Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: SUSE-SU-2024:2947-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Server for SAP Applications 15 SP5, SUSE Linux Enterprise Server 15 SP5, SUSE Linux Enterprise High Performance Computing 15 SP5, SUSE Public Cloud Module 15-SP5, SUSE openSUSE Leap 15.5
Datum: Fr, 16. August 2024, 22:12
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26585
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26661
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39501
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52580
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48807
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38598
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36974
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40970
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48793
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48836
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48783
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48756
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47186
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48811
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47623
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52775
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48774
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48841
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48862
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48787
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40916
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47588
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41057
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47593
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38570
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48820
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39507
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26633
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48784
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48838
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48791
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36909
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48777
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38588
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47546
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48866
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35890
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48775
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36910
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36926
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47402
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40909
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42122
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38548
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48835
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47590
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48792
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48801
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48780
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40972
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40929
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40940
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48831
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-269355
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39482
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48732
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47598
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36946
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27402
Applikationen: Linux

Originalnachricht

--===============4568288300297206905==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:2947-1
Rating: important
References:

* bsc#1082555
* bsc#1193454
* bsc#1193554
* bsc#1193787
* bsc#1194324
* bsc#1194869
* bsc#1195357
* bsc#1195668
* bsc#1195927
* bsc#1195957
* bsc#1196018
* bsc#1196823
* bsc#1197146
* bsc#1197246
* bsc#1197762
* bsc#1202346
* bsc#1202686
* bsc#1208783
* bsc#1209636
* bsc#1213123
* bsc#1215492
* bsc#1215587
* bsc#1216834
* bsc#1219832
* bsc#1220138
* bsc#1220185
* bsc#1220186
* bsc#1220187
* bsc#1220869
* bsc#1220876
* bsc#1220942
* bsc#1220952
* bsc#1221010
* bsc#1221044
* bsc#1221647
* bsc#1221654
* bsc#1221656
* bsc#1221659
* bsc#1221777
* bsc#1222011
* bsc#1222323
* bsc#1222326
* bsc#1222328
* bsc#1222625
* bsc#1222702
* bsc#1222728
* bsc#1222799
* bsc#1222809
* bsc#1222810
* bsc#1223021
* bsc#1223180
* bsc#1223635
* bsc#1223652
* bsc#1223675
* bsc#1223778
* bsc#1223806
* bsc#1223813
* bsc#1223815
* bsc#1223836
* bsc#1223863
* bsc#1224414
* bsc#1224499
* bsc#1224500
* bsc#1224512
* bsc#1224516
* bsc#1224517
* bsc#1224545
* bsc#1224548
* bsc#1224557
* bsc#1224572
* bsc#1224573
* bsc#1224585
* bsc#1224604
* bsc#1224636
* bsc#1224641
* bsc#1224683
* bsc#1224694
* bsc#1224700
* bsc#1224743
* bsc#1225088
* bsc#1225272
* bsc#1225301
* bsc#1225475
* bsc#1225489
* bsc#1225504
* bsc#1225505
* bsc#1225564
* bsc#1225573
* bsc#1225581
* bsc#1225586
* bsc#1225711
* bsc#1225717
* bsc#1225719
* bsc#1225744
* bsc#1225745
* bsc#1225746
* bsc#1225752
* bsc#1225753
* bsc#1225757
* bsc#1225767
* bsc#1225810
* bsc#1225815
* bsc#1225820
* bsc#1225829
* bsc#1225835
* bsc#1225838
* bsc#1225839
* bsc#1225843
* bsc#1225847
* bsc#1225851
* bsc#1225856
* bsc#1225895
* bsc#1225898
* bsc#1225903
* bsc#1226202
* bsc#1226502
* bsc#1226519
* bsc#1226551
* bsc#1226555
* bsc#1226565
* bsc#1226568
* bsc#1226570
* bsc#1226571
* bsc#1226574
* bsc#1226588
* bsc#1226607
* bsc#1226650
* bsc#1226698
* bsc#1226713
* bsc#1226716
* bsc#1226750
* bsc#1226757
* bsc#1226758
* bsc#1226775
* bsc#1226783
* bsc#1226785
* bsc#1226834
* bsc#1226837
* bsc#1226911
* bsc#1226990
* bsc#1226993
* bsc#1227090
* bsc#1227121
* bsc#1227157
* bsc#1227162
* bsc#1227362
* bsc#1227383
* bsc#1227432
* bsc#1227435
* bsc#1227447
* bsc#1227487
* bsc#1227549
* bsc#1227573
* bsc#1227618
* bsc#1227620
* bsc#1227626
* bsc#1227635
* bsc#1227661
* bsc#1227716
* bsc#1227722
* bsc#1227724
* bsc#1227725
* bsc#1227728
* bsc#1227729
* bsc#1227730
* bsc#1227732
* bsc#1227733
* bsc#1227750
* bsc#1227754
* bsc#1227755
* bsc#1227760
* bsc#1227762
* bsc#1227763
* bsc#1227764
* bsc#1227766
* bsc#1227770
* bsc#1227771
* bsc#1227772
* bsc#1227774
* bsc#1227779
* bsc#1227780
* bsc#1227783
* bsc#1227786
* bsc#1227787
* bsc#1227790
* bsc#1227792
* bsc#1227796
* bsc#1227797
* bsc#1227798
* bsc#1227800
* bsc#1227802
* bsc#1227806
* bsc#1227808
* bsc#1227810
* bsc#1227812
* bsc#1227813
* bsc#1227814
* bsc#1227816
* bsc#1227820
* bsc#1227823
* bsc#1227824
* bsc#1227828
* bsc#1227829
* bsc#1227836
* bsc#1227846
* bsc#1227849
* bsc#1227851
* bsc#1227862
* bsc#1227864
* bsc#1227865
* bsc#1227866
* bsc#1227870
* bsc#1227884
* bsc#1227886
* bsc#1227891
* bsc#1227893
* bsc#1227899
* bsc#1227900
* bsc#1227910
* bsc#1227913
* bsc#1227917
* bsc#1227919
* bsc#1227920
* bsc#1227921
* bsc#1227922
* bsc#1227923
* bsc#1227924
* bsc#1227925
* bsc#1227927
* bsc#1227928
* bsc#1227931
* bsc#1227932
* bsc#1227933
* bsc#1227935
* bsc#1227936
* bsc#1227938
* bsc#1227941
* bsc#1227942
* bsc#1227944
* bsc#1227945
* bsc#1227947
* bsc#1227948
* bsc#1227949
* bsc#1227950
* bsc#1227952
* bsc#1227953
* bsc#1227954
* bsc#1227956
* bsc#1227957
* bsc#1227963
* bsc#1227964
* bsc#1227965
* bsc#1227968
* bsc#1227969
* bsc#1227970
* bsc#1227971
* bsc#1227972
* bsc#1227975
* bsc#1227976
* bsc#1227981
* bsc#1227982
* bsc#1227985
* bsc#1227986
* bsc#1227987
* bsc#1227988
* bsc#1227989
* bsc#1227990
* bsc#1227991
* bsc#1227992
* bsc#1227993
* bsc#1227995
* bsc#1227996
* bsc#1227997
* bsc#1228000
* bsc#1228002
* bsc#1228003
* bsc#1228004
* bsc#1228005
* bsc#1228006
* bsc#1228007
* bsc#1228008
* bsc#1228009
* bsc#1228010
* bsc#1228011
* bsc#1228013
* bsc#1228014
* bsc#1228015
* bsc#1228019
* bsc#1228020
* bsc#1228025
* bsc#1228028
* bsc#1228035
* bsc#1228037
* bsc#1228038
* bsc#1228039
* bsc#1228040
* bsc#1228045
* bsc#1228054
* bsc#1228055
* bsc#1228056
* bsc#1228060
* bsc#1228061
* bsc#1228062
* bsc#1228063
* bsc#1228064
* bsc#1228066
* bsc#1228067
* bsc#1228068
* bsc#1228071
* bsc#1228079
* bsc#1228090
* bsc#1228114
* bsc#1228140
* bsc#1228190
* bsc#1228191
* bsc#1228195
* bsc#1228202
* bsc#1228226
* bsc#1228235
* bsc#1228237
* bsc#1228247
* bsc#1228327
* bsc#1228328
* bsc#1228330
* bsc#1228403
* bsc#1228405
* bsc#1228408
* bsc#1228409
* bsc#1228410
* bsc#1228418
* bsc#1228440
* bsc#1228459
* bsc#1228462
* bsc#1228470
* bsc#1228518
* bsc#1228520
* bsc#1228530
* bsc#1228561
* bsc#1228565
* bsc#1228580
* bsc#1228581
* bsc#1228591
* bsc#1228599
* bsc#1228617
* bsc#1228625
* bsc#1228626
* bsc#1228633
* bsc#1228640
* bsc#1228644
* bsc#1228649
* bsc#1228655
* bsc#1228665
* bsc#1228672
* bsc#1228680
* bsc#1228705
* bsc#1228723
* bsc#1228743
* bsc#1228756
* bsc#1228801
* bsc#1228850
* bsc#1228857
* jsc#PED-8582
* jsc#PED-8690


Cross-References:

* CVE-2021-47086
* CVE-2021-47103
* CVE-2021-47186
* CVE-2021-47402
* CVE-2021-47546
* CVE-2021-47547
* CVE-2021-47588
* CVE-2021-47590
* CVE-2021-47591
* CVE-2021-47593
* CVE-2021-47598
* CVE-2021-47599
* CVE-2021-47606
* CVE-2021-47622
* CVE-2021-47623
* CVE-2021-47624
* CVE-2022-48713
* CVE-2022-48730
* CVE-2022-48732
* CVE-2022-48749
* CVE-2022-48756
* CVE-2022-48773
* CVE-2022-48774
* CVE-2022-48775
* CVE-2022-48776
* CVE-2022-48777
* CVE-2022-48778
* CVE-2022-48780
* CVE-2022-48783
* CVE-2022-48784
* CVE-2022-48785
* CVE-2022-48786
* CVE-2022-48787
* CVE-2022-48788
* CVE-2022-48789
* CVE-2022-48790
* CVE-2022-48791
* CVE-2022-48792
* CVE-2022-48793
* CVE-2022-48794
* CVE-2022-48796
* CVE-2022-48797
* CVE-2022-48798
* CVE-2022-48799
* CVE-2022-48800
* CVE-2022-48801
* CVE-2022-48802
* CVE-2022-48803
* CVE-2022-48804
* CVE-2022-48805
* CVE-2022-48806
* CVE-2022-48807
* CVE-2022-48809
* CVE-2022-48810
* CVE-2022-48811
* CVE-2022-48812
* CVE-2022-48813
* CVE-2022-48814
* CVE-2022-48815
* CVE-2022-48816
* CVE-2022-48817
* CVE-2022-48818
* CVE-2022-48820
* CVE-2022-48821
* CVE-2022-48822
* CVE-2022-48823
* CVE-2022-48824
* CVE-2022-48825
* CVE-2022-48826
* CVE-2022-48827
* CVE-2022-48828
* CVE-2022-48829
* CVE-2022-48830
* CVE-2022-48831
* CVE-2022-48834
* CVE-2022-48835
* CVE-2022-48836
* CVE-2022-48837
* CVE-2022-48838
* CVE-2022-48839
* CVE-2022-48840
* CVE-2022-48841
* CVE-2022-48842
* CVE-2022-48843
* CVE-2022-48844
* CVE-2022-48846
* CVE-2022-48847
* CVE-2022-48849
* CVE-2022-48850
* CVE-2022-48851
* CVE-2022-48852
* CVE-2022-48853
* CVE-2022-48855
* CVE-2022-48856
* CVE-2022-48857
* CVE-2022-48858
* CVE-2022-48859
* CVE-2022-48860
* CVE-2022-48861
* CVE-2022-48862
* CVE-2022-48863
* CVE-2022-48864
* CVE-2022-48866
* CVE-2023-1582
* CVE-2023-37453
* CVE-2023-52435
* CVE-2023-52573
* CVE-2023-52580
* CVE-2023-52591
* CVE-2023-52735
* CVE-2023-52751
* CVE-2023-52762
* CVE-2023-52775
* CVE-2023-52812
* CVE-2023-52857
* CVE-2023-52863
* CVE-2023-52885
* CVE-2023-52886
* CVE-2024-25741
* CVE-2024-26583
* CVE-2024-26584
* CVE-2024-26585
* CVE-2024-26615
* CVE-2024-26633
* CVE-2024-26635
* CVE-2024-26636
* CVE-2024-26641
* CVE-2024-26661
* CVE-2024-26663
* CVE-2024-26665
* CVE-2024-26800
* CVE-2024-26802
* CVE-2024-26813
* CVE-2024-26814
* CVE-2024-26863
* CVE-2024-26889
* CVE-2024-26920
* CVE-2024-26935
* CVE-2024-269355
* CVE-2024-26961
* CVE-2024-26976
* CVE-2024-27015
* CVE-2024-27019
* CVE-2024-27020
* CVE-2024-27025
* CVE-2024-27065
* CVE-2024-27402
* CVE-2024-27437
* CVE-2024-35805
* CVE-2024-35819
* CVE-2024-35837
* CVE-2024-35853
* CVE-2024-35854
* CVE-2024-35855
* CVE-2024-35889
* CVE-2024-35890
* CVE-2024-35893
* CVE-2024-35899
* CVE-2024-35934
* CVE-2024-35949
* CVE-2024-35961
* CVE-2024-35979
* CVE-2024-35995
* CVE-2024-36000
* CVE-2024-36004
* CVE-2024-36288
* CVE-2024-36889
* CVE-2024-36901
* CVE-2024-36902
* CVE-2024-36909
* CVE-2024-36910
* CVE-2024-36911
* CVE-2024-36912
* CVE-2024-36913
* CVE-2024-36914
* CVE-2024-36919
* CVE-2024-36923
* CVE-2024-36924
* CVE-2024-36926
* CVE-2024-36939
* CVE-2024-36941
* CVE-2024-36942
* CVE-2024-36944
* CVE-2024-36946
* CVE-2024-36947
* CVE-2024-36950
* CVE-2024-36952
* CVE-2024-36955
* CVE-2024-36959
* CVE-2024-36974
* CVE-2024-38548
* CVE-2024-38555
* CVE-2024-38558
* CVE-2024-38559
* CVE-2024-38570
* CVE-2024-38586
* CVE-2024-38588
* CVE-2024-38598
* CVE-2024-38628
* CVE-2024-39276
* CVE-2024-39371
* CVE-2024-39463
* CVE-2024-39472
* CVE-2024-39475
* CVE-2024-39482
* CVE-2024-39487
* CVE-2024-39488
* CVE-2024-39490
* CVE-2024-39493
* CVE-2024-39494
* CVE-2024-39497
* CVE-2024-39499
* CVE-2024-39500
* CVE-2024-39501
* CVE-2024-39502
* CVE-2024-39505
* CVE-2024-39506
* CVE-2024-39507
* CVE-2024-39508
* CVE-2024-39509
* CVE-2024-40900
* CVE-2024-40901
* CVE-2024-40902
* CVE-2024-40903
* CVE-2024-40904
* CVE-2024-40906
* CVE-2024-40908
* CVE-2024-40909
* CVE-2024-40911
* CVE-2024-40912
* CVE-2024-40916
* CVE-2024-40919
* CVE-2024-40923
* CVE-2024-40924
* CVE-2024-40927
* CVE-2024-40929
* CVE-2024-40931
* CVE-2024-40932
* CVE-2024-40934
* CVE-2024-40935
* CVE-2024-40937
* CVE-2024-40940
* CVE-2024-40941
* CVE-2024-40942
* CVE-2024-40943
* CVE-2024-40945
* CVE-2024-40953
* CVE-2024-40954
* CVE-2024-40956
* CVE-2024-40958
* CVE-2024-40959
* CVE-2024-40960
* CVE-2024-40961
* CVE-2024-40966
* CVE-2024-40967
* CVE-2024-40970
* CVE-2024-40972
* CVE-2024-40976
* CVE-2024-40977
* CVE-2024-40981
* CVE-2024-40982
* CVE-2024-40984
* CVE-2024-40987
* CVE-2024-40988
* CVE-2024-40989
* CVE-2024-40990
* CVE-2024-40994
* CVE-2024-40998
* CVE-2024-40999
* CVE-2024-41002
* CVE-2024-41004
* CVE-2024-41006
* CVE-2024-41009
* CVE-2024-41011
* CVE-2024-41012
* CVE-2024-41013
* CVE-2024-41014
* CVE-2024-41015
* CVE-2024-41016
* CVE-2024-41017
* CVE-2024-41040
* CVE-2024-41041
* CVE-2024-41044
* CVE-2024-41048
* CVE-2024-41057
* CVE-2024-41058
* CVE-2024-41059
* CVE-2024-41063
* CVE-2024-41064
* CVE-2024-41066
* CVE-2024-41069
* CVE-2024-41070
* CVE-2024-41071
* CVE-2024-41072
* CVE-2024-41076
* CVE-2024-41078
* CVE-2024-41081
* CVE-2024-41087
* CVE-2024-41090
* CVE-2024-41091
* CVE-2024-42070
* CVE-2024-42079
* CVE-2024-42093
* CVE-2024-42096
* CVE-2024-42105
* CVE-2024-42122
* CVE-2024-42124
* CVE-2024-42145
* CVE-2024-42161
* CVE-2024-42224
* CVE-2024-42230


CVSS scores:

* CVE-2021-47086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47546 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47547 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2021-47588 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47590 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47591 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47593 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47599 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47622 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47623 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2021-47624 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48713 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48749 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48774 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-48775 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48776 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48778 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48785 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48786 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-48787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48787 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48788 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-48788 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48789 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48789 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48790 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48790 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48791 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48792 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48792 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48793 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48796 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-48798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48799 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48800 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48801 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48803 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-48804 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48805 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-48807 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48814 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48816 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48821 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48822 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48822 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48823 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48825 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2022-48826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-48829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-48830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48834 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2022-48834 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48836 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48837 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48838 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48839 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48842 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48842 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48843 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48843 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48844 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48847 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48849 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-48850 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48851 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48852 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48855 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48858 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48859 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48863 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48866 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48866 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-1582 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-1582 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-37453 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-37453 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52435 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52435 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52573 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52580 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52775 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-52812 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52885 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-25741 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-26583 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26583 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26584 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26585 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26585 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26635 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-26636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26641 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-26661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26800 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26813 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26814 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26935 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27019 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-27020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27020 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27025 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-27065 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27402 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-27437 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35934 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-35949 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35995 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-36000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36889 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-36901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-36910 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-36911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-36912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-36913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-36914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36923 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-36924 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36942 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-36944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-36947 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-36950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36952 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36955 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36959 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36974 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38555 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38558 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-38559 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38570 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38570 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38586 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38588 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38598 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38628 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39276 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39463 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-39472 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
* CVE-2024-39472 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39475 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39475 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39482 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
* CVE-2024-39482 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39487 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-39488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39490 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-39493 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-39493 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39494 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-39494 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-39497 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39499 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-39500 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39501 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39502 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-39505 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-39506 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39507 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39508 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-39509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40900 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40901 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
* CVE-2024-40902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-40902 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40903 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40903 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40906 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40927 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40931 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-40932 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-40934 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-40935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40940 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40942 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40956 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40966 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40967 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40972 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40976 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40981 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-40982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40987 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-40988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40989 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40994 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40999 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-41002 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-41004 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-41006 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-41009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41011 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41012 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41013 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-41014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41015 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41040 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41041 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-41044 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-41048 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41057 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41057 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41058 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41058 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41063 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41063 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41064 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41064 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41066 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41066 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-41069 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41069 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41070 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41071 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-41072 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-41076 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41078 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41090 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
* CVE-2024-41091 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2024-42070 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-42070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42079 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42093 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
* CVE-2024-42096 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42096 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-42105 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42105 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-42122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42145 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42161 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42161 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42161 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42224 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42230 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42230 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42230 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H


Affected Products:

* openSUSE Leap 15.5
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5



An update that solves 311 vulnerabilities, contains two features and has 50
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

* CVE-2021-47086: phonet/pep: refuse to enable an unbound pipe (bsc#1220952).
* CVE-2021-47103: net: sock: preserve kabi for sock (bsc#1221010).
* CVE-2021-47186: ipc: check for null after calling kmemdup (bsc#1222702).
* CVE-2021-47546: Kabi fix for ipv6: fix memory leak in fib6_rule_suppress
(bsc#1225504).
* CVE-2021-47547: net: tulip: de4x5: fix the problem that the array
'lp->phy'
may be out of bound (bsc#1225505).
* CVE-2021-47588: sit: do not call ipip6_dev_free() from sit_init_net()
(bsc#1226568).
* CVE-2021-47590: mptcp: fix deadlock in __mptcp_push_pending()
(bsc#1226565).
* CVE-2021-47591: mptcp: remove tcp ulp setsockopt support (bsc#1226570).
* CVE-2021-47593: mptcp: clear 'kern' flag from fallback sockets
(bsc#1226551).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1226574).
* CVE-2021-47599: btrfs: use latest_dev in btrfs_show_devname (bsc#1226571)
* CVE-2021-47606: net: netlink: af_netlink: Prevent empty skb by adding a
check on len (bsc#1226555).
* CVE-2021-47623: powerpc/fixmap: Fix VM debug warning on unmap
(bsc#1227919).
* CVE-2022-48785: ipv6: mcast: use rcu-safe version of ipv6_get_lladdr()
(bsc#1227927)
* CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling
ip[6]mr_free_table()
on failure path (bsc#1227936).
* CVE-2022-48850: net-sysfs: add check for netdevice being present to
speed_show (bsc#1228071)
* CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets (bsc#1228003).
* CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138).
* CVE-2023-52573: net: rds: Fix possible NULL-pointer dereference
(bsc#1220869)
* CVE-2023-52580: net/core: Fix ETH_P_1588 flow dissector (bsc#1220876).
* CVE-2023-52751: smb: client: fix use-after-free in
smb2_query_info_compound() (bsc#1225489).
* CVE-2023-52775: net/smc: avoid data corruption caused by decline
(bsc#1225088).
* CVE-2023-52812: drm/amd: check num of link levels when update pcie param
(bsc#1225564).
* CVE-2023-52857: drm/mediatek: Fix coverity issue with unintentional integer
overflow (bsc#1225581).
* CVE-2023-52863: hwmon: (axi-fan-control) Fix possible NULL pointer
dereference (bsc#1225586).
* CVE-2024-26585: Fixed race between tx work scheduling and socket close
(bsc#1220187).
* CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection
dump (bsc#1220942).
* CVE-2024-26633: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in
ip6_tnl_parse_tlv_enc_lim() (bsc#1221647).
* CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656).
* CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding
changes (bsc#1221659).
* CVE-2024-26641: ip6_tunnel: make sure to pull inner header in
__ip6_tnl_rcv() (bsc#1221654).
* CVE-2024-26661: drm/amd/display: Add NULL test for 'timing
generator' in
(bsc#1222323)
* CVE-2024-26663: tipc: Check the bearer type before calling
tipc_udp_nl_bearer_add() (bsc#1222326).
* CVE-2024-26665: tunnels: fix out of bounds access when building IPv6 PMTU
error (bsc#1222328).
* CVE-2024-26802: stmmac: Clear variable when destroying workqueue
(bsc#1222799).
* CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node()
(bsc#1223021).
* CVE-2024-26961: mac802154: fix llsec key resources release in
mac802154_llsec_key_del (bsc#1223652).
* CVE-2024-27015: netfilter: flowtable: incorrect pppoe tuple (bsc#1223806).
* CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in
__nft_obj_type_get() (bsc#1223813)
* CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in
__nft_expr_type_get() (bsc#1223815)
* CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778)
* CVE-2024-27065: netfilter: nf_tables: do not compare internal table flags
on
updates (bsc#1223836).
* CVE-2024-27402: phonet/pep: fix racy skb_queue_empty() use (bsc#1224414).
* CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ
(bsc#1222625).
* CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit
(bsc#1224743).
* CVE-2024-35819: soc: fsl: qbman: Use raw spinlock for cgr_lock
(bsc#1224683).
* CVE-2024-35837: net: mvpp2: clear BM pool before initialization
(bsc#1224500).
* CVE-2024-35853: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash
(bsc#1224604).
* CVE-2024-35889: idpf: fix kernel panic on unknown packet types
(bsc#1224517).
* CVE-2024-35890: gro: fix ownership transfer (bsc#1224516).
* CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak
(bsc#1224512)
* CVE-2024-35899: netfilter: nf_tables: flush pending destroy work before
exit_net release (bsc#1224499)
* CVE-2024-35934: net/smc: reduce rtnl pressure in
smc_pnet_create_pnetids_list() (bsc#1224641)
* CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks
(bsc#1224700)
* CVE-2024-35961: net/mlx5: Restore mistakenly dropped parts in register
devlink flow (bsc#1224585).
* CVE-2024-35995: ACPI: CPPC: Fix access width used for PCC registers
(bsc#1224557).
* CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge
(bsc#1224548).
* CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue
(bsc#1224545)
* CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output()
(bsc#1225711)
* CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in
fib6_rule_action() (bsc#1225719).
* CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that
couldn't
be re-encrypted (bsc#1225744).
* CVE-2024-36910: uio_hv_generic: Do not free decrypted memory (bsc#1225717).
* CVE-2024-36911: hv_netvsc: Do not free decrypted memory (bsc#1225745).
* CVE-2024-36912: Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl
(bsc#1225752).
* CVE-2024-36913: Drivers: hv: vmbus: Leak pages if set_memory_encrypted()
fails (bsc#1225753).
* CVE-2024-36914: drm/amd/display: Skip on writeback when it's not
applicable
(bsc#1225757).
* CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources
after upload (bsc#1225767).
* CVE-2024-36923: fs/9p: fix uninitialized values during inode evict
(bsc#1225815).
* CVE-2024-36939: nfs: Handle error of rpc_proc_register() in nfs_net_init()
(bsc#1225838).
* CVE-2024-36946: phonet: fix rtm_phonet_notify() skb allocation
(bsc#1225851).
* CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP
(bsc#1226519).
* CVE-2024-38555: net/mlx5: Discard command completions in internal error
(bsc#1226607).
* CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for
ICMPv6 (bsc#1226783).
* CVE-2024-38570: gfs2: Fix potential glock use-after-free on unmount
(bsc#1226775).
* CVE-2024-38586: r8169: Fix possible ring buffer corruption on fragmented Tx
packets (bsc#1226750).
* CVE-2024-38598: md: fix resync softlockup when bitmap size is less than
array size (bsc#1226757).
* CVE-2024-38628: usb: gadget: u_audio: Fix race condition use of controls
after free during gadget unbind (bsc#1226911).
* CVE-2024-39276: ext4: fix mb_cache_entry's e_refcnt leak in
ext4_xattr_block_cache_find() (bsc#1226993).
* CVE-2024-39371: io_uring: check for non-NULL file pointer in
io_file_can_poll() (bsc#1226990).
* CVE-2024-39463: 9p: add missing locking around taking dentry fid list
(bsc#1227090).
* CVE-2024-39472: xfs: fix log recovery buffer allocation for the legacy
h_size fixup (bsc#1227432).
* CVE-2024-39482: bcache: fix variable length array abuse in btree_iter
(bsc#1227447).
* CVE-2024-39487: bonding: Fix out-of-bounds read in
bond_option_arp_ip_targets_set() (bsc#1227573)
* CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core
(bsc#1227626).
* CVE-2024-39493: crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak
(bsc#1227620).
* CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name
(bsc#1227716).
* CVE-2024-39497: drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE,
MAP_PRIVATE) (bsc#1227722)
* CVE-2024-39502: ionic: fix use after netif_napi_del() (bsc#1227755).
* CVE-2024-39506: liquidio: Adjust a NULL pointer handling path in
lio_vf_rep_copy_packet (bsc#1227729).
* CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario
(bsc#1227730).
* CVE-2024-39508: io_uring/io-wq: Use set_bit() and test_bit() at
worker->flags (bsc#1227732).
* CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non-
allocated memory (bsc#1227762).
* CVE-2024-40906: net/mlx5: Always stop health timer during driver removal
(bsc#1227763).
* CVE-2024-40908: bpf: Set run context for rawtp test_run callback
(bsc#1227783).
* CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free()
(bsc#1227798).
* CVE-2024-40919: bnxt_en: Adjust logging of firmware messages in case of
released token in __hwrm_send() (bsc#1227779).
* CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure
(bsc#1227786).
* CVE-2024-40931: mptcp: ensure snd_una is properly initialized on connect
(bsc#1227780).
* CVE-2024-40935: cachefiles: flush all requests after setting
CACHEFILES_DEAD
(bsc#1227797).
* CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any()
(bsc#1227836).
* CVE-2024-40940: net/mlx5: Fix tainted pointer delete is case of flow rules
creation fail (bsc#1227800).
* CVE-2024-40943: ocfs2: fix races between hole punching and AIO+DIO
(bsc#1227849).
* CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in
kvm_vcpu_on_spin() (bsc#1227806).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-40958: netns: Make get_net_ns() handle zero refcount net
(bsc#1227812).
* CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in
xfrm6_get_saddr() (bsc#1227884).
* CVE-2024-40960: ipv6: prevent possible NULL dereference in rt6_probe()
(bsc#1227813).
* CVE-2024-40961: ipv6: prevent possible NULL deref in fib6_nh_init()
(bsc#1227814).
* CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc
(bsc#1227886).
* CVE-2024-40967: serial: imx: Introduce timeout when waiting on transmitter
empty (bsc#1227891).
* CVE-2024-40970: Avoid hw_desc array overrun in dw-axi-dmac (bsc#1227899).
* CVE-2024-40972: ext4: fold quota accounting into
ext4_xattr_inode_lookup_create() (bsc#1227910).
* CVE-2024-40977: wifi: mt76: mt7921s: fix potential hung tasks during chip
recovery (bsc#1227950).
* CVE-2024-40982: ssb: Fix potential NULL pointer dereference in
ssb_device_uevent() (bsc#1227865).
* CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on
teardown (bsc#1227823).
* CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store
(bsc#1227829).
* CVE-2024-40998: ext4: fix uninitialized ratelimit_state->lock access in
__ext4_fill_super() (bsc#1227866).
* CVE-2024-40999: net: ena: Add validation for completion descriptors
consistency (bsc#1227913).
* CVE-2024-41006: netrom: Fix a memory leak in nr_heartbeat_expiry()
(bsc#1227862).
* CVE-2024-41009: selftests/bpf: Add more ring buffer test coverage
(bsc#1228020).
* CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is
detected (bsc#1228247).
* CVE-2024-41013: xfs: do not walk off the end of a directory data block
(bsc#1228405).
* CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data
(bsc#1228408).
* CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry()
(bsc#1228409).
* CVE-2024-41016: ocfs2: add bounds checking to ocfs2_xattr_find_entry()
(bsc#1228410).
* CVE-2024-41017: jfs: do not walk off the end of ealist (bsc#1228403).
* CVE-2024-41040: net/sched: Fix UAF when resolving a clash (bsc#1228518)
* CVE-2024-41041: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port()
(bsc#1228520)
* CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets
(bsc#1228530).
* CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565)
* CVE-2024-41057: cachefiles: fix slab-use-after-free in
cachefiles_withdraw_cookie() (bsc#1228462).
* CVE-2024-41058: cachefiles: fix slab-use-after-free in
fscache_withdraw_volume() (bsc#1228459).
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
* CVE-2024-41063: Bluetooth: hci_core: cancel all works upon
hci_unregister_dev() (bsc#1228580)
* CVE-2024-41064: powerpc/eeh: avoid possible crash when edev->pdev
changes
(bsc#1228599).
* CVE-2024-41066: ibmvnic: Add tx check to prevent skb leak (bsc#1228640).
* CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).
* CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in
kvm_spapr_tce_attach_iommu_group() (bsc#1228581).
* CVE-2024-41071: wifi: mac80211: Avoid address calculations via out of
bounds
array indexing (bsc#1228625).
* CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable
failure (bsc#1228655).
* CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617)
* CVE-2024-41090: tap: add missing verification for short frame
(bsc#1228328).
* CVE-2024-41091: tun: add missing verification for short frame
(bsc#1228327).
* CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on
store
to data registers (bsc#1228470)
* CVE-2024-42079: gfs2: Fix NULL pointer dereference in gfs2_log_flush
(bsc#1228672).
* CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack
(bsc#1228680).
* CVE-2024-42096: x86: stop playing stack games in profile_pc()
(bsc#1228633).
* CVE-2024-42122: drm/amd/display: Add NULL pointer check for kzalloc
(bsc#1228591)
* CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible
(bsc#1228705)
* CVE-2024-42145: IB/core: Implement a limit on UMAD receive List
(bsc#1228743)
* CVE-2024-42161: bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD
(bsc#1228756).
* CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list
(bsc#1228723)
* CVE-2024-42230: powerpc/pseries: Fix scv instruction crash with kexec
(bsc#1194869).

The following non-security bugs were fixed:

* ACPI: EC: Abort address space access upon error (stable-fixes).
* ACPI: EC: Avoid returning AE_OK on errors in address space handler (stable-
fixes).
* ACPI: processor_idle: Fix invalid comparison with insertion sort for
latency
(git-fixes).
* ACPI: video: Add backlight=native quirk for Lenovo Slim 7 16ARH7 (stable-
fixes).
* ACPI: x86: Force StorageD3Enable on more products (stable-fixes).
* ACPI: x86: utils: Add Picasso to the list for forcing StorageD3Enable
(stable-fixes).
* ALSA: dmaengine_pcm: terminate dmaengine before synchronize (stable-fixes).
* ALSA: dmaengine: Synchronize dma channel after drop() (stable-fixes).
* ALSA: emux: improve patch ioctl data validation (stable-fixes).
* ALSA: hda: conexant: Fix headset auto detect fail in the polling mode (git-
fixes).
* ALSA: hda/realtek: Add more codec ID to no shutup pins list (stable-fixes).
* ALSA: hda/realtek: add quirk for Clevo V5[46]0TU (stable-fixes).
* ALSA: hda/realtek: Enable headset mic of JP-IK LEAP W502 with ALC897
(stable-fixes).
* ALSA: hda/realtek: Enable headset mic on Positivo SU C1400 (stable-fixes).
* ALSA: hda/realtek: Enable Mute LED on HP 250 G7 (stable-fixes).
* ALSA: hda/realtek: fix mute/micmute LEDs do not work for EliteBook 645/665
G11 (stable-fixes).
* ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book Pro 360
(stable-fixes).
* ALSA: hda/realtek: Limit mic boost on VAIO PRO PX (stable-fixes).
* ALSA: hda/relatek: Enable Mute LED on HP Laptop 15-gw0xxx (stable-fixes).
* ALSA: pcm_dmaengine: Do not synchronize DMA channel when DMA is paused
(git-
fixes).
* ALSA: usb-audio: Add a quirk for Sonix HD USB Camera (stable-fixes).
* ALSA: usb-audio: Correct surround channels in UAC1 channel map (git-fixes).
* ALSA: usb-audio: Fix microphone sound on HD webcam (stable-fixes).
* ALSA: usb-audio: Move HD Webcam quirk to the right place (git-fixes).
* arm64: dts: allwinner: Pine H64: correctly remove reg_gmac_3v3 (git-fixes)
* arm64: dts: hi3798cv200: fix the size of GICR (git-fixes)
* arm64: dts: imx8qm-mek: fix gpio number for reg_usdhc2_vmmc (git-fixes)
* arm64: dts: microchip: sparx5: fix mdio reg (git-fixes)
* arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git-
fixes)
* arm64: dts: rockchip: Add sound-dai-cells for RK3368 (git-fixes)
* arm64: dts: rockchip: fix PMIC interrupt pin on ROCK Pi E (git-fixes)
* arm64/io: add constant-argument check (bsc#1226502 git-fixes)
* arm64/io: Provide a WC friendly __iowriteXX_copy() (bsc#1226502)
* arm64: tegra: Correct Tegra132 I2C alias (git-fixes)
* ASoC: amd: Adjust error handling in case of absent codec device
(git-fixes).
* ASoC: max98088: Check for clk_prepare_enable() error (git-fixes).
* ASoC: ti: davinci-mcasp: Set min period size using FIFO config (stable-
fixes).
* ASoC: ti: omap-hdmi: Fix too long driver name (stable-fixes).
* batman-adv: bypass empty buckets in batadv_purge_orig_ref() (stable-fixes).
* blk-cgroup: dropping parent refcount after pd_free_fn() is done
(bsc#1224573).
* block: do not add partitions if GD_SUPPRESS_PART_SCAN is set (bsc#1227162).
* block, loop: support partitions without scanning (bsc#1227162).
* Bluetooth: ath3k: Fix multiple issues reported by checkpatch.pl (stable-
fixes).
* Bluetooth: btqca: use le32_to_cpu for ver.soc_id (stable-fixes).
* Bluetooth: hci_core: cancel all works upon hci_unregister_dev() (stable-
fixes).
* Bluetooth: hci_qca: mark OF related data as maybe unused (stable-fixes).
* Bluetooth: hci_sync: Fix suspending with wrong filter policy (git-fixes).
* Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot
(git-fixes).
* bnxt_re: Fix imm_data endianness (git-fixes)
* bpf: aggressively forget precise markings during state checkpointing
(bsc#1225903).
* bpf: allow precision tracking for programs with subprogs (bsc#1225903).
* bpf: check bpf_func_state->callback_depth when pruning states
(bsc#1225903).
* bpf: clean up visit_insn()'s instruction processing (bsc#1225903).
* bpf: correct loop detection for iterators convergence (bsc#1225903).
* bpf: encapsulate precision backtracking bookkeeping (bsc#1225903).
* bpf: ensure state checkpointing at iter_next() call sites (bsc#1225903).
* bpf: exact states comparison for iterator convergence checks (bsc#1225903).
* bpf: extract __check_reg_arg() utility function (bsc#1225903).
* bpf: extract same_callsites() as utility function (bsc#1225903).
* bpf: extract setup_func_entry() utility function (bsc#1225903).
* bpf: fix calculation of subseq_idx during precision backtracking
(bsc#1225903).
* bpf: fix mark_all_scalars_precise use in mark_chain_precision
(bsc#1225903).
* bpf: Fix memory leaks in __check_func_call (bsc#1225903).
* bpf: fix propagate_precision() logic for inner frames (bsc#1225903).
* bpf: fix regs_exact() logic in regsafe() to remap IDs correctly
(bsc#1225903).
* bpf: Fix to preserve reg parent/live fields when copying range info
(bsc#1225903).
* bpf: generalize MAYBE_NULL vs non-MAYBE_NULL rule (bsc#1225903).
* bpf: improve precision backtrack logging (bsc#1225903).
* bpf: Improve verifier u32 scalar equality checking (bsc#1225903).
* bpf: keep track of max number of bpf_loop callback iterations
(bsc#1225903).
* bpf: maintain bitmasks across all active frames in __mark_chain_precision
(bsc#1225903).
* bpf: mark relevant stack slots scratched for register read instructions
(bsc#1225903).
* bpf: move explored_state() closer to the beginning of verifier.c
(bsc#1225903).
* bpf: perform byte-by-byte comparison only when necessary in regsafe()
(bsc#1225903).
* bpf: print full verifier states on infinite loop detection (bsc#1225903).
* bpf: regsafe() must not skip check_ids() (bsc#1225903).
* bpf: reject non-exact register type matches in regsafe() (bsc#1225903).
* bpf: Remove unused insn_cnt argument from visit_[func_call_]insn()
(bsc#1225903).
* bpf: reorganize struct bpf_reg_state fields (bsc#1225903).
* bpf: Skip invalid kfunc call in backtrack_insn (bsc#1225903).
* bpf: states_equal() must build idmap for all function frames (bsc#1225903).
* bpf: stop setting precise in current state (bsc#1225903).
* bpf: support precision propagation in the presence of subprogs
(bsc#1225903).
* bpf: take into account liveness when propagating precision (bsc#1225903).
* bpf: teach refsafe() to take into account ID remapping (bsc#1225903).
* bpf: unconditionally reset backtrack_state masks on global func exit
(bsc#1225903).
* bpf: use check_ids() for active_lock comparison (bsc#1225903).
* bpf: Use scalar ids in mark_chain_precision() (bsc#1225903).
* bpf: verify callbacks as if they are called unknown number of times
(bsc#1225903).
* bpf: Verify scalar ids mapping in regsafe() using check_ids()
(bsc#1225903).
* bpf: widening for callback iterators (bsc#1225903).
* btrfs: add device major-minor info in the struct btrfs_device
(bsc#1227162).
* btrfs: harden identification of a stale device (bsc#1227162).
* btrfs: match stale devices by dev_t (bsc#1227162).
* btrfs: remove the cross file system checks from remap (bsc#1227157).
* btrfs: use dev_t to match device in device_matched (bsc#1227162).
* btrfs: validate device maj:min during open (bsc#1227162).
* bytcr_rt5640 : inverse jack detect for Archos 101 cesium (stable-fixes).
* cachefiles: add output string to cachefiles_obj_[get|put]_ondemand_fd (git-
fixes).
* can: kvaser_usb: Explicitly initialize family in leafimx driver_info struct
(git-fixes).
* can: kvaser_usb: fix return value for hif_usb_send_regout (stable-fixes).
* ceph: fix incorrect kmalloc size of pagevec mempool (bsc#1228418).
* cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801).
* crypto: aead,cipher - zeroize key buffer after use (stable-fixes).
* crypto: ecdh - explicitly zeroize private_key (stable-fixes).
* crypto: ecdsa - Fix the public key format description (git-fixes).
* crypto: hisilicon/sec - Fix memory leak for sec resource release (stable-
fixes).
* csky: ftrace: Drop duplicate implementation of arch_check_ftrace_location()
(git-fixes).
* decompress_bunzip2: fix rare decompression failure (git-fixes).
* devres: Fix devm_krealloc() wasting memory (git-fixes).
* devres: Fix memory leakage caused by driver API devm_free_percpu() (git-
fixes).
* dma: fix call order in dmam_free_coherent (git-fixes).
* docs: crypto: async-tx-api: fix broken code example (git-fixes).
* docs: Fix formatting of literal sections in fanotify docs (stable-fixes).
* drm/amd/amdgpu: Fix style errors in amdgpu_drv.c & amdgpu_device.c
(stable-
fixes).
* drm/amd/display: Account for cursor prefetch BW in DML1 mode support
(stable-fixes).
* drm/amd/display: Check for NULL pointer (stable-fixes).
* drm/amd/display: Check index msg_id before read or write (stable-fixes).
* drm/amd/display: Check pipe offset before setting vblank (stable-fixes).
* drm/amd/display: Skip finding free audio for unknown engine_id (stable-
fixes).
* drm/amdgpu/atomfirmware: fix parsing of vram_info (stable-fixes).
* drm/amdgpu/atomfirmware: silence UBSAN warning (stable-fixes).
* drm/amdgpu: avoid using null object of framebuffer (stable-fixes).
* drm/amdgpu: Check if NBIO funcs are NULL in amdgpu_device_baco_exit (git-
fixes).
* drm/amdgpu: Fix pci state save during mode-1 reset (git-fixes).
* drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq() (git-fixes).
* drm/amdgpu: fix uninitialized scalar variable warning (stable-fixes).
* drm/amdgpu: Fix uninitialized variable warnings (stable-fixes).
* drm/amdgpu: Initialize timestamp for some legacy SOCs (stable-fixes).
* drm/amdgpu: Remove GC HW IP 9.3.0 from noretry=1 (git-fixes).
* drm/amd/pm: Fix aldebaran pcie speed reporting (git-fixes).
* drm/amd/pm: remove logically dead code for renoir (git-fixes).
* drm/dp_mst: Fix all mstb marked as not probed after suspend/resume (git-
fixes).
* drm/etnaviv: do not block scheduler when GPU is still active
(stable-fixes).
* drm/etnaviv: fix DMA direction handling for cached RW buffers (git-fixes).
* drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes (git-
fixes).
* drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modes (git-
fixes).
* drm/i915/gt: Do not consider preemption during execlists_dequeue for gen8
(git-fixes).
* drm/lima: fix shared irq handling on driver remove (stable-fixes).
* drm/lima: Mark simple_ondemand governor as softdep (git-fixes).
* drm/mediatek: Add OVL compatible name for MT8195 (git-fixes).
* drm/meson: fix canvas release in bind function (git-fixes).
* drm/mgag200: Bind I2C lifetime to DRM device (git-fixes).
* drm/mgag200: Set DDC timeout in milliseconds (git-fixes).
* drm/mipi-dsi: Fix mipi_dsi_dcs_write_seq() macro definition format (stable-
fixes).
* drm/mipi-dsi: Fix theoretical int overflow in mipi_dsi_dcs_write_seq()
(git-
fixes).
* drm/msm/dpu: drop validity checks for clear_pending_flush() ctl op (git-
fixes).
* drm/msm/mdp5: Remove MDP_CAP_SRC_SPLIT from msm8x53_config (git-fixes).
* drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes
(stable-fixes).
* drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes
(stable-fixes).
* drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes
(git-fixes).
* drm/nouveau: prime: fix refcount underflow (git-fixes).
* drm/panel: boe-tv101wum-nl6: Check for errors on the NOP in prepare() (git-
fixes).
* drm/panel: boe-tv101wum-nl6: If prepare fails, disable GPIO before
regulators (git-fixes).
* drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep
(stable-fixes).
* drm: panel-orientation-quirks: Add quirk for Valve Galileo (stable-fixes).
* drm/panfrost: Mark simple_ondemand governor as softdep (git-fixes).
* drm/qxl: Add check for drm_cvt_mode (git-fixes).
* drm/radeon: check bo_va->bo is non-NULL before using it (stable-fixes).
* drm/radeon/radeon_display: Decrease the size of allocated memory (stable-
fixes).
* drm/vmwgfx: Fix a deadlock in dma buf fence polling (git-fixes).
* drm/vmwgfx: Fix missing HYPERVISOR_GUEST dependency (stable-fixes).
* drm/vmwgfx: Fix overlay when using Screen Targets (git-fixes).
* eeprom: digsy_mtc: Fix 93xx46 driver probe failure (git-fixes).
* exfat: check if cluster num is valid (git-fixes).
* exfat: simplify is_valid_cluster() (git-fixes).
* filelock: add a new locks_inode_context accessor function (git-fixes).
* firmware: cs_dsp: Fix overflow checking of wmfw header (git-fixes).
* firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers
(git-fixes).
* firmware: cs_dsp: Return error if block header overflows file (git-fixes).
* firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files
(git-fixes).
* firmware: cs_dsp: Validate payload length before processing block (git-
fixes).
* firmware: dmi: Stop decoding on broken entry (stable-fixes).
* firmware: turris-mox-rwtm: Do not complete if there are no waiters (git-
fixes).
* firmware: turris-mox-rwtm: Fix checking return value of
wait_for_completion_timeout() (git-fixes).
* firmware: turris-mox-rwtm: Initialize completion before mailbox
(git-fixes).
* fix build warning
* fs: allow cross-vfsmount reflink/dedupe (bsc#1227157).
* ftrace: Fix possible use-after-free issue in ftrace_location() (git-fixes).
* fuse: verify {g,u}id mount options correctly (bsc#1228191).
* gpio: mc33880: Convert comma to semicolon (git-fixes).
* hfsplus: fix to avoid false alarm of circular locking (git-fixes).
* hfsplus: fix uninit-value in copy_name (git-fixes).
* HID: Add quirk for Logitech Casa touchpad (stable-fixes).
* HID: wacom: Modify pen IDs (git-fixes).
* hpet: Support 32-bit userspace (git-fixes).
* hwmon: (adt7475) Fix default duty on fan is disabled (git-fixes).
* hwmon: (max6697) Fix swapped temp{1,8} critical alarms (git-fixes).
* hwmon: (max6697) Fix underflow when writing limit attributes (git-fixes).
* i2c: mark HostNotify target address as used (git-fixes).
* i2c: rcar: bring hardware to known state when probing (git-fixes).
* i2c: tegra: Fix failure during probe deferral cleanup (git-fixes)
* i2c: tegra: Share same DMA channel for RX and TX (bsc#1227661)
* i2c: testunit: avoid re-issued work after read message (git-fixes).
* i2c: testunit: correct Kconfig description (git-fixes).
* Input: elan_i2c - do not leave interrupt disabled on suspend failure (git-
fixes).
* Input: elantech - fix touchpad state on resume for Lenovo N24 (stable-
fixes).
* Input: ff-core - prefer struct_size over open coded arithmetic (stable-
fixes).
* Input: qt1050 - handle CHIP_ID reading error (git-fixes).
* Input: silead - Always support 10 fingers (stable-fixes).
* intel_th: pci: Add Granite Rapids SOC support (stable-fixes).
* intel_th: pci: Add Granite Rapids support (stable-fixes).
* intel_th: pci: Add Lunar Lake support (stable-fixes).
* intel_th: pci: Add Meteor Lake-S support (stable-fixes).
* intel_th: pci: Add Sapphire Rapids SOC support (stable-fixes).
* iommu/arm-smmu-v3: Free MSIs in case of ENOMEM (git-fixes).
* ionic: clean interrupt before enabling queue to avoid credit race (git-
fixes).
* jffs2: Fix potential illegal address access in jffs2_free_inode
(git-fixes).
* jfs: Fix array-index-out-of-bounds in diFree (git-fixes).
* jfs: xattr: fix buffer overflow for invalid xattr (bsc#1227383).
* kABI: bpf: bpf_reg_state reorganization kABI workaround (bsc#1225903).
* kABI: bpf: callback fixes kABI workaround (bsc#1225903).
* kABI: bpf: struct bpf_{idmap,idset} kABI workaround (bsc#1225903).
* kABI: bpf: tmp_str_buf kABI workaround (bsc#1225903).
* kABI: rtas: Workaround false positive due to lost definition (bsc#1227487).
* kabi/severities: ignore kABI for FireWire sound local symbols (bsc#1208783)
* kabi/severities: Ignore tpm_tis_core_init (bsc#1082555).
* kabi/severity: add nvme common code The nvme common code is also allowed to
change the data structures, there are only internal users.
* kabi: Use __iowriteXX_copy_inlined for in-kernel modules (bsc#1226502)
* kernel-binary: vdso: Own module_dir
* kernel/sched: Remove dl_boosted flag comment (git fixes (sched)).
* knfsd: LOOKUP can return an illegal error value (git-fixes).
* kobject_uevent: Fix OOB access within zap_modalias_env() (git-fixes).
* kprobes: Make arch_check_ftrace_location static (git-fixes).
* KVM: nVMX: Clear EXIT_QUALIFICATION when injecting an EPT Misconfig (git-
fixes).
* KVM: PPC: Book3S HV: Fix "rm_exit" entry in debugfs timings
(bsc#1194869).
* KVM: PPC: Book3S HV: Fix the set_one_reg for MMCR3 (bsc#1194869).
* KVM: PPC: Book3S HV Nested: L2 LPCR should inherit L1 LPES setting
(bsc#1194869).
* KVM: PPC: Book3S HV: remove extraneous asterisk from rm_host_ipi_action()
comment (bsc#1194869).
* KVM: PPC: Book3S: Suppress failed alloc warning in H_COPY_TOFROM_GUEST
(bsc#1194869).
* KVM: PPC: Book3S: Suppress warnings when allocating too big memory slots
(bsc#1194869).
* KVM: s390: fix LPSWEY handling (bsc#1227635 git-fixes).
* KVM: SVM: Process ICR on AVIC IPI delivery failure due to invalid target
(git-fixes).
* KVM: VMX: Report up-to-date exit qualification to userspace (git-fixes).
* KVM: x86: Add IBPB_BRTYPE support (bsc#1228079).
* KVM: x86: Always sync PIR to IRR prior to scanning I/O APIC routes (git-
fixes).
* KVM: x86: Bail from kvm_recalculate_phys_map() if x2APIC ID is
out-of-bounds
(git-fixes).
* KVM: x86: Disable APIC logical map if logical ID covers multiple MDAs (git-
fixes).
* KVM: x86: Disable APIC logical map if vCPUs are aliased in logical mode
(git-fixes).
* KVM: x86: Do not advertise guest.MAXPHYADDR as host.MAXPHYADDR in CPUID
(git-fixes).
* KVM: x86: Explicitly skip optimized logical map setup if vCPU's LDR==0
(git-
fixes).
* KVM: x86: Explicitly track all possibilities for APIC map's logical
modes
(git-fixes).
* KVM: x86: Fix broken debugregs ABI for 32 bit kernels (git-fixes).
* KVM: x86: Fix KVM_GET_MSRS stack info leak (git-fixes).
* KVM: x86: Honor architectural behavior for aliased 8-bit APIC IDs (git-
fixes).
* KVM: x86: Purge "highest ISR" cache when updating APICv state
(git-fixes).
* KVM: x86: Save/restore all NMIs when multiple NMIs are pending (git-fixes).
* KVM: x86: Skip redundant x2APIC logical mode optimized cluster setup (git-
fixes).
* leds: ss4200: Convert PCIBIOS_* return codes to errnos (git-fixes).
* leds: triggers: Flush pending brightness before activating trigger (git-
fixes).
* leds: trigger: Unregister sysfs attributes before calling deactivate()
(git-
fixes).
* libceph: fix race between delayed_work() and ceph_monc_stop()
(bsc#1228190).
* lib: objagg: Fix general protection fault (git-fixes).
* lib: objagg: Fix spelling (git-fixes).
* lib: test_objagg: Fix spelling (git-fixes).
* lockd: set missing fl_flags field when retrieving args (git-fixes).
* lockd: use locks_inode_context helper (git-fixes).
* Make AMD_HSMP=m and mark it unsupported in supported.conf (jsc#PED-8582)
* media: dvb: as102-fe: Fix as10x_register_addr packing (stable-fixes).
* media: dvbdev: Initialize sbuf (stable-fixes).
* media: dvb-frontends: tda10048: Fix integer overflow (stable-fixes).
* media: dvb-frontends: tda18271c2dd: Remove casting during div (stable-
fixes).
* media: dvb-usb: dib0700_devices: Add missing release_firmware() (stable-
fixes).
* media: dvb-usb: Fix unexpected infinite loop in
dvb_usb_read_remote_control() (git-fixes).
* media: dw2102: Do not translate i2c read into write (stable-fixes).
* media: dw2102: fix a potential buffer overflow (git-fixes).
* media: imon: Fix race getting ictx->lock (git-fixes).
* media: s2255: Use refcount_t instead of atomic_t for num_channels (stable-
fixes).
* media: uvcvideo: Fix integer overflow calculating timestamp (git-fixes).
* media: uvcvideo: Override default flags (git-fixes).
* media: venus: fix use after free in vdec_close (git-fixes).
* media: venus: flush all buffers in output plane streamoff (git-fixes).
* mei: demote client disconnect warning on suspend to debug (stable-fixes).
* mfd: omap-usb-tll: Use struct_size to allocate tll (git-fixes).
* mtd: partitions: redboot: Added conversion of operands to a larger type
(stable-fixes).
* net/dcb: check for detached device before executing callbacks
(bsc#1215587).
* netfilter: conntrack: ignore overly delayed tcp packets (bsc#1223180).
* netfilter: conntrack: prepare tcp_in_window for ternary return value
(bsc#1223180).
* netfilter: conntrack: remove pr_debug callsites from tcp tracker
(bsc#1223180).
* netfilter: conntrack: work around exceeded receive window (bsc#1223180).
* netfs, fscache: export fscache_put_volume() and add
fscache_try_get_volume()
(bsc#1228459 bsc#1228462).
* net: mana: Fix possible double free in error handling path (git-fixes).
* net: mana: Fix the extra HZ in mana_hwc_send_request (git-fixes).
* net: usb: qmi_wwan: add Telit FN912 compositions (git-fixes).
* net: usb: sr9700: fix uninitialized variable use in sr_mdio_read (git-
fixes).
* nfc/nci: Add the inconsistency check between the input data length and
count
(stable-fixes).
* NFSD: Add an nfsd_file_fsync tracepoint (git-fixes).
* NFSD: Add an NFSD_FILE_GC flag to enable nfsd_file garbage collection (git-
fixes).
* nfsd: Add errno mapping for EREMOTEIO (git-fixes).
* NFSD: Add nfsd_file_lru_dispose_list() helper (git-fixes).
* nfsd: add some comments to nfsd_file_do_acquire (git-fixes).
* nfsd: allow nfsd_file_get to sanely handle a NULL pointer (git-fixes).
* nfsd: allow reaping files still under writeback (git-fixes).
* NFSD: Avoid calling fh_drop_write() twice in do_nfsd_create() (git-fixes).
* NFSD: Clean up nfsd3_proc_create() (git-fixes).
* nfsd: Clean up nfsd_file_put() (git-fixes).
* NFSD: Clean up nfsd_open_verified() (git-fixes).
* NFSD: Clean up unused code after rhashtable conversion (git-fixes).
* NFSD: Convert filecache to rhltable (git-fixes).
* NFSD: Convert the filecache to use rhashtable (git-fixes).
* NFSD: De-duplicate hash bucket indexing (git-fixes).
* nfsd: do not free files unconditionally in __nfsd_file_cache_purge (git-
fixes).
* nfsd: do not fsync nfsd_files on last close (git-fixes).
* nfsd: do not hand out delegation on setuid files being opened for write
(git-fixes).
* nfsd: do not kill nfsd_files because of lease break error (git-fixes).
* nfsd: Do not leave work of closing files to a work queue (bsc#1228140).
* nfsd: do not take/put an extra reference when putting a file (git-fixes).
* NFSD enforce filehandle check for source file in COPY (git-fixes).
* NFSD: Ensure nf_inode is never dereferenced (git-fixes).
* nfsd: fix handling of cached open files in nfsd4_open codepath (git-fixes).
* NFSD: Fix licensing header in filecache.c (git-fixes).
* nfsd: fix net-namespace logic in __nfsd_file_cache_purge (git-fixes).
* nfsd: fix nfsd_file_unhash_and_dispose (git-fixes).
* NFSD: Fix potential use-after-free in nfsd_file_put() (git-fixes).
* NFSD: Fix problem of COMMIT and NFS4ERR_DELAY in infinite loop (git-fixes).
* NFSD: Fix the filecache LRU shrinker (git-fixes).
* nfsd: fix up the filecache laundrette scheduling (git-fixes).
* nfsd: fix use-after-free in nfsd_file_do_acquire tracepoint (git-fixes).
* NFSD: Flesh out a documenting comment for filecache.c (git-fixes).
* NFSD: handle errors better in write_ports_addfd() (git-fixes).
* NFSD: Instantiate a struct file when creating a regular NFSv4 file (git-
fixes).
* NFSD: Leave open files out of the filecache LRU (git-fixes).
* nfsd: map EBADF (git-fixes).
* NFSD: Move nfsd_file_trace_alloc() tracepoint (git-fixes).
* NFSD: nfsd_file_hash_remove can compute hashval (git-fixes).
* nfsd: NFSD_FILE_KEY_INODE only needs to find GC'ed entries (git-fixes).
* NFSD: nfsd_file_put() can sleep (git-fixes).
* NFSD: nfsd_file_unhash can compute hashval from nf->nf_inode
(git-fixes).
* NFSD: No longer record nf_hashval in the trace log (git-fixes).
* NFSD: Pass the target nfsd_file to nfsd_commit() (git-fixes).
* nfsd: put the export reference in nfsd4_verify_deleg_dentry (git-fixes).
* NFSD: Record number of flush calls (git-fixes).
* NFSD: Refactor nfsd_create_setattr() (git-fixes).
* NFSD: Refactor __nfsd_file_close_inode() (git-fixes).
* NFSD: Refactor nfsd_file_gc() (git-fixes).
* NFSD: Refactor nfsd_file_lru_scan() (git-fixes).
* NFSD: Refactor NFSv3 CREATE (git-fixes).
* NFSD: Refactor NFSv4 OPEN(CREATE) (git-fixes).
* NFSD: Remove do_nfsd_create() (git-fixes).
* NFSD: Remove lockdep assertion from unhash_and_release_locked()
(git-fixes).
* NFSD: Remove nfsd_file::nf_hashval (git-fixes).
* nfsd: remove the pages_flushed statistic from filecache (git-fixes).
* nfsd: reorganize filecache.c (git-fixes).
* NFSD: Replace the "init once" mechanism (git-fixes).
* NFSD: Report average age of filecache items (git-fixes).
* NFSD: Report count of calls to nfsd_file_acquire() (git-fixes).
* NFSD: Report count of freed filecache items (git-fixes).
* NFSD: Report filecache LRU size (git-fixes).
* NFSD: Report the number of items evicted by the LRU walk (git-fixes).
* nfsd: Retry once in nfsd_open on an -EOPENSTALE return (git-fixes).
* nfsd: rework hashtable handling in nfsd_do_file_acquire (git-fixes).
* nfsd: rework refcounting in filecache (git-fixes).
* NFSD: Separate tracepoints for acquire and create (git-fixes).
* NFSD: Set up an rhashtable for the filecache (git-fixes).
* nfsd: silence extraneous printk on nfsd.ko insertion (git-fixes).
* NFSD: simplify per-net file cache management (git-fixes).
* nfsd: simplify test_bit return in NFSD_FILE_KEY_FULL comparator
(git-fixes).
* nfsd: simplify the delayed disposal list code (git-fixes).
* NFSD: Trace filecache LRU activity (git-fixes).
* NFSD: Trace filecache opens (git-fixes).
* NFSD: verify the opened dentry after setting a delegation (git-fixes).
* NFSD: WARN when freeing an item still linked via nf_lru (git-fixes).
* NFSD: Write verifier might go backwards (git-fixes).
* NFSD: Zero counters when the filecache is re-initialized (git-fixes).
* NFS: Fix READ_PLUS when server does not support OP_READ_PLUS (git-fixes).
* nfs: fix undefined behavior in nfs_block_bits() (git-fixes).
* nfs: keep server info for remounts (git-fixes).
* nfs: Leave pages in the pagecache if readpage failed (git-fixes).
* NFSv4: Fixup smatch warning for ambiguous return (git-fixes).
* NFSv4.x: by default serialize open/close operations (bsc#1223863
bsc#1227362)
* nilfs2: add missing check for inode numbers on directory entries (git-
fixes).
* nilfs2: add missing check for inode numbers on directory entries (stable-
fixes).
* nilfs2: avoid undefined behavior in nilfs_cnt32_ge macro (git-fixes).
* nilfs2: convert persistent object allocator to use kmap_local (git-fixes).
* nilfs2: fix incorrect inode allocation from reserved inodes (git-fixes).
* nilfs2: fix inode number range checks (git-fixes).
* nilfs2: fix inode number range checks (stable-fixes).
* nvme: adjust multiples of NVME_CTRL_PAGE_SIZE in offset (git-fixes).
* nvme-auth: alloc nvme_dhchap_key as single buffer (git-fixes).
* nvme-auth: allow mixing of secret and hash lengths (git-fixes).
* nvme-auth: use transformed key size to create resp (git-fixes).
* nvme: avoid double free special payload (git-fixes).
* nvme: ensure reset state check ordering (bsc#1215492).
* nvme: fixup comment for nvme RDMA Provider Type (git-fixes).
* nvme-multipath: find NUMA path only for online numa-node (git-fixes).
* nvme-pci: add missing condition check for existence of mapped data (git-
fixes).
* nvme-pci: Fix the instructions for disabling power management (git-fixes).
* nvmet: always initialize cqe.result (git-fixes).
* nvmet-auth: fix nvmet_auth hash error handling (git-fixes).
* nvmet: fix a possible leak when destroy a ctrl during qp establishment
(git-
fixes).
* nvme: use ctrl state accessor (bsc#1215492).
* ocfs2: fix DIO failure due to insufficient transaction credits
(bsc#1216834).
* ocfs2: remove redundant assignment to variable free_space (bsc#1228409).
* ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()
(bsc#1228410).
* orangefs: fix out-of-bounds fsid access (git-fixes).
* PCI: Add PCI_ERROR_RESPONSE and related definitions (stable-fixes).
* PCI/DPC: Fix use-after-free on concurrent DPC and hot-removal (git-fixes).
* PCI: Extend ACS configurability (bsc#1228090).
* PCI: Fix resource double counting on remove & rescan (git-fixes).
* PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git-
fixes).
* PCI: Introduce cleanup helpers for device reference counts and locks (git-
fixes).
* PCI: Introduce cleanup helpers for device reference counts and locks
(stable-fixes).
* PCI: keystone: Do not enable BAR 0 for AM654x (git-fixes).
* PCI: keystone: Fix NULL pointer dereference in case of DT error in
ks_pcie_setup_rc_app_regs() (git-fixes).
* PCI: keystone: Relocate ks_pcie_set/clear_dbi_mode() (git-fixes).
* PCI/PM: Avoid D3cold for HP Pavilion 17 PC/1972 PCIe Ports (git-fixes).
* PCI/PM: Avoid D3cold for HP Pavilion 17 PC/1972 PCIe Ports (stable-fixes).
* PCI: rockchip: Use GPIOD_OUT_LOW flag while requesting ep_gpio (git-fixes).
* PCI: tegra194: Set EP alignment restriction for inbound ATU (git-fixes).
* pinctrl: core: fix possible memory leak when pinctrl_enable() fails (git-
fixes).
* pinctrl: freescale: mxs: Fix refcount of child (git-fixes).
* pinctrl: single: fix possible memory leak when pinctrl_enable() fails (git-
fixes).
* pinctrl: ti: ti-iodelay: fix possible memory leak when pinctrl_enable()
fails (git-fixes).
* platform/chrome: cros_ec_debugfs: fix wrong EC message version (git-fixes).
* platform/chrome: cros_ec_proto: Lock device when updating MKBP version
(git-
fixes).
* platform/x86: dell-smbios-base: Use sysfs_emit() (stable-fixes).
* platform/x86: dell-smbios: Fix wrong token data in sysfs (git-fixes).
* platform/x86: lg-laptop: Change ACPI device id (stable-fixes).
* platform/x86: lg-laptop: Remove LGEX0815 hotkey handling (stable-fixes).
* platform/x86: touchscreen_dmi: Add info for GlobalSpace SolT IVW 11.6"
tablet (stable-fixes).
* platform/x86: touchscreen_dmi: Add info for the EZpad 6s Pro
(stable-fixes).
* platform/x86: wireless-hotkey: Add support for LG Airplane Button (stable-
fixes).
* powerpc/cpuidle: Set CPUIDLE_FLAG_POLLING for snooze state (bsc#1227121
ltc#207129).
* powerpc: fix a file leak in kvm_vcpu_ioctl_enable_cap() (bsc#1194869).
* powerpc/kasan: Disable address sanitization in kexec paths (bsc#1194869).
* powerpc/pseries: Fix scv instruction crash with kexec (bsc#1194869).
* powerpc/rtas: clean up includes (bsc#1227487).
* powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas()
(bsc#1227487).
* power: supply: cros_usbpd: provide ID table for avoiding fallback match
(stable-fixes).
* pwm: stm32: Always do lazy disabling (git-fixes).
* RDMA/cache: Release GID table even if leak is detected (git-fixes)
* RDMA/device: Return error earlier if port in not valid (git-fixes)
* RDMA/hns: Check atomic wr length (git-fixes)
* RDMA/hns: Fix insufficient extend DB for VFs. (git-fixes)
* RDMA/hns: Fix mbx timing out before CMD execution is completed (git-fixes)
* RDMA/hns: Fix missing pagesize and alignment check in FRMR (git-fixes)
* RDMA/hns: Fix shift-out-bounds when max_inline_data is 0 (git-fixes)
* RDMA/hns: Fix soft lockup under heavy CEQE load (git-fixes)
* RDMA/hns: Fix undifined behavior caused by invalid max_sge (git-fixes)
* RDMA/hns: Fix unmatch exception handling when init eq table fails (git-
fixes)
* RDMA/iwcm: Fix a use-after-free related to destroying CM IDs (git-fixes)
* RDMA/mana_ib: Ignore optional access flags for MRs (git-fixes).
* RDMA/mlx4: Fix truncated output warning in alias_GUID.c (git-fixes)
* RDMA/mlx4: Fix truncated output warning in mad.c (git-fixes)
* RDMA/mlx5: Set mkeys for dmabuf at PAGE_SIZE (git-fixes)
* RDMA/restrack: Fix potential invalid address access (git-fixes)
* RDMA/rxe: Do not set BTH_ACK_MASK for UC or UD QPs (git-fixes)
* regmap-i2c: Subtract reg size from max_write (stable-fixes).
* Revert "ALSA: firewire-lib: obsolete workqueue for period update"
(bsc#1208783).
* Revert "ALSA: firewire-lib: operate for period elapse event in process
context" (bsc#1208783).
* Revert "leds: led-core: Fix refcount leak in of_led_get()"
(git-fixes).
* Revert "usb: musb: da8xx: Set phy in OTG mode by default"
(stable-fixes).
* rpcrdma: fix handling for RDMA_CM_EVENT_DEVICE_REMOVAL (git-fixes).
* rtc: cmos: Fix return value of nvmem callbacks (git-fixes).
* rtc: interface: Add RTC offset to alarm after fix-up (git-fixes).
* rtc: isl1208: Fix return value of nvmem callbacks (git-fixes).
* rtlwifi: rtl8192de: Style clean-ups (stable-fixes).
* s390: Implement __iowrite32_copy() (bsc#1226502)
* s390: Stop using weak symbols for __iowrite64_copy() (bsc#1226502)
* saa7134: Unchecked i2c_transfer function result fixed (git-fixes).
* sched/fair: Do not balance task to its current running CPU (git fixes
(sched)).
* sched: Fix stop_one_cpu_nowait() vs hotplug (git fixes (sched)).
* scsi: lpfc: Allow DEVICE_RECOVERY mode after RSCN receipt if in PRLI_ISSUE
state (bsc#1228857).
* scsi: lpfc: Cancel ELS WQE instead of issuing abort when SLI port is
inactive (bsc#1228857).
* scsi: lpfc: Fix handling of fully recovered fabric node in dev_loss callbk
(bsc#1228857).
* scsi: lpfc: Fix incorrect request len mbox field when setting trunking via
sysfs (bsc#1228857).
* scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info (bsc#1228857).
* scsi: lpfc: Relax PRLI issue conditions after GID_FT response
(bsc#1228857).
* scsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian macro
usages (bsc#1228857).
* scsi: lpfc: Update lpfc version to 14.4.0.3 (bsc#1228857).
* scsi: qla2xxx: Avoid possible run-time warning with long model_num
(bsc#1228850).
* scsi: qla2xxx: Complete command early within lock (bsc#1228850).
* scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).
* scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).
* scsi: qla2xxx: During vport delete send async logout explicitly
(bsc#1228850).
* scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850).
* scsi: qla2xxx: Fix flash read failure (bsc#1228850).
* scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850).
* scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850).
* scsi: qla2xxx: Indent help text (bsc#1228850).
* scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850).
* scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850).
* scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds
(bsc#1228850).
* scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850).
* scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850).
* scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850).
* scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850).
* selftests/bpf: Add a selftest for checking subreg equality (bsc#1225903).
* selftests/bpf: add pre bpf_prog_test_run_opts() callback for test_loader
(bsc#1225903).
* selftests/bpf: add precision propagation tests in the presence of subprogs
(bsc#1225903).
* selftests/bpf: Add pruning test case for bpf_spin_lock (bsc#1225903).
* selftests/bpf: Check if mark_chain_precision() follows scalar ids
(bsc#1225903).
* selftests/bpf: check if max number of bpf_loop iterations is tracked
(bsc#1225903).
* selftests/bpf: fix __retval() being always ignored (bsc#1225903).
* selftests/bpf: fix unpriv_disabled check in test_verifier (bsc#1225903).
* selftests/bpf: __imm_insn & __imm_const macro for bpf_misc.h
(bsc#1225903).
* selftests/bpf: make test_align selftest more robust (bsc#1225903).
* selftests/bpf: populate map_array_ro map for verifier_array_access test
(bsc#1225903).
* selftests/bpf: prog_tests entry point for migrated test_verifier tests
(bsc#1225903).
* selftests/bpf: Report program name on parse_test_spec error (bsc#1225903).
* selftests/bpf: Support custom per-test flags and multiple expected messages
(bsc#1225903).
* selftests/bpf: test case for callback_depth states pruning logic
(bsc#1225903).
* selftests/bpf: test case for relaxed prunning of active_lock.id
(bsc#1225903).
* selftests/bpf: test cases for regsafe() bug skipping check_id()
(bsc#1225903).
* selftests/bpf: Tests execution support for test_loader.c (bsc#1225903).
* selftests/bpf: tests for iterating callbacks (bsc#1225903).
* selftests/bpf: test widening for iterating callbacks (bsc#1225903).
* selftests/bpf: track string payload offset as scalar in strobemeta
(bsc#1225903).
* selftests/bpf: Unprivileged tests for test_loader.c (bsc#1225903).
* selftests/bpf: Verify copy_register_state() preserves parent/live fields
(bsc#1225903).
* selftests/bpf: verify states_equal() maintains idmap across all frames
(bsc#1225903).
* selftests/bpf: Verify that check_ids() is used for scalars in regsafe()
(bsc#1225903).
* selftests/sigaltstack: Fix ppc64 GCC build (git-fixes).
* soc: ti: wkup_m3_ipc: Send NULL dummy message instead of pointer message
(stable-fixes).
* spi: imx: Do not expect DMA for i.MX{25,35,50,51,53} cspi devices (stable-
fixes).
* spi: mux: set ctlr->bits_per_word_mask (stable-fixes).
* string.h: Introduce memtostr() and memtostr_pad() (bsc#1228850).
* SUNRPC: avoid soft lockup when transmitting UDP to reachable server
(bsc#1225272).
* SUNRPC: Fix gss_free_in_token_pages() (git-fixes).
* SUNRPC: Fix loop termination condition in gss_free_in_token_pages() (git-
fixes).
* sunrpc: fix NFSACL RPC retry on soft mount (git-fixes).
* SUNRPC: return proper error from gss_wrap_req_priv (git-fixes).
* supported.conf:
* tpm: Allow system suspend to continue when TPM suspend fails (bsc#1082555).
* tpm: Prevent hwrng from activating during resume (bsc#1082555).
* tpm_tis: Resend command to recover from data transfer errors (bsc#1082555).
* tpm_tis: Use tpm_chip_{start,stop} decoration inside tpm_tis_resume
(bsc#1082555).
* tpm, tpm: Implement usage counter for locality (bsc#1082555).
* tpm, tpm_tis: Avoid cache incoherency in test for interrupts (bsc#1082555).
* tpm, tpm_tis: Claim locality before writing interrupt registers
(bsc#1082555).
* tpm, tpm_tis: Claim locality in interrupt handler (bsc#1082555).
* tpm, tpm_tis: Claim locality when interrupts are reenabled on resume
(bsc#1082555).
* tpm, tpm_tis: correct tpm_tis_flags enumeration values (bsc#1082555).
* tpm, tpm_tis: Do not skip reset of original interrupt vector (bsc#1082555).
* tpm, tpm_tis: Only handle supported interrupts (bsc#1082555).
* tracing: Build event generation tests only as modules (git-fixes).
* tracing/net_sched: NULL pointer dereference in perf_trace_qdisc_reset()
(git-fixes).
* tracing/osnoise: Add osnoise/options file (bsc#1228330)
* tracing/osnoise: Add OSNOISE_WORKLOAD option (bsc#1228330)
* tracing/osnoise: Do not follow tracing_cpumask (bsc#1228330)
* tracing/osnoise: Fix notify new tracing_max_latency (bsc#1228330)
* tracing/osnoise: Make osnoise_instances static (bsc#1228330)
* tracing/osnoise: Split workload start from the tracer start (bsc#1228330)
* tracing/osnoise: Support a list of trace_array *tr (bsc#1228330)
* tracing/osnoise: Use built-in RCU list checking (bsc#1228330)
* tracing/timerlat: Notify new max thread latency (bsc#1228330)
* USB: Add USB_QUIRK_NO_SET_INTF quirk for START BP-850k (stable-fixes).
* usb: cdns3: allocate TX FIFO size according to composite EP number (git-
fixes).
* usb: cdns3: fix incorrect calculation of ep_buf_size when more than one
config (git-fixes).
* usb: cdns3: fix iso transfer error when mult is not zero (git-fixes).
* usb: cdns3: improve handling of unaligned address case (git-fixes).
* usb: cdns3: optimize OUT transfer by copying only actual received data
(git-
fixes).
* usb: cdns3: skip set TRB_IOC when usb_request: no_interrupt is true (git-
fixes).
* USB: core: Fix duplicate endpoint bug by clearing reserved bits in the
descriptor (git-fixes).
* usb: dwc3: gadget: Do not delay End Transfer on delayed_status (git-fixes).
* usb: dwc3: gadget: Force sending delayed status during soft disconnect
(git-
fixes).
* usb: dwc3: gadget: Synchronize IRQ between soft connect/disconnect (git-
fixes).
* usb: gadget: call usb_gadget_check_config() to verify UDC capability (git-
fixes).
* usb: gadget: configfs: Prevent OOB read/write in usb_string_copy() (stable-
fixes).
* usb: gadget: printer: SS+ support (stable-fixes).
* usb: misc: uss720: check for incompatible versions of the Belkin F5U002
(stable-fixes).
* USB: serial: mos7840: fix crash on resume (git-fixes).
* USB: serial: option: add Fibocom FM350-GL (stable-fixes).
* USB: serial: option: add Netprisma LCUK54 series modules (stable-fixes).
* USB: serial: option: add Rolling RW350-GL variants (stable-fixes).
* USB: serial: option: add support for Foxconn T99W651 (stable-fixes).
* USB: serial: option: add Telit FN912 rmnet compositions (stable-fixes).
* USB: serial: option: add Telit generic core-dump composition
(stable-fixes).
* usb: typec: tcpm: clear pd_event queue in PORT_RESET (git-fixes).
* usb: xhci-plat: Do not include xhci.h (git-fixes).
* USB: xhci-plat: fix legacy PHY double init (git-fixes).
* wifi: ath11k: fix wrong handling of CCMP256 and GCMP ciphers (git-fixes).
* wifi: brcmsmac: LCN PHY code is used for BCM4313 2G-only device
(git-fixes).
* wifi: cfg80211: fix typo in cfg80211_calculate_bitrate_he() (git-fixes).
* wifi: cfg80211: handle 2x996 RU allocation in
cfg80211_calculate_bitrate_he() (git-fixes).
* wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values (git-fixes).
* wifi: cfg80211: wext: add extra SIOCSIWSCAN data check (stable-fixes).
* wifi: iwlwifi: mvm: d3: fix WoWLAN command version lookup (stable-fixes).
* wifi: iwlwifi: mvm: Handle BIGTK cipher in kek_kck cmd (stable-fixes).
* wifi: iwlwifi: mvm: properly set 6 GHz channel direct probe option (stable-
fixes).
* wifi: mac80211: disable softirqs for queued frame handling (git-fixes).
* wifi: mac80211: fix UBSAN noise in ieee80211_prep_hw_scan() (stable-fixes).
* wifi: mac80211: handle tasklet frames before stopping (stable-fixes).
* wifi: mac80211: mesh: init nonpeer_pm to active by default in mesh sdata
(stable-fixes).
* wifi: mt76: replace skb_put with skb_put_zero (stable-fixes).
* wifi: mwifiex: Fix interface type change (git-fixes).
* wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter() (git-
fixes).
* wifi: wilc1000: fix ies_len type in connect path (git-fixes).
* workqueue: Improve scalability of workqueue watchdog touch (bsc#1193454).
* workqueue: wq_watchdog_touch is always called with valid CPU (bsc#1193454).
* x86/amd_nb: Use Family 19h Models 60h-7Fh Function 4 IDs (git-fixes).
* x86/apic: Force native_apic_mem_read() to use the MOV instruction (git-
fixes).
* x86/bhi: Avoid warning in #DB handler due to BHI mitigation (git-fixes).
* x86/bugs: Remove default case for fully switched enums (bsc#1227900).
* x86/fpu: Fix AMD X86_BUG_FXSAVE_LEAK fixup (git-fixes).
* x86/ibt,ftrace: Search for **fentry** location (git-fixes).
* x86/Kconfig: Transmeta Crusoe is CPU family 5, not 6 (git-fixes).
* x86/mm: Allow guest.enc_status_change_prepare() to fail (git-fixes).
* x86/mm: Fix enc_status_change_finish_noop() (git-fixes).
* x86/purgatory: Switch to the position-independent small code model (git-
fixes).
* x86/srso: Move retbleed IBPB check into existing 'has_microcode'
code block
(bsc#1227900).
* x86/srso: Remove 'pred_cmd' label (bsc#1227900).
* x86: Stop using weak symbols for __iowrite32_copy() (bsc#1226502)
* x86/tdx: Fix race between set_memory_encrypted() and
load_unaligned_zeropad() (git-fixes).
* xfs: Add cond_resched to block unmap range and reflink remap path
(bsc#1228226).
* xhci: Apply broken streams quirk to Etron EJ188 xHCI host (stable-fixes).
* xhci: Apply reset resume quirk to Etron EJ188 xHCI host (stable-fixes).
* xhci: Set correct transferred length for cancelled bulk transfers (stable-
fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-2947=1 openSUSE-SLE-15.5-2024-2947=1

* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-2947=1

## Package List:

* openSUSE Leap 15.5 (aarch64 x86_64)
* cluster-md-kmp-azure-5.14.21-150500.33.63.1
* ocfs2-kmp-azure-debuginfo-5.14.21-150500.33.63.1
* gfs2-kmp-azure-5.14.21-150500.33.63.1
* kernel-azure-optional-debuginfo-5.14.21-150500.33.63.1
* ocfs2-kmp-azure-5.14.21-150500.33.63.1
* kernel-azure-devel-5.14.21-150500.33.63.1
* reiserfs-kmp-azure-debuginfo-5.14.21-150500.33.63.1
* reiserfs-kmp-azure-5.14.21-150500.33.63.1
* dlm-kmp-azure-5.14.21-150500.33.63.1
* kernel-azure-extra-debuginfo-5.14.21-150500.33.63.1
* cluster-md-kmp-azure-debuginfo-5.14.21-150500.33.63.1
* kselftests-kmp-azure-debuginfo-5.14.21-150500.33.63.1
* dlm-kmp-azure-debuginfo-5.14.21-150500.33.63.1
* kernel-azure-devel-debuginfo-5.14.21-150500.33.63.1
* kselftests-kmp-azure-5.14.21-150500.33.63.1
* kernel-azure-optional-5.14.21-150500.33.63.1
* kernel-azure-extra-5.14.21-150500.33.63.1
* kernel-azure-debuginfo-5.14.21-150500.33.63.1
* kernel-azure-debugsource-5.14.21-150500.33.63.1
* kernel-syms-azure-5.14.21-150500.33.63.1
* gfs2-kmp-azure-debuginfo-5.14.21-150500.33.63.1
* kernel-azure-livepatch-devel-5.14.21-150500.33.63.1
* openSUSE Leap 15.5 (aarch64 nosrc x86_64)
* kernel-azure-5.14.21-150500.33.63.1
* openSUSE Leap 15.5 (x86_64)
* kernel-azure-vdso-debuginfo-5.14.21-150500.33.63.1
* kernel-azure-vdso-5.14.21-150500.33.63.1
* openSUSE Leap 15.5 (noarch)
* kernel-source-azure-5.14.21-150500.33.63.1
* kernel-devel-azure-5.14.21-150500.33.63.1
* Public Cloud Module 15-SP5 (aarch64 nosrc x86_64)
* kernel-azure-5.14.21-150500.33.63.1
* Public Cloud Module 15-SP5 (aarch64 x86_64)
* kernel-azure-debuginfo-5.14.21-150500.33.63.1
* kernel-azure-debugsource-5.14.21-150500.33.63.1
* kernel-syms-azure-5.14.21-150500.33.63.1
* kernel-azure-devel-debuginfo-5.14.21-150500.33.63.1
* kernel-azure-devel-5.14.21-150500.33.63.1
* Public Cloud Module 15-SP5 (noarch)
* kernel-source-azure-5.14.21-150500.33.63.1
* kernel-devel-azure-5.14.21-150500.33.63.1

## References:

* https://www.suse.com/security/cve/CVE-2021-47086.html
* https://www.suse.com/security/cve/CVE-2021-47103.html
* https://www.suse.com/security/cve/CVE-2021-47186.html
* https://www.suse.com/security/cve/CVE-2021-47402.html
* https://www.suse.com/security/cve/CVE-2021-47546.html
* https://www.suse.com/security/cve/CVE-2021-47547.html
* https://www.suse.com/security/cve/CVE-2021-47588.html
* https://www.suse.com/security/cve/CVE-2021-47590.html
* https://www.suse.com/security/cve/CVE-2021-47591.html
* https://www.suse.com/security/cve/CVE-2021-47593.html
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2021-47599.html
* https://www.suse.com/security/cve/CVE-2021-47606.html
* https://www.suse.com/security/cve/CVE-2021-47622.html
* https://www.suse.com/security/cve/CVE-2021-47623.html
* https://www.suse.com/security/cve/CVE-2021-47624.html
* https://www.suse.com/security/cve/CVE-2022-48713.html
* https://www.suse.com/security/cve/CVE-2022-48730.html
* https://www.suse.com/security/cve/CVE-2022-48732.html
* https://www.suse.com/security/cve/CVE-2022-48749.html
* https://www.suse.com/security/cve/CVE-2022-48756.html
* https://www.suse.com/security/cve/CVE-2022-48773.html
* https://www.suse.com/security/cve/CVE-2022-48774.html
* https://www.suse.com/security/cve/CVE-2022-48775.html
* https://www.suse.com/security/cve/CVE-2022-48776.html
* https://www.suse.com/security/cve/CVE-2022-48777.html
* https://www.suse.com/security/cve/CVE-2022-48778.html
* https://www.suse.com/security/cve/CVE-2022-48780.html
* https://www.suse.com/security/cve/CVE-2022-48783.html
* https://www.suse.com/security/cve/CVE-2022-48784.html
* https://www.suse.com/security/cve/CVE-2022-48785.html
* https://www.suse.com/security/cve/CVE-2022-48786.html
* https://www.suse.com/security/cve/CVE-2022-48787.html
* https://www.suse.com/security/cve/CVE-2022-48788.html
* https://www.suse.com/security/cve/CVE-2022-48789.html
* https://www.suse.com/security/cve/CVE-2022-48790.html
* https://www.suse.com/security/cve/CVE-2022-48791.html
* https://www.suse.com/security/cve/CVE-2022-48792.html
* https://www.suse.com/security/cve/CVE-2022-48793.html
* https://www.suse.com/security/cve/CVE-2022-48794.html
* https://www.suse.com/security/cve/CVE-2022-48796.html
* https://www.suse.com/security/cve/CVE-2022-48797.html
* https://www.suse.com/security/cve/CVE-2022-48798.html
* https://www.suse.com/security/cve/CVE-2022-48799.html
* https://www.suse.com/security/cve/CVE-2022-48800.html
* https://www.suse.com/security/cve/CVE-2022-48801.html
* https://www.suse.com/security/cve/CVE-2022-48802.html
* https://www.suse.com/security/cve/CVE-2022-48803.html
* https://www.suse.com/security/cve/CVE-2022-48804.html
* https://www.suse.com/security/cve/CVE-2022-48805.html
* https://www.suse.com/security/cve/CVE-2022-48806.html
* https://www.suse.com/security/cve/CVE-2022-48807.html
* https://www.suse.com/security/cve/CVE-2022-48809.html
* https://www.suse.com/security/cve/CVE-2022-48810.html
* https://www.suse.com/security/cve/CVE-2022-48811.html
* https://www.suse.com/security/cve/CVE-2022-48812.html
* https://www.suse.com/security/cve/CVE-2022-48813.html
* https://www.suse.com/security/cve/CVE-2022-48814.html
* https://www.suse.com/security/cve/CVE-2022-48815.html
* https://www.suse.com/security/cve/CVE-2022-48816.html
* https://www.suse.com/security/cve/CVE-2022-48817.html
* https://www.suse.com/security/cve/CVE-2022-48818.html
* https://www.suse.com/security/cve/CVE-2022-48820.html
* https://www.suse.com/security/cve/CVE-2022-48821.html
* https://www.suse.com/security/cve/CVE-2022-48822.html
* https://www.suse.com/security/cve/CVE-2022-48823.html
* https://www.suse.com/security/cve/CVE-2022-48824.html
* https://www.suse.com/security/cve/CVE-2022-48825.html
* https://www.suse.com/security/cve/CVE-2022-48826.html
* https://www.suse.com/security/cve/CVE-2022-48827.html
* https://www.suse.com/security/cve/CVE-2022-48828.html
* https://www.suse.com/security/cve/CVE-2022-48829.html
* https://www.suse.com/security/cve/CVE-2022-48830.html
* https://www.suse.com/security/cve/CVE-2022-48831.html
* https://www.suse.com/security/cve/CVE-2022-48834.html
* https://www.suse.com/security/cve/CVE-2022-48835.html
* https://www.suse.com/security/cve/CVE-2022-48836.html
* https://www.suse.com/security/cve/CVE-2022-48837.html
* https://www.suse.com/security/cve/CVE-2022-48838.html
* https://www.suse.com/security/cve/CVE-2022-48839.html
* https://www.suse.com/security/cve/CVE-2022-48840.html
* https://www.suse.com/security/cve/CVE-2022-48841.html
* https://www.suse.com/security/cve/CVE-2022-48842.html
* https://www.suse.com/security/cve/CVE-2022-48843.html
* https://www.suse.com/security/cve/CVE-2022-48844.html
* https://www.suse.com/security/cve/CVE-2022-48846.html
* https://www.suse.com/security/cve/CVE-2022-48847.html
* https://www.suse.com/security/cve/CVE-2022-48849.html
* https://www.suse.com/security/cve/CVE-2022-48850.html
* https://www.suse.com/security/cve/CVE-2022-48851.html
* https://www.suse.com/security/cve/CVE-2022-48852.html
* https://www.suse.com/security/cve/CVE-2022-48853.html
* https://www.suse.com/security/cve/CVE-2022-48855.html
* https://www.suse.com/security/cve/CVE-2022-48856.html
* https://www.suse.com/security/cve/CVE-2022-48857.html
* https://www.suse.com/security/cve/CVE-2022-48858.html
* https://www.suse.com/security/cve/CVE-2022-48859.html
* https://www.suse.com/security/cve/CVE-2022-48860.html
* https://www.suse.com/security/cve/CVE-2022-48861.html
* https://www.suse.com/security/cve/CVE-2022-48862.html
* https://www.suse.com/security/cve/CVE-2022-48863.html
* https://www.suse.com/security/cve/CVE-2022-48864.html
* https://www.suse.com/security/cve/CVE-2022-48866.html
* https://www.suse.com/security/cve/CVE-2023-1582.html
* https://www.suse.com/security/cve/CVE-2023-37453.html
* https://www.suse.com/security/cve/CVE-2023-52435.html
* https://www.suse.com/security/cve/CVE-2023-52573.html
* https://www.suse.com/security/cve/CVE-2023-52580.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52735.html
* https://www.suse.com/security/cve/CVE-2023-52751.html
* https://www.suse.com/security/cve/CVE-2023-52762.html
* https://www.suse.com/security/cve/CVE-2023-52775.html
* https://www.suse.com/security/cve/CVE-2023-52812.html
* https://www.suse.com/security/cve/CVE-2023-52857.html
* https://www.suse.com/security/cve/CVE-2023-52863.html
* https://www.suse.com/security/cve/CVE-2023-52885.html
* https://www.suse.com/security/cve/CVE-2023-52886.html
* https://www.suse.com/security/cve/CVE-2024-25741.html
* https://www.suse.com/security/cve/CVE-2024-26583.html
* https://www.suse.com/security/cve/CVE-2024-26584.html
* https://www.suse.com/security/cve/CVE-2024-26585.html
* https://www.suse.com/security/cve/CVE-2024-26615.html
* https://www.suse.com/security/cve/CVE-2024-26633.html
* https://www.suse.com/security/cve/CVE-2024-26635.html
* https://www.suse.com/security/cve/CVE-2024-26636.html
* https://www.suse.com/security/cve/CVE-2024-26641.html
* https://www.suse.com/security/cve/CVE-2024-26661.html
* https://www.suse.com/security/cve/CVE-2024-26663.html
* https://www.suse.com/security/cve/CVE-2024-26665.html
* https://www.suse.com/security/cve/CVE-2024-26800.html
* https://www.suse.com/security/cve/CVE-2024-26802.html
* https://www.suse.com/security/cve/CVE-2024-26813.html
* https://www.suse.com/security/cve/CVE-2024-26814.html
* https://www.suse.com/security/cve/CVE-2024-26863.html
* https://www.suse.com/security/cve/CVE-2024-26889.html
* https://www.suse.com/security/cve/CVE-2024-26920.html
* https://www.suse.com/security/cve/CVE-2024-26935.html
* https://www.suse.com/security/cve/CVE-2024-269355.html
* https://www.suse.com/security/cve/CVE-2024-26961.html
* https://www.suse.com/security/cve/CVE-2024-26976.html
* https://www.suse.com/security/cve/CVE-2024-27015.html
* https://www.suse.com/security/cve/CVE-2024-27019.html
* https://www.suse.com/security/cve/CVE-2024-27020.html
* https://www.suse.com/security/cve/CVE-2024-27025.html
* https://www.suse.com/security/cve/CVE-2024-27065.html
* https://www.suse.com/security/cve/CVE-2024-27402.html
* https://www.suse.com/security/cve/CVE-2024-27437.html
* https://www.suse.com/security/cve/CVE-2024-35805.html
* https://www.suse.com/security/cve/CVE-2024-35819.html
* https://www.suse.com/security/cve/CVE-2024-35837.html
* https://www.suse.com/security/cve/CVE-2024-35853.html
* https://www.suse.com/security/cve/CVE-2024-35854.html
* https://www.suse.com/security/cve/CVE-2024-35855.html
* https://www.suse.com/security/cve/CVE-2024-35889.html
* https://www.suse.com/security/cve/CVE-2024-35890.html
* https://www.suse.com/security/cve/CVE-2024-35893.html
* https://www.suse.com/security/cve/CVE-2024-35899.html
* https://www.suse.com/security/cve/CVE-2024-35934.html
* https://www.suse.com/security/cve/CVE-2024-35949.html
* https://www.suse.com/security/cve/CVE-2024-35961.html
* https://www.suse.com/security/cve/CVE-2024-35979.html
* https://www.suse.com/security/cve/CVE-2024-35995.html
* https://www.suse.com/security/cve/CVE-2024-36000.html
* https://www.suse.com/security/cve/CVE-2024-36004.html
* https://www.suse.com/security/cve/CVE-2024-36288.html
* https://www.suse.com/security/cve/CVE-2024-36889.html
* https://www.suse.com/security/cve/CVE-2024-36901.html
* https://www.suse.com/security/cve/CVE-2024-36902.html
* https://www.suse.com/security/cve/CVE-2024-36909.html
* https://www.suse.com/security/cve/CVE-2024-36910.html
* https://www.suse.com/security/cve/CVE-2024-36911.html
* https://www.suse.com/security/cve/CVE-2024-36912.html
* https://www.suse.com/security/cve/CVE-2024-36913.html
* https://www.suse.com/security/cve/CVE-2024-36914.html
* https://www.suse.com/security/cve/CVE-2024-36919.html
* https://www.suse.com/security/cve/CVE-2024-36923.html
* https://www.suse.com/security/cve/CVE-2024-36924.html
* https://www.suse.com/security/cve/CVE-2024-36926.html
* https://www.suse.com/security/cve/CVE-2024-36939.html
* https://www.suse.com/security/cve/CVE-2024-36941.html
* https://www.suse.com/security/cve/CVE-2024-36942.html
* https://www.suse.com/security/cve/CVE-2024-36944.html
* https://www.suse.com/security/cve/CVE-2024-36946.html
* https://www.suse.com/security/cve/CVE-2024-36947.html
* https://www.suse.com/security/cve/CVE-2024-36950.html
* https://www.suse.com/security/cve/CVE-2024-36952.html
* https://www.suse.com/security/cve/CVE-2024-36955.html
* https://www.suse.com/security/cve/CVE-2024-36959.html
* https://www.suse.com/security/cve/CVE-2024-36974.html
* https://www.suse.com/security/cve/CVE-2024-38548.html
* https://www.suse.com/security/cve/CVE-2024-38555.html
* https://www.suse.com/security/cve/CVE-2024-38558.html
* https://www.suse.com/security/cve/CVE-2024-38559.html
* https://www.suse.com/security/cve/CVE-2024-38570.html
* https://www.suse.com/security/cve/CVE-2024-38586.html
* https://www.suse.com/security/cve/CVE-2024-38588.html
* https://www.suse.com/security/cve/CVE-2024-38598.html
* https://www.suse.com/security/cve/CVE-2024-38628.html
* https://www.suse.com/security/cve/CVE-2024-39276.html
* https://www.suse.com/security/cve/CVE-2024-39371.html
* https://www.suse.com/security/cve/CVE-2024-39463.html
* https://www.suse.com/security/cve/CVE-2024-39472.html
* https://www.suse.com/security/cve/CVE-2024-39475.html
* https://www.suse.com/security/cve/CVE-2024-39482.html
* https://www.suse.com/security/cve/CVE-2024-39487.html
* https://www.suse.com/security/cve/CVE-2024-39488.html
* https://www.suse.com/security/cve/CVE-2024-39490.html
* https://www.suse.com/security/cve/CVE-2024-39493.html
* https://www.suse.com/security/cve/CVE-2024-39494.html
* https://www.suse.com/security/cve/CVE-2024-39497.html
* https://www.suse.com/security/cve/CVE-2024-39499.html
* https://www.suse.com/security/cve/CVE-2024-39500.html
* https://www.suse.com/security/cve/CVE-2024-39501.html
* https://www.suse.com/security/cve/CVE-2024-39502.html
* https://www.suse.com/security/cve/CVE-2024-39505.html
* https://www.suse.com/security/cve/CVE-2024-39506.html
* https://www.suse.com/security/cve/CVE-2024-39507.html
* https://www.suse.com/security/cve/CVE-2024-39508.html
* https://www.suse.com/security/cve/CVE-2024-39509.html
* https://www.suse.com/security/cve/CVE-2024-40900.html
* https://www.suse.com/security/cve/CVE-2024-40901.html
* https://www.suse.com/security/cve/CVE-2024-40902.html
* https://www.suse.com/security/cve/CVE-2024-40903.html
* https://www.suse.com/security/cve/CVE-2024-40904.html
* https://www.suse.com/security/cve/CVE-2024-40906.html
* https://www.suse.com/security/cve/CVE-2024-40908.html
* https://www.suse.com/security/cve/CVE-2024-40909.html
* https://www.suse.com/security/cve/CVE-2024-40911.html
* https://www.suse.com/security/cve/CVE-2024-40912.html
* https://www.suse.com/security/cve/CVE-2024-40916.html
* https://www.suse.com/security/cve/CVE-2024-40919.html
* https://www.suse.com/security/cve/CVE-2024-40923.html
* https://www.suse.com/security/cve/CVE-2024-40924.html
* https://www.suse.com/security/cve/CVE-2024-40927.html
* https://www.suse.com/security/cve/CVE-2024-40929.html
* https://www.suse.com/security/cve/CVE-2024-40931.html
* https://www.suse.com/security/cve/CVE-2024-40932.html
* https://www.suse.com/security/cve/CVE-2024-40934.html
* https://www.suse.com/security/cve/CVE-2024-40935.html
* https://www.suse.com/security/cve/CVE-2024-40937.html
* https://www.suse.com/security/cve/CVE-2024-40940.html
* https://www.suse.com/security/cve/CVE-2024-40941.html
* https://www.suse.com/security/cve/CVE-2024-40942.html
* https://www.suse.com/security/cve/CVE-2024-40943.html
* https://www.suse.com/security/cve/CVE-2024-40945.html
* https://www.suse.com/security/cve/CVE-2024-40953.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-40956.html
* https://www.suse.com/security/cve/CVE-2024-40958.html
* https://www.suse.com/security/cve/CVE-2024-40959.html
* https://www.suse.com/security/cve/CVE-2024-40960.html
* https://www.suse.com/security/cve/CVE-2024-40961.html
* https://www.suse.com/security/cve/CVE-2024-40966.html
* https://www.suse.com/security/cve/CVE-2024-40967.html
* https://www.suse.com/security/cve/CVE-2024-40970.html
* https://www.suse.com/security/cve/CVE-2024-40972.html
* https://www.suse.com/security/cve/CVE-2024-40976.html
* https://www.suse.com/security/cve/CVE-2024-40977.html
* https://www.suse.com/security/cve/CVE-2024-40981.html
* https://www.suse.com/security/cve/CVE-2024-40982.html
* https://www.suse.com/security/cve/CVE-2024-40984.html
* https://www.suse.com/security/cve/CVE-2024-40987.html
* https://www.suse.com/security/cve/CVE-2024-40988.html
* https://www.suse.com/security/cve/CVE-2024-40989.html
* https://www.suse.com/security/cve/CVE-2024-40990.html
* https://www.suse.com/security/cve/CVE-2024-40994.html
* https://www.suse.com/security/cve/CVE-2024-40998.html
* https://www.suse.com/security/cve/CVE-2024-40999.html
* https://www.suse.com/security/cve/CVE-2024-41002.html
* https://www.suse.com/security/cve/CVE-2024-41004.html
* https://www.suse.com/security/cve/CVE-2024-41006.html
* https://www.suse.com/security/cve/CVE-2024-41009.html
* https://www.suse.com/security/cve/CVE-2024-41011.html
* https://www.suse.com/security/cve/CVE-2024-41012.html
* https://www.suse.com/security/cve/CVE-2024-41013.html
* https://www.suse.com/security/cve/CVE-2024-41014.html
* https://www.suse.com/security/cve/CVE-2024-41015.html
* https://www.suse.com/security/cve/CVE-2024-41016.html
* https://www.suse.com/security/cve/CVE-2024-41017.html
* https://www.suse.com/security/cve/CVE-2024-41040.html
* https://www.suse.com/security/cve/CVE-2024-41041.html
* https://www.suse.com/security/cve/CVE-2024-41044.html
* https://www.suse.com/security/cve/CVE-2024-41048.html
* https://www.suse.com/security/cve/CVE-2024-41057.html
* https://www.suse.com/security/cve/CVE-2024-41058.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-41063.html
* https://www.suse.com/security/cve/CVE-2024-41064.html
* https://www.suse.com/security/cve/CVE-2024-41066.html
* https://www.suse.com/security/cve/CVE-2024-41069.html
* https://www.suse.com/security/cve/CVE-2024-41070.html
* https://www.suse.com/security/cve/CVE-2024-41071.html
* https://www.suse.com/security/cve/CVE-2024-41072.html
* https://www.suse.com/security/cve/CVE-2024-41076.html
* https://www.suse.com/security/cve/CVE-2024-41078.html
* https://www.suse.com/security/cve/CVE-2024-41081.html
* https://www.suse.com/security/cve/CVE-2024-41087.html
* https://www.suse.com/security/cve/CVE-2024-41090.html
* https://www.suse.com/security/cve/CVE-2024-41091.html
* https://www.suse.com/security/cve/CVE-2024-42070.html
* https://www.suse.com/security/cve/CVE-2024-42079.html
* https://www.suse.com/security/cve/CVE-2024-42093.html
* https://www.suse.com/security/cve/CVE-2024-42096.html
* https://www.suse.com/security/cve/CVE-2024-42105.html
* https://www.suse.com/security/cve/CVE-2024-42122.html
* https://www.suse.com/security/cve/CVE-2024-42124.html
* https://www.suse.com/security/cve/CVE-2024-42145.html
* https://www.suse.com/security/cve/CVE-2024-42161.html
* https://www.suse.com/security/cve/CVE-2024-42224.html
* https://www.suse.com/security/cve/CVE-2024-42230.html
* https://bugzilla.suse.com/show_bug.cgi?id=1082555
* https://bugzilla.suse.com/show_bug.cgi?id=1193454
* https://bugzilla.suse.com/show_bug.cgi?id=1193554
* https://bugzilla.suse.com/show_bug.cgi?id=1193787
* https://bugzilla.suse.com/show_bug.cgi?id=1194324
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1195357
* https://bugzilla.suse.com/show_bug.cgi?id=1195668
* https://bugzilla.suse.com/show_bug.cgi?id=1195927
* https://bugzilla.suse.com/show_bug.cgi?id=1195957
* https://bugzilla.suse.com/show_bug.cgi?id=1196018
* https://bugzilla.suse.com/show_bug.cgi?id=1196823
* https://bugzilla.suse.com/show_bug.cgi?id=1197146
* https://bugzilla.suse.com/show_bug.cgi?id=1197246
* https://bugzilla.suse.com/show_bug.cgi?id=1197762
* https://bugzilla.suse.com/show_bug.cgi?id=1202346
* https://bugzilla.suse.com/show_bug.cgi?id=1202686
* https://bugzilla.suse.com/show_bug.cgi?id=1208783
* https://bugzilla.suse.com/show_bug.cgi?id=1209636
* https://bugzilla.suse.com/show_bug.cgi?id=1213123
* https://bugzilla.suse.com/show_bug.cgi?id=1215492
* https://bugzilla.suse.com/show_bug.cgi?id=1215587
* https://bugzilla.suse.com/show_bug.cgi?id=1216834
* https://bugzilla.suse.com/show_bug.cgi?id=1219832
* https://bugzilla.suse.com/show_bug.cgi?id=1220138
* https://bugzilla.suse.com/show_bug.cgi?id=1220185
* https://bugzilla.suse.com/show_bug.cgi?id=1220186
* https://bugzilla.suse.com/show_bug.cgi?id=1220187
* https://bugzilla.suse.com/show_bug.cgi?id=1220869
* https://bugzilla.suse.com/show_bug.cgi?id=1220876
* https://bugzilla.suse.com/show_bug.cgi?id=1220942
* https://bugzilla.suse.com/show_bug.cgi?id=1220952
* https://bugzilla.suse.com/show_bug.cgi?id=1221010
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221647
* https://bugzilla.suse.com/show_bug.cgi?id=1221654
* https://bugzilla.suse.com/show_bug.cgi?id=1221656
* https://bugzilla.suse.com/show_bug.cgi?id=1221659
* https://bugzilla.suse.com/show_bug.cgi?id=1221777
* https://bugzilla.suse.com/show_bug.cgi?id=1222011
* https://bugzilla.suse.com/show_bug.cgi?id=1222323
* https://bugzilla.suse.com/show_bug.cgi?id=1222326
* https://bugzilla.suse.com/show_bug.cgi?id=1222328
* https://bugzilla.suse.com/show_bug.cgi?id=1222625
* https://bugzilla.suse.com/show_bug.cgi?id=1222702
* https://bugzilla.suse.com/show_bug.cgi?id=1222728
* https://bugzilla.suse.com/show_bug.cgi?id=1222799
* https://bugzilla.suse.com/show_bug.cgi?id=1222809
* https://bugzilla.suse.com/show_bug.cgi?id=1222810
* https://bugzilla.suse.com/show_bug.cgi?id=1223021
* https://bugzilla.suse.com/show_bug.cgi?id=1223180
* https://bugzilla.suse.com/show_bug.cgi?id=1223635
* https://bugzilla.suse.com/show_bug.cgi?id=1223652
* https://bugzilla.suse.com/show_bug.cgi?id=1223675
* https://bugzilla.suse.com/show_bug.cgi?id=1223778
* https://bugzilla.suse.com/show_bug.cgi?id=1223806
* https://bugzilla.suse.com/show_bug.cgi?id=1223813
* https://bugzilla.suse.com/show_bug.cgi?id=1223815
* https://bugzilla.suse.com/show_bug.cgi?id=1223836
* https://bugzilla.suse.com/show_bug.cgi?id=1223863
* https://bugzilla.suse.com/show_bug.cgi?id=1224414
* https://bugzilla.suse.com/show_bug.cgi?id=1224499
* https://bugzilla.suse.com/show_bug.cgi?id=1224500
* https://bugzilla.suse.com/show_bug.cgi?id=1224512
* https://bugzilla.suse.com/show_bug.cgi?id=1224516
* https://bugzilla.suse.com/show_bug.cgi?id=1224517
* https://bugzilla.suse.com/show_bug.cgi?id=1224545
* https://bugzilla.suse.com/show_bug.cgi?id=1224548
* https://bugzilla.suse.com/show_bug.cgi?id=1224557
* https://bugzilla.suse.com/show_bug.cgi?id=1224572
* https://bugzilla.suse.com/show_bug.cgi?id=1224573
* https://bugzilla.suse.com/show_bug.cgi?id=1224585
* https://bugzilla.suse.com/show_bug.cgi?id=1224604
* https://bugzilla.suse.com/show_bug.cgi?id=1224636
* https://bugzilla.suse.com/show_bug.cgi?id=1224641
* https://bugzilla.suse.com/show_bug.cgi?id=1224683
* https://bugzilla.suse.com/show_bug.cgi?id=1224694
* https://bugzilla.suse.com/show_bug.cgi?id=1224700
* https://bugzilla.suse.com/show_bug.cgi?id=1224743
* https://bugzilla.suse.com/show_bug.cgi?id=1225088
* https://bugzilla.suse.com/show_bug.cgi?id=1225272
* https://bugzilla.suse.com/show_bug.cgi?id=1225301
* https://bugzilla.suse.com/show_bug.cgi?id=1225475
* https://bugzilla.suse.com/show_bug.cgi?id=1225489
* https://bugzilla.suse.com/show_bug.cgi?id=1225504
* https://bugzilla.suse.com/show_bug.cgi?id=1225505
* https://bugzilla.suse.com/show_bug.cgi?id=1225564
* https://bugzilla.suse.com/show_bug.cgi?id=1225573
* https://bugzilla.suse.com/show_bug.cgi?id=1225581
* https://bugzilla.suse.com/show_bug.cgi?id=1225586
* https://bugzilla.suse.com/show_bug.cgi?id=1225711
* https://bugzilla.suse.com/show_bug.cgi?id=1225717
* https://bugzilla.suse.com/show_bug.cgi?id=1225719
* https://bugzilla.suse.com/show_bug.cgi?id=1225744
* https://bugzilla.suse.com/show_bug.cgi?id=1225745
* https://bugzilla.suse.com/show_bug.cgi?id=1225746
* https://bugzilla.suse.com/show_bug.cgi?id=1225752
* https://bugzilla.suse.com/show_bug.cgi?id=1225753
* https://bugzilla.suse.com/show_bug.cgi?id=1225757
* https://bugzilla.suse.com/show_bug.cgi?id=1225767
* https://bugzilla.suse.com/show_bug.cgi?id=1225810
* https://bugzilla.suse.com/show_bug.cgi?id=1225815
* https://bugzilla.suse.com/show_bug.cgi?id=1225820
* https://bugzilla.suse.com/show_bug.cgi?id=1225829
* https://bugzilla.suse.com/show_bug.cgi?id=1225835
* https://bugzilla.suse.com/show_bug.cgi?id=1225838
* https://bugzilla.suse.com/show_bug.cgi?id=1225839
* https://bugzilla.suse.com/show_bug.cgi?id=1225843
* https://bugzilla.suse.com/show_bug.cgi?id=1225847
* https://bugzilla.suse.com/show_bug.cgi?id=1225851
* https://bugzilla.suse.com/show_bug.cgi?id=1225856
* https://bugzilla.suse.com/show_bug.cgi?id=1225895
* https://bugzilla.suse.com/show_bug.cgi?id=1225898
* https://bugzilla.suse.com/show_bug.cgi?id=1225903
* https://bugzilla.suse.com/show_bug.cgi?id=1226202
* https://bugzilla.suse.com/show_bug.cgi?id=1226502
* https://bugzilla.suse.com/show_bug.cgi?id=1226519
* https://bugzilla.suse.com/show_bug.cgi?id=1226551
* https://bugzilla.suse.com/show_bug.cgi?id=1226555
* https://bugzilla.suse.com/show_bug.cgi?id=1226565
* https://bugzilla.suse.com/show_bug.cgi?id=1226568
* https://bugzilla.suse.com/show_bug.cgi?id=1226570
* https://bugzilla.suse.com/show_bug.cgi?id=1226571
* https://bugzilla.suse.com/show_bug.cgi?id=1226574
* https://bugzilla.suse.com/show_bug.cgi?id=1226588
* https://bugzilla.suse.com/show_bug.cgi?id=1226607
* https://bugzilla.suse.com/show_bug.cgi?id=1226650
* https://bugzilla.suse.com/show_bug.cgi?id=1226698
* https://bugzilla.suse.com/show_bug.cgi?id=1226713
* https://bugzilla.suse.com/show_bug.cgi?id=1226716
* https://bugzilla.suse.com/show_bug.cgi?id=1226750
* https://bugzilla.suse.com/show_bug.cgi?id=1226757
* https://bugzilla.suse.com/show_bug.cgi?id=1226758
* https://bugzilla.suse.com/show_bug.cgi?id=1226775
* https://bugzilla.suse.com/show_bug.cgi?id=1226783
* https://bugzilla.suse.com/show_bug.cgi?id=1226785
* https://bugzilla.suse.com/show_bug.cgi?id=1226834
* https://bugzilla.suse.com/show_bug.cgi?id=1226837
* https://bugzilla.suse.com/show_bug.cgi?id=1226911
* https://bugzilla.suse.com/show_bug.cgi?id=1226990
* https://bugzilla.suse.com/show_bug.cgi?id=1226993
* https://bugzilla.suse.com/show_bug.cgi?id=1227090
* https://bugzilla.suse.com/show_bug.cgi?id=1227121
* https://bugzilla.suse.com/show_bug.cgi?id=1227157
* https://bugzilla.suse.com/show_bug.cgi?id=1227162
* https://bugzilla.suse.com/show_bug.cgi?id=1227362
* https://bugzilla.suse.com/show_bug.cgi?id=1227383
* https://bugzilla.suse.com/show_bug.cgi?id=1227432
* https://bugzilla.suse.com/show_bug.cgi?id=1227435
* https://bugzilla.suse.com/show_bug.cgi?id=1227447
* https://bugzilla.suse.com/show_bug.cgi?id=1227487
* https://bugzilla.suse.com/show_bug.cgi?id=1227549
* https://bugzilla.suse.com/show_bug.cgi?id=1227573
* https://bugzilla.suse.com/show_bug.cgi?id=1227618
* https://bugzilla.suse.com/show_bug.cgi?id=1227620
* https://bugzilla.suse.com/show_bug.cgi?id=1227626
* https://bugzilla.suse.com/show_bug.cgi?id=1227635
* https://bugzilla.suse.com/show_bug.cgi?id=1227661
* https://bugzilla.suse.com/show_bug.cgi?id=1227716
* https://bugzilla.suse.com/show_bug.cgi?id=1227722
* https://bugzilla.suse.com/show_bug.cgi?id=1227724
* https://bugzilla.suse.com/show_bug.cgi?id=1227725
* https://bugzilla.suse.com/show_bug.cgi?id=1227728
* https://bugzilla.suse.com/show_bug.cgi?id=1227729
* https://bugzilla.suse.com/show_bug.cgi?id=1227730
* https://bugzilla.suse.com/show_bug.cgi?id=1227732
* https://bugzilla.suse.com/show_bug.cgi?id=1227733
* https://bugzilla.suse.com/show_bug.cgi?id=1227750
* https://bugzilla.suse.com/show_bug.cgi?id=1227754
* https://bugzilla.suse.com/show_bug.cgi?id=1227755
* https://bugzilla.suse.com/show_bug.cgi?id=1227760
* https://bugzilla.suse.com/show_bug.cgi?id=1227762
* https://bugzilla.suse.com/show_bug.cgi?id=1227763
* https://bugzilla.suse.com/show_bug.cgi?id=1227764
* https://bugzilla.suse.com/show_bug.cgi?id=1227766
* https://bugzilla.suse.com/show_bug.cgi?id=1227770
* https://bugzilla.suse.com/show_bug.cgi?id=1227771
* https://bugzilla.suse.com/show_bug.cgi?id=1227772
* https://bugzilla.suse.com/show_bug.cgi?id=1227774
* https://bugzilla.suse.com/show_bug.cgi?id=1227779
* https://bugzilla.suse.com/show_bug.cgi?id=1227780
* https://bugzilla.suse.com/show_bug.cgi?id=1227783
* https://bugzilla.suse.com/show_bug.cgi?id=1227786
* https://bugzilla.suse.com/show_bug.cgi?id=1227787
* https://bugzilla.suse.com/show_bug.cgi?id=1227790
* https://bugzilla.suse.com/show_bug.cgi?id=1227792
* https://bugzilla.suse.com/show_bug.cgi?id=1227796
* https://bugzilla.suse.com/show_bug.cgi?id=1227797
* https://bugzilla.suse.com/show_bug.cgi?id=1227798
* https://bugzilla.suse.com/show_bug.cgi?id=1227800
* https://bugzilla.suse.com/show_bug.cgi?id=1227802
* https://bugzilla.suse.com/show_bug.cgi?id=1227806
* https://bugzilla.suse.com/show_bug.cgi?id=1227808
* https://bugzilla.suse.com/show_bug.cgi?id=1227810
* https://bugzilla.suse.com/show_bug.cgi?id=1227812
* https://bugzilla.suse.com/show_bug.cgi?id=1227813
* https://bugzilla.suse.com/show_bug.cgi?id=1227814
* https://bugzilla.suse.com/show_bug.cgi?id=1227816
* https://bugzilla.suse.com/show_bug.cgi?id=1227820
* https://bugzilla.suse.com/show_bug.cgi?id=1227823
* https://bugzilla.suse.com/show_bug.cgi?id=1227824
* https://bugzilla.suse.com/show_bug.cgi?id=1227828
* https://bugzilla.suse.com/show_bug.cgi?id=1227829
* https://bugzilla.suse.com/show_bug.cgi?id=1227836
* https://bugzilla.suse.com/show_bug.cgi?id=1227846
* https://bugzilla.suse.com/show_bug.cgi?id=1227849
* https://bugzilla.suse.com/show_bug.cgi?id=1227851
* https://bugzilla.suse.com/show_bug.cgi?id=1227862
* https://bugzilla.suse.com/show_bug.cgi?id=1227864
* https://bugzilla.suse.com/show_bug.cgi?id=1227865
* https://bugzilla.suse.com/show_bug.cgi?id=1227866
* https://bugzilla.suse.com/show_bug.cgi?id=1227870
* https://bugzilla.suse.com/show_bug.cgi?id=1227884
* https://bugzilla.suse.com/show_bug.cgi?id=1227886
* https://bugzilla.suse.com/show_bug.cgi?id=1227891
* https://bugzilla.suse.com/show_bug.cgi?id=1227893
* https://bugzilla.suse.com/show_bug.cgi?id=1227899
* https://bugzilla.suse.com/show_bug.cgi?id=1227900
* https://bugzilla.suse.com/show_bug.cgi?id=1227910
* https://bugzilla.suse.com/show_bug.cgi?id=1227913
* https://bugzilla.suse.com/show_bug.cgi?id=1227917
* https://bugzilla.suse.com/show_bug.cgi?id=1227919
* https://bugzilla.suse.com/show_bug.cgi?id=1227920
* https://bugzilla.suse.com/show_bug.cgi?id=1227921
* https://bugzilla.suse.com/show_bug.cgi?id=1227922
* https://bugzilla.suse.com/show_bug.cgi?id=1227923
* https://bugzilla.suse.com/show_bug.cgi?id=1227924
* https://bugzilla.suse.com/show_bug.cgi?id=1227925
* https://bugzilla.suse.com/show_bug.cgi?id=1227927
* https://bugzilla.suse.com/show_bug.cgi?id=1227928
* https://bugzilla.suse.com/show_bug.cgi?id=1227931
* https://bugzilla.suse.com/show_bug.cgi?id=1227932
* https://bugzilla.suse.com/show_bug.cgi?id=1227933
* https://bugzilla.suse.com/show_bug.cgi?id=1227935
* https://bugzilla.suse.com/show_bug.cgi?id=1227936
* https://bugzilla.suse.com/show_bug.cgi?id=1227938
* https://bugzilla.suse.com/show_bug.cgi?id=1227941
* https://bugzilla.suse.com/show_bug.cgi?id=1227942
* https://bugzilla.suse.com/show_bug.cgi?id=1227944
* https://bugzilla.suse.com/show_bug.cgi?id=1227945
* https://bugzilla.suse.com/show_bug.cgi?id=1227947
* https://bugzilla.suse.com/show_bug.cgi?id=1227948
* https://bugzilla.suse.com/show_bug.cgi?id=1227949
* https://bugzilla.suse.com/show_bug.cgi?id=1227950
* https://bugzilla.suse.com/show_bug.cgi?id=1227952
* https://bugzilla.suse.com/show_bug.cgi?id=1227953
* https://bugzilla.suse.com/show_bug.cgi?id=1227954
* https://bugzilla.suse.com/show_bug.cgi?id=1227956
* https://bugzilla.suse.com/show_bug.cgi?id=1227957
* https://bugzilla.suse.com/show_bug.cgi?id=1227963
* https://bugzilla.suse.com/show_bug.cgi?id=1227964
* https://bugzilla.suse.com/show_bug.cgi?id=1227965
* https://bugzilla.suse.com/show_bug.cgi?id=1227968
* https://bugzilla.suse.com/show_bug.cgi?id=1227969
* https://bugzilla.suse.com/show_bug.cgi?id=1227970
* https://bugzilla.suse.com/show_bug.cgi?id=1227971
* https://bugzilla.suse.com/show_bug.cgi?id=1227972
* https://bugzilla.suse.com/show_bug.cgi?id=1227975
* https://bugzilla.suse.com/show_bug.cgi?id=1227976
* https://bugzilla.suse.com/show_bug.cgi?id=1227981
* https://bugzilla.suse.com/show_bug.cgi?id=1227982
* https://bugzilla.suse.com/show_bug.cgi?id=1227985
* https://bugzilla.suse.com/show_bug.cgi?id=1227986
* https://bugzilla.suse.com/show_bug.cgi?id=1227987
* https://bugzilla.suse.com/show_bug.cgi?id=1227988
* https://bugzilla.suse.com/show_bug.cgi?id=1227989
* https://bugzilla.suse.com/show_bug.cgi?id=1227990
* https://bugzilla.suse.com/show_bug.cgi?id=1227991
* https://bugzilla.suse.com/show_bug.cgi?id=1227992
* https://bugzilla.suse.com/show_bug.cgi?id=1227993
* https://bugzilla.suse.com/show_bug.cgi?id=1227995
* https://bugzilla.suse.com/show_bug.cgi?id=1227996
* https://bugzilla.suse.com/show_bug.cgi?id=1227997
* https://bugzilla.suse.com/show_bug.cgi?id=1228000
* https://bugzilla.suse.com/show_bug.cgi?id=1228002
* https://bugzilla.suse.com/show_bug.cgi?id=1228003
* https://bugzilla.suse.com/show_bug.cgi?id=1228004
* https://bugzilla.suse.com/show_bug.cgi?id=1228005
* https://bugzilla.suse.com/show_bug.cgi?id=1228006
* https://bugzilla.suse.com/show_bug.cgi?id=1228007
* https://bugzilla.suse.com/show_bug.cgi?id=1228008
* https://bugzilla.suse.com/show_bug.cgi?id=1228009
* https://bugzilla.suse.com/show_bug.cgi?id=1228010
* https://bugzilla.suse.com/show_bug.cgi?id=1228011
* https://bugzilla.suse.com/show_bug.cgi?id=1228013
* https://bugzilla.suse.com/show_bug.cgi?id=1228014
* https://bugzilla.suse.com/show_bug.cgi?id=1228015
* https://bugzilla.suse.com/show_bug.cgi?id=1228019
* https://bugzilla.suse.com/show_bug.cgi?id=1228020
* https://bugzilla.suse.com/show_bug.cgi?id=1228025
* https://bugzilla.suse.com/show_bug.cgi?id=1228028
* https://bugzilla.suse.com/show_bug.cgi?id=1228035
* https://bugzilla.suse.com/show_bug.cgi?id=1228037
* https://bugzilla.suse.com/show_bug.cgi?id=1228038
* https://bugzilla.suse.com/show_bug.cgi?id=1228039
* https://bugzilla.suse.com/show_bug.cgi?id=1228040
* https://bugzilla.suse.com/show_bug.cgi?id=1228045
* https://bugzilla.suse.com/show_bug.cgi?id=1228054
* https://bugzilla.suse.com/show_bug.cgi?id=1228055
* https://bugzilla.suse.com/show_bug.cgi?id=1228056
* https://bugzilla.suse.com/show_bug.cgi?id=1228060
* https://bugzilla.suse.com/show_bug.cgi?id=1228061
* https://bugzilla.suse.com/show_bug.cgi?id=1228062
* https://bugzilla.suse.com/show_bug.cgi?id=1228063
* https://bugzilla.suse.com/show_bug.cgi?id=1228064
* https://bugzilla.suse.com/show_bug.cgi?id=1228066
* https://bugzilla.suse.com/show_bug.cgi?id=1228067
* https://bugzilla.suse.com/show_bug.cgi?id=1228068
* https://bugzilla.suse.com/show_bug.cgi?id=1228071
* https://bugzilla.suse.com/show_bug.cgi?id=1228079
* https://bugzilla.suse.com/show_bug.cgi?id=1228090
* https://bugzilla.suse.com/show_bug.cgi?id=1228114
* https://bugzilla.suse.com/show_bug.cgi?id=1228140
* https://bugzilla.suse.com/show_bug.cgi?id=1228190
* https://bugzilla.suse.com/show_bug.cgi?id=1228191
* https://bugzilla.suse.com/show_bug.cgi?id=1228195
* https://bugzilla.suse.com/show_bug.cgi?id=1228202
* https://bugzilla.suse.com/show_bug.cgi?id=1228226
* https://bugzilla.suse.com/show_bug.cgi?id=1228235
* https://bugzilla.suse.com/show_bug.cgi?id=1228237
* https://bugzilla.suse.com/show_bug.cgi?id=1228247
* https://bugzilla.suse.com/show_bug.cgi?id=1228327
* https://bugzilla.suse.com/show_bug.cgi?id=1228328
* https://bugzilla.suse.com/show_bug.cgi?id=1228330
* https://bugzilla.suse.com/show_bug.cgi?id=1228403
* https://bugzilla.suse.com/show_bug.cgi?id=1228405
* https://bugzilla.suse.com/show_bug.cgi?id=1228408
* https://bugzilla.suse.com/show_bug.cgi?id=1228409
* https://bugzilla.suse.com/show_bug.cgi?id=1228410
* https://bugzilla.suse.com/show_bug.cgi?id=1228418
* https://bugzilla.suse.com/show_bug.cgi?id=1228440
* https://bugzilla.suse.com/show_bug.cgi?id=1228459
* https://bugzilla.suse.com/show_bug.cgi?id=1228462
* https://bugzilla.suse.com/show_bug.cgi?id=1228470
* https://bugzilla.suse.com/show_bug.cgi?id=1228518
* https://bugzilla.suse.com/show_bug.cgi?id=1228520
* https://bugzilla.suse.com/show_bug.cgi?id=1228530
* https://bugzilla.suse.com/show_bug.cgi?id=1228561
* https://bugzilla.suse.com/show_bug.cgi?id=1228565
* https://bugzilla.suse.com/show_bug.cgi?id=1228580
* https://bugzilla.suse.com/show_bug.cgi?id=1228581
* https://bugzilla.suse.com/show_bug.cgi?id=1228591
* https://bugzilla.suse.com/show_bug.cgi?id=1228599
* https://bugzilla.suse.com/show_bug.cgi?id=1228617
* https://bugzilla.suse.com/show_bug.cgi?id=1228625
* https://bugzilla.suse.com/show_bug.cgi?id=1228626
* https://bugzilla.suse.com/show_bug.cgi?id=1228633
* https://bugzilla.suse.com/show_bug.cgi?id=1228640
* https://bugzilla.suse.com/show_bug.cgi?id=1228644
* https://bugzilla.suse.com/show_bug.cgi?id=1228649
* https://bugzilla.suse.com/show_bug.cgi?id=1228655
* https://bugzilla.suse.com/show_bug.cgi?id=1228665
* https://bugzilla.suse.com/show_bug.cgi?id=1228672
* https://bugzilla.suse.com/show_bug.cgi?id=1228680
* https://bugzilla.suse.com/show_bug.cgi?id=1228705
* https://bugzilla.suse.com/show_bug.cgi?id=1228723
* https://bugzilla.suse.com/show_bug.cgi?id=1228743
* https://bugzilla.suse.com/show_bug.cgi?id=1228756
* https://bugzilla.suse.com/show_bug.cgi?id=1228801
* https://bugzilla.suse.com/show_bug.cgi?id=1228850
* https://bugzilla.suse.com/show_bug.cgi?id=1228857
* https://jira.suse.com/browse/PED-8582
* https://jira.suse.com/browse/PED-8690


--===============4568288300297206905==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for the Linux Kernel</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:2947-1</td>
</tr>

<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1082555">bsc#1082555</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1193454">bsc#1193454</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1193554">bsc#1193554</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1193787">bsc#1193787</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194324">bsc#1194324</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">bsc#1194869</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195357">bsc#1195357</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195668">bsc#1195668</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195927">bsc#1195927</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195957">bsc#1195957</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1196018">bsc#1196018</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1196823">bsc#1196823</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1197146">bsc#1197146</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1197246">bsc#1197246</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1197762">bsc#1197762</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1202346">bsc#1202346</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1202686">bsc#1202686</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1208783">bsc#1208783</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209636">bsc#1209636</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213123">bsc#1213123</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215492">bsc#1215492</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215587">bsc#1215587</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216834">bsc#1216834</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219832">bsc#1219832</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220138">bsc#1220138</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220185">bsc#1220185</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220186">bsc#1220186</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220187">bsc#1220187</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220869">bsc#1220869</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220876">bsc#1220876</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220942">bsc#1220942</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220952">bsc#1220952</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221010">bsc#1221010</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221044">bsc#1221044</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221647">bsc#1221647</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221654">bsc#1221654</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221656">bsc#1221656</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221659">bsc#1221659</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221777">bsc#1221777</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222011">bsc#1222011</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222323">bsc#1222323</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222326">bsc#1222326</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222328">bsc#1222328</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222625">bsc#1222625</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222702">bsc#1222702</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222728">bsc#1222728</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222799">bsc#1222799</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222809">bsc#1222809</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222810">bsc#1222810</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223021">bsc#1223021</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223180">bsc#1223180</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223635">bsc#1223635</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223652">bsc#1223652</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223675">bsc#1223675</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223778">bsc#1223778</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223806">bsc#1223806</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223813">bsc#1223813</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223815">bsc#1223815</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223836">bsc#1223836</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223863">bsc#1223863</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224414">bsc#1224414</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224499">bsc#1224499</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224500">bsc#1224500</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224512">bsc#1224512</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224516">bsc#1224516</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224517">bsc#1224517</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224545">bsc#1224545</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224548">bsc#1224548</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224557">bsc#1224557</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224572">bsc#1224572</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224573">bsc#1224573</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224585">bsc#1224585</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224604">bsc#1224604</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224636">bsc#1224636</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224641">bsc#1224641</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224683">bsc#1224683</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224694">bsc#1224694</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224700">bsc#1224700</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224743">bsc#1224743</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225088">bsc#1225088</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225272">bsc#1225272</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225301">bsc#1225301</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225475">bsc#1225475</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225489">bsc#1225489</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225504">bsc#1225504</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225505">bsc#1225505</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225564">bsc#1225564</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225573">bsc#1225573</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225581">bsc#1225581</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225586">bsc#1225586</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225711">bsc#1225711</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225717">bsc#1225717</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225719">bsc#1225719</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225744">bsc#1225744</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225745">bsc#1225745</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225746">bsc#1225746</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225752">bsc#1225752</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225753">bsc#1225753</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225757">bsc#1225757</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225767">bsc#1225767</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225810">bsc#1225810</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225815">bsc#1225815</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225820">bsc#1225820</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225829">bsc#1225829</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225835">bsc#1225835</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225838">bsc#1225838</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225839">bsc#1225839</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225843">bsc#1225843</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225847">bsc#1225847</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225851">bsc#1225851</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225856">bsc#1225856</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225895">bsc#1225895</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225898">bsc#1225898</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225903">bsc#1225903</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226202">bsc#1226202</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226502">bsc#1226502</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226519">bsc#1226519</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226551">bsc#1226551</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226555">bsc#1226555</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226565">bsc#1226565</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226568">bsc#1226568</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226570">bsc#1226570</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226571">bsc#1226571</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226574">bsc#1226574</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226588">bsc#1226588</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226607">bsc#1226607</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226650">bsc#1226650</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226698">bsc#1226698</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226713">bsc#1226713</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226716">bsc#1226716</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226750">bsc#1226750</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226757">bsc#1226757</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226758">bsc#1226758</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226775">bsc#1226775</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226783">bsc#1226783</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226785">bsc#1226785</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226834">bsc#1226834</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226837">bsc#1226837</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226911">bsc#1226911</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226990">bsc#1226990</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226993">bsc#1226993</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227090">bsc#1227090</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227121">bsc#1227121</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227157">bsc#1227157</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227162">bsc#1227162</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227362">bsc#1227362</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227383">bsc#1227383</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227432">bsc#1227432</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227435">bsc#1227435</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227447">bsc#1227447</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227487">bsc#1227487</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227549">bsc#1227549</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227573">bsc#1227573</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227618">bsc#1227618</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227620">bsc#1227620</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227626">bsc#1227626</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227635">bsc#1227635</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227661">bsc#1227661</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227716">bsc#1227716</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227722">bsc#1227722</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227724">bsc#1227724</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227725">bsc#1227725</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227728">bsc#1227728</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227729">bsc#1227729</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227730">bsc#1227730</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227732">bsc#1227732</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227733">bsc#1227733</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227750">bsc#1227750</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227754">bsc#1227754</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227755">bsc#1227755</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227760">bsc#1227760</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227762">bsc#1227762</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227763">bsc#1227763</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227764">bsc#1227764</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227766">bsc#1227766</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227770">bsc#1227770</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227771">bsc#1227771</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227772">bsc#1227772</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227774">bsc#1227774</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227779">bsc#1227779</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227780">bsc#1227780</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227783">bsc#1227783</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227786">bsc#1227786</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227787">bsc#1227787</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227790">bsc#1227790</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227792">bsc#1227792</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227796">bsc#1227796</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227797">bsc#1227797</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227798">bsc#1227798</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227800">bsc#1227800</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227802">bsc#1227802</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227806">bsc#1227806</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227808">bsc#1227808</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227810">bsc#1227810</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227812">bsc#1227812</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227813">bsc#1227813</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227814">bsc#1227814</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227816">bsc#1227816</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227820">bsc#1227820</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227823">bsc#1227823</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227824">bsc#1227824</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227828">bsc#1227828</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227829">bsc#1227829</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227836">bsc#1227836</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227846">bsc#1227846</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227849">bsc#1227849</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227851">bsc#1227851</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227862">bsc#1227862</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227864">bsc#1227864</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227865">bsc#1227865</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227866">bsc#1227866</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227870">bsc#1227870</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227884">bsc#1227884</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227886">bsc#1227886</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227891">bsc#1227891</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227893">bsc#1227893</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227899">bsc#1227899</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227900">bsc#1227900</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227910">bsc#1227910</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227913">bsc#1227913</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227917">bsc#1227917</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227919">bsc#1227919</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227920">bsc#1227920</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227921">bsc#1227921</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227922">bsc#1227922</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227923">bsc#1227923</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227924">bsc#1227924</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227925">bsc#1227925</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227927">bsc#1227927</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227928">bsc#1227928</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227931">bsc#1227931</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227932">bsc#1227932</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227933">bsc#1227933</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227935">bsc#1227935</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227936">bsc#1227936</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227938">bsc#1227938</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227941">bsc#1227941</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227942">bsc#1227942</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227944">bsc#1227944</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227945">bsc#1227945</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227947">bsc#1227947</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227948">bsc#1227948</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227949">bsc#1227949</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227950">bsc#1227950</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227952">bsc#1227952</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227953">bsc#1227953</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227954">bsc#1227954</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227956">bsc#1227956</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227957">bsc#1227957</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227963">bsc#1227963</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227964">bsc#1227964</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227965">bsc#1227965</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227968">bsc#1227968</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227969">bsc#1227969</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227970">bsc#1227970</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227971">bsc#1227971</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227972">bsc#1227972</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227975">bsc#1227975</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227976">bsc#1227976</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227981">bsc#1227981</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227982">bsc#1227982</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227985">bsc#1227985</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227986">bsc#1227986</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227987">bsc#1227987</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227988">bsc#1227988</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227989">bsc#1227989</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227990">bsc#1227990</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227991">bsc#1227991</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227992">bsc#1227992</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227993">bsc#1227993</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227995">bsc#1227995</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227996">bsc#1227996</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227997">bsc#1227997</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228000">bsc#1228000</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228002">bsc#1228002</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228003">bsc#1228003</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228004">bsc#1228004</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228005">bsc#1228005</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228006">bsc#1228006</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228007">bsc#1228007</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228008">bsc#1228008</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228009">bsc#1228009</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228010">bsc#1228010</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228011">bsc#1228011</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228013">bsc#1228013</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228014">bsc#1228014</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228015">bsc#1228015</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228019">bsc#1228019</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228020">bsc#1228020</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228025">bsc#1228025</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228028">bsc#1228028</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228035">bsc#1228035</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228037">bsc#1228037</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228038">bsc#1228038</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228039">bsc#1228039</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228040">bsc#1228040</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228045">bsc#1228045</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228054">bsc#1228054</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228055">bsc#1228055</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228056">bsc#1228056</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228060">bsc#1228060</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228061">bsc#1228061</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228062">bsc#1228062</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228063">bsc#1228063</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228064">bsc#1228064</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228066">bsc#1228066</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228067">bsc#1228067</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228068">bsc#1228068</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228071">bsc#1228071</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228079">bsc#1228079</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228090">bsc#1228090</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228114">bsc#1228114</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228140">bsc#1228140</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228190">bsc#1228190</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228191">bsc#1228191</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228195">bsc#1228195</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228202">bsc#1228202</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228226">bsc#1228226</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228235">bsc#1228235</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228237">bsc#1228237</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228247">bsc#1228247</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228327">bsc#1228327</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228328">bsc#1228328</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228330">bsc#1228330</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228403">bsc#1228403</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228405">bsc#1228405</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228408">bsc#1228408</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228409">bsc#1228409</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228410">bsc#1228410</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228418">bsc#1228418</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228440">bsc#1228440</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228459">bsc#1228459</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228462">bsc#1228462</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228470">bsc#1228470</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228518">bsc#1228518</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228520">bsc#1228520</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228530">bsc#1228530</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228561">bsc#1228561</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228565">bsc#1228565</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228580">bsc#1228580</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228581">bsc#1228581</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228591">bsc#1228591</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228599">bsc#1228599</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228617">bsc#1228617</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228625">bsc#1228625</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228626">bsc#1228626</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228633">bsc#1228633</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228640">bsc#1228640</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228644">bsc#1228644</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228649">bsc#1228649</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228655">bsc#1228655</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228665">bsc#1228665</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228672">bsc#1228672</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228680">bsc#1228680</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228705">bsc#1228705</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228723">bsc#1228723</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228743">bsc#1228743</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228756">bsc#1228756</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228801">bsc#1228801</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228850">bsc#1228850</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228857">bsc#1228857</a>
</li>


<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-8582">jsc#PED-8582</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-8690">jsc#PED-8690</a>
</li>

</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47086.html">CVE-2021-47086</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47103.html">CVE-2021-47103</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47186.html">CVE-2021-47186</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47402.html">CVE-2021-47402</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47546.html">CVE-2021-47546</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47547.html">CVE-2021-47547</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47588.html">CVE-2021-47588</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47590.html">CVE-2021-47590</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47591.html">CVE-2021-47591</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47593.html">CVE-2021-47593</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47598.html">CVE-2021-47598</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47599.html">CVE-2021-47599</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47606.html">CVE-2021-47606</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47622.html">CVE-2021-47622</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47623.html">CVE-2021-47623</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47624.html">CVE-2021-47624</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48713.html">CVE-2022-48713</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48730.html">CVE-2022-48730</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48732.html">CVE-2022-48732</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48749.html">CVE-2022-48749</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48756.html">CVE-2022-48756</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48773.html">CVE-2022-48773</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48774.html">CVE-2022-48774</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48775.html">CVE-2022-48775</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48776.html">CVE-2022-48776</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48777.html">CVE-2022-48777</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48778.html">CVE-2022-48778</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48780.html">CVE-2022-48780</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48783.html">CVE-2022-48783</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48784.html">CVE-2022-48784</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48785.html">CVE-2022-48785</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48786.html">CVE-2022-48786</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48787.html">CVE-2022-48787</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48788.html">CVE-2022-48788</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48789.html">CVE-2022-48789</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48790.html">CVE-2022-48790</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48791.html">CVE-2022-48791</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48792.html">CVE-2022-48792</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48793.html">CVE-2022-48793</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48794.html">CVE-2022-48794</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48796.html">CVE-2022-48796</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48797.html">CVE-2022-48797</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48798.html">CVE-2022-48798</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48799.html">CVE-2022-48799</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48800.html">CVE-2022-48800</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48801.html">CVE-2022-48801</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48802.html">CVE-2022-48802</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48803.html">CVE-2022-48803</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48804.html">CVE-2022-48804</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48805.html">CVE-2022-48805</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48806.html">CVE-2022-48806</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48807.html">CVE-2022-48807</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48809.html">CVE-2022-48809</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48810.html">CVE-2022-48810</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48811.html">CVE-2022-48811</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48812.html">CVE-2022-48812</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48813.html">CVE-2022-48813</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48814.html">CVE-2022-48814</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48815.html">CVE-2022-48815</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48816.html">CVE-2022-48816</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48817.html">CVE-2022-48817</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48818.html">CVE-2022-48818</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48820.html">CVE-2022-48820</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48821.html">CVE-2022-48821</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48822.html">CVE-2022-48822</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48823.html">CVE-2022-48823</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48824.html">CVE-2022-48824</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48825.html">CVE-2022-48825</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48826.html">CVE-2022-48826</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48827.html">CVE-2022-48827</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48828.html">CVE-2022-48828</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48829.html">CVE-2022-48829</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48830.html">CVE-2022-48830</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48831.html">CVE-2022-48831</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48834.html">CVE-2022-48834</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48835.html">CVE-2022-48835</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48836.html">CVE-2022-48836</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48837.html">CVE-2022-48837</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48838.html">CVE-2022-48838</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48839.html">CVE-2022-48839</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48840.html">CVE-2022-48840</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48841.html">CVE-2022-48841</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48842.html">CVE-2022-48842</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48843.html">CVE-2022-48843</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48844.html">CVE-2022-48844</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48846.html">CVE-2022-48846</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48847.html">CVE-2022-48847</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48849.html">CVE-2022-48849</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48850.html">CVE-2022-48850</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48851.html">CVE-2022-48851</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48852.html">CVE-2022-48852</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48853.html">CVE-2022-48853</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48855.html">CVE-2022-48855</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48856.html">CVE-2022-48856</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48857.html">CVE-2022-48857</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48858.html">CVE-2022-48858</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48859.html">CVE-2022-48859</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48860.html">CVE-2022-48860</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48861.html">CVE-2022-48861</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48862.html">CVE-2022-48862</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48863.html">CVE-2022-48863</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48864.html">CVE-2022-48864</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48866.html">CVE-2022-48866</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-1582.html">CVE-2023-1582</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-37453.html">CVE-2023-37453</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52435.html">CVE-2023-52435</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52573.html">CVE-2023-52573</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52580.html">CVE-2023-52580</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52591.html">CVE-2023-52591</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52735.html">CVE-2023-52735</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52751.html">CVE-2023-52751</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52762.html">CVE-2023-52762</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52775.html">CVE-2023-52775</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52812.html">CVE-2023-52812</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52857.html">CVE-2023-52857</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52863.html">CVE-2023-52863</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52885.html">CVE-2023-52885</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52886.html">CVE-2023-52886</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-25741.html">CVE-2024-25741</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26583.html">CVE-2024-26583</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26584.html">CVE-2024-26584</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26585.html">CVE-2024-26585</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26615.html">CVE-2024-26615</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26633.html">CVE-2024-26633</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26635.html">CVE-2024-26635</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26636.html">CVE-2024-26636</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26641.html">CVE-2024-26641</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26661.html">CVE-2024-26661</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26663.html">CVE-2024-26663</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26665.html">CVE-2024-26665</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26800.html">CVE-2024-26800</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26802.html">CVE-2024-26802</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26813.html">CVE-2024-26813</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26814.html">CVE-2024-26814</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26863.html">CVE-2024-26863</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26889.html">CVE-2024-26889</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26920.html">CVE-2024-26920</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26935.html">CVE-2024-26935</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-269355.html">CVE-2024-269355</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26961.html">CVE-2024-26961</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26976.html">CVE-2024-26976</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27015.html">CVE-2024-27015</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27019.html">CVE-2024-27019</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27020.html">CVE-2024-27020</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27025.html">CVE-2024-27025</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27065.html">CVE-2024-27065</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27402.html">CVE-2024-27402</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27437.html">CVE-2024-27437</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35805.html">CVE-2024-35805</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35819.html">CVE-2024-35819</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35837.html">CVE-2024-35837</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35853.html">CVE-2024-35853</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35854.html">CVE-2024-35854</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35855.html">CVE-2024-35855</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35889.html">CVE-2024-35889</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35890.html">CVE-2024-35890</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35893.html">CVE-2024-35893</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35899.html">CVE-2024-35899</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35934.html">CVE-2024-35934</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35949.html">CVE-2024-35949</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35961.html">CVE-2024-35961</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35979.html">CVE-2024-35979</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35995.html">CVE-2024-35995</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36000.html">CVE-2024-36000</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36004.html">CVE-2024-36004</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36288.html">CVE-2024-36288</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36889.html">CVE-2024-36889</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36901.html">CVE-2024-36901</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36902.html">CVE-2024-36902</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36909.html">CVE-2024-36909</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36910.html">CVE-2024-36910</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36911.html">CVE-2024-36911</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36912.html">CVE-2024-36912</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36913.html">CVE-2024-36913</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36914.html">CVE-2024-36914</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36919.html">CVE-2024-36919</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36923.html">CVE-2024-36923</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36924.html">CVE-2024-36924</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36926.html">CVE-2024-36926</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36939.html">CVE-2024-36939</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36941.html">CVE-2024-36941</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36942.html">CVE-2024-36942</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36944.html">CVE-2024-36944</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36946.html">CVE-2024-36946</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36947.html">CVE-2024-36947</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36950.html">CVE-2024-36950</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36952.html">CVE-2024-36952</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36955.html">CVE-2024-36955</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36959.html">CVE-2024-36959</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36974.html">CVE-2024-36974</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38548.html">CVE-2024-38548</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38555.html">CVE-2024-38555</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38558.html">CVE-2024-38558</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38559.html">CVE-2024-38559</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38570.html">CVE-2024-38570</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38586.html">CVE-2024-38586</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38588.html">CVE-2024-38588</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38598.html">CVE-2024-38598</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38628.html">CVE-2024-38628</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39276.html">CVE-2024-39276</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39371.html">CVE-2024-39371</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39463.html">CVE-2024-39463</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39472.html">CVE-2024-39472</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39475.html">CVE-2024-39475</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39482.html">CVE-2024-39482</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39487.html">CVE-2024-39487</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39488.html">CVE-2024-39488</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39490.html">CVE-2024-39490</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39493.html">CVE-2024-39493</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39494.html">CVE-2024-39494</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39497.html">CVE-2024-39497</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39499.html">CVE-2024-39499</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39500.html">CVE-2024-39500</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39501.html">CVE-2024-39501</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39502.html">CVE-2024-39502</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39505.html">CVE-2024-39505</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39506.html">CVE-2024-39506</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39507.html">CVE-2024-39507</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39508.html">CVE-2024-39508</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39509.html">CVE-2024-39509</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40900.html">CVE-2024-40900</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40901.html">CVE-2024-40901</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40902.html">CVE-2024-40902</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40903.html">CVE-2024-40903</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40904.html">CVE-2024-40904</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40906.html">CVE-2024-40906</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40908.html">CVE-2024-40908</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40909.html">CVE-2024-40909</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40911.html">CVE-2024-40911</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40912.html">CVE-2024-40912</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40916.html">CVE-2024-40916</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40919.html">CVE-2024-40919</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40923.html">CVE-2024-40923</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40924.html">CVE-2024-40924</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40927.html">CVE-2024-40927</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40929.html">CVE-2024-40929</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40931.html">CVE-2024-40931</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40932.html">CVE-2024-40932</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40934.html">CVE-2024-40934</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40935.html">CVE-2024-40935</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40937.html">CVE-2024-40937</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40940.html">CVE-2024-40940</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40941.html">CVE-2024-40941</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40942.html">CVE-2024-40942</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40943.html">CVE-2024-40943</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40945.html">CVE-2024-40945</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40953.html">CVE-2024-40953</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40954.html">CVE-2024-40954</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40956.html">CVE-2024-40956</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40958.html">CVE-2024-40958</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40959.html">CVE-2024-40959</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40960.html">CVE-2024-40960</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40961.html">CVE-2024-40961</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40966.html">CVE-2024-40966</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40967.html">CVE-2024-40967</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40970.html">CVE-2024-40970</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40972.html">CVE-2024-40972</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40976.html">CVE-2024-40976</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40977.html">CVE-2024-40977</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40981.html">CVE-2024-40981</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40982.html">CVE-2024-40982</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40984.html">CVE-2024-40984</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40987.html">CVE-2024-40987</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40988.html">CVE-2024-40988</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40989.html">CVE-2024-40989</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40990.html">CVE-2024-40990</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40994.html">CVE-2024-40994</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40998.html">CVE-2024-40998</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40999.html">CVE-2024-40999</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41002.html">CVE-2024-41002</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41004.html">CVE-2024-41004</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41006.html">CVE-2024-41006</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41009.html">CVE-2024-41009</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41011.html">CVE-2024-41011</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41012.html">CVE-2024-41012</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41013.html">CVE-2024-41013</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41014.html">CVE-2024-41014</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41015.html">CVE-2024-41015</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41016.html">CVE-2024-41016</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41017.html">CVE-2024-41017</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41040.html">CVE-2024-41040</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41041.html">CVE-2024-41041</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41044.html">CVE-2024-41044</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41048.html">CVE-2024-41048</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41057.html">CVE-2024-41057</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41058.html">CVE-2024-41058</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41059.html">CVE-2024-41059</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41063.html">CVE-2024-41063</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41064.html">CVE-2024-41064</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41066.html">CVE-2024-41066</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41069.html">CVE-2024-41069</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41070.html">CVE-2024-41070</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41071.html">CVE-2024-41071</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41072.html">CVE-2024-41072</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41076.html">CVE-2024-41076</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41078.html">CVE-2024-41078</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41081.html">CVE-2024-41081</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41087.html">CVE-2024-41087</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41090.html">CVE-2024-41090</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41091.html">CVE-2024-41091</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42070.html">CVE-2024-42070</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42079.html">CVE-2024-42079</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42093.html">CVE-2024-42093</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42096.html">CVE-2024-42096</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42105.html">CVE-2024-42105</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42122.html">CVE-2024-42122</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42124.html">CVE-2024-42124</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42145.html">CVE-2024-42145</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42161.html">CVE-2024-42161</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42224.html">CVE-2024-42224</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42230.html">CVE-2024-42230</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47086</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47103</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47186</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47402</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47546</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47546</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47547</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47588</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47590</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47591</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47593</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47598</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47599</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47606</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47622</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47623</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47624</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48713</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48730</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48732</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48749</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48756</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48773</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48774</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48775</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48776</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48777</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48778</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48780</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48783</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48784</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48785</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48786</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48787</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48787</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48788</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48788</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48789</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48789</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48790</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48790</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48791</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48791</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48792</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48792</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48793</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48793</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48794</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48796</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48796</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48797</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48798</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48799</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48800</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48801</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48802</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48803</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48804</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48805</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48806</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48807</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48809</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48809</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48810</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48811</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48812</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48813</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48814</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48815</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48816</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48817</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48818</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48820</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48821</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48822</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48822</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48823</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48824</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48824</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48825</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48826</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48827</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48828</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48829</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48830</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48831</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48834</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48834</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48835</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48835</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48836</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48836</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48837</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48837</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48838</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48838</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48839</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48839</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48840</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48840</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48841</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48841</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48842</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48842</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48843</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48843</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48844</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48844</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48846</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48846</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48847</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48847</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48849</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48849</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48850</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48850</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48851</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48851</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48852</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48852</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48853</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48853</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48855</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48855</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48856</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48856</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48857</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48857</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48858</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48858</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48859</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48859</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48860</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48860</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48861</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48861</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48862</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48862</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48863</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48863</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48864</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48864</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48866</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48866</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-1582</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-1582</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-37453</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-37453</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52435</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52435</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52573</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52580</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52591</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52735</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52751</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52762</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52775</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.9</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52812</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52857</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52863</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52885</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52886</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-25741</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26583</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26583</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26584</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26584</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26585</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26585</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26615</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26633</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26635</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26636</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26641</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26661</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26663</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26665</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26800</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26802</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26813</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26814</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26863</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26889</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26920</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26935</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26961</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26976</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27015</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27015</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27019</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27019</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27020</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27020</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27025</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27065</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27402</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27437</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35805</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35819</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35837</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35853</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35854</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35855</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35889</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35890</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35893</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35899</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35934</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35949</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35961</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35979</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35995</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36000</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36004</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36288</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36288</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36889</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36901</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36901</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36902</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36902</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36909</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36910</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36911</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36912</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36913</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36914</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36919</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36923</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36924</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36926</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36926</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36939</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36941</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36942</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36944</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36946</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36947</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36950</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36952</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36955</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36959</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36974</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38548</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38555</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38558</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38559</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38570</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38570</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38586</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38588</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38598</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38628</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39276</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39371</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39463</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39472</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39472</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39475</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39475</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39482</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39482</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39487</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39488</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39490</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39493</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39493</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39494</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39494</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39497</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39499</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39500</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39501</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39502</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39505</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39506</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39507</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39508</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39509</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40900</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40901</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40902</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40902</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40903</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40903</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40904</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40906</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40908</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40909</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40911</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40912</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40916</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40919</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40923</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40924</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40927</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40929</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40931</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40932</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40934</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40935</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40937</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40940</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40941</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40942</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40943</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40945</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40953</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40954</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40956</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40958</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40959</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40960</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40961</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40966</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40967</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40970</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40972</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40976</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40977</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40981</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40982</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40984</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40987</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40988</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40989</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40990</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40994</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40998</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40999</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41002</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41004</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41006</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41009</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41009</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41011</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41012</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41013</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41014</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41015</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41016</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41017</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41040</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41041</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41044</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41048</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41057</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41057</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41058</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41058</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41059</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41059</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41063</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41063</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41064</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41064</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41066</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41066</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41069</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41069</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41070</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41071</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41072</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41076</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41078</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41081</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41087</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41087</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41090</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41091</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42070</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42070</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42079</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42079</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42093</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42096</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42096</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42105</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42105</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42122</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42124</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42145</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42145</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42161</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42161</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42161</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42224</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42224</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42230</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42230</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42230</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">openSUSE Leap
15.5</li>

<li class="list-group-item">Public Cloud
Module 15-SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP5</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves 311 vulnerabilities, contains two features
and has 50 security fixes can now be installed.</p>





<h2>Description:</h2>

<p>The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to
receive various security bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2021-47086: phonet/pep: refuse to enable an unbound pipe
(bsc#1220952).</li>
<li>CVE-2021-47103: net: sock: preserve kabi for sock
(bsc#1221010).</li>
<li>CVE-2021-47186: ipc: check for null after calling kmemdup
(bsc#1222702).</li>
<li>CVE-2021-47546: Kabi fix for ipv6: fix memory leak in
fib6_rule_suppress (bsc#1225504).</li>
<li>CVE-2021-47547: net: tulip: de4x5: fix the problem that the array
&#x27;lp-&gt;phy&#x27; may be out of bound (bsc#1225505).</li>
<li>CVE-2021-47588: sit: do not call ipip6_dev_free() from sit_init_net()
(bsc#1226568).</li>
<li>CVE-2021-47590: mptcp: fix deadlock in __mptcp_push_pending()
(bsc#1226565).</li>
<li>CVE-2021-47591: mptcp: remove tcp ulp setsockopt support
(bsc#1226570).</li>
<li>CVE-2021-47593: mptcp: clear &#x27;kern&#x27; flag from
fallback sockets (bsc#1226551).</li>
<li>CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1226574).</li>
<li>CVE-2021-47599: btrfs: use latest_dev in btrfs_show_devname
(bsc#1226571)</li>
<li>CVE-2021-47606: net: netlink: af_netlink: Prevent empty skb by adding
a check on len (bsc#1226555).</li>
<li>CVE-2021-47623: powerpc/fixmap: Fix VM debug warning on unmap
(bsc#1227919).</li>
<li>CVE-2022-48785: ipv6: mcast: use rcu-safe version of
ipv6_get_lladdr() (bsc#1227927)</li>
<li>CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling
ip[6]mr_free_table() on failure path (bsc#1227936).</li>
<li>CVE-2022-48850: net-sysfs: add check for netdevice being present to
speed_show (bsc#1228071)</li>
<li>CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets
(bsc#1228003).</li>
<li>CVE-2023-52435: net: prevent mss overflow in skb_segment()
(bsc#1220138).</li>
<li>CVE-2023-52573: net: rds: Fix possible NULL-pointer dereference
(bsc#1220869)</li>
<li>CVE-2023-52580: net/core: Fix ETH_P_1588 flow dissector
(bsc#1220876).</li>
<li>CVE-2023-52751: smb: client: fix use-after-free in
smb2_query_info_compound() (bsc#1225489).</li>
<li>CVE-2023-52775: net/smc: avoid data corruption caused by decline
(bsc#1225088).</li>
<li>CVE-2023-52812: drm/amd: check num of link levels when update pcie
param (bsc#1225564).</li>
<li>CVE-2023-52857: drm/mediatek: Fix coverity issue with unintentional
integer overflow (bsc#1225581).</li>
<li>CVE-2023-52863: hwmon: (axi-fan-control) Fix possible NULL pointer
dereference (bsc#1225586).</li>
<li>CVE-2024-26585: Fixed race between tx work scheduling and socket
close (bsc#1220187).</li>
<li>CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D
connection dump (bsc#1220942).</li>
<li>CVE-2024-26633: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in
ip6_tnl_parse_tlv_enc_lim() (bsc#1221647).</li>
<li>CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2
(bsc#1221656).</li>
<li>CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against
bonding changes (bsc#1221659).</li>
<li>CVE-2024-26641: ip6_tunnel: make sure to pull inner header in
__ip6_tnl_rcv() (bsc#1221654).</li>
<li>CVE-2024-26661: drm/amd/display: Add NULL test for &#x27;timing
generator&#x27; in (bsc#1222323)</li>
<li>CVE-2024-26663: tipc: Check the bearer type before calling
tipc_udp_nl_bearer_add() (bsc#1222326).</li>
<li>CVE-2024-26665: tunnels: fix out of bounds access when building IPv6
PMTU error (bsc#1222328).</li>
<li>CVE-2024-26802: stmmac: Clear variable when destroying workqueue
(bsc#1222799).</li>
<li>CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node()
(bsc#1223021).</li>
<li>CVE-2024-26961: mac802154: fix llsec key resources release in
mac802154_llsec_key_del (bsc#1223652).</li>
<li>CVE-2024-27015: netfilter: flowtable: incorrect pppoe tuple
(bsc#1223806).</li>
<li>CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in
__nft_obj_type_get() (bsc#1223813)</li>
<li>CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in
__nft_expr_type_get() (bsc#1223815)</li>
<li>CVE-2024-27025: nbd: null check for nla_nest_start
(bsc#1223778)</li>
<li>CVE-2024-27065: netfilter: nf_tables: do not compare internal table
flags on updates (bsc#1223836).</li>
<li>CVE-2024-27402: phonet/pep: fix racy skb_queue_empty() use
(bsc#1224414).</li>
<li>CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ
(bsc#1222625).</li>
<li>CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit
(bsc#1224743).</li>
<li>CVE-2024-35819: soc: fsl: qbman: Use raw spinlock for cgr_lock
(bsc#1224683).</li>
<li>CVE-2024-35837: net: mvpp2: clear BM pool before initialization
(bsc#1224500).</li>
<li>CVE-2024-35853: mlxsw: spectrum_acl_tcam: Fix memory leak during
rehash (bsc#1224604).</li>
<li>CVE-2024-35889: idpf: fix kernel panic on unknown packet types
(bsc#1224517).</li>
<li>CVE-2024-35890: gro: fix ownership transfer (bsc#1224516).</li>
<li>CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak
(bsc#1224512)</li>
<li>CVE-2024-35899: netfilter: nf_tables: flush pending destroy work
before exit_net release (bsc#1224499)</li>
<li>CVE-2024-35934: net/smc: reduce rtnl pressure in
smc_pnet_create_pnetids_list() (bsc#1224641)</li>
<li>CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata
blocks (bsc#1224700)</li>
<li>CVE-2024-35961: net/mlx5: Restore mistakenly dropped parts in
register devlink flow (bsc#1224585).</li>
<li>CVE-2024-35995: ACPI: CPPC: Fix access width used for PCC registers
(bsc#1224557).</li>
<li>CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv
uncharge (bsc#1224548).</li>
<li>CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue
(bsc#1224545)</li>
<li>CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output()
(bsc#1225711)</li>
<li>CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in
fib6_rule_action() (bsc#1225719).</li>
<li>CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that
couldn&#x27;t be re-encrypted (bsc#1225744).</li>
<li>CVE-2024-36910: uio_hv_generic: Do not free decrypted memory
(bsc#1225717).</li>
<li>CVE-2024-36911: hv_netvsc: Do not free decrypted memory
(bsc#1225745).</li>
<li>CVE-2024-36912: Drivers: hv: vmbus: Track decrypted status in
vmbus_gpadl (bsc#1225752).</li>
<li>CVE-2024-36913: Drivers: hv: vmbus: Leak pages if
set_memory_encrypted() fails (bsc#1225753).</li>
<li>CVE-2024-36914: drm/amd/display: Skip on writeback when it&#x27;s
not applicable (bsc#1225757).</li>
<li>CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing
resources after upload (bsc#1225767).</li>
<li>CVE-2024-36923: fs/9p: fix uninitialized values during inode evict
(bsc#1225815).</li>
<li>CVE-2024-36939: nfs: Handle error of rpc_proc_register() in
nfs_net_init() (bsc#1225838).</li>
<li>CVE-2024-36946: phonet: fix rtm_phonet_notify() skb allocation
(bsc#1225851).</li>
<li>CVE-2024-36974: net/sched: taprio: always validate
TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519).</li>
<li>CVE-2024-38555: net/mlx5: Discard command completions in internal
error (bsc#1226607).</li>
<li>CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple
for ICMPv6 (bsc#1226783).</li>
<li>CVE-2024-38570: gfs2: Fix potential glock use-after-free on unmount
(bsc#1226775).</li>
<li>CVE-2024-38586: r8169: Fix possible ring buffer corruption on
fragmented Tx packets (bsc#1226750).</li>
<li>CVE-2024-38598: md: fix resync softlockup when bitmap size is less
than array size (bsc#1226757).</li>
<li>CVE-2024-38628: usb: gadget: u_audio: Fix race condition use of
controls after free during gadget unbind (bsc#1226911).</li>
<li>CVE-2024-39276: ext4: fix mb_cache_entry&#x27;s e_refcnt leak in
ext4_xattr_block_cache_find() (bsc#1226993).</li>
<li>CVE-2024-39371: io_uring: check for non-NULL file pointer in
io_file_can_poll() (bsc#1226990).</li>
<li>CVE-2024-39463: 9p: add missing locking around taking dentry fid list
(bsc#1227090).</li>
<li>CVE-2024-39472: xfs: fix log recovery buffer allocation for the
legacy h_size fixup (bsc#1227432).</li>
<li>CVE-2024-39482: bcache: fix variable length array abuse in btree_iter
(bsc#1227447).</li>
<li>CVE-2024-39487: bonding: Fix out-of-bounds read in
bond_option_arp_ip_targets_set() (bsc#1227573)</li>
<li>CVE-2024-39490: ipv6: sr: fix missing sk_buff release in
seg6_input_core (bsc#1227626).</li>
<li>CVE-2024-39493: crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak
(bsc#1227620).</li>
<li>CVE-2024-39494: ima: Fix use-after-free on a dentry&#x27;s
dname.name (bsc#1227716).</li>
<li>CVE-2024-39497: drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE,
MAP_PRIVATE) (bsc#1227722)</li>
<li>CVE-2024-39502: ionic: fix use after netif_napi_del()
(bsc#1227755).</li>
<li>CVE-2024-39506: liquidio: Adjust a NULL pointer handling path in
lio_vf_rep_copy_packet (bsc#1227729).</li>
<li>CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent
scenario (bsc#1227730).</li>
<li>CVE-2024-39508: io_uring/io-wq: Use set_bit() and test_bit() at
worker-&gt;flags (bsc#1227732).</li>
<li>CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in
non-allocated memory (bsc#1227762).</li>
<li>CVE-2024-40906: net/mlx5: Always stop health timer during driver
removal (bsc#1227763).</li>
<li>CVE-2024-40908: bpf: Set run context for rawtp test_run callback
(bsc#1227783).</li>
<li>CVE-2024-40909: bpf: Fix a potential use-after-free in
bpf_link_free() (bsc#1227798).</li>
<li>CVE-2024-40919: bnxt_en: Adjust logging of firmware messages in case
of released token in __hwrm_send() (bsc#1227779).</li>
<li>CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation
failure (bsc#1227786).</li>
<li>CVE-2024-40931: mptcp: ensure snd_una is properly initialized on
connect (bsc#1227780).</li>
<li>CVE-2024-40935: cachefiles: flush all requests after setting
CACHEFILES_DEAD (bsc#1227797).</li>
<li>CVE-2024-40937: gve: Clear napi-&gt;skb before
dev_kfree_skb_any() (bsc#1227836).</li>
<li>CVE-2024-40940: net/mlx5: Fix tainted pointer delete is case of flow
rules creation fail (bsc#1227800).</li>
<li>CVE-2024-40943: ocfs2: fix races between hole punching and AIO+DIO
(bsc#1227849).</li>
<li>CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in
kvm_vcpu_on_spin() (bsc#1227806).</li>
<li>CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)</li>
<li>CVE-2024-40958: netns: Make get_net_ns() handle zero refcount net
(bsc#1227812).</li>
<li>CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in
xfrm6_get_saddr() (bsc#1227884).</li>
<li>CVE-2024-40960: ipv6: prevent possible NULL dereference in
rt6_probe() (bsc#1227813).</li>
<li>CVE-2024-40961: ipv6: prevent possible NULL deref in fib6_nh_init()
(bsc#1227814).</li>
<li>CVE-2024-40966: kABI: tty: add the option to have a tty reject a new
ldisc (bsc#1227886).</li>
<li>CVE-2024-40967: serial: imx: Introduce timeout when waiting on
transmitter empty (bsc#1227891).</li>
<li>CVE-2024-40970: Avoid hw_desc array overrun in dw-axi-dmac
(bsc#1227899).</li>
<li>CVE-2024-40972: ext4: fold quota accounting into
ext4_xattr_inode_lookup_create() (bsc#1227910).</li>
<li>CVE-2024-40977: wifi: mt76: mt7921s: fix potential hung tasks during
chip recovery (bsc#1227950).</li>
<li>CVE-2024-40982: ssb: Fix potential NULL pointer dereference in
ssb_device_uevent() (bsc#1227865).</li>
<li>CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor
region on teardown (bsc#1227823).</li>
<li>CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store
(bsc#1227829).</li>
<li>CVE-2024-40998: ext4: fix uninitialized ratelimit_state-&gt;lock
access in __ext4_fill_super() (bsc#1227866).</li>
<li>CVE-2024-40999: net: ena: Add validation for completion descriptors
consistency (bsc#1227913).</li>
<li>CVE-2024-41006: netrom: Fix a memory leak in nr_heartbeat_expiry()
(bsc#1227862).</li>
<li>CVE-2024-41009: selftests/bpf: Add more ring buffer test coverage
(bsc#1228020).</li>
<li>CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race
is detected (bsc#1228247).</li>
<li>CVE-2024-41013: xfs: do not walk off the end of a directory data
block (bsc#1228405).</li>
<li>CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data
(bsc#1228408).</li>
<li>CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry()
(bsc#1228409).</li>
<li>CVE-2024-41016: ocfs2: add bounds checking to
ocfs2_xattr_find_entry() (bsc#1228410).</li>
<li>CVE-2024-41017: jfs: do not walk off the end of ealist
(bsc#1228403).</li>
<li>CVE-2024-41040: net/sched: Fix UAF when resolving a clash
(bsc#1228518)</li>
<li>CVE-2024-41041: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port()
(bsc#1228520)</li>
<li>CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed
packets (bsc#1228530).</li>
<li>CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg
(bsc#1228565)</li>
<li>CVE-2024-41057: cachefiles: fix slab-use-after-free in
cachefiles_withdraw_cookie() (bsc#1228462).</li>
<li>CVE-2024-41058: cachefiles: fix slab-use-after-free in
fscache_withdraw_volume() (bsc#1228459).</li>
<li>CVE-2024-41059: hfsplus: fix uninit-value in copy_name
(bsc#1228561).</li>
<li>CVE-2024-41063: Bluetooth: hci_core: cancel all works upon
hci_unregister_dev() (bsc#1228580)</li>
<li>CVE-2024-41064: powerpc/eeh: avoid possible crash when
edev-&gt;pdev changes (bsc#1228599).</li>
<li>CVE-2024-41066: ibmvnic: Add tx check to prevent skb leak
(bsc#1228640).</li>
<li>CVE-2024-41069: ASoC: topology: Fix route memory corruption
(bsc#1228644).</li>
<li>CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in
kvm_spapr_tce_attach_iommu_group() (bsc#1228581).</li>
<li>CVE-2024-41071: wifi: mac80211: Avoid address calculations via out of
bounds array indexing (bsc#1228625).</li>
<li>CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota
disable failure (bsc#1228655).</li>
<li>CVE-2024-41081: ila: block BH in ila_output()
(bsc#1228617)</li>
<li>CVE-2024-41090: tap: add missing verification for short frame
(bsc#1228328).</li>
<li>CVE-2024-41091: tun: add missing verification for short frame
(bsc#1228327).</li>
<li>CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE
on store to data registers (bsc#1228470)</li>
<li>CVE-2024-42079: gfs2: Fix NULL pointer dereference in gfs2_log_flush
(bsc#1228672).</li>
<li>CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on
stack (bsc#1228680).</li>
<li>CVE-2024-42096: x86: stop playing stack games in profile_pc()
(bsc#1228633).</li>
<li>CVE-2024-42122: drm/amd/display: Add NULL pointer check for kzalloc
(bsc#1228591)</li>
<li>CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible
(bsc#1228705)</li>
<li>CVE-2024-42145: IB/core: Implement a limit on UMAD receive List
(bsc#1228743)</li>
<li>CVE-2024-42161: bpf: Avoid uninitialized value in
BPF_CORE_READ_BITFIELD (bsc#1228756).</li>
<li>CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list
(bsc#1228723)</li>
<li>CVE-2024-42230: powerpc/pseries: Fix scv instruction crash with kexec
(bsc#1194869).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>ACPI: EC: Abort address space access upon error
(stable-fixes).</li>
<li>ACPI: EC: Avoid returning AE_OK on errors in address space handler
(stable-fixes).</li>
<li>ACPI: processor_idle: Fix invalid comparison with insertion sort for
latency (git-fixes).</li>
<li>ACPI: video: Add backlight=native quirk for Lenovo Slim 7 16ARH7
(stable-fixes).</li>
<li>ACPI: x86: Force StorageD3Enable on more products
(stable-fixes).</li>
<li>ACPI: x86: utils: Add Picasso to the list for forcing StorageD3Enable
(stable-fixes).</li>
<li>ALSA: dmaengine_pcm: terminate dmaengine before synchronize
(stable-fixes).</li>
<li>ALSA: dmaengine: Synchronize dma channel after drop()
(stable-fixes).</li>
<li>ALSA: emux: improve patch ioctl data validation
(stable-fixes).</li>
<li>ALSA: hda: conexant: Fix headset auto detect fail in the polling mode
(git-fixes).</li>
<li>ALSA: hda/realtek: Add more codec ID to no shutup pins list
(stable-fixes).</li>
<li>ALSA: hda/realtek: add quirk for Clevo V5[46]0TU
(stable-fixes).</li>
<li>ALSA: hda/realtek: Enable headset mic of JP-IK LEAP W502 with ALC897
(stable-fixes).</li>
<li>ALSA: hda/realtek: Enable headset mic on Positivo SU C1400
(stable-fixes).</li>
<li>ALSA: hda/realtek: Enable Mute LED on HP 250 G7
(stable-fixes).</li>
<li>ALSA: hda/realtek: fix mute/micmute LEDs do not work for EliteBook
645/665 G11 (stable-fixes).</li>
<li>ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book Pro
360 (stable-fixes).</li>
<li>ALSA: hda/realtek: Limit mic boost on VAIO PRO PX
(stable-fixes).</li>
<li>ALSA: hda/relatek: Enable Mute LED on HP Laptop 15-gw0xxx
(stable-fixes).</li>
<li>ALSA: pcm_dmaengine: Do not synchronize DMA channel when DMA is
paused (git-fixes).</li>
<li>ALSA: usb-audio: Add a quirk for Sonix HD USB Camera
(stable-fixes).</li>
<li>ALSA: usb-audio: Correct surround channels in UAC1 channel map
(git-fixes).</li>
<li>ALSA: usb-audio: Fix microphone sound on HD webcam
(stable-fixes).</li>
<li>ALSA: usb-audio: Move HD Webcam quirk to the right place
(git-fixes).</li>
<li>arm64: dts: allwinner: Pine H64: correctly remove reg_gmac_3v3
(git-fixes)</li>
<li>arm64: dts: hi3798cv200: fix the size of GICR (git-fixes)</li>
<li>arm64: dts: imx8qm-mek: fix gpio number for reg_usdhc2_vmmc
(git-fixes)</li>
<li>arm64: dts: microchip: sparx5: fix mdio reg (git-fixes)</li>
<li>arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK
(git-fixes)</li>
<li>arm64: dts: rockchip: Add sound-dai-cells for RK3368
(git-fixes)</li>
<li>arm64: dts: rockchip: fix PMIC interrupt pin on ROCK Pi E
(git-fixes)</li>
<li>arm64/io: add constant-argument check (bsc#1226502
git-fixes)</li>
<li>arm64/io: Provide a WC friendly __iowriteXX_copy()
(bsc#1226502)</li>
<li>arm64: tegra: Correct Tegra132 I2C alias (git-fixes)</li>
<li>ASoC: amd: Adjust error handling in case of absent codec device
(git-fixes).</li>
<li>ASoC: max98088: Check for clk_prepare_enable() error
(git-fixes).</li>
<li>ASoC: ti: davinci-mcasp: Set min period size using FIFO config
(stable-fixes).</li>
<li>ASoC: ti: omap-hdmi: Fix too long driver name
(stable-fixes).</li>
<li>batman-adv: bypass empty buckets in batadv_purge_orig_ref()
(stable-fixes).</li>
<li>blk-cgroup: dropping parent refcount after pd_free_fn() is done
(bsc#1224573).</li>
<li>block: do not add partitions if GD_SUPPRESS_PART_SCAN is set
(bsc#1227162).</li>
<li>block, loop: support partitions without scanning
(bsc#1227162).</li>
<li>Bluetooth: ath3k: Fix multiple issues reported by checkpatch.pl
(stable-fixes).</li>
<li>Bluetooth: btqca: use le32_to_cpu for ver.soc_id
(stable-fixes).</li>
<li>Bluetooth: hci_core: cancel all works upon hci_unregister_dev()
(stable-fixes).</li>
<li>Bluetooth: hci_qca: mark OF related data as maybe unused
(stable-fixes).</li>
<li>Bluetooth: hci_sync: Fix suspending with wrong filter policy
(git-fixes).</li>
<li>Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm
reboot (git-fixes).</li>
<li>bnxt_re: Fix imm_data endianness (git-fixes)</li>
<li>bpf: aggressively forget precise markings during state checkpointing
(bsc#1225903).</li>
<li>bpf: allow precision tracking for programs with subprogs
(bsc#1225903).</li>
<li>bpf: check bpf_func_state-&gt;callback_depth when pruning states
(bsc#1225903).</li>
<li>bpf: clean up visit_insn()&#x27;s instruction processing
(bsc#1225903).</li>
<li>bpf: correct loop detection for iterators convergence
(bsc#1225903).</li>
<li>bpf: encapsulate precision backtracking bookkeeping
(bsc#1225903).</li>
<li>bpf: ensure state checkpointing at iter_next() call sites
(bsc#1225903).</li>
<li>bpf: exact states comparison for iterator convergence checks
(bsc#1225903).</li>
<li>bpf: extract __check_reg_arg() utility function
(bsc#1225903).</li>
<li>bpf: extract same_callsites() as utility function
(bsc#1225903).</li>
<li>bpf: extract setup_func_entry() utility function
(bsc#1225903).</li>
<li>bpf: fix calculation of subseq_idx during precision backtracking
(bsc#1225903).</li>
<li>bpf: fix mark_all_scalars_precise use in mark_chain_precision
(bsc#1225903).</li>
<li>bpf: Fix memory leaks in __check_func_call (bsc#1225903).</li>
<li>bpf: fix propagate_precision() logic for inner frames
(bsc#1225903).</li>
<li>bpf: fix regs_exact() logic in regsafe() to remap IDs correctly
(bsc#1225903).</li>
<li>bpf: Fix to preserve reg parent/live fields when copying range info
(bsc#1225903).</li>
<li>bpf: generalize MAYBE_NULL vs non-MAYBE_NULL rule
(bsc#1225903).</li>
<li>bpf: improve precision backtrack logging (bsc#1225903).</li>
<li>bpf: Improve verifier u32 scalar equality checking
(bsc#1225903).</li>
<li>bpf: keep track of max number of bpf_loop callback iterations
(bsc#1225903).</li>
<li>bpf: maintain bitmasks across all active frames in
__mark_chain_precision (bsc#1225903).</li>
<li>bpf: mark relevant stack slots scratched for register read
instructions (bsc#1225903).</li>
<li>bpf: move explored_state() closer to the beginning of verifier.c
(bsc#1225903).</li>
<li>bpf: perform byte-by-byte comparison only when necessary in regsafe()
(bsc#1225903).</li>
<li>bpf: print full verifier states on infinite loop detection
(bsc#1225903).</li>
<li>bpf: regsafe() must not skip check_ids() (bsc#1225903).</li>
<li>bpf: reject non-exact register type matches in regsafe()
(bsc#1225903).</li>
<li>bpf: Remove unused insn_cnt argument from visit_[func_call_]insn()
(bsc#1225903).</li>
<li>bpf: reorganize struct bpf_reg_state fields (bsc#1225903).</li>
<li>bpf: Skip invalid kfunc call in backtrack_insn
(bsc#1225903).</li>
<li>bpf: states_equal() must build idmap for all function frames
(bsc#1225903).</li>
<li>bpf: stop setting precise in current state (bsc#1225903).</li>
<li>bpf: support precision propagation in the presence of subprogs
(bsc#1225903).</li>
<li>bpf: take into account liveness when propagating precision
(bsc#1225903).</li>
<li>bpf: teach refsafe() to take into account ID remapping
(bsc#1225903).</li>
<li>bpf: unconditionally reset backtrack_state masks on global func exit
(bsc#1225903).</li>
<li>bpf: use check_ids() for active_lock comparison
(bsc#1225903).</li>
<li>bpf: Use scalar ids in mark_chain_precision()
(bsc#1225903).</li>
<li>bpf: verify callbacks as if they are called unknown number of times
(bsc#1225903).</li>
<li>bpf: Verify scalar ids mapping in regsafe() using check_ids()
(bsc#1225903).</li>
<li>bpf: widening for callback iterators (bsc#1225903).</li>
<li>btrfs: add device major-minor info in the struct btrfs_device
(bsc#1227162).</li>
<li>btrfs: harden identification of a stale device
(bsc#1227162).</li>
<li>btrfs: match stale devices by dev_t (bsc#1227162).</li>
<li>btrfs: remove the cross file system checks from remap
(bsc#1227157).</li>
<li>btrfs: use dev_t to match device in device_matched
(bsc#1227162).</li>
<li>btrfs: validate device maj:min during open (bsc#1227162).</li>
<li>bytcr_rt5640 : inverse jack detect for Archos 101 cesium
(stable-fixes).</li>
<li>cachefiles: add output string to cachefiles_obj_[get|put]_ondemand_fd
(git-fixes).</li>
<li>can: kvaser_usb: Explicitly initialize family in leafimx driver_info
struct (git-fixes).</li>
<li>can: kvaser_usb: fix return value for hif_usb_send_regout
(stable-fixes).</li>
<li>ceph: fix incorrect kmalloc size of pagevec mempool
(bsc#1228418).</li>
<li>cgroup/cpuset: Prevent UAF in proc_cpuset_show()
(bsc#1228801).</li>
<li>crypto: aead,cipher - zeroize key buffer after use
(stable-fixes).</li>
<li>crypto: ecdh - explicitly zeroize private_key
(stable-fixes).</li>
<li>crypto: ecdsa - Fix the public key format description
(git-fixes).</li>
<li>crypto: hisilicon/sec - Fix memory leak for sec resource release
(stable-fixes).</li>
<li>csky: ftrace: Drop duplicate implementation of
arch_check_ftrace_location() (git-fixes).</li>
<li>decompress_bunzip2: fix rare decompression failure
(git-fixes).</li>
<li>devres: Fix devm_krealloc() wasting memory (git-fixes).</li>
<li>devres: Fix memory leakage caused by driver API devm_free_percpu()
(git-fixes).</li>
<li>dma: fix call order in dmam_free_coherent (git-fixes).</li>
<li>docs: crypto: async-tx-api: fix broken code example
(git-fixes).</li>
<li>docs: Fix formatting of literal sections in fanotify docs
(stable-fixes).</li>
<li>drm/amd/amdgpu: Fix style errors in amdgpu_drv.c &amp;
amdgpu_device.c (stable-fixes).</li>
<li>drm/amd/display: Account for cursor prefetch BW in DML1 mode support
(stable-fixes).</li>
<li>drm/amd/display: Check for NULL pointer (stable-fixes).</li>
<li>drm/amd/display: Check index msg_id before read or write
(stable-fixes).</li>
<li>drm/amd/display: Check pipe offset before setting vblank
(stable-fixes).</li>
<li>drm/amd/display: Skip finding free audio for unknown engine_id
(stable-fixes).</li>
<li>drm/amdgpu/atomfirmware: fix parsing of vram_info
(stable-fixes).</li>
<li>drm/amdgpu/atomfirmware: silence UBSAN warning
(stable-fixes).</li>
<li>drm/amdgpu: avoid using null object of framebuffer
(stable-fixes).</li>
<li>drm/amdgpu: Check if NBIO funcs are NULL in amdgpu_device_baco_exit
(git-fixes).</li>
<li>drm/amdgpu: Fix pci state save during mode-1 reset
(git-fixes).</li>
<li>drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()
(git-fixes).</li>
<li>drm/amdgpu: fix uninitialized scalar variable warning
(stable-fixes).</li>
<li>drm/amdgpu: Fix uninitialized variable warnings
(stable-fixes).</li>
<li>drm/amdgpu: Initialize timestamp for some legacy SOCs
(stable-fixes).</li>
<li>drm/amdgpu: Remove GC HW IP 9.3.0 from noretry=1
(git-fixes).</li>
<li>drm/amd/pm: Fix aldebaran pcie speed reporting
(git-fixes).</li>
<li>drm/amd/pm: remove logically dead code for renoir
(git-fixes).</li>
<li>drm/dp_mst: Fix all mstb marked as not probed after suspend/resume
(git-fixes).</li>
<li>drm/etnaviv: do not block scheduler when GPU is still active
(stable-fixes).</li>
<li>drm/etnaviv: fix DMA direction handling for cached RW buffers
(git-fixes).</li>
<li>drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes
(git-fixes).</li>
<li>drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modes
(git-fixes).</li>
<li>drm/i915/gt: Do not consider preemption during execlists_dequeue for
gen8 (git-fixes).</li>
<li>drm/lima: fix shared irq handling on driver remove
(stable-fixes).</li>
<li>drm/lima: Mark simple_ondemand governor as softdep
(git-fixes).</li>
<li>drm/mediatek: Add OVL compatible name for MT8195
(git-fixes).</li>
<li>drm/meson: fix canvas release in bind function
(git-fixes).</li>
<li>drm/mgag200: Bind I2C lifetime to DRM device (git-fixes).</li>
<li>drm/mgag200: Set DDC timeout in milliseconds (git-fixes).</li>
<li>drm/mipi-dsi: Fix mipi_dsi_dcs_write_seq() macro definition format
(stable-fixes).</li>
<li>drm/mipi-dsi: Fix theoretical int overflow in
mipi_dsi_dcs_write_seq() (git-fixes).</li>
<li>drm/msm/dpu: drop validity checks for clear_pending_flush() ctl op
(git-fixes).</li>
<li>drm/msm/mdp5: Remove MDP_CAP_SRC_SPLIT from msm8x53_config
(git-fixes).</li>
<li>drm/nouveau/dispnv04: fix null pointer dereference in
nv17_tv_get_hd_modes (stable-fixes).</li>
<li>drm/nouveau/dispnv04: fix null pointer dereference in
nv17_tv_get_ld_modes (stable-fixes).</li>
<li>drm/nouveau: fix null pointer dereference in
nouveau_connector_get_modes (git-fixes).</li>
<li>drm/nouveau: prime: fix refcount underflow (git-fixes).</li>
<li>drm/panel: boe-tv101wum-nl6: Check for errors on the NOP in prepare()
(git-fixes).</li>
<li>drm/panel: boe-tv101wum-nl6: If prepare fails, disable GPIO before
regulators (git-fixes).</li>
<li>drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that
sleep (stable-fixes).</li>
<li>drm: panel-orientation-quirks: Add quirk for Valve Galileo
(stable-fixes).</li>
<li>drm/panfrost: Mark simple_ondemand governor as softdep
(git-fixes).</li>
<li>drm/qxl: Add check for drm_cvt_mode (git-fixes).</li>
<li>drm/radeon: check bo_va-&gt;bo is non-NULL before using it
(stable-fixes).</li>
<li>drm/radeon/radeon_display: Decrease the size of allocated memory
(stable-fixes).</li>
<li>drm/vmwgfx: Fix a deadlock in dma buf fence polling
(git-fixes).</li>
<li>drm/vmwgfx: Fix missing HYPERVISOR_GUEST dependency
(stable-fixes).</li>
<li>drm/vmwgfx: Fix overlay when using Screen Targets
(git-fixes).</li>
<li>eeprom: digsy_mtc: Fix 93xx46 driver probe failure
(git-fixes).</li>
<li>exfat: check if cluster num is valid (git-fixes).</li>
<li>exfat: simplify is_valid_cluster() (git-fixes).</li>
<li>filelock: add a new locks_inode_context accessor function
(git-fixes).</li>
<li>firmware: cs_dsp: Fix overflow checking of wmfw header
(git-fixes).</li>
<li>firmware: cs_dsp: Prevent buffer overrun when processing V2 alg
headers (git-fixes).</li>
<li>firmware: cs_dsp: Return error if block header overflows file
(git-fixes).</li>
<li>firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files
(git-fixes).</li>
<li>firmware: cs_dsp: Validate payload length before processing block
(git-fixes).</li>
<li>firmware: dmi: Stop decoding on broken entry
(stable-fixes).</li>
<li>firmware: turris-mox-rwtm: Do not complete if there are no waiters
(git-fixes).</li>
<li>firmware: turris-mox-rwtm: Fix checking return value of
wait_for_completion_timeout() (git-fixes).</li>
<li>firmware: turris-mox-rwtm: Initialize completion before mailbox
(git-fixes).</li>
<li>fix build warning</li>
<li>fs: allow cross-vfsmount reflink/dedupe (bsc#1227157).</li>
<li>ftrace: Fix possible use-after-free issue in ftrace_location()
(git-fixes).</li>
<li>fuse: verify {g,u}id mount options correctly
(bsc#1228191).</li>
<li>gpio: mc33880: Convert comma to semicolon (git-fixes).</li>
<li>hfsplus: fix to avoid false alarm of circular locking
(git-fixes).</li>
<li>hfsplus: fix uninit-value in copy_name (git-fixes).</li>
<li>HID: Add quirk for Logitech Casa touchpad (stable-fixes).</li>
<li>HID: wacom: Modify pen IDs (git-fixes).</li>
<li>hpet: Support 32-bit userspace (git-fixes).</li>
<li>hwmon: (adt7475) Fix default duty on fan is disabled
(git-fixes).</li>
<li>hwmon: (max6697) Fix swapped temp{1,8} critical alarms
(git-fixes).</li>
<li>hwmon: (max6697) Fix underflow when writing limit attributes
(git-fixes).</li>
<li>i2c: mark HostNotify target address as used (git-fixes).</li>
<li>i2c: rcar: bring hardware to known state when probing
(git-fixes).</li>
<li>i2c: tegra: Fix failure during probe deferral cleanup
(git-fixes)</li>
<li>i2c: tegra: Share same DMA channel for RX and TX
(bsc#1227661)</li>
<li>i2c: testunit: avoid re-issued work after read message
(git-fixes).</li>
<li>i2c: testunit: correct Kconfig description (git-fixes).</li>
<li>Input: elan_i2c - do not leave interrupt disabled on suspend failure
(git-fixes).</li>
<li>Input: elantech - fix touchpad state on resume for Lenovo N24
(stable-fixes).</li>
<li>Input: ff-core - prefer struct_size over open coded arithmetic
(stable-fixes).</li>
<li>Input: qt1050 - handle CHIP_ID reading error (git-fixes).</li>
<li>Input: silead - Always support 10 fingers (stable-fixes).</li>
<li>intel_th: pci: Add Granite Rapids SOC support
(stable-fixes).</li>
<li>intel_th: pci: Add Granite Rapids support (stable-fixes).</li>
<li>intel_th: pci: Add Lunar Lake support (stable-fixes).</li>
<li>intel_th: pci: Add Meteor Lake-S support (stable-fixes).</li>
<li>intel_th: pci: Add Sapphire Rapids SOC support
(stable-fixes).</li>
<li>iommu/arm-smmu-v3: Free MSIs in case of ENOMEM
(git-fixes).</li>
<li>ionic: clean interrupt before enabling queue to avoid credit race
(git-fixes).</li>
<li>jffs2: Fix potential illegal address access in jffs2_free_inode
(git-fixes).</li>
<li>jfs: Fix array-index-out-of-bounds in diFree (git-fixes).</li>
<li>jfs: xattr: fix buffer overflow for invalid xattr
(bsc#1227383).</li>
<li>kABI: bpf: bpf_reg_state reorganization kABI workaround
(bsc#1225903).</li>
<li>kABI: bpf: callback fixes kABI workaround (bsc#1225903).</li>
<li>kABI: bpf: struct bpf_{idmap,idset} kABI workaround
(bsc#1225903).</li>
<li>kABI: bpf: tmp_str_buf kABI workaround (bsc#1225903).</li>
<li>kABI: rtas: Workaround false positive due to lost definition
(bsc#1227487).</li>
<li>kabi/severities: ignore kABI for FireWire sound local symbols
(bsc#1208783)</li>
<li>kabi/severities: Ignore tpm_tis_core_init (bsc#1082555).</li>
<li>kabi/severity: add nvme common code The nvme common code is also
allowed to change the data structures, there are only internal users.</li>
<li>kabi: Use __iowriteXX_copy_inlined for in-kernel modules
(bsc#1226502)</li>
<li>kernel-binary: vdso: Own module_dir</li>
<li>kernel/sched: Remove dl_boosted flag comment (git fixes
(sched)).</li>
<li>knfsd: LOOKUP can return an illegal error value
(git-fixes).</li>
<li>kobject_uevent: Fix OOB access within zap_modalias_env()
(git-fixes).</li>
<li>kprobes: Make arch_check_ftrace_location static
(git-fixes).</li>
<li>KVM: nVMX: Clear EXIT_QUALIFICATION when injecting an EPT Misconfig
(git-fixes).</li>
<li>KVM: PPC: Book3S HV: Fix &quot;rm_exit&quot; entry in debugfs
timings (bsc#1194869).</li>
<li>KVM: PPC: Book3S HV: Fix the set_one_reg for MMCR3
(bsc#1194869).</li>
<li>KVM: PPC: Book3S HV Nested: L2 LPCR should inherit L1 LPES setting
(bsc#1194869).</li>
<li>KVM: PPC: Book3S HV: remove extraneous asterisk from
rm_host_ipi_action() comment (bsc#1194869).</li>
<li>KVM: PPC: Book3S: Suppress failed alloc warning in
H_COPY_TOFROM_GUEST (bsc#1194869).</li>
<li>KVM: PPC: Book3S: Suppress warnings when allocating too big memory
slots (bsc#1194869).</li>
<li>KVM: s390: fix LPSWEY handling (bsc#1227635 git-fixes).</li>
<li>KVM: SVM: Process ICR on AVIC IPI delivery failure due to invalid
target (git-fixes).</li>
<li>KVM: VMX: Report up-to-date exit qualification to userspace
(git-fixes).</li>
<li>KVM: x86: Add IBPB_BRTYPE support (bsc#1228079).</li>
<li>KVM: x86: Always sync PIR to IRR prior to scanning I/O APIC routes
(git-fixes).</li>
<li>KVM: x86: Bail from kvm_recalculate_phys_map() if x2APIC ID is
out-of-bounds (git-fixes).</li>
<li>KVM: x86: Disable APIC logical map if logical ID covers multiple MDAs
(git-fixes).</li>
<li>KVM: x86: Disable APIC logical map if vCPUs are aliased in logical
mode (git-fixes).</li>
<li>KVM: x86: Do not advertise guest.MAXPHYADDR as host.MAXPHYADDR in
CPUID (git-fixes).</li>
<li>KVM: x86: Explicitly skip optimized logical map setup if
vCPU&#x27;s LDR==0 (git-fixes).</li>
<li>KVM: x86: Explicitly track all possibilities for APIC map&#x27;s
logical modes (git-fixes).</li>
<li>KVM: x86: Fix broken debugregs ABI for 32 bit kernels
(git-fixes).</li>
<li>KVM: x86: Fix KVM_GET_MSRS stack info leak (git-fixes).</li>
<li>KVM: x86: Honor architectural behavior for aliased 8-bit APIC IDs
(git-fixes).</li>
<li>KVM: x86: Purge &quot;highest ISR&quot; cache when updating
APICv state (git-fixes).</li>
<li>KVM: x86: Save/restore all NMIs when multiple NMIs are pending
(git-fixes).</li>
<li>KVM: x86: Skip redundant x2APIC logical mode optimized cluster setup
(git-fixes).</li>
<li>leds: ss4200: Convert PCIBIOS_* return codes to errnos
(git-fixes).</li>
<li>leds: triggers: Flush pending brightness before activating trigger
(git-fixes).</li>
<li>leds: trigger: Unregister sysfs attributes before calling
deactivate() (git-fixes).</li>
<li>libceph: fix race between delayed_work() and ceph_monc_stop()
(bsc#1228190).</li>
<li>lib: objagg: Fix general protection fault (git-fixes).</li>
<li>lib: objagg: Fix spelling (git-fixes).</li>
<li>lib: test_objagg: Fix spelling (git-fixes).</li>
<li>lockd: set missing fl_flags field when retrieving args
(git-fixes).</li>
<li>lockd: use locks_inode_context helper (git-fixes).</li>
<li>Make AMD_HSMP=m and mark it unsupported in supported.conf
(jsc#PED-8582)</li>
<li>media: dvb: as102-fe: Fix as10x_register_addr packing
(stable-fixes).</li>
<li>media: dvbdev: Initialize sbuf (stable-fixes).</li>
<li>media: dvb-frontends: tda10048: Fix integer overflow
(stable-fixes).</li>
<li>media: dvb-frontends: tda18271c2dd: Remove casting during div
(stable-fixes).</li>
<li>media: dvb-usb: dib0700_devices: Add missing release_firmware()
(stable-fixes).</li>
<li>media: dvb-usb: Fix unexpected infinite loop in
dvb_usb_read_remote_control() (git-fixes).</li>
<li>media: dw2102: Do not translate i2c read into write
(stable-fixes).</li>
<li>media: dw2102: fix a potential buffer overflow
(git-fixes).</li>
<li>media: imon: Fix race getting ictx-&gt;lock
(git-fixes).</li>
<li>media: s2255: Use refcount_t instead of atomic_t for num_channels
(stable-fixes).</li>
<li>media: uvcvideo: Fix integer overflow calculating timestamp
(git-fixes).</li>
<li>media: uvcvideo: Override default flags (git-fixes).</li>
<li>media: venus: fix use after free in vdec_close
(git-fixes).</li>
<li>media: venus: flush all buffers in output plane streamoff
(git-fixes).</li>
<li>mei: demote client disconnect warning on suspend to debug
(stable-fixes).</li>
<li>mfd: omap-usb-tll: Use struct_size to allocate tll
(git-fixes).</li>
<li>mtd: partitions: redboot: Added conversion of operands to a larger
type (stable-fixes).</li>
<li>net/dcb: check for detached device before executing callbacks
(bsc#1215587).</li>
<li>netfilter: conntrack: ignore overly delayed tcp packets
(bsc#1223180).</li>
<li>netfilter: conntrack: prepare tcp_in_window for ternary return value
(bsc#1223180).</li>
<li>netfilter: conntrack: remove pr_debug callsites from tcp tracker
(bsc#1223180).</li>
<li>netfilter: conntrack: work around exceeded receive window
(bsc#1223180).</li>
<li>netfs, fscache: export fscache_put_volume() and add
fscache_try_get_volume() (bsc#1228459 bsc#1228462).</li>
<li>net: mana: Fix possible double free in error handling path
(git-fixes).</li>
<li>net: mana: Fix the extra HZ in mana_hwc_send_request
(git-fixes).</li>
<li>net: usb: qmi_wwan: add Telit FN912 compositions
(git-fixes).</li>
<li>net: usb: sr9700: fix uninitialized variable use in sr_mdio_read
(git-fixes).</li>
<li>nfc/nci: Add the inconsistency check between the input data length
and count (stable-fixes).</li>
<li>NFSD: Add an nfsd_file_fsync tracepoint (git-fixes).</li>
<li>NFSD: Add an NFSD_FILE_GC flag to enable nfsd_file garbage collection
(git-fixes).</li>
<li>nfsd: Add errno mapping for EREMOTEIO (git-fixes).</li>
<li>NFSD: Add nfsd_file_lru_dispose_list() helper (git-fixes).</li>
<li>nfsd: add some comments to nfsd_file_do_acquire
(git-fixes).</li>
<li>nfsd: allow nfsd_file_get to sanely handle a NULL pointer
(git-fixes).</li>
<li>nfsd: allow reaping files still under writeback
(git-fixes).</li>
<li>NFSD: Avoid calling fh_drop_write() twice in do_nfsd_create()
(git-fixes).</li>
<li>NFSD: Clean up nfsd3_proc_create() (git-fixes).</li>
<li>nfsd: Clean up nfsd_file_put() (git-fixes).</li>
<li>NFSD: Clean up nfsd_open_verified() (git-fixes).</li>
<li>NFSD: Clean up unused code after rhashtable conversion
(git-fixes).</li>
<li>NFSD: Convert filecache to rhltable (git-fixes).</li>
<li>NFSD: Convert the filecache to use rhashtable (git-fixes).</li>
<li>NFSD: De-duplicate hash bucket indexing (git-fixes).</li>
<li>nfsd: do not free files unconditionally in __nfsd_file_cache_purge
(git-fixes).</li>
<li>nfsd: do not fsync nfsd_files on last close (git-fixes).</li>
<li>nfsd: do not hand out delegation on setuid files being opened for
write (git-fixes).</li>
<li>nfsd: do not kill nfsd_files because of lease break error
(git-fixes).</li>
<li>nfsd: Do not leave work of closing files to a work queue
(bsc#1228140).</li>
<li>nfsd: do not take/put an extra reference when putting a file
(git-fixes).</li>
<li>NFSD enforce filehandle check for source file in COPY
(git-fixes).</li>
<li>NFSD: Ensure nf_inode is never dereferenced (git-fixes).</li>
<li>nfsd: fix handling of cached open files in nfsd4_open codepath
(git-fixes).</li>
<li>NFSD: Fix licensing header in filecache.c (git-fixes).</li>
<li>nfsd: fix net-namespace logic in __nfsd_file_cache_purge
(git-fixes).</li>
<li>nfsd: fix nfsd_file_unhash_and_dispose (git-fixes).</li>
<li>NFSD: Fix potential use-after-free in nfsd_file_put()
(git-fixes).</li>
<li>NFSD: Fix problem of COMMIT and NFS4ERR_DELAY in infinite loop
(git-fixes).</li>
<li>NFSD: Fix the filecache LRU shrinker (git-fixes).</li>
<li>nfsd: fix up the filecache laundrette scheduling
(git-fixes).</li>
<li>nfsd: fix use-after-free in nfsd_file_do_acquire tracepoint
(git-fixes).</li>
<li>NFSD: Flesh out a documenting comment for filecache.c
(git-fixes).</li>
<li>NFSD: handle errors better in write_ports_addfd()
(git-fixes).</li>
<li>NFSD: Instantiate a struct file when creating a regular NFSv4 file
(git-fixes).</li>
<li>NFSD: Leave open files out of the filecache LRU
(git-fixes).</li>
<li>nfsd: map EBADF (git-fixes).</li>
<li>NFSD: Move nfsd_file_trace_alloc() tracepoint (git-fixes).</li>
<li>NFSD: nfsd_file_hash_remove can compute hashval
(git-fixes).</li>
<li>nfsd: NFSD_FILE_KEY_INODE only needs to find GC&#x27;ed entries
(git-fixes).</li>
<li>NFSD: nfsd_file_put() can sleep (git-fixes).</li>
<li>NFSD: nfsd_file_unhash can compute hashval from nf-&gt;nf_inode
(git-fixes).</li>
<li>NFSD: No longer record nf_hashval in the trace log
(git-fixes).</li>
<li>NFSD: Pass the target nfsd_file to nfsd_commit()
(git-fixes).</li>
<li>nfsd: put the export reference in nfsd4_verify_deleg_dentry
(git-fixes).</li>
<li>NFSD: Record number of flush calls (git-fixes).</li>
<li>NFSD: Refactor nfsd_create_setattr() (git-fixes).</li>
<li>NFSD: Refactor __nfsd_file_close_inode() (git-fixes).</li>
<li>NFSD: Refactor nfsd_file_gc() (git-fixes).</li>
<li>NFSD: Refactor nfsd_file_lru_scan() (git-fixes).</li>
<li>NFSD: Refactor NFSv3 CREATE (git-fixes).</li>
<li>NFSD: Refactor NFSv4 OPEN(CREATE) (git-fixes).</li>
<li>NFSD: Remove do_nfsd_create() (git-fixes).</li>
<li>NFSD: Remove lockdep assertion from unhash_and_release_locked()
(git-fixes).</li>
<li>NFSD: Remove nfsd_file::nf_hashval (git-fixes).</li>
<li>nfsd: remove the pages_flushed statistic from filecache
(git-fixes).</li>
<li>nfsd: reorganize filecache.c (git-fixes).</li>
<li>NFSD: Replace the &quot;init once&quot; mechanism
(git-fixes).</li>
<li>NFSD: Report average age of filecache items (git-fixes).</li>
<li>NFSD: Report count of calls to nfsd_file_acquire()
(git-fixes).</li>
<li>NFSD: Report count of freed filecache items (git-fixes).</li>
<li>NFSD: Report filecache LRU size (git-fixes).</li>
<li>NFSD: Report the number of items evicted by the LRU walk
(git-fixes).</li>
<li>nfsd: Retry once in nfsd_open on an -EOPENSTALE return
(git-fixes).</li>
<li>nfsd: rework hashtable handling in nfsd_do_file_acquire
(git-fixes).</li>
<li>nfsd: rework refcounting in filecache (git-fixes).</li>
<li>NFSD: Separate tracepoints for acquire and create
(git-fixes).</li>
<li>NFSD: Set up an rhashtable for the filecache (git-fixes).</li>
<li>nfsd: silence extraneous printk on nfsd.ko insertion
(git-fixes).</li>
<li>NFSD: simplify per-net file cache management (git-fixes).</li>
<li>nfsd: simplify test_bit return in NFSD_FILE_KEY_FULL comparator
(git-fixes).</li>
<li>nfsd: simplify the delayed disposal list code (git-fixes).</li>
<li>NFSD: Trace filecache LRU activity (git-fixes).</li>
<li>NFSD: Trace filecache opens (git-fixes).</li>
<li>NFSD: verify the opened dentry after setting a delegation
(git-fixes).</li>
<li>NFSD: WARN when freeing an item still linked via nf_lru
(git-fixes).</li>
<li>NFSD: Write verifier might go backwards (git-fixes).</li>
<li>NFSD: Zero counters when the filecache is re-initialized
(git-fixes).</li>
<li>NFS: Fix READ_PLUS when server does not support OP_READ_PLUS
(git-fixes).</li>
<li>nfs: fix undefined behavior in nfs_block_bits()
(git-fixes).</li>
<li>nfs: keep server info for remounts (git-fixes).</li>
<li>nfs: Leave pages in the pagecache if readpage failed
(git-fixes).</li>
<li>NFSv4: Fixup smatch warning for ambiguous return
(git-fixes).</li>
<li>NFSv4.x: by default serialize open/close operations (bsc#1223863
bsc#1227362)</li>
<li>nilfs2: add missing check for inode numbers on directory entries
(git-fixes).</li>
<li>nilfs2: add missing check for inode numbers on directory entries
(stable-fixes).</li>
<li>nilfs2: avoid undefined behavior in nilfs_cnt32_ge macro
(git-fixes).</li>
<li>nilfs2: convert persistent object allocator to use kmap_local
(git-fixes).</li>
<li>nilfs2: fix incorrect inode allocation from reserved inodes
(git-fixes).</li>
<li>nilfs2: fix inode number range checks (git-fixes).</li>
<li>nilfs2: fix inode number range checks (stable-fixes).</li>
<li>nvme: adjust multiples of NVME_CTRL_PAGE_SIZE in offset
(git-fixes).</li>
<li>nvme-auth: alloc nvme_dhchap_key as single buffer
(git-fixes).</li>
<li>nvme-auth: allow mixing of secret and hash lengths
(git-fixes).</li>
<li>nvme-auth: use transformed key size to create resp
(git-fixes).</li>
<li>nvme: avoid double free special payload (git-fixes).</li>
<li>nvme: ensure reset state check ordering (bsc#1215492).</li>
<li>nvme: fixup comment for nvme RDMA Provider Type
(git-fixes).</li>
<li>nvme-multipath: find NUMA path only for online numa-node
(git-fixes).</li>
<li>nvme-pci: add missing condition check for existence of mapped data
(git-fixes).</li>
<li>nvme-pci: Fix the instructions for disabling power management
(git-fixes).</li>
<li>nvmet: always initialize cqe.result (git-fixes).</li>
<li>nvmet-auth: fix nvmet_auth hash error handling
(git-fixes).</li>
<li>nvmet: fix a possible leak when destroy a ctrl during qp
establishment (git-fixes).</li>
<li>nvme: use ctrl state accessor (bsc#1215492).</li>
<li>ocfs2: fix DIO failure due to insufficient transaction credits
(bsc#1216834).</li>
<li>ocfs2: remove redundant assignment to variable free_space
(bsc#1228409).</li>
<li>ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()
(bsc#1228410).</li>
<li>orangefs: fix out-of-bounds fsid access (git-fixes).</li>
<li>PCI: Add PCI_ERROR_RESPONSE and related definitions
(stable-fixes).</li>
<li>PCI/DPC: Fix use-after-free on concurrent DPC and hot-removal
(git-fixes).</li>
<li>PCI: Extend ACS configurability (bsc#1228090).</li>
<li>PCI: Fix resource double counting on remove &amp; rescan
(git-fixes).</li>
<li>PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN
(git-fixes).</li>
<li>PCI: Introduce cleanup helpers for device reference counts and locks
(git-fixes).</li>
<li>PCI: Introduce cleanup helpers for device reference counts and locks
(stable-fixes).</li>
<li>PCI: keystone: Do not enable BAR 0 for AM654x (git-fixes).</li>
<li>PCI: keystone: Fix NULL pointer dereference in case of DT error in
ks_pcie_setup_rc_app_regs() (git-fixes).</li>
<li>PCI: keystone: Relocate ks_pcie_set/clear_dbi_mode()
(git-fixes).</li>
<li>PCI/PM: Avoid D3cold for HP Pavilion 17 PC/1972 PCIe Ports
(git-fixes).</li>
<li>PCI/PM: Avoid D3cold for HP Pavilion 17 PC/1972 PCIe Ports
(stable-fixes).</li>
<li>PCI: rockchip: Use GPIOD_OUT_LOW flag while requesting ep_gpio
(git-fixes).</li>
<li>PCI: tegra194: Set EP alignment restriction for inbound ATU
(git-fixes).</li>
<li>pinctrl: core: fix possible memory leak when pinctrl_enable() fails
(git-fixes).</li>
<li>pinctrl: freescale: mxs: Fix refcount of child
(git-fixes).</li>
<li>pinctrl: single: fix possible memory leak when pinctrl_enable() fails
(git-fixes).</li>
<li>pinctrl: ti: ti-iodelay: fix possible memory leak when
pinctrl_enable() fails (git-fixes).</li>
<li>platform/chrome: cros_ec_debugfs: fix wrong EC message version
(git-fixes).</li>
<li>platform/chrome: cros_ec_proto: Lock device when updating MKBP
version (git-fixes).</li>
<li>platform/x86: dell-smbios-base: Use sysfs_emit()
(stable-fixes).</li>
<li>platform/x86: dell-smbios: Fix wrong token data in sysfs
(git-fixes).</li>
<li>platform/x86: lg-laptop: Change ACPI device id
(stable-fixes).</li>
<li>platform/x86: lg-laptop: Remove LGEX0815 hotkey handling
(stable-fixes).</li>
<li>platform/x86: touchscreen_dmi: Add info for GlobalSpace SolT IVW
11.6&quot; tablet (stable-fixes).</li>
<li>platform/x86: touchscreen_dmi: Add info for the EZpad 6s Pro
(stable-fixes).</li>
<li>platform/x86: wireless-hotkey: Add support for LG Airplane Button
(stable-fixes).</li>
<li>powerpc/cpuidle: Set CPUIDLE_FLAG_POLLING for snooze state
(bsc#1227121 ltc#207129).</li>
<li>powerpc: fix a file leak in kvm_vcpu_ioctl_enable_cap()
(bsc#1194869).</li>
<li>powerpc/kasan: Disable address sanitization in kexec paths
(bsc#1194869).</li>
<li>powerpc/pseries: Fix scv instruction crash with kexec
(bsc#1194869).</li>
<li>powerpc/rtas: clean up includes (bsc#1227487).</li>
<li>powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas()
(bsc#1227487).</li>
<li>power: supply: cros_usbpd: provide ID table for avoiding fallback
match (stable-fixes).</li>
<li>pwm: stm32: Always do lazy disabling (git-fixes).</li>
<li>RDMA/cache: Release GID table even if leak is detected
(git-fixes)</li>
<li>RDMA/device: Return error earlier if port in not valid
(git-fixes)</li>
<li>RDMA/hns: Check atomic wr length (git-fixes)</li>
<li>RDMA/hns: Fix insufficient extend DB for VFs. (git-fixes)</li>
<li>RDMA/hns: Fix mbx timing out before CMD execution is completed
(git-fixes)</li>
<li>RDMA/hns: Fix missing pagesize and alignment check in FRMR
(git-fixes)</li>
<li>RDMA/hns: Fix shift-out-bounds when max_inline_data is 0
(git-fixes)</li>
<li>RDMA/hns: Fix soft lockup under heavy CEQE load
(git-fixes)</li>
<li>RDMA/hns: Fix undifined behavior caused by invalid max_sge
(git-fixes)</li>
<li>RDMA/hns: Fix unmatch exception handling when init eq table fails
(git-fixes)</li>
<li>RDMA/iwcm: Fix a use-after-free related to destroying CM IDs
(git-fixes)</li>
<li>RDMA/mana_ib: Ignore optional access flags for MRs
(git-fixes).</li>
<li>RDMA/mlx4: Fix truncated output warning in alias_GUID.c
(git-fixes)</li>
<li>RDMA/mlx4: Fix truncated output warning in mad.c
(git-fixes)</li>
<li>RDMA/mlx5: Set mkeys for dmabuf at PAGE_SIZE (git-fixes)</li>
<li>RDMA/restrack: Fix potential invalid address access
(git-fixes)</li>
<li>RDMA/rxe: Do not set BTH_ACK_MASK for UC or UD QPs
(git-fixes)</li>
<li>regmap-i2c: Subtract reg size from max_write
(stable-fixes).</li>
<li>Revert &quot;ALSA: firewire-lib: obsolete workqueue for period
update&quot; (bsc#1208783).</li>
<li>Revert &quot;ALSA: firewire-lib: operate for period elapse event
in process context&quot; (bsc#1208783).</li>
<li>Revert &quot;leds: led-core: Fix refcount leak in
of_led_get()&quot; (git-fixes).</li>
<li>Revert &quot;usb: musb: da8xx: Set phy in OTG mode by
default&quot; (stable-fixes).</li>
<li>rpcrdma: fix handling for RDMA_CM_EVENT_DEVICE_REMOVAL
(git-fixes).</li>
<li>rtc: cmos: Fix return value of nvmem callbacks
(git-fixes).</li>
<li>rtc: interface: Add RTC offset to alarm after fix-up
(git-fixes).</li>
<li>rtc: isl1208: Fix return value of nvmem callbacks
(git-fixes).</li>
<li>rtlwifi: rtl8192de: Style clean-ups (stable-fixes).</li>
<li>s390: Implement __iowrite32_copy() (bsc#1226502)</li>
<li>s390: Stop using weak symbols for __iowrite64_copy()
(bsc#1226502)</li>
<li>saa7134: Unchecked i2c_transfer function result fixed
(git-fixes).</li>
<li>sched/fair: Do not balance task to its current running CPU (git fixes
(sched)).</li>
<li>sched: Fix stop_one_cpu_nowait() vs hotplug (git fixes
(sched)).</li>
<li>scsi: lpfc: Allow DEVICE_RECOVERY mode after RSCN receipt if in
PRLI_ISSUE state (bsc#1228857).</li>
<li>scsi: lpfc: Cancel ELS WQE instead of issuing abort when SLI port is
inactive (bsc#1228857).</li>
<li>scsi: lpfc: Fix handling of fully recovered fabric node in dev_loss
callbk (bsc#1228857).</li>
<li>scsi: lpfc: Fix incorrect request len mbox field when setting
trunking via sysfs (bsc#1228857).</li>
<li>scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info
(bsc#1228857).</li>
<li>scsi: lpfc: Relax PRLI issue conditions after GID_FT response
(bsc#1228857).</li>
<li>scsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian
macro usages (bsc#1228857).</li>
<li>scsi: lpfc: Update lpfc version to 14.4.0.3 (bsc#1228857).</li>
<li>scsi: qla2xxx: Avoid possible run-time warning with long model_num
(bsc#1228850).</li>
<li>scsi: qla2xxx: Complete command early within lock
(bsc#1228850).</li>
<li>scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).</li>
<li>scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).</li>
<li>scsi: qla2xxx: During vport delete send async logout explicitly
(bsc#1228850).</li>
<li>scsi: qla2xxx: Fix debugfs output for fw_resource_count
(bsc#1228850).</li>
<li>scsi: qla2xxx: Fix flash read failure (bsc#1228850).</li>
<li>scsi: qla2xxx: Fix for possible memory corruption
(bsc#1228850).</li>
<li>scsi: qla2xxx: Fix optrom version displayed in FDMI
(bsc#1228850).</li>
<li>scsi: qla2xxx: Indent help text (bsc#1228850).</li>
<li>scsi: qla2xxx: Reduce fabric scan duplicate code
(bsc#1228850).</li>
<li>scsi: qla2xxx: Remove unused struct
&#x27;scsi_dif_tuple&#x27; (bsc#1228850).</li>
<li>scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds
(bsc#1228850).</li>
<li>scsi: qla2xxx: Unable to act on RSCN for port online
(bsc#1228850).</li>
<li>scsi: qla2xxx: Update version to 10.02.09.300-k
(bsc#1228850).</li>
<li>scsi: qla2xxx: Use QP lock to search for bsg
(bsc#1228850).</li>
<li>scsi: qla2xxx: validate nvme_local_port correctly
(bsc#1228850).</li>
<li>selftests/bpf: Add a selftest for checking subreg equality
(bsc#1225903).</li>
<li>selftests/bpf: add pre bpf_prog_test_run_opts() callback for
test_loader (bsc#1225903).</li>
<li>selftests/bpf: add precision propagation tests in the presence of
subprogs (bsc#1225903).</li>
<li>selftests/bpf: Add pruning test case for bpf_spin_lock
(bsc#1225903).</li>
<li>selftests/bpf: Check if mark_chain_precision() follows scalar ids
(bsc#1225903).</li>
<li>selftests/bpf: check if max number of bpf_loop iterations is tracked
(bsc#1225903).</li>
<li>selftests/bpf: fix __retval() being always ignored
(bsc#1225903).</li>
<li>selftests/bpf: fix unpriv_disabled check in test_verifier
(bsc#1225903).</li>
<li>selftests/bpf: __imm_insn &amp; __imm_const macro for bpf_misc.h
(bsc#1225903).</li>
<li>selftests/bpf: make test_align selftest more robust
(bsc#1225903).</li>
<li>selftests/bpf: populate map_array_ro map for verifier_array_access
test (bsc#1225903).</li>
<li>selftests/bpf: prog_tests entry point for migrated test_verifier
tests (bsc#1225903).</li>
<li>selftests/bpf: Report program name on parse_test_spec error
(bsc#1225903).</li>
<li>selftests/bpf: Support custom per-test flags and multiple expected
messages (bsc#1225903).</li>
<li>selftests/bpf: test case for callback_depth states pruning logic
(bsc#1225903).</li>
<li>selftests/bpf: test case for relaxed prunning of active_lock.id
(bsc#1225903).</li>
<li>selftests/bpf: test cases for regsafe() bug skipping check_id()
(bsc#1225903).</li>
<li>selftests/bpf: Tests execution support for test_loader.c
(bsc#1225903).</li>
<li>selftests/bpf: tests for iterating callbacks
(bsc#1225903).</li>
<li>selftests/bpf: test widening for iterating callbacks
(bsc#1225903).</li>
<li>selftests/bpf: track string payload offset as scalar in strobemeta
(bsc#1225903).</li>
<li>selftests/bpf: Unprivileged tests for test_loader.c
(bsc#1225903).</li>
<li>selftests/bpf: Verify copy_register_state() preserves parent/live
fields (bsc#1225903).</li>
<li>selftests/bpf: verify states_equal() maintains idmap across all
frames (bsc#1225903).</li>
<li>selftests/bpf: Verify that check_ids() is used for scalars in
regsafe() (bsc#1225903).</li>
<li>selftests/sigaltstack: Fix ppc64 GCC build (git-fixes).</li>
<li>soc: ti: wkup_m3_ipc: Send NULL dummy message instead of pointer
message (stable-fixes).</li>
<li>spi: imx: Do not expect DMA for i.MX{25,35,50,51,53} cspi devices
(stable-fixes).</li>
<li>spi: mux: set ctlr-&gt;bits_per_word_mask
(stable-fixes).</li>
<li>string.h: Introduce memtostr() and memtostr_pad()
(bsc#1228850).</li>
<li>SUNRPC: avoid soft lockup when transmitting UDP to reachable server
(bsc#1225272).</li>
<li>SUNRPC: Fix gss_free_in_token_pages() (git-fixes).</li>
<li>SUNRPC: Fix loop termination condition in gss_free_in_token_pages()
(git-fixes).</li>
<li>sunrpc: fix NFSACL RPC retry on soft mount (git-fixes).</li>
<li>SUNRPC: return proper error from gss_wrap_req_priv
(git-fixes).</li>
<li>supported.conf:</li>
<li>tpm: Allow system suspend to continue when TPM suspend fails
(bsc#1082555).</li>
<li>tpm: Prevent hwrng from activating during resume
(bsc#1082555).</li>
<li>tpm_tis: Resend command to recover from data transfer errors
(bsc#1082555).</li>
<li>tpm_tis: Use tpm_chip_{start,stop} decoration inside tpm_tis_resume
(bsc#1082555).</li>
<li>tpm, tpm: Implement usage counter for locality
(bsc#1082555).</li>
<li>tpm, tpm_tis: Avoid cache incoherency in test for interrupts
(bsc#1082555).</li>
<li>tpm, tpm_tis: Claim locality before writing interrupt registers
(bsc#1082555).</li>
<li>tpm, tpm_tis: Claim locality in interrupt handler
(bsc#1082555).</li>
<li>tpm, tpm_tis: Claim locality when interrupts are reenabled on resume
(bsc#1082555).</li>
<li>tpm, tpm_tis: correct tpm_tis_flags enumeration values
(bsc#1082555).</li>
<li>tpm, tpm_tis: Do not skip reset of original interrupt vector
(bsc#1082555).</li>
<li>tpm, tpm_tis: Only handle supported interrupts
(bsc#1082555).</li>
<li>tracing: Build event generation tests only as modules
(git-fixes).</li>
<li>tracing/net_sched: NULL pointer dereference in
perf_trace_qdisc_reset() (git-fixes).</li>
<li>tracing/osnoise: Add osnoise/options file (bsc#1228330)</li>
<li>tracing/osnoise: Add OSNOISE_WORKLOAD option (bsc#1228330)</li>
<li>tracing/osnoise: Do not follow tracing_cpumask
(bsc#1228330)</li>
<li>tracing/osnoise: Fix notify new tracing_max_latency
(bsc#1228330)</li>
<li>tracing/osnoise: Make osnoise_instances static
(bsc#1228330)</li>
<li>tracing/osnoise: Split workload start from the tracer start
(bsc#1228330)</li>
<li>tracing/osnoise: Support a list of trace_array *tr
(bsc#1228330)</li>
<li>tracing/osnoise: Use built-in RCU list checking
(bsc#1228330)</li>
<li>tracing/timerlat: Notify new max thread latency
(bsc#1228330)</li>
<li>USB: Add USB_QUIRK_NO_SET_INTF quirk for START BP-850k
(stable-fixes).</li>
<li>usb: cdns3: allocate TX FIFO size according to composite EP number
(git-fixes).</li>
<li>usb: cdns3: fix incorrect calculation of ep_buf_size when more than
one config (git-fixes).</li>
<li>usb: cdns3: fix iso transfer error when mult is not zero
(git-fixes).</li>
<li>usb: cdns3: improve handling of unaligned address case
(git-fixes).</li>
<li>usb: cdns3: optimize OUT transfer by copying only actual received
data (git-fixes).</li>
<li>usb: cdns3: skip set TRB_IOC when usb_request: no_interrupt is true
(git-fixes).</li>
<li>USB: core: Fix duplicate endpoint bug by clearing reserved bits in
the descriptor (git-fixes).</li>
<li>usb: dwc3: gadget: Do not delay End Transfer on delayed_status
(git-fixes).</li>
<li>usb: dwc3: gadget: Force sending delayed status during soft
disconnect (git-fixes).</li>
<li>usb: dwc3: gadget: Synchronize IRQ between soft connect/disconnect
(git-fixes).</li>
<li>usb: gadget: call usb_gadget_check_config() to verify UDC capability
(git-fixes).</li>
<li>usb: gadget: configfs: Prevent OOB read/write in usb_string_copy()
(stable-fixes).</li>
<li>usb: gadget: printer: SS+ support (stable-fixes).</li>
<li>usb: misc: uss720: check for incompatible versions of the Belkin
F5U002 (stable-fixes).</li>
<li>USB: serial: mos7840: fix crash on resume (git-fixes).</li>
<li>USB: serial: option: add Fibocom FM350-GL (stable-fixes).</li>
<li>USB: serial: option: add Netprisma LCUK54 series modules
(stable-fixes).</li>
<li>USB: serial: option: add Rolling RW350-GL variants
(stable-fixes).</li>
<li>USB: serial: option: add support for Foxconn T99W651
(stable-fixes).</li>
<li>USB: serial: option: add Telit FN912 rmnet compositions
(stable-fixes).</li>
<li>USB: serial: option: add Telit generic core-dump composition
(stable-fixes).</li>
<li>usb: typec: tcpm: clear pd_event queue in PORT_RESET
(git-fixes).</li>
<li>usb: xhci-plat: Do not include xhci.h (git-fixes).</li>
<li>USB: xhci-plat: fix legacy PHY double init (git-fixes).</li>
<li>wifi: ath11k: fix wrong handling of CCMP256 and GCMP ciphers
(git-fixes).</li>
<li>wifi: brcmsmac: LCN PHY code is used for BCM4313 2G-only device
(git-fixes).</li>
<li>wifi: cfg80211: fix typo in cfg80211_calculate_bitrate_he()
(git-fixes).</li>
<li>wifi: cfg80211: handle 2x996 RU allocation in
cfg80211_calculate_bitrate_he() (git-fixes).</li>
<li>wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values
(git-fixes).</li>
<li>wifi: cfg80211: wext: add extra SIOCSIWSCAN data check
(stable-fixes).</li>
<li>wifi: iwlwifi: mvm: d3: fix WoWLAN command version lookup
(stable-fixes).</li>
<li>wifi: iwlwifi: mvm: Handle BIGTK cipher in kek_kck cmd
(stable-fixes).</li>
<li>wifi: iwlwifi: mvm: properly set 6 GHz channel direct probe option
(stable-fixes).</li>
<li>wifi: mac80211: disable softirqs for queued frame handling
(git-fixes).</li>
<li>wifi: mac80211: fix UBSAN noise in ieee80211_prep_hw_scan()
(stable-fixes).</li>
<li>wifi: mac80211: handle tasklet frames before stopping
(stable-fixes).</li>
<li>wifi: mac80211: mesh: init nonpeer_pm to active by default in mesh
sdata (stable-fixes).</li>
<li>wifi: mt76: replace skb_put with skb_put_zero
(stable-fixes).</li>
<li>wifi: mwifiex: Fix interface type change (git-fixes).</li>
<li>wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter()
(git-fixes).</li>
<li>wifi: wilc1000: fix ies_len type in connect path
(git-fixes).</li>
<li>workqueue: Improve scalability of workqueue watchdog touch
(bsc#1193454).</li>
<li>workqueue: wq_watchdog_touch is always called with valid CPU
(bsc#1193454).</li>
<li>x86/amd_nb: Use Family 19h Models 60h-7Fh Function 4 IDs
(git-fixes).</li>
<li>x86/apic: Force native_apic_mem_read() to use the MOV instruction
(git-fixes).</li>
<li>x86/bhi: Avoid warning in #DB handler due to BHI mitigation
(git-fixes).</li>
<li>x86/bugs: Remove default case for fully switched enums
(bsc#1227900).</li>
<li>x86/fpu: Fix AMD X86_BUG_FXSAVE_LEAK fixup (git-fixes).</li>
<li>x86/ibt,ftrace: Search for <strong>fentry</strong>
location (git-fixes).</li>
<li>x86/Kconfig: Transmeta Crusoe is CPU family 5, not 6
(git-fixes).</li>
<li>x86/mm: Allow guest.enc_status_change_prepare() to fail
(git-fixes).</li>
<li>x86/mm: Fix enc_status_change_finish_noop() (git-fixes).</li>
<li>x86/purgatory: Switch to the position-independent small code model
(git-fixes).</li>
<li>x86/srso: Move retbleed IBPB check into existing
&#x27;has_microcode&#x27; code block (bsc#1227900).</li>
<li>x86/srso: Remove &#x27;pred_cmd&#x27; label
(bsc#1227900).</li>
<li>x86: Stop using weak symbols for __iowrite32_copy()
(bsc#1226502)</li>
<li>x86/tdx: Fix race between set_memory_encrypted() and
load_unaligned_zeropad() (git-fixes).</li>
<li>xfs: Add cond_resched to block unmap range and reflink remap path
(bsc#1228226).</li>
<li>xhci: Apply broken streams quirk to Etron EJ188 xHCI host
(stable-fixes).</li>
<li>xhci: Apply reset resume quirk to Etron EJ188 xHCI host
(stable-fixes).</li>
<li>xhci: Set correct transferred length for cancelled bulk transfers
(stable-fixes).</li>
</ul>




<h2>Special Instructions and Notes:</h2>
<ul>


<li>Please reboot the system after installing this
update.</li>


</ul>


<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
openSUSE Leap 15.5


<br/>
<code>zypper in -t patch SUSE-2024-2947=1
openSUSE-SLE-15.5-2024-2947=1</code>



</li>

<li class="list-group-item">
Public Cloud Module 15-SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Public-Cloud-15-SP5-2024-2947=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
openSUSE Leap 15.5 (aarch64 x86_64)
<ul>


<li>cluster-md-kmp-azure-5.14.21-150500.33.63.1</li>


<li>ocfs2-kmp-azure-debuginfo-5.14.21-150500.33.63.1</li>


<li>gfs2-kmp-azure-5.14.21-150500.33.63.1</li>


<li>kernel-azure-optional-debuginfo-5.14.21-150500.33.63.1</li>


<li>ocfs2-kmp-azure-5.14.21-150500.33.63.1</li>


<li>kernel-azure-devel-5.14.21-150500.33.63.1</li>


<li>reiserfs-kmp-azure-debuginfo-5.14.21-150500.33.63.1</li>


<li>reiserfs-kmp-azure-5.14.21-150500.33.63.1</li>


<li>dlm-kmp-azure-5.14.21-150500.33.63.1</li>


<li>kernel-azure-extra-debuginfo-5.14.21-150500.33.63.1</li>


<li>cluster-md-kmp-azure-debuginfo-5.14.21-150500.33.63.1</li>


<li>kselftests-kmp-azure-debuginfo-5.14.21-150500.33.63.1</li>


<li>dlm-kmp-azure-debuginfo-5.14.21-150500.33.63.1</li>


<li>kernel-azure-devel-debuginfo-5.14.21-150500.33.63.1</li>


<li>kselftests-kmp-azure-5.14.21-150500.33.63.1</li>


<li>kernel-azure-optional-5.14.21-150500.33.63.1</li>


<li>kernel-azure-extra-5.14.21-150500.33.63.1</li>


<li>kernel-azure-debuginfo-5.14.21-150500.33.63.1</li>


<li>kernel-azure-debugsource-5.14.21-150500.33.63.1</li>


<li>kernel-syms-azure-5.14.21-150500.33.63.1</li>


<li>gfs2-kmp-azure-debuginfo-5.14.21-150500.33.63.1</li>


<li>kernel-azure-livepatch-devel-5.14.21-150500.33.63.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.5 (aarch64 nosrc x86_64)
<ul>


<li>kernel-azure-5.14.21-150500.33.63.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.5 (x86_64)
<ul>


<li>kernel-azure-vdso-debuginfo-5.14.21-150500.33.63.1</li>


<li>kernel-azure-vdso-5.14.21-150500.33.63.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.5 (noarch)
<ul>


<li>kernel-source-azure-5.14.21-150500.33.63.1</li>


<li>kernel-devel-azure-5.14.21-150500.33.63.1</li>

</ul>
</li>



<li>
Public Cloud Module 15-SP5 (aarch64 nosrc x86_64)
<ul>


<li>kernel-azure-5.14.21-150500.33.63.1</li>

</ul>
</li>

<li>
Public Cloud Module 15-SP5 (aarch64 x86_64)
<ul>


<li>kernel-azure-debuginfo-5.14.21-150500.33.63.1</li>


<li>kernel-azure-debugsource-5.14.21-150500.33.63.1</li>


<li>kernel-syms-azure-5.14.21-150500.33.63.1</li>


<li>kernel-azure-devel-debuginfo-5.14.21-150500.33.63.1</li>


<li>kernel-azure-devel-5.14.21-150500.33.63.1</li>

</ul>
</li>

<li>
Public Cloud Module 15-SP5 (noarch)
<ul>


<li>kernel-source-azure-5.14.21-150500.33.63.1</li>


<li>kernel-devel-azure-5.14.21-150500.33.63.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47086.html">https://www.suse.com/security/cve/CVE-2021-47086.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47103.html">https://www.suse.com/security/cve/CVE-2021-47103.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47186.html">https://www.suse.com/security/cve/CVE-2021-47186.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47402.html">https://www.suse.com/security/cve/CVE-2021-47402.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47546.html">https://www.suse.com/security/cve/CVE-2021-47546.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47547.html">https://www.suse.com/security/cve/CVE-2021-47547.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47588.html">https://www.suse.com/security/cve/CVE-2021-47588.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47590.html">https://www.suse.com/security/cve/CVE-2021-47590.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47591.html">https://www.suse.com/security/cve/CVE-2021-47591.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47593.html">https://www.suse.com/security/cve/CVE-2021-47593.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47598.html">https://www.suse.com/security/cve/CVE-2021-47598.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47599.html">https://www.suse.com/security/cve/CVE-2021-47599.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47606.html">https://www.suse.com/security/cve/CVE-2021-47606.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47622.html">https://www.suse.com/security/cve/CVE-2021-47622.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47623.html">https://www.suse.com/security/cve/CVE-2021-47623.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47624.html">https://www.suse.com/security/cve/CVE-2021-47624.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48713.html">https://www.suse.com/security/cve/CVE-2022-48713.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48730.html">https://www.suse.com/security/cve/CVE-2022-48730.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48732.html">https://www.suse.com/security/cve/CVE-2022-48732.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48749.html">https://www.suse.com/security/cve/CVE-2022-48749.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48756.html">https://www.suse.com/security/cve/CVE-2022-48756.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48773.html">https://www.suse.com/security/cve/CVE-2022-48773.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48774.html">https://www.suse.com/security/cve/CVE-2022-48774.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48775.html">https://www.suse.com/security/cve/CVE-2022-48775.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48776.html">https://www.suse.com/security/cve/CVE-2022-48776.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48777.html">https://www.suse.com/security/cve/CVE-2022-48777.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48778.html">https://www.suse.com/security/cve/CVE-2022-48778.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48780.html">https://www.suse.com/security/cve/CVE-2022-48780.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48783.html">https://www.suse.com/security/cve/CVE-2022-48783.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48784.html">https://www.suse.com/security/cve/CVE-2022-48784.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48785.html">https://www.suse.com/security/cve/CVE-2022-48785.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48786.html">https://www.suse.com/security/cve/CVE-2022-48786.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48787.html">https://www.suse.com/security/cve/CVE-2022-48787.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48788.html">https://www.suse.com/security/cve/CVE-2022-48788.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48789.html">https://www.suse.com/security/cve/CVE-2022-48789.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48790.html">https://www.suse.com/security/cve/CVE-2022-48790.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48791.html">https://www.suse.com/security/cve/CVE-2022-48791.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48792.html">https://www.suse.com/security/cve/CVE-2022-48792.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48793.html">https://www.suse.com/security/cve/CVE-2022-48793.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48794.html">https://www.suse.com/security/cve/CVE-2022-48794.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48796.html">https://www.suse.com/security/cve/CVE-2022-48796.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48797.html">https://www.suse.com/security/cve/CVE-2022-48797.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48798.html">https://www.suse.com/security/cve/CVE-2022-48798.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48799.html">https://www.suse.com/security/cve/CVE-2022-48799.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48800.html">https://www.suse.com/security/cve/CVE-2022-48800.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48801.html">https://www.suse.com/security/cve/CVE-2022-48801.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48802.html">https://www.suse.com/security/cve/CVE-2022-48802.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48803.html">https://www.suse.com/security/cve/CVE-2022-48803.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48804.html">https://www.suse.com/security/cve/CVE-2022-48804.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48805.html">https://www.suse.com/security/cve/CVE-2022-48805.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48806.html">https://www.suse.com/security/cve/CVE-2022-48806.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48807.html">https://www.suse.com/security/cve/CVE-2022-48807.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48809.html">https://www.suse.com/security/cve/CVE-2022-48809.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48810.html">https://www.suse.com/security/cve/CVE-2022-48810.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48811.html">https://www.suse.com/security/cve/CVE-2022-48811.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48812.html">https://www.suse.com/security/cve/CVE-2022-48812.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48813.html">https://www.suse.com/security/cve/CVE-2022-48813.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48814.html">https://www.suse.com/security/cve/CVE-2022-48814.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48815.html">https://www.suse.com/security/cve/CVE-2022-48815.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48816.html">https://www.suse.com/security/cve/CVE-2022-48816.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48817.html">https://www.suse.com/security/cve/CVE-2022-48817.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48818.html">https://www.suse.com/security/cve/CVE-2022-48818.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48820.html">https://www.suse.com/security/cve/CVE-2022-48820.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48821.html">https://www.suse.com/security/cve/CVE-2022-48821.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48822.html">https://www.suse.com/security/cve/CVE-2022-48822.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48823.html">https://www.suse.com/security/cve/CVE-2022-48823.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48824.html">https://www.suse.com/security/cve/CVE-2022-48824.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48825.html">https://www.suse.com/security/cve/CVE-2022-48825.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48826.html">https://www.suse.com/security/cve/CVE-2022-48826.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48827.html">https://www.suse.com/security/cve/CVE-2022-48827.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48828.html">https://www.suse.com/security/cve/CVE-2022-48828.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48829.html">https://www.suse.com/security/cve/CVE-2022-48829.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48830.html">https://www.suse.com/security/cve/CVE-2022-48830.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48831.html">https://www.suse.com/security/cve/CVE-2022-48831.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48834.html">https://www.suse.com/security/cve/CVE-2022-48834.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48835.html">https://www.suse.com/security/cve/CVE-2022-48835.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48836.html">https://www.suse.com/security/cve/CVE-2022-48836.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48837.html">https://www.suse.com/security/cve/CVE-2022-48837.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48838.html">https://www.suse.com/security/cve/CVE-2022-48838.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48839.html">https://www.suse.com/security/cve/CVE-2022-48839.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48840.html">https://www.suse.com/security/cve/CVE-2022-48840.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48841.html">https://www.suse.com/security/cve/CVE-2022-48841.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48842.html">https://www.suse.com/security/cve/CVE-2022-48842.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48843.html">https://www.suse.com/security/cve/CVE-2022-48843.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48844.html">https://www.suse.com/security/cve/CVE-2022-48844.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48846.html">https://www.suse.com/security/cve/CVE-2022-48846.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48847.html">https://www.suse.com/security/cve/CVE-2022-48847.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48849.html">https://www.suse.com/security/cve/CVE-2022-48849.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48850.html">https://www.suse.com/security/cve/CVE-2022-48850.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48851.html">https://www.suse.com/security/cve/CVE-2022-48851.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48852.html">https://www.suse.com/security/cve/CVE-2022-48852.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48853.html">https://www.suse.com/security/cve/CVE-2022-48853.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48855.html">https://www.suse.com/security/cve/CVE-2022-48855.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48856.html">https://www.suse.com/security/cve/CVE-2022-48856.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48857.html">https://www.suse.com/security/cve/CVE-2022-48857.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48858.html">https://www.suse.com/security/cve/CVE-2022-48858.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48859.html">https://www.suse.com/security/cve/CVE-2022-48859.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48860.html">https://www.suse.com/security/cve/CVE-2022-48860.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48861.html">https://www.suse.com/security/cve/CVE-2022-48861.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48862.html">https://www.suse.com/security/cve/CVE-2022-48862.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48863.html">https://www.suse.com/security/cve/CVE-2022-48863.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48864.html">https://www.suse.com/security/cve/CVE-2022-48864.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48866.html">https://www.suse.com/security/cve/CVE-2022-48866.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-1582.html">https://www.suse.com/security/cve/CVE-2023-1582.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-37453.html">https://www.suse.com/security/cve/CVE-2023-37453.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52435.html">https://www.suse.com/security/cve/CVE-2023-52435.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52573.html">https://www.suse.com/security/cve/CVE-2023-52573.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52580.html">https://www.suse.com/security/cve/CVE-2023-52580.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52591.html">https://www.suse.com/security/cve/CVE-2023-52591.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52735.html">https://www.suse.com/security/cve/CVE-2023-52735.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52751.html">https://www.suse.com/security/cve/CVE-2023-52751.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52762.html">https://www.suse.com/security/cve/CVE-2023-52762.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52775.html">https://www.suse.com/security/cve/CVE-2023-52775.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52812.html">https://www.suse.com/security/cve/CVE-2023-52812.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52857.html">https://www.suse.com/security/cve/CVE-2023-52857.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52863.html">https://www.suse.com/security/cve/CVE-2023-52863.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52885.html">https://www.suse.com/security/cve/CVE-2023-52885.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52886.html">https://www.suse.com/security/cve/CVE-2023-52886.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-25741.html">https://www.suse.com/security/cve/CVE-2024-25741.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26583.html">https://www.suse.com/security/cve/CVE-2024-26583.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26584.html">https://www.suse.com/security/cve/CVE-2024-26584.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26585.html">https://www.suse.com/security/cve/CVE-2024-26585.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26615.html">https://www.suse.com/security/cve/CVE-2024-26615.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26633.html">https://www.suse.com/security/cve/CVE-2024-26633.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26635.html">https://www.suse.com/security/cve/CVE-2024-26635.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26636.html">https://www.suse.com/security/cve/CVE-2024-26636.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26641.html">https://www.suse.com/security/cve/CVE-2024-26641.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26661.html">https://www.suse.com/security/cve/CVE-2024-26661.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26663.html">https://www.suse.com/security/cve/CVE-2024-26663.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26665.html">https://www.suse.com/security/cve/CVE-2024-26665.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26800.html">https://www.suse.com/security/cve/CVE-2024-26800.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26802.html">https://www.suse.com/security/cve/CVE-2024-26802.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26813.html">https://www.suse.com/security/cve/CVE-2024-26813.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26814.html">https://www.suse.com/security/cve/CVE-2024-26814.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26863.html">https://www.suse.com/security/cve/CVE-2024-26863.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26889.html">https://www.suse.com/security/cve/CVE-2024-26889.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26920.html">https://www.suse.com/security/cve/CVE-2024-26920.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26935.html">https://www.suse.com/security/cve/CVE-2024-26935.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-269355.html">https://www.suse.com/security/cve/CVE-2024-269355.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26961.html">https://www.suse.com/security/cve/CVE-2024-26961.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26976.html">https://www.suse.com/security/cve/CVE-2024-26976.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27015.html">https://www.suse.com/security/cve/CVE-2024-27015.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27019.html">https://www.suse.com/security/cve/CVE-2024-27019.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27020.html">https://www.suse.com/security/cve/CVE-2024-27020.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27025.html">https://www.suse.com/security/cve/CVE-2024-27025.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27065.html">https://www.suse.com/security/cve/CVE-2024-27065.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27402.html">https://www.suse.com/security/cve/CVE-2024-27402.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27437.html">https://www.suse.com/security/cve/CVE-2024-27437.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35805.html">https://www.suse.com/security/cve/CVE-2024-35805.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35819.html">https://www.suse.com/security/cve/CVE-2024-35819.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35837.html">https://www.suse.com/security/cve/CVE-2024-35837.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35853.html">https://www.suse.com/security/cve/CVE-2024-35853.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35854.html">https://www.suse.com/security/cve/CVE-2024-35854.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35855.html">https://www.suse.com/security/cve/CVE-2024-35855.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35889.html">https://www.suse.com/security/cve/CVE-2024-35889.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35890.html">https://www.suse.com/security/cve/CVE-2024-35890.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35893.html">https://www.suse.com/security/cve/CVE-2024-35893.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35899.html">https://www.suse.com/security/cve/CVE-2024-35899.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35934.html">https://www.suse.com/security/cve/CVE-2024-35934.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35949.html">https://www.suse.com/security/cve/CVE-2024-35949.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35961.html">https://www.suse.com/security/cve/CVE-2024-35961.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35979.html">https://www.suse.com/security/cve/CVE-2024-35979.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35995.html">https://www.suse.com/security/cve/CVE-2024-35995.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36000.html">https://www.suse.com/security/cve/CVE-2024-36000.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36004.html">https://www.suse.com/security/cve/CVE-2024-36004.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36288.html">https://www.suse.com/security/cve/CVE-2024-36288.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36889.html">https://www.suse.com/security/cve/CVE-2024-36889.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36901.html">https://www.suse.com/security/cve/CVE-2024-36901.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36902.html">https://www.suse.com/security/cve/CVE-2024-36902.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36909.html">https://www.suse.com/security/cve/CVE-2024-36909.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36910.html">https://www.suse.com/security/cve/CVE-2024-36910.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36911.html">https://www.suse.com/security/cve/CVE-2024-36911.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36912.html">https://www.suse.com/security/cve/CVE-2024-36912.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36913.html">https://www.suse.com/security/cve/CVE-2024-36913.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36914.html">https://www.suse.com/security/cve/CVE-2024-36914.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36919.html">https://www.suse.com/security/cve/CVE-2024-36919.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36923.html">https://www.suse.com/security/cve/CVE-2024-36923.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36924.html">https://www.suse.com/security/cve/CVE-2024-36924.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36926.html">https://www.suse.com/security/cve/CVE-2024-36926.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36939.html">https://www.suse.com/security/cve/CVE-2024-36939.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36941.html">https://www.suse.com/security/cve/CVE-2024-36941.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36942.html">https://www.suse.com/security/cve/CVE-2024-36942.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36944.html">https://www.suse.com/security/cve/CVE-2024-36944.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36946.html">https://www.suse.com/security/cve/CVE-2024-36946.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36947.html">https://www.suse.com/security/cve/CVE-2024-36947.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36950.html">https://www.suse.com/security/cve/CVE-2024-36950.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36952.html">https://www.suse.com/security/cve/CVE-2024-36952.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36955.html">https://www.suse.com/security/cve/CVE-2024-36955.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36959.html">https://www.suse.com/security/cve/CVE-2024-36959.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36974.html">https://www.suse.com/security/cve/CVE-2024-36974.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38548.html">https://www.suse.com/security/cve/CVE-2024-38548.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38555.html">https://www.suse.com/security/cve/CVE-2024-38555.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38558.html">https://www.suse.com/security/cve/CVE-2024-38558.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38559.html">https://www.suse.com/security/cve/CVE-2024-38559.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38570.html">https://www.suse.com/security/cve/CVE-2024-38570.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38586.html">https://www.suse.com/security/cve/CVE-2024-38586.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38588.html">https://www.suse.com/security/cve/CVE-2024-38588.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38598.html">https://www.suse.com/security/cve/CVE-2024-38598.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38628.html">https://www.suse.com/security/cve/CVE-2024-38628.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39276.html">https://www.suse.com/security/cve/CVE-2024-39276.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39371.html">https://www.suse.com/security/cve/CVE-2024-39371.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39463.html">https://www.suse.com/security/cve/CVE-2024-39463.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39472.html">https://www.suse.com/security/cve/CVE-2024-39472.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39475.html">https://www.suse.com/security/cve/CVE-2024-39475.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39482.html">https://www.suse.com/security/cve/CVE-2024-39482.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39487.html">https://www.suse.com/security/cve/CVE-2024-39487.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39488.html">https://www.suse.com/security/cve/CVE-2024-39488.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39490.html">https://www.suse.com/security/cve/CVE-2024-39490.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39493.html">https://www.suse.com/security/cve/CVE-2024-39493.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39494.html">https://www.suse.com/security/cve/CVE-2024-39494.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39497.html">https://www.suse.com/security/cve/CVE-2024-39497.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39499.html">https://www.suse.com/security/cve/CVE-2024-39499.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39500.html">https://www.suse.com/security/cve/CVE-2024-39500.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39501.html">https://www.suse.com/security/cve/CVE-2024-39501.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39502.html">https://www.suse.com/security/cve/CVE-2024-39502.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39505.html">https://www.suse.com/security/cve/CVE-2024-39505.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39506.html">https://www.suse.com/security/cve/CVE-2024-39506.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39507.html">https://www.suse.com/security/cve/CVE-2024-39507.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39508.html">https://www.suse.com/security/cve/CVE-2024-39508.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39509.html">https://www.suse.com/security/cve/CVE-2024-39509.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40900.html">https://www.suse.com/security/cve/CVE-2024-40900.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40901.html">https://www.suse.com/security/cve/CVE-2024-40901.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40902.html">https://www.suse.com/security/cve/CVE-2024-40902.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40903.html">https://www.suse.com/security/cve/CVE-2024-40903.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40904.html">https://www.suse.com/security/cve/CVE-2024-40904.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40906.html">https://www.suse.com/security/cve/CVE-2024-40906.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40908.html">https://www.suse.com/security/cve/CVE-2024-40908.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40909.html">https://www.suse.com/security/cve/CVE-2024-40909.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40911.html">https://www.suse.com/security/cve/CVE-2024-40911.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40912.html">https://www.suse.com/security/cve/CVE-2024-40912.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40916.html">https://www.suse.com/security/cve/CVE-2024-40916.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40919.html">https://www.suse.com/security/cve/CVE-2024-40919.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40923.html">https://www.suse.com/security/cve/CVE-2024-40923.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40924.html">https://www.suse.com/security/cve/CVE-2024-40924.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40927.html">https://www.suse.com/security/cve/CVE-2024-40927.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40929.html">https://www.suse.com/security/cve/CVE-2024-40929.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40931.html">https://www.suse.com/security/cve/CVE-2024-40931.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40932.html">https://www.suse.com/security/cve/CVE-2024-40932.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40934.html">https://www.suse.com/security/cve/CVE-2024-40934.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40935.html">https://www.suse.com/security/cve/CVE-2024-40935.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40937.html">https://www.suse.com/security/cve/CVE-2024-40937.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40940.html">https://www.suse.com/security/cve/CVE-2024-40940.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40941.html">https://www.suse.com/security/cve/CVE-2024-40941.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40942.html">https://www.suse.com/security/cve/CVE-2024-40942.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40943.html">https://www.suse.com/security/cve/CVE-2024-40943.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40945.html">https://www.suse.com/security/cve/CVE-2024-40945.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40953.html">https://www.suse.com/security/cve/CVE-2024-40953.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40954.html">https://www.suse.com/security/cve/CVE-2024-40954.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40956.html">https://www.suse.com/security/cve/CVE-2024-40956.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40958.html">https://www.suse.com/security/cve/CVE-2024-40958.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40959.html">https://www.suse.com/security/cve/CVE-2024-40959.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40960.html">https://www.suse.com/security/cve/CVE-2024-40960.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40961.html">https://www.suse.com/security/cve/CVE-2024-40961.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40966.html">https://www.suse.com/security/cve/CVE-2024-40966.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40967.html">https://www.suse.com/security/cve/CVE-2024-40967.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40970.html">https://www.suse.com/security/cve/CVE-2024-40970.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40972.html">https://www.suse.com/security/cve/CVE-2024-40972.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40976.html">https://www.suse.com/security/cve/CVE-2024-40976.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40977.html">https://www.suse.com/security/cve/CVE-2024-40977.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40981.html">https://www.suse.com/security/cve/CVE-2024-40981.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40982.html">https://www.suse.com/security/cve/CVE-2024-40982.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40984.html">https://www.suse.com/security/cve/CVE-2024-40984.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40987.html">https://www.suse.com/security/cve/CVE-2024-40987.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40988.html">https://www.suse.com/security/cve/CVE-2024-40988.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40989.html">https://www.suse.com/security/cve/CVE-2024-40989.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40990.html">https://www.suse.com/security/cve/CVE-2024-40990.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40994.html">https://www.suse.com/security/cve/CVE-2024-40994.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40998.html">https://www.suse.com/security/cve/CVE-2024-40998.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40999.html">https://www.suse.com/security/cve/CVE-2024-40999.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41002.html">https://www.suse.com/security/cve/CVE-2024-41002.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41004.html">https://www.suse.com/security/cve/CVE-2024-41004.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41006.html">https://www.suse.com/security/cve/CVE-2024-41006.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41009.html">https://www.suse.com/security/cve/CVE-2024-41009.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41011.html">https://www.suse.com/security/cve/CVE-2024-41011.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41012.html">https://www.suse.com/security/cve/CVE-2024-41012.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41013.html">https://www.suse.com/security/cve/CVE-2024-41013.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41014.html">https://www.suse.com/security/cve/CVE-2024-41014.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41015.html">https://www.suse.com/security/cve/CVE-2024-41015.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41016.html">https://www.suse.com/security/cve/CVE-2024-41016.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41017.html">https://www.suse.com/security/cve/CVE-2024-41017.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41040.html">https://www.suse.com/security/cve/CVE-2024-41040.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41041.html">https://www.suse.com/security/cve/CVE-2024-41041.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41044.html">https://www.suse.com/security/cve/CVE-2024-41044.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41048.html">https://www.suse.com/security/cve/CVE-2024-41048.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41057.html">https://www.suse.com/security/cve/CVE-2024-41057.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41058.html">https://www.suse.com/security/cve/CVE-2024-41058.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41059.html">https://www.suse.com/security/cve/CVE-2024-41059.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41063.html">https://www.suse.com/security/cve/CVE-2024-41063.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41064.html">https://www.suse.com/security/cve/CVE-2024-41064.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41066.html">https://www.suse.com/security/cve/CVE-2024-41066.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41069.html">https://www.suse.com/security/cve/CVE-2024-41069.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41070.html">https://www.suse.com/security/cve/CVE-2024-41070.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41071.html">https://www.suse.com/security/cve/CVE-2024-41071.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41072.html">https://www.suse.com/security/cve/CVE-2024-41072.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41076.html">https://www.suse.com/security/cve/CVE-2024-41076.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41078.html">https://www.suse.com/security/cve/CVE-2024-41078.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41081.html">https://www.suse.com/security/cve/CVE-2024-41081.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41087.html">https://www.suse.com/security/cve/CVE-2024-41087.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41090.html">https://www.suse.com/security/cve/CVE-2024-41090.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41091.html">https://www.suse.com/security/cve/CVE-2024-41091.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42070.html">https://www.suse.com/security/cve/CVE-2024-42070.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42079.html">https://www.suse.com/security/cve/CVE-2024-42079.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42093.html">https://www.suse.com/security/cve/CVE-2024-42093.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42096.html">https://www.suse.com/security/cve/CVE-2024-42096.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42105.html">https://www.suse.com/security/cve/CVE-2024-42105.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42122.html">https://www.suse.com/security/cve/CVE-2024-42122.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42124.html">https://www.suse.com/security/cve/CVE-2024-42124.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42145.html">https://www.suse.com/security/cve/CVE-2024-42145.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42161.html">https://www.suse.com/security/cve/CVE-2024-42161.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42224.html">https://www.suse.com/security/cve/CVE-2024-42224.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42230.html">https://www.suse.com/security/cve/CVE-2024-42230.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1082555">https://bugzilla.suse.com/show_bug.cgi?id=1082555</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1193454">https://bugzilla.suse.com/show_bug.cgi?id=1193454</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1193554">https://bugzilla.suse.com/show_bug.cgi?id=1193554</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1193787">https://bugzilla.suse.com/show_bug.cgi?id=1193787</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194324">https://bugzilla.suse.com/show_bug.cgi?id=1194324</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">https://bugzilla.suse.com/show_bug.cgi?id=1194869</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195357">https://bugzilla.suse.com/show_bug.cgi?id=1195357</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195668">https://bugzilla.suse.com/show_bug.cgi?id=1195668</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195927">https://bugzilla.suse.com/show_bug.cgi?id=1195927</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195957">https://bugzilla.suse.com/show_bug.cgi?id=1195957</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1196018">https://bugzilla.suse.com/show_bug.cgi?id=1196018</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1196823">https://bugzilla.suse.com/show_bug.cgi?id=1196823</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1197146">https://bugzilla.suse.com/show_bug.cgi?id=1197146</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1197246">https://bugzilla.suse.com/show_bug.cgi?id=1197246</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1197762">https://bugzilla.suse.com/show_bug.cgi?id=1197762</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1202346">https://bugzilla.suse.com/show_bug.cgi?id=1202346</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1202686">https://bugzilla.suse.com/show_bug.cgi?id=1202686</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1208783">https://bugzilla.suse.com/show_bug.cgi?id=1208783</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209636">https://bugzilla.suse.com/show_bug.cgi?id=1209636</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213123">https://bugzilla.suse.com/show_bug.cgi?id=1213123</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215492">https://bugzilla.suse.com/show_bug.cgi?id=1215492</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215587">https://bugzilla.suse.com/show_bug.cgi?id=1215587</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216834">https://bugzilla.suse.com/show_bug.cgi?id=1216834</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219832">https://bugzilla.suse.com/show_bug.cgi?id=1219832</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220138">https://bugzilla.suse.com/show_bug.cgi?id=1220138</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220185">https://bugzilla.suse.com/show_bug.cgi?id=1220185</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220186">https://bugzilla.suse.com/show_bug.cgi?id=1220186</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220187">https://bugzilla.suse.com/show_bug.cgi?id=1220187</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220869">https://bugzilla.suse.com/show_bug.cgi?id=1220869</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220876">https://bugzilla.suse.com/show_bug.cgi?id=1220876</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220942">https://bugzilla.suse.com/show_bug.cgi?id=1220942</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220952">https://bugzilla.suse.com/show_bug.cgi?id=1220952</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221010">https://bugzilla.suse.com/show_bug.cgi?id=1221010</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221044">https://bugzilla.suse.com/show_bug.cgi?id=1221044</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221647">https://bugzilla.suse.com/show_bug.cgi?id=1221647</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221654">https://bugzilla.suse.com/show_bug.cgi?id=1221654</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221656">https://bugzilla.suse.com/show_bug.cgi?id=1221656</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221659">https://bugzilla.suse.com/show_bug.cgi?id=1221659</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221777">https://bugzilla.suse.com/show_bug.cgi?id=1221777</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222011">https://bugzilla.suse.com/show_bug.cgi?id=1222011</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222323">https://bugzilla.suse.com/show_bug.cgi?id=1222323</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222326">https://bugzilla.suse.com/show_bug.cgi?id=1222326</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222328">https://bugzilla.suse.com/show_bug.cgi?id=1222328</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222625">https://bugzilla.suse.com/show_bug.cgi?id=1222625</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222702">https://bugzilla.suse.com/show_bug.cgi?id=1222702</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222728">https://bugzilla.suse.com/show_bug.cgi?id=1222728</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222799">https://bugzilla.suse.com/show_bug.cgi?id=1222799</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222809">https://bugzilla.suse.com/show_bug.cgi?id=1222809</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222810">https://bugzilla.suse.com/show_bug.cgi?id=1222810</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223021">https://bugzilla.suse.com/show_bug.cgi?id=1223021</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223180">https://bugzilla.suse.com/show_bug.cgi?id=1223180</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223635">https://bugzilla.suse.com/show_bug.cgi?id=1223635</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223652">https://bugzilla.suse.com/show_bug.cgi?id=1223652</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223675">https://bugzilla.suse.com/show_bug.cgi?id=1223675</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223778">https://bugzilla.suse.com/show_bug.cgi?id=1223778</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223806">https://bugzilla.suse.com/show_bug.cgi?id=1223806</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223813">https://bugzilla.suse.com/show_bug.cgi?id=1223813</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223815">https://bugzilla.suse.com/show_bug.cgi?id=1223815</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223836">https://bugzilla.suse.com/show_bug.cgi?id=1223836</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223863">https://bugzilla.suse.com/show_bug.cgi?id=1223863</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224414">https://bugzilla.suse.com/show_bug.cgi?id=1224414</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224499">https://bugzilla.suse.com/show_bug.cgi?id=1224499</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224500">https://bugzilla.suse.com/show_bug.cgi?id=1224500</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224512">https://bugzilla.suse.com/show_bug.cgi?id=1224512</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224516">https://bugzilla.suse.com/show_bug.cgi?id=1224516</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224517">https://bugzilla.suse.com/show_bug.cgi?id=1224517</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224545">https://bugzilla.suse.com/show_bug.cgi?id=1224545</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224548">https://bugzilla.suse.com/show_bug.cgi?id=1224548</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224557">https://bugzilla.suse.com/show_bug.cgi?id=1224557</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224572">https://bugzilla.suse.com/show_bug.cgi?id=1224572</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224573">https://bugzilla.suse.com/show_bug.cgi?id=1224573</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224585">https://bugzilla.suse.com/show_bug.cgi?id=1224585</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224604">https://bugzilla.suse.com/show_bug.cgi?id=1224604</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224636">https://bugzilla.suse.com/show_bug.cgi?id=1224636</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224641">https://bugzilla.suse.com/show_bug.cgi?id=1224641</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224683">https://bugzilla.suse.com/show_bug.cgi?id=1224683</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224694">https://bugzilla.suse.com/show_bug.cgi?id=1224694</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224700">https://bugzilla.suse.com/show_bug.cgi?id=1224700</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224743">https://bugzilla.suse.com/show_bug.cgi?id=1224743</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225088">https://bugzilla.suse.com/show_bug.cgi?id=1225088</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225272">https://bugzilla.suse.com/show_bug.cgi?id=1225272</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225301">https://bugzilla.suse.com/show_bug.cgi?id=1225301</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225475">https://bugzilla.suse.com/show_bug.cgi?id=1225475</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225489">https://bugzilla.suse.com/show_bug.cgi?id=1225489</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225504">https://bugzilla.suse.com/show_bug.cgi?id=1225504</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225505">https://bugzilla.suse.com/show_bug.cgi?id=1225505</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225564">https://bugzilla.suse.com/show_bug.cgi?id=1225564</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225573">https://bugzilla.suse.com/show_bug.cgi?id=1225573</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225581">https://bugzilla.suse.com/show_bug.cgi?id=1225581</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225586">https://bugzilla.suse.com/show_bug.cgi?id=1225586</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225711">https://bugzilla.suse.com/show_bug.cgi?id=1225711</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225717">https://bugzilla.suse.com/show_bug.cgi?id=1225717</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225719">https://bugzilla.suse.com/show_bug.cgi?id=1225719</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225744">https://bugzilla.suse.com/show_bug.cgi?id=1225744</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225745">https://bugzilla.suse.com/show_bug.cgi?id=1225745</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225746">https://bugzilla.suse.com/show_bug.cgi?id=1225746</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225752">https://bugzilla.suse.com/show_bug.cgi?id=1225752</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225753">https://bugzilla.suse.com/show_bug.cgi?id=1225753</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225757">https://bugzilla.suse.com/show_bug.cgi?id=1225757</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225767">https://bugzilla.suse.com/show_bug.cgi?id=1225767</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225810">https://bugzilla.suse.com/show_bug.cgi?id=1225810</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225815">https://bugzilla.suse.com/show_bug.cgi?id=1225815</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225820">https://bugzilla.suse.com/show_bug.cgi?id=1225820</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225829">https://bugzilla.suse.com/show_bug.cgi?id=1225829</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225835">https://bugzilla.suse.com/show_bug.cgi?id=1225835</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225838">https://bugzilla.suse.com/show_bug.cgi?id=1225838</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225839">https://bugzilla.suse.com/show_bug.cgi?id=1225839</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225843">https://bugzilla.suse.com/show_bug.cgi?id=1225843</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225847">https://bugzilla.suse.com/show_bug.cgi?id=1225847</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225851">https://bugzilla.suse.com/show_bug.cgi?id=1225851</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225856">https://bugzilla.suse.com/show_bug.cgi?id=1225856</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225895">https://bugzilla.suse.com/show_bug.cgi?id=1225895</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225898">https://bugzilla.suse.com/show_bug.cgi?id=1225898</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225903">https://bugzilla.suse.com/show_bug.cgi?id=1225903</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226202">https://bugzilla.suse.com/show_bug.cgi?id=1226202</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226502">https://bugzilla.suse.com/show_bug.cgi?id=1226502</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226519">https://bugzilla.suse.com/show_bug.cgi?id=1226519</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226551">https://bugzilla.suse.com/show_bug.cgi?id=1226551</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226555">https://bugzilla.suse.com/show_bug.cgi?id=1226555</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226565">https://bugzilla.suse.com/show_bug.cgi?id=1226565</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226568">https://bugzilla.suse.com/show_bug.cgi?id=1226568</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226570">https://bugzilla.suse.com/show_bug.cgi?id=1226570</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226571">https://bugzilla.suse.com/show_bug.cgi?id=1226571</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226574">https://bugzilla.suse.com/show_bug.cgi?id=1226574</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226588">https://bugzilla.suse.com/show_bug.cgi?id=1226588</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226607">https://bugzilla.suse.com/show_bug.cgi?id=1226607</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226650">https://bugzilla.suse.com/show_bug.cgi?id=1226650</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226698">https://bugzilla.suse.com/show_bug.cgi?id=1226698</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226713">https://bugzilla.suse.com/show_bug.cgi?id=1226713</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226716">https://bugzilla.suse.com/show_bug.cgi?id=1226716</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226750">https://bugzilla.suse.com/show_bug.cgi?id=1226750</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226757">https://bugzilla.suse.com/show_bug.cgi?id=1226757</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226758">https://bugzilla.suse.com/show_bug.cgi?id=1226758</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226775">https://bugzilla.suse.com/show_bug.cgi?id=1226775</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226783">https://bugzilla.suse.com/show_bug.cgi?id=1226783</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226785">https://bugzilla.suse.com/show_bug.cgi?id=1226785</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226834">https://bugzilla.suse.com/show_bug.cgi?id=1226834</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226837">https://bugzilla.suse.com/show_bug.cgi?id=1226837</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226911">https://bugzilla.suse.com/show_bug.cgi?id=1226911</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226990">https://bugzilla.suse.com/show_bug.cgi?id=1226990</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226993">https://bugzilla.suse.com/show_bug.cgi?id=1226993</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227090">https://bugzilla.suse.com/show_bug.cgi?id=1227090</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227121">https://bugzilla.suse.com/show_bug.cgi?id=1227121</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227157">https://bugzilla.suse.com/show_bug.cgi?id=1227157</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227162">https://bugzilla.suse.com/show_bug.cgi?id=1227162</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227362">https://bugzilla.suse.com/show_bug.cgi?id=1227362</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227383">https://bugzilla.suse.com/show_bug.cgi?id=1227383</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227432">https://bugzilla.suse.com/show_bug.cgi?id=1227432</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227435">https://bugzilla.suse.com/show_bug.cgi?id=1227435</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227447">https://bugzilla.suse.com/show_bug.cgi?id=1227447</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227487">https://bugzilla.suse.com/show_bug.cgi?id=1227487</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227549">https://bugzilla.suse.com/show_bug.cgi?id=1227549</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227573">https://bugzilla.suse.com/show_bug.cgi?id=1227573</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227618">https://bugzilla.suse.com/show_bug.cgi?id=1227618</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227620">https://bugzilla.suse.com/show_bug.cgi?id=1227620</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227626">https://bugzilla.suse.com/show_bug.cgi?id=1227626</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227635">https://bugzilla.suse.com/show_bug.cgi?id=1227635</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227661">https://bugzilla.suse.com/show_bug.cgi?id=1227661</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227716">https://bugzilla.suse.com/show_bug.cgi?id=1227716</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227722">https://bugzilla.suse.com/show_bug.cgi?id=1227722</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227724">https://bugzilla.suse.com/show_bug.cgi?id=1227724</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227725">https://bugzilla.suse.com/show_bug.cgi?id=1227725</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227728">https://bugzilla.suse.com/show_bug.cgi?id=1227728</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227729">https://bugzilla.suse.com/show_bug.cgi?id=1227729</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227730">https://bugzilla.suse.com/show_bug.cgi?id=1227730</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227732">https://bugzilla.suse.com/show_bug.cgi?id=1227732</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227733">https://bugzilla.suse.com/show_bug.cgi?id=1227733</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227750">https://bugzilla.suse.com/show_bug.cgi?id=1227750</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227754">https://bugzilla.suse.com/show_bug.cgi?id=1227754</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227755">https://bugzilla.suse.com/show_bug.cgi?id=1227755</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227760">https://bugzilla.suse.com/show_bug.cgi?id=1227760</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227762">https://bugzilla.suse.com/show_bug.cgi?id=1227762</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227763">https://bugzilla.suse.com/show_bug.cgi?id=1227763</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227764">https://bugzilla.suse.com/show_bug.cgi?id=1227764</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227766">https://bugzilla.suse.com/show_bug.cgi?id=1227766</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227770">https://bugzilla.suse.com/show_bug.cgi?id=1227770</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227771">https://bugzilla.suse.com/show_bug.cgi?id=1227771</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227772">https://bugzilla.suse.com/show_bug.cgi?id=1227772</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227774">https://bugzilla.suse.com/show_bug.cgi?id=1227774</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227779">https://bugzilla.suse.com/show_bug.cgi?id=1227779</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227780">https://bugzilla.suse.com/show_bug.cgi?id=1227780</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227783">https://bugzilla.suse.com/show_bug.cgi?id=1227783</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227786">https://bugzilla.suse.com/show_bug.cgi?id=1227786</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227787">https://bugzilla.suse.com/show_bug.cgi?id=1227787</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227790">https://bugzilla.suse.com/show_bug.cgi?id=1227790</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227792">https://bugzilla.suse.com/show_bug.cgi?id=1227792</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227796">https://bugzilla.suse.com/show_bug.cgi?id=1227796</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227797">https://bugzilla.suse.com/show_bug.cgi?id=1227797</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227798">https://bugzilla.suse.com/show_bug.cgi?id=1227798</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227800">https://bugzilla.suse.com/show_bug.cgi?id=1227800</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227802">https://bugzilla.suse.com/show_bug.cgi?id=1227802</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227806">https://bugzilla.suse.com/show_bug.cgi?id=1227806</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227808">https://bugzilla.suse.com/show_bug.cgi?id=1227808</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227810">https://bugzilla.suse.com/show_bug.cgi?id=1227810</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227812">https://bugzilla.suse.com/show_bug.cgi?id=1227812</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227813">https://bugzilla.suse.com/show_bug.cgi?id=1227813</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227814">https://bugzilla.suse.com/show_bug.cgi?id=1227814</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227816">https://bugzilla.suse.com/show_bug.cgi?id=1227816</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227820">https://bugzilla.suse.com/show_bug.cgi?id=1227820</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227823">https://bugzilla.suse.com/show_bug.cgi?id=1227823</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227824">https://bugzilla.suse.com/show_bug.cgi?id=1227824</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227828">https://bugzilla.suse.com/show_bug.cgi?id=1227828</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227829">https://bugzilla.suse.com/show_bug.cgi?id=1227829</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227836">https://bugzilla.suse.com/show_bug.cgi?id=1227836</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227846">https://bugzilla.suse.com/show_bug.cgi?id=1227846</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227849">https://bugzilla.suse.com/show_bug.cgi?id=1227849</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227851">https://bugzilla.suse.com/show_bug.cgi?id=1227851</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227862">https://bugzilla.suse.com/show_bug.cgi?id=1227862</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227864">https://bugzilla.suse.com/show_bug.cgi?id=1227864</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227865">https://bugzilla.suse.com/show_bug.cgi?id=1227865</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227866">https://bugzilla.suse.com/show_bug.cgi?id=1227866</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227870">https://bugzilla.suse.com/show_bug.cgi?id=1227870</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227884">https://bugzilla.suse.com/show_bug.cgi?id=1227884</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227886">https://bugzilla.suse.com/show_bug.cgi?id=1227886</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227891">https://bugzilla.suse.com/show_bug.cgi?id=1227891</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227893">https://bugzilla.suse.com/show_bug.cgi?id=1227893</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227899">https://bugzilla.suse.com/show_bug.cgi?id=1227899</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227900">https://bugzilla.suse.com/show_bug.cgi?id=1227900</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227910">https://bugzilla.suse.com/show_bug.cgi?id=1227910</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227913">https://bugzilla.suse.com/show_bug.cgi?id=1227913</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227917">https://bugzilla.suse.com/show_bug.cgi?id=1227917</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227919">https://bugzilla.suse.com/show_bug.cgi?id=1227919</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227920">https://bugzilla.suse.com/show_bug.cgi?id=1227920</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227921">https://bugzilla.suse.com/show_bug.cgi?id=1227921</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227922">https://bugzilla.suse.com/show_bug.cgi?id=1227922</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227923">https://bugzilla.suse.com/show_bug.cgi?id=1227923</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227924">https://bugzilla.suse.com/show_bug.cgi?id=1227924</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227925">https://bugzilla.suse.com/show_bug.cgi?id=1227925</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227927">https://bugzilla.suse.com/show_bug.cgi?id=1227927</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227928">https://bugzilla.suse.com/show_bug.cgi?id=1227928</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227931">https://bugzilla.suse.com/show_bug.cgi?id=1227931</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227932">https://bugzilla.suse.com/show_bug.cgi?id=1227932</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227933">https://bugzilla.suse.com/show_bug.cgi?id=1227933</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227935">https://bugzilla.suse.com/show_bug.cgi?id=1227935</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227936">https://bugzilla.suse.com/show_bug.cgi?id=1227936</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227938">https://bugzilla.suse.com/show_bug.cgi?id=1227938</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227941">https://bugzilla.suse.com/show_bug.cgi?id=1227941</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227942">https://bugzilla.suse.com/show_bug.cgi?id=1227942</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227944">https://bugzilla.suse.com/show_bug.cgi?id=1227944</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227945">https://bugzilla.suse.com/show_bug.cgi?id=1227945</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227947">https://bugzilla.suse.com/show_bug.cgi?id=1227947</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227948">https://bugzilla.suse.com/show_bug.cgi?id=1227948</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227949">https://bugzilla.suse.com/show_bug.cgi?id=1227949</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227950">https://bugzilla.suse.com/show_bug.cgi?id=1227950</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227952">https://bugzilla.suse.com/show_bug.cgi?id=1227952</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227953">https://bugzilla.suse.com/show_bug.cgi?id=1227953</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227954">https://bugzilla.suse.com/show_bug.cgi?id=1227954</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227956">https://bugzilla.suse.com/show_bug.cgi?id=1227956</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227957">https://bugzilla.suse.com/show_bug.cgi?id=1227957</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227963">https://bugzilla.suse.com/show_bug.cgi?id=1227963</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227964">https://bugzilla.suse.com/show_bug.cgi?id=1227964</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227965">https://bugzilla.suse.com/show_bug.cgi?id=1227965</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227968">https://bugzilla.suse.com/show_bug.cgi?id=1227968</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227969">https://bugzilla.suse.com/show_bug.cgi?id=1227969</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227970">https://bugzilla.suse.com/show_bug.cgi?id=1227970</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227971">https://bugzilla.suse.com/show_bug.cgi?id=1227971</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227972">https://bugzilla.suse.com/show_bug.cgi?id=1227972</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227975">https://bugzilla.suse.com/show_bug.cgi?id=1227975</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227976">https://bugzilla.suse.com/show_bug.cgi?id=1227976</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227981">https://bugzilla.suse.com/show_bug.cgi?id=1227981</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227982">https://bugzilla.suse.com/show_bug.cgi?id=1227982</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227985">https://bugzilla.suse.com/show_bug.cgi?id=1227985</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227986">https://bugzilla.suse.com/show_bug.cgi?id=1227986</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227987">https://bugzilla.suse.com/show_bug.cgi?id=1227987</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227988">https://bugzilla.suse.com/show_bug.cgi?id=1227988</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227989">https://bugzilla.suse.com/show_bug.cgi?id=1227989</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227990">https://bugzilla.suse.com/show_bug.cgi?id=1227990</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227991">https://bugzilla.suse.com/show_bug.cgi?id=1227991</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227992">https://bugzilla.suse.com/show_bug.cgi?id=1227992</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227993">https://bugzilla.suse.com/show_bug.cgi?id=1227993</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227995">https://bugzilla.suse.com/show_bug.cgi?id=1227995</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227996">https://bugzilla.suse.com/show_bug.cgi?id=1227996</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227997">https://bugzilla.suse.com/show_bug.cgi?id=1227997</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228000">https://bugzilla.suse.com/show_bug.cgi?id=1228000</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228002">https://bugzilla.suse.com/show_bug.cgi?id=1228002</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228003">https://bugzilla.suse.com/show_bug.cgi?id=1228003</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228004">https://bugzilla.suse.com/show_bug.cgi?id=1228004</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228005">https://bugzilla.suse.com/show_bug.cgi?id=1228005</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228006">https://bugzilla.suse.com/show_bug.cgi?id=1228006</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228007">https://bugzilla.suse.com/show_bug.cgi?id=1228007</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228008">https://bugzilla.suse.com/show_bug.cgi?id=1228008</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228009">https://bugzilla.suse.com/show_bug.cgi?id=1228009</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228010">https://bugzilla.suse.com/show_bug.cgi?id=1228010</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228011">https://bugzilla.suse.com/show_bug.cgi?id=1228011</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228013">https://bugzilla.suse.com/show_bug.cgi?id=1228013</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228014">https://bugzilla.suse.com/show_bug.cgi?id=1228014</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228015">https://bugzilla.suse.com/show_bug.cgi?id=1228015</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228019">https://bugzilla.suse.com/show_bug.cgi?id=1228019</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228020">https://bugzilla.suse.com/show_bug.cgi?id=1228020</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228025">https://bugzilla.suse.com/show_bug.cgi?id=1228025</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228028">https://bugzilla.suse.com/show_bug.cgi?id=1228028</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228035">https://bugzilla.suse.com/show_bug.cgi?id=1228035</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228037">https://bugzilla.suse.com/show_bug.cgi?id=1228037</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228038">https://bugzilla.suse.com/show_bug.cgi?id=1228038</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228039">https://bugzilla.suse.com/show_bug.cgi?id=1228039</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228040">https://bugzilla.suse.com/show_bug.cgi?id=1228040</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228045">https://bugzilla.suse.com/show_bug.cgi?id=1228045</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228054">https://bugzilla.suse.com/show_bug.cgi?id=1228054</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228055">https://bugzilla.suse.com/show_bug.cgi?id=1228055</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228056">https://bugzilla.suse.com/show_bug.cgi?id=1228056</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228060">https://bugzilla.suse.com/show_bug.cgi?id=1228060</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228061">https://bugzilla.suse.com/show_bug.cgi?id=1228061</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228062">https://bugzilla.suse.com/show_bug.cgi?id=1228062</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228063">https://bugzilla.suse.com/show_bug.cgi?id=1228063</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228064">https://bugzilla.suse.com/show_bug.cgi?id=1228064</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228066">https://bugzilla.suse.com/show_bug.cgi?id=1228066</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228067">https://bugzilla.suse.com/show_bug.cgi?id=1228067</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228068">https://bugzilla.suse.com/show_bug.cgi?id=1228068</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228071">https://bugzilla.suse.com/show_bug.cgi?id=1228071</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228079">https://bugzilla.suse.com/show_bug.cgi?id=1228079</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228090">https://bugzilla.suse.com/show_bug.cgi?id=1228090</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228114">https://bugzilla.suse.com/show_bug.cgi?id=1228114</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228140">https://bugzilla.suse.com/show_bug.cgi?id=1228140</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228190">https://bugzilla.suse.com/show_bug.cgi?id=1228190</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228191">https://bugzilla.suse.com/show_bug.cgi?id=1228191</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228195">https://bugzilla.suse.com/show_bug.cgi?id=1228195</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228202">https://bugzilla.suse.com/show_bug.cgi?id=1228202</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228226">https://bugzilla.suse.com/show_bug.cgi?id=1228226</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228235">https://bugzilla.suse.com/show_bug.cgi?id=1228235</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228237">https://bugzilla.suse.com/show_bug.cgi?id=1228237</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228247">https://bugzilla.suse.com/show_bug.cgi?id=1228247</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228327">https://bugzilla.suse.com/show_bug.cgi?id=1228327</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228328">https://bugzilla.suse.com/show_bug.cgi?id=1228328</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228330">https://bugzilla.suse.com/show_bug.cgi?id=1228330</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228403">https://bugzilla.suse.com/show_bug.cgi?id=1228403</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228405">https://bugzilla.suse.com/show_bug.cgi?id=1228405</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228408">https://bugzilla.suse.com/show_bug.cgi?id=1228408</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228409">https://bugzilla.suse.com/show_bug.cgi?id=1228409</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228410">https://bugzilla.suse.com/show_bug.cgi?id=1228410</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228418">https://bugzilla.suse.com/show_bug.cgi?id=1228418</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228440">https://bugzilla.suse.com/show_bug.cgi?id=1228440</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228459">https://bugzilla.suse.com/show_bug.cgi?id=1228459</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228462">https://bugzilla.suse.com/show_bug.cgi?id=1228462</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228470">https://bugzilla.suse.com/show_bug.cgi?id=1228470</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228518">https://bugzilla.suse.com/show_bug.cgi?id=1228518</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228520">https://bugzilla.suse.com/show_bug.cgi?id=1228520</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228530">https://bugzilla.suse.com/show_bug.cgi?id=1228530</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228561">https://bugzilla.suse.com/show_bug.cgi?id=1228561</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228565">https://bugzilla.suse.com/show_bug.cgi?id=1228565</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228580">https://bugzilla.suse.com/show_bug.cgi?id=1228580</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228581">https://bugzilla.suse.com/show_bug.cgi?id=1228581</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228591">https://bugzilla.suse.com/show_bug.cgi?id=1228591</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228599">https://bugzilla.suse.com/show_bug.cgi?id=1228599</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228617">https://bugzilla.suse.com/show_bug.cgi?id=1228617</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228625">https://bugzilla.suse.com/show_bug.cgi?id=1228625</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228626">https://bugzilla.suse.com/show_bug.cgi?id=1228626</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228633">https://bugzilla.suse.com/show_bug.cgi?id=1228633</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228640">https://bugzilla.suse.com/show_bug.cgi?id=1228640</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228644">https://bugzilla.suse.com/show_bug.cgi?id=1228644</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228649">https://bugzilla.suse.com/show_bug.cgi?id=1228649</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228655">https://bugzilla.suse.com/show_bug.cgi?id=1228655</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228665">https://bugzilla.suse.com/show_bug.cgi?id=1228665</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228672">https://bugzilla.suse.com/show_bug.cgi?id=1228672</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228680">https://bugzilla.suse.com/show_bug.cgi?id=1228680</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228705">https://bugzilla.suse.com/show_bug.cgi?id=1228705</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228723">https://bugzilla.suse.com/show_bug.cgi?id=1228723</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228743">https://bugzilla.suse.com/show_bug.cgi?id=1228743</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228756">https://bugzilla.suse.com/show_bug.cgi?id=1228756</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228801">https://bugzilla.suse.com/show_bug.cgi?id=1228801</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228850">https://bugzilla.suse.com/show_bug.cgi?id=1228850</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228857">https://bugzilla.suse.com/show_bug.cgi?id=1228857</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-8582">https://jira.suse.com/browse/PED-8582</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-8690">https://jira.suse.com/browse/PED-8690</a>
</li>


</ul>

</div>

--===============4568288300297206905==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung