security/cve/CVE-2022-48777
www.suse.com/security/cve/CVE-2022-48778
www.suse.com/security/cve/CVE-2022-48780
www.suse.com/security/cve/CVE-2022-48783
www.suse.com/security/cve/CVE-2022-48784
www.suse.com/security/cve/CVE-2022-48785
www.suse.com/security/cve/CVE-2022-48786
www.suse.com/security/cve/CVE-2022-48787
www.suse.com/security/cve/CVE-2022-48788
www.suse.com/security/cve/CVE-2022-48789
www.suse.com/security/cve/CVE-2022-48790
www.suse.com/security/cve/CVE-2022-48791
www.suse.com/security/cve/CVE-2022-48792
www.suse.com/security/cve/CVE-2022-48793
www.suse.com/security/cve/CVE-2022-48794
www.suse.com/security/cve/CVE-2022-48796
www.suse.com/security/cve/CVE-2022-48797
www.suse.com/security/cve/CVE-2022-48798
www.suse.com/security/cve/CVE-2022-48799
www.suse.com/security/cve/CVE-2022-48800
www.suse.com/security/cve/CVE-2022-48801
www.suse.com/security/cve/CVE-2022-48802
www.suse.com/security/cve/CVE-2022-48803
www.suse.com/security/cve/CVE-2022-48804
www.suse.com/security/cve/CVE-2022-48805
www.suse.com/security/cve/CVE-2022-48806
www.suse.com/security/cve/CVE-2022-48807
www.suse.com/security/cve/CVE-2022-48809
www.suse.com/security/cve/CVE-2022-48810
www.suse.com/security/cve/CVE-2022-48811
www.suse.com/security/cve/CVE-2022-48812
www.suse.com/security/cve/CVE-2022-48813
www.suse.com/security/cve/CVE-2022-48814
www.suse.com/security/cve/CVE-2022-48815
www.suse.com/security/cve/CVE-2022-48816
www.suse.com/security/cve/CVE-2022-48817
www.suse.com/security/cve/CVE-2022-48818
www.suse.com/security/cve/CVE-2022-48820
www.suse.com/security/cve/CVE-2022-48821
www.suse.com/security/cve/CVE-2022-48822
www.suse.com/security/cve/CVE-2022-48823
www.suse.com/security/cve/CVE-2022-48824
www.suse.com/security/cve/CVE-2022-48825
www.suse.com/security/cve/CVE-2022-48826
www.suse.com/security/cve/CVE-2022-48827
www.suse.com/security/cve/CVE-2022-48828
www.suse.com/security/cve/CVE-2022-48829
www.suse.com/security/cve/CVE-2022-48830
www.suse.com/security/cve/CVE-2022-48831
www.suse.com/security/cve/CVE-2022-48834
www.suse.com/security/cve/CVE-2022-48835
www.suse.com/security/cve/CVE-2022-48836
www.suse.com/security/cve/CVE-2022-48837
www.suse.com/security/cve/CVE-2022-48838
www.suse.com/security/cve/CVE-2022-48839
www.suse.com/security/cve/CVE-2022-48840
www.suse.com/security/cve/CVE-2022-48841
www.suse.com/security/cve/CVE-2022-48842
www.suse.com/security/cve/CVE-2022-48843
www.suse.com/security/cve/CVE-2022-48844
www.suse.com/security/cve/CVE-2022-48846
www.suse.com/security/cve/CVE-2022-48847
www.suse.com/security/cve/CVE-2022-48849
www.suse.com/security/cve/CVE-2022-48850
www.suse.com/security/cve/CVE-2022-48851
www.suse.com/security/cve/CVE-2022-48852
www.suse.com/security/cve/CVE-2022-48853
www.suse.com/security/cve/CVE-2022-48855
www.suse.com/security/cve/CVE-2022-48856
www.suse.com/security/cve/CVE-2022-48857
www.suse.com/security/cve/CVE-2022-48858
www.suse.com/security/cve/CVE-2022-48859
www.suse.com/security/cve/CVE-2022-48860
www.suse.com/security/cve/CVE-2022-48861
www.suse.com/security/cve/CVE-2022-48862
www.suse.com/security/cve/CVE-2022-48863
www.suse.com/security/cve/CVE-2022-48864
www.suse.com/security/cve/CVE-2022-48866
www.suse.com/security/cve/CVE-2023-24023
www.suse.com/security/cve/CVE-2023-52435
www.suse.com/security/cve/CVE-2023-52573
www.suse.com/security/cve/CVE-2023-52580
www.suse.com/security/cve/CVE-2023-52622
www.suse.com/security/cve/CVE-2023-52658
www.suse.com/security/cve/CVE-2023-52667
www.suse.com/security/cve/CVE-2023-52670
www.suse.com/security/cve/CVE-2023-52672
www.suse.com/security/cve/CVE-2023-52675
www.suse.com/security/cve/CVE-2023-52735
www.suse.com/security/cve/CVE-2023-52737
www.suse.com/security/cve/CVE-2023-52751
www.suse.com/security/cve/CVE-2023-52752
www.suse.com/security/cve/CVE-2023-52762
www.suse.com/security/cve/CVE-2023-52766
www.suse.com/security/cve/CVE-2023-52775
www.suse.com/security/cve/CVE-2023-52784
www.suse.com/security/cve/CVE-2023-52787
www.suse.com/security/cve/CVE-2023-52800
www.suse.com/security/cve/CVE-2023-52812
www.suse.com/security/cve/CVE-2023-52835
www.suse.com/security/cve/CVE-2023-52837
www.suse.com/security/cve/CVE-2023-52843
www.suse.com/security/cve/CVE-2023-52845
www.suse.com/security/cve/CVE-2023-52846
www.suse.com/security/cve/CVE-2023-52857
www.suse.com/security/cve/CVE-2023-52863
www.suse.com/security/cve/CVE-2023-52869
www.suse.com/security/cve/CVE-2023-52881
www.suse.com/security/cve/CVE-2023-52882
www.suse.com/security/cve/CVE-2023-52884
www.suse.com/security/cve/CVE-2023-52885
www.suse.com/security/cve/CVE-2023-52886
www.suse.com/security/cve/CVE-2024-25741
www.suse.com/security/cve/CVE-2024-26583
www.suse.com/security/cve/CVE-2024-26584
www.suse.com/security/cve/CVE-2024-26615
www.suse.com/security/cve/CVE-2024-26625
www.suse.com/security/cve/CVE-2024-26633
www.suse.com/security/cve/CVE-2024-26635
www.suse.com/security/cve/CVE-2024-26636
www.suse.com/security/cve/CVE-2024-26641
www.suse.com/security/cve/CVE-2024-26644
www.suse.com/security/cve/CVE-2024-26661
www.suse.com/security/cve/CVE-2024-26663
www.suse.com/security/cve/CVE-2024-26665
www.suse.com/security/cve/CVE-2024-26720
www.suse.com/security/cve/CVE-2024-26800
www.suse.com/security/cve/CVE-2024-26802
www.suse.com/security/cve/CVE-2024-26813
www.suse.com/security/cve/CVE-2024-26814
www.suse.com/security/cve/CVE-2024-26842
www.suse.com/security/cve/CVE-2024-26845
www.suse.com/security/cve/CVE-2024-26863
www.suse.com/security/cve/CVE-2024-26923
www.suse.com/security/cve/CVE-2024-26935
www.suse.com/security/cve/CVE-2024-26961
www.suse.com/security/cve/CVE-2024-26973
www.suse.com/security/cve/CVE-2024-26976
www.suse.com/security/cve/CVE-2024-27015
www.suse.com/security/cve/CVE-2024-27019
www.suse.com/security/cve/CVE-2024-27020
www.suse.com/security/cve/CVE-2024-27025
www.suse.com/security/cve/CVE-2024-27065
www.suse.com/security/cve/CVE-2024-27402
www.suse.com/security/cve/CVE-2024-27432
www.suse.com/security/cve/CVE-2024-27437
www.suse.com/security/cve/CVE-2024-33619
www.suse.com/security/cve/CVE-2024-35247
www.suse.com/security/cve/CVE-2024-35789
www.suse.com/security/cve/CVE-2024-35790
www.suse.com/security/cve/CVE-2024-35805
www.suse.com/security/cve/CVE-2024-35807
www.suse.com/security/cve/CVE-2024-35814
www.suse.com/security/cve/CVE-2024-35819
www.suse.com/security/cve/CVE-2024-35835
www.suse.com/security/cve/CVE-2024-35837
www.suse.com/security/cve/CVE-2024-35848
www.suse.com/security/cve/CVE-2024-35853
www.suse.com/security/cve/CVE-2024-35855
www.suse.com/security/cve/CVE-2024-35857
www.suse.com/security/cve/CVE-2024-35861
www.suse.com/security/cve/CVE-2024-35862
www.suse.com/security/cve/CVE-2024-35864
www.suse.com/security/cve/CVE-2024-35869
www.suse.com/security/cve/CVE-2024-35878
www.suse.com/security/cve/CVE-2024-35884
www.suse.com/security/cve/CVE-2024-35886
www.suse.com/security/cve/CVE-2024-35889
www.suse.com/security/cve/CVE-2024-35890
www.suse.com/security/cve/CVE-2024-35893
www.suse.com/security/cve/CVE-2024-35896
www.suse.com/security/cve/CVE-2024-35898
www.suse.com/security/cve/CVE-2024-35899
www.suse.com/security/cve/CVE-2024-35900
www.suse.com/security/cve/CVE-2024-35905
www.suse.com/security/cve/CVE-2024-35925
www.suse.com/security/cve/CVE-2024-35934
www.suse.com/security/cve/CVE-2024-35949
www.suse.com/security/cve/CVE-2024-35950
www.suse.com/security/cve/CVE-2024-35956
www.suse.com/security/cve/CVE-2024-35958
www.suse.com/security/cve/CVE-2024-35960
www.suse.com/security/cve/CVE-2024-35961
www.suse.com/security/cve/CVE-2024-35962
www.suse.com/security/cve/CVE-2024-35979
www.suse.com/security/cve/CVE-2024-35995
www.suse.com/security/cve/CVE-2024-35997
www.suse.com/security/cve/CVE-2024-36000
www.suse.com/security/cve/CVE-2024-36004
www.suse.com/security/cve/CVE-2024-36005
www.suse.com/security/cve/CVE-2024-36008
www.suse.com/security/cve/CVE-2024-36017
www.suse.com/security/cve/CVE-2024-36020
www.suse.com/security/cve/CVE-2024-36021
www.suse.com/security/cve/CVE-2024-36025
www.suse.com/security/cve/CVE-2024-36288
www.suse.com/security/cve/CVE-2024-36477
www.suse.com/security/cve/CVE-2024-36478
www.suse.com/security/cve/CVE-2024-36479
www.suse.com/security/cve/CVE-2024-36889
www.suse.com/security/cve/CVE-2024-36890
www.suse.com/security/cve/CVE-2024-36894
www.suse.com/security/cve/CVE-2024-36899
www.suse.com/security/cve/CVE-2024-36900
www.suse.com/security/cve/CVE-2024-36901
www.suse.com/security/cve/CVE-2024-36902
www.suse.com/security/cve/CVE-2024-36904
www.suse.com/security/cve/CVE-2024-36909
www.suse.com/security/cve/CVE-2024-36910
www.suse.com/security/cve/CVE-2024-36911
www.suse.com/security/cve/CVE-2024-36912
www.suse.com/security/cve/CVE-2024-36913
www.suse.com/security/cve/CVE-2024-36914
www.suse.com/security/cve/CVE-2024-36915
www.suse.com/security/cve/CVE-2024-36916
www.suse.com/security/cve/CVE-2024-36917
www.suse.com/security/cve/CVE-2024-36919
www.suse.com/security/cve/CVE-2024-36923
www.suse.com/security/cve/CVE-2024-36934
www.suse.com/security/cve/CVE-2024-36937
www.suse.com/security/cve/CVE-2024-36939
www.suse.com/security/cve/CVE-2024-36940
www.suse.com/security/cve/CVE-2024-36945
www.suse.com/security/cve/CVE-2024-36946
www.suse.com/security/cve/CVE-2024-36949
www.suse.com/security/cve/CVE-2024-36960
www.suse.com/security/cve/CVE-2024-36964
www.suse.com/security/cve/CVE-2024-36965
www.suse.com/security/cve/CVE-2024-36967
www.suse.com/security/cve/CVE-2024-36969
www.suse.com/security/cve/CVE-2024-36971
www.suse.com/security/cve/CVE-2024-36974
www.suse.com/security/cve/CVE-2024-36975
www.suse.com/security/cve/CVE-2024-36978
www.suse.com/security/cve/CVE-2024-37021
www.suse.com/security/cve/CVE-2024-37078
www.suse.com/security/cve/CVE-2024-37354
www.suse.com/security/cve/CVE-2024-38381
www.suse.com/security/cve/CVE-2024-38388
www.suse.com/security/cve/CVE-2024-38390
www.suse.com/security/cve/CVE-2024-38540
www.suse.com/security/cve/CVE-2024-38541
www.suse.com/security/cve/CVE-2024-38544
www.suse.com/security/cve/CVE-2024-38545
www.suse.com/security/cve/CVE-2024-38546
www.suse.com/security/cve/CVE-2024-38547
www.suse.com/security/cve/CVE-2024-38548
www.suse.com/security/cve/CVE-2024-38549
www.suse.com/security/cve/CVE-2024-38550
www.suse.com/security/cve/CVE-2024-38552
www.suse.com/security/cve/CVE-2024-38553
www.suse.com/security/cve/CVE-2024-38555
www.suse.com/security/cve/CVE-2024-38556
www.suse.com/security/cve/CVE-2024-38557
www.suse.com/security/cve/CVE-2024-38558
www.suse.com/security/cve/CVE-2024-38559
www.suse.com/security/cve/CVE-2024-38560
www.suse.com/security/cve/CVE-2024-38564
www.suse.com/security/cve/CVE-2024-38565
www.suse.com/security/cve/CVE-2024-38567
www.suse.com/security/cve/CVE-2024-38568
www.suse.com/security/cve/CVE-2024-38570
www.suse.com/security/cve/CVE-2024-38571
www.suse.com/security/cve/CVE-2024-38573
www.suse.com/security/cve/CVE-2024-38578
www.suse.com/security/cve/CVE-2024-38579
www.suse.com/security/cve/CVE-2024-38580
www.suse.com/security/cve/CVE-2024-38581
www.suse.com/security/cve/CVE-2024-38582
www.suse.com/security/cve/CVE-2024-38583
www.suse.com/security/cve/CVE-2024-38586
www.suse.com/security/cve/CVE-2024-38587
www.suse.com/security/cve/CVE-2024-38588
www.suse.com/security/cve/CVE-2024-38590
www.suse.com/security/cve/CVE-2024-38591
www.suse.com/security/cve/CVE-2024-38594
www.suse.com/security/cve/CVE-2024-38597
www.suse.com/security/cve/CVE-2024-38598
www.suse.com/security/cve/CVE-2024-38599
www.suse.com/security/cve/CVE-2024-38600
www.suse.com/security/cve/CVE-2024-38601
www.suse.com/security/cve/CVE-2024-38603
www.suse.com/security/cve/CVE-2024-38605
www.suse.com/security/cve/CVE-2024-38608
www.suse.com/security/cve/CVE-2024-38616
www.suse.com/security/cve/CVE-2024-38618
www.suse.com/security/cve/CVE-2024-38619
www.suse.com/security/cve/CVE-2024-38621
www.suse.com/security/cve/CVE-2024-38627
www.suse.com/security/cve/CVE-2024-38628
www.suse.com/security/cve/CVE-2024-38630
www.suse.com/security/cve/CVE-2024-38633
www.suse.com/security/cve/CVE-2024-38634
www.suse.com/security/cve/CVE-2024-38635
www.suse.com/security/cve/CVE-2024-38659
www.suse.com/security/cve/CVE-2024-38661
www.suse.com/security/cve/CVE-2024-38780
www.suse.com/security/cve/CVE-2024-39276
www.suse.com/security/cve/CVE-2024-39301
www.suse.com/security/cve/CVE-2024-39371
www.suse.com/security/cve/CVE-2024-39463
www.suse.com/security/cve/CVE-2024-39468
www.suse.com/security/cve/CVE-2024-39469
www.suse.com/security/cve/CVE-2024-39471
www.suse.com/security/cve/CVE-2024-39472
www.suse.com/security/cve/CVE-2024-39475
www.suse.com/security/cve/CVE-2024-39482
www.suse.com/security/cve/CVE-2024-39487
www.suse.com/security/cve/CVE-2024-39488
www.suse.com/security/cve/CVE-2024-39490
www.suse.com/security/cve/CVE-2024-39493
www.suse.com/security/cve/CVE-2024-39494
www.suse.com/security/cve/CVE-2024-39497
www.suse.com/security/cve/CVE-2024-39499
www.suse.com/security/cve/CVE-2024-39500
www.suse.com/security/cve/CVE-2024-39501
www.suse.com/security/cve/CVE-2024-39502
www.suse.com/security/cve/CVE-2024-39505
www.suse.com/security/cve/CVE-2024-39506
www.suse.com/security/cve/CVE-2024-39507
www.suse.com/security/cve/CVE-2024-39508
www.suse.com/security/cve/CVE-2024-39509
www.suse.com/security/cve/CVE-2024-40900
www.suse.com/security/cve/CVE-2024-40901
www.suse.com/security/cve/CVE-2024-40902
www.suse.com/security/cve/CVE-2024-40903
www.suse.com/security/cve/CVE-2024-40904
www.suse.com/security/cve/CVE-2024-40906
www.suse.com/security/cve/CVE-2024-40908
www.suse.com/security/cve/CVE-2024-40909
www.suse.com/security/cve/CVE-2024-40911
www.suse.com/security/cve/CVE-2024-40912
www.suse.com/security/cve/CVE-2024-40916
www.suse.com/security/cve/CVE-2024-40919
www.suse.com/security/cve/CVE-2024-40923
www.suse.com/security/cve/CVE-2024-40924
www.suse.com/security/cve/CVE-2024-40927
www.suse.com/security/cve/CVE-2024-40929
www.suse.com/security/cve/CVE-2024-40931
www.suse.com/security/cve/CVE-2024-40932
www.suse.com/security/cve/CVE-2024-40934
www.suse.com/security/cve/CVE-2024-40935
www.suse.com/security/cve/CVE-2024-40937
www.suse.com/security/cve/CVE-2024-40940
www.suse.com/security/cve/CVE-2024-40941
www.suse.com/security/cve/CVE-2024-40942
www.suse.com/security/cve/CVE-2024-40943
www.suse.com/security/cve/CVE-2024-40945
www.suse.com/security/cve/CVE-2024-40953
www.suse.com/security/cve/CVE-2024-40954
www.suse.com/security/cve/CVE-2024-40956
www.suse.com/security/cve/CVE-2024-40958
www.suse.com/security/cve/CVE-2024-40959
www.suse.com/security/cve/CVE-2024-40960
www.suse.com/security/cve/CVE-2024-40961
www.suse.com/security/cve/CVE-2024-40966
www.suse.com/security/cve/CVE-2024-40967
www.suse.com/security/cve/CVE-2024-40970
www.suse.com/security/cve/CVE-2024-40972
www.suse.com/security/cve/CVE-2024-40976
www.suse.com/security/cve/CVE-2024-40977
www.suse.com/security/cve/CVE-2024-40981
www.suse.com/security/cve/CVE-2024-40982
www.suse.com/security/cve/CVE-2024-40984
www.suse.com/security/cve/CVE-2024-40987
www.suse.com/security/cve/CVE-2024-40988
www.suse.com/security/cve/CVE-2024-40989
www.suse.com/security/cve/CVE-2024-40990
www.suse.com/security/cve/CVE-2024-40994
www.suse.com/security/cve/CVE-2024-40998
www.suse.com/security/cve/CVE-2024-40999
www.suse.com/security/cve/CVE-2024-41002
www.suse.com/security/cve/CVE-2024-41004
www.suse.com/security/cve/CVE-2024-41006
www.suse.com/security/cve/CVE-2024-41009
www.suse.com/security/cve/CVE-2024-41011
www.suse.com/security/cve/CVE-2024-41012
www.suse.com/security/cve/CVE-2024-41013
www.suse.com/security/cve/CVE-2024-41014
www.suse.com/security/cve/CVE-2024-41015
www.suse.com/security/cve/CVE-2024-41016
www.suse.com/security/cve/CVE-2024-41017
www.suse.com/security/cve/CVE-2024-41040
www.suse.com/security/cve/CVE-2024-41041
www.suse.com/security/cve/CVE-2024-41044
www.suse.com/security/cve/CVE-2024-41048
www.suse.com/security/cve/CVE-2024-41057
www.suse.com/security/cve/CVE-2024-41058
www.suse.com/security/cve/CVE-2024-41059
www.suse.com/security/cve/CVE-2024-41063
www.suse.com/security/cve/CVE-2024-41064
www.suse.com/security/cve/CVE-2024-41066
www.suse.com/security/cve/CVE-2024-41069
www.suse.com/security/cve/CVE-2024-41070
www.suse.com/security/cve/CVE-2024-41071
www.suse.com/security/cve/CVE-2024-41072
www.suse.com/security/cve/CVE-2024-41076
www.suse.com/security/cve/CVE-2024-41078
www.suse.com/security/cve/CVE-2024-41081
www.suse.com/security/cve/CVE-2024-41087
www.suse.com/security/cve/CVE-2024-41090
www.suse.com/security/cve/CVE-2024-41091
www.suse.com/security/cve/CVE-2024-42070
www.suse.com/security/cve/CVE-2024-42079
www.suse.com/security/cve/CVE-2024-42093
www.suse.com/security/cve/CVE-2024-42096
www.suse.com/security/cve/CVE-2024-42105
www.suse.com/security/cve/CVE-2024-42122
www.suse.com/security/cve/CVE-2024-42124
www.suse.com/security/cve/CVE-2024-42145
www.suse.com/security/cve/CVE-2024-42161
www.suse.com/security/cve/CVE-2024-42224
www.suse.com/security/cve/CVE-2024-42230
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
71.6%