Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: SUSE-SU-2024:2894-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Real Time 15 SP5, SUSE Linux Enterprise Server for SAP Applications 15 SP5, SUSE Linux Enterprise Server 15 SP5, SUSE Linux Enterprise High Performance Computing 15 SP5, SUSE Linux Enterprise Live Patching 15-SP5, SUSE Real Time Module 15-SP5, SUSE Linux Enterprise Micro 5.5, SUSE openSUSE Leap 15.5, SUSE openSUSE Leap Micro 5.5
Datum: Di, 13. August 2024, 19:37
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36974
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48732
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39501
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48835
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26585
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47402
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38570
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38548
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26633
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41057
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36910
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48775
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48783
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40940
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48862
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48793
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38598
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48836
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38588
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48807
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-269355
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48820
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48774
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48866
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47186
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40970
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40909
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48756
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47546
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48831
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48777
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48787
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48801
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39507
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40972
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36946
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36926
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39482
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48791
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48838
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48841
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52775
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48792
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47623
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48780
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40916
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27402
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35890
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26661
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47593
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48811
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40929
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47590
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42122
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52580
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48784
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47588
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47598
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36909
Applikationen: Linux

Originalnachricht

--===============6308351163670934838==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:2894-1
Rating: important
References:

* bsc#1082555
* bsc#1193454
* bsc#1193554
* bsc#1193787
* bsc#1194324
* bsc#1194869
* bsc#1195357
* bsc#1195668
* bsc#1195927
* bsc#1195957
* bsc#1196018
* bsc#1196823
* bsc#1197146
* bsc#1197246
* bsc#1197762
* bsc#1202346
* bsc#1202686
* bsc#1208783
* bsc#1209636
* bsc#1213123
* bsc#1215492
* bsc#1215587
* bsc#1216834
* bsc#1219832
* bsc#1220138
* bsc#1220185
* bsc#1220186
* bsc#1220187
* bsc#1220869
* bsc#1220876
* bsc#1220942
* bsc#1220952
* bsc#1221010
* bsc#1221044
* bsc#1221647
* bsc#1221654
* bsc#1221656
* bsc#1221659
* bsc#1221777
* bsc#1222011
* bsc#1222323
* bsc#1222326
* bsc#1222328
* bsc#1222625
* bsc#1222702
* bsc#1222728
* bsc#1222799
* bsc#1222809
* bsc#1222810
* bsc#1223021
* bsc#1223180
* bsc#1223635
* bsc#1223652
* bsc#1223675
* bsc#1223778
* bsc#1223806
* bsc#1223813
* bsc#1223815
* bsc#1223836
* bsc#1223863
* bsc#1224414
* bsc#1224499
* bsc#1224500
* bsc#1224512
* bsc#1224516
* bsc#1224517
* bsc#1224545
* bsc#1224548
* bsc#1224557
* bsc#1224572
* bsc#1224573
* bsc#1224585
* bsc#1224604
* bsc#1224636
* bsc#1224641
* bsc#1224683
* bsc#1224694
* bsc#1224700
* bsc#1224743
* bsc#1225088
* bsc#1225272
* bsc#1225301
* bsc#1225475
* bsc#1225489
* bsc#1225504
* bsc#1225505
* bsc#1225564
* bsc#1225573
* bsc#1225581
* bsc#1225586
* bsc#1225711
* bsc#1225717
* bsc#1225719
* bsc#1225744
* bsc#1225745
* bsc#1225746
* bsc#1225752
* bsc#1225753
* bsc#1225757
* bsc#1225767
* bsc#1225810
* bsc#1225815
* bsc#1225820
* bsc#1225829
* bsc#1225835
* bsc#1225838
* bsc#1225839
* bsc#1225843
* bsc#1225847
* bsc#1225851
* bsc#1225856
* bsc#1225895
* bsc#1225898
* bsc#1225903
* bsc#1226202
* bsc#1226502
* bsc#1226519
* bsc#1226551
* bsc#1226555
* bsc#1226565
* bsc#1226568
* bsc#1226570
* bsc#1226571
* bsc#1226574
* bsc#1226588
* bsc#1226607
* bsc#1226650
* bsc#1226698
* bsc#1226713
* bsc#1226716
* bsc#1226750
* bsc#1226757
* bsc#1226758
* bsc#1226775
* bsc#1226783
* bsc#1226785
* bsc#1226834
* bsc#1226837
* bsc#1226911
* bsc#1226990
* bsc#1226993
* bsc#1227090
* bsc#1227121
* bsc#1227157
* bsc#1227162
* bsc#1227362
* bsc#1227383
* bsc#1227432
* bsc#1227435
* bsc#1227447
* bsc#1227487
* bsc#1227549
* bsc#1227573
* bsc#1227618
* bsc#1227620
* bsc#1227626
* bsc#1227635
* bsc#1227661
* bsc#1227716
* bsc#1227722
* bsc#1227724
* bsc#1227725
* bsc#1227728
* bsc#1227729
* bsc#1227730
* bsc#1227732
* bsc#1227733
* bsc#1227750
* bsc#1227754
* bsc#1227755
* bsc#1227760
* bsc#1227762
* bsc#1227763
* bsc#1227764
* bsc#1227766
* bsc#1227770
* bsc#1227771
* bsc#1227772
* bsc#1227774
* bsc#1227779
* bsc#1227780
* bsc#1227783
* bsc#1227786
* bsc#1227787
* bsc#1227790
* bsc#1227792
* bsc#1227796
* bsc#1227797
* bsc#1227798
* bsc#1227800
* bsc#1227802
* bsc#1227806
* bsc#1227808
* bsc#1227810
* bsc#1227812
* bsc#1227813
* bsc#1227814
* bsc#1227816
* bsc#1227820
* bsc#1227823
* bsc#1227824
* bsc#1227828
* bsc#1227829
* bsc#1227836
* bsc#1227846
* bsc#1227849
* bsc#1227851
* bsc#1227862
* bsc#1227864
* bsc#1227865
* bsc#1227866
* bsc#1227870
* bsc#1227884
* bsc#1227886
* bsc#1227891
* bsc#1227893
* bsc#1227899
* bsc#1227900
* bsc#1227910
* bsc#1227913
* bsc#1227917
* bsc#1227919
* bsc#1227920
* bsc#1227921
* bsc#1227922
* bsc#1227923
* bsc#1227924
* bsc#1227925
* bsc#1227927
* bsc#1227928
* bsc#1227931
* bsc#1227932
* bsc#1227933
* bsc#1227935
* bsc#1227936
* bsc#1227938
* bsc#1227941
* bsc#1227942
* bsc#1227944
* bsc#1227945
* bsc#1227947
* bsc#1227948
* bsc#1227949
* bsc#1227950
* bsc#1227952
* bsc#1227953
* bsc#1227954
* bsc#1227956
* bsc#1227957
* bsc#1227963
* bsc#1227964
* bsc#1227965
* bsc#1227968
* bsc#1227969
* bsc#1227970
* bsc#1227971
* bsc#1227972
* bsc#1227975
* bsc#1227976
* bsc#1227981
* bsc#1227982
* bsc#1227985
* bsc#1227986
* bsc#1227987
* bsc#1227988
* bsc#1227989
* bsc#1227990
* bsc#1227991
* bsc#1227992
* bsc#1227993
* bsc#1227995
* bsc#1227996
* bsc#1227997
* bsc#1228000
* bsc#1228002
* bsc#1228003
* bsc#1228004
* bsc#1228005
* bsc#1228006
* bsc#1228007
* bsc#1228008
* bsc#1228009
* bsc#1228010
* bsc#1228011
* bsc#1228013
* bsc#1228014
* bsc#1228015
* bsc#1228019
* bsc#1228020
* bsc#1228025
* bsc#1228028
* bsc#1228035
* bsc#1228037
* bsc#1228038
* bsc#1228039
* bsc#1228040
* bsc#1228045
* bsc#1228054
* bsc#1228055
* bsc#1228056
* bsc#1228060
* bsc#1228061
* bsc#1228062
* bsc#1228063
* bsc#1228064
* bsc#1228066
* bsc#1228067
* bsc#1228068
* bsc#1228071
* bsc#1228079
* bsc#1228090
* bsc#1228114
* bsc#1228140
* bsc#1228190
* bsc#1228191
* bsc#1228195
* bsc#1228202
* bsc#1228226
* bsc#1228235
* bsc#1228237
* bsc#1228247
* bsc#1228327
* bsc#1228328
* bsc#1228330
* bsc#1228403
* bsc#1228405
* bsc#1228408
* bsc#1228409
* bsc#1228410
* bsc#1228418
* bsc#1228440
* bsc#1228459
* bsc#1228462
* bsc#1228470
* bsc#1228518
* bsc#1228520
* bsc#1228530
* bsc#1228561
* bsc#1228565
* bsc#1228580
* bsc#1228581
* bsc#1228591
* bsc#1228599
* bsc#1228617
* bsc#1228625
* bsc#1228626
* bsc#1228633
* bsc#1228640
* bsc#1228644
* bsc#1228649
* bsc#1228655
* bsc#1228665
* bsc#1228672
* bsc#1228680
* bsc#1228705
* bsc#1228723
* bsc#1228743
* bsc#1228756
* bsc#1228801
* bsc#1228850
* bsc#1228857
* jsc#PED-8582
* jsc#PED-8690


Cross-References:

* CVE-2021-47086
* CVE-2021-47103
* CVE-2021-47186
* CVE-2021-47402
* CVE-2021-47546
* CVE-2021-47547
* CVE-2021-47588
* CVE-2021-47590
* CVE-2021-47591
* CVE-2021-47593
* CVE-2021-47598
* CVE-2021-47599
* CVE-2021-47606
* CVE-2021-47622
* CVE-2021-47623
* CVE-2021-47624
* CVE-2022-48713
* CVE-2022-48730
* CVE-2022-48732
* CVE-2022-48749
* CVE-2022-48756
* CVE-2022-48773
* CVE-2022-48774
* CVE-2022-48775
* CVE-2022-48776
* CVE-2022-48777
* CVE-2022-48778
* CVE-2022-48780
* CVE-2022-48783
* CVE-2022-48784
* CVE-2022-48785
* CVE-2022-48786
* CVE-2022-48787
* CVE-2022-48788
* CVE-2022-48789
* CVE-2022-48790
* CVE-2022-48791
* CVE-2022-48792
* CVE-2022-48793
* CVE-2022-48794
* CVE-2022-48796
* CVE-2022-48797
* CVE-2022-48798
* CVE-2022-48799
* CVE-2022-48800
* CVE-2022-48801
* CVE-2022-48802
* CVE-2022-48803
* CVE-2022-48804
* CVE-2022-48805
* CVE-2022-48806
* CVE-2022-48807
* CVE-2022-48809
* CVE-2022-48810
* CVE-2022-48811
* CVE-2022-48812
* CVE-2022-48813
* CVE-2022-48814
* CVE-2022-48815
* CVE-2022-48816
* CVE-2022-48817
* CVE-2022-48818
* CVE-2022-48820
* CVE-2022-48821
* CVE-2022-48822
* CVE-2022-48823
* CVE-2022-48824
* CVE-2022-48825
* CVE-2022-48826
* CVE-2022-48827
* CVE-2022-48828
* CVE-2022-48829
* CVE-2022-48830
* CVE-2022-48831
* CVE-2022-48834
* CVE-2022-48835
* CVE-2022-48836
* CVE-2022-48837
* CVE-2022-48838
* CVE-2022-48839
* CVE-2022-48840
* CVE-2022-48841
* CVE-2022-48842
* CVE-2022-48843
* CVE-2022-48844
* CVE-2022-48846
* CVE-2022-48847
* CVE-2022-48849
* CVE-2022-48850
* CVE-2022-48851
* CVE-2022-48852
* CVE-2022-48853
* CVE-2022-48855
* CVE-2022-48856
* CVE-2022-48857
* CVE-2022-48858
* CVE-2022-48859
* CVE-2022-48860
* CVE-2022-48861
* CVE-2022-48862
* CVE-2022-48863
* CVE-2022-48864
* CVE-2022-48866
* CVE-2023-1582
* CVE-2023-37453
* CVE-2023-52435
* CVE-2023-52573
* CVE-2023-52580
* CVE-2023-52591
* CVE-2023-52735
* CVE-2023-52751
* CVE-2023-52762
* CVE-2023-52775
* CVE-2023-52812
* CVE-2023-52857
* CVE-2023-52863
* CVE-2023-52885
* CVE-2023-52886
* CVE-2024-25741
* CVE-2024-26583
* CVE-2024-26584
* CVE-2024-26585
* CVE-2024-26615
* CVE-2024-26633
* CVE-2024-26635
* CVE-2024-26636
* CVE-2024-26641
* CVE-2024-26661
* CVE-2024-26663
* CVE-2024-26665
* CVE-2024-26800
* CVE-2024-26802
* CVE-2024-26813
* CVE-2024-26814
* CVE-2024-26863
* CVE-2024-26889
* CVE-2024-26920
* CVE-2024-26935
* CVE-2024-269355
* CVE-2024-26961
* CVE-2024-26976
* CVE-2024-27015
* CVE-2024-27019
* CVE-2024-27020
* CVE-2024-27025
* CVE-2024-27065
* CVE-2024-27402
* CVE-2024-27437
* CVE-2024-35805
* CVE-2024-35819
* CVE-2024-35837
* CVE-2024-35853
* CVE-2024-35854
* CVE-2024-35855
* CVE-2024-35889
* CVE-2024-35890
* CVE-2024-35893
* CVE-2024-35899
* CVE-2024-35934
* CVE-2024-35949
* CVE-2024-35961
* CVE-2024-35979
* CVE-2024-35995
* CVE-2024-36000
* CVE-2024-36004
* CVE-2024-36288
* CVE-2024-36889
* CVE-2024-36901
* CVE-2024-36902
* CVE-2024-36909
* CVE-2024-36910
* CVE-2024-36911
* CVE-2024-36912
* CVE-2024-36913
* CVE-2024-36914
* CVE-2024-36919
* CVE-2024-36923
* CVE-2024-36924
* CVE-2024-36926
* CVE-2024-36939
* CVE-2024-36941
* CVE-2024-36942
* CVE-2024-36944
* CVE-2024-36946
* CVE-2024-36947
* CVE-2024-36950
* CVE-2024-36952
* CVE-2024-36955
* CVE-2024-36959
* CVE-2024-36974
* CVE-2024-38548
* CVE-2024-38555
* CVE-2024-38558
* CVE-2024-38559
* CVE-2024-38570
* CVE-2024-38586
* CVE-2024-38588
* CVE-2024-38598
* CVE-2024-38628
* CVE-2024-39276
* CVE-2024-39371
* CVE-2024-39463
* CVE-2024-39472
* CVE-2024-39475
* CVE-2024-39482
* CVE-2024-39487
* CVE-2024-39488
* CVE-2024-39490
* CVE-2024-39493
* CVE-2024-39494
* CVE-2024-39497
* CVE-2024-39499
* CVE-2024-39500
* CVE-2024-39501
* CVE-2024-39502
* CVE-2024-39505
* CVE-2024-39506
* CVE-2024-39507
* CVE-2024-39508
* CVE-2024-39509
* CVE-2024-40900
* CVE-2024-40901
* CVE-2024-40902
* CVE-2024-40903
* CVE-2024-40904
* CVE-2024-40906
* CVE-2024-40908
* CVE-2024-40909
* CVE-2024-40911
* CVE-2024-40912
* CVE-2024-40916
* CVE-2024-40919
* CVE-2024-40923
* CVE-2024-40924
* CVE-2024-40927
* CVE-2024-40929
* CVE-2024-40931
* CVE-2024-40932
* CVE-2024-40934
* CVE-2024-40935
* CVE-2024-40937
* CVE-2024-40940
* CVE-2024-40941
* CVE-2024-40942
* CVE-2024-40943
* CVE-2024-40945
* CVE-2024-40953
* CVE-2024-40954
* CVE-2024-40956
* CVE-2024-40958
* CVE-2024-40959
* CVE-2024-40960
* CVE-2024-40961
* CVE-2024-40966
* CVE-2024-40967
* CVE-2024-40970
* CVE-2024-40972
* CVE-2024-40976
* CVE-2024-40977
* CVE-2024-40981
* CVE-2024-40982
* CVE-2024-40984
* CVE-2024-40987
* CVE-2024-40988
* CVE-2024-40989
* CVE-2024-40990
* CVE-2024-40994
* CVE-2024-40998
* CVE-2024-40999
* CVE-2024-41002
* CVE-2024-41004
* CVE-2024-41006
* CVE-2024-41009
* CVE-2024-41011
* CVE-2024-41012
* CVE-2024-41013
* CVE-2024-41014
* CVE-2024-41015
* CVE-2024-41016
* CVE-2024-41017
* CVE-2024-41040
* CVE-2024-41041
* CVE-2024-41044
* CVE-2024-41048
* CVE-2024-41057
* CVE-2024-41058
* CVE-2024-41059
* CVE-2024-41063
* CVE-2024-41064
* CVE-2024-41066
* CVE-2024-41069
* CVE-2024-41070
* CVE-2024-41071
* CVE-2024-41072
* CVE-2024-41076
* CVE-2024-41078
* CVE-2024-41081
* CVE-2024-41087
* CVE-2024-41090
* CVE-2024-41091
* CVE-2024-42070
* CVE-2024-42079
* CVE-2024-42093
* CVE-2024-42096
* CVE-2024-42105
* CVE-2024-42122
* CVE-2024-42124
* CVE-2024-42145
* CVE-2024-42161
* CVE-2024-42224
* CVE-2024-42230


CVSS scores:

* CVE-2021-47086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47546 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47547 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2021-47588 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47590 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47591 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47593 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47599 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47622 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47623 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2021-47624 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48713 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48749 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48774 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-48775 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48776 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48778 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48785 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48786 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-48787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48787 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48788 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-48788 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48789 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48789 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48790 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48790 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48791 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48792 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48792 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48793 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48796 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-48798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48799 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48800 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48801 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48803 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-48804 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48805 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-48807 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48814 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48816 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48821 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48822 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48822 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48823 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48825 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2022-48826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-48829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-48830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48834 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2022-48834 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48836 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48837 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48838 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48839 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48842 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48842 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48843 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48843 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48844 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48847 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48849 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-48850 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48851 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48852 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48855 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48858 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48859 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48863 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48866 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48866 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-1582 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-1582 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-37453 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-37453 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52435 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52435 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52573 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52580 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52775 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-52812 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52885 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-25741 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-26583 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26583 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26584 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26585 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26585 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26635 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-26636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26641 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-26661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26800 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26813 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26814 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26935 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27019 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-27020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27020 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27025 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-27065 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27402 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-27437 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35934 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-35949 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35995 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-36000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36889 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-36901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-36910 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-36911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-36912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-36913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-36914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36923 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-36924 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36942 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-36944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-36947 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-36950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36952 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36955 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36959 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36974 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38555 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38558 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-38559 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38570 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38570 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38586 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38588 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38598 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38628 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39276 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39463 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-39472 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
* CVE-2024-39472 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39475 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39475 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39482 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
* CVE-2024-39482 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39487 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-39488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39490 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-39493 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-39493 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39494 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-39494 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-39497 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39499 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-39500 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39501 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39502 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-39505 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-39506 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39507 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39508 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-39509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40900 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40901 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
* CVE-2024-40902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-40902 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40903 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40903 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40906 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40927 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40931 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-40932 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-40934 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-40935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40940 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40942 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40956 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40966 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40967 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40972 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40976 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40981 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-40982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40987 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-40988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40989 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40994 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40999 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-41002 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-41004 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-41006 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-41009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41011 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41012 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41013 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-41014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41015 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41040 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41041 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-41044 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-41048 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41057 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41057 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41058 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41058 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41063 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41063 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41064 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41064 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41066 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41066 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-41069 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41069 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41070 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41071 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-41072 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-41076 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41078 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41090 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
* CVE-2024-41091 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2024-42070 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-42070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42079 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42093 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
* CVE-2024-42105 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42105 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-42122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42145 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42161 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42161 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42161 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42224 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42230 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42230 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42230 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H


Affected Products:

* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Real Time Module 15-SP5



An update that solves 311 vulnerabilities, contains two features and has 50
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

* CVE-2021-47086: phonet/pep: refuse to enable an unbound pipe (bsc#1220952).
* CVE-2021-47103: net: sock: preserve kabi for sock (bsc#1221010).
* CVE-2021-47186: tipc: check for null after calling kmemdup (bsc#1222702).
* CVE-2021-47546: Kabi fix for ipv6: fix memory leak in fib6_rule_suppress
(bsc#1225504).
* CVE-2021-47547: net: tulip: de4x5: fix the problem that the array
'lp->phy'
may be out of bound (bsc#1225505).
* CVE-2021-47588: sit: do not call ipip6_dev_free() from sit_init_net()
(bsc#1226568).
* CVE-2021-47590: mptcp: fix deadlock in __mptcp_push_pending()
(bsc#1226565).
* CVE-2021-47591: mptcp: remove tcp ulp setsockopt support (bsc#1226570).
* CVE-2021-47593: mptcp: clear 'kern' flag from fallback sockets
(bsc#1226551).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1226574).
* CVE-2021-47599: btrfs: use latest_dev in btrfs_show_devname (bsc#1226571)
* CVE-2021-47606: net: netlink: af_netlink: Prevent empty skb by adding a
check on len (bsc#1226555).
* CVE-2021-47623: powerpc/fixmap: Fix VM debug warning on unmap
(bsc#1227919).
* CVE-2022-48785: ipv6: mcast: use rcu-safe version of ipv6_get_lladdr()
(bsc#1227927)
* CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling
ip[6]mr_free_table()
on failure path (bsc#1227936).
* CVE-2022-48850: net-sysfs: add check for netdevice being present to
speed_show (bsc#1228071)
* CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets (bsc#1228003).
* CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138).
* CVE-2023-52573: net: rds: Fix possible NULL-pointer dereference
(bsc#1220869)
* CVE-2023-52580: net/core: Fix ETH_P_1588 flow dissector (bsc#1220876).
* CVE-2023-52751: smb: client: fix use-after-free in
smb2_query_info_compound() (bsc#1225489).
* CVE-2023-52775: net/smc: avoid data corruption caused by decline
(bsc#1225088).
* CVE-2023-52812: drm/amd: check num of link levels when update pcie param
(bsc#1225564).
* CVE-2023-52857: drm/mediatek: Fix coverity issue with unintentional integer
overflow (bsc#1225581).
* CVE-2023-52863: hwmon: (axi-fan-control) Fix possible NULL pointer
dereference (bsc#1225586).
* CVE-2024-26585: Fixed race between tx work scheduling and socket close
(bsc#1220187).
* CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection
dump (bsc#1220942).
* CVE-2024-26633: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in
ip6_tnl_parse_tlv_enc_lim() (bsc#1221647).
* CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656).
* CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding
changes (bsc#1221659).
* CVE-2024-26641: ip6_tunnel: make sure to pull inner header in
__ip6_tnl_rcv() (bsc#1221654).
* CVE-2024-26661: drm/amd/display: Add NULL test for 'timing
generator' in
(bsc#1222323)
* CVE-2024-26663: tipc: Check the bearer type before calling
tipc_udp_nl_bearer_add() (bsc#1222326).
* CVE-2024-26665: tunnels: fix out of bounds access when building IPv6 PMTU
error (bsc#1222328).
* CVE-2024-26802: stmmac: Clear variable when destroying workqueue
(bsc#1222799).
* CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node()
(bsc#1223021).
* CVE-2024-26961: mac802154: fix llsec key resources release in
mac802154_llsec_key_del (bsc#1223652).
* CVE-2024-27015: netfilter: flowtable: incorrect pppoe tuple (bsc#1223806).
* CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in
__nft_obj_type_get() (bsc#1223813)
* CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in
__nft_expr_type_get() (bsc#1223815)
* CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778)
* CVE-2024-27065: netfilter: nf_tables: do not compare internal table flags
on
updates (bsc#1223836).
* CVE-2024-27402: phonet/pep: fix racy skb_queue_empty() use (bsc#1224414).
* CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ
(bsc#1222625).
* CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit
(bsc#1224743).
* CVE-2024-35819: soc: fsl: qbman: Use raw spinlock for cgr_lock
(bsc#1224683).
* CVE-2024-35837: net: mvpp2: clear BM pool before initialization
(bsc#1224500).
* CVE-2024-35853: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash
(bsc#1224604).
* CVE-2024-35889: idpf: fix kernel panic on unknown packet types
(bsc#1224517).
* CVE-2024-35890: gro: fix ownership transfer (bsc#1224516).
* CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak
(bsc#1224512)
* CVE-2024-35899: netfilter: nf_tables: flush pending destroy work before
exit_net release (bsc#1224499)
* CVE-2024-35934: net/smc: reduce rtnl pressure in
smc_pnet_create_pnetids_list() (bsc#1224641)
* CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks
(bsc#1224700)
* CVE-2024-35961: net/mlx5: Restore mistakenly dropped parts in register
devlink flow (bsc#1224585).
* CVE-2024-35979: raid1: fix use-after-free for original bio in
raid1_write_request() (bsc#1224572).
* CVE-2024-35995: ACPI: CPPC: Fix access width used for PCC registers
(bsc#1224557).
* CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge
(bsc#1224548).
* CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue
(bsc#1224545)
* CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output()
(bsc#1225711)
* CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in
fib6_rule_action() (bsc#1225719).
* CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that
couldn't
be re-encrypted (bsc#1225744).
* CVE-2024-36910: uio_hv_generic: Do not free decrypted memory (bsc#1225717).
* CVE-2024-36911: hv_netvsc: Do not free decrypted memory (bsc#1225745).
* CVE-2024-36912: Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl
(bsc#1225752).
* CVE-2024-36913: Drivers: hv: vmbus: Leak pages if set_memory_encrypted()
fails (bsc#1225753).
* CVE-2024-36914: drm/amd/display: Skip on writeback when it's not
applicable
(bsc#1225757).
* CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources
after upload (bsc#1225767).
* CVE-2024-36923: fs/9p: fix uninitialized values during inode evict
(bsc#1225815).
* CVE-2024-36939: nfs: Handle error of rpc_proc_register() in nfs_net_init()
(bsc#1225838).
* CVE-2024-36946: phonet: fix rtm_phonet_notify() skb allocation
(bsc#1225851).
* CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP
(bsc#1226519).
* CVE-2024-38555: net/mlx5: Discard command completions in internal error
(bsc#1226607).
* CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for
ICMPv6 (bsc#1226783).
* CVE-2024-38570: gfs2: Fix potential glock use-after-free on unmount
(bsc#1226775).
* CVE-2024-38586: r8169: Fix possible ring buffer corruption on fragmented Tx
packets (bsc#1226750).
* CVE-2024-38598: md: fix resync softlockup when bitmap size is less than
array size (bsc#1226757).
* CVE-2024-38628: usb: gadget: u_audio: Fix race condition use of controls
after free during gadget unbind (bsc#1226911).
* CVE-2024-39276: ext4: fix mb_cache_entry's e_refcnt leak in
ext4_xattr_block_cache_find() (bsc#1226993).
* CVE-2024-39371: io_uring: check for non-NULL file pointer in
io_file_can_poll() (bsc#1226990).
* CVE-2024-39463: 9p: add missing locking around taking dentry fid list
(bsc#1227090).
* CVE-2024-39472: xfs: fix log recovery buffer allocation for the legacy
h_size fixup (bsc#1227432).
* CVE-2024-39482: bcache: fix variable length array abuse in btree_iter
(bsc#1227447).
* CVE-2024-39487: bonding: Fix out-of-bounds read in
bond_option_arp_ip_targets_set() (bsc#1227573)
* CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core
(bsc#1227626).
* CVE-2024-39493: crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak
(bsc#1227620).
* CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name
(bsc#1227716).
* CVE-2024-39497: drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE,
MAP_PRIVATE) (bsc#1227722)
* CVE-2024-39502: ionic: fix use after netif_napi_del() (bsc#1227755).
* CVE-2024-39506: liquidio: Adjust a NULL pointer handling path in
lio_vf_rep_copy_packet (bsc#1227729).
* CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario
(bsc#1227730).
* CVE-2024-39508: io_uring/io-wq: Use set_bit() and test_bit() at
worker->flags (bsc#1227732).
* CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non-
allocated memory (bsc#1227762).
* CVE-2024-40906: net/mlx5: Always stop health timer during driver removal
(bsc#1227763).
* CVE-2024-40908: bpf: Set run context for rawtp test_run callback
(bsc#1227783).
* CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free()
(bsc#1227798).
* CVE-2024-40919: bnxt_en: Adjust logging of firmware messages in case of
released token in __hwrm_send() (bsc#1227779).
* CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure
(bsc#1227786).
* CVE-2024-40931: mptcp: ensure snd_una is properly initialized on connect
(bsc#1227780).
* CVE-2024-40935: cachefiles: flush all requests after setting
CACHEFILES_DEAD
(bsc#1227797).
* CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any()
(bsc#1227836).
* CVE-2024-40940: net/mlx5: Fix tainted pointer delete is case of flow rules
creation fail (bsc#1227800).
* CVE-2024-40943: ocfs2: fix races between hole punching and AIO+DIO
(bsc#1227849).
* CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in
kvm_vcpu_on_spin() (bsc#1227806).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-40958: netns: Make get_net_ns() handle zero refcount net
(bsc#1227812).
* CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in
xfrm6_get_saddr() (bsc#1227884).
* CVE-2024-40960: ipv6: prevent possible NULL dereference in rt6_probe()
(bsc#1227813).
* CVE-2024-40961: ipv6: prevent possible NULL deref in fib6_nh_init()
(bsc#1227814).
* CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc
(bsc#1227886).
* CVE-2024-40967: serial: imx: Introduce timeout when waiting on transmitter
empty (bsc#1227891).
* CVE-2024-40970: Avoid hw_desc array overrun in dw-axi-dmac (bsc#1227899).
* CVE-2024-40972: ext4: fold quota accounting into
ext4_xattr_inode_lookup_create() (bsc#1227910).
* CVE-2024-40977: wifi: mt76: mt7921s: fix potential hung tasks during chip
recovery (bsc#1227950).
* CVE-2024-40982: ssb: Fix potential NULL pointer dereference in
ssb_device_uevent() (bsc#1227865).
* CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on
teardown (bsc#1227823).
* CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store
(bsc#1227829).
* CVE-2024-40998: ext4: fix uninitialized ratelimit_state->lock access in
__ext4_fill_super() (bsc#1227866).
* CVE-2024-40999: net: ena: Add validation for completion descriptors
consistency (bsc#1227913).
* CVE-2024-41006: netrom: Fix a memory leak in nr_heartbeat_expiry()
(bsc#1227862).
* CVE-2024-41009: selftests/bpf: Add more ring buffer test coverage
(bsc#1228020).
* CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is
detected (bsc#1228247).
* CVE-2024-41013: xfs: do not walk off the end of a directory data block
(bsc#1228405).
* CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data
(bsc#1228408).
* CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry()
(bsc#1228409).
* CVE-2024-41016: ocfs2: add bounds checking to ocfs2_xattr_find_entry()
(bsc#1228410).
* CVE-2024-41017: jfs: do not walk off the end of ealist (bsc#1228403).
* CVE-2024-41040: net/sched: Fix UAF when resolving a clash (bsc#1228518)
* CVE-2024-41041: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port()
(bsc#1228520)
* CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets
(bsc#1228530).
* CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565)
* CVE-2024-41057: cachefiles: fix slab-use-after-free in
cachefiles_withdraw_cookie() (bsc#1228462).
* CVE-2024-41058: cachefiles: fix slab-use-after-free in
fscache_withdraw_volume() (bsc#1228459).
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
* CVE-2024-41063: Bluetooth: hci_core: cancel all works upon
hci_unregister_dev() (bsc#1228580)
* CVE-2024-41064: powerpc/eeh: avoid possible crash when edev->pdev
changes
(bsc#1228599).
* CVE-2024-41066: ibmvnic: Add tx check to prevent skb leak (bsc#1228640).
* CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).
* CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in
kvm_spapr_tce_attach_iommu_group() (bsc#1228581).
* CVE-2024-41071: wifi: mac80211: Avoid address calculations via out of
bounds
array indexing (bsc#1228625).
* CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable
failure (bsc#1228655).
* CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617)
* CVE-2024-41090: tap: add missing verification for short frame
(bsc#1228328).
* CVE-2024-41091: tun: add missing verification for short frame
(bsc#1228327).
* CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on
store
to data registers (bsc#1228470)
* CVE-2024-42079: gfs2: Fix NULL pointer dereference in gfs2_log_flush
(bsc#1228672).
* CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack
(bsc#1228680).
* CVE-2024-42096: x86: stop playing stack games in profile_pc()
(bsc#1228633).
* CVE-2024-42122: drm/amd/display: Add NULL pointer check for kzalloc
(bsc#1228591)
* CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible
(bsc#1228705)
* CVE-2024-42145: IB/core: Implement a limit on UMAD receive List
(bsc#1228743)
* CVE-2024-42161: Avoid uninitialized value in BPF_CORE_READ_BITFIELD
(bsc#1228756).
* CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list
(bsc#1228723)
* CVE-2024-42230: powerpc/pseries: Fix scv instruction crash with kexec
(bsc#1194869).

The following non-security bugs were fixed:

* ACPI: EC: Abort address space access upon error (stable-fixes).
* ACPI: EC: Avoid returning AE_OK on errors in address space handler (stable-
fixes).
* ACPI: processor_idle: Fix invalid comparison with insertion sort for
latency
(git-fixes).
* ACPI: video: Add backlight=native quirk for Lenovo Slim 7 16ARH7 (stable-
fixes).
* ACPI: x86: Force StorageD3Enable on more products (stable-fixes).
* ACPI: x86: utils: Add Picasso to the list for forcing StorageD3Enable
(stable-fixes).
* ALSA: dmaengine_pcm: terminate dmaengine before synchronize (stable-fixes).
* ALSA: dmaengine: Synchronize dma channel after drop() (stable-fixes).
* ALSA: emux: improve patch ioctl data validation (stable-fixes).
* ALSA: hda: conexant: Fix headset auto detect fail in the polling mode (git-
fixes).
* ALSA: hda/realtek: Add more codec ID to no shutup pins list (stable-fixes).
* ALSA: hda/realtek: add quirk for Clevo V5[46]0TU (stable-fixes).
* ALSA: hda/realtek: Enable headset mic of JP-IK LEAP W502 with ALC897
(stable-fixes).
* ALSA: hda/realtek: Enable headset mic on Positivo SU C1400 (stable-fixes).
* ALSA: hda/realtek: Enable Mute LED on HP 250 G7 (stable-fixes).
* ALSA: hda/realtek: fix mute/micmute LEDs do not work for EliteBook 645/665
G11 (stable-fixes).
* ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book Pro 360
(stable-fixes).
* ALSA: hda/realtek: Limit mic boost on VAIO PRO PX (stable-fixes).
* ALSA: hda/relatek: Enable Mute LED on HP Laptop 15-gw0xxx (stable-fixes).
* ALSA: pcm_dmaengine: Do not synchronize DMA channel when DMA is paused
(git-
fixes).
* ALSA: usb-audio: Add a quirk for Sonix HD USB Camera (stable-fixes).
* ALSA: usb-audio: Correct surround channels in UAC1 channel map (git-fixes).
* ALSA: usb-audio: Fix microphone sound on HD webcam (stable-fixes).
* ALSA: usb-audio: Move HD Webcam quirk to the right place (git-fixes).
* arm64: dts: allwinner: Pine H64: correctly remove reg_gmac_3v3 (git-fixes)
* arm64: dts: hi3798cv200: fix the size of GICR (git-fixes)
* arm64: dts: imx8qm-mek: fix gpio number for reg_usdhc2_vmmc (git-fixes)
* arm64: dts: microchip: sparx5: fix mdio reg (git-fixes)
* arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git-
fixes)
* arm64: dts: rockchip: Add sound-dai-cells for RK3368 (git-fixes)
* arm64: dts: rockchip: fix PMIC interrupt pin on ROCK Pi E (git-fixes)
* arm64/io: add constant-argument check (bsc#1226502 git-fixes)
* arm64/io: Provide a WC friendly __iowriteXX_copy() (bsc#1226502)
* arm64: tegra: Correct Tegra132 I2C alias (git-fixes)
* ASoC: amd: Adjust error handling in case of absent codec device
(git-fixes).
* ASoC: max98088: Check for clk_prepare_enable() error (git-fixes).
* ASoC: ti: davinci-mcasp: Set min period size using FIFO config (stable-
fixes).
* ASoC: ti: omap-hdmi: Fix too long driver name (stable-fixes).
* batman-adv: bypass empty buckets in batadv_purge_orig_ref() (stable-fixes).
* blk-cgroup: dropping parent refcount after pd_free_fn() is done
(bsc#1224573).
* block: do not add partitions if GD_SUPPRESS_PART_SCAN is set (bsc#1227162).
* block, loop: support partitions without scanning (bsc#1227162).
* Bluetooth: ath3k: Fix multiple issues reported by checkpatch.pl (stable-
fixes).
* Bluetooth: btqca: use le32_to_cpu for ver.soc_id (stable-fixes).
* Bluetooth: hci_core: cancel all works upon hci_unregister_dev() (stable-
fixes).
* Bluetooth: hci_qca: mark OF related data as maybe unused (stable-fixes).
* Bluetooth: hci_sync: Fix suspending with wrong filter policy (git-fixes).
* Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot
(git-fixes).
* bnxt_re: Fix imm_data endianness (git-fixes)
* bpf: aggressively forget precise markings during state checkpointing
(bsc#1225903).
* bpf: allow precision tracking for programs with subprogs (bsc#1225903).
* bpf: check bpf_func_state->callback_depth when pruning states
(bsc#1225903).
* bpf: clean up visit_insn()'s instruction processing (bsc#1225903).
* bpf: correct loop detection for iterators convergence (bsc#1225903).
* bpf: encapsulate precision backtracking bookkeeping (bsc#1225903).
* bpf: ensure state checkpointing at iter_next() call sites (bsc#1225903).
* bpf: exact states comparison for iterator convergence checks (bsc#1225903).
* bpf: extract __check_reg_arg() utility function (bsc#1225903).
* bpf: extract same_callsites() as utility function (bsc#1225903).
* bpf: extract setup_func_entry() utility function (bsc#1225903).
* bpf: fix calculation of subseq_idx during precision backtracking
(bsc#1225903).
* bpf: fix mark_all_scalars_precise use in mark_chain_precision
(bsc#1225903).
* bpf: Fix memory leaks in __check_func_call (bsc#1225903).
* bpf: fix propagate_precision() logic for inner frames (bsc#1225903).
* bpf: fix regs_exact() logic in regsafe() to remap IDs correctly
(bsc#1225903).
* bpf: Fix to preserve reg parent/live fields when copying range info
(bsc#1225903).
* bpf: generalize MAYBE_NULL vs non-MAYBE_NULL rule (bsc#1225903).
* bpf: improve precision backtrack logging (bsc#1225903).
* bpf: Improve verifier u32 scalar equality checking (bsc#1225903).
* bpf: keep track of max number of bpf_loop callback iterations
(bsc#1225903).
* bpf: maintain bitmasks across all active frames in __mark_chain_precision
(bsc#1225903).
* bpf: mark relevant stack slots scratched for register read instructions
(bsc#1225903).
* bpf: move explored_state() closer to the beginning of verifier.c
(bsc#1225903).
* bpf: perform byte-by-byte comparison only when necessary in regsafe()
(bsc#1225903).
* bpf: print full verifier states on infinite loop detection (bsc#1225903).
* bpf: regsafe() must not skip check_ids() (bsc#1225903).
* bpf: reject non-exact register type matches in regsafe() (bsc#1225903).
* bpf: Remove unused insn_cnt argument from visit_[func_call_]insn()
(bsc#1225903).
* bpf: reorganize struct bpf_reg_state fields (bsc#1225903).
* bpf: Skip invalid kfunc call in backtrack_insn (bsc#1225903).
* bpf: states_equal() must build idmap for all function frames (bsc#1225903).
* bpf: stop setting precise in current state (bsc#1225903).
* bpf: support precision propagation in the presence of subprogs
(bsc#1225903).
* bpf: take into account liveness when propagating precision (bsc#1225903).
* bpf: teach refsafe() to take into account ID remapping (bsc#1225903).
* bpf: unconditionally reset backtrack_state masks on global func exit
(bsc#1225903).
* bpf: use check_ids() for active_lock comparison (bsc#1225903).
* bpf: Use scalar ids in mark_chain_precision() (bsc#1225903).
* bpf: verify callbacks as if they are called unknown number of times
(bsc#1225903).
* bpf: Verify scalar ids mapping in regsafe() using check_ids()
(bsc#1225903).
* bpf: widening for callback iterators (bsc#1225903).
* btrfs: add device major-minor info in the struct btrfs_device
(bsc#1227162).
* btrfs: harden identification of a stale device (bsc#1227162).
* btrfs: match stale devices by dev_t (bsc#1227162).
* btrfs: remove the cross file system checks from remap (bsc#1227157).
* btrfs: use dev_t to match device in device_matched (bsc#1227162).
* btrfs: validate device maj:min during open (bsc#1227162).
* bytcr_rt5640 : inverse jack detect for Archos 101 cesium (stable-fixes).
* cachefiles: add output string to cachefiles_obj_[get|put]_ondemand_fd (git-
fixes).
* can: kvaser_usb: Explicitly initialize family in leafimx driver_info struct
(git-fixes).
* can: kvaser_usb: fix return value for hif_usb_send_regout (stable-fixes).
* ceph: fix incorrect kmalloc size of pagevec mempool (bsc#1228418).
* cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801).
* checkpatch: really skip LONG_LINE_* when LONG_LINE is ignored (git-fixes).
* crypto: aead,cipher - zeroize key buffer after use (stable-fixes).
* crypto: ecdh - explicitly zeroize private_key (stable-fixes).
* crypto: ecdsa - Fix the public key format description (git-fixes).
* crypto: hisilicon/sec - Fix memory leak for sec resource release (stable-
fixes).
* csky: ftrace: Drop duplicate implementation of arch_check_ftrace_location()
(git-fixes).
* decompress_bunzip2: fix rare decompression failure (git-fixes).
* devres: Fix devm_krealloc() wasting memory (git-fixes).
* devres: Fix memory leakage caused by driver API devm_free_percpu() (git-
fixes).
* dma: fix call order in dmam_free_coherent (git-fixes).
* docs: crypto: async-tx-api: fix broken code example (git-fixes).
* docs: Fix formatting of literal sections in fanotify docs (stable-fixes).
* drm/amd/amdgpu: Fix style errors in amdgpu_drv.c & amdgpu_device.c
(stable-
fixes).
* drm/amd/display: Account for cursor prefetch BW in DML1 mode support
(stable-fixes).
* drm/amd/display: Check for NULL pointer (stable-fixes).
* drm/amd/display: Check index msg_id before read or write (stable-fixes).
* drm/amd/display: Check pipe offset before setting vblank (stable-fixes).
* drm/amd/display: Skip finding free audio for unknown engine_id (stable-
fixes).
* drm/amdgpu/atomfirmware: fix parsing of vram_info (stable-fixes).
* drm/amdgpu/atomfirmware: silence UBSAN warning (stable-fixes).
* drm/amdgpu: avoid using null object of framebuffer (stable-fixes).
* drm/amdgpu: Check if NBIO funcs are NULL in amdgpu_device_baco_exit (git-
fixes).
* drm/amdgpu: Fix pci state save during mode-1 reset (git-fixes).
* drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq() (git-fixes).
* drm/amdgpu: fix uninitialized scalar variable warning (stable-fixes).
* drm/amdgpu: Fix uninitialized variable warnings (stable-fixes).
* drm/amdgpu: Initialize timestamp for some legacy SOCs (stable-fixes).
* drm/amdgpu: Remove GC HW IP 9.3.0 from noretry=1 (git-fixes).
* drm/amd/pm: Fix aldebaran pcie speed reporting (git-fixes).
* drm/amd/pm: remove logically dead code for renoir (git-fixes).
* drm/dp_mst: Fix all mstb marked as not probed after suspend/resume (git-
fixes).
* drm/etnaviv: do not block scheduler when GPU is still active
(stable-fixes).
* drm/etnaviv: fix DMA direction handling for cached RW buffers (git-fixes).
* drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes (git-
fixes).
* drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modes (git-
fixes).
* drm/i915/gt: Do not consider preemption during execlists_dequeue for gen8
(git-fixes).
* drm/lima: fix shared irq handling on driver remove (stable-fixes).
* drm/lima: Mark simple_ondemand governor as softdep (git-fixes).
* drm/mediatek: Add OVL compatible name for MT8195 (git-fixes).
* drm/meson: fix canvas release in bind function (git-fixes).
* drm/mgag200: Bind I2C lifetime to DRM device (git-fixes).
* drm/mgag200: Set DDC timeout in milliseconds (git-fixes).
* drm/mipi-dsi: Fix mipi_dsi_dcs_write_seq() macro definition format (stable-
fixes).
* drm/mipi-dsi: Fix theoretical int overflow in mipi_dsi_dcs_write_seq()
(git-
fixes).
* drm/msm/dpu: drop validity checks for clear_pending_flush() ctl op (git-
fixes).
* drm/msm/mdp5: Remove MDP_CAP_SRC_SPLIT from msm8x53_config (git-fixes).
* drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes
(stable-fixes).
* drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes
(stable-fixes).
* drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes
(git-fixes).
* drm/nouveau: prime: fix refcount underflow (git-fixes).
* drm/panel: boe-tv101wum-nl6: Check for errors on the NOP in prepare() (git-
fixes).
* drm/panel: boe-tv101wum-nl6: If prepare fails, disable GPIO before
regulators (git-fixes).
* drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep
(stable-fixes).
* drm: panel-orientation-quirks: Add quirk for Valve Galileo (stable-fixes).
* drm/panfrost: Mark simple_ondemand governor as softdep (git-fixes).
* drm/qxl: Add check for drm_cvt_mode (git-fixes).
* drm/radeon: check bo_va->bo is non-NULL before using it (stable-fixes).
* drm/radeon/radeon_display: Decrease the size of allocated memory (stable-
fixes).
* drm/vmwgfx: Fix a deadlock in dma buf fence polling (git-fixes).
* drm/vmwgfx: Fix missing HYPERVISOR_GUEST dependency (stable-fixes).
* drm/vmwgfx: Fix overlay when using Screen Targets (git-fixes).
* eeprom: digsy_mtc: Fix 93xx46 driver probe failure (git-fixes).
* exfat: check if cluster num is valid (git-fixes).
* exfat: simplify is_valid_cluster() (git-fixes).
* filelock: add a new locks_inode_context accessor function (git-fixes).
* firmware: cs_dsp: Fix overflow checking of wmfw header (git-fixes).
* firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers
(git-fixes).
* firmware: cs_dsp: Return error if block header overflows file (git-fixes).
* firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files
(git-fixes).
* firmware: cs_dsp: Validate payload length before processing block (git-
fixes).
* firmware: dmi: Stop decoding on broken entry (stable-fixes).
* firmware: turris-mox-rwtm: Do not complete if there are no waiters (git-
fixes).
* firmware: turris-mox-rwtm: Fix checking return value of
wait_for_completion_timeout() (git-fixes).
* firmware: turris-mox-rwtm: Initialize completion before mailbox
(git-fixes).
* fix build warning
* fs: allow cross-vfsmount reflink/dedupe (bsc#1227157).
* ftrace: Fix possible use-after-free issue in ftrace_location() (git-fixes).
* fuse: verify {g,u}id mount options correctly (bsc#1228191).
* gpio: mc33880: Convert comma to semicolon (git-fixes).
* hfsplus: fix to avoid false alarm of circular locking (git-fixes).
* hfsplus: fix uninit-value in copy_name (git-fixes).
* HID: Add quirk for Logitech Casa touchpad (stable-fixes).
* HID: wacom: Modify pen IDs (git-fixes).
* hpet: Support 32-bit userspace (git-fixes).
* hwmon: (adt7475) Fix default duty on fan is disabled (git-fixes).
* hwmon: (max6697) Fix swapped temp{1,8} critical alarms (git-fixes).
* hwmon: (max6697) Fix underflow when writing limit attributes (git-fixes).
* i2c: mark HostNotify target address as used (git-fixes).
* i2c: rcar: bring hardware to known state when probing (git-fixes).
* i2c: tegra: Fix failure during probe deferral cleanup (git-fixes)
* i2c: tegra: Share same DMA channel for RX and TX (bsc#1227661)
* i2c: testunit: avoid re-issued work after read message (git-fixes).
* i2c: testunit: correct Kconfig description (git-fixes).
* Input: elan_i2c - do not leave interrupt disabled on suspend failure (git-
fixes).
* Input: elantech - fix touchpad state on resume for Lenovo N24 (stable-
fixes).
* Input: ff-core - prefer struct_size over open coded arithmetic (stable-
fixes).
* Input: qt1050 - handle CHIP_ID reading error (git-fixes).
* Input: silead - Always support 10 fingers (stable-fixes).
* intel_th: pci: Add Granite Rapids SOC support (stable-fixes).
* intel_th: pci: Add Granite Rapids support (stable-fixes).
* intel_th: pci: Add Lunar Lake support (stable-fixes).
* intel_th: pci: Add Meteor Lake-S support (stable-fixes).
* intel_th: pci: Add Sapphire Rapids SOC support (stable-fixes).
* iommu/arm-smmu-v3: Free MSIs in case of ENOMEM (git-fixes).
* ionic: clean interrupt before enabling queue to avoid credit race (git-
fixes).
* jffs2: Fix potential illegal address access in jffs2_free_inode
(git-fixes).
* jfs: Fix array-index-out-of-bounds in diFree (git-fixes).
* jfs: xattr: fix buffer overflow for invalid xattr (bsc#1227383).
* kABI: bpf: bpf_reg_state reorganization kABI workaround (bsc#1225903).
* kABI: bpf: callback fixes kABI workaround (bsc#1225903).
* kABI: bpf: struct bpf_{idmap,idset} kABI workaround (bsc#1225903).
* kABI: bpf: tmp_str_buf kABI workaround (bsc#1225903).
* kABI: rtas: Workaround false positive due to lost definition (bsc#1227487).
* kabi/severities: ignore kABI for FireWire sound local symbols (bsc#1208783)
* kabi/severities: Ignore tpm_tis_core_init (bsc#1082555).
* kabi/severity: add nvme common code The nvme common code is also allowed to
change the data structures, there are only internal users.
* kabi: Use __iowriteXX_copy_inlined for in-kernel modules (bsc#1226502)
* kernel-binary: vdso: Own module_dir
* kernel/sched: Remove dl_boosted flag comment (git fixes (sched)).
* knfsd: LOOKUP can return an illegal error value (git-fixes).
* kobject_uevent: Fix OOB access within zap_modalias_env() (git-fixes).
* kprobes: Make arch_check_ftrace_location static (git-fixes).
* KVM: nVMX: Clear EXIT_QUALIFICATION when injecting an EPT Misconfig (git-
fixes).
* KVM: PPC: Book3S HV: Fix "rm_exit" entry in debugfs timings
(bsc#1194869).
* KVM: PPC: Book3S HV: Fix the set_one_reg for MMCR3 (bsc#1194869).
* KVM: PPC: Book3S HV Nested: L2 LPCR should inherit L1 LPES setting
(bsc#1194869).
* KVM: PPC: Book3S HV: remove extraneous asterisk from rm_host_ipi_action()
comment (bsc#1194869).
* KVM: PPC: Book3S: Suppress failed alloc warning in H_COPY_TOFROM_GUEST
(bsc#1194869).
* KVM: PPC: Book3S: Suppress warnings when allocating too big memory slots
(bsc#1194869).
* KVM: s390: fix LPSWEY handling (bsc#1227635 git-fixes).
* KVM: SVM: Process ICR on AVIC IPI delivery failure due to invalid target
(git-fixes).
* KVM: VMX: Report up-to-date exit qualification to userspace (git-fixes).
* KVM: x86: Add IBPB_BRTYPE support (bsc#1228079).
* KVM: x86: Always sync PIR to IRR prior to scanning I/O APIC routes (git-
fixes).
* KVM: x86: Bail from kvm_recalculate_phys_map() if x2APIC ID is
out-of-bounds
(git-fixes).
* KVM: x86: Disable APIC logical map if logical ID covers multiple MDAs (git-
fixes).
* KVM: x86: Disable APIC logical map if vCPUs are aliased in logical mode
(git-fixes).
* KVM: x86: Do not advertise guest.MAXPHYADDR as host.MAXPHYADDR in CPUID
(git-fixes).
* KVM: x86: Explicitly skip optimized logical map setup if vCPU's LDR==0
(git-
fixes).
* KVM: x86: Explicitly track all possibilities for APIC map's logical
modes
(git-fixes).
* KVM: x86: Fix broken debugregs ABI for 32 bit kernels (git-fixes).
* KVM: x86: Fix KVM_GET_MSRS stack info leak (git-fixes).
* KVM: x86: Honor architectural behavior for aliased 8-bit APIC IDs (git-
fixes).
* KVM: x86: Purge "highest ISR" cache when updating APICv state
(git-fixes).
* KVM: x86: Save/restore all NMIs when multiple NMIs are pending (git-fixes).
* KVM: x86: Skip redundant x2APIC logical mode optimized cluster setup (git-
fixes).
* leds: ss4200: Convert PCIBIOS_* return codes to errnos (git-fixes).
* leds: triggers: Flush pending brightness before activating trigger (git-
fixes).
* leds: trigger: Unregister sysfs attributes before calling deactivate()
(git-
fixes).
* libceph: fix race between delayed_work() and ceph_monc_stop()
(bsc#1228190).
* lib: objagg: Fix general protection fault (git-fixes).
* lib: objagg: Fix spelling (git-fixes).
* lib: test_objagg: Fix spelling (git-fixes).
* lockd: set missing fl_flags field when retrieving args (git-fixes).
* lockd: use locks_inode_context helper (git-fixes).
* Make AMD_HSMP=m and mark it unsupported in supported.conf (jsc#PED-8582)
* media: dvb: as102-fe: Fix as10x_register_addr packing (stable-fixes).
* media: dvbdev: Initialize sbuf (stable-fixes).
* media: dvb-frontends: tda10048: Fix integer overflow (stable-fixes).
* media: dvb-frontends: tda18271c2dd: Remove casting during div (stable-
fixes).
* media: dvb-usb: dib0700_devices: Add missing release_firmware() (stable-
fixes).
* media: dvb-usb: Fix unexpected infinite loop in
dvb_usb_read_remote_control() (git-fixes).
* media: dw2102: Do not translate i2c read into write (stable-fixes).
* media: dw2102: fix a potential buffer overflow (git-fixes).
* media: imon: Fix race getting ictx->lock (git-fixes).
* media: s2255: Use refcount_t instead of atomic_t for num_channels (stable-
fixes).
* media: uvcvideo: Fix integer overflow calculating timestamp (git-fixes).
* media: uvcvideo: Override default flags (git-fixes).
* media: venus: fix use after free in vdec_close (git-fixes).
* media: venus: flush all buffers in output plane streamoff (git-fixes).
* mei: demote client disconnect warning on suspend to debug (stable-fixes).
* mfd: omap-usb-tll: Use struct_size to allocate tll (git-fixes).
* mtd: partitions: redboot: Added conversion of operands to a larger type
(stable-fixes).
* net/dcb: check for detached device before executing callbacks
(bsc#1215587).
* netfilter: conntrack: ignore overly delayed tcp packets (bsc#1223180).
* netfilter: conntrack: prepare tcp_in_window for ternary return value
(bsc#1223180).
* netfilter: conntrack: remove pr_debug callsites from tcp tracker
(bsc#1223180).
* netfilter: conntrack: work around exceeded receive window (bsc#1223180).
* netfs, fscache: export fscache_put_volume() and add
fscache_try_get_volume()
(bsc#1228459 bsc#1228462).
* net: mana: Fix possible double free in error handling path (git-fixes).
* net: mana: Fix the extra HZ in mana_hwc_send_request (git-fixes).
* net: usb: qmi_wwan: add Telit FN912 compositions (git-fixes).
* net: usb: sr9700: fix uninitialized variable use in sr_mdio_read (git-
fixes).
* nfc/nci: Add the inconsistency check between the input data length and
count
(stable-fixes).
* NFSD: Add an nfsd_file_fsync tracepoint (git-fixes).
* NFSD: Add an NFSD_FILE_GC flag to enable nfsd_file garbage collection (git-
fixes).
* nfsd: Add errno mapping for EREMOTEIO (git-fixes).
* NFSD: Add nfsd_file_lru_dispose_list() helper (git-fixes).
* nfsd: add some comments to nfsd_file_do_acquire (git-fixes).
* nfsd: allow nfsd_file_get to sanely handle a NULL pointer (git-fixes).
* nfsd: allow reaping files still under writeback (git-fixes).
* NFSD: Avoid calling fh_drop_write() twice in do_nfsd_create() (git-fixes).
* NFSD: Clean up nfsd3_proc_create() (git-fixes).
* nfsd: Clean up nfsd_file_put() (git-fixes).
* NFSD: Clean up nfsd_open_verified() (git-fixes).
* NFSD: Clean up unused code after rhashtable conversion (git-fixes).
* NFSD: Convert filecache to rhltable (git-fixes).
* NFSD: Convert the filecache to use rhashtable (git-fixes).
* NFSD: De-duplicate hash bucket indexing (git-fixes).
* nfsd: do not free files unconditionally in __nfsd_file_cache_purge (git-
fixes).
* nfsd: do not fsync nfsd_files on last close (git-fixes).
* nfsd: do not hand out delegation on setuid files being opened for write
(git-fixes).
* nfsd: do not kill nfsd_files because of lease break error (git-fixes).
* nfsd: Do not leave work of closing files to a work queue (bsc#1228140).
* nfsd: do not take/put an extra reference when putting a file (git-fixes).
* NFSD enforce filehandle check for source file in COPY (git-fixes).
* NFSD: Ensure nf_inode is never dereferenced (git-fixes).
* nfsd: fix handling of cached open files in nfsd4_open codepath (git-fixes).
* NFSD: Fix licensing header in filecache.c (git-fixes).
* nfsd: fix net-namespace logic in __nfsd_file_cache_purge (git-fixes).
* nfsd: fix nfsd_file_unhash_and_dispose (git-fixes).
* NFSD: Fix potential use-after-free in nfsd_file_put() (git-fixes).
* NFSD: Fix problem of COMMIT and NFS4ERR_DELAY in infinite loop (git-fixes).
* NFSD: Fix the filecache LRU shrinker (git-fixes).
* nfsd: fix up the filecache laundrette scheduling (git-fixes).
* nfsd: fix use-after-free in nfsd_file_do_acquire tracepoint (git-fixes).
* NFSD: Flesh out a documenting comment for filecache.c (git-fixes).
* NFSD: handle errors better in write_ports_addfd() (git-fixes).
* NFSD: Instantiate a struct file when creating a regular NFSv4 file (git-
fixes).
* NFSD: Leave open files out of the filecache LRU (git-fixes).
* nfsd: map EBADF (git-fixes).
* NFSD: Move nfsd_file_trace_alloc() tracepoint (git-fixes).
* NFSD: nfsd_file_hash_remove can compute hashval (git-fixes).
* nfsd: NFSD_FILE_KEY_INODE only needs to find GC'ed entries (git-fixes).
* NFSD: nfsd_file_put() can sleep (git-fixes).
* NFSD: nfsd_file_unhash can compute hashval from nf->nf_inode
(git-fixes).
* NFSD: No longer record nf_hashval in the trace log (git-fixes).
* NFSD: Pass the target nfsd_file to nfsd_commit() (git-fixes).
* nfsd: put the export reference in nfsd4_verify_deleg_dentry (git-fixes).
* NFSD: Record number of flush calls (git-fixes).
* NFSD: Refactor nfsd_create_setattr() (git-fixes).
* NFSD: Refactor __nfsd_file_close_inode() (git-fixes).
* NFSD: Refactor nfsd_file_gc() (git-fixes).
* NFSD: Refactor nfsd_file_lru_scan() (git-fixes).
* NFSD: Refactor NFSv3 CREATE (git-fixes).
* NFSD: Refactor NFSv4 OPEN(CREATE) (git-fixes).
* NFSD: Remove do_nfsd_create() (git-fixes).
* NFSD: Remove lockdep assertion from unhash_and_release_locked()
(git-fixes).
* NFSD: Remove nfsd_file::nf_hashval (git-fixes).
* nfsd: remove the pages_flushed statistic from filecache (git-fixes).
* nfsd: reorganize filecache.c (git-fixes).
* NFSD: Replace the "init once" mechanism (git-fixes).
* NFSD: Report average age of filecache items (git-fixes).
* NFSD: Report count of calls to nfsd_file_acquire() (git-fixes).
* NFSD: Report count of freed filecache items (git-fixes).
* NFSD: Report filecache LRU size (git-fixes).
* NFSD: Report the number of items evicted by the LRU walk (git-fixes).
* nfsd: Retry once in nfsd_open on an -EOPENSTALE return (git-fixes).
* nfsd: rework hashtable handling in nfsd_do_file_acquire (git-fixes).
* nfsd: rework refcounting in filecache (git-fixes).
* NFSD: Separate tracepoints for acquire and create (git-fixes).
* NFSD: Set up an rhashtable for the filecache (git-fixes).
* nfsd: silence extraneous printk on nfsd.ko insertion (git-fixes).
* NFSD: simplify per-net file cache management (git-fixes).
* nfsd: simplify test_bit return in NFSD_FILE_KEY_FULL comparator
(git-fixes).
* nfsd: simplify the delayed disposal list code (git-fixes).
* NFSD: Trace filecache LRU activity (git-fixes).
* NFSD: Trace filecache opens (git-fixes).
* NFSD: verify the opened dentry after setting a delegation (git-fixes).
* NFSD: WARN when freeing an item still linked via nf_lru (git-fixes).
* NFSD: Write verifier might go backwards (git-fixes).
* NFSD: Zero counters when the filecache is re-initialized (git-fixes).
* NFS: Fix READ_PLUS when server does not support OP_READ_PLUS (git-fixes).
* nfs: fix undefined behavior in nfs_block_bits() (git-fixes).
* nfs: keep server info for remounts (git-fixes).
* nfs: Leave pages in the pagecache if readpage failed (git-fixes).
* NFSv4: Fixup smatch warning for ambiguous return (git-fixes).
* NFSv4.x: by default serialize open/close operations (bsc#1223863
bsc#1227362)
* nilfs2: add missing check for inode numbers on directory entries (git-
fixes).
* nilfs2: add missing check for inode numbers on directory entries (stable-
fixes).
* nilfs2: avoid undefined behavior in nilfs_cnt32_ge macro (git-fixes).
* nilfs2: convert persistent object allocator to use kmap_local (git-fixes).
* nilfs2: fix incorrect inode allocation from reserved inodes (git-fixes).
* nilfs2: fix inode number range checks (git-fixes).
* nilfs2: fix inode number range checks (stable-fixes).
* nvme: adjust multiples of NVME_CTRL_PAGE_SIZE in offset (git-fixes).
* nvme-auth: alloc nvme_dhchap_key as single buffer (git-fixes).
* nvme-auth: allow mixing of secret and hash lengths (git-fixes).
* nvme-auth: use transformed key size to create resp (git-fixes).
* nvme: avoid double free special payload (git-fixes).
* nvme: fixup comment for nvme RDMA Provider Type (git-fixes).
* nvme-multipath: find NUMA path only for online numa-node (git-fixes).
* nvme-pci: add missing condition check for existence of mapped data (git-
fixes).
* nvme-pci: Fix the instructions for disabling power management (git-fixes).
* nvmet: always initialize cqe.result (git-fixes).
* nvmet-auth: fix nvmet_auth hash error handling (git-fixes).
* nvmet: fix a possible leak when destroy a ctrl during qp establishment
(git-
fixes).
* nvme: use ctrl state accessor (bsc#1215492).
* ocfs2: fix DIO failure due to insufficient transaction credits
(bsc#1216834).
* ocfs2: remove redundant assignment to variable free_space (bsc#1228409).
* ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()
(bsc#1228410).
* orangefs: fix out-of-bounds fsid access (git-fixes).
* PCI: Add PCI_ERROR_RESPONSE and related definitions (stable-fixes).
* PCI/DPC: Fix use-after-free on concurrent DPC and hot-removal (git-fixes).
* PCI: Extend ACS configurability (bsc#1228090).
* PCI: Fix resource double counting on remove & rescan (git-fixes).
* PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git-
fixes).
* PCI: Introduce cleanup helpers for device reference counts and locks (git-
fixes).
* PCI: Introduce cleanup helpers for device reference counts and locks
(stable-fixes).
* PCI: keystone: Do not enable BAR 0 for AM654x (git-fixes).
* PCI: keystone: Fix NULL pointer dereference in case of DT error in
ks_pcie_setup_rc_app_regs() (git-fixes).
* PCI: keystone: Relocate ks_pcie_set/clear_dbi_mode() (git-fixes).
* PCI/PM: Avoid D3cold for HP Pavilion 17 PC/1972 PCIe Ports (git-fixes).
* PCI/PM: Avoid D3cold for HP Pavilion 17 PC/1972 PCIe Ports (stable-fixes).
* PCI: rockchip: Use GPIOD_OUT_LOW flag while requesting ep_gpio (git-fixes).
* PCI: tegra194: Set EP alignment restriction for inbound ATU (git-fixes).
* pinctrl: core: fix possible memory leak when pinctrl_enable() fails (git-
fixes).
* pinctrl: freescale: mxs: Fix refcount of child (git-fixes).
* pinctrl: single: fix possible memory leak when pinctrl_enable() fails (git-
fixes).
* pinctrl: ti: ti-iodelay: fix possible memory leak when pinctrl_enable()
fails (git-fixes).
* platform/chrome: cros_ec_debugfs: fix wrong EC message version (git-fixes).
* platform/chrome: cros_ec_proto: Lock device when updating MKBP version
(git-
fixes).
* platform/x86: dell-smbios-base: Use sysfs_emit() (stable-fixes).
* platform/x86: dell-smbios: Fix wrong token data in sysfs (git-fixes).
* platform/x86: lg-laptop: Change ACPI device id (stable-fixes).
* platform/x86: lg-laptop: Remove LGEX0815 hotkey handling (stable-fixes).
* platform/x86: touchscreen_dmi: Add info for GlobalSpace SolT IVW 11.6"
tablet (stable-fixes).
* platform/x86: touchscreen_dmi: Add info for the EZpad 6s Pro
(stable-fixes).
* platform/x86: wireless-hotkey: Add support for LG Airplane Button (stable-
fixes).
* powerpc/cpuidle: Set CPUIDLE_FLAG_POLLING for snooze state (bsc#1227121
ltc#207129).
* powerpc: fix a file leak in kvm_vcpu_ioctl_enable_cap() (bsc#1194869).
* powerpc/kasan: Disable address sanitization in kexec paths (bsc#1194869).
* powerpc/pseries: Fix scv instruction crash with kexec (bsc#1194869).
* powerpc/rtas: clean up includes (bsc#1227487).
* powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas()
(bsc#1227487).
* power: supply: cros_usbpd: provide ID table for avoiding fallback match
(stable-fixes).
* pwm: stm32: Always do lazy disabling (git-fixes).
* RDMA/cache: Release GID table even if leak is detected (git-fixes)
* RDMA/device: Return error earlier if port in not valid (git-fixes)
* RDMA/hns: Check atomic wr length (git-fixes)
* RDMA/hns: Fix insufficient extend DB for VFs. (git-fixes)
* RDMA/hns: Fix mbx timing out before CMD execution is completed (git-fixes)
* RDMA/hns: Fix missing pagesize and alignment check in FRMR (git-fixes)
* RDMA/hns: Fix shift-out-bounds when max_inline_data is 0 (git-fixes)
* RDMA/hns: Fix soft lockup under heavy CEQE load (git-fixes)
* RDMA/hns: Fix undifined behavior caused by invalid max_sge (git-fixes)
* RDMA/hns: Fix unmatch exception handling when init eq table fails (git-
fixes)
* RDMA/iwcm: Fix a use-after-free related to destroying CM IDs (git-fixes)
* RDMA/mana_ib: Ignore optional access flags for MRs (git-fixes).
* RDMA/mlx4: Fix truncated output warning in alias_GUID.c (git-fixes)
* RDMA/mlx4: Fix truncated output warning in mad.c (git-fixes)
* RDMA/mlx5: Set mkeys for dmabuf at PAGE_SIZE (git-fixes)
* RDMA/restrack: Fix potential invalid address access (git-fixes)
* RDMA/rxe: Do not set BTH_ACK_MASK for UC or UD QPs (git-fixes)
* regmap-i2c: Subtract reg size from max_write (stable-fixes).
* Revert "ALSA: firewire-lib: obsolete workqueue for period update"
(bsc#1208783).
* Revert "ALSA: firewire-lib: operate for period elapse event in process
context" (bsc#1208783).
* Revert "leds: led-core: Fix refcount leak in of_led_get()"
(git-fixes).
* Revert "usb: musb: da8xx: Set phy in OTG mode by default"
(stable-fixes).
* rpcrdma: fix handling for RDMA_CM_EVENT_DEVICE_REMOVAL (git-fixes).
* rpm/guards: fix precedence issue with control flow operator With perl 5.40
it report the following error on rpm/guards script: Possible precedence
issue with control flow operator (exit) at scripts/guards line 208. Fix the
issue by adding parenthesis around ternary operator.
* rtc: cmos: Fix return value of nvmem callbacks (git-fixes).
* rtc: interface: Add RTC offset to alarm after fix-up (git-fixes).
* rtc: isl1208: Fix return value of nvmem callbacks (git-fixes).
* rtlwifi: rtl8192de: Style clean-ups (stable-fixes).
* s390: Implement __iowrite32_copy() (bsc#1226502)
* s390: Stop using weak symbols for __iowrite64_copy() (bsc#1226502)
* saa7134: Unchecked i2c_transfer function result fixed (git-fixes).
* sched/fair: Do not balance task to its current running CPU (git fixes
(sched)).
* sched: Fix stop_one_cpu_nowait() vs hotplug (git fixes (sched)).
* scsi: lpfc: Allow DEVICE_RECOVERY mode after RSCN receipt if in PRLI_ISSUE
state (bsc#1228857).
* scsi: lpfc: Cancel ELS WQE instead of issuing abort when SLI port is
inactive (bsc#1228857).
* scsi: lpfc: Fix handling of fully recovered fabric node in dev_loss callbk
(bsc#1228857).
* scsi: lpfc: Fix incorrect request len mbox field when setting trunking via
sysfs (bsc#1228857).
* scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info (bsc#1228857).
* scsi: lpfc: Relax PRLI issue conditions after GID_FT response
(bsc#1228857).
* scsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian macro
usages (bsc#1228857).
* scsi: lpfc: Update lpfc version to 14.4.0.3 (bsc#1228857).
* scsi: qla2xxx: Avoid possible run-time warning with long model_num
(bsc#1228850).
* scsi: qla2xxx: Complete command early within lock (bsc#1228850).
* scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).
* scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).
* scsi: qla2xxx: During vport delete send async logout explicitly
(bsc#1228850).
* scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850).
* scsi: qla2xxx: Fix flash read failure (bsc#1228850).
* scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850).
* scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850).
* scsi: qla2xxx: Indent help text (bsc#1228850).
* scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850).
* scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850).
* scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds
(bsc#1228850).
* scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850).
* scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850).
* scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850).
* scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850).
* selftests/bpf: Add a selftest for checking subreg equality (bsc#1225903).
* selftests/bpf: add pre bpf_prog_test_run_opts() callback for test_loader
(bsc#1225903).
* selftests/bpf: add precision propagation tests in the presence of subprogs
(bsc#1225903).
* selftests/bpf: Add pruning test case for bpf_spin_lock (bsc#1225903).
* selftests/bpf: Check if mark_chain_precision() follows scalar ids
(bsc#1225903).
* selftests/bpf: check if max number of bpf_loop iterations is tracked
(bsc#1225903).
* selftests/bpf: fix __retval() being always ignored (bsc#1225903).
* selftests/bpf: fix unpriv_disabled check in test_verifier (bsc#1225903).
* selftests/bpf: __imm_insn & __imm_const macro for bpf_misc.h
(bsc#1225903).
* selftests/bpf: make test_align selftest more robust (bsc#1225903).
* selftests/bpf: populate map_array_ro map for verifier_array_access test
(bsc#1225903).
* selftests/bpf: prog_tests entry point for migrated test_verifier tests
(bsc#1225903).
* selftests/bpf: Report program name on parse_test_spec error (bsc#1225903).
* selftests/bpf: Support custom per-test flags and multiple expected messages
(bsc#1225903).
* selftests/bpf: test case for callback_depth states pruning logic
(bsc#1225903).
* selftests/bpf: test case for relaxed prunning of active_lock.id
(bsc#1225903).
* selftests/bpf: test cases for regsafe() bug skipping check_id()
(bsc#1225903).
* selftests/bpf: Tests execution support for test_loader.c (bsc#1225903).
* selftests/bpf: tests for iterating callbacks (bsc#1225903).
* selftests/bpf: test widening for iterating callbacks (bsc#1225903).
* selftests/bpf: track string payload offset as scalar in strobemeta
(bsc#1225903).
* selftests/bpf: Unprivileged tests for test_loader.c (bsc#1225903).
* selftests/bpf: Verify copy_register_state() preserves parent/live fields
(bsc#1225903).
* selftests/bpf: verify states_equal() maintains idmap across all frames
(bsc#1225903).
* selftests/bpf: Verify that check_ids() is used for scalars in regsafe()
(bsc#1225903).
* selftests/sigaltstack: Fix ppc64 GCC build (git-fixes).
* soc: ti: wkup_m3_ipc: Send NULL dummy message instead of pointer message
(stable-fixes).
* spi: imx: Do not expect DMA for i.MX{25,35,50,51,53} cspi devices (stable-
fixes).
* spi: mux: set ctlr->bits_per_word_mask (stable-fixes).
* string.h: Introduce memtostr() and memtostr_pad() (bsc#1228850).
* SUNRPC: avoid soft lockup when transmitting UDP to reachable server
(bsc#1225272).
* SUNRPC: Fix gss_free_in_token_pages() (git-fixes).
* SUNRPC: Fix loop termination condition in gss_free_in_token_pages() (git-
fixes).
* sunrpc: fix NFSACL RPC retry on soft mount (git-fixes).
* SUNRPC: return proper error from gss_wrap_req_priv (git-fixes).
* supported.conf:
* tpm: Allow system suspend to continue when TPM suspend fails (bsc#1082555).
* tpm: Prevent hwrng from activating during resume (bsc#1082555).
* tpm_tis: Resend command to recover from data transfer errors (bsc#1082555).
* tpm_tis: Use tpm_chip_{start,stop} decoration inside tpm_tis_resume
(bsc#1082555).
* tpm, tpm: Implement usage counter for locality (bsc#1082555).
* tpm, tpm_tis: Avoid cache incoherency in test for interrupts (bsc#1082555).
* tpm, tpm_tis: Claim locality before writing interrupt registers
(bsc#1082555).
* tpm, tpm_tis: Claim locality in interrupt handler (bsc#1082555).
* tpm, tpm_tis: Claim locality when interrupts are reenabled on resume
(bsc#1082555).
* tpm, tpm_tis: correct tpm_tis_flags enumeration values (bsc#1082555).
* tpm, tpm_tis: Do not skip reset of original interrupt vector (bsc#1082555).
* tpm, tpm_tis: Only handle supported interrupts (bsc#1082555).
* tracing: Build event generation tests only as modules (git-fixes).
* tracing/net_sched: NULL pointer dereference in perf_trace_qdisc_reset()
(git-fixes).
* tracing/osnoise: Add osnoise/options file (bsc#1228330)
* tracing/osnoise: Add OSNOISE_WORKLOAD option (bsc#1228330)
* tracing/osnoise: Do not follow tracing_cpumask (bsc#1228330)
* tracing/osnoise: Fix notify new tracing_max_latency (bsc#1228330)
* tracing/osnoise: Make osnoise_instances static (bsc#1228330)
* tracing/osnoise: Split workload start from the tracer start (bsc#1228330)
* tracing/osnoise: Support a list of trace_array *tr (bsc#1228330)
* tracing/osnoise: Use built-in RCU list checking (bsc#1228330)
* tracing/timerlat: Notify new max thread latency (bsc#1228330)
* USB: Add USB_QUIRK_NO_SET_INTF quirk for START BP-850k (stable-fixes).
* usb: cdns3: allocate TX FIFO size according to composite EP number (git-
fixes).
* usb: cdns3: fix incorrect calculation of ep_buf_size when more than one
config (git-fixes).
* usb: cdns3: fix iso transfer error when mult is not zero (git-fixes).
* usb: cdns3: improve handling of unaligned address case (git-fixes).
* usb: cdns3: optimize OUT transfer by copying only actual received data
(git-
fixes).
* usb: cdns3: skip set TRB_IOC when usb_request: no_interrupt is true (git-
fixes).
* USB: core: Fix duplicate endpoint bug by clearing reserved bits in the
descriptor (git-fixes).
* usb: dwc3: gadget: Do not delay End Transfer on delayed_status (git-fixes).
* usb: dwc3: gadget: Force sending delayed status during soft disconnect
(git-
fixes).
* usb: dwc3: gadget: Synchronize IRQ between soft connect/disconnect (git-
fixes).
* usb: gadget: call usb_gadget_check_config() to verify UDC capability (git-
fixes).
* usb: gadget: configfs: Prevent OOB read/write in usb_string_copy() (stable-
fixes).
* usb: gadget: printer: SS+ support (stable-fixes).
* usb: misc: uss720: check for incompatible versions of the Belkin F5U002
(stable-fixes).
* USB: serial: mos7840: fix crash on resume (git-fixes).
* USB: serial: option: add Fibocom FM350-GL (stable-fixes).
* USB: serial: option: add Netprisma LCUK54 series modules (stable-fixes).
* USB: serial: option: add Rolling RW350-GL variants (stable-fixes).
* USB: serial: option: add support for Foxconn T99W651 (stable-fixes).
* USB: serial: option: add Telit FN912 rmnet compositions (stable-fixes).
* USB: serial: option: add Telit generic core-dump composition
(stable-fixes).
* usb: typec: tcpm: clear pd_event queue in PORT_RESET (git-fixes).
* usb: xhci-plat: Do not include xhci.h (git-fixes).
* USB: xhci-plat: fix legacy PHY double init (git-fixes).
* wifi: ath11k: fix wrong handling of CCMP256 and GCMP ciphers (git-fixes).
* wifi: brcmsmac: LCN PHY code is used for BCM4313 2G-only device
(git-fixes).
* wifi: cfg80211: fix typo in cfg80211_calculate_bitrate_he() (git-fixes).
* wifi: cfg80211: handle 2x996 RU allocation in
cfg80211_calculate_bitrate_he() (git-fixes).
* wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values (git-fixes).
* wifi: cfg80211: wext: add extra SIOCSIWSCAN data check (stable-fixes).
* wifi: iwlwifi: mvm: d3: fix WoWLAN command version lookup (stable-fixes).
* wifi: iwlwifi: mvm: Handle BIGTK cipher in kek_kck cmd (stable-fixes).
* wifi: iwlwifi: mvm: properly set 6 GHz channel direct probe option (stable-
fixes).
* wifi: mac80211: disable softirqs for queued frame handling (git-fixes).
* wifi: mac80211: fix UBSAN noise in ieee80211_prep_hw_scan() (stable-fixes).
* wifi: mac80211: handle tasklet frames before stopping (stable-fixes).
* wifi: mac80211: mesh: init nonpeer_pm to active by default in mesh sdata
(stable-fixes).
* wifi: mt76: replace skb_put with skb_put_zero (stable-fixes).
* wifi: mwifiex: Fix interface type change (git-fixes).
* wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter() (git-
fixes).
* wifi: wilc1000: fix ies_len type in connect path (git-fixes).
* workqueue: Improve scalability of workqueue watchdog touch (bsc#1193454).
* workqueue: wq_watchdog_touch is always called with valid CPU (bsc#1193454).
* x86/amd_nb: Use Family 19h Models 60h-7Fh Function 4 IDs (git-fixes).
* x86/apic: Force native_apic_mem_read() to use the MOV instruction (git-
fixes).
* x86/bhi: Avoid warning in #DB handler due to BHI mitigation (git-fixes).
* x86/bugs: Remove default case for fully switched enums (bsc#1227900).
* x86/fpu: Fix AMD X86_BUG_FXSAVE_LEAK fixup (git-fixes).
* x86/ibt,ftrace: Search for **fentry** location (git-fixes).
* x86/Kconfig: Transmeta Crusoe is CPU family 5, not 6 (git-fixes).
* x86/mm: Allow guest.enc_status_change_prepare() to fail (git-fixes).
* x86/mm: Fix enc_status_change_finish_noop() (git-fixes).
* x86/purgatory: Switch to the position-independent small code model (git-
fixes).
* x86/srso: Move retbleed IBPB check into existing 'has_microcode'
code block
(bsc#1227900).
* x86/srso: Remove 'pred_cmd' label (bsc#1227900).
* x86: Stop using weak symbols for __iowrite32_copy() (bsc#1226502)
* x86/tdx: Fix race between set_memory_encrypted() and
load_unaligned_zeropad() (git-fixes).
* xfs: Add cond_resched to block unmap range and reflink remap path
(bsc#1228226).
* xhci: Apply broken streams quirk to Etron EJ188 xHCI host (stable-fixes).
* xhci: Apply reset resume quirk to Etron EJ188 xHCI host (stable-fixes).
* xhci: Set correct transferred length for cancelled bulk transfers (stable-
fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-2894=1 openSUSE-SLE-15.5-2024-2894=1

* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-2894=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-2894=1

* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-2894=1

* SUSE Real Time Module 15-SP5
zypper in -t patch SUSE-SLE-Module-RT-15-SP5-2024-2894=1

## Package List:

* openSUSE Leap 15.5 (noarch)
* kernel-source-rt-5.14.21-150500.13.64.1
* kernel-devel-rt-5.14.21-150500.13.64.1
* openSUSE Leap 15.5 (x86_64)
* kernel-rt-livepatch-5.14.21-150500.13.64.1
* ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.64.1
* cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.64.1
* kernel-rt_debug-devel-5.14.21-150500.13.64.1
* kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource-1-150500.11.3.1
* ocfs2-kmp-rt-5.14.21-150500.13.64.1
* gfs2-kmp-rt-5.14.21-150500.13.64.1
* kernel-rt_debug-debuginfo-5.14.21-150500.13.64.1
* kernel-rt-optional-debuginfo-5.14.21-150500.13.64.1
* kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo-1-150500.11.3.1
* reiserfs-kmp-rt-5.14.21-150500.13.64.1
* kernel-rt-devel-debuginfo-5.14.21-150500.13.64.1
* kernel-rt-devel-5.14.21-150500.13.64.1
* kernel-rt-debuginfo-5.14.21-150500.13.64.1
* kselftests-kmp-rt-debuginfo-5.14.21-150500.13.64.1
* kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.64.1
* kernel-rt_debug-debugsource-5.14.21-150500.13.64.1
* cluster-md-kmp-rt-5.14.21-150500.13.64.1
* kernel-rt_debug-livepatch-devel-5.14.21-150500.13.64.1
* kernel-rt_debug-vdso-5.14.21-150500.13.64.1
* reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.64.1
* kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.64.1
* gfs2-kmp-rt-debuginfo-5.14.21-150500.13.64.1
* dlm-kmp-rt-5.14.21-150500.13.64.1
* kernel-rt-optional-5.14.21-150500.13.64.1
* kernel-rt-debugsource-5.14.21-150500.13.64.1
* dlm-kmp-rt-debuginfo-5.14.21-150500.13.64.1
* kernel-rt-livepatch-devel-5.14.21-150500.13.64.1
* kernel-rt-vdso-debuginfo-5.14.21-150500.13.64.1
* kernel-syms-rt-5.14.21-150500.13.64.1
* kernel-rt-extra-5.14.21-150500.13.64.1
* kernel-livepatch-5_14_21-150500_13_64-rt-1-150500.11.3.1
* kselftests-kmp-rt-5.14.21-150500.13.64.1
* kernel-rt-extra-debuginfo-5.14.21-150500.13.64.1
* kernel-rt-vdso-5.14.21-150500.13.64.1
* openSUSE Leap 15.5 (nosrc x86_64)
* kernel-rt_debug-5.14.21-150500.13.64.1
* kernel-rt-5.14.21-150500.13.64.1
* openSUSE Leap Micro 5.5 (nosrc x86_64)
* kernel-rt-5.14.21-150500.13.64.1
* openSUSE Leap Micro 5.5 (x86_64)
* kernel-rt-debuginfo-5.14.21-150500.13.64.1
* kernel-rt-debugsource-5.14.21-150500.13.64.1
* SUSE Linux Enterprise Micro 5.5 (nosrc x86_64)
* kernel-rt-5.14.21-150500.13.64.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* kernel-rt-debuginfo-5.14.21-150500.13.64.1
* kernel-rt-debugsource-5.14.21-150500.13.64.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-source-rt-5.14.21-150500.13.64.1
* SUSE Linux Enterprise Live Patching 15-SP5 (x86_64)
* kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_13_64-rt-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo-1-150500.11.3.1
* SUSE Real Time Module 15-SP5 (x86_64)
* ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.64.1
* cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.64.1
* kernel-rt_debug-devel-5.14.21-150500.13.64.1
* ocfs2-kmp-rt-5.14.21-150500.13.64.1
* gfs2-kmp-rt-5.14.21-150500.13.64.1
* kernel-rt_debug-debuginfo-5.14.21-150500.13.64.1
* kernel-rt-devel-debuginfo-5.14.21-150500.13.64.1
* kernel-rt-devel-5.14.21-150500.13.64.1
* kernel-rt-debuginfo-5.14.21-150500.13.64.1
* kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.64.1
* kernel-rt_debug-debugsource-5.14.21-150500.13.64.1
* cluster-md-kmp-rt-5.14.21-150500.13.64.1
* kernel-rt_debug-vdso-5.14.21-150500.13.64.1
* kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.64.1
* gfs2-kmp-rt-debuginfo-5.14.21-150500.13.64.1
* dlm-kmp-rt-5.14.21-150500.13.64.1
* kernel-rt-debugsource-5.14.21-150500.13.64.1
* dlm-kmp-rt-debuginfo-5.14.21-150500.13.64.1
* kernel-rt-vdso-debuginfo-5.14.21-150500.13.64.1
* kernel-syms-rt-5.14.21-150500.13.64.1
* kernel-rt-vdso-5.14.21-150500.13.64.1
* SUSE Real Time Module 15-SP5 (noarch)
* kernel-source-rt-5.14.21-150500.13.64.1
* kernel-devel-rt-5.14.21-150500.13.64.1
* SUSE Real Time Module 15-SP5 (nosrc x86_64)
* kernel-rt_debug-5.14.21-150500.13.64.1
* kernel-rt-5.14.21-150500.13.64.1

## References:

* https://www.suse.com/security/cve/CVE-2021-47086.html
* https://www.suse.com/security/cve/CVE-2021-47103.html
* https://www.suse.com/security/cve/CVE-2021-47186.html
* https://www.suse.com/security/cve/CVE-2021-47402.html
* https://www.suse.com/security/cve/CVE-2021-47546.html
* https://www.suse.com/security/cve/CVE-2021-47547.html
* https://www.suse.com/security/cve/CVE-2021-47588.html
* https://www.suse.com/security/cve/CVE-2021-47590.html
* https://www.suse.com/security/cve/CVE-2021-47591.html
* https://www.suse.com/security/cve/CVE-2021-47593.html
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2021-47599.html
* https://www.suse.com/security/cve/CVE-2021-47606.html
* https://www.suse.com/security/cve/CVE-2021-47622.html
* https://www.suse.com/security/cve/CVE-2021-47623.html
* https://www.suse.com/security/cve/CVE-2021-47624.html
* https://www.suse.com/security/cve/CVE-2022-48713.html
* https://www.suse.com/security/cve/CVE-2022-48730.html
* https://www.suse.com/security/cve/CVE-2022-48732.html
* https://www.suse.com/security/cve/CVE-2022-48749.html
* https://www.suse.com/security/cve/CVE-2022-48756.html
* https://www.suse.com/security/cve/CVE-2022-48773.html
* https://www.suse.com/security/cve/CVE-2022-48774.html
* https://www.suse.com/security/cve/CVE-2022-48775.html
* https://www.suse.com/security/cve/CVE-2022-48776.html
* https://www.suse.com/security/cve/CVE-2022-48777.html
* https://www.suse.com/security/cve/CVE-2022-48778.html
* https://www.suse.com/security/cve/CVE-2022-48780.html
* https://www.suse.com/security/cve/CVE-2022-48783.html
* https://www.suse.com/security/cve/CVE-2022-48784.html
* https://www.suse.com/security/cve/CVE-2022-48785.html
* https://www.suse.com/security/cve/CVE-2022-48786.html
* https://www.suse.com/security/cve/CVE-2022-48787.html
* https://www.suse.com/security/cve/CVE-2022-48788.html
* https://www.suse.com/security/cve/CVE-2022-48789.html
* https://www.suse.com/security/cve/CVE-2022-48790.html
* https://www.suse.com/security/cve/CVE-2022-48791.html
* https://www.suse.com/security/cve/CVE-2022-48792.html
* https://www.suse.com/security/cve/CVE-2022-48793.html
* https://www.suse.com/security/cve/CVE-2022-48794.html
* https://www.suse.com/security/cve/CVE-2022-48796.html
* https://www.suse.com/security/cve/CVE-2022-48797.html
* https://www.suse.com/security/cve/CVE-2022-48798.html
* https://www.suse.com/security/cve/CVE-2022-48799.html
* https://www.suse.com/security/cve/CVE-2022-48800.html
* https://www.suse.com/security/cve/CVE-2022-48801.html
* https://www.suse.com/security/cve/CVE-2022-48802.html
* https://www.suse.com/security/cve/CVE-2022-48803.html
* https://www.suse.com/security/cve/CVE-2022-48804.html
* https://www.suse.com/security/cve/CVE-2022-48805.html
* https://www.suse.com/security/cve/CVE-2022-48806.html
* https://www.suse.com/security/cve/CVE-2022-48807.html
* https://www.suse.com/security/cve/CVE-2022-48809.html
* https://www.suse.com/security/cve/CVE-2022-48810.html
* https://www.suse.com/security/cve/CVE-2022-48811.html
* https://www.suse.com/security/cve/CVE-2022-48812.html
* https://www.suse.com/security/cve/CVE-2022-48813.html
* https://www.suse.com/security/cve/CVE-2022-48814.html
* https://www.suse.com/security/cve/CVE-2022-48815.html
* https://www.suse.com/security/cve/CVE-2022-48816.html
* https://www.suse.com/security/cve/CVE-2022-48817.html
* https://www.suse.com/security/cve/CVE-2022-48818.html
* https://www.suse.com/security/cve/CVE-2022-48820.html
* https://www.suse.com/security/cve/CVE-2022-48821.html
* https://www.suse.com/security/cve/CVE-2022-48822.html
* https://www.suse.com/security/cve/CVE-2022-48823.html
* https://www.suse.com/security/cve/CVE-2022-48824.html
* https://www.suse.com/security/cve/CVE-2022-48825.html
* https://www.suse.com/security/cve/CVE-2022-48826.html
* https://www.suse.com/security/cve/CVE-2022-48827.html
* https://www.suse.com/security/cve/CVE-2022-48828.html
* https://www.suse.com/security/cve/CVE-2022-48829.html
* https://www.suse.com/security/cve/CVE-2022-48830.html
* https://www.suse.com/security/cve/CVE-2022-48831.html
* https://www.suse.com/security/cve/CVE-2022-48834.html
* https://www.suse.com/security/cve/CVE-2022-48835.html
* https://www.suse.com/security/cve/CVE-2022-48836.html
* https://www.suse.com/security/cve/CVE-2022-48837.html
* https://www.suse.com/security/cve/CVE-2022-48838.html
* https://www.suse.com/security/cve/CVE-2022-48839.html
* https://www.suse.com/security/cve/CVE-2022-48840.html
* https://www.suse.com/security/cve/CVE-2022-48841.html
* https://www.suse.com/security/cve/CVE-2022-48842.html
* https://www.suse.com/security/cve/CVE-2022-48843.html
* https://www.suse.com/security/cve/CVE-2022-48844.html
* https://www.suse.com/security/cve/CVE-2022-48846.html
* https://www.suse.com/security/cve/CVE-2022-48847.html
* https://www.suse.com/security/cve/CVE-2022-48849.html
* https://www.suse.com/security/cve/CVE-2022-48850.html
* https://www.suse.com/security/cve/CVE-2022-48851.html
* https://www.suse.com/security/cve/CVE-2022-48852.html
* https://www.suse.com/security/cve/CVE-2022-48853.html
* https://www.suse.com/security/cve/CVE-2022-48855.html
* https://www.suse.com/security/cve/CVE-2022-48856.html
* https://www.suse.com/security/cve/CVE-2022-48857.html
* https://www.suse.com/security/cve/CVE-2022-48858.html
* https://www.suse.com/security/cve/CVE-2022-48859.html
* https://www.suse.com/security/cve/CVE-2022-48860.html
* https://www.suse.com/security/cve/CVE-2022-48861.html
* https://www.suse.com/security/cve/CVE-2022-48862.html
* https://www.suse.com/security/cve/CVE-2022-48863.html
* https://www.suse.com/security/cve/CVE-2022-48864.html
* https://www.suse.com/security/cve/CVE-2022-48866.html
* https://www.suse.com/security/cve/CVE-2023-1582.html
* https://www.suse.com/security/cve/CVE-2023-37453.html
* https://www.suse.com/security/cve/CVE-2023-52435.html
* https://www.suse.com/security/cve/CVE-2023-52573.html
* https://www.suse.com/security/cve/CVE-2023-52580.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52735.html
* https://www.suse.com/security/cve/CVE-2023-52751.html
* https://www.suse.com/security/cve/CVE-2023-52762.html
* https://www.suse.com/security/cve/CVE-2023-52775.html
* https://www.suse.com/security/cve/CVE-2023-52812.html
* https://www.suse.com/security/cve/CVE-2023-52857.html
* https://www.suse.com/security/cve/CVE-2023-52863.html
* https://www.suse.com/security/cve/CVE-2023-52885.html
* https://www.suse.com/security/cve/CVE-2023-52886.html
* https://www.suse.com/security/cve/CVE-2024-25741.html
* https://www.suse.com/security/cve/CVE-2024-26583.html
* https://www.suse.com/security/cve/CVE-2024-26584.html
* https://www.suse.com/security/cve/CVE-2024-26585.html
* https://www.suse.com/security/cve/CVE-2024-26615.html
* https://www.suse.com/security/cve/CVE-2024-26633.html
* https://www.suse.com/security/cve/CVE-2024-26635.html
* https://www.suse.com/security/cve/CVE-2024-26636.html
* https://www.suse.com/security/cve/CVE-2024-26641.html
* https://www.suse.com/security/cve/CVE-2024-26661.html
* https://www.suse.com/security/cve/CVE-2024-26663.html
* https://www.suse.com/security/cve/CVE-2024-26665.html
* https://www.suse.com/security/cve/CVE-2024-26800.html
* https://www.suse.com/security/cve/CVE-2024-26802.html
* https://www.suse.com/security/cve/CVE-2024-26813.html
* https://www.suse.com/security/cve/CVE-2024-26814.html
* https://www.suse.com/security/cve/CVE-2024-26863.html
* https://www.suse.com/security/cve/CVE-2024-26889.html
* https://www.suse.com/security/cve/CVE-2024-26920.html
* https://www.suse.com/security/cve/CVE-2024-26935.html
* https://www.suse.com/security/cve/CVE-2024-269355.html
* https://www.suse.com/security/cve/CVE-2024-26961.html
* https://www.suse.com/security/cve/CVE-2024-26976.html
* https://www.suse.com/security/cve/CVE-2024-27015.html
* https://www.suse.com/security/cve/CVE-2024-27019.html
* https://www.suse.com/security/cve/CVE-2024-27020.html
* https://www.suse.com/security/cve/CVE-2024-27025.html
* https://www.suse.com/security/cve/CVE-2024-27065.html
* https://www.suse.com/security/cve/CVE-2024-27402.html
* https://www.suse.com/security/cve/CVE-2024-27437.html
* https://www.suse.com/security/cve/CVE-2024-35805.html
* https://www.suse.com/security/cve/CVE-2024-35819.html
* https://www.suse.com/security/cve/CVE-2024-35837.html
* https://www.suse.com/security/cve/CVE-2024-35853.html
* https://www.suse.com/security/cve/CVE-2024-35854.html
* https://www.suse.com/security/cve/CVE-2024-35855.html
* https://www.suse.com/security/cve/CVE-2024-35889.html
* https://www.suse.com/security/cve/CVE-2024-35890.html
* https://www.suse.com/security/cve/CVE-2024-35893.html
* https://www.suse.com/security/cve/CVE-2024-35899.html
* https://www.suse.com/security/cve/CVE-2024-35934.html
* https://www.suse.com/security/cve/CVE-2024-35949.html
* https://www.suse.com/security/cve/CVE-2024-35961.html
* https://www.suse.com/security/cve/CVE-2024-35979.html
* https://www.suse.com/security/cve/CVE-2024-35995.html
* https://www.suse.com/security/cve/CVE-2024-36000.html
* https://www.suse.com/security/cve/CVE-2024-36004.html
* https://www.suse.com/security/cve/CVE-2024-36288.html
* https://www.suse.com/security/cve/CVE-2024-36889.html
* https://www.suse.com/security/cve/CVE-2024-36901.html
* https://www.suse.com/security/cve/CVE-2024-36902.html
* https://www.suse.com/security/cve/CVE-2024-36909.html
* https://www.suse.com/security/cve/CVE-2024-36910.html
* https://www.suse.com/security/cve/CVE-2024-36911.html
* https://www.suse.com/security/cve/CVE-2024-36912.html
* https://www.suse.com/security/cve/CVE-2024-36913.html
* https://www.suse.com/security/cve/CVE-2024-36914.html
* https://www.suse.com/security/cve/CVE-2024-36919.html
* https://www.suse.com/security/cve/CVE-2024-36923.html
* https://www.suse.com/security/cve/CVE-2024-36924.html
* https://www.suse.com/security/cve/CVE-2024-36926.html
* https://www.suse.com/security/cve/CVE-2024-36939.html
* https://www.suse.com/security/cve/CVE-2024-36941.html
* https://www.suse.com/security/cve/CVE-2024-36942.html
* https://www.suse.com/security/cve/CVE-2024-36944.html
* https://www.suse.com/security/cve/CVE-2024-36946.html
* https://www.suse.com/security/cve/CVE-2024-36947.html
* https://www.suse.com/security/cve/CVE-2024-36950.html
* https://www.suse.com/security/cve/CVE-2024-36952.html
* https://www.suse.com/security/cve/CVE-2024-36955.html
* https://www.suse.com/security/cve/CVE-2024-36959.html
* https://www.suse.com/security/cve/CVE-2024-36974.html
* https://www.suse.com/security/cve/CVE-2024-38548.html
* https://www.suse.com/security/cve/CVE-2024-38555.html
* https://www.suse.com/security/cve/CVE-2024-38558.html
* https://www.suse.com/security/cve/CVE-2024-38559.html
* https://www.suse.com/security/cve/CVE-2024-38570.html
* https://www.suse.com/security/cve/CVE-2024-38586.html
* https://www.suse.com/security/cve/CVE-2024-38588.html
* https://www.suse.com/security/cve/CVE-2024-38598.html
* https://www.suse.com/security/cve/CVE-2024-38628.html
* https://www.suse.com/security/cve/CVE-2024-39276.html
* https://www.suse.com/security/cve/CVE-2024-39371.html
* https://www.suse.com/security/cve/CVE-2024-39463.html
* https://www.suse.com/security/cve/CVE-2024-39472.html
* https://www.suse.com/security/cve/CVE-2024-39475.html
* https://www.suse.com/security/cve/CVE-2024-39482.html
* https://www.suse.com/security/cve/CVE-2024-39487.html
* https://www.suse.com/security/cve/CVE-2024-39488.html
* https://www.suse.com/security/cve/CVE-2024-39490.html
* https://www.suse.com/security/cve/CVE-2024-39493.html
* https://www.suse.com/security/cve/CVE-2024-39494.html
* https://www.suse.com/security/cve/CVE-2024-39497.html
* https://www.suse.com/security/cve/CVE-2024-39499.html
* https://www.suse.com/security/cve/CVE-2024-39500.html
* https://www.suse.com/security/cve/CVE-2024-39501.html
* https://www.suse.com/security/cve/CVE-2024-39502.html
* https://www.suse.com/security/cve/CVE-2024-39505.html
* https://www.suse.com/security/cve/CVE-2024-39506.html
* https://www.suse.com/security/cve/CVE-2024-39507.html
* https://www.suse.com/security/cve/CVE-2024-39508.html
* https://www.suse.com/security/cve/CVE-2024-39509.html
* https://www.suse.com/security/cve/CVE-2024-40900.html
* https://www.suse.com/security/cve/CVE-2024-40901.html
* https://www.suse.com/security/cve/CVE-2024-40902.html
* https://www.suse.com/security/cve/CVE-2024-40903.html
* https://www.suse.com/security/cve/CVE-2024-40904.html
* https://www.suse.com/security/cve/CVE-2024-40906.html
* https://www.suse.com/security/cve/CVE-2024-40908.html
* https://www.suse.com/security/cve/CVE-2024-40909.html
* https://www.suse.com/security/cve/CVE-2024-40911.html
* https://www.suse.com/security/cve/CVE-2024-40912.html
* https://www.suse.com/security/cve/CVE-2024-40916.html
* https://www.suse.com/security/cve/CVE-2024-40919.html
* https://www.suse.com/security/cve/CVE-2024-40923.html
* https://www.suse.com/security/cve/CVE-2024-40924.html
* https://www.suse.com/security/cve/CVE-2024-40927.html
* https://www.suse.com/security/cve/CVE-2024-40929.html
* https://www.suse.com/security/cve/CVE-2024-40931.html
* https://www.suse.com/security/cve/CVE-2024-40932.html
* https://www.suse.com/security/cve/CVE-2024-40934.html
* https://www.suse.com/security/cve/CVE-2024-40935.html
* https://www.suse.com/security/cve/CVE-2024-40937.html
* https://www.suse.com/security/cve/CVE-2024-40940.html
* https://www.suse.com/security/cve/CVE-2024-40941.html
* https://www.suse.com/security/cve/CVE-2024-40942.html
* https://www.suse.com/security/cve/CVE-2024-40943.html
* https://www.suse.com/security/cve/CVE-2024-40945.html
* https://www.suse.com/security/cve/CVE-2024-40953.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-40956.html
* https://www.suse.com/security/cve/CVE-2024-40958.html
* https://www.suse.com/security/cve/CVE-2024-40959.html
* https://www.suse.com/security/cve/CVE-2024-40960.html
* https://www.suse.com/security/cve/CVE-2024-40961.html
* https://www.suse.com/security/cve/CVE-2024-40966.html
* https://www.suse.com/security/cve/CVE-2024-40967.html
* https://www.suse.com/security/cve/CVE-2024-40970.html
* https://www.suse.com/security/cve/CVE-2024-40972.html
* https://www.suse.com/security/cve/CVE-2024-40976.html
* https://www.suse.com/security/cve/CVE-2024-40977.html
* https://www.suse.com/security/cve/CVE-2024-40981.html
* https://www.suse.com/security/cve/CVE-2024-40982.html
* https://www.suse.com/security/cve/CVE-2024-40984.html
* https://www.suse.com/security/cve/CVE-2024-40987.html
* https://www.suse.com/security/cve/CVE-2024-40988.html
* https://www.suse.com/security/cve/CVE-2024-40989.html
* https://www.suse.com/security/cve/CVE-2024-40990.html
* https://www.suse.com/security/cve/CVE-2024-40994.html
* https://www.suse.com/security/cve/CVE-2024-40998.html
* https://www.suse.com/security/cve/CVE-2024-40999.html
* https://www.suse.com/security/cve/CVE-2024-41002.html
* https://www.suse.com/security/cve/CVE-2024-41004.html
* https://www.suse.com/security/cve/CVE-2024-41006.html
* https://www.suse.com/security/cve/CVE-2024-41009.html
* https://www.suse.com/security/cve/CVE-2024-41011.html
* https://www.suse.com/security/cve/CVE-2024-41012.html
* https://www.suse.com/security/cve/CVE-2024-41013.html
* https://www.suse.com/security/cve/CVE-2024-41014.html
* https://www.suse.com/security/cve/CVE-2024-41015.html
* https://www.suse.com/security/cve/CVE-2024-41016.html
* https://www.suse.com/security/cve/CVE-2024-41017.html
* https://www.suse.com/security/cve/CVE-2024-41040.html
* https://www.suse.com/security/cve/CVE-2024-41041.html
* https://www.suse.com/security/cve/CVE-2024-41044.html
* https://www.suse.com/security/cve/CVE-2024-41048.html
* https://www.suse.com/security/cve/CVE-2024-41057.html
* https://www.suse.com/security/cve/CVE-2024-41058.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-41063.html
* https://www.suse.com/security/cve/CVE-2024-41064.html
* https://www.suse.com/security/cve/CVE-2024-41066.html
* https://www.suse.com/security/cve/CVE-2024-41069.html
* https://www.suse.com/security/cve/CVE-2024-41070.html
* https://www.suse.com/security/cve/CVE-2024-41071.html
* https://www.suse.com/security/cve/CVE-2024-41072.html
* https://www.suse.com/security/cve/CVE-2024-41076.html
* https://www.suse.com/security/cve/CVE-2024-41078.html
* https://www.suse.com/security/cve/CVE-2024-41081.html
* https://www.suse.com/security/cve/CVE-2024-41087.html
* https://www.suse.com/security/cve/CVE-2024-41090.html
* https://www.suse.com/security/cve/CVE-2024-41091.html
* https://www.suse.com/security/cve/CVE-2024-42070.html
* https://www.suse.com/security/cve/CVE-2024-42079.html
* https://www.suse.com/security/cve/CVE-2024-42093.html
* https://www.suse.com/security/cve/CVE-2024-42096.html
* https://www.suse.com/security/cve/CVE-2024-42105.html
* https://www.suse.com/security/cve/CVE-2024-42122.html
* https://www.suse.com/security/cve/CVE-2024-42124.html
* https://www.suse.com/security/cve/CVE-2024-42145.html
* https://www.suse.com/security/cve/CVE-2024-42161.html
* https://www.suse.com/security/cve/CVE-2024-42224.html
* https://www.suse.com/security/cve/CVE-2024-42230.html
* https://bugzilla.suse.com/show_bug.cgi?id=1082555
* https://bugzilla.suse.com/show_bug.cgi?id=1193454
* https://bugzilla.suse.com/show_bug.cgi?id=1193554
* https://bugzilla.suse.com/show_bug.cgi?id=1193787
* https://bugzilla.suse.com/show_bug.cgi?id=1194324
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1195357
* https://bugzilla.suse.com/show_bug.cgi?id=1195668
* https://bugzilla.suse.com/show_bug.cgi?id=1195927
* https://bugzilla.suse.com/show_bug.cgi?id=1195957
* https://bugzilla.suse.com/show_bug.cgi?id=1196018
* https://bugzilla.suse.com/show_bug.cgi?id=1196823
* https://bugzilla.suse.com/show_bug.cgi?id=1197146
* https://bugzilla.suse.com/show_bug.cgi?id=1197246
* https://bugzilla.suse.com/show_bug.cgi?id=1197762
* https://bugzilla.suse.com/show_bug.cgi?id=1202346
* https://bugzilla.suse.com/show_bug.cgi?id=1202686
* https://bugzilla.suse.com/show_bug.cgi?id=1208783
* https://bugzilla.suse.com/show_bug.cgi?id=1209636
* https://bugzilla.suse.com/show_bug.cgi?id=1213123
* https://bugzilla.suse.com/show_bug.cgi?id=1215492
* https://bugzilla.suse.com/show_bug.cgi?id=1215587
* https://bugzilla.suse.com/show_bug.cgi?id=1216834
* https://bugzilla.suse.com/show_bug.cgi?id=1219832
* https://bugzilla.suse.com/show_bug.cgi?id=1220138
* https://bugzilla.suse.com/show_bug.cgi?id=1220185
* https://bugzilla.suse.com/show_bug.cgi?id=1220186
* https://bugzilla.suse.com/show_bug.cgi?id=1220187
* https://bugzilla.suse.com/show_bug.cgi?id=1220869
* https://bugzilla.suse.com/show_bug.cgi?id=1220876
* https://bugzilla.suse.com/show_bug.cgi?id=1220942
* https://bugzilla.suse.com/show_bug.cgi?id=1220952
* https://bugzilla.suse.com/show_bug.cgi?id=1221010
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221647
* https://bugzilla.suse.com/show_bug.cgi?id=1221654
* https://bugzilla.suse.com/show_bug.cgi?id=1221656
* https://bugzilla.suse.com/show_bug.cgi?id=1221659
* https://bugzilla.suse.com/show_bug.cgi?id=1221777
* https://bugzilla.suse.com/show_bug.cgi?id=1222011
* https://bugzilla.suse.com/show_bug.cgi?id=1222323
* https://bugzilla.suse.com/show_bug.cgi?id=1222326
* https://bugzilla.suse.com/show_bug.cgi?id=1222328
* https://bugzilla.suse.com/show_bug.cgi?id=1222625
* https://bugzilla.suse.com/show_bug.cgi?id=1222702
* https://bugzilla.suse.com/show_bug.cgi?id=1222728
* https://bugzilla.suse.com/show_bug.cgi?id=1222799
* https://bugzilla.suse.com/show_bug.cgi?id=1222809
* https://bugzilla.suse.com/show_bug.cgi?id=1222810
* https://bugzilla.suse.com/show_bug.cgi?id=1223021
* https://bugzilla.suse.com/show_bug.cgi?id=1223180
* https://bugzilla.suse.com/show_bug.cgi?id=1223635
* https://bugzilla.suse.com/show_bug.cgi?id=1223652
* https://bugzilla.suse.com/show_bug.cgi?id=1223675
* https://bugzilla.suse.com/show_bug.cgi?id=1223778
* https://bugzilla.suse.com/show_bug.cgi?id=1223806
* https://bugzilla.suse.com/show_bug.cgi?id=1223813
* https://bugzilla.suse.com/show_bug.cgi?id=1223815
* https://bugzilla.suse.com/show_bug.cgi?id=1223836
* https://bugzilla.suse.com/show_bug.cgi?id=1223863
* https://bugzilla.suse.com/show_bug.cgi?id=1224414
* https://bugzilla.suse.com/show_bug.cgi?id=1224499
* https://bugzilla.suse.com/show_bug.cgi?id=1224500
* https://bugzilla.suse.com/show_bug.cgi?id=1224512
* https://bugzilla.suse.com/show_bug.cgi?id=1224516
* https://bugzilla.suse.com/show_bug.cgi?id=1224517
* https://bugzilla.suse.com/show_bug.cgi?id=1224545
* https://bugzilla.suse.com/show_bug.cgi?id=1224548
* https://bugzilla.suse.com/show_bug.cgi?id=1224557
* https://bugzilla.suse.com/show_bug.cgi?id=1224572
* https://bugzilla.suse.com/show_bug.cgi?id=1224573
* https://bugzilla.suse.com/show_bug.cgi?id=1224585
* https://bugzilla.suse.com/show_bug.cgi?id=1224604
* https://bugzilla.suse.com/show_bug.cgi?id=1224636
* https://bugzilla.suse.com/show_bug.cgi?id=1224641
* https://bugzilla.suse.com/show_bug.cgi?id=1224683
* https://bugzilla.suse.com/show_bug.cgi?id=1224694
* https://bugzilla.suse.com/show_bug.cgi?id=1224700
* https://bugzilla.suse.com/show_bug.cgi?id=1224743
* https://bugzilla.suse.com/show_bug.cgi?id=1225088
* https://bugzilla.suse.com/show_bug.cgi?id=1225272
* https://bugzilla.suse.com/show_bug.cgi?id=1225301
* https://bugzilla.suse.com/show_bug.cgi?id=1225475
* https://bugzilla.suse.com/show_bug.cgi?id=1225489
* https://bugzilla.suse.com/show_bug.cgi?id=1225504
* https://bugzilla.suse.com/show_bug.cgi?id=1225505
* https://bugzilla.suse.com/show_bug.cgi?id=1225564
* https://bugzilla.suse.com/show_bug.cgi?id=1225573
* https://bugzilla.suse.com/show_bug.cgi?id=1225581
* https://bugzilla.suse.com/show_bug.cgi?id=1225586
* https://bugzilla.suse.com/show_bug.cgi?id=1225711
* https://bugzilla.suse.com/show_bug.cgi?id=1225717
* https://bugzilla.suse.com/show_bug.cgi?id=1225719
* https://bugzilla.suse.com/show_bug.cgi?id=1225744
* https://bugzilla.suse.com/show_bug.cgi?id=1225745
* https://bugzilla.suse.com/show_bug.cgi?id=1225746
* https://bugzilla.suse.com/show_bug.cgi?id=1225752
* https://bugzilla.suse.com/show_bug.cgi?id=1225753
* https://bugzilla.suse.com/show_bug.cgi?id=1225757
* https://bugzilla.suse.com/show_bug.cgi?id=1225767
* https://bugzilla.suse.com/show_bug.cgi?id=1225810
* https://bugzilla.suse.com/show_bug.cgi?id=1225815
* https://bugzilla.suse.com/show_bug.cgi?id=1225820
* https://bugzilla.suse.com/show_bug.cgi?id=1225829
* https://bugzilla.suse.com/show_bug.cgi?id=1225835
* https://bugzilla.suse.com/show_bug.cgi?id=1225838
* https://bugzilla.suse.com/show_bug.cgi?id=1225839
* https://bugzilla.suse.com/show_bug.cgi?id=1225843
* https://bugzilla.suse.com/show_bug.cgi?id=1225847
* https://bugzilla.suse.com/show_bug.cgi?id=1225851
* https://bugzilla.suse.com/show_bug.cgi?id=1225856
* https://bugzilla.suse.com/show_bug.cgi?id=1225895
* https://bugzilla.suse.com/show_bug.cgi?id=1225898
* https://bugzilla.suse.com/show_bug.cgi?id=1225903
* https://bugzilla.suse.com/show_bug.cgi?id=1226202
* https://bugzilla.suse.com/show_bug.cgi?id=1226502
* https://bugzilla.suse.com/show_bug.cgi?id=1226519
* https://bugzilla.suse.com/show_bug.cgi?id=1226551
* https://bugzilla.suse.com/show_bug.cgi?id=1226555
* https://bugzilla.suse.com/show_bug.cgi?id=1226565
* https://bugzilla.suse.com/show_bug.cgi?id=1226568
* https://bugzilla.suse.com/show_bug.cgi?id=1226570
* https://bugzilla.suse.com/show_bug.cgi?id=1226571
* https://bugzilla.suse.com/show_bug.cgi?id=1226574
* https://bugzilla.suse.com/show_bug.cgi?id=1226588
* https://bugzilla.suse.com/show_bug.cgi?id=1226607
* https://bugzilla.suse.com/show_bug.cgi?id=1226650
* https://bugzilla.suse.com/show_bug.cgi?id=1226698
* https://bugzilla.suse.com/show_bug.cgi?id=1226713
* https://bugzilla.suse.com/show_bug.cgi?id=1226716
* https://bugzilla.suse.com/show_bug.cgi?id=1226750
* https://bugzilla.suse.com/show_bug.cgi?id=1226757
* https://bugzilla.suse.com/show_bug.cgi?id=1226758
* https://bugzilla.suse.com/show_bug.cgi?id=1226775
* https://bugzilla.suse.com/show_bug.cgi?id=1226783
* https://bugzilla.suse.com/show_bug.cgi?id=1226785
* https://bugzilla.suse.com/show_bug.cgi?id=1226834
* https://bugzilla.suse.com/show_bug.cgi?id=1226837
* https://bugzilla.suse.com/show_bug.cgi?id=1226911
* https://bugzilla.suse.com/show_bug.cgi?id=1226990
* https://bugzilla.suse.com/show_bug.cgi?id=1226993
* https://bugzilla.suse.com/show_bug.cgi?id=1227090
* https://bugzilla.suse.com/show_bug.cgi?id=1227121
* https://bugzilla.suse.com/show_bug.cgi?id=1227157
* https://bugzilla.suse.com/show_bug.cgi?id=1227162
* https://bugzilla.suse.com/show_bug.cgi?id=1227362
* https://bugzilla.suse.com/show_bug.cgi?id=1227383
* https://bugzilla.suse.com/show_bug.cgi?id=1227432
* https://bugzilla.suse.com/show_bug.cgi?id=1227435
* https://bugzilla.suse.com/show_bug.cgi?id=1227447
* https://bugzilla.suse.com/show_bug.cgi?id=1227487
* https://bugzilla.suse.com/show_bug.cgi?id=1227549
* https://bugzilla.suse.com/show_bug.cgi?id=1227573
* https://bugzilla.suse.com/show_bug.cgi?id=1227618
* https://bugzilla.suse.com/show_bug.cgi?id=1227620
* https://bugzilla.suse.com/show_bug.cgi?id=1227626
* https://bugzilla.suse.com/show_bug.cgi?id=1227635
* https://bugzilla.suse.com/show_bug.cgi?id=1227661
* https://bugzilla.suse.com/show_bug.cgi?id=1227716
* https://bugzilla.suse.com/show_bug.cgi?id=1227722
* https://bugzilla.suse.com/show_bug.cgi?id=1227724
* https://bugzilla.suse.com/show_bug.cgi?id=1227725
* https://bugzilla.suse.com/show_bug.cgi?id=1227728
* https://bugzilla.suse.com/show_bug.cgi?id=1227729
* https://bugzilla.suse.com/show_bug.cgi?id=1227730
* https://bugzilla.suse.com/show_bug.cgi?id=1227732
* https://bugzilla.suse.com/show_bug.cgi?id=1227733
* https://bugzilla.suse.com/show_bug.cgi?id=1227750
* https://bugzilla.suse.com/show_bug.cgi?id=1227754
* https://bugzilla.suse.com/show_bug.cgi?id=1227755
* https://bugzilla.suse.com/show_bug.cgi?id=1227760
* https://bugzilla.suse.com/show_bug.cgi?id=1227762
* https://bugzilla.suse.com/show_bug.cgi?id=1227763
* https://bugzilla.suse.com/show_bug.cgi?id=1227764
* https://bugzilla.suse.com/show_bug.cgi?id=1227766
* https://bugzilla.suse.com/show_bug.cgi?id=1227770
* https://bugzilla.suse.com/show_bug.cgi?id=1227771
* https://bugzilla.suse.com/show_bug.cgi?id=1227772
* https://bugzilla.suse.com/show_bug.cgi?id=1227774
* https://bugzilla.suse.com/show_bug.cgi?id=1227779
* https://bugzilla.suse.com/show_bug.cgi?id=1227780
* https://bugzilla.suse.com/show_bug.cgi?id=1227783
* https://bugzilla.suse.com/show_bug.cgi?id=1227786
* https://bugzilla.suse.com/show_bug.cgi?id=1227787
* https://bugzilla.suse.com/show_bug.cgi?id=1227790
* https://bugzilla.suse.com/show_bug.cgi?id=1227792
* https://bugzilla.suse.com/show_bug.cgi?id=1227796
* https://bugzilla.suse.com/show_bug.cgi?id=1227797
* https://bugzilla.suse.com/show_bug.cgi?id=1227798
* https://bugzilla.suse.com/show_bug.cgi?id=1227800
* https://bugzilla.suse.com/show_bug.cgi?id=1227802
* https://bugzilla.suse.com/show_bug.cgi?id=1227806
* https://bugzilla.suse.com/show_bug.cgi?id=1227808
* https://bugzilla.suse.com/show_bug.cgi?id=1227810
* https://bugzilla.suse.com/show_bug.cgi?id=1227812
* https://bugzilla.suse.com/show_bug.cgi?id=1227813
* https://bugzilla.suse.com/show_bug.cgi?id=1227814
* https://bugzilla.suse.com/show_bug.cgi?id=1227816
* https://bugzilla.suse.com/show_bug.cgi?id=1227820
* https://bugzilla.suse.com/show_bug.cgi?id=1227823
* https://bugzilla.suse.com/show_bug.cgi?id=1227824
* https://bugzilla.suse.com/show_bug.cgi?id=1227828
* https://bugzilla.suse.com/show_bug.cgi?id=1227829
* https://bugzilla.suse.com/show_bug.cgi?id=1227836
* https://bugzilla.suse.com/show_bug.cgi?id=1227846
* https://bugzilla.suse.com/show_bug.cgi?id=1227849
* https://bugzilla.suse.com/show_bug.cgi?id=1227851
* https://bugzilla.suse.com/show_bug.cgi?id=1227862
* https://bugzilla.suse.com/show_bug.cgi?id=1227864
* https://bugzilla.suse.com/show_bug.cgi?id=1227865
* https://bugzilla.suse.com/show_bug.cgi?id=1227866
* https://bugzilla.suse.com/show_bug.cgi?id=1227870
* https://bugzilla.suse.com/show_bug.cgi?id=1227884
* https://bugzilla.suse.com/show_bug.cgi?id=1227886
* https://bugzilla.suse.com/show_bug.cgi?id=1227891
* https://bugzilla.suse.com/show_bug.cgi?id=1227893
* https://bugzilla.suse.com/show_bug.cgi?id=1227899
* https://bugzilla.suse.com/show_bug.cgi?id=1227900
* https://bugzilla.suse.com/show_bug.cgi?id=1227910
* https://bugzilla.suse.com/show_bug.cgi?id=1227913
* https://bugzilla.suse.com/show_bug.cgi?id=1227917
* https://bugzilla.suse.com/show_bug.cgi?id=1227919
* https://bugzilla.suse.com/show_bug.cgi?id=1227920
* https://bugzilla.suse.com/show_bug.cgi?id=1227921
* https://bugzilla.suse.com/show_bug.cgi?id=1227922
* https://bugzilla.suse.com/show_bug.cgi?id=1227923
* https://bugzilla.suse.com/show_bug.cgi?id=1227924
* https://bugzilla.suse.com/show_bug.cgi?id=1227925
* https://bugzilla.suse.com/show_bug.cgi?id=1227927
* https://bugzilla.suse.com/show_bug.cgi?id=1227928
* https://bugzilla.suse.com/show_bug.cgi?id=1227931
* https://bugzilla.suse.com/show_bug.cgi?id=1227932
* https://bugzilla.suse.com/show_bug.cgi?id=1227933
* https://bugzilla.suse.com/show_bug.cgi?id=1227935
* https://bugzilla.suse.com/show_bug.cgi?id=1227936
* https://bugzilla.suse.com/show_bug.cgi?id=1227938
* https://bugzilla.suse.com/show_bug.cgi?id=1227941
* https://bugzilla.suse.com/show_bug.cgi?id=1227942
* https://bugzilla.suse.com/show_bug.cgi?id=1227944
* https://bugzilla.suse.com/show_bug.cgi?id=1227945
* https://bugzilla.suse.com/show_bug.cgi?id=1227947
* https://bugzilla.suse.com/show_bug.cgi?id=1227948
* https://bugzilla.suse.com/show_bug.cgi?id=1227949
* https://bugzilla.suse.com/show_bug.cgi?id=1227950
* https://bugzilla.suse.com/show_bug.cgi?id=1227952
* https://bugzilla.suse.com/show_bug.cgi?id=1227953
* https://bugzilla.suse.com/show_bug.cgi?id=1227954
* https://bugzilla.suse.com/show_bug.cgi?id=1227956
* https://bugzilla.suse.com/show_bug.cgi?id=1227957
* https://bugzilla.suse.com/show_bug.cgi?id=1227963
* https://bugzilla.suse.com/show_bug.cgi?id=1227964
* https://bugzilla.suse.com/show_bug.cgi?id=1227965
* https://bugzilla.suse.com/show_bug.cgi?id=1227968
* https://bugzilla.suse.com/show_bug.cgi?id=1227969
* https://bugzilla.suse.com/show_bug.cgi?id=1227970
* https://bugzilla.suse.com/show_bug.cgi?id=1227971
* https://bugzilla.suse.com/show_bug.cgi?id=1227972
* https://bugzilla.suse.com/show_bug.cgi?id=1227975
* https://bugzilla.suse.com/show_bug.cgi?id=1227976
* https://bugzilla.suse.com/show_bug.cgi?id=1227981
* https://bugzilla.suse.com/show_bug.cgi?id=1227982
* https://bugzilla.suse.com/show_bug.cgi?id=1227985
* https://bugzilla.suse.com/show_bug.cgi?id=1227986
* https://bugzilla.suse.com/show_bug.cgi?id=1227987
* https://bugzilla.suse.com/show_bug.cgi?id=1227988
* https://bugzilla.suse.com/show_bug.cgi?id=1227989
* https://bugzilla.suse.com/show_bug.cgi?id=1227990
* https://bugzilla.suse.com/show_bug.cgi?id=1227991
* https://bugzilla.suse.com/show_bug.cgi?id=1227992
* https://bugzilla.suse.com/show_bug.cgi?id=1227993
* https://bugzilla.suse.com/show_bug.cgi?id=1227995
* https://bugzilla.suse.com/show_bug.cgi?id=1227996
* https://bugzilla.suse.com/show_bug.cgi?id=1227997
* https://bugzilla.suse.com/show_bug.cgi?id=1228000
* https://bugzilla.suse.com/show_bug.cgi?id=1228002
* https://bugzilla.suse.com/show_bug.cgi?id=1228003
* https://bugzilla.suse.com/show_bug.cgi?id=1228004
* https://bugzilla.suse.com/show_bug.cgi?id=1228005
* https://bugzilla.suse.com/show_bug.cgi?id=1228006
* https://bugzilla.suse.com/show_bug.cgi?id=1228007
* https://bugzilla.suse.com/show_bug.cgi?id=1228008
* https://bugzilla.suse.com/show_bug.cgi?id=1228009
* https://bugzilla.suse.com/show_bug.cgi?id=1228010
* https://bugzilla.suse.com/show_bug.cgi?id=1228011
* https://bugzilla.suse.com/show_bug.cgi?id=1228013
* https://bugzilla.suse.com/show_bug.cgi?id=1228014
* https://bugzilla.suse.com/show_bug.cgi?id=1228015
* https://bugzilla.suse.com/show_bug.cgi?id=1228019
* https://bugzilla.suse.com/show_bug.cgi?id=1228020
* https://bugzilla.suse.com/show_bug.cgi?id=1228025
* https://bugzilla.suse.com/show_bug.cgi?id=1228028
* https://bugzilla.suse.com/show_bug.cgi?id=1228035
* https://bugzilla.suse.com/show_bug.cgi?id=1228037
* https://bugzilla.suse.com/show_bug.cgi?id=1228038
* https://bugzilla.suse.com/show_bug.cgi?id=1228039
* https://bugzilla.suse.com/show_bug.cgi?id=1228040
* https://bugzilla.suse.com/show_bug.cgi?id=1228045
* https://bugzilla.suse.com/show_bug.cgi?id=1228054
* https://bugzilla.suse.com/show_bug.cgi?id=1228055
* https://bugzilla.suse.com/show_bug.cgi?id=1228056
* https://bugzilla.suse.com/show_bug.cgi?id=1228060
* https://bugzilla.suse.com/show_bug.cgi?id=1228061
* https://bugzilla.suse.com/show_bug.cgi?id=1228062
* https://bugzilla.suse.com/show_bug.cgi?id=1228063
* https://bugzilla.suse.com/show_bug.cgi?id=1228064
* https://bugzilla.suse.com/show_bug.cgi?id=1228066
* https://bugzilla.suse.com/show_bug.cgi?id=1228067
* https://bugzilla.suse.com/show_bug.cgi?id=1228068
* https://bugzilla.suse.com/show_bug.cgi?id=1228071
* https://bugzilla.suse.com/show_bug.cgi?id=1228079
* https://bugzilla.suse.com/show_bug.cgi?id=1228090
* https://bugzilla.suse.com/show_bug.cgi?id=1228114
* https://bugzilla.suse.com/show_bug.cgi?id=1228140
* https://bugzilla.suse.com/show_bug.cgi?id=1228190
* https://bugzilla.suse.com/show_bug.cgi?id=1228191
* https://bugzilla.suse.com/show_bug.cgi?id=1228195
* https://bugzilla.suse.com/show_bug.cgi?id=1228202
* https://bugzilla.suse.com/show_bug.cgi?id=1228226
* https://bugzilla.suse.com/show_bug.cgi?id=1228235
* https://bugzilla.suse.com/show_bug.cgi?id=1228237
* https://bugzilla.suse.com/show_bug.cgi?id=1228247
* https://bugzilla.suse.com/show_bug.cgi?id=1228327
* https://bugzilla.suse.com/show_bug.cgi?id=1228328
* https://bugzilla.suse.com/show_bug.cgi?id=1228330
* https://bugzilla.suse.com/show_bug.cgi?id=1228403
* https://bugzilla.suse.com/show_bug.cgi?id=1228405
* https://bugzilla.suse.com/show_bug.cgi?id=1228408
* https://bugzilla.suse.com/show_bug.cgi?id=1228409
* https://bugzilla.suse.com/show_bug.cgi?id=1228410
* https://bugzilla.suse.com/show_bug.cgi?id=1228418
* https://bugzilla.suse.com/show_bug.cgi?id=1228440
* https://bugzilla.suse.com/show_bug.cgi?id=1228459
* https://bugzilla.suse.com/show_bug.cgi?id=1228462
* https://bugzilla.suse.com/show_bug.cgi?id=1228470
* https://bugzilla.suse.com/show_bug.cgi?id=1228518
* https://bugzilla.suse.com/show_bug.cgi?id=1228520
* https://bugzilla.suse.com/show_bug.cgi?id=1228530
* https://bugzilla.suse.com/show_bug.cgi?id=1228561
* https://bugzilla.suse.com/show_bug.cgi?id=1228565
* https://bugzilla.suse.com/show_bug.cgi?id=1228580
* https://bugzilla.suse.com/show_bug.cgi?id=1228581
* https://bugzilla.suse.com/show_bug.cgi?id=1228591
* https://bugzilla.suse.com/show_bug.cgi?id=1228599
* https://bugzilla.suse.com/show_bug.cgi?id=1228617
* https://bugzilla.suse.com/show_bug.cgi?id=1228625
* https://bugzilla.suse.com/show_bug.cgi?id=1228626
* https://bugzilla.suse.com/show_bug.cgi?id=1228633
* https://bugzilla.suse.com/show_bug.cgi?id=1228640
* https://bugzilla.suse.com/show_bug.cgi?id=1228644
* https://bugzilla.suse.com/show_bug.cgi?id=1228649
* https://bugzilla.suse.com/show_bug.cgi?id=1228655
* https://bugzilla.suse.com/show_bug.cgi?id=1228665
* https://bugzilla.suse.com/show_bug.cgi?id=1228672
* https://bugzilla.suse.com/show_bug.cgi?id=1228680
* https://bugzilla.suse.com/show_bug.cgi?id=1228705
* https://bugzilla.suse.com/show_bug.cgi?id=1228723
* https://bugzilla.suse.com/show_bug.cgi?id=1228743
* https://bugzilla.suse.com/show_bug.cgi?id=1228756
* https://bugzilla.suse.com/show_bug.cgi?id=1228801
* https://bugzilla.suse.com/show_bug.cgi?id=1228850
* https://bugzilla.suse.com/show_bug.cgi?id=1228857
* https://jira.suse.com/browse/PED-8582
* https://jira.suse.com/browse/PED-8690


--===============6308351163670934838==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for the Linux Kernel</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:2894-1</td>
</tr>

<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1082555">bsc#1082555</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1193454">bsc#1193454</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1193554">bsc#1193554</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1193787">bsc#1193787</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194324">bsc#1194324</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">bsc#1194869</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195357">bsc#1195357</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195668">bsc#1195668</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195927">bsc#1195927</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195957">bsc#1195957</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1196018">bsc#1196018</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1196823">bsc#1196823</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1197146">bsc#1197146</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1197246">bsc#1197246</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1197762">bsc#1197762</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1202346">bsc#1202346</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1202686">bsc#1202686</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1208783">bsc#1208783</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209636">bsc#1209636</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213123">bsc#1213123</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215492">bsc#1215492</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215587">bsc#1215587</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216834">bsc#1216834</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219832">bsc#1219832</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220138">bsc#1220138</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220185">bsc#1220185</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220186">bsc#1220186</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220187">bsc#1220187</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220869">bsc#1220869</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220876">bsc#1220876</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220942">bsc#1220942</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220952">bsc#1220952</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221010">bsc#1221010</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221044">bsc#1221044</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221647">bsc#1221647</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221654">bsc#1221654</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221656">bsc#1221656</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221659">bsc#1221659</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221777">bsc#1221777</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222011">bsc#1222011</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222323">bsc#1222323</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222326">bsc#1222326</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222328">bsc#1222328</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222625">bsc#1222625</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222702">bsc#1222702</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222728">bsc#1222728</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222799">bsc#1222799</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222809">bsc#1222809</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222810">bsc#1222810</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223021">bsc#1223021</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223180">bsc#1223180</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223635">bsc#1223635</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223652">bsc#1223652</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223675">bsc#1223675</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223778">bsc#1223778</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223806">bsc#1223806</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223813">bsc#1223813</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223815">bsc#1223815</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223836">bsc#1223836</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223863">bsc#1223863</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224414">bsc#1224414</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224499">bsc#1224499</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224500">bsc#1224500</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224512">bsc#1224512</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224516">bsc#1224516</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224517">bsc#1224517</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224545">bsc#1224545</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224548">bsc#1224548</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224557">bsc#1224557</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224572">bsc#1224572</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224573">bsc#1224573</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224585">bsc#1224585</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224604">bsc#1224604</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224636">bsc#1224636</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224641">bsc#1224641</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224683">bsc#1224683</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224694">bsc#1224694</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224700">bsc#1224700</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224743">bsc#1224743</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225088">bsc#1225088</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225272">bsc#1225272</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225301">bsc#1225301</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225475">bsc#1225475</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225489">bsc#1225489</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225504">bsc#1225504</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225505">bsc#1225505</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225564">bsc#1225564</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225573">bsc#1225573</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225581">bsc#1225581</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225586">bsc#1225586</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225711">bsc#1225711</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225717">bsc#1225717</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225719">bsc#1225719</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225744">bsc#1225744</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225745">bsc#1225745</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225746">bsc#1225746</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225752">bsc#1225752</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225753">bsc#1225753</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225757">bsc#1225757</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225767">bsc#1225767</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225810">bsc#1225810</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225815">bsc#1225815</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225820">bsc#1225820</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225829">bsc#1225829</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225835">bsc#1225835</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225838">bsc#1225838</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225839">bsc#1225839</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225843">bsc#1225843</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225847">bsc#1225847</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225851">bsc#1225851</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225856">bsc#1225856</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225895">bsc#1225895</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225898">bsc#1225898</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225903">bsc#1225903</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226202">bsc#1226202</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226502">bsc#1226502</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226519">bsc#1226519</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226551">bsc#1226551</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226555">bsc#1226555</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226565">bsc#1226565</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226568">bsc#1226568</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226570">bsc#1226570</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226571">bsc#1226571</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226574">bsc#1226574</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226588">bsc#1226588</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226607">bsc#1226607</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226650">bsc#1226650</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226698">bsc#1226698</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226713">bsc#1226713</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226716">bsc#1226716</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226750">bsc#1226750</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226757">bsc#1226757</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226758">bsc#1226758</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226775">bsc#1226775</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226783">bsc#1226783</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226785">bsc#1226785</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226834">bsc#1226834</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226837">bsc#1226837</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226911">bsc#1226911</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226990">bsc#1226990</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226993">bsc#1226993</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227090">bsc#1227090</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227121">bsc#1227121</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227157">bsc#1227157</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227162">bsc#1227162</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227362">bsc#1227362</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227383">bsc#1227383</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227432">bsc#1227432</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227435">bsc#1227435</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227447">bsc#1227447</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227487">bsc#1227487</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227549">bsc#1227549</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227573">bsc#1227573</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227618">bsc#1227618</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227620">bsc#1227620</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227626">bsc#1227626</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227635">bsc#1227635</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227661">bsc#1227661</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227716">bsc#1227716</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227722">bsc#1227722</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227724">bsc#1227724</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227725">bsc#1227725</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227728">bsc#1227728</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227729">bsc#1227729</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227730">bsc#1227730</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227732">bsc#1227732</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227733">bsc#1227733</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227750">bsc#1227750</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227754">bsc#1227754</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227755">bsc#1227755</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227760">bsc#1227760</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227762">bsc#1227762</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227763">bsc#1227763</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227764">bsc#1227764</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227766">bsc#1227766</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227770">bsc#1227770</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227771">bsc#1227771</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227772">bsc#1227772</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227774">bsc#1227774</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227779">bsc#1227779</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227780">bsc#1227780</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227783">bsc#1227783</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227786">bsc#1227786</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227787">bsc#1227787</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227790">bsc#1227790</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227792">bsc#1227792</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227796">bsc#1227796</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227797">bsc#1227797</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227798">bsc#1227798</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227800">bsc#1227800</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227802">bsc#1227802</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227806">bsc#1227806</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227808">bsc#1227808</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227810">bsc#1227810</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227812">bsc#1227812</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227813">bsc#1227813</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227814">bsc#1227814</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227816">bsc#1227816</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227820">bsc#1227820</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227823">bsc#1227823</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227824">bsc#1227824</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227828">bsc#1227828</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227829">bsc#1227829</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227836">bsc#1227836</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227846">bsc#1227846</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227849">bsc#1227849</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227851">bsc#1227851</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227862">bsc#1227862</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227864">bsc#1227864</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227865">bsc#1227865</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227866">bsc#1227866</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227870">bsc#1227870</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227884">bsc#1227884</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227886">bsc#1227886</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227891">bsc#1227891</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227893">bsc#1227893</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227899">bsc#1227899</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227900">bsc#1227900</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227910">bsc#1227910</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227913">bsc#1227913</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227917">bsc#1227917</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227919">bsc#1227919</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227920">bsc#1227920</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227921">bsc#1227921</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227922">bsc#1227922</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227923">bsc#1227923</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227924">bsc#1227924</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227925">bsc#1227925</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227927">bsc#1227927</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227928">bsc#1227928</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227931">bsc#1227931</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227932">bsc#1227932</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227933">bsc#1227933</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227935">bsc#1227935</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227936">bsc#1227936</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227938">bsc#1227938</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227941">bsc#1227941</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227942">bsc#1227942</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227944">bsc#1227944</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227945">bsc#1227945</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227947">bsc#1227947</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227948">bsc#1227948</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227949">bsc#1227949</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227950">bsc#1227950</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227952">bsc#1227952</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227953">bsc#1227953</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227954">bsc#1227954</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227956">bsc#1227956</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227957">bsc#1227957</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227963">bsc#1227963</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227964">bsc#1227964</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227965">bsc#1227965</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227968">bsc#1227968</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227969">bsc#1227969</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227970">bsc#1227970</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227971">bsc#1227971</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227972">bsc#1227972</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227975">bsc#1227975</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227976">bsc#1227976</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227981">bsc#1227981</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227982">bsc#1227982</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227985">bsc#1227985</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227986">bsc#1227986</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227987">bsc#1227987</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227988">bsc#1227988</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227989">bsc#1227989</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227990">bsc#1227990</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227991">bsc#1227991</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227992">bsc#1227992</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227993">bsc#1227993</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227995">bsc#1227995</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227996">bsc#1227996</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227997">bsc#1227997</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228000">bsc#1228000</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228002">bsc#1228002</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228003">bsc#1228003</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228004">bsc#1228004</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228005">bsc#1228005</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228006">bsc#1228006</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228007">bsc#1228007</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228008">bsc#1228008</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228009">bsc#1228009</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228010">bsc#1228010</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228011">bsc#1228011</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228013">bsc#1228013</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228014">bsc#1228014</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228015">bsc#1228015</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228019">bsc#1228019</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228020">bsc#1228020</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228025">bsc#1228025</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228028">bsc#1228028</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228035">bsc#1228035</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228037">bsc#1228037</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228038">bsc#1228038</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228039">bsc#1228039</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228040">bsc#1228040</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228045">bsc#1228045</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228054">bsc#1228054</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228055">bsc#1228055</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228056">bsc#1228056</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228060">bsc#1228060</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228061">bsc#1228061</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228062">bsc#1228062</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228063">bsc#1228063</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228064">bsc#1228064</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228066">bsc#1228066</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228067">bsc#1228067</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228068">bsc#1228068</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228071">bsc#1228071</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228079">bsc#1228079</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228090">bsc#1228090</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228114">bsc#1228114</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228140">bsc#1228140</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228190">bsc#1228190</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228191">bsc#1228191</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228195">bsc#1228195</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228202">bsc#1228202</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228226">bsc#1228226</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228235">bsc#1228235</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228237">bsc#1228237</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228247">bsc#1228247</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228327">bsc#1228327</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228328">bsc#1228328</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228330">bsc#1228330</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228403">bsc#1228403</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228405">bsc#1228405</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228408">bsc#1228408</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228409">bsc#1228409</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228410">bsc#1228410</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228418">bsc#1228418</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228440">bsc#1228440</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228459">bsc#1228459</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228462">bsc#1228462</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228470">bsc#1228470</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228518">bsc#1228518</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228520">bsc#1228520</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228530">bsc#1228530</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228561">bsc#1228561</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228565">bsc#1228565</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228580">bsc#1228580</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228581">bsc#1228581</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228591">bsc#1228591</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228599">bsc#1228599</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228617">bsc#1228617</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228625">bsc#1228625</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228626">bsc#1228626</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228633">bsc#1228633</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228640">bsc#1228640</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228644">bsc#1228644</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228649">bsc#1228649</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228655">bsc#1228655</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228665">bsc#1228665</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228672">bsc#1228672</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228680">bsc#1228680</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228705">bsc#1228705</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228723">bsc#1228723</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228743">bsc#1228743</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228756">bsc#1228756</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228801">bsc#1228801</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228850">bsc#1228850</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228857">bsc#1228857</a>
</li>


<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-8582">jsc#PED-8582</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-8690">jsc#PED-8690</a>
</li>

</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47086.html">CVE-2021-47086</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47103.html">CVE-2021-47103</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47186.html">CVE-2021-47186</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47402.html">CVE-2021-47402</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47546.html">CVE-2021-47546</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47547.html">CVE-2021-47547</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47588.html">CVE-2021-47588</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47590.html">CVE-2021-47590</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47591.html">CVE-2021-47591</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47593.html">CVE-2021-47593</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47598.html">CVE-2021-47598</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47599.html">CVE-2021-47599</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47606.html">CVE-2021-47606</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47622.html">CVE-2021-47622</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47623.html">CVE-2021-47623</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47624.html">CVE-2021-47624</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48713.html">CVE-2022-48713</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48730.html">CVE-2022-48730</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48732.html">CVE-2022-48732</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48749.html">CVE-2022-48749</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48756.html">CVE-2022-48756</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48773.html">CVE-2022-48773</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48774.html">CVE-2022-48774</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48775.html">CVE-2022-48775</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48776.html">CVE-2022-48776</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48777.html">CVE-2022-48777</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48778.html">CVE-2022-48778</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48780.html">CVE-2022-48780</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48783.html">CVE-2022-48783</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48784.html">CVE-2022-48784</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48785.html">CVE-2022-48785</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48786.html">CVE-2022-48786</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48787.html">CVE-2022-48787</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48788.html">CVE-2022-48788</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48789.html">CVE-2022-48789</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48790.html">CVE-2022-48790</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48791.html">CVE-2022-48791</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48792.html">CVE-2022-48792</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48793.html">CVE-2022-48793</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48794.html">CVE-2022-48794</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48796.html">CVE-2022-48796</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48797.html">CVE-2022-48797</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48798.html">CVE-2022-48798</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48799.html">CVE-2022-48799</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48800.html">CVE-2022-48800</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48801.html">CVE-2022-48801</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48802.html">CVE-2022-48802</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48803.html">CVE-2022-48803</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48804.html">CVE-2022-48804</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48805.html">CVE-2022-48805</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48806.html">CVE-2022-48806</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48807.html">CVE-2022-48807</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48809.html">CVE-2022-48809</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48810.html">CVE-2022-48810</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48811.html">CVE-2022-48811</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48812.html">CVE-2022-48812</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48813.html">CVE-2022-48813</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48814.html">CVE-2022-48814</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48815.html">CVE-2022-48815</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48816.html">CVE-2022-48816</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48817.html">CVE-2022-48817</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48818.html">CVE-2022-48818</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48820.html">CVE-2022-48820</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48821.html">CVE-2022-48821</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48822.html">CVE-2022-48822</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48823.html">CVE-2022-48823</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48824.html">CVE-2022-48824</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48825.html">CVE-2022-48825</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48826.html">CVE-2022-48826</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48827.html">CVE-2022-48827</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48828.html">CVE-2022-48828</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48829.html">CVE-2022-48829</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48830.html">CVE-2022-48830</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48831.html">CVE-2022-48831</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48834.html">CVE-2022-48834</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48835.html">CVE-2022-48835</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48836.html">CVE-2022-48836</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48837.html">CVE-2022-48837</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48838.html">CVE-2022-48838</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48839.html">CVE-2022-48839</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48840.html">CVE-2022-48840</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48841.html">CVE-2022-48841</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48842.html">CVE-2022-48842</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48843.html">CVE-2022-48843</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48844.html">CVE-2022-48844</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48846.html">CVE-2022-48846</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48847.html">CVE-2022-48847</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48849.html">CVE-2022-48849</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48850.html">CVE-2022-48850</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48851.html">CVE-2022-48851</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48852.html">CVE-2022-48852</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48853.html">CVE-2022-48853</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48855.html">CVE-2022-48855</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48856.html">CVE-2022-48856</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48857.html">CVE-2022-48857</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48858.html">CVE-2022-48858</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48859.html">CVE-2022-48859</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48860.html">CVE-2022-48860</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48861.html">CVE-2022-48861</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48862.html">CVE-2022-48862</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48863.html">CVE-2022-48863</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48864.html">CVE-2022-48864</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48866.html">CVE-2022-48866</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-1582.html">CVE-2023-1582</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-37453.html">CVE-2023-37453</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52435.html">CVE-2023-52435</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52573.html">CVE-2023-52573</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52580.html">CVE-2023-52580</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52591.html">CVE-2023-52591</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52735.html">CVE-2023-52735</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52751.html">CVE-2023-52751</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52762.html">CVE-2023-52762</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52775.html">CVE-2023-52775</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52812.html">CVE-2023-52812</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52857.html">CVE-2023-52857</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52863.html">CVE-2023-52863</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52885.html">CVE-2023-52885</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52886.html">CVE-2023-52886</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-25741.html">CVE-2024-25741</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26583.html">CVE-2024-26583</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26584.html">CVE-2024-26584</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26585.html">CVE-2024-26585</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26615.html">CVE-2024-26615</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26633.html">CVE-2024-26633</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26635.html">CVE-2024-26635</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26636.html">CVE-2024-26636</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26641.html">CVE-2024-26641</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26661.html">CVE-2024-26661</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26663.html">CVE-2024-26663</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26665.html">CVE-2024-26665</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26800.html">CVE-2024-26800</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26802.html">CVE-2024-26802</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26813.html">CVE-2024-26813</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26814.html">CVE-2024-26814</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26863.html">CVE-2024-26863</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26889.html">CVE-2024-26889</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26920.html">CVE-2024-26920</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26935.html">CVE-2024-26935</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-269355.html">CVE-2024-269355</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26961.html">CVE-2024-26961</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26976.html">CVE-2024-26976</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27015.html">CVE-2024-27015</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27019.html">CVE-2024-27019</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27020.html">CVE-2024-27020</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27025.html">CVE-2024-27025</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27065.html">CVE-2024-27065</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27402.html">CVE-2024-27402</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27437.html">CVE-2024-27437</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35805.html">CVE-2024-35805</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35819.html">CVE-2024-35819</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35837.html">CVE-2024-35837</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35853.html">CVE-2024-35853</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35854.html">CVE-2024-35854</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35855.html">CVE-2024-35855</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35889.html">CVE-2024-35889</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35890.html">CVE-2024-35890</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35893.html">CVE-2024-35893</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35899.html">CVE-2024-35899</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35934.html">CVE-2024-35934</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35949.html">CVE-2024-35949</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35961.html">CVE-2024-35961</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35979.html">CVE-2024-35979</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35995.html">CVE-2024-35995</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36000.html">CVE-2024-36000</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36004.html">CVE-2024-36004</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36288.html">CVE-2024-36288</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36889.html">CVE-2024-36889</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36901.html">CVE-2024-36901</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36902.html">CVE-2024-36902</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36909.html">CVE-2024-36909</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36910.html">CVE-2024-36910</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36911.html">CVE-2024-36911</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36912.html">CVE-2024-36912</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36913.html">CVE-2024-36913</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36914.html">CVE-2024-36914</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36919.html">CVE-2024-36919</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36923.html">CVE-2024-36923</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36924.html">CVE-2024-36924</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36926.html">CVE-2024-36926</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36939.html">CVE-2024-36939</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36941.html">CVE-2024-36941</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36942.html">CVE-2024-36942</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36944.html">CVE-2024-36944</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36946.html">CVE-2024-36946</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36947.html">CVE-2024-36947</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36950.html">CVE-2024-36950</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36952.html">CVE-2024-36952</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36955.html">CVE-2024-36955</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36959.html">CVE-2024-36959</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36974.html">CVE-2024-36974</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38548.html">CVE-2024-38548</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38555.html">CVE-2024-38555</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38558.html">CVE-2024-38558</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38559.html">CVE-2024-38559</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38570.html">CVE-2024-38570</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38586.html">CVE-2024-38586</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38588.html">CVE-2024-38588</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38598.html">CVE-2024-38598</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38628.html">CVE-2024-38628</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39276.html">CVE-2024-39276</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39371.html">CVE-2024-39371</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39463.html">CVE-2024-39463</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39472.html">CVE-2024-39472</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39475.html">CVE-2024-39475</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39482.html">CVE-2024-39482</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39487.html">CVE-2024-39487</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39488.html">CVE-2024-39488</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39490.html">CVE-2024-39490</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39493.html">CVE-2024-39493</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39494.html">CVE-2024-39494</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39497.html">CVE-2024-39497</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39499.html">CVE-2024-39499</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39500.html">CVE-2024-39500</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39501.html">CVE-2024-39501</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39502.html">CVE-2024-39502</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39505.html">CVE-2024-39505</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39506.html">CVE-2024-39506</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39507.html">CVE-2024-39507</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39508.html">CVE-2024-39508</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39509.html">CVE-2024-39509</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40900.html">CVE-2024-40900</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40901.html">CVE-2024-40901</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40902.html">CVE-2024-40902</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40903.html">CVE-2024-40903</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40904.html">CVE-2024-40904</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40906.html">CVE-2024-40906</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40908.html">CVE-2024-40908</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40909.html">CVE-2024-40909</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40911.html">CVE-2024-40911</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40912.html">CVE-2024-40912</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40916.html">CVE-2024-40916</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40919.html">CVE-2024-40919</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40923.html">CVE-2024-40923</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40924.html">CVE-2024-40924</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40927.html">CVE-2024-40927</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40929.html">CVE-2024-40929</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40931.html">CVE-2024-40931</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40932.html">CVE-2024-40932</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40934.html">CVE-2024-40934</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40935.html">CVE-2024-40935</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40937.html">CVE-2024-40937</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40940.html">CVE-2024-40940</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40941.html">CVE-2024-40941</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40942.html">CVE-2024-40942</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40943.html">CVE-2024-40943</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40945.html">CVE-2024-40945</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40953.html">CVE-2024-40953</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40954.html">CVE-2024-40954</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40956.html">CVE-2024-40956</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40958.html">CVE-2024-40958</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40959.html">CVE-2024-40959</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40960.html">CVE-2024-40960</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40961.html">CVE-2024-40961</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40966.html">CVE-2024-40966</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40967.html">CVE-2024-40967</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40970.html">CVE-2024-40970</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40972.html">CVE-2024-40972</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40976.html">CVE-2024-40976</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40977.html">CVE-2024-40977</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40981.html">CVE-2024-40981</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40982.html">CVE-2024-40982</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40984.html">CVE-2024-40984</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40987.html">CVE-2024-40987</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40988.html">CVE-2024-40988</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40989.html">CVE-2024-40989</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40990.html">CVE-2024-40990</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40994.html">CVE-2024-40994</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40998.html">CVE-2024-40998</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40999.html">CVE-2024-40999</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41002.html">CVE-2024-41002</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41004.html">CVE-2024-41004</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41006.html">CVE-2024-41006</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41009.html">CVE-2024-41009</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41011.html">CVE-2024-41011</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41012.html">CVE-2024-41012</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41013.html">CVE-2024-41013</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41014.html">CVE-2024-41014</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41015.html">CVE-2024-41015</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41016.html">CVE-2024-41016</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41017.html">CVE-2024-41017</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41040.html">CVE-2024-41040</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41041.html">CVE-2024-41041</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41044.html">CVE-2024-41044</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41048.html">CVE-2024-41048</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41057.html">CVE-2024-41057</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41058.html">CVE-2024-41058</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41059.html">CVE-2024-41059</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41063.html">CVE-2024-41063</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41064.html">CVE-2024-41064</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41066.html">CVE-2024-41066</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41069.html">CVE-2024-41069</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41070.html">CVE-2024-41070</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41071.html">CVE-2024-41071</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41072.html">CVE-2024-41072</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41076.html">CVE-2024-41076</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41078.html">CVE-2024-41078</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41081.html">CVE-2024-41081</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41087.html">CVE-2024-41087</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41090.html">CVE-2024-41090</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41091.html">CVE-2024-41091</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42070.html">CVE-2024-42070</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42079.html">CVE-2024-42079</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42093.html">CVE-2024-42093</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42096.html">CVE-2024-42096</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42105.html">CVE-2024-42105</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42122.html">CVE-2024-42122</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42124.html">CVE-2024-42124</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42145.html">CVE-2024-42145</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42161.html">CVE-2024-42161</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42224.html">CVE-2024-42224</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42230.html">CVE-2024-42230</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47086</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47103</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47186</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47402</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47546</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47546</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47547</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47588</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47590</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47591</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47593</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47598</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47599</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47606</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47622</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47623</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47624</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48713</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48730</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48732</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48749</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48756</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48773</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48774</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48775</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48776</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48777</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48778</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48780</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48783</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48784</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48785</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48786</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48787</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48787</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48788</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48788</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48789</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48789</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48790</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48790</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48791</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48791</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48792</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48792</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48793</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48793</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48794</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48796</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48796</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48797</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48798</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48799</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48800</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48801</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48802</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48803</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48804</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48805</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48806</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48807</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48809</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48809</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48810</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48811</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48812</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48813</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48814</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48815</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48816</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48817</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48818</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48820</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48821</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48822</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48822</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48823</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48824</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48824</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48825</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48826</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48827</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48828</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48829</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48830</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48831</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48834</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48834</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48835</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48835</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48836</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48836</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48837</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48837</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48838</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48838</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48839</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48839</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48840</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48840</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48841</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48841</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48842</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48842</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48843</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48843</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48844</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48844</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48846</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48846</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48847</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48847</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48849</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48849</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48850</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48850</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48851</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48851</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48852</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48852</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48853</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48853</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48855</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48855</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48856</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48856</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48857</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48857</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48858</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48858</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48859</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48859</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48860</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48860</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48861</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48861</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48862</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48862</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48863</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48863</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48864</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48864</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48866</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48866</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-1582</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-1582</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-37453</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-37453</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52435</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52435</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52573</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52580</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52591</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52735</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52751</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52762</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52775</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.9</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52812</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52857</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52863</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52885</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52886</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-25741</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26583</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26583</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26584</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26584</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26585</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26585</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26615</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26633</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26635</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26636</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26641</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26661</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26663</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26665</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26800</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26802</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26813</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26814</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26863</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26889</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26920</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26935</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26961</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26976</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27015</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27015</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27019</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27019</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27020</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27020</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27025</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27065</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27402</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27437</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35805</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35819</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35837</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35853</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35854</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35855</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35889</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35890</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35893</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35899</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35934</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35949</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35961</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35979</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35995</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36000</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36004</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36288</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36288</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36889</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36901</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36901</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36902</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36902</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36909</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36910</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36911</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36912</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36913</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36914</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36919</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36923</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36924</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36926</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36926</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36939</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36941</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36942</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36944</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36946</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36947</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36950</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36952</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36955</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36959</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36974</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38548</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38555</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38558</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38559</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38570</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38570</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38586</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38588</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38598</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38628</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39276</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39371</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39463</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39472</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39472</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39475</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39475</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39482</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39482</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39487</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39488</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39490</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39493</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39493</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39494</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39494</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39497</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39499</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39500</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39501</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39502</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39505</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39506</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39507</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39508</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39509</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40900</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40901</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40902</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40902</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40903</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40903</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40904</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40906</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40908</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40909</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40911</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40912</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40916</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40919</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40923</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40924</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40927</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40929</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40931</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40932</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40934</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40935</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40937</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40940</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40941</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40942</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40943</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40945</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40953</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40954</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40956</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40958</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40959</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40960</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40961</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40966</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40967</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40970</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40972</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40976</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40977</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40981</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40982</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40984</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40987</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40988</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40989</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40990</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40994</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40998</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40999</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41002</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41004</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41006</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41009</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41009</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41011</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41012</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41013</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41014</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41015</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41016</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41017</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41040</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41041</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41044</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41048</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41057</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41057</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41058</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41058</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41059</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41059</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41063</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41063</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41064</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41064</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41066</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41066</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41069</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41069</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41070</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41071</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41072</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41076</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41078</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41081</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41087</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41087</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41090</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41091</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42070</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42070</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42079</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42079</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42093</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42105</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42105</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42122</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42124</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42145</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42145</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42161</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42161</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42161</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42224</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42224</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42230</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42230</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42230</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">openSUSE Leap
15.5</li>

<li class="list-group-item">openSUSE Leap
Micro 5.5</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Live Patching 15-SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Micro 5.5</li>

<li class="list-group-item">SUSE Linux
Enterprise Real Time 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP5</li>

<li class="list-group-item">SUSE Real
Time Module 15-SP5</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves 311 vulnerabilities, contains two features
and has 50 security fixes can now be installed.</p>





<h2>Description:</h2>

<p>The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive
various security bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2021-47086: phonet/pep: refuse to enable an unbound pipe
(bsc#1220952).</li>
<li>CVE-2021-47103: net: sock: preserve kabi for sock
(bsc#1221010).</li>
<li>CVE-2021-47186: tipc: check for null after calling kmemdup
(bsc#1222702).</li>
<li>CVE-2021-47546: Kabi fix for ipv6: fix memory leak in
fib6_rule_suppress (bsc#1225504).</li>
<li>CVE-2021-47547: net: tulip: de4x5: fix the problem that the array
&#x27;lp-&gt;phy&#x27; may be out of bound (bsc#1225505).</li>
<li>CVE-2021-47588: sit: do not call ipip6_dev_free() from sit_init_net()
(bsc#1226568).</li>
<li>CVE-2021-47590: mptcp: fix deadlock in __mptcp_push_pending()
(bsc#1226565).</li>
<li>CVE-2021-47591: mptcp: remove tcp ulp setsockopt support
(bsc#1226570).</li>
<li>CVE-2021-47593: mptcp: clear &#x27;kern&#x27; flag from
fallback sockets (bsc#1226551).</li>
<li>CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1226574).</li>
<li>CVE-2021-47599: btrfs: use latest_dev in btrfs_show_devname
(bsc#1226571)</li>
<li>CVE-2021-47606: net: netlink: af_netlink: Prevent empty skb by adding
a check on len (bsc#1226555).</li>
<li>CVE-2021-47623: powerpc/fixmap: Fix VM debug warning on unmap
(bsc#1227919).</li>
<li>CVE-2022-48785: ipv6: mcast: use rcu-safe version of
ipv6_get_lladdr() (bsc#1227927)</li>
<li>CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling
ip[6]mr_free_table() on failure path (bsc#1227936).</li>
<li>CVE-2022-48850: net-sysfs: add check for netdevice being present to
speed_show (bsc#1228071)</li>
<li>CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets
(bsc#1228003).</li>
<li>CVE-2023-52435: net: prevent mss overflow in skb_segment()
(bsc#1220138).</li>
<li>CVE-2023-52573: net: rds: Fix possible NULL-pointer dereference
(bsc#1220869)</li>
<li>CVE-2023-52580: net/core: Fix ETH_P_1588 flow dissector
(bsc#1220876).</li>
<li>CVE-2023-52751: smb: client: fix use-after-free in
smb2_query_info_compound() (bsc#1225489).</li>
<li>CVE-2023-52775: net/smc: avoid data corruption caused by decline
(bsc#1225088).</li>
<li>CVE-2023-52812: drm/amd: check num of link levels when update pcie
param (bsc#1225564).</li>
<li>CVE-2023-52857: drm/mediatek: Fix coverity issue with unintentional
integer overflow (bsc#1225581).</li>
<li>CVE-2023-52863: hwmon: (axi-fan-control) Fix possible NULL pointer
dereference (bsc#1225586).</li>
<li>CVE-2024-26585: Fixed race between tx work scheduling and socket
close (bsc#1220187).</li>
<li>CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D
connection dump (bsc#1220942).</li>
<li>CVE-2024-26633: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in
ip6_tnl_parse_tlv_enc_lim() (bsc#1221647).</li>
<li>CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2
(bsc#1221656).</li>
<li>CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against
bonding changes (bsc#1221659).</li>
<li>CVE-2024-26641: ip6_tunnel: make sure to pull inner header in
__ip6_tnl_rcv() (bsc#1221654).</li>
<li>CVE-2024-26661: drm/amd/display: Add NULL test for &#x27;timing
generator&#x27; in (bsc#1222323)</li>
<li>CVE-2024-26663: tipc: Check the bearer type before calling
tipc_udp_nl_bearer_add() (bsc#1222326).</li>
<li>CVE-2024-26665: tunnels: fix out of bounds access when building IPv6
PMTU error (bsc#1222328).</li>
<li>CVE-2024-26802: stmmac: Clear variable when destroying workqueue
(bsc#1222799).</li>
<li>CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node()
(bsc#1223021).</li>
<li>CVE-2024-26961: mac802154: fix llsec key resources release in
mac802154_llsec_key_del (bsc#1223652).</li>
<li>CVE-2024-27015: netfilter: flowtable: incorrect pppoe tuple
(bsc#1223806).</li>
<li>CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in
__nft_obj_type_get() (bsc#1223813)</li>
<li>CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in
__nft_expr_type_get() (bsc#1223815)</li>
<li>CVE-2024-27025: nbd: null check for nla_nest_start
(bsc#1223778)</li>
<li>CVE-2024-27065: netfilter: nf_tables: do not compare internal table
flags on updates (bsc#1223836).</li>
<li>CVE-2024-27402: phonet/pep: fix racy skb_queue_empty() use
(bsc#1224414).</li>
<li>CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ
(bsc#1222625).</li>
<li>CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit
(bsc#1224743).</li>
<li>CVE-2024-35819: soc: fsl: qbman: Use raw spinlock for cgr_lock
(bsc#1224683).</li>
<li>CVE-2024-35837: net: mvpp2: clear BM pool before initialization
(bsc#1224500).</li>
<li>CVE-2024-35853: mlxsw: spectrum_acl_tcam: Fix memory leak during
rehash (bsc#1224604).</li>
<li>CVE-2024-35889: idpf: fix kernel panic on unknown packet types
(bsc#1224517).</li>
<li>CVE-2024-35890: gro: fix ownership transfer (bsc#1224516).</li>
<li>CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak
(bsc#1224512)</li>
<li>CVE-2024-35899: netfilter: nf_tables: flush pending destroy work
before exit_net release (bsc#1224499)</li>
<li>CVE-2024-35934: net/smc: reduce rtnl pressure in
smc_pnet_create_pnetids_list() (bsc#1224641)</li>
<li>CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata
blocks (bsc#1224700)</li>
<li>CVE-2024-35961: net/mlx5: Restore mistakenly dropped parts in
register devlink flow (bsc#1224585).</li>
<li>CVE-2024-35979: raid1: fix use-after-free for original bio in
raid1_write_request() (bsc#1224572).</li>
<li>CVE-2024-35995: ACPI: CPPC: Fix access width used for PCC registers
(bsc#1224557).</li>
<li>CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv
uncharge (bsc#1224548).</li>
<li>CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue
(bsc#1224545)</li>
<li>CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output()
(bsc#1225711)</li>
<li>CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in
fib6_rule_action() (bsc#1225719).</li>
<li>CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that
couldn&#x27;t be re-encrypted (bsc#1225744).</li>
<li>CVE-2024-36910: uio_hv_generic: Do not free decrypted memory
(bsc#1225717).</li>
<li>CVE-2024-36911: hv_netvsc: Do not free decrypted memory
(bsc#1225745).</li>
<li>CVE-2024-36912: Drivers: hv: vmbus: Track decrypted status in
vmbus_gpadl (bsc#1225752).</li>
<li>CVE-2024-36913: Drivers: hv: vmbus: Leak pages if
set_memory_encrypted() fails (bsc#1225753).</li>
<li>CVE-2024-36914: drm/amd/display: Skip on writeback when it&#x27;s
not applicable (bsc#1225757).</li>
<li>CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing
resources after upload (bsc#1225767).</li>
<li>CVE-2024-36923: fs/9p: fix uninitialized values during inode evict
(bsc#1225815).</li>
<li>CVE-2024-36939: nfs: Handle error of rpc_proc_register() in
nfs_net_init() (bsc#1225838).</li>
<li>CVE-2024-36946: phonet: fix rtm_phonet_notify() skb allocation
(bsc#1225851).</li>
<li>CVE-2024-36974: net/sched: taprio: always validate
TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519).</li>
<li>CVE-2024-38555: net/mlx5: Discard command completions in internal
error (bsc#1226607).</li>
<li>CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple
for ICMPv6 (bsc#1226783).</li>
<li>CVE-2024-38570: gfs2: Fix potential glock use-after-free on unmount
(bsc#1226775).</li>
<li>CVE-2024-38586: r8169: Fix possible ring buffer corruption on
fragmented Tx packets (bsc#1226750).</li>
<li>CVE-2024-38598: md: fix resync softlockup when bitmap size is less
than array size (bsc#1226757).</li>
<li>CVE-2024-38628: usb: gadget: u_audio: Fix race condition use of
controls after free during gadget unbind (bsc#1226911).</li>
<li>CVE-2024-39276: ext4: fix mb_cache_entry&#x27;s e_refcnt leak in
ext4_xattr_block_cache_find() (bsc#1226993).</li>
<li>CVE-2024-39371: io_uring: check for non-NULL file pointer in
io_file_can_poll() (bsc#1226990).</li>
<li>CVE-2024-39463: 9p: add missing locking around taking dentry fid list
(bsc#1227090).</li>
<li>CVE-2024-39472: xfs: fix log recovery buffer allocation for the
legacy h_size fixup (bsc#1227432).</li>
<li>CVE-2024-39482: bcache: fix variable length array abuse in btree_iter
(bsc#1227447).</li>
<li>CVE-2024-39487: bonding: Fix out-of-bounds read in
bond_option_arp_ip_targets_set() (bsc#1227573)</li>
<li>CVE-2024-39490: ipv6: sr: fix missing sk_buff release in
seg6_input_core (bsc#1227626).</li>
<li>CVE-2024-39493: crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak
(bsc#1227620).</li>
<li>CVE-2024-39494: ima: Fix use-after-free on a dentry&#x27;s
dname.name (bsc#1227716).</li>
<li>CVE-2024-39497: drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE,
MAP_PRIVATE) (bsc#1227722)</li>
<li>CVE-2024-39502: ionic: fix use after netif_napi_del()
(bsc#1227755).</li>
<li>CVE-2024-39506: liquidio: Adjust a NULL pointer handling path in
lio_vf_rep_copy_packet (bsc#1227729).</li>
<li>CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent
scenario (bsc#1227730).</li>
<li>CVE-2024-39508: io_uring/io-wq: Use set_bit() and test_bit() at
worker-&gt;flags (bsc#1227732).</li>
<li>CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in
non-allocated memory (bsc#1227762).</li>
<li>CVE-2024-40906: net/mlx5: Always stop health timer during driver
removal (bsc#1227763).</li>
<li>CVE-2024-40908: bpf: Set run context for rawtp test_run callback
(bsc#1227783).</li>
<li>CVE-2024-40909: bpf: Fix a potential use-after-free in
bpf_link_free() (bsc#1227798).</li>
<li>CVE-2024-40919: bnxt_en: Adjust logging of firmware messages in case
of released token in __hwrm_send() (bsc#1227779).</li>
<li>CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation
failure (bsc#1227786).</li>
<li>CVE-2024-40931: mptcp: ensure snd_una is properly initialized on
connect (bsc#1227780).</li>
<li>CVE-2024-40935: cachefiles: flush all requests after setting
CACHEFILES_DEAD (bsc#1227797).</li>
<li>CVE-2024-40937: gve: Clear napi-&gt;skb before
dev_kfree_skb_any() (bsc#1227836).</li>
<li>CVE-2024-40940: net/mlx5: Fix tainted pointer delete is case of flow
rules creation fail (bsc#1227800).</li>
<li>CVE-2024-40943: ocfs2: fix races between hole punching and AIO+DIO
(bsc#1227849).</li>
<li>CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in
kvm_vcpu_on_spin() (bsc#1227806).</li>
<li>CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)</li>
<li>CVE-2024-40958: netns: Make get_net_ns() handle zero refcount net
(bsc#1227812).</li>
<li>CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in
xfrm6_get_saddr() (bsc#1227884).</li>
<li>CVE-2024-40960: ipv6: prevent possible NULL dereference in
rt6_probe() (bsc#1227813).</li>
<li>CVE-2024-40961: ipv6: prevent possible NULL deref in fib6_nh_init()
(bsc#1227814).</li>
<li>CVE-2024-40966: kABI: tty: add the option to have a tty reject a new
ldisc (bsc#1227886).</li>
<li>CVE-2024-40967: serial: imx: Introduce timeout when waiting on
transmitter empty (bsc#1227891).</li>
<li>CVE-2024-40970: Avoid hw_desc array overrun in dw-axi-dmac
(bsc#1227899).</li>
<li>CVE-2024-40972: ext4: fold quota accounting into
ext4_xattr_inode_lookup_create() (bsc#1227910).</li>
<li>CVE-2024-40977: wifi: mt76: mt7921s: fix potential hung tasks during
chip recovery (bsc#1227950).</li>
<li>CVE-2024-40982: ssb: Fix potential NULL pointer dereference in
ssb_device_uevent() (bsc#1227865).</li>
<li>CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor
region on teardown (bsc#1227823).</li>
<li>CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store
(bsc#1227829).</li>
<li>CVE-2024-40998: ext4: fix uninitialized ratelimit_state-&gt;lock
access in __ext4_fill_super() (bsc#1227866).</li>
<li>CVE-2024-40999: net: ena: Add validation for completion descriptors
consistency (bsc#1227913).</li>
<li>CVE-2024-41006: netrom: Fix a memory leak in nr_heartbeat_expiry()
(bsc#1227862).</li>
<li>CVE-2024-41009: selftests/bpf: Add more ring buffer test coverage
(bsc#1228020).</li>
<li>CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race
is detected (bsc#1228247).</li>
<li>CVE-2024-41013: xfs: do not walk off the end of a directory data
block (bsc#1228405).</li>
<li>CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data
(bsc#1228408).</li>
<li>CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry()
(bsc#1228409).</li>
<li>CVE-2024-41016: ocfs2: add bounds checking to
ocfs2_xattr_find_entry() (bsc#1228410).</li>
<li>CVE-2024-41017: jfs: do not walk off the end of ealist
(bsc#1228403).</li>
<li>CVE-2024-41040: net/sched: Fix UAF when resolving a clash
(bsc#1228518)</li>
<li>CVE-2024-41041: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port()
(bsc#1228520)</li>
<li>CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed
packets (bsc#1228530).</li>
<li>CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg
(bsc#1228565)</li>
<li>CVE-2024-41057: cachefiles: fix slab-use-after-free in
cachefiles_withdraw_cookie() (bsc#1228462).</li>
<li>CVE-2024-41058: cachefiles: fix slab-use-after-free in
fscache_withdraw_volume() (bsc#1228459).</li>
<li>CVE-2024-41059: hfsplus: fix uninit-value in copy_name
(bsc#1228561).</li>
<li>CVE-2024-41063: Bluetooth: hci_core: cancel all works upon
hci_unregister_dev() (bsc#1228580)</li>
<li>CVE-2024-41064: powerpc/eeh: avoid possible crash when
edev-&gt;pdev changes (bsc#1228599).</li>
<li>CVE-2024-41066: ibmvnic: Add tx check to prevent skb leak
(bsc#1228640).</li>
<li>CVE-2024-41069: ASoC: topology: Fix route memory corruption
(bsc#1228644).</li>
<li>CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in
kvm_spapr_tce_attach_iommu_group() (bsc#1228581).</li>
<li>CVE-2024-41071: wifi: mac80211: Avoid address calculations via out of
bounds array indexing (bsc#1228625).</li>
<li>CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota
disable failure (bsc#1228655).</li>
<li>CVE-2024-41081: ila: block BH in ila_output()
(bsc#1228617)</li>
<li>CVE-2024-41090: tap: add missing verification for short frame
(bsc#1228328).</li>
<li>CVE-2024-41091: tun: add missing verification for short frame
(bsc#1228327).</li>
<li>CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE
on store to data registers (bsc#1228470)</li>
<li>CVE-2024-42079: gfs2: Fix NULL pointer dereference in gfs2_log_flush
(bsc#1228672).</li>
<li>CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on
stack (bsc#1228680).</li>
<li>CVE-2024-42096: x86: stop playing stack games in profile_pc()
(bsc#1228633).</li>
<li>CVE-2024-42122: drm/amd/display: Add NULL pointer check for kzalloc
(bsc#1228591)</li>
<li>CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible
(bsc#1228705)</li>
<li>CVE-2024-42145: IB/core: Implement a limit on UMAD receive List
(bsc#1228743)</li>
<li>CVE-2024-42161: Avoid uninitialized value in BPF_CORE_READ_BITFIELD
(bsc#1228756).</li>
<li>CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list
(bsc#1228723)</li>
<li>CVE-2024-42230: powerpc/pseries: Fix scv instruction crash with kexec
(bsc#1194869).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>ACPI: EC: Abort address space access upon error
(stable-fixes).</li>
<li>ACPI: EC: Avoid returning AE_OK on errors in address space handler
(stable-fixes).</li>
<li>ACPI: processor_idle: Fix invalid comparison with insertion sort for
latency (git-fixes).</li>
<li>ACPI: video: Add backlight=native quirk for Lenovo Slim 7 16ARH7
(stable-fixes).</li>
<li>ACPI: x86: Force StorageD3Enable on more products
(stable-fixes).</li>
<li>ACPI: x86: utils: Add Picasso to the list for forcing StorageD3Enable
(stable-fixes).</li>
<li>ALSA: dmaengine_pcm: terminate dmaengine before synchronize
(stable-fixes).</li>
<li>ALSA: dmaengine: Synchronize dma channel after drop()
(stable-fixes).</li>
<li>ALSA: emux: improve patch ioctl data validation
(stable-fixes).</li>
<li>ALSA: hda: conexant: Fix headset auto detect fail in the polling mode
(git-fixes).</li>
<li>ALSA: hda/realtek: Add more codec ID to no shutup pins list
(stable-fixes).</li>
<li>ALSA: hda/realtek: add quirk for Clevo V5[46]0TU
(stable-fixes).</li>
<li>ALSA: hda/realtek: Enable headset mic of JP-IK LEAP W502 with ALC897
(stable-fixes).</li>
<li>ALSA: hda/realtek: Enable headset mic on Positivo SU C1400
(stable-fixes).</li>
<li>ALSA: hda/realtek: Enable Mute LED on HP 250 G7
(stable-fixes).</li>
<li>ALSA: hda/realtek: fix mute/micmute LEDs do not work for EliteBook
645/665 G11 (stable-fixes).</li>
<li>ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book Pro
360 (stable-fixes).</li>
<li>ALSA: hda/realtek: Limit mic boost on VAIO PRO PX
(stable-fixes).</li>
<li>ALSA: hda/relatek: Enable Mute LED on HP Laptop 15-gw0xxx
(stable-fixes).</li>
<li>ALSA: pcm_dmaengine: Do not synchronize DMA channel when DMA is
paused (git-fixes).</li>
<li>ALSA: usb-audio: Add a quirk for Sonix HD USB Camera
(stable-fixes).</li>
<li>ALSA: usb-audio: Correct surround channels in UAC1 channel map
(git-fixes).</li>
<li>ALSA: usb-audio: Fix microphone sound on HD webcam
(stable-fixes).</li>
<li>ALSA: usb-audio: Move HD Webcam quirk to the right place
(git-fixes).</li>
<li>arm64: dts: allwinner: Pine H64: correctly remove reg_gmac_3v3
(git-fixes)</li>
<li>arm64: dts: hi3798cv200: fix the size of GICR (git-fixes)</li>
<li>arm64: dts: imx8qm-mek: fix gpio number for reg_usdhc2_vmmc
(git-fixes)</li>
<li>arm64: dts: microchip: sparx5: fix mdio reg (git-fixes)</li>
<li>arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK
(git-fixes)</li>
<li>arm64: dts: rockchip: Add sound-dai-cells for RK3368
(git-fixes)</li>
<li>arm64: dts: rockchip: fix PMIC interrupt pin on ROCK Pi E
(git-fixes)</li>
<li>arm64/io: add constant-argument check (bsc#1226502
git-fixes)</li>
<li>arm64/io: Provide a WC friendly __iowriteXX_copy()
(bsc#1226502)</li>
<li>arm64: tegra: Correct Tegra132 I2C alias (git-fixes)</li>
<li>ASoC: amd: Adjust error handling in case of absent codec device
(git-fixes).</li>
<li>ASoC: max98088: Check for clk_prepare_enable() error
(git-fixes).</li>
<li>ASoC: ti: davinci-mcasp: Set min period size using FIFO config
(stable-fixes).</li>
<li>ASoC: ti: omap-hdmi: Fix too long driver name
(stable-fixes).</li>
<li>batman-adv: bypass empty buckets in batadv_purge_orig_ref()
(stable-fixes).</li>
<li>blk-cgroup: dropping parent refcount after pd_free_fn() is done
(bsc#1224573).</li>
<li>block: do not add partitions if GD_SUPPRESS_PART_SCAN is set
(bsc#1227162).</li>
<li>block, loop: support partitions without scanning
(bsc#1227162).</li>
<li>Bluetooth: ath3k: Fix multiple issues reported by checkpatch.pl
(stable-fixes).</li>
<li>Bluetooth: btqca: use le32_to_cpu for ver.soc_id
(stable-fixes).</li>
<li>Bluetooth: hci_core: cancel all works upon hci_unregister_dev()
(stable-fixes).</li>
<li>Bluetooth: hci_qca: mark OF related data as maybe unused
(stable-fixes).</li>
<li>Bluetooth: hci_sync: Fix suspending with wrong filter policy
(git-fixes).</li>
<li>Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm
reboot (git-fixes).</li>
<li>bnxt_re: Fix imm_data endianness (git-fixes)</li>
<li>bpf: aggressively forget precise markings during state checkpointing
(bsc#1225903).</li>
<li>bpf: allow precision tracking for programs with subprogs
(bsc#1225903).</li>
<li>bpf: check bpf_func_state-&gt;callback_depth when pruning states
(bsc#1225903).</li>
<li>bpf: clean up visit_insn()&#x27;s instruction processing
(bsc#1225903).</li>
<li>bpf: correct loop detection for iterators convergence
(bsc#1225903).</li>
<li>bpf: encapsulate precision backtracking bookkeeping
(bsc#1225903).</li>
<li>bpf: ensure state checkpointing at iter_next() call sites
(bsc#1225903).</li>
<li>bpf: exact states comparison for iterator convergence checks
(bsc#1225903).</li>
<li>bpf: extract __check_reg_arg() utility function
(bsc#1225903).</li>
<li>bpf: extract same_callsites() as utility function
(bsc#1225903).</li>
<li>bpf: extract setup_func_entry() utility function
(bsc#1225903).</li>
<li>bpf: fix calculation of subseq_idx during precision backtracking
(bsc#1225903).</li>
<li>bpf: fix mark_all_scalars_precise use in mark_chain_precision
(bsc#1225903).</li>
<li>bpf: Fix memory leaks in __check_func_call (bsc#1225903).</li>
<li>bpf: fix propagate_precision() logic for inner frames
(bsc#1225903).</li>
<li>bpf: fix regs_exact() logic in regsafe() to remap IDs correctly
(bsc#1225903).</li>
<li>bpf: Fix to preserve reg parent/live fields when copying range info
(bsc#1225903).</li>
<li>bpf: generalize MAYBE_NULL vs non-MAYBE_NULL rule
(bsc#1225903).</li>
<li>bpf: improve precision backtrack logging (bsc#1225903).</li>
<li>bpf: Improve verifier u32 scalar equality checking
(bsc#1225903).</li>
<li>bpf: keep track of max number of bpf_loop callback iterations
(bsc#1225903).</li>
<li>bpf: maintain bitmasks across all active frames in
__mark_chain_precision (bsc#1225903).</li>
<li>bpf: mark relevant stack slots scratched for register read
instructions (bsc#1225903).</li>
<li>bpf: move explored_state() closer to the beginning of verifier.c
(bsc#1225903).</li>
<li>bpf: perform byte-by-byte comparison only when necessary in regsafe()
(bsc#1225903).</li>
<li>bpf: print full verifier states on infinite loop detection
(bsc#1225903).</li>
<li>bpf: regsafe() must not skip check_ids() (bsc#1225903).</li>
<li>bpf: reject non-exact register type matches in regsafe()
(bsc#1225903).</li>
<li>bpf: Remove unused insn_cnt argument from visit_[func_call_]insn()
(bsc#1225903).</li>
<li>bpf: reorganize struct bpf_reg_state fields (bsc#1225903).</li>
<li>bpf: Skip invalid kfunc call in backtrack_insn
(bsc#1225903).</li>
<li>bpf: states_equal() must build idmap for all function frames
(bsc#1225903).</li>
<li>bpf: stop setting precise in current state (bsc#1225903).</li>
<li>bpf: support precision propagation in the presence of subprogs
(bsc#1225903).</li>
<li>bpf: take into account liveness when propagating precision
(bsc#1225903).</li>
<li>bpf: teach refsafe() to take into account ID remapping
(bsc#1225903).</li>
<li>bpf: unconditionally reset backtrack_state masks on global func exit
(bsc#1225903).</li>
<li>bpf: use check_ids() for active_lock comparison
(bsc#1225903).</li>
<li>bpf: Use scalar ids in mark_chain_precision()
(bsc#1225903).</li>
<li>bpf: verify callbacks as if they are called unknown number of times
(bsc#1225903).</li>
<li>bpf: Verify scalar ids mapping in regsafe() using check_ids()
(bsc#1225903).</li>
<li>bpf: widening for callback iterators (bsc#1225903).</li>
<li>btrfs: add device major-minor info in the struct btrfs_device
(bsc#1227162).</li>
<li>btrfs: harden identification of a stale device
(bsc#1227162).</li>
<li>btrfs: match stale devices by dev_t (bsc#1227162).</li>
<li>btrfs: remove the cross file system checks from remap
(bsc#1227157).</li>
<li>btrfs: use dev_t to match device in device_matched
(bsc#1227162).</li>
<li>btrfs: validate device maj:min during open (bsc#1227162).</li>
<li>bytcr_rt5640 : inverse jack detect for Archos 101 cesium
(stable-fixes).</li>
<li>cachefiles: add output string to cachefiles_obj_[get|put]_ondemand_fd
(git-fixes).</li>
<li>can: kvaser_usb: Explicitly initialize family in leafimx driver_info
struct (git-fixes).</li>
<li>can: kvaser_usb: fix return value for hif_usb_send_regout
(stable-fixes).</li>
<li>ceph: fix incorrect kmalloc size of pagevec mempool
(bsc#1228418).</li>
<li>cgroup/cpuset: Prevent UAF in proc_cpuset_show()
(bsc#1228801).</li>
<li>checkpatch: really skip LONG_LINE_* when LONG_LINE is ignored
(git-fixes).</li>
<li>crypto: aead,cipher - zeroize key buffer after use
(stable-fixes).</li>
<li>crypto: ecdh - explicitly zeroize private_key
(stable-fixes).</li>
<li>crypto: ecdsa - Fix the public key format description
(git-fixes).</li>
<li>crypto: hisilicon/sec - Fix memory leak for sec resource release
(stable-fixes).</li>
<li>csky: ftrace: Drop duplicate implementation of
arch_check_ftrace_location() (git-fixes).</li>
<li>decompress_bunzip2: fix rare decompression failure
(git-fixes).</li>
<li>devres: Fix devm_krealloc() wasting memory (git-fixes).</li>
<li>devres: Fix memory leakage caused by driver API devm_free_percpu()
(git-fixes).</li>
<li>dma: fix call order in dmam_free_coherent (git-fixes).</li>
<li>docs: crypto: async-tx-api: fix broken code example
(git-fixes).</li>
<li>docs: Fix formatting of literal sections in fanotify docs
(stable-fixes).</li>
<li>drm/amd/amdgpu: Fix style errors in amdgpu_drv.c &amp;
amdgpu_device.c (stable-fixes).</li>
<li>drm/amd/display: Account for cursor prefetch BW in DML1 mode support
(stable-fixes).</li>
<li>drm/amd/display: Check for NULL pointer (stable-fixes).</li>
<li>drm/amd/display: Check index msg_id before read or write
(stable-fixes).</li>
<li>drm/amd/display: Check pipe offset before setting vblank
(stable-fixes).</li>
<li>drm/amd/display: Skip finding free audio for unknown engine_id
(stable-fixes).</li>
<li>drm/amdgpu/atomfirmware: fix parsing of vram_info
(stable-fixes).</li>
<li>drm/amdgpu/atomfirmware: silence UBSAN warning
(stable-fixes).</li>
<li>drm/amdgpu: avoid using null object of framebuffer
(stable-fixes).</li>
<li>drm/amdgpu: Check if NBIO funcs are NULL in amdgpu_device_baco_exit
(git-fixes).</li>
<li>drm/amdgpu: Fix pci state save during mode-1 reset
(git-fixes).</li>
<li>drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()
(git-fixes).</li>
<li>drm/amdgpu: fix uninitialized scalar variable warning
(stable-fixes).</li>
<li>drm/amdgpu: Fix uninitialized variable warnings
(stable-fixes).</li>
<li>drm/amdgpu: Initialize timestamp for some legacy SOCs
(stable-fixes).</li>
<li>drm/amdgpu: Remove GC HW IP 9.3.0 from noretry=1
(git-fixes).</li>
<li>drm/amd/pm: Fix aldebaran pcie speed reporting
(git-fixes).</li>
<li>drm/amd/pm: remove logically dead code for renoir
(git-fixes).</li>
<li>drm/dp_mst: Fix all mstb marked as not probed after suspend/resume
(git-fixes).</li>
<li>drm/etnaviv: do not block scheduler when GPU is still active
(stable-fixes).</li>
<li>drm/etnaviv: fix DMA direction handling for cached RW buffers
(git-fixes).</li>
<li>drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes
(git-fixes).</li>
<li>drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modes
(git-fixes).</li>
<li>drm/i915/gt: Do not consider preemption during execlists_dequeue for
gen8 (git-fixes).</li>
<li>drm/lima: fix shared irq handling on driver remove
(stable-fixes).</li>
<li>drm/lima: Mark simple_ondemand governor as softdep
(git-fixes).</li>
<li>drm/mediatek: Add OVL compatible name for MT8195
(git-fixes).</li>
<li>drm/meson: fix canvas release in bind function
(git-fixes).</li>
<li>drm/mgag200: Bind I2C lifetime to DRM device (git-fixes).</li>
<li>drm/mgag200: Set DDC timeout in milliseconds (git-fixes).</li>
<li>drm/mipi-dsi: Fix mipi_dsi_dcs_write_seq() macro definition format
(stable-fixes).</li>
<li>drm/mipi-dsi: Fix theoretical int overflow in
mipi_dsi_dcs_write_seq() (git-fixes).</li>
<li>drm/msm/dpu: drop validity checks for clear_pending_flush() ctl op
(git-fixes).</li>
<li>drm/msm/mdp5: Remove MDP_CAP_SRC_SPLIT from msm8x53_config
(git-fixes).</li>
<li>drm/nouveau/dispnv04: fix null pointer dereference in
nv17_tv_get_hd_modes (stable-fixes).</li>
<li>drm/nouveau/dispnv04: fix null pointer dereference in
nv17_tv_get_ld_modes (stable-fixes).</li>
<li>drm/nouveau: fix null pointer dereference in
nouveau_connector_get_modes (git-fixes).</li>
<li>drm/nouveau: prime: fix refcount underflow (git-fixes).</li>
<li>drm/panel: boe-tv101wum-nl6: Check for errors on the NOP in prepare()
(git-fixes).</li>
<li>drm/panel: boe-tv101wum-nl6: If prepare fails, disable GPIO before
regulators (git-fixes).</li>
<li>drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that
sleep (stable-fixes).</li>
<li>drm: panel-orientation-quirks: Add quirk for Valve Galileo
(stable-fixes).</li>
<li>drm/panfrost: Mark simple_ondemand governor as softdep
(git-fixes).</li>
<li>drm/qxl: Add check for drm_cvt_mode (git-fixes).</li>
<li>drm/radeon: check bo_va-&gt;bo is non-NULL before using it
(stable-fixes).</li>
<li>drm/radeon/radeon_display: Decrease the size of allocated memory
(stable-fixes).</li>
<li>drm/vmwgfx: Fix a deadlock in dma buf fence polling
(git-fixes).</li>
<li>drm/vmwgfx: Fix missing HYPERVISOR_GUEST dependency
(stable-fixes).</li>
<li>drm/vmwgfx: Fix overlay when using Screen Targets
(git-fixes).</li>
<li>eeprom: digsy_mtc: Fix 93xx46 driver probe failure
(git-fixes).</li>
<li>exfat: check if cluster num is valid (git-fixes).</li>
<li>exfat: simplify is_valid_cluster() (git-fixes).</li>
<li>filelock: add a new locks_inode_context accessor function
(git-fixes).</li>
<li>firmware: cs_dsp: Fix overflow checking of wmfw header
(git-fixes).</li>
<li>firmware: cs_dsp: Prevent buffer overrun when processing V2 alg
headers (git-fixes).</li>
<li>firmware: cs_dsp: Return error if block header overflows file
(git-fixes).</li>
<li>firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files
(git-fixes).</li>
<li>firmware: cs_dsp: Validate payload length before processing block
(git-fixes).</li>
<li>firmware: dmi: Stop decoding on broken entry
(stable-fixes).</li>
<li>firmware: turris-mox-rwtm: Do not complete if there are no waiters
(git-fixes).</li>
<li>firmware: turris-mox-rwtm: Fix checking return value of
wait_for_completion_timeout() (git-fixes).</li>
<li>firmware: turris-mox-rwtm: Initialize completion before mailbox
(git-fixes).</li>
<li>fix build warning</li>
<li>fs: allow cross-vfsmount reflink/dedupe (bsc#1227157).</li>
<li>ftrace: Fix possible use-after-free issue in ftrace_location()
(git-fixes).</li>
<li>fuse: verify {g,u}id mount options correctly
(bsc#1228191).</li>
<li>gpio: mc33880: Convert comma to semicolon (git-fixes).</li>
<li>hfsplus: fix to avoid false alarm of circular locking
(git-fixes).</li>
<li>hfsplus: fix uninit-value in copy_name (git-fixes).</li>
<li>HID: Add quirk for Logitech Casa touchpad (stable-fixes).</li>
<li>HID: wacom: Modify pen IDs (git-fixes).</li>
<li>hpet: Support 32-bit userspace (git-fixes).</li>
<li>hwmon: (adt7475) Fix default duty on fan is disabled
(git-fixes).</li>
<li>hwmon: (max6697) Fix swapped temp{1,8} critical alarms
(git-fixes).</li>
<li>hwmon: (max6697) Fix underflow when writing limit attributes
(git-fixes).</li>
<li>i2c: mark HostNotify target address as used (git-fixes).</li>
<li>i2c: rcar: bring hardware to known state when probing
(git-fixes).</li>
<li>i2c: tegra: Fix failure during probe deferral cleanup
(git-fixes)</li>
<li>i2c: tegra: Share same DMA channel for RX and TX
(bsc#1227661)</li>
<li>i2c: testunit: avoid re-issued work after read message
(git-fixes).</li>
<li>i2c: testunit: correct Kconfig description (git-fixes).</li>
<li>Input: elan_i2c - do not leave interrupt disabled on suspend failure
(git-fixes).</li>
<li>Input: elantech - fix touchpad state on resume for Lenovo N24
(stable-fixes).</li>
<li>Input: ff-core - prefer struct_size over open coded arithmetic
(stable-fixes).</li>
<li>Input: qt1050 - handle CHIP_ID reading error (git-fixes).</li>
<li>Input: silead - Always support 10 fingers (stable-fixes).</li>
<li>intel_th: pci: Add Granite Rapids SOC support
(stable-fixes).</li>
<li>intel_th: pci: Add Granite Rapids support (stable-fixes).</li>
<li>intel_th: pci: Add Lunar Lake support (stable-fixes).</li>
<li>intel_th: pci: Add Meteor Lake-S support (stable-fixes).</li>
<li>intel_th: pci: Add Sapphire Rapids SOC support
(stable-fixes).</li>
<li>iommu/arm-smmu-v3: Free MSIs in case of ENOMEM
(git-fixes).</li>
<li>ionic: clean interrupt before enabling queue to avoid credit race
(git-fixes).</li>
<li>jffs2: Fix potential illegal address access in jffs2_free_inode
(git-fixes).</li>
<li>jfs: Fix array-index-out-of-bounds in diFree (git-fixes).</li>
<li>jfs: xattr: fix buffer overflow for invalid xattr
(bsc#1227383).</li>
<li>kABI: bpf: bpf_reg_state reorganization kABI workaround
(bsc#1225903).</li>
<li>kABI: bpf: callback fixes kABI workaround (bsc#1225903).</li>
<li>kABI: bpf: struct bpf_{idmap,idset} kABI workaround
(bsc#1225903).</li>
<li>kABI: bpf: tmp_str_buf kABI workaround (bsc#1225903).</li>
<li>kABI: rtas: Workaround false positive due to lost definition
(bsc#1227487).</li>
<li>kabi/severities: ignore kABI for FireWire sound local symbols
(bsc#1208783)</li>
<li>kabi/severities: Ignore tpm_tis_core_init (bsc#1082555).</li>
<li>kabi/severity: add nvme common code The nvme common code is also
allowed to change the data structures, there are only internal users.</li>
<li>kabi: Use __iowriteXX_copy_inlined for in-kernel modules
(bsc#1226502)</li>
<li>kernel-binary: vdso: Own module_dir</li>
<li>kernel/sched: Remove dl_boosted flag comment (git fixes
(sched)).</li>
<li>knfsd: LOOKUP can return an illegal error value
(git-fixes).</li>
<li>kobject_uevent: Fix OOB access within zap_modalias_env()
(git-fixes).</li>
<li>kprobes: Make arch_check_ftrace_location static
(git-fixes).</li>
<li>KVM: nVMX: Clear EXIT_QUALIFICATION when injecting an EPT Misconfig
(git-fixes).</li>
<li>KVM: PPC: Book3S HV: Fix &quot;rm_exit&quot; entry in debugfs
timings (bsc#1194869).</li>
<li>KVM: PPC: Book3S HV: Fix the set_one_reg for MMCR3
(bsc#1194869).</li>
<li>KVM: PPC: Book3S HV Nested: L2 LPCR should inherit L1 LPES setting
(bsc#1194869).</li>
<li>KVM: PPC: Book3S HV: remove extraneous asterisk from
rm_host_ipi_action() comment (bsc#1194869).</li>
<li>KVM: PPC: Book3S: Suppress failed alloc warning in
H_COPY_TOFROM_GUEST (bsc#1194869).</li>
<li>KVM: PPC: Book3S: Suppress warnings when allocating too big memory
slots (bsc#1194869).</li>
<li>KVM: s390: fix LPSWEY handling (bsc#1227635 git-fixes).</li>
<li>KVM: SVM: Process ICR on AVIC IPI delivery failure due to invalid
target (git-fixes).</li>
<li>KVM: VMX: Report up-to-date exit qualification to userspace
(git-fixes).</li>
<li>KVM: x86: Add IBPB_BRTYPE support (bsc#1228079).</li>
<li>KVM: x86: Always sync PIR to IRR prior to scanning I/O APIC routes
(git-fixes).</li>
<li>KVM: x86: Bail from kvm_recalculate_phys_map() if x2APIC ID is
out-of-bounds (git-fixes).</li>
<li>KVM: x86: Disable APIC logical map if logical ID covers multiple MDAs
(git-fixes).</li>
<li>KVM: x86: Disable APIC logical map if vCPUs are aliased in logical
mode (git-fixes).</li>
<li>KVM: x86: Do not advertise guest.MAXPHYADDR as host.MAXPHYADDR in
CPUID (git-fixes).</li>
<li>KVM: x86: Explicitly skip optimized logical map setup if
vCPU&#x27;s LDR==0 (git-fixes).</li>
<li>KVM: x86: Explicitly track all possibilities for APIC map&#x27;s
logical modes (git-fixes).</li>
<li>KVM: x86: Fix broken debugregs ABI for 32 bit kernels
(git-fixes).</li>
<li>KVM: x86: Fix KVM_GET_MSRS stack info leak (git-fixes).</li>
<li>KVM: x86: Honor architectural behavior for aliased 8-bit APIC IDs
(git-fixes).</li>
<li>KVM: x86: Purge &quot;highest ISR&quot; cache when updating
APICv state (git-fixes).</li>
<li>KVM: x86: Save/restore all NMIs when multiple NMIs are pending
(git-fixes).</li>
<li>KVM: x86: Skip redundant x2APIC logical mode optimized cluster setup
(git-fixes).</li>
<li>leds: ss4200: Convert PCIBIOS_* return codes to errnos
(git-fixes).</li>
<li>leds: triggers: Flush pending brightness before activating trigger
(git-fixes).</li>
<li>leds: trigger: Unregister sysfs attributes before calling
deactivate() (git-fixes).</li>
<li>libceph: fix race between delayed_work() and ceph_monc_stop()
(bsc#1228190).</li>
<li>lib: objagg: Fix general protection fault (git-fixes).</li>
<li>lib: objagg: Fix spelling (git-fixes).</li>
<li>lib: test_objagg: Fix spelling (git-fixes).</li>
<li>lockd: set missing fl_flags field when retrieving args
(git-fixes).</li>
<li>lockd: use locks_inode_context helper (git-fixes).</li>
<li>Make AMD_HSMP=m and mark it unsupported in supported.conf
(jsc#PED-8582)</li>
<li>media: dvb: as102-fe: Fix as10x_register_addr packing
(stable-fixes).</li>
<li>media: dvbdev: Initialize sbuf (stable-fixes).</li>
<li>media: dvb-frontends: tda10048: Fix integer overflow
(stable-fixes).</li>
<li>media: dvb-frontends: tda18271c2dd: Remove casting during div
(stable-fixes).</li>
<li>media: dvb-usb: dib0700_devices: Add missing release_firmware()
(stable-fixes).</li>
<li>media: dvb-usb: Fix unexpected infinite loop in
dvb_usb_read_remote_control() (git-fixes).</li>
<li>media: dw2102: Do not translate i2c read into write
(stable-fixes).</li>
<li>media: dw2102: fix a potential buffer overflow
(git-fixes).</li>
<li>media: imon: Fix race getting ictx-&gt;lock
(git-fixes).</li>
<li>media: s2255: Use refcount_t instead of atomic_t for num_channels
(stable-fixes).</li>
<li>media: uvcvideo: Fix integer overflow calculating timestamp
(git-fixes).</li>
<li>media: uvcvideo: Override default flags (git-fixes).</li>
<li>media: venus: fix use after free in vdec_close
(git-fixes).</li>
<li>media: venus: flush all buffers in output plane streamoff
(git-fixes).</li>
<li>mei: demote client disconnect warning on suspend to debug
(stable-fixes).</li>
<li>mfd: omap-usb-tll: Use struct_size to allocate tll
(git-fixes).</li>
<li>mtd: partitions: redboot: Added conversion of operands to a larger
type (stable-fixes).</li>
<li>net/dcb: check for detached device before executing callbacks
(bsc#1215587).</li>
<li>netfilter: conntrack: ignore overly delayed tcp packets
(bsc#1223180).</li>
<li>netfilter: conntrack: prepare tcp_in_window for ternary return value
(bsc#1223180).</li>
<li>netfilter: conntrack: remove pr_debug callsites from tcp tracker
(bsc#1223180).</li>
<li>netfilter: conntrack: work around exceeded receive window
(bsc#1223180).</li>
<li>netfs, fscache: export fscache_put_volume() and add
fscache_try_get_volume() (bsc#1228459 bsc#1228462).</li>
<li>net: mana: Fix possible double free in error handling path
(git-fixes).</li>
<li>net: mana: Fix the extra HZ in mana_hwc_send_request
(git-fixes).</li>
<li>net: usb: qmi_wwan: add Telit FN912 compositions
(git-fixes).</li>
<li>net: usb: sr9700: fix uninitialized variable use in sr_mdio_read
(git-fixes).</li>
<li>nfc/nci: Add the inconsistency check between the input data length
and count (stable-fixes).</li>
<li>NFSD: Add an nfsd_file_fsync tracepoint (git-fixes).</li>
<li>NFSD: Add an NFSD_FILE_GC flag to enable nfsd_file garbage collection
(git-fixes).</li>
<li>nfsd: Add errno mapping for EREMOTEIO (git-fixes).</li>
<li>NFSD: Add nfsd_file_lru_dispose_list() helper (git-fixes).</li>
<li>nfsd: add some comments to nfsd_file_do_acquire
(git-fixes).</li>
<li>nfsd: allow nfsd_file_get to sanely handle a NULL pointer
(git-fixes).</li>
<li>nfsd: allow reaping files still under writeback
(git-fixes).</li>
<li>NFSD: Avoid calling fh_drop_write() twice in do_nfsd_create()
(git-fixes).</li>
<li>NFSD: Clean up nfsd3_proc_create() (git-fixes).</li>
<li>nfsd: Clean up nfsd_file_put() (git-fixes).</li>
<li>NFSD: Clean up nfsd_open_verified() (git-fixes).</li>
<li>NFSD: Clean up unused code after rhashtable conversion
(git-fixes).</li>
<li>NFSD: Convert filecache to rhltable (git-fixes).</li>
<li>NFSD: Convert the filecache to use rhashtable (git-fixes).</li>
<li>NFSD: De-duplicate hash bucket indexing (git-fixes).</li>
<li>nfsd: do not free files unconditionally in __nfsd_file_cache_purge
(git-fixes).</li>
<li>nfsd: do not fsync nfsd_files on last close (git-fixes).</li>
<li>nfsd: do not hand out delegation on setuid files being opened for
write (git-fixes).</li>
<li>nfsd: do not kill nfsd_files because of lease break error
(git-fixes).</li>
<li>nfsd: Do not leave work of closing files to a work queue
(bsc#1228140).</li>
<li>nfsd: do not take/put an extra reference when putting a file
(git-fixes).</li>
<li>NFSD enforce filehandle check for source file in COPY
(git-fixes).</li>
<li>NFSD: Ensure nf_inode is never dereferenced (git-fixes).</li>
<li>nfsd: fix handling of cached open files in nfsd4_open codepath
(git-fixes).</li>
<li>NFSD: Fix licensing header in filecache.c (git-fixes).</li>
<li>nfsd: fix net-namespace logic in __nfsd_file_cache_purge
(git-fixes).</li>
<li>nfsd: fix nfsd_file_unhash_and_dispose (git-fixes).</li>
<li>NFSD: Fix potential use-after-free in nfsd_file_put()
(git-fixes).</li>
<li>NFSD: Fix problem of COMMIT and NFS4ERR_DELAY in infinite loop
(git-fixes).</li>
<li>NFSD: Fix the filecache LRU shrinker (git-fixes).</li>
<li>nfsd: fix up the filecache laundrette scheduling
(git-fixes).</li>
<li>nfsd: fix use-after-free in nfsd_file_do_acquire tracepoint
(git-fixes).</li>
<li>NFSD: Flesh out a documenting comment for filecache.c
(git-fixes).</li>
<li>NFSD: handle errors better in write_ports_addfd()
(git-fixes).</li>
<li>NFSD: Instantiate a struct file when creating a regular NFSv4 file
(git-fixes).</li>
<li>NFSD: Leave open files out of the filecache LRU
(git-fixes).</li>
<li>nfsd: map EBADF (git-fixes).</li>
<li>NFSD: Move nfsd_file_trace_alloc() tracepoint (git-fixes).</li>
<li>NFSD: nfsd_file_hash_remove can compute hashval
(git-fixes).</li>
<li>nfsd: NFSD_FILE_KEY_INODE only needs to find GC&#x27;ed entries
(git-fixes).</li>
<li>NFSD: nfsd_file_put() can sleep (git-fixes).</li>
<li>NFSD: nfsd_file_unhash can compute hashval from nf-&gt;nf_inode
(git-fixes).</li>
<li>NFSD: No longer record nf_hashval in the trace log
(git-fixes).</li>
<li>NFSD: Pass the target nfsd_file to nfsd_commit()
(git-fixes).</li>
<li>nfsd: put the export reference in nfsd4_verify_deleg_dentry
(git-fixes).</li>
<li>NFSD: Record number of flush calls (git-fixes).</li>
<li>NFSD: Refactor nfsd_create_setattr() (git-fixes).</li>
<li>NFSD: Refactor __nfsd_file_close_inode() (git-fixes).</li>
<li>NFSD: Refactor nfsd_file_gc() (git-fixes).</li>
<li>NFSD: Refactor nfsd_file_lru_scan() (git-fixes).</li>
<li>NFSD: Refactor NFSv3 CREATE (git-fixes).</li>
<li>NFSD: Refactor NFSv4 OPEN(CREATE) (git-fixes).</li>
<li>NFSD: Remove do_nfsd_create() (git-fixes).</li>
<li>NFSD: Remove lockdep assertion from unhash_and_release_locked()
(git-fixes).</li>
<li>NFSD: Remove nfsd_file::nf_hashval (git-fixes).</li>
<li>nfsd: remove the pages_flushed statistic from filecache
(git-fixes).</li>
<li>nfsd: reorganize filecache.c (git-fixes).</li>
<li>NFSD: Replace the &quot;init once&quot; mechanism
(git-fixes).</li>
<li>NFSD: Report average age of filecache items (git-fixes).</li>
<li>NFSD: Report count of calls to nfsd_file_acquire()
(git-fixes).</li>
<li>NFSD: Report count of freed filecache items (git-fixes).</li>
<li>NFSD: Report filecache LRU size (git-fixes).</li>
<li>NFSD: Report the number of items evicted by the LRU walk
(git-fixes).</li>
<li>nfsd: Retry once in nfsd_open on an -EOPENSTALE return
(git-fixes).</li>
<li>nfsd: rework hashtable handling in nfsd_do_file_acquire
(git-fixes).</li>
<li>nfsd: rework refcounting in filecache (git-fixes).</li>
<li>NFSD: Separate tracepoints for acquire and create
(git-fixes).</li>
<li>NFSD: Set up an rhashtable for the filecache (git-fixes).</li>
<li>nfsd: silence extraneous printk on nfsd.ko insertion
(git-fixes).</li>
<li>NFSD: simplify per-net file cache management (git-fixes).</li>
<li>nfsd: simplify test_bit return in NFSD_FILE_KEY_FULL comparator
(git-fixes).</li>
<li>nfsd: simplify the delayed disposal list code (git-fixes).</li>
<li>NFSD: Trace filecache LRU activity (git-fixes).</li>
<li>NFSD: Trace filecache opens (git-fixes).</li>
<li>NFSD: verify the opened dentry after setting a delegation
(git-fixes).</li>
<li>NFSD: WARN when freeing an item still linked via nf_lru
(git-fixes).</li>
<li>NFSD: Write verifier might go backwards (git-fixes).</li>
<li>NFSD: Zero counters when the filecache is re-initialized
(git-fixes).</li>
<li>NFS: Fix READ_PLUS when server does not support OP_READ_PLUS
(git-fixes).</li>
<li>nfs: fix undefined behavior in nfs_block_bits()
(git-fixes).</li>
<li>nfs: keep server info for remounts (git-fixes).</li>
<li>nfs: Leave pages in the pagecache if readpage failed
(git-fixes).</li>
<li>NFSv4: Fixup smatch warning for ambiguous return
(git-fixes).</li>
<li>NFSv4.x: by default serialize open/close operations (bsc#1223863
bsc#1227362)</li>
<li>nilfs2: add missing check for inode numbers on directory entries
(git-fixes).</li>
<li>nilfs2: add missing check for inode numbers on directory entries
(stable-fixes).</li>
<li>nilfs2: avoid undefined behavior in nilfs_cnt32_ge macro
(git-fixes).</li>
<li>nilfs2: convert persistent object allocator to use kmap_local
(git-fixes).</li>
<li>nilfs2: fix incorrect inode allocation from reserved inodes
(git-fixes).</li>
<li>nilfs2: fix inode number range checks (git-fixes).</li>
<li>nilfs2: fix inode number range checks (stable-fixes).</li>
<li>nvme: adjust multiples of NVME_CTRL_PAGE_SIZE in offset
(git-fixes).</li>
<li>nvme-auth: alloc nvme_dhchap_key as single buffer
(git-fixes).</li>
<li>nvme-auth: allow mixing of secret and hash lengths
(git-fixes).</li>
<li>nvme-auth: use transformed key size to create resp
(git-fixes).</li>
<li>nvme: avoid double free special payload (git-fixes).</li>
<li>nvme: fixup comment for nvme RDMA Provider Type
(git-fixes).</li>
<li>nvme-multipath: find NUMA path only for online numa-node
(git-fixes).</li>
<li>nvme-pci: add missing condition check for existence of mapped data
(git-fixes).</li>
<li>nvme-pci: Fix the instructions for disabling power management
(git-fixes).</li>
<li>nvmet: always initialize cqe.result (git-fixes).</li>
<li>nvmet-auth: fix nvmet_auth hash error handling
(git-fixes).</li>
<li>nvmet: fix a possible leak when destroy a ctrl during qp
establishment (git-fixes).</li>
<li>nvme: use ctrl state accessor (bsc#1215492).</li>
<li>ocfs2: fix DIO failure due to insufficient transaction credits
(bsc#1216834).</li>
<li>ocfs2: remove redundant assignment to variable free_space
(bsc#1228409).</li>
<li>ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()
(bsc#1228410).</li>
<li>orangefs: fix out-of-bounds fsid access (git-fixes).</li>
<li>PCI: Add PCI_ERROR_RESPONSE and related definitions
(stable-fixes).</li>
<li>PCI/DPC: Fix use-after-free on concurrent DPC and hot-removal
(git-fixes).</li>
<li>PCI: Extend ACS configurability (bsc#1228090).</li>
<li>PCI: Fix resource double counting on remove &amp; rescan
(git-fixes).</li>
<li>PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN
(git-fixes).</li>
<li>PCI: Introduce cleanup helpers for device reference counts and locks
(git-fixes).</li>
<li>PCI: Introduce cleanup helpers for device reference counts and locks
(stable-fixes).</li>
<li>PCI: keystone: Do not enable BAR 0 for AM654x (git-fixes).</li>
<li>PCI: keystone: Fix NULL pointer dereference in case of DT error in
ks_pcie_setup_rc_app_regs() (git-fixes).</li>
<li>PCI: keystone: Relocate ks_pcie_set/clear_dbi_mode()
(git-fixes).</li>
<li>PCI/PM: Avoid D3cold for HP Pavilion 17 PC/1972 PCIe Ports
(git-fixes).</li>
<li>PCI/PM: Avoid D3cold for HP Pavilion 17 PC/1972 PCIe Ports
(stable-fixes).</li>
<li>PCI: rockchip: Use GPIOD_OUT_LOW flag while requesting ep_gpio
(git-fixes).</li>
<li>PCI: tegra194: Set EP alignment restriction for inbound ATU
(git-fixes).</li>
<li>pinctrl: core: fix possible memory leak when pinctrl_enable() fails
(git-fixes).</li>
<li>pinctrl: freescale: mxs: Fix refcount of child
(git-fixes).</li>
<li>pinctrl: single: fix possible memory leak when pinctrl_enable() fails
(git-fixes).</li>
<li>pinctrl: ti: ti-iodelay: fix possible memory leak when
pinctrl_enable() fails (git-fixes).</li>
<li>platform/chrome: cros_ec_debugfs: fix wrong EC message version
(git-fixes).</li>
<li>platform/chrome: cros_ec_proto: Lock device when updating MKBP
version (git-fixes).</li>
<li>platform/x86: dell-smbios-base: Use sysfs_emit()
(stable-fixes).</li>
<li>platform/x86: dell-smbios: Fix wrong token data in sysfs
(git-fixes).</li>
<li>platform/x86: lg-laptop: Change ACPI device id
(stable-fixes).</li>
<li>platform/x86: lg-laptop: Remove LGEX0815 hotkey handling
(stable-fixes).</li>
<li>platform/x86: touchscreen_dmi: Add info for GlobalSpace SolT IVW
11.6&quot; tablet (stable-fixes).</li>
<li>platform/x86: touchscreen_dmi: Add info for the EZpad 6s Pro
(stable-fixes).</li>
<li>platform/x86: wireless-hotkey: Add support for LG Airplane Button
(stable-fixes).</li>
<li>powerpc/cpuidle: Set CPUIDLE_FLAG_POLLING for snooze state
(bsc#1227121 ltc#207129).</li>
<li>powerpc: fix a file leak in kvm_vcpu_ioctl_enable_cap()
(bsc#1194869).</li>
<li>powerpc/kasan: Disable address sanitization in kexec paths
(bsc#1194869).</li>
<li>powerpc/pseries: Fix scv instruction crash with kexec
(bsc#1194869).</li>
<li>powerpc/rtas: clean up includes (bsc#1227487).</li>
<li>powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas()
(bsc#1227487).</li>
<li>power: supply: cros_usbpd: provide ID table for avoiding fallback
match (stable-fixes).</li>
<li>pwm: stm32: Always do lazy disabling (git-fixes).</li>
<li>RDMA/cache: Release GID table even if leak is detected
(git-fixes)</li>
<li>RDMA/device: Return error earlier if port in not valid
(git-fixes)</li>
<li>RDMA/hns: Check atomic wr length (git-fixes)</li>
<li>RDMA/hns: Fix insufficient extend DB for VFs. (git-fixes)</li>
<li>RDMA/hns: Fix mbx timing out before CMD execution is completed
(git-fixes)</li>
<li>RDMA/hns: Fix missing pagesize and alignment check in FRMR
(git-fixes)</li>
<li>RDMA/hns: Fix shift-out-bounds when max_inline_data is 0
(git-fixes)</li>
<li>RDMA/hns: Fix soft lockup under heavy CEQE load
(git-fixes)</li>
<li>RDMA/hns: Fix undifined behavior caused by invalid max_sge
(git-fixes)</li>
<li>RDMA/hns: Fix unmatch exception handling when init eq table fails
(git-fixes)</li>
<li>RDMA/iwcm: Fix a use-after-free related to destroying CM IDs
(git-fixes)</li>
<li>RDMA/mana_ib: Ignore optional access flags for MRs
(git-fixes).</li>
<li>RDMA/mlx4: Fix truncated output warning in alias_GUID.c
(git-fixes)</li>
<li>RDMA/mlx4: Fix truncated output warning in mad.c
(git-fixes)</li>
<li>RDMA/mlx5: Set mkeys for dmabuf at PAGE_SIZE (git-fixes)</li>
<li>RDMA/restrack: Fix potential invalid address access
(git-fixes)</li>
<li>RDMA/rxe: Do not set BTH_ACK_MASK for UC or UD QPs
(git-fixes)</li>
<li>regmap-i2c: Subtract reg size from max_write
(stable-fixes).</li>
<li>Revert &quot;ALSA: firewire-lib: obsolete workqueue for period
update&quot; (bsc#1208783).</li>
<li>Revert &quot;ALSA: firewire-lib: operate for period elapse event
in process context&quot; (bsc#1208783).</li>
<li>Revert &quot;leds: led-core: Fix refcount leak in
of_led_get()&quot; (git-fixes).</li>
<li>Revert &quot;usb: musb: da8xx: Set phy in OTG mode by
default&quot; (stable-fixes).</li>
<li>rpcrdma: fix handling for RDMA_CM_EVENT_DEVICE_REMOVAL
(git-fixes).</li>
<li>rpm/guards: fix precedence issue with control flow operator With perl
5.40 it report the following error on rpm/guards script: Possible precedence issue with control flow operator (exit) at scripts/guards line 208. Fix the issue by adding parenthesis around ternary operator.</li>
<li>rtc: cmos: Fix return value of nvmem callbacks
(git-fixes).</li>
<li>rtc: interface: Add RTC offset to alarm after fix-up
(git-fixes).</li>
<li>rtc: isl1208: Fix return value of nvmem callbacks
(git-fixes).</li>
<li>rtlwifi: rtl8192de: Style clean-ups (stable-fixes).</li>
<li>s390: Implement __iowrite32_copy() (bsc#1226502)</li>
<li>s390: Stop using weak symbols for __iowrite64_copy()
(bsc#1226502)</li>
<li>saa7134: Unchecked i2c_transfer function result fixed
(git-fixes).</li>
<li>sched/fair: Do not balance task to its current running CPU (git fixes
(sched)).</li>
<li>sched: Fix stop_one_cpu_nowait() vs hotplug (git fixes
(sched)).</li>
<li>scsi: lpfc: Allow DEVICE_RECOVERY mode after RSCN receipt if in
PRLI_ISSUE state (bsc#1228857).</li>
<li>scsi: lpfc: Cancel ELS WQE instead of issuing abort when SLI port is
inactive (bsc#1228857).</li>
<li>scsi: lpfc: Fix handling of fully recovered fabric node in dev_loss
callbk (bsc#1228857).</li>
<li>scsi: lpfc: Fix incorrect request len mbox field when setting
trunking via sysfs (bsc#1228857).</li>
<li>scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info
(bsc#1228857).</li>
<li>scsi: lpfc: Relax PRLI issue conditions after GID_FT response
(bsc#1228857).</li>
<li>scsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian
macro usages (bsc#1228857).</li>
<li>scsi: lpfc: Update lpfc version to 14.4.0.3 (bsc#1228857).</li>
<li>scsi: qla2xxx: Avoid possible run-time warning with long model_num
(bsc#1228850).</li>
<li>scsi: qla2xxx: Complete command early within lock
(bsc#1228850).</li>
<li>scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).</li>
<li>scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).</li>
<li>scsi: qla2xxx: During vport delete send async logout explicitly
(bsc#1228850).</li>
<li>scsi: qla2xxx: Fix debugfs output for fw_resource_count
(bsc#1228850).</li>
<li>scsi: qla2xxx: Fix flash read failure (bsc#1228850).</li>
<li>scsi: qla2xxx: Fix for possible memory corruption
(bsc#1228850).</li>
<li>scsi: qla2xxx: Fix optrom version displayed in FDMI
(bsc#1228850).</li>
<li>scsi: qla2xxx: Indent help text (bsc#1228850).</li>
<li>scsi: qla2xxx: Reduce fabric scan duplicate code
(bsc#1228850).</li>
<li>scsi: qla2xxx: Remove unused struct
&#x27;scsi_dif_tuple&#x27; (bsc#1228850).</li>
<li>scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds
(bsc#1228850).</li>
<li>scsi: qla2xxx: Unable to act on RSCN for port online
(bsc#1228850).</li>
<li>scsi: qla2xxx: Update version to 10.02.09.300-k
(bsc#1228850).</li>
<li>scsi: qla2xxx: Use QP lock to search for bsg
(bsc#1228850).</li>
<li>scsi: qla2xxx: validate nvme_local_port correctly
(bsc#1228850).</li>
<li>selftests/bpf: Add a selftest for checking subreg equality
(bsc#1225903).</li>
<li>selftests/bpf: add pre bpf_prog_test_run_opts() callback for
test_loader (bsc#1225903).</li>
<li>selftests/bpf: add precision propagation tests in the presence of
subprogs (bsc#1225903).</li>
<li>selftests/bpf: Add pruning test case for bpf_spin_lock
(bsc#1225903).</li>
<li>selftests/bpf: Check if mark_chain_precision() follows scalar ids
(bsc#1225903).</li>
<li>selftests/bpf: check if max number of bpf_loop iterations is tracked
(bsc#1225903).</li>
<li>selftests/bpf: fix __retval() being always ignored
(bsc#1225903).</li>
<li>selftests/bpf: fix unpriv_disabled check in test_verifier
(bsc#1225903).</li>
<li>selftests/bpf: __imm_insn &amp; __imm_const macro for bpf_misc.h
(bsc#1225903).</li>
<li>selftests/bpf: make test_align selftest more robust
(bsc#1225903).</li>
<li>selftests/bpf: populate map_array_ro map for verifier_array_access
test (bsc#1225903).</li>
<li>selftests/bpf: prog_tests entry point for migrated test_verifier
tests (bsc#1225903).</li>
<li>selftests/bpf: Report program name on parse_test_spec error
(bsc#1225903).</li>
<li>selftests/bpf: Support custom per-test flags and multiple expected
messages (bsc#1225903).</li>
<li>selftests/bpf: test case for callback_depth states pruning logic
(bsc#1225903).</li>
<li>selftests/bpf: test case for relaxed prunning of active_lock.id
(bsc#1225903).</li>
<li>selftests/bpf: test cases for regsafe() bug skipping check_id()
(bsc#1225903).</li>
<li>selftests/bpf: Tests execution support for test_loader.c
(bsc#1225903).</li>
<li>selftests/bpf: tests for iterating callbacks
(bsc#1225903).</li>
<li>selftests/bpf: test widening for iterating callbacks
(bsc#1225903).</li>
<li>selftests/bpf: track string payload offset as scalar in strobemeta
(bsc#1225903).</li>
<li>selftests/bpf: Unprivileged tests for test_loader.c
(bsc#1225903).</li>
<li>selftests/bpf: Verify copy_register_state() preserves parent/live
fields (bsc#1225903).</li>
<li>selftests/bpf: verify states_equal() maintains idmap across all
frames (bsc#1225903).</li>
<li>selftests/bpf: Verify that check_ids() is used for scalars in
regsafe() (bsc#1225903).</li>
<li>selftests/sigaltstack: Fix ppc64 GCC build (git-fixes).</li>
<li>soc: ti: wkup_m3_ipc: Send NULL dummy message instead of pointer
message (stable-fixes).</li>
<li>spi: imx: Do not expect DMA for i.MX{25,35,50,51,53} cspi devices
(stable-fixes).</li>
<li>spi: mux: set ctlr-&gt;bits_per_word_mask
(stable-fixes).</li>
<li>string.h: Introduce memtostr() and memtostr_pad()
(bsc#1228850).</li>
<li>SUNRPC: avoid soft lockup when transmitting UDP to reachable server
(bsc#1225272).</li>
<li>SUNRPC: Fix gss_free_in_token_pages() (git-fixes).</li>
<li>SUNRPC: Fix loop termination condition in gss_free_in_token_pages()
(git-fixes).</li>
<li>sunrpc: fix NFSACL RPC retry on soft mount (git-fixes).</li>
<li>SUNRPC: return proper error from gss_wrap_req_priv
(git-fixes).</li>
<li>supported.conf:</li>
<li>tpm: Allow system suspend to continue when TPM suspend fails
(bsc#1082555).</li>
<li>tpm: Prevent hwrng from activating during resume
(bsc#1082555).</li>
<li>tpm_tis: Resend command to recover from data transfer errors
(bsc#1082555).</li>
<li>tpm_tis: Use tpm_chip_{start,stop} decoration inside tpm_tis_resume
(bsc#1082555).</li>
<li>tpm, tpm: Implement usage counter for locality
(bsc#1082555).</li>
<li>tpm, tpm_tis: Avoid cache incoherency in test for interrupts
(bsc#1082555).</li>
<li>tpm, tpm_tis: Claim locality before writing interrupt registers
(bsc#1082555).</li>
<li>tpm, tpm_tis: Claim locality in interrupt handler
(bsc#1082555).</li>
<li>tpm, tpm_tis: Claim locality when interrupts are reenabled on resume
(bsc#1082555).</li>
<li>tpm, tpm_tis: correct tpm_tis_flags enumeration values
(bsc#1082555).</li>
<li>tpm, tpm_tis: Do not skip reset of original interrupt vector
(bsc#1082555).</li>
<li>tpm, tpm_tis: Only handle supported interrupts
(bsc#1082555).</li>
<li>tracing: Build event generation tests only as modules
(git-fixes).</li>
<li>tracing/net_sched: NULL pointer dereference in
perf_trace_qdisc_reset() (git-fixes).</li>
<li>tracing/osnoise: Add osnoise/options file (bsc#1228330)</li>
<li>tracing/osnoise: Add OSNOISE_WORKLOAD option (bsc#1228330)</li>
<li>tracing/osnoise: Do not follow tracing_cpumask
(bsc#1228330)</li>
<li>tracing/osnoise: Fix notify new tracing_max_latency
(bsc#1228330)</li>
<li>tracing/osnoise: Make osnoise_instances static
(bsc#1228330)</li>
<li>tracing/osnoise: Split workload start from the tracer start
(bsc#1228330)</li>
<li>tracing/osnoise: Support a list of trace_array *tr
(bsc#1228330)</li>
<li>tracing/osnoise: Use built-in RCU list checking
(bsc#1228330)</li>
<li>tracing/timerlat: Notify new max thread latency
(bsc#1228330)</li>
<li>USB: Add USB_QUIRK_NO_SET_INTF quirk for START BP-850k
(stable-fixes).</li>
<li>usb: cdns3: allocate TX FIFO size according to composite EP number
(git-fixes).</li>
<li>usb: cdns3: fix incorrect calculation of ep_buf_size when more than
one config (git-fixes).</li>
<li>usb: cdns3: fix iso transfer error when mult is not zero
(git-fixes).</li>
<li>usb: cdns3: improve handling of unaligned address case
(git-fixes).</li>
<li>usb: cdns3: optimize OUT transfer by copying only actual received
data (git-fixes).</li>
<li>usb: cdns3: skip set TRB_IOC when usb_request: no_interrupt is true
(git-fixes).</li>
<li>USB: core: Fix duplicate endpoint bug by clearing reserved bits in
the descriptor (git-fixes).</li>
<li>usb: dwc3: gadget: Do not delay End Transfer on delayed_status
(git-fixes).</li>
<li>usb: dwc3: gadget: Force sending delayed status during soft
disconnect (git-fixes).</li>
<li>usb: dwc3: gadget: Synchronize IRQ between soft connect/disconnect
(git-fixes).</li>
<li>usb: gadget: call usb_gadget_check_config() to verify UDC capability
(git-fixes).</li>
<li>usb: gadget: configfs: Prevent OOB read/write in usb_string_copy()
(stable-fixes).</li>
<li>usb: gadget: printer: SS+ support (stable-fixes).</li>
<li>usb: misc: uss720: check for incompatible versions of the Belkin
F5U002 (stable-fixes).</li>
<li>USB: serial: mos7840: fix crash on resume (git-fixes).</li>
<li>USB: serial: option: add Fibocom FM350-GL (stable-fixes).</li>
<li>USB: serial: option: add Netprisma LCUK54 series modules
(stable-fixes).</li>
<li>USB: serial: option: add Rolling RW350-GL variants
(stable-fixes).</li>
<li>USB: serial: option: add support for Foxconn T99W651
(stable-fixes).</li>
<li>USB: serial: option: add Telit FN912 rmnet compositions
(stable-fixes).</li>
<li>USB: serial: option: add Telit generic core-dump composition
(stable-fixes).</li>
<li>usb: typec: tcpm: clear pd_event queue in PORT_RESET
(git-fixes).</li>
<li>usb: xhci-plat: Do not include xhci.h (git-fixes).</li>
<li>USB: xhci-plat: fix legacy PHY double init (git-fixes).</li>
<li>wifi: ath11k: fix wrong handling of CCMP256 and GCMP ciphers
(git-fixes).</li>
<li>wifi: brcmsmac: LCN PHY code is used for BCM4313 2G-only device
(git-fixes).</li>
<li>wifi: cfg80211: fix typo in cfg80211_calculate_bitrate_he()
(git-fixes).</li>
<li>wifi: cfg80211: handle 2x996 RU allocation in
cfg80211_calculate_bitrate_he() (git-fixes).</li>
<li>wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values
(git-fixes).</li>
<li>wifi: cfg80211: wext: add extra SIOCSIWSCAN data check
(stable-fixes).</li>
<li>wifi: iwlwifi: mvm: d3: fix WoWLAN command version lookup
(stable-fixes).</li>
<li>wifi: iwlwifi: mvm: Handle BIGTK cipher in kek_kck cmd
(stable-fixes).</li>
<li>wifi: iwlwifi: mvm: properly set 6 GHz channel direct probe option
(stable-fixes).</li>
<li>wifi: mac80211: disable softirqs for queued frame handling
(git-fixes).</li>
<li>wifi: mac80211: fix UBSAN noise in ieee80211_prep_hw_scan()
(stable-fixes).</li>
<li>wifi: mac80211: handle tasklet frames before stopping
(stable-fixes).</li>
<li>wifi: mac80211: mesh: init nonpeer_pm to active by default in mesh
sdata (stable-fixes).</li>
<li>wifi: mt76: replace skb_put with skb_put_zero
(stable-fixes).</li>
<li>wifi: mwifiex: Fix interface type change (git-fixes).</li>
<li>wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter()
(git-fixes).</li>
<li>wifi: wilc1000: fix ies_len type in connect path
(git-fixes).</li>
<li>workqueue: Improve scalability of workqueue watchdog touch
(bsc#1193454).</li>
<li>workqueue: wq_watchdog_touch is always called with valid CPU
(bsc#1193454).</li>
<li>x86/amd_nb: Use Family 19h Models 60h-7Fh Function 4 IDs
(git-fixes).</li>
<li>x86/apic: Force native_apic_mem_read() to use the MOV instruction
(git-fixes).</li>
<li>x86/bhi: Avoid warning in #DB handler due to BHI mitigation
(git-fixes).</li>
<li>x86/bugs: Remove default case for fully switched enums
(bsc#1227900).</li>
<li>x86/fpu: Fix AMD X86_BUG_FXSAVE_LEAK fixup (git-fixes).</li>
<li>x86/ibt,ftrace: Search for <strong>fentry</strong>
location (git-fixes).</li>
<li>x86/Kconfig: Transmeta Crusoe is CPU family 5, not 6
(git-fixes).</li>
<li>x86/mm: Allow guest.enc_status_change_prepare() to fail
(git-fixes).</li>
<li>x86/mm: Fix enc_status_change_finish_noop() (git-fixes).</li>
<li>x86/purgatory: Switch to the position-independent small code model
(git-fixes).</li>
<li>x86/srso: Move retbleed IBPB check into existing
&#x27;has_microcode&#x27; code block (bsc#1227900).</li>
<li>x86/srso: Remove &#x27;pred_cmd&#x27; label
(bsc#1227900).</li>
<li>x86: Stop using weak symbols for __iowrite32_copy()
(bsc#1226502)</li>
<li>x86/tdx: Fix race between set_memory_encrypted() and
load_unaligned_zeropad() (git-fixes).</li>
<li>xfs: Add cond_resched to block unmap range and reflink remap path
(bsc#1228226).</li>
<li>xhci: Apply broken streams quirk to Etron EJ188 xHCI host
(stable-fixes).</li>
<li>xhci: Apply reset resume quirk to Etron EJ188 xHCI host
(stable-fixes).</li>
<li>xhci: Set correct transferred length for cancelled bulk transfers
(stable-fixes).</li>
</ul>




<h2>Special Instructions and Notes:</h2>
<ul>


<li>Please reboot the system after installing this
update.</li>


</ul>


<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
openSUSE Leap 15.5


<br/>
<code>zypper in -t patch SUSE-2024-2894=1
openSUSE-SLE-15.5-2024-2894=1</code>



</li>

<li class="list-group-item">
openSUSE Leap Micro 5.5


<br/>
<code>zypper in -t patch
openSUSE-Leap-Micro-5.5-2024-2894=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Micro 5.5


<br/>
<code>zypper in -t patch
SUSE-SLE-Micro-5.5-2024-2894=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Live Patching 15-SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Live-Patching-15-SP5-2024-2894=1</code>



</li>

<li class="list-group-item">
SUSE Real Time Module 15-SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-RT-15-SP5-2024-2894=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
openSUSE Leap 15.5 (noarch)
<ul>


<li>kernel-source-rt-5.14.21-150500.13.64.1</li>


<li>kernel-devel-rt-5.14.21-150500.13.64.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.5 (x86_64)
<ul>


<li>kernel-rt-livepatch-5.14.21-150500.13.64.1</li>


<li>ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.64.1</li>


<li>cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.64.1</li>


<li>kernel-rt_debug-devel-5.14.21-150500.13.64.1</li>


<li>kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource-1-150500.11.3.1</li>


<li>ocfs2-kmp-rt-5.14.21-150500.13.64.1</li>


<li>gfs2-kmp-rt-5.14.21-150500.13.64.1</li>


<li>kernel-rt_debug-debuginfo-5.14.21-150500.13.64.1</li>


<li>kernel-rt-optional-debuginfo-5.14.21-150500.13.64.1</li>


<li>kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo-1-150500.11.3.1</li>


<li>reiserfs-kmp-rt-5.14.21-150500.13.64.1</li>


<li>kernel-rt-devel-debuginfo-5.14.21-150500.13.64.1</li>


<li>kernel-rt-devel-5.14.21-150500.13.64.1</li>


<li>kernel-rt-debuginfo-5.14.21-150500.13.64.1</li>


<li>kselftests-kmp-rt-debuginfo-5.14.21-150500.13.64.1</li>


<li>kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.64.1</li>


<li>kernel-rt_debug-debugsource-5.14.21-150500.13.64.1</li>


<li>cluster-md-kmp-rt-5.14.21-150500.13.64.1</li>


<li>kernel-rt_debug-livepatch-devel-5.14.21-150500.13.64.1</li>


<li>kernel-rt_debug-vdso-5.14.21-150500.13.64.1</li>


<li>reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.64.1</li>


<li>kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.64.1</li>


<li>gfs2-kmp-rt-debuginfo-5.14.21-150500.13.64.1</li>


<li>dlm-kmp-rt-5.14.21-150500.13.64.1</li>


<li>kernel-rt-optional-5.14.21-150500.13.64.1</li>


<li>kernel-rt-debugsource-5.14.21-150500.13.64.1</li>


<li>dlm-kmp-rt-debuginfo-5.14.21-150500.13.64.1</li>


<li>kernel-rt-livepatch-devel-5.14.21-150500.13.64.1</li>


<li>kernel-rt-vdso-debuginfo-5.14.21-150500.13.64.1</li>


<li>kernel-syms-rt-5.14.21-150500.13.64.1</li>


<li>kernel-rt-extra-5.14.21-150500.13.64.1</li>


<li>kernel-livepatch-5_14_21-150500_13_64-rt-1-150500.11.3.1</li>


<li>kselftests-kmp-rt-5.14.21-150500.13.64.1</li>


<li>kernel-rt-extra-debuginfo-5.14.21-150500.13.64.1</li>


<li>kernel-rt-vdso-5.14.21-150500.13.64.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.5 (nosrc x86_64)
<ul>


<li>kernel-rt_debug-5.14.21-150500.13.64.1</li>


<li>kernel-rt-5.14.21-150500.13.64.1</li>

</ul>
</li>



<li>
openSUSE Leap Micro 5.5 (nosrc x86_64)
<ul>


<li>kernel-rt-5.14.21-150500.13.64.1</li>

</ul>
</li>

<li>
openSUSE Leap Micro 5.5 (x86_64)
<ul>


<li>kernel-rt-debuginfo-5.14.21-150500.13.64.1</li>


<li>kernel-rt-debugsource-5.14.21-150500.13.64.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Micro 5.5 (nosrc x86_64)
<ul>


<li>kernel-rt-5.14.21-150500.13.64.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro 5.5 (x86_64)
<ul>


<li>kernel-rt-debuginfo-5.14.21-150500.13.64.1</li>


<li>kernel-rt-debugsource-5.14.21-150500.13.64.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro 5.5 (noarch)
<ul>


<li>kernel-source-rt-5.14.21-150500.13.64.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Live Patching 15-SP5 (x86_64)
<ul>


<li>kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource-1-150500.11.3.1</li>


<li>kernel-livepatch-5_14_21-150500_13_64-rt-1-150500.11.3.1</li>


<li>kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo-1-150500.11.3.1</li>

</ul>
</li>



<li>
SUSE Real Time Module 15-SP5 (x86_64)
<ul>


<li>ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.64.1</li>


<li>cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.64.1</li>


<li>kernel-rt_debug-devel-5.14.21-150500.13.64.1</li>


<li>ocfs2-kmp-rt-5.14.21-150500.13.64.1</li>


<li>gfs2-kmp-rt-5.14.21-150500.13.64.1</li>


<li>kernel-rt_debug-debuginfo-5.14.21-150500.13.64.1</li>


<li>kernel-rt-devel-debuginfo-5.14.21-150500.13.64.1</li>


<li>kernel-rt-devel-5.14.21-150500.13.64.1</li>


<li>kernel-rt-debuginfo-5.14.21-150500.13.64.1</li>


<li>kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.64.1</li>


<li>kernel-rt_debug-debugsource-5.14.21-150500.13.64.1</li>


<li>cluster-md-kmp-rt-5.14.21-150500.13.64.1</li>


<li>kernel-rt_debug-vdso-5.14.21-150500.13.64.1</li>


<li>kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.64.1</li>


<li>gfs2-kmp-rt-debuginfo-5.14.21-150500.13.64.1</li>


<li>dlm-kmp-rt-5.14.21-150500.13.64.1</li>


<li>kernel-rt-debugsource-5.14.21-150500.13.64.1</li>


<li>dlm-kmp-rt-debuginfo-5.14.21-150500.13.64.1</li>


<li>kernel-rt-vdso-debuginfo-5.14.21-150500.13.64.1</li>


<li>kernel-syms-rt-5.14.21-150500.13.64.1</li>


<li>kernel-rt-vdso-5.14.21-150500.13.64.1</li>

</ul>
</li>

<li>
SUSE Real Time Module 15-SP5 (noarch)
<ul>


<li>kernel-source-rt-5.14.21-150500.13.64.1</li>


<li>kernel-devel-rt-5.14.21-150500.13.64.1</li>

</ul>
</li>

<li>
SUSE Real Time Module 15-SP5 (nosrc x86_64)
<ul>


<li>kernel-rt_debug-5.14.21-150500.13.64.1</li>


<li>kernel-rt-5.14.21-150500.13.64.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47086.html">https://www.suse.com/security/cve/CVE-2021-47086.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47103.html">https://www.suse.com/security/cve/CVE-2021-47103.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47186.html">https://www.suse.com/security/cve/CVE-2021-47186.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47402.html">https://www.suse.com/security/cve/CVE-2021-47402.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47546.html">https://www.suse.com/security/cve/CVE-2021-47546.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47547.html">https://www.suse.com/security/cve/CVE-2021-47547.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47588.html">https://www.suse.com/security/cve/CVE-2021-47588.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47590.html">https://www.suse.com/security/cve/CVE-2021-47590.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47591.html">https://www.suse.com/security/cve/CVE-2021-47591.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47593.html">https://www.suse.com/security/cve/CVE-2021-47593.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47598.html">https://www.suse.com/security/cve/CVE-2021-47598.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47599.html">https://www.suse.com/security/cve/CVE-2021-47599.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47606.html">https://www.suse.com/security/cve/CVE-2021-47606.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47622.html">https://www.suse.com/security/cve/CVE-2021-47622.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47623.html">https://www.suse.com/security/cve/CVE-2021-47623.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47624.html">https://www.suse.com/security/cve/CVE-2021-47624.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48713.html">https://www.suse.com/security/cve/CVE-2022-48713.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48730.html">https://www.suse.com/security/cve/CVE-2022-48730.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48732.html">https://www.suse.com/security/cve/CVE-2022-48732.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48749.html">https://www.suse.com/security/cve/CVE-2022-48749.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48756.html">https://www.suse.com/security/cve/CVE-2022-48756.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48773.html">https://www.suse.com/security/cve/CVE-2022-48773.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48774.html">https://www.suse.com/security/cve/CVE-2022-48774.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48775.html">https://www.suse.com/security/cve/CVE-2022-48775.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48776.html">https://www.suse.com/security/cve/CVE-2022-48776.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48777.html">https://www.suse.com/security/cve/CVE-2022-48777.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48778.html">https://www.suse.com/security/cve/CVE-2022-48778.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48780.html">https://www.suse.com/security/cve/CVE-2022-48780.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48783.html">https://www.suse.com/security/cve/CVE-2022-48783.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48784.html">https://www.suse.com/security/cve/CVE-2022-48784.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48785.html">https://www.suse.com/security/cve/CVE-2022-48785.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48786.html">https://www.suse.com/security/cve/CVE-2022-48786.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48787.html">https://www.suse.com/security/cve/CVE-2022-48787.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48788.html">https://www.suse.com/security/cve/CVE-2022-48788.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48789.html">https://www.suse.com/security/cve/CVE-2022-48789.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48790.html">https://www.suse.com/security/cve/CVE-2022-48790.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48791.html">https://www.suse.com/security/cve/CVE-2022-48791.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48792.html">https://www.suse.com/security/cve/CVE-2022-48792.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48793.html">https://www.suse.com/security/cve/CVE-2022-48793.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48794.html">https://www.suse.com/security/cve/CVE-2022-48794.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48796.html">https://www.suse.com/security/cve/CVE-2022-48796.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48797.html">https://www.suse.com/security/cve/CVE-2022-48797.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48798.html">https://www.suse.com/security/cve/CVE-2022-48798.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48799.html">https://www.suse.com/security/cve/CVE-2022-48799.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48800.html">https://www.suse.com/security/cve/CVE-2022-48800.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48801.html">https://www.suse.com/security/cve/CVE-2022-48801.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48802.html">https://www.suse.com/security/cve/CVE-2022-48802.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48803.html">https://www.suse.com/security/cve/CVE-2022-48803.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48804.html">https://www.suse.com/security/cve/CVE-2022-48804.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48805.html">https://www.suse.com/security/cve/CVE-2022-48805.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48806.html">https://www.suse.com/security/cve/CVE-2022-48806.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48807.html">https://www.suse.com/security/cve/CVE-2022-48807.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48809.html">https://www.suse.com/security/cve/CVE-2022-48809.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48810.html">https://www.suse.com/security/cve/CVE-2022-48810.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48811.html">https://www.suse.com/security/cve/CVE-2022-48811.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48812.html">https://www.suse.com/security/cve/CVE-2022-48812.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48813.html">https://www.suse.com/security/cve/CVE-2022-48813.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48814.html">https://www.suse.com/security/cve/CVE-2022-48814.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48815.html">https://www.suse.com/security/cve/CVE-2022-48815.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48816.html">https://www.suse.com/security/cve/CVE-2022-48816.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48817.html">https://www.suse.com/security/cve/CVE-2022-48817.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48818.html">https://www.suse.com/security/cve/CVE-2022-48818.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48820.html">https://www.suse.com/security/cve/CVE-2022-48820.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48821.html">https://www.suse.com/security/cve/CVE-2022-48821.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48822.html">https://www.suse.com/security/cve/CVE-2022-48822.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48823.html">https://www.suse.com/security/cve/CVE-2022-48823.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48824.html">https://www.suse.com/security/cve/CVE-2022-48824.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48825.html">https://www.suse.com/security/cve/CVE-2022-48825.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48826.html">https://www.suse.com/security/cve/CVE-2022-48826.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48827.html">https://www.suse.com/security/cve/CVE-2022-48827.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48828.html">https://www.suse.com/security/cve/CVE-2022-48828.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48829.html">https://www.suse.com/security/cve/CVE-2022-48829.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48830.html">https://www.suse.com/security/cve/CVE-2022-48830.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48831.html">https://www.suse.com/security/cve/CVE-2022-48831.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48834.html">https://www.suse.com/security/cve/CVE-2022-48834.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48835.html">https://www.suse.com/security/cve/CVE-2022-48835.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48836.html">https://www.suse.com/security/cve/CVE-2022-48836.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48837.html">https://www.suse.com/security/cve/CVE-2022-48837.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48838.html">https://www.suse.com/security/cve/CVE-2022-48838.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48839.html">https://www.suse.com/security/cve/CVE-2022-48839.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48840.html">https://www.suse.com/security/cve/CVE-2022-48840.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48841.html">https://www.suse.com/security/cve/CVE-2022-48841.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48842.html">https://www.suse.com/security/cve/CVE-2022-48842.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48843.html">https://www.suse.com/security/cve/CVE-2022-48843.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48844.html">https://www.suse.com/security/cve/CVE-2022-48844.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48846.html">https://www.suse.com/security/cve/CVE-2022-48846.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48847.html">https://www.suse.com/security/cve/CVE-2022-48847.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48849.html">https://www.suse.com/security/cve/CVE-2022-48849.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48850.html">https://www.suse.com/security/cve/CVE-2022-48850.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48851.html">https://www.suse.com/security/cve/CVE-2022-48851.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48852.html">https://www.suse.com/security/cve/CVE-2022-48852.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48853.html">https://www.suse.com/security/cve/CVE-2022-48853.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48855.html">https://www.suse.com/security/cve/CVE-2022-48855.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48856.html">https://www.suse.com/security/cve/CVE-2022-48856.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48857.html">https://www.suse.com/security/cve/CVE-2022-48857.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48858.html">https://www.suse.com/security/cve/CVE-2022-48858.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48859.html">https://www.suse.com/security/cve/CVE-2022-48859.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48860.html">https://www.suse.com/security/cve/CVE-2022-48860.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48861.html">https://www.suse.com/security/cve/CVE-2022-48861.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48862.html">https://www.suse.com/security/cve/CVE-2022-48862.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48863.html">https://www.suse.com/security/cve/CVE-2022-48863.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48864.html">https://www.suse.com/security/cve/CVE-2022-48864.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48866.html">https://www.suse.com/security/cve/CVE-2022-48866.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-1582.html">https://www.suse.com/security/cve/CVE-2023-1582.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-37453.html">https://www.suse.com/security/cve/CVE-2023-37453.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52435.html">https://www.suse.com/security/cve/CVE-2023-52435.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52573.html">https://www.suse.com/security/cve/CVE-2023-52573.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52580.html">https://www.suse.com/security/cve/CVE-2023-52580.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52591.html">https://www.suse.com/security/cve/CVE-2023-52591.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52735.html">https://www.suse.com/security/cve/CVE-2023-52735.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52751.html">https://www.suse.com/security/cve/CVE-2023-52751.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52762.html">https://www.suse.com/security/cve/CVE-2023-52762.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52775.html">https://www.suse.com/security/cve/CVE-2023-52775.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52812.html">https://www.suse.com/security/cve/CVE-2023-52812.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52857.html">https://www.suse.com/security/cve/CVE-2023-52857.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52863.html">https://www.suse.com/security/cve/CVE-2023-52863.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52885.html">https://www.suse.com/security/cve/CVE-2023-52885.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52886.html">https://www.suse.com/security/cve/CVE-2023-52886.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-25741.html">https://www.suse.com/security/cve/CVE-2024-25741.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26583.html">https://www.suse.com/security/cve/CVE-2024-26583.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26584.html">https://www.suse.com/security/cve/CVE-2024-26584.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26585.html">https://www.suse.com/security/cve/CVE-2024-26585.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26615.html">https://www.suse.com/security/cve/CVE-2024-26615.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26633.html">https://www.suse.com/security/cve/CVE-2024-26633.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26635.html">https://www.suse.com/security/cve/CVE-2024-26635.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26636.html">https://www.suse.com/security/cve/CVE-2024-26636.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26641.html">https://www.suse.com/security/cve/CVE-2024-26641.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26661.html">https://www.suse.com/security/cve/CVE-2024-26661.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26663.html">https://www.suse.com/security/cve/CVE-2024-26663.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26665.html">https://www.suse.com/security/cve/CVE-2024-26665.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26800.html">https://www.suse.com/security/cve/CVE-2024-26800.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26802.html">https://www.suse.com/security/cve/CVE-2024-26802.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26813.html">https://www.suse.com/security/cve/CVE-2024-26813.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26814.html">https://www.suse.com/security/cve/CVE-2024-26814.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26863.html">https://www.suse.com/security/cve/CVE-2024-26863.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26889.html">https://www.suse.com/security/cve/CVE-2024-26889.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26920.html">https://www.suse.com/security/cve/CVE-2024-26920.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26935.html">https://www.suse.com/security/cve/CVE-2024-26935.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-269355.html">https://www.suse.com/security/cve/CVE-2024-269355.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26961.html">https://www.suse.com/security/cve/CVE-2024-26961.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26976.html">https://www.suse.com/security/cve/CVE-2024-26976.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27015.html">https://www.suse.com/security/cve/CVE-2024-27015.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27019.html">https://www.suse.com/security/cve/CVE-2024-27019.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27020.html">https://www.suse.com/security/cve/CVE-2024-27020.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27025.html">https://www.suse.com/security/cve/CVE-2024-27025.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27065.html">https://www.suse.com/security/cve/CVE-2024-27065.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27402.html">https://www.suse.com/security/cve/CVE-2024-27402.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27437.html">https://www.suse.com/security/cve/CVE-2024-27437.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35805.html">https://www.suse.com/security/cve/CVE-2024-35805.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35819.html">https://www.suse.com/security/cve/CVE-2024-35819.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35837.html">https://www.suse.com/security/cve/CVE-2024-35837.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35853.html">https://www.suse.com/security/cve/CVE-2024-35853.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35854.html">https://www.suse.com/security/cve/CVE-2024-35854.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35855.html">https://www.suse.com/security/cve/CVE-2024-35855.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35889.html">https://www.suse.com/security/cve/CVE-2024-35889.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35890.html">https://www.suse.com/security/cve/CVE-2024-35890.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35893.html">https://www.suse.com/security/cve/CVE-2024-35893.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35899.html">https://www.suse.com/security/cve/CVE-2024-35899.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35934.html">https://www.suse.com/security/cve/CVE-2024-35934.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35949.html">https://www.suse.com/security/cve/CVE-2024-35949.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35961.html">https://www.suse.com/security/cve/CVE-2024-35961.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35979.html">https://www.suse.com/security/cve/CVE-2024-35979.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35995.html">https://www.suse.com/security/cve/CVE-2024-35995.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36000.html">https://www.suse.com/security/cve/CVE-2024-36000.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36004.html">https://www.suse.com/security/cve/CVE-2024-36004.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36288.html">https://www.suse.com/security/cve/CVE-2024-36288.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36889.html">https://www.suse.com/security/cve/CVE-2024-36889.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36901.html">https://www.suse.com/security/cve/CVE-2024-36901.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36902.html">https://www.suse.com/security/cve/CVE-2024-36902.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36909.html">https://www.suse.com/security/cve/CVE-2024-36909.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36910.html">https://www.suse.com/security/cve/CVE-2024-36910.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36911.html">https://www.suse.com/security/cve/CVE-2024-36911.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36912.html">https://www.suse.com/security/cve/CVE-2024-36912.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36913.html">https://www.suse.com/security/cve/CVE-2024-36913.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36914.html">https://www.suse.com/security/cve/CVE-2024-36914.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36919.html">https://www.suse.com/security/cve/CVE-2024-36919.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36923.html">https://www.suse.com/security/cve/CVE-2024-36923.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36924.html">https://www.suse.com/security/cve/CVE-2024-36924.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36926.html">https://www.suse.com/security/cve/CVE-2024-36926.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36939.html">https://www.suse.com/security/cve/CVE-2024-36939.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36941.html">https://www.suse.com/security/cve/CVE-2024-36941.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36942.html">https://www.suse.com/security/cve/CVE-2024-36942.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36944.html">https://www.suse.com/security/cve/CVE-2024-36944.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36946.html">https://www.suse.com/security/cve/CVE-2024-36946.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36947.html">https://www.suse.com/security/cve/CVE-2024-36947.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36950.html">https://www.suse.com/security/cve/CVE-2024-36950.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36952.html">https://www.suse.com/security/cve/CVE-2024-36952.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36955.html">https://www.suse.com/security/cve/CVE-2024-36955.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36959.html">https://www.suse.com/security/cve/CVE-2024-36959.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36974.html">https://www.suse.com/security/cve/CVE-2024-36974.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38548.html">https://www.suse.com/security/cve/CVE-2024-38548.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38555.html">https://www.suse.com/security/cve/CVE-2024-38555.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38558.html">https://www.suse.com/security/cve/CVE-2024-38558.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38559.html">https://www.suse.com/security/cve/CVE-2024-38559.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38570.html">https://www.suse.com/security/cve/CVE-2024-38570.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38586.html">https://www.suse.com/security/cve/CVE-2024-38586.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38588.html">https://www.suse.com/security/cve/CVE-2024-38588.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38598.html">https://www.suse.com/security/cve/CVE-2024-38598.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38628.html">https://www.suse.com/security/cve/CVE-2024-38628.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39276.html">https://www.suse.com/security/cve/CVE-2024-39276.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39371.html">https://www.suse.com/security/cve/CVE-2024-39371.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39463.html">https://www.suse.com/security/cve/CVE-2024-39463.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39472.html">https://www.suse.com/security/cve/CVE-2024-39472.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39475.html">https://www.suse.com/security/cve/CVE-2024-39475.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39482.html">https://www.suse.com/security/cve/CVE-2024-39482.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39487.html">https://www.suse.com/security/cve/CVE-2024-39487.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39488.html">https://www.suse.com/security/cve/CVE-2024-39488.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39490.html">https://www.suse.com/security/cve/CVE-2024-39490.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39493.html">https://www.suse.com/security/cve/CVE-2024-39493.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39494.html">https://www.suse.com/security/cve/CVE-2024-39494.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39497.html">https://www.suse.com/security/cve/CVE-2024-39497.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39499.html">https://www.suse.com/security/cve/CVE-2024-39499.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39500.html">https://www.suse.com/security/cve/CVE-2024-39500.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39501.html">https://www.suse.com/security/cve/CVE-2024-39501.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39502.html">https://www.suse.com/security/cve/CVE-2024-39502.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39505.html">https://www.suse.com/security/cve/CVE-2024-39505.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39506.html">https://www.suse.com/security/cve/CVE-2024-39506.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39507.html">https://www.suse.com/security/cve/CVE-2024-39507.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39508.html">https://www.suse.com/security/cve/CVE-2024-39508.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39509.html">https://www.suse.com/security/cve/CVE-2024-39509.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40900.html">https://www.suse.com/security/cve/CVE-2024-40900.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40901.html">https://www.suse.com/security/cve/CVE-2024-40901.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40902.html">https://www.suse.com/security/cve/CVE-2024-40902.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40903.html">https://www.suse.com/security/cve/CVE-2024-40903.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40904.html">https://www.suse.com/security/cve/CVE-2024-40904.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40906.html">https://www.suse.com/security/cve/CVE-2024-40906.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40908.html">https://www.suse.com/security/cve/CVE-2024-40908.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40909.html">https://www.suse.com/security/cve/CVE-2024-40909.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40911.html">https://www.suse.com/security/cve/CVE-2024-40911.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40912.html">https://www.suse.com/security/cve/CVE-2024-40912.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40916.html">https://www.suse.com/security/cve/CVE-2024-40916.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40919.html">https://www.suse.com/security/cve/CVE-2024-40919.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40923.html">https://www.suse.com/security/cve/CVE-2024-40923.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40924.html">https://www.suse.com/security/cve/CVE-2024-40924.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40927.html">https://www.suse.com/security/cve/CVE-2024-40927.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40929.html">https://www.suse.com/security/cve/CVE-2024-40929.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40931.html">https://www.suse.com/security/cve/CVE-2024-40931.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40932.html">https://www.suse.com/security/cve/CVE-2024-40932.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40934.html">https://www.suse.com/security/cve/CVE-2024-40934.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40935.html">https://www.suse.com/security/cve/CVE-2024-40935.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40937.html">https://www.suse.com/security/cve/CVE-2024-40937.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40940.html">https://www.suse.com/security/cve/CVE-2024-40940.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40941.html">https://www.suse.com/security/cve/CVE-2024-40941.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40942.html">https://www.suse.com/security/cve/CVE-2024-40942.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40943.html">https://www.suse.com/security/cve/CVE-2024-40943.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40945.html">https://www.suse.com/security/cve/CVE-2024-40945.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40953.html">https://www.suse.com/security/cve/CVE-2024-40953.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40954.html">https://www.suse.com/security/cve/CVE-2024-40954.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40956.html">https://www.suse.com/security/cve/CVE-2024-40956.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40958.html">https://www.suse.com/security/cve/CVE-2024-40958.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40959.html">https://www.suse.com/security/cve/CVE-2024-40959.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40960.html">https://www.suse.com/security/cve/CVE-2024-40960.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40961.html">https://www.suse.com/security/cve/CVE-2024-40961.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40966.html">https://www.suse.com/security/cve/CVE-2024-40966.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40967.html">https://www.suse.com/security/cve/CVE-2024-40967.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40970.html">https://www.suse.com/security/cve/CVE-2024-40970.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40972.html">https://www.suse.com/security/cve/CVE-2024-40972.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40976.html">https://www.suse.com/security/cve/CVE-2024-40976.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40977.html">https://www.suse.com/security/cve/CVE-2024-40977.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40981.html">https://www.suse.com/security/cve/CVE-2024-40981.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40982.html">https://www.suse.com/security/cve/CVE-2024-40982.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40984.html">https://www.suse.com/security/cve/CVE-2024-40984.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40987.html">https://www.suse.com/security/cve/CVE-2024-40987.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40988.html">https://www.suse.com/security/cve/CVE-2024-40988.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40989.html">https://www.suse.com/security/cve/CVE-2024-40989.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40990.html">https://www.suse.com/security/cve/CVE-2024-40990.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40994.html">https://www.suse.com/security/cve/CVE-2024-40994.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40998.html">https://www.suse.com/security/cve/CVE-2024-40998.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40999.html">https://www.suse.com/security/cve/CVE-2024-40999.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41002.html">https://www.suse.com/security/cve/CVE-2024-41002.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41004.html">https://www.suse.com/security/cve/CVE-2024-41004.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41006.html">https://www.suse.com/security/cve/CVE-2024-41006.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41009.html">https://www.suse.com/security/cve/CVE-2024-41009.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41011.html">https://www.suse.com/security/cve/CVE-2024-41011.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41012.html">https://www.suse.com/security/cve/CVE-2024-41012.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41013.html">https://www.suse.com/security/cve/CVE-2024-41013.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41014.html">https://www.suse.com/security/cve/CVE-2024-41014.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41015.html">https://www.suse.com/security/cve/CVE-2024-41015.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41016.html">https://www.suse.com/security/cve/CVE-2024-41016.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41017.html">https://www.suse.com/security/cve/CVE-2024-41017.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41040.html">https://www.suse.com/security/cve/CVE-2024-41040.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41041.html">https://www.suse.com/security/cve/CVE-2024-41041.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41044.html">https://www.suse.com/security/cve/CVE-2024-41044.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41048.html">https://www.suse.com/security/cve/CVE-2024-41048.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41057.html">https://www.suse.com/security/cve/CVE-2024-41057.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41058.html">https://www.suse.com/security/cve/CVE-2024-41058.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41059.html">https://www.suse.com/security/cve/CVE-2024-41059.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41063.html">https://www.suse.com/security/cve/CVE-2024-41063.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41064.html">https://www.suse.com/security/cve/CVE-2024-41064.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41066.html">https://www.suse.com/security/cve/CVE-2024-41066.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41069.html">https://www.suse.com/security/cve/CVE-2024-41069.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41070.html">https://www.suse.com/security/cve/CVE-2024-41070.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41071.html">https://www.suse.com/security/cve/CVE-2024-41071.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41072.html">https://www.suse.com/security/cve/CVE-2024-41072.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41076.html">https://www.suse.com/security/cve/CVE-2024-41076.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41078.html">https://www.suse.com/security/cve/CVE-2024-41078.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41081.html">https://www.suse.com/security/cve/CVE-2024-41081.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41087.html">https://www.suse.com/security/cve/CVE-2024-41087.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41090.html">https://www.suse.com/security/cve/CVE-2024-41090.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41091.html">https://www.suse.com/security/cve/CVE-2024-41091.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42070.html">https://www.suse.com/security/cve/CVE-2024-42070.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42079.html">https://www.suse.com/security/cve/CVE-2024-42079.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42093.html">https://www.suse.com/security/cve/CVE-2024-42093.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42096.html">https://www.suse.com/security/cve/CVE-2024-42096.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42105.html">https://www.suse.com/security/cve/CVE-2024-42105.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42122.html">https://www.suse.com/security/cve/CVE-2024-42122.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42124.html">https://www.suse.com/security/cve/CVE-2024-42124.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42145.html">https://www.suse.com/security/cve/CVE-2024-42145.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42161.html">https://www.suse.com/security/cve/CVE-2024-42161.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42224.html">https://www.suse.com/security/cve/CVE-2024-42224.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42230.html">https://www.suse.com/security/cve/CVE-2024-42230.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1082555">https://bugzilla.suse.com/show_bug.cgi?id=1082555</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1193454">https://bugzilla.suse.com/show_bug.cgi?id=1193454</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1193554">https://bugzilla.suse.com/show_bug.cgi?id=1193554</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1193787">https://bugzilla.suse.com/show_bug.cgi?id=1193787</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194324">https://bugzilla.suse.com/show_bug.cgi?id=1194324</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">https://bugzilla.suse.com/show_bug.cgi?id=1194869</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195357">https://bugzilla.suse.com/show_bug.cgi?id=1195357</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195668">https://bugzilla.suse.com/show_bug.cgi?id=1195668</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195927">https://bugzilla.suse.com/show_bug.cgi?id=1195927</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195957">https://bugzilla.suse.com/show_bug.cgi?id=1195957</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1196018">https://bugzilla.suse.com/show_bug.cgi?id=1196018</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1196823">https://bugzilla.suse.com/show_bug.cgi?id=1196823</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1197146">https://bugzilla.suse.com/show_bug.cgi?id=1197146</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1197246">https://bugzilla.suse.com/show_bug.cgi?id=1197246</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1197762">https://bugzilla.suse.com/show_bug.cgi?id=1197762</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1202346">https://bugzilla.suse.com/show_bug.cgi?id=1202346</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1202686">https://bugzilla.suse.com/show_bug.cgi?id=1202686</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1208783">https://bugzilla.suse.com/show_bug.cgi?id=1208783</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209636">https://bugzilla.suse.com/show_bug.cgi?id=1209636</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213123">https://bugzilla.suse.com/show_bug.cgi?id=1213123</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215492">https://bugzilla.suse.com/show_bug.cgi?id=1215492</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215587">https://bugzilla.suse.com/show_bug.cgi?id=1215587</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216834">https://bugzilla.suse.com/show_bug.cgi?id=1216834</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219832">https://bugzilla.suse.com/show_bug.cgi?id=1219832</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220138">https://bugzilla.suse.com/show_bug.cgi?id=1220138</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220185">https://bugzilla.suse.com/show_bug.cgi?id=1220185</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220186">https://bugzilla.suse.com/show_bug.cgi?id=1220186</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220187">https://bugzilla.suse.com/show_bug.cgi?id=1220187</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220869">https://bugzilla.suse.com/show_bug.cgi?id=1220869</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220876">https://bugzilla.suse.com/show_bug.cgi?id=1220876</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220942">https://bugzilla.suse.com/show_bug.cgi?id=1220942</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220952">https://bugzilla.suse.com/show_bug.cgi?id=1220952</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221010">https://bugzilla.suse.com/show_bug.cgi?id=1221010</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221044">https://bugzilla.suse.com/show_bug.cgi?id=1221044</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221647">https://bugzilla.suse.com/show_bug.cgi?id=1221647</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221654">https://bugzilla.suse.com/show_bug.cgi?id=1221654</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221656">https://bugzilla.suse.com/show_bug.cgi?id=1221656</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221659">https://bugzilla.suse.com/show_bug.cgi?id=1221659</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221777">https://bugzilla.suse.com/show_bug.cgi?id=1221777</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222011">https://bugzilla.suse.com/show_bug.cgi?id=1222011</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222323">https://bugzilla.suse.com/show_bug.cgi?id=1222323</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222326">https://bugzilla.suse.com/show_bug.cgi?id=1222326</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222328">https://bugzilla.suse.com/show_bug.cgi?id=1222328</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222625">https://bugzilla.suse.com/show_bug.cgi?id=1222625</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222702">https://bugzilla.suse.com/show_bug.cgi?id=1222702</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222728">https://bugzilla.suse.com/show_bug.cgi?id=1222728</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222799">https://bugzilla.suse.com/show_bug.cgi?id=1222799</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222809">https://bugzilla.suse.com/show_bug.cgi?id=1222809</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222810">https://bugzilla.suse.com/show_bug.cgi?id=1222810</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223021">https://bugzilla.suse.com/show_bug.cgi?id=1223021</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223180">https://bugzilla.suse.com/show_bug.cgi?id=1223180</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223635">https://bugzilla.suse.com/show_bug.cgi?id=1223635</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223652">https://bugzilla.suse.com/show_bug.cgi?id=1223652</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223675">https://bugzilla.suse.com/show_bug.cgi?id=1223675</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223778">https://bugzilla.suse.com/show_bug.cgi?id=1223778</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223806">https://bugzilla.suse.com/show_bug.cgi?id=1223806</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223813">https://bugzilla.suse.com/show_bug.cgi?id=1223813</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223815">https://bugzilla.suse.com/show_bug.cgi?id=1223815</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223836">https://bugzilla.suse.com/show_bug.cgi?id=1223836</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223863">https://bugzilla.suse.com/show_bug.cgi?id=1223863</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224414">https://bugzilla.suse.com/show_bug.cgi?id=1224414</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224499">https://bugzilla.suse.com/show_bug.cgi?id=1224499</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224500">https://bugzilla.suse.com/show_bug.cgi?id=1224500</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224512">https://bugzilla.suse.com/show_bug.cgi?id=1224512</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224516">https://bugzilla.suse.com/show_bug.cgi?id=1224516</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224517">https://bugzilla.suse.com/show_bug.cgi?id=1224517</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224545">https://bugzilla.suse.com/show_bug.cgi?id=1224545</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224548">https://bugzilla.suse.com/show_bug.cgi?id=1224548</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224557">https://bugzilla.suse.com/show_bug.cgi?id=1224557</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224572">https://bugzilla.suse.com/show_bug.cgi?id=1224572</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224573">https://bugzilla.suse.com/show_bug.cgi?id=1224573</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224585">https://bugzilla.suse.com/show_bug.cgi?id=1224585</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224604">https://bugzilla.suse.com/show_bug.cgi?id=1224604</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224636">https://bugzilla.suse.com/show_bug.cgi?id=1224636</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224641">https://bugzilla.suse.com/show_bug.cgi?id=1224641</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224683">https://bugzilla.suse.com/show_bug.cgi?id=1224683</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224694">https://bugzilla.suse.com/show_bug.cgi?id=1224694</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224700">https://bugzilla.suse.com/show_bug.cgi?id=1224700</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224743">https://bugzilla.suse.com/show_bug.cgi?id=1224743</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225088">https://bugzilla.suse.com/show_bug.cgi?id=1225088</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225272">https://bugzilla.suse.com/show_bug.cgi?id=1225272</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225301">https://bugzilla.suse.com/show_bug.cgi?id=1225301</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225475">https://bugzilla.suse.com/show_bug.cgi?id=1225475</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225489">https://bugzilla.suse.com/show_bug.cgi?id=1225489</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225504">https://bugzilla.suse.com/show_bug.cgi?id=1225504</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225505">https://bugzilla.suse.com/show_bug.cgi?id=1225505</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225564">https://bugzilla.suse.com/show_bug.cgi?id=1225564</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225573">https://bugzilla.suse.com/show_bug.cgi?id=1225573</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225581">https://bugzilla.suse.com/show_bug.cgi?id=1225581</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225586">https://bugzilla.suse.com/show_bug.cgi?id=1225586</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225711">https://bugzilla.suse.com/show_bug.cgi?id=1225711</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225717">https://bugzilla.suse.com/show_bug.cgi?id=1225717</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225719">https://bugzilla.suse.com/show_bug.cgi?id=1225719</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225744">https://bugzilla.suse.com/show_bug.cgi?id=1225744</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225745">https://bugzilla.suse.com/show_bug.cgi?id=1225745</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225746">https://bugzilla.suse.com/show_bug.cgi?id=1225746</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225752">https://bugzilla.suse.com/show_bug.cgi?id=1225752</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225753">https://bugzilla.suse.com/show_bug.cgi?id=1225753</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225757">https://bugzilla.suse.com/show_bug.cgi?id=1225757</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225767">https://bugzilla.suse.com/show_bug.cgi?id=1225767</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225810">https://bugzilla.suse.com/show_bug.cgi?id=1225810</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225815">https://bugzilla.suse.com/show_bug.cgi?id=1225815</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225820">https://bugzilla.suse.com/show_bug.cgi?id=1225820</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225829">https://bugzilla.suse.com/show_bug.cgi?id=1225829</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225835">https://bugzilla.suse.com/show_bug.cgi?id=1225835</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225838">https://bugzilla.suse.com/show_bug.cgi?id=1225838</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225839">https://bugzilla.suse.com/show_bug.cgi?id=1225839</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225843">https://bugzilla.suse.com/show_bug.cgi?id=1225843</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225847">https://bugzilla.suse.com/show_bug.cgi?id=1225847</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225851">https://bugzilla.suse.com/show_bug.cgi?id=1225851</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225856">https://bugzilla.suse.com/show_bug.cgi?id=1225856</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225895">https://bugzilla.suse.com/show_bug.cgi?id=1225895</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225898">https://bugzilla.suse.com/show_bug.cgi?id=1225898</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225903">https://bugzilla.suse.com/show_bug.cgi?id=1225903</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226202">https://bugzilla.suse.com/show_bug.cgi?id=1226202</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226502">https://bugzilla.suse.com/show_bug.cgi?id=1226502</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226519">https://bugzilla.suse.com/show_bug.cgi?id=1226519</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226551">https://bugzilla.suse.com/show_bug.cgi?id=1226551</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226555">https://bugzilla.suse.com/show_bug.cgi?id=1226555</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226565">https://bugzilla.suse.com/show_bug.cgi?id=1226565</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226568">https://bugzilla.suse.com/show_bug.cgi?id=1226568</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226570">https://bugzilla.suse.com/show_bug.cgi?id=1226570</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226571">https://bugzilla.suse.com/show_bug.cgi?id=1226571</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226574">https://bugzilla.suse.com/show_bug.cgi?id=1226574</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226588">https://bugzilla.suse.com/show_bug.cgi?id=1226588</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226607">https://bugzilla.suse.com/show_bug.cgi?id=1226607</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226650">https://bugzilla.suse.com/show_bug.cgi?id=1226650</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226698">https://bugzilla.suse.com/show_bug.cgi?id=1226698</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226713">https://bugzilla.suse.com/show_bug.cgi?id=1226713</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226716">https://bugzilla.suse.com/show_bug.cgi?id=1226716</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226750">https://bugzilla.suse.com/show_bug.cgi?id=1226750</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226757">https://bugzilla.suse.com/show_bug.cgi?id=1226757</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226758">https://bugzilla.suse.com/show_bug.cgi?id=1226758</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226775">https://bugzilla.suse.com/show_bug.cgi?id=1226775</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226783">https://bugzilla.suse.com/show_bug.cgi?id=1226783</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226785">https://bugzilla.suse.com/show_bug.cgi?id=1226785</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226834">https://bugzilla.suse.com/show_bug.cgi?id=1226834</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226837">https://bugzilla.suse.com/show_bug.cgi?id=1226837</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226911">https://bugzilla.suse.com/show_bug.cgi?id=1226911</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226990">https://bugzilla.suse.com/show_bug.cgi?id=1226990</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226993">https://bugzilla.suse.com/show_bug.cgi?id=1226993</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227090">https://bugzilla.suse.com/show_bug.cgi?id=1227090</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227121">https://bugzilla.suse.com/show_bug.cgi?id=1227121</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227157">https://bugzilla.suse.com/show_bug.cgi?id=1227157</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227162">https://bugzilla.suse.com/show_bug.cgi?id=1227162</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227362">https://bugzilla.suse.com/show_bug.cgi?id=1227362</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227383">https://bugzilla.suse.com/show_bug.cgi?id=1227383</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227432">https://bugzilla.suse.com/show_bug.cgi?id=1227432</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227435">https://bugzilla.suse.com/show_bug.cgi?id=1227435</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227447">https://bugzilla.suse.com/show_bug.cgi?id=1227447</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227487">https://bugzilla.suse.com/show_bug.cgi?id=1227487</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227549">https://bugzilla.suse.com/show_bug.cgi?id=1227549</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227573">https://bugzilla.suse.com/show_bug.cgi?id=1227573</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227618">https://bugzilla.suse.com/show_bug.cgi?id=1227618</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227620">https://bugzilla.suse.com/show_bug.cgi?id=1227620</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227626">https://bugzilla.suse.com/show_bug.cgi?id=1227626</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227635">https://bugzilla.suse.com/show_bug.cgi?id=1227635</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227661">https://bugzilla.suse.com/show_bug.cgi?id=1227661</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227716">https://bugzilla.suse.com/show_bug.cgi?id=1227716</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227722">https://bugzilla.suse.com/show_bug.cgi?id=1227722</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227724">https://bugzilla.suse.com/show_bug.cgi?id=1227724</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227725">https://bugzilla.suse.com/show_bug.cgi?id=1227725</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227728">https://bugzilla.suse.com/show_bug.cgi?id=1227728</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227729">https://bugzilla.suse.com/show_bug.cgi?id=1227729</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227730">https://bugzilla.suse.com/show_bug.cgi?id=1227730</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227732">https://bugzilla.suse.com/show_bug.cgi?id=1227732</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227733">https://bugzilla.suse.com/show_bug.cgi?id=1227733</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227750">https://bugzilla.suse.com/show_bug.cgi?id=1227750</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227754">https://bugzilla.suse.com/show_bug.cgi?id=1227754</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227755">https://bugzilla.suse.com/show_bug.cgi?id=1227755</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227760">https://bugzilla.suse.com/show_bug.cgi?id=1227760</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227762">https://bugzilla.suse.com/show_bug.cgi?id=1227762</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227763">https://bugzilla.suse.com/show_bug.cgi?id=1227763</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227764">https://bugzilla.suse.com/show_bug.cgi?id=1227764</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227766">https://bugzilla.suse.com/show_bug.cgi?id=1227766</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227770">https://bugzilla.suse.com/show_bug.cgi?id=1227770</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227771">https://bugzilla.suse.com/show_bug.cgi?id=1227771</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227772">https://bugzilla.suse.com/show_bug.cgi?id=1227772</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227774">https://bugzilla.suse.com/show_bug.cgi?id=1227774</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227779">https://bugzilla.suse.com/show_bug.cgi?id=1227779</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227780">https://bugzilla.suse.com/show_bug.cgi?id=1227780</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227783">https://bugzilla.suse.com/show_bug.cgi?id=1227783</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227786">https://bugzilla.suse.com/show_bug.cgi?id=1227786</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227787">https://bugzilla.suse.com/show_bug.cgi?id=1227787</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227790">https://bugzilla.suse.com/show_bug.cgi?id=1227790</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227792">https://bugzilla.suse.com/show_bug.cgi?id=1227792</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227796">https://bugzilla.suse.com/show_bug.cgi?id=1227796</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227797">https://bugzilla.suse.com/show_bug.cgi?id=1227797</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227798">https://bugzilla.suse.com/show_bug.cgi?id=1227798</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227800">https://bugzilla.suse.com/show_bug.cgi?id=1227800</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227802">https://bugzilla.suse.com/show_bug.cgi?id=1227802</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227806">https://bugzilla.suse.com/show_bug.cgi?id=1227806</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227808">https://bugzilla.suse.com/show_bug.cgi?id=1227808</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227810">https://bugzilla.suse.com/show_bug.cgi?id=1227810</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227812">https://bugzilla.suse.com/show_bug.cgi?id=1227812</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227813">https://bugzilla.suse.com/show_bug.cgi?id=1227813</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227814">https://bugzilla.suse.com/show_bug.cgi?id=1227814</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227816">https://bugzilla.suse.com/show_bug.cgi?id=1227816</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227820">https://bugzilla.suse.com/show_bug.cgi?id=1227820</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227823">https://bugzilla.suse.com/show_bug.cgi?id=1227823</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227824">https://bugzilla.suse.com/show_bug.cgi?id=1227824</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227828">https://bugzilla.suse.com/show_bug.cgi?id=1227828</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227829">https://bugzilla.suse.com/show_bug.cgi?id=1227829</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227836">https://bugzilla.suse.com/show_bug.cgi?id=1227836</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227846">https://bugzilla.suse.com/show_bug.cgi?id=1227846</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227849">https://bugzilla.suse.com/show_bug.cgi?id=1227849</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227851">https://bugzilla.suse.com/show_bug.cgi?id=1227851</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227862">https://bugzilla.suse.com/show_bug.cgi?id=1227862</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227864">https://bugzilla.suse.com/show_bug.cgi?id=1227864</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227865">https://bugzilla.suse.com/show_bug.cgi?id=1227865</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227866">https://bugzilla.suse.com/show_bug.cgi?id=1227866</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227870">https://bugzilla.suse.com/show_bug.cgi?id=1227870</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227884">https://bugzilla.suse.com/show_bug.cgi?id=1227884</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227886">https://bugzilla.suse.com/show_bug.cgi?id=1227886</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227891">https://bugzilla.suse.com/show_bug.cgi?id=1227891</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227893">https://bugzilla.suse.com/show_bug.cgi?id=1227893</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227899">https://bugzilla.suse.com/show_bug.cgi?id=1227899</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227900">https://bugzilla.suse.com/show_bug.cgi?id=1227900</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227910">https://bugzilla.suse.com/show_bug.cgi?id=1227910</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227913">https://bugzilla.suse.com/show_bug.cgi?id=1227913</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227917">https://bugzilla.suse.com/show_bug.cgi?id=1227917</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227919">https://bugzilla.suse.com/show_bug.cgi?id=1227919</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227920">https://bugzilla.suse.com/show_bug.cgi?id=1227920</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227921">https://bugzilla.suse.com/show_bug.cgi?id=1227921</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227922">https://bugzilla.suse.com/show_bug.cgi?id=1227922</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227923">https://bugzilla.suse.com/show_bug.cgi?id=1227923</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227924">https://bugzilla.suse.com/show_bug.cgi?id=1227924</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227925">https://bugzilla.suse.com/show_bug.cgi?id=1227925</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227927">https://bugzilla.suse.com/show_bug.cgi?id=1227927</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227928">https://bugzilla.suse.com/show_bug.cgi?id=1227928</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227931">https://bugzilla.suse.com/show_bug.cgi?id=1227931</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227932">https://bugzilla.suse.com/show_bug.cgi?id=1227932</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227933">https://bugzilla.suse.com/show_bug.cgi?id=1227933</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227935">https://bugzilla.suse.com/show_bug.cgi?id=1227935</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227936">https://bugzilla.suse.com/show_bug.cgi?id=1227936</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227938">https://bugzilla.suse.com/show_bug.cgi?id=1227938</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227941">https://bugzilla.suse.com/show_bug.cgi?id=1227941</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227942">https://bugzilla.suse.com/show_bug.cgi?id=1227942</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227944">https://bugzilla.suse.com/show_bug.cgi?id=1227944</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227945">https://bugzilla.suse.com/show_bug.cgi?id=1227945</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227947">https://bugzilla.suse.com/show_bug.cgi?id=1227947</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227948">https://bugzilla.suse.com/show_bug.cgi?id=1227948</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227949">https://bugzilla.suse.com/show_bug.cgi?id=1227949</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227950">https://bugzilla.suse.com/show_bug.cgi?id=1227950</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227952">https://bugzilla.suse.com/show_bug.cgi?id=1227952</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227953">https://bugzilla.suse.com/show_bug.cgi?id=1227953</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227954">https://bugzilla.suse.com/show_bug.cgi?id=1227954</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227956">https://bugzilla.suse.com/show_bug.cgi?id=1227956</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227957">https://bugzilla.suse.com/show_bug.cgi?id=1227957</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227963">https://bugzilla.suse.com/show_bug.cgi?id=1227963</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227964">https://bugzilla.suse.com/show_bug.cgi?id=1227964</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227965">https://bugzilla.suse.com/show_bug.cgi?id=1227965</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227968">https://bugzilla.suse.com/show_bug.cgi?id=1227968</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227969">https://bugzilla.suse.com/show_bug.cgi?id=1227969</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227970">https://bugzilla.suse.com/show_bug.cgi?id=1227970</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227971">https://bugzilla.suse.com/show_bug.cgi?id=1227971</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227972">https://bugzilla.suse.com/show_bug.cgi?id=1227972</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227975">https://bugzilla.suse.com/show_bug.cgi?id=1227975</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227976">https://bugzilla.suse.com/show_bug.cgi?id=1227976</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227981">https://bugzilla.suse.com/show_bug.cgi?id=1227981</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227982">https://bugzilla.suse.com/show_bug.cgi?id=1227982</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227985">https://bugzilla.suse.com/show_bug.cgi?id=1227985</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227986">https://bugzilla.suse.com/show_bug.cgi?id=1227986</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227987">https://bugzilla.suse.com/show_bug.cgi?id=1227987</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227988">https://bugzilla.suse.com/show_bug.cgi?id=1227988</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227989">https://bugzilla.suse.com/show_bug.cgi?id=1227989</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227990">https://bugzilla.suse.com/show_bug.cgi?id=1227990</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227991">https://bugzilla.suse.com/show_bug.cgi?id=1227991</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227992">https://bugzilla.suse.com/show_bug.cgi?id=1227992</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227993">https://bugzilla.suse.com/show_bug.cgi?id=1227993</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227995">https://bugzilla.suse.com/show_bug.cgi?id=1227995</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227996">https://bugzilla.suse.com/show_bug.cgi?id=1227996</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227997">https://bugzilla.suse.com/show_bug.cgi?id=1227997</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228000">https://bugzilla.suse.com/show_bug.cgi?id=1228000</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228002">https://bugzilla.suse.com/show_bug.cgi?id=1228002</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228003">https://bugzilla.suse.com/show_bug.cgi?id=1228003</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228004">https://bugzilla.suse.com/show_bug.cgi?id=1228004</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228005">https://bugzilla.suse.com/show_bug.cgi?id=1228005</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228006">https://bugzilla.suse.com/show_bug.cgi?id=1228006</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228007">https://bugzilla.suse.com/show_bug.cgi?id=1228007</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228008">https://bugzilla.suse.com/show_bug.cgi?id=1228008</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228009">https://bugzilla.suse.com/show_bug.cgi?id=1228009</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228010">https://bugzilla.suse.com/show_bug.cgi?id=1228010</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228011">https://bugzilla.suse.com/show_bug.cgi?id=1228011</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228013">https://bugzilla.suse.com/show_bug.cgi?id=1228013</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228014">https://bugzilla.suse.com/show_bug.cgi?id=1228014</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228015">https://bugzilla.suse.com/show_bug.cgi?id=1228015</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228019">https://bugzilla.suse.com/show_bug.cgi?id=1228019</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228020">https://bugzilla.suse.com/show_bug.cgi?id=1228020</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228025">https://bugzilla.suse.com/show_bug.cgi?id=1228025</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228028">https://bugzilla.suse.com/show_bug.cgi?id=1228028</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228035">https://bugzilla.suse.com/show_bug.cgi?id=1228035</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228037">https://bugzilla.suse.com/show_bug.cgi?id=1228037</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228038">https://bugzilla.suse.com/show_bug.cgi?id=1228038</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228039">https://bugzilla.suse.com/show_bug.cgi?id=1228039</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228040">https://bugzilla.suse.com/show_bug.cgi?id=1228040</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228045">https://bugzilla.suse.com/show_bug.cgi?id=1228045</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228054">https://bugzilla.suse.com/show_bug.cgi?id=1228054</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228055">https://bugzilla.suse.com/show_bug.cgi?id=1228055</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228056">https://bugzilla.suse.com/show_bug.cgi?id=1228056</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228060">https://bugzilla.suse.com/show_bug.cgi?id=1228060</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228061">https://bugzilla.suse.com/show_bug.cgi?id=1228061</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228062">https://bugzilla.suse.com/show_bug.cgi?id=1228062</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228063">https://bugzilla.suse.com/show_bug.cgi?id=1228063</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228064">https://bugzilla.suse.com/show_bug.cgi?id=1228064</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228066">https://bugzilla.suse.com/show_bug.cgi?id=1228066</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228067">https://bugzilla.suse.com/show_bug.cgi?id=1228067</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228068">https://bugzilla.suse.com/show_bug.cgi?id=1228068</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228071">https://bugzilla.suse.com/show_bug.cgi?id=1228071</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228079">https://bugzilla.suse.com/show_bug.cgi?id=1228079</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228090">https://bugzilla.suse.com/show_bug.cgi?id=1228090</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228114">https://bugzilla.suse.com/show_bug.cgi?id=1228114</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228140">https://bugzilla.suse.com/show_bug.cgi?id=1228140</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228190">https://bugzilla.suse.com/show_bug.cgi?id=1228190</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228191">https://bugzilla.suse.com/show_bug.cgi?id=1228191</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228195">https://bugzilla.suse.com/show_bug.cgi?id=1228195</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228202">https://bugzilla.suse.com/show_bug.cgi?id=1228202</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228226">https://bugzilla.suse.com/show_bug.cgi?id=1228226</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228235">https://bugzilla.suse.com/show_bug.cgi?id=1228235</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228237">https://bugzilla.suse.com/show_bug.cgi?id=1228237</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228247">https://bugzilla.suse.com/show_bug.cgi?id=1228247</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228327">https://bugzilla.suse.com/show_bug.cgi?id=1228327</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228328">https://bugzilla.suse.com/show_bug.cgi?id=1228328</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228330">https://bugzilla.suse.com/show_bug.cgi?id=1228330</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228403">https://bugzilla.suse.com/show_bug.cgi?id=1228403</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228405">https://bugzilla.suse.com/show_bug.cgi?id=1228405</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228408">https://bugzilla.suse.com/show_bug.cgi?id=1228408</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228409">https://bugzilla.suse.com/show_bug.cgi?id=1228409</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228410">https://bugzilla.suse.com/show_bug.cgi?id=1228410</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228418">https://bugzilla.suse.com/show_bug.cgi?id=1228418</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228440">https://bugzilla.suse.com/show_bug.cgi?id=1228440</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228459">https://bugzilla.suse.com/show_bug.cgi?id=1228459</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228462">https://bugzilla.suse.com/show_bug.cgi?id=1228462</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228470">https://bugzilla.suse.com/show_bug.cgi?id=1228470</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228518">https://bugzilla.suse.com/show_bug.cgi?id=1228518</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228520">https://bugzilla.suse.com/show_bug.cgi?id=1228520</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228530">https://bugzilla.suse.com/show_bug.cgi?id=1228530</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228561">https://bugzilla.suse.com/show_bug.cgi?id=1228561</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228565">https://bugzilla.suse.com/show_bug.cgi?id=1228565</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228580">https://bugzilla.suse.com/show_bug.cgi?id=1228580</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228581">https://bugzilla.suse.com/show_bug.cgi?id=1228581</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228591">https://bugzilla.suse.com/show_bug.cgi?id=1228591</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228599">https://bugzilla.suse.com/show_bug.cgi?id=1228599</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228617">https://bugzilla.suse.com/show_bug.cgi?id=1228617</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228625">https://bugzilla.suse.com/show_bug.cgi?id=1228625</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228626">https://bugzilla.suse.com/show_bug.cgi?id=1228626</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228633">https://bugzilla.suse.com/show_bug.cgi?id=1228633</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228640">https://bugzilla.suse.com/show_bug.cgi?id=1228640</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228644">https://bugzilla.suse.com/show_bug.cgi?id=1228644</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228649">https://bugzilla.suse.com/show_bug.cgi?id=1228649</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228655">https://bugzilla.suse.com/show_bug.cgi?id=1228655</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228665">https://bugzilla.suse.com/show_bug.cgi?id=1228665</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228672">https://bugzilla.suse.com/show_bug.cgi?id=1228672</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228680">https://bugzilla.suse.com/show_bug.cgi?id=1228680</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228705">https://bugzilla.suse.com/show_bug.cgi?id=1228705</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228723">https://bugzilla.suse.com/show_bug.cgi?id=1228723</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228743">https://bugzilla.suse.com/show_bug.cgi?id=1228743</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228756">https://bugzilla.suse.com/show_bug.cgi?id=1228756</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228801">https://bugzilla.suse.com/show_bug.cgi?id=1228801</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228850">https://bugzilla.suse.com/show_bug.cgi?id=1228850</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228857">https://bugzilla.suse.com/show_bug.cgi?id=1228857</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-8582">https://jira.suse.com/browse/PED-8582</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-8690">https://jira.suse.com/browse/PED-8690</a>
</li>


</ul>

</div>

--===============6308351163670934838==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung