Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: SUSE-SU-2024:3195-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Server for SAP Applications 15 SP6, SUSE Linux Enterprise Server 15 SP6, SUSE Linux Enterprise Real Time 15 SP6, SUSE openSUSE Leap 15.6, SUSE Linux Enterprise Live Patching 15-SP6, SUSE Real Time Module 15-SP6
Datum: Di, 10. September 2024, 19:27
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39510
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36970
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40926
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42157
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42237
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41057
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43895
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43841
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42223
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52688
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43894
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26758
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42279
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40929
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42259
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42316
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43892
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43877
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42148
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42315
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43872
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42122
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40916
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41038
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39486
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43866
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40936
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42278
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43876
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43883
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43897
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42320
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40962
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42127
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39501
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26682
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42240
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42277
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43833
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40910
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35897
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40909
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42303
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43907
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42289
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42104
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42239
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43831
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38662
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43867
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42109
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42253
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36929
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43871
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42152
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52756
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26590
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41025
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42280
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42107
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43875
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52766
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38548
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42314
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36907
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43909
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42281
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40934
Applikationen: Linux

Originalnachricht

--===============6623829598228459008==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:3195-1
Rating: important
References:

* bsc#1012628
* bsc#1193454
* bsc#1194869
* bsc#1205462
* bsc#1208783
* bsc#1213123
* bsc#1214285
* bsc#1215199
* bsc#1219596
* bsc#1220066
* bsc#1220252
* bsc#1220877
* bsc#1221326
* bsc#1221630
* bsc#1221645
* bsc#1221652
* bsc#1221857
* bsc#1222254
* bsc#1222335
* bsc#1222350
* bsc#1222364
* bsc#1222372
* bsc#1222387
* bsc#1222433
* bsc#1222434
* bsc#1222625
* bsc#1222633
* bsc#1222634
* bsc#1222777
* bsc#1222808
* bsc#1222967
* bsc#1222973
* bsc#1223053
* bsc#1223074
* bsc#1223191
* bsc#1223395
* bsc#1223635
* bsc#1223720
* bsc#1223731
* bsc#1223742
* bsc#1223763
* bsc#1223767
* bsc#1223777
* bsc#1223803
* bsc#1224105
* bsc#1224415
* bsc#1224485
* bsc#1224496
* bsc#1224510
* bsc#1224535
* bsc#1224631
* bsc#1224636
* bsc#1224690
* bsc#1224694
* bsc#1224700
* bsc#1224711
* bsc#1225461
* bsc#1225474
* bsc#1225475
* bsc#1225582
* bsc#1225607
* bsc#1225718
* bsc#1225751
* bsc#1225814
* bsc#1225832
* bsc#1225838
* bsc#1225903
* bsc#1226031
* bsc#1226127
* bsc#1226502
* bsc#1226530
* bsc#1226588
* bsc#1226604
* bsc#1226743
* bsc#1226751
* bsc#1226765
* bsc#1226798
* bsc#1226801
* bsc#1226834
* bsc#1226874
* bsc#1226885
* bsc#1226920
* bsc#1227149
* bsc#1227182
* bsc#1227383
* bsc#1227437
* bsc#1227492
* bsc#1227493
* bsc#1227494
* bsc#1227618
* bsc#1227620
* bsc#1227623
* bsc#1227627
* bsc#1227634
* bsc#1227706
* bsc#1227722
* bsc#1227724
* bsc#1227725
* bsc#1227728
* bsc#1227729
* bsc#1227732
* bsc#1227733
* bsc#1227734
* bsc#1227747
* bsc#1227750
* bsc#1227754
* bsc#1227758
* bsc#1227760
* bsc#1227761
* bsc#1227764
* bsc#1227766
* bsc#1227770
* bsc#1227771
* bsc#1227772
* bsc#1227774
* bsc#1227781
* bsc#1227784
* bsc#1227785
* bsc#1227787
* bsc#1227790
* bsc#1227791
* bsc#1227792
* bsc#1227796
* bsc#1227798
* bsc#1227799
* bsc#1227802
* bsc#1227808
* bsc#1227810
* bsc#1227811
* bsc#1227812
* bsc#1227815
* bsc#1227816
* bsc#1227818
* bsc#1227820
* bsc#1227823
* bsc#1227824
* bsc#1227826
* bsc#1227828
* bsc#1227829
* bsc#1227830
* bsc#1227832
* bsc#1227833
* bsc#1227834
* bsc#1227839
* bsc#1227840
* bsc#1227846
* bsc#1227849
* bsc#1227851
* bsc#1227853
* bsc#1227863
* bsc#1227864
* bsc#1227865
* bsc#1227867
* bsc#1227869
* bsc#1227870
* bsc#1227883
* bsc#1227884
* bsc#1227891
* bsc#1227893
* bsc#1227929
* bsc#1227950
* bsc#1227957
* bsc#1227981
* bsc#1228020
* bsc#1228021
* bsc#1228114
* bsc#1228192
* bsc#1228195
* bsc#1228202
* bsc#1228235
* bsc#1228236
* bsc#1228237
* bsc#1228247
* bsc#1228321
* bsc#1228409
* bsc#1228410
* bsc#1228426
* bsc#1228427
* bsc#1228429
* bsc#1228446
* bsc#1228447
* bsc#1228449
* bsc#1228450
* bsc#1228452
* bsc#1228456
* bsc#1228457
* bsc#1228458
* bsc#1228459
* bsc#1228460
* bsc#1228462
* bsc#1228463
* bsc#1228466
* bsc#1228467
* bsc#1228468
* bsc#1228469
* bsc#1228470
* bsc#1228472
* bsc#1228479
* bsc#1228480
* bsc#1228481
* bsc#1228482
* bsc#1228483
* bsc#1228484
* bsc#1228485
* bsc#1228486
* bsc#1228487
* bsc#1228489
* bsc#1228491
* bsc#1228492
* bsc#1228493
* bsc#1228494
* bsc#1228495
* bsc#1228496
* bsc#1228499
* bsc#1228500
* bsc#1228501
* bsc#1228502
* bsc#1228503
* bsc#1228505
* bsc#1228508
* bsc#1228509
* bsc#1228510
* bsc#1228511
* bsc#1228513
* bsc#1228515
* bsc#1228516
* bsc#1228518
* bsc#1228520
* bsc#1228525
* bsc#1228527
* bsc#1228530
* bsc#1228531
* bsc#1228539
* bsc#1228561
* bsc#1228563
* bsc#1228564
* bsc#1228565
* bsc#1228567
* bsc#1228568
* bsc#1228572
* bsc#1228576
* bsc#1228579
* bsc#1228580
* bsc#1228581
* bsc#1228582
* bsc#1228584
* bsc#1228586
* bsc#1228588
* bsc#1228590
* bsc#1228591
* bsc#1228599
* bsc#1228615
* bsc#1228616
* bsc#1228617
* bsc#1228625
* bsc#1228626
* bsc#1228633
* bsc#1228635
* bsc#1228636
* bsc#1228640
* bsc#1228643
* bsc#1228644
* bsc#1228646
* bsc#1228649
* bsc#1228650
* bsc#1228654
* bsc#1228655
* bsc#1228656
* bsc#1228658
* bsc#1228660
* bsc#1228662
* bsc#1228665
* bsc#1228666
* bsc#1228667
* bsc#1228672
* bsc#1228673
* bsc#1228674
* bsc#1228677
* bsc#1228680
* bsc#1228687
* bsc#1228705
* bsc#1228706
* bsc#1228707
* bsc#1228708
* bsc#1228709
* bsc#1228710
* bsc#1228718
* bsc#1228720
* bsc#1228721
* bsc#1228722
* bsc#1228723
* bsc#1228724
* bsc#1228726
* bsc#1228727
* bsc#1228733
* bsc#1228737
* bsc#1228743
* bsc#1228748
* bsc#1228754
* bsc#1228756
* bsc#1228757
* bsc#1228758
* bsc#1228764
* bsc#1228766
* bsc#1228779
* bsc#1228801
* bsc#1228849
* bsc#1228850
* bsc#1228857
* bsc#1228959
* bsc#1228964
* bsc#1228966
* bsc#1228967
* bsc#1228973
* bsc#1228977
* bsc#1228978
* bsc#1228979
* bsc#1228986
* bsc#1228988
* bsc#1228989
* bsc#1228991
* bsc#1228992
* bsc#1229005
* bsc#1229024
* bsc#1229042
* bsc#1229045
* bsc#1229046
* bsc#1229054
* bsc#1229056
* bsc#1229086
* bsc#1229134
* bsc#1229136
* bsc#1229154
* bsc#1229156
* bsc#1229160
* bsc#1229167
* bsc#1229168
* bsc#1229169
* bsc#1229170
* bsc#1229171
* bsc#1229172
* bsc#1229173
* bsc#1229174
* bsc#1229239
* bsc#1229240
* bsc#1229241
* bsc#1229243
* bsc#1229244
* bsc#1229245
* bsc#1229246
* bsc#1229247
* bsc#1229248
* bsc#1229249
* bsc#1229250
* bsc#1229251
* bsc#1229252
* bsc#1229253
* bsc#1229254
* bsc#1229255
* bsc#1229256
* bsc#1229287
* bsc#1229290
* bsc#1229291
* bsc#1229292
* bsc#1229294
* bsc#1229296
* bsc#1229297
* bsc#1229298
* bsc#1229299
* bsc#1229301
* bsc#1229303
* bsc#1229304
* bsc#1229305
* bsc#1229307
* bsc#1229309
* bsc#1229312
* bsc#1229313
* bsc#1229314
* bsc#1229315
* bsc#1229316
* bsc#1229317
* bsc#1229318
* bsc#1229319
* bsc#1229320
* bsc#1229327
* bsc#1229341
* bsc#1229342
* bsc#1229344
* bsc#1229345
* bsc#1229346
* bsc#1229347
* bsc#1229349
* bsc#1229350
* bsc#1229351
* bsc#1229353
* bsc#1229354
* bsc#1229355
* bsc#1229356
* bsc#1229357
* bsc#1229358
* bsc#1229359
* bsc#1229360
* bsc#1229365
* bsc#1229366
* bsc#1229369
* bsc#1229370
* bsc#1229373
* bsc#1229374
* bsc#1229379
* bsc#1229381
* bsc#1229382
* bsc#1229383
* bsc#1229386
* bsc#1229388
* bsc#1229390
* bsc#1229391
* bsc#1229392
* bsc#1229395
* bsc#1229398
* bsc#1229399
* bsc#1229400
* bsc#1229402
* bsc#1229403
* bsc#1229404
* bsc#1229407
* bsc#1229409
* bsc#1229410
* bsc#1229411
* bsc#1229413
* bsc#1229414
* bsc#1229417
* bsc#1229444
* bsc#1229451
* bsc#1229452
* bsc#1229455
* bsc#1229456
* bsc#1229480
* bsc#1229481
* bsc#1229482
* bsc#1229484
* bsc#1229485
* bsc#1229486
* bsc#1229487
* bsc#1229488
* bsc#1229489
* bsc#1229490
* bsc#1229493
* bsc#1229495
* bsc#1229496
* bsc#1229497
* bsc#1229500
* bsc#1229503
* bsc#1229707
* bsc#1229739
* bsc#1229743
* bsc#1229746
* bsc#1229747
* bsc#1229752
* bsc#1229754
* bsc#1229755
* bsc#1229756
* bsc#1229759
* bsc#1229761
* bsc#1229767
* bsc#1229781
* bsc#1229784
* bsc#1229785
* bsc#1229787
* bsc#1229788
* bsc#1229789
* bsc#1229792
* bsc#1229820
* bsc#1229827
* bsc#1229830
* bsc#1229837
* bsc#1229940
* bsc#1230056
* jsc#PED-10029
* jsc#PED-10045
* jsc#PED-10055
* jsc#PED-10105
* jsc#PED-10108
* jsc#PED-8779


Cross-References:

* CVE-2023-52489
* CVE-2023-52581
* CVE-2023-52668
* CVE-2023-52688
* CVE-2023-52756
* CVE-2023-52766
* CVE-2023-52800
* CVE-2023-52802
* CVE-2023-52859
* CVE-2023-52885
* CVE-2023-52886
* CVE-2023-52887
* CVE-2023-52889
* CVE-2024-26590
* CVE-2024-26631
* CVE-2024-26637
* CVE-2024-26668
* CVE-2024-26669
* CVE-2024-26677
* CVE-2024-26682
* CVE-2024-26683
* CVE-2024-26735
* CVE-2024-26758
* CVE-2024-26767
* CVE-2024-26808
* CVE-2024-26809
* CVE-2024-26812
* CVE-2024-26835
* CVE-2024-26837
* CVE-2024-26849
* CVE-2024-26851
* CVE-2024-26889
* CVE-2024-26920
* CVE-2024-26976
* CVE-2024-27010
* CVE-2024-27011
* CVE-2024-27024
* CVE-2024-27049
* CVE-2024-27050
* CVE-2024-27079
* CVE-2024-27403
* CVE-2024-27433
* CVE-2024-27437
* CVE-2024-31076
* CVE-2024-35855
* CVE-2024-35897
* CVE-2024-35902
* CVE-2024-35913
* CVE-2024-35939
* CVE-2024-35949
* CVE-2024-36270
* CVE-2024-36286
* CVE-2024-36288
* CVE-2024-36489
* CVE-2024-36881
* CVE-2024-36907
* CVE-2024-36929
* CVE-2024-36933
* CVE-2024-36939
* CVE-2024-36970
* CVE-2024-36979
* CVE-2024-38548
* CVE-2024-38563
* CVE-2024-38609
* CVE-2024-38662
* CVE-2024-39476
* CVE-2024-39483
* CVE-2024-39484
* CVE-2024-39486
* CVE-2024-39488
* CVE-2024-39489
* CVE-2024-39491
* CVE-2024-39493
* CVE-2024-39497
* CVE-2024-39499
* CVE-2024-39500
* CVE-2024-39501
* CVE-2024-39505
* CVE-2024-39506
* CVE-2024-39508
* CVE-2024-39509
* CVE-2024-39510
* CVE-2024-40899
* CVE-2024-40900
* CVE-2024-40902
* CVE-2024-40903
* CVE-2024-40904
* CVE-2024-40905
* CVE-2024-40909
* CVE-2024-40910
* CVE-2024-40911
* CVE-2024-40912
* CVE-2024-40913
* CVE-2024-40916
* CVE-2024-40920
* CVE-2024-40921
* CVE-2024-40922
* CVE-2024-40924
* CVE-2024-40926
* CVE-2024-40927
* CVE-2024-40929
* CVE-2024-40930
* CVE-2024-40932
* CVE-2024-40934
* CVE-2024-40936
* CVE-2024-40938
* CVE-2024-40939
* CVE-2024-40941
* CVE-2024-40942
* CVE-2024-40943
* CVE-2024-40944
* CVE-2024-40945
* CVE-2024-40954
* CVE-2024-40956
* CVE-2024-40957
* CVE-2024-40958
* CVE-2024-40959
* CVE-2024-40962
* CVE-2024-40964
* CVE-2024-40967
* CVE-2024-40976
* CVE-2024-40977
* CVE-2024-40978
* CVE-2024-40981
* CVE-2024-40982
* CVE-2024-40984
* CVE-2024-40987
* CVE-2024-40988
* CVE-2024-40989
* CVE-2024-40990
* CVE-2024-40992
* CVE-2024-40994
* CVE-2024-40995
* CVE-2024-40997
* CVE-2024-41000
* CVE-2024-41001
* CVE-2024-41002
* CVE-2024-41004
* CVE-2024-41007
* CVE-2024-41009
* CVE-2024-41010
* CVE-2024-41011
* CVE-2024-41012
* CVE-2024-41015
* CVE-2024-41016
* CVE-2024-41020
* CVE-2024-41022
* CVE-2024-41024
* CVE-2024-41025
* CVE-2024-41028
* CVE-2024-41032
* CVE-2024-41035
* CVE-2024-41036
* CVE-2024-41037
* CVE-2024-41038
* CVE-2024-41039
* CVE-2024-41040
* CVE-2024-41041
* CVE-2024-41044
* CVE-2024-41045
* CVE-2024-41048
* CVE-2024-41049
* CVE-2024-41050
* CVE-2024-41051
* CVE-2024-41056
* CVE-2024-41057
* CVE-2024-41058
* CVE-2024-41059
* CVE-2024-41060
* CVE-2024-41061
* CVE-2024-41062
* CVE-2024-41063
* CVE-2024-41064
* CVE-2024-41065
* CVE-2024-41066
* CVE-2024-41068
* CVE-2024-41069
* CVE-2024-41070
* CVE-2024-41071
* CVE-2024-41072
* CVE-2024-41073
* CVE-2024-41074
* CVE-2024-41075
* CVE-2024-41076
* CVE-2024-41078
* CVE-2024-41079
* CVE-2024-41080
* CVE-2024-41081
* CVE-2024-41084
* CVE-2024-41087
* CVE-2024-41088
* CVE-2024-41089
* CVE-2024-41092
* CVE-2024-41093
* CVE-2024-41094
* CVE-2024-41095
* CVE-2024-41096
* CVE-2024-41097
* CVE-2024-41098
* CVE-2024-42064
* CVE-2024-42069
* CVE-2024-42070
* CVE-2024-42073
* CVE-2024-42074
* CVE-2024-42076
* CVE-2024-42077
* CVE-2024-42079
* CVE-2024-42080
* CVE-2024-42082
* CVE-2024-42085
* CVE-2024-42086
* CVE-2024-42087
* CVE-2024-42089
* CVE-2024-42090
* CVE-2024-42092
* CVE-2024-42093
* CVE-2024-42095
* CVE-2024-42096
* CVE-2024-42097
* CVE-2024-42098
* CVE-2024-42101
* CVE-2024-42104
* CVE-2024-42105
* CVE-2024-42106
* CVE-2024-42107
* CVE-2024-42109
* CVE-2024-42110
* CVE-2024-42113
* CVE-2024-42114
* CVE-2024-42115
* CVE-2024-42117
* CVE-2024-42119
* CVE-2024-42120
* CVE-2024-42121
* CVE-2024-42122
* CVE-2024-42124
* CVE-2024-42125
* CVE-2024-42126
* CVE-2024-42127
* CVE-2024-42130
* CVE-2024-42131
* CVE-2024-42132
* CVE-2024-42133
* CVE-2024-42136
* CVE-2024-42137
* CVE-2024-42138
* CVE-2024-42139
* CVE-2024-42141
* CVE-2024-42142
* CVE-2024-42143
* CVE-2024-42144
* CVE-2024-42145
* CVE-2024-42147
* CVE-2024-42148
* CVE-2024-42152
* CVE-2024-42153
* CVE-2024-42155
* CVE-2024-42156
* CVE-2024-42157
* CVE-2024-42158
* CVE-2024-42159
* CVE-2024-42161
* CVE-2024-42162
* CVE-2024-42223
* CVE-2024-42224
* CVE-2024-42225
* CVE-2024-42226
* CVE-2024-42227
* CVE-2024-42228
* CVE-2024-42229
* CVE-2024-42230
* CVE-2024-42232
* CVE-2024-42236
* CVE-2024-42237
* CVE-2024-42238
* CVE-2024-42239
* CVE-2024-42240
* CVE-2024-42241
* CVE-2024-42244
* CVE-2024-42245
* CVE-2024-42246
* CVE-2024-42247
* CVE-2024-42250
* CVE-2024-42253
* CVE-2024-42259
* CVE-2024-42268
* CVE-2024-42269
* CVE-2024-42270
* CVE-2024-42271
* CVE-2024-42274
* CVE-2024-42276
* CVE-2024-42277
* CVE-2024-42278
* CVE-2024-42279
* CVE-2024-42280
* CVE-2024-42281
* CVE-2024-42283
* CVE-2024-42284
* CVE-2024-42285
* CVE-2024-42286
* CVE-2024-42287
* CVE-2024-42288
* CVE-2024-42289
* CVE-2024-42290
* CVE-2024-42291
* CVE-2024-42292
* CVE-2024-42295
* CVE-2024-42298
* CVE-2024-42301
* CVE-2024-42302
* CVE-2024-42303
* CVE-2024-42308
* CVE-2024-42309
* CVE-2024-42310
* CVE-2024-42311
* CVE-2024-42312
* CVE-2024-42313
* CVE-2024-42314
* CVE-2024-42315
* CVE-2024-42316
* CVE-2024-42318
* CVE-2024-42319
* CVE-2024-42320
* CVE-2024-42322
* CVE-2024-43816
* CVE-2024-43817
* CVE-2024-43818
* CVE-2024-43819
* CVE-2024-43821
* CVE-2024-43823
* CVE-2024-43824
* CVE-2024-43825
* CVE-2024-43826
* CVE-2024-43829
* CVE-2024-43830
* CVE-2024-43831
* CVE-2024-43833
* CVE-2024-43834
* CVE-2024-43837
* CVE-2024-43839
* CVE-2024-43840
* CVE-2024-43841
* CVE-2024-43842
* CVE-2024-43846
* CVE-2024-43847
* CVE-2024-43849
* CVE-2024-43850
* CVE-2024-43851
* CVE-2024-43853
* CVE-2024-43854
* CVE-2024-43855
* CVE-2024-43856
* CVE-2024-43858
* CVE-2024-43860
* CVE-2024-43861
* CVE-2024-43863
* CVE-2024-43864
* CVE-2024-43866
* CVE-2024-43867
* CVE-2024-43871
* CVE-2024-43872
* CVE-2024-43873
* CVE-2024-43874
* CVE-2024-43875
* CVE-2024-43876
* CVE-2024-43877
* CVE-2024-43879
* CVE-2024-43880
* CVE-2024-43881
* CVE-2024-43882
* CVE-2024-43883
* CVE-2024-43884
* CVE-2024-43885
* CVE-2024-43889
* CVE-2024-43892
* CVE-2024-43893
* CVE-2024-43894
* CVE-2024-43895
* CVE-2024-43897
* CVE-2024-43899
* CVE-2024-43900
* CVE-2024-43902
* CVE-2024-43903
* CVE-2024-43905
* CVE-2024-43906
* CVE-2024-43907
* CVE-2024-43908
* CVE-2024-43909
* CVE-2024-43911
* CVE-2024-43912
* CVE-2024-44931
* CVE-2024-44938
* CVE-2024-44939


CVSS scores:

* CVE-2023-52489 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52756 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52802 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2023-52802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52885 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52885 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52886 ( NVD ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52887 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-52887 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2023-52889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26590 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26590 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26682 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26812 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26835 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-26837 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-26849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27024 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27049 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27050 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27437 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-31076 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-35949 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36270 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36286 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-36288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36489 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36881 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-36907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36929 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36933 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-36939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36970 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36979 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38563 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38662 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38662 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-39476 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39476 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39483 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-39483 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39484 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39486 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-39488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39489 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-39489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39491 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-39493 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-39493 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39497 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39499 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-39500 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39501 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39505 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-39506 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39506 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39508 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-39509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39510 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-39510 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40899 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40899 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40900 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-40902 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40903 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40903 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40910 ( SUSE ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40910 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40913 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40922 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-40924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40927 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40932 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-40932 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40934 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-40934 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40936 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-40938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40942 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40956 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40956 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40958 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40967 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40967 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40976 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40977 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40978 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40981 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-40981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40987 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-40988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40989 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40994 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40994 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41000 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41001 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-41001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41002 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-41002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41004 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-41007 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41007 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41011 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41011 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41012 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41015 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41020 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41020 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41022 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41022 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41024 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41024 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41025 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-41028 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41036 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41037 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41038 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-41038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41039 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41040 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41041 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-41044 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-41045 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41048 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41049 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41049 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41057 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41057 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41058 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41058 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-41058 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41060 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41061 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-41061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41062 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41063 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41063 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41064 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41064 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41065 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41065 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41066 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41066 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-41068 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41069 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41069 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41070 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41070 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41071 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-41071 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41072 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-41073 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41075 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41076 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41078 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41088 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41092 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41094 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41094 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41096 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41097 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42064 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42070 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-42070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42073 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42079 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42082 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42086 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42086 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-42087 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-42089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42093 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
* CVE-2024-42093 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42096 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42096 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-42097 ( SUSE ): 2.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-42097 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-42098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42104 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-42104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42105 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42105 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-42106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42109 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42115 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42115 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42117 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-42119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42125 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42130 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-42130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42132 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42133 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42136 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-42136 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-42137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42141 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42143 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-42143 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-42144 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42145 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42147 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42148 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42152 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42155 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-42155 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42155 ( NVD ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-42156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42156 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42157 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42158 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42159 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42159 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42161 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42161 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42161 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42162 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42224 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42225 ( NVD ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42226 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42226 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42227 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42227 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42228 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42229 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42229 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42230 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42230 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42230 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42232 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42232 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42236 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42236 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-42236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42238 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42240 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42241 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42244 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42244 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42246 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42247 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42250 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42250 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42253 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42253 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-42253 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42259 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42259 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-42268 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-42268 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42269 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42270 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42271 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42271 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42271 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42274 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42276 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42277 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42278 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42278 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42279 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42283 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42283 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42284 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42285 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42286 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42289 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42290 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42291 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42301 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42303 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42308 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42309 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42310 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42311 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-42311 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42313 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42314 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42314 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42315 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42316 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42316 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42322 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43818 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43823 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43837 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43872 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43874 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43881 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-43881 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-43882 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43882 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43883 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43883 ( SUSE ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43884 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43884 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43889 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43889 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43892 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43892 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43892 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43893 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43894 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43895 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43900 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43902 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43903 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43905 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43906 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43907 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43908 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43909 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43911 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43912 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-43912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-43912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44931 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-44931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44938 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44938 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44939 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H


Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Real Time Module 15-SP6



An update that solves 393 vulnerabilities, contains six features and has 84
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

* CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
* CVE-2023-52489: Fix race in accessing memory_section->usage
(bsc#1221326).
* CVE-2024-43821: Fix a possible null pointer dereference (bsc#1229315).
* CVE-2024-43911: Fix NULL dereference at band check in starting tx ba
session
(bsc#1229827).
* CVE-2024-42277: Avoid NULL deref in sprd_iommu_hw_en (bsc#1229409).
* CVE-2024-43880: Put back removed metod in struct objagg_ops (bsc#1229481).
* CVE-2024-43899: Fix null pointer deref in dcn20_resource.c (bsc#1229754).
* CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage.
(bsc#1229503)
* CVE-2024-43866: Always drain health in shutdown callback (bsc#1229495).
* CVE-2024-26812: Struct virqfd kABI workaround (bsc#1222808).
* CVE-2024-27010: Fix mirred deadlock on device recursion (bsc#1223720).
* CVE-2024-36881: Fix reset ptes when close() for wr-protected (bsc#1225718).
* CVE-2024-42316: Fix div-by-zero in vmpressure_calc_level() (bsc#1229353).
* CVE-2024-43855: Fix deadlock between mddev_suspend and flush bio
(bsc#1229342).
* CVE-2024-43864: Fix CT entry update leaks of modify header context
(bsc#1229496).
* CVE-2024-26631: Fix data-race in ipv6_mc_down / mld_ifc_work (bsc#1221630).
* CVE-2024-42109: Unconditionally flush pending work before notifier
(bsc#1228505).
* CVE-2024-41084: Avoid null pointer dereference in region lookup
(bsc#1228472).
* CVE-2024-40905: Fix possible race in __fib6_drop_pcpu_from() (bsc#1227761)
* CVE-2024-39489: Fix memleak in seg6_hmac_init_algo (bsc#1227623)
* CVE-2024-36489: Fix missing memory barrier in tls_init (bsc#1226874)
* CVE-2024-27079: Fix NULL domain on device release (bsc#1223742).
* CVE-2024-41020: Fix fcntl/close race recovery compat path (bsc#1228427).
* CVE-2024-35897: Discard table flag update with pending basechain deletion
(bsc#1224510).
* CVE-2024-27403: Restore const specifier in flow_offload_route_init()
(bsc#1224415).
* CVE-2024-27011: Fix memleak in map from abort path (bsc#1223803).
* CVE-2024-26668: Reject configurations that cause integer overflow
(bsc#1222335).
* CVE-2024-26835: Set dormant flag on hook register failure (bsc#1222967).
* CVE-2024-26808: Handle NETDEV_UNREGISTER for inet/ingress basechain
(bsc#1222634).
* CVE-2024-26809: Release elements in clone only from destroy path
(bsc#1222633).
* CVE-2023-52581: Fix memleak when more than 255 elements expired
(bsc#1220877).
* CVE-2024-43837: Fix updating attached freplace prog in prog_array map
(bsc#1229297).
* CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure
(bsc#1224535).
* CVE-2024-42291: Add a per-VF limit on number of FDIR filters (bsc#1229374).
* CVE-2024-42268: Fix missing lock on sync reset reload (bsc#1229391).
* CVE-2024-43834: Fix invalid wait context of page_pool_destroy()
(bsc#1229314)
* CVE-2024-27433: Fix an error handling path in clk_mt8135_apmixed_probe()
(bsc#1224711).
* CVE-2024-36286: Acquire rcu_read_lock() in instance_destroy_rcu()
(bsc#1226801)
* CVE-2024-26851: Add protection for bmp length out of range (bsc#1223074)
* CVE-2024-40920: Fix suspicious rcu usage in br_mst_set_state (bsc#1227781).
* CVE-2024-40921: Pass vlan group directly to br_mst_vlan_set_state
(bsc#1227784).
* CVE-2024-36979: Fix vlan use-after-free (bsc#1226604).
* CVE-2024-26590: Fix inconsistent per-file compression format (bsc#1220252).
* CVE-2023-52859: Fix use-after-free when register pmu fails (bsc#1225582).
* CVE-2024-42270: Fix null-ptr-deref in iptable_nat_table_init()
(bsc#1229404).
* CVE-2024-42269: Fix potential null-ptr-deref in ip6table_nat_table_init()
(bsc#1229402).
* CVE-2024-42284: Return non-zero value from tipc_udp_addr2str() on error
(bsc#1229382)
* CVE-2024-42283: Initialize all fields in dumped nexthops (bsc#1229383)
* CVE-2024-42312: Always initialize i_uid/i_gid (bsc#1229357)
* CVE-2024-43854: Initialize integrity buffer to zero before writing it to
media (bsc#1229345)
* CVE-2024-42322: Properly dereference pe in ip_vs_add_service (bsc#1229347)
* CVE-2024-42290: Handle runtime power management correctly (bsc#1229379).
* CVE-2024-42318: Do not lose track of restrictions on cred_transfer
(bsc#1229351).
* CVE-2023-52889: Fix null pointer deref when receiving skb during sock
creation (bsc#1229287).
* CVE-2024-42295: Handle inconsistent state in nilfs_btnode_create_block()
(bsc#1229370).
* CVE-2024-43850: Fix refcount imbalance seen during bwmon_remove
(bsc#1229316).
* CVE-2024-43831: Handle invalid decoder vsi (bsc#1229309).
* CVE-2024-43839: Adjust 'name' buf size of bna_tcb and bna_ccb
structures
(bsc#1229301).
* CVE-2024-41007: Use signed arithmetic in tcp_rtx_probe0_timed_out()
(bsc#1227863).
* CVE-2024-42281: Fix a segment issue when downgrading gso_size
(bsc#1229386).
* CVE-2024-26669: Fix chain template offload (bsc#1222350).
* CVE-2024-26677: Blacklist e7870cf13d20 (" Fix delayed ACKs to not set
the
reference serial number") (bsc#1222387)
* CVE-2024-41050: Cyclic allocation of msg_id to avoid reuse (bsc#1228499).
* CVE-2024-41051: Wait for ondemand_object_worker to finish when dropping
object (bsc#1228468).
* CVE-2024-41074: Set object to close if ondemand_id < 0 in copen
(bsc#1228643).
* CVE-2024-41075: Add consistency check for copen/cread (bsc#1228646).
* CVE-2024-41012: Remove locks reliably when fcntl/close race is detected
(bsc#1228247).
* CVE-2024-41080: Fix possible deadlock in io_register_iowq_max_workers()
(bsc#1228616).
* CVE-2024-42246: Remap EPERM in case of connection failure in
xs_tcp_setup_socket (bsc#1228989).
* CVE-2024-42159: Fix sanitise num_phys (bsc#1228754).
* CVE-2024-42241: Disable PMD-sized page cache if needed (bsc#1228986).
* CVE-2024-42245: Revert "sched/fair: Make sure to try to detach at least
one
movable task" (bsc#1228978).
* CVE-2024-26735: Fix possible use-after-free and null-ptr-deref
(bsc#1222372).
* CVE-2024-26837: Race between creation of new group memberships and
generation of the list of MDB events to replay (bsc#1222973).
* CVE-2024-42155: Wipe copies of protected- and secure-keys (bsc#1228733).
* CVE-2024-42156: Wipe copies of clear-key structures on failure
(bsc#1228722).
* CVE-2024-42157: Wipe sensitive data on failure (bsc#1228727).
* CVE-2024-42158: Use kfree_sensitive() to fix Coccinelle warnings
(bsc#1228720).
* CVE-2024-38662: Cover verifier checks for mutating sockmap/sockhash
(bsc#1226885).
* CVE-2024-40938: Fix d_parent walk (bsc#1227840).
* CVE-2024-42247: Avoid unaligned 64-bit memory accesses (bsc#1228988).
* CVE-2024-41010: Fix too early release of tcx_entry (bsc#1228021).
* CVE-2024-42106: Initialize pad field in struct inet_diag_req_v2
(bsc#1228493).
* CVE-2024-42095: Fix Errata i2310 with RX FIFO level check (bsc#1228446).
* CVE-2024-41068: Fix sclp_init() cleanup on failure (bsc#1228579).
* CVE-2024-42138: Fix double memory deallocation in case of invalid INI file
(bsc#1228500).
* CVE-2024-42107: Do not process extts if PTP is disabled (bsc#1228494).
* CVE-2024-42139: Fix improper extts handling (bsc#1228503).
* CVE-2024-42110: Move ntb_netdev_rx_handler() to call netif_rx() from
__netif_rx() (bsc#1228501).
* CVE-2024-42113: Initialize num_q_vectors for MSI/INTx interrupts
(bsc#1228568).
* CVE-2024-42148: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487).
* CVE-2024-42142: E-switch, Create ingress ACL when needed (bsc#1228491).
* CVE-2024-42073: Fix memory corruptions on Spectrum-4 systems (bsc#1228457).
* CVE-2024-42162: Account for stopped queues when reading NIC stats
(bsc#1228706).
* CVE-2024-42082: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482).
* CVE-2024-40978: Fix crash while reading debugfs attribute (bsc#1227929).
* CVE-2024-41000: Prefer different overflow check (bsc#1227867).
* CVE-2024-40995: Fix possible infinite loop in tcf_idr_check_alloc()
(bsc#1227830).
* CVE-2024-42161: Avoid uninitialized value in BPF_CORE_READ_BITFIELD
(bsc#1228756).
* CVE-2024-41069: Fix route memory corruption (bsc#1228644).
* CVE-2024-39506: Adjust a NULL pointer handling path in
lio_vf_rep_copy_packet (bsc#1227729).
* CVE-2024-42145: Implement a limit on UMAD receive List (bsc#1228743).
* CVE-2024-40994: Fix integer overflow in max_vclocks_store (bsc#1227829).
* CVE-2024-42124: Make qedf_execute_tmf() non-preemptible (bsc#1228705).
* CVE-2024-42096: Stop playing stack games in profile_pc() (bsc#1228633).
* CVE-2024-42224: Correct check for empty list (bsc#1228723).
* CVE-2024-41048: Skip zero length skb in sk_msg_recvmsg (bsc#1228565).
* CVE-2024-40958: Make get_net_ns() handle zero refcount net (bsc#1227812).
* CVE-2024-40939: Fix tainted pointer delete is case of region creation fail
(bsc#1227799).
* CVE-2024-36933: Use correct mac_offset to unwind gso skb in
nsh_gso_segment() (bsc#1225832).
* CVE-2024-36929: Reject skb_copy(_expand) for fraglist GSO skbs
(bsc#1225814).
* CVE-2024-41044: Reject claimed-as-LCP but actually malformed packets
(bsc#1228530).
* CVE-2024-41066: Add tx check to prevent skb leak (bsc#1228640).
* CVE-2024-42093: Avoid explicit cpumask var allocation on stack
(bsc#1228680).
* CVE-2024-42122: Add NULL pointer check for kzalloc (bsc#1228591).
* CVE-2024-41078: Fix quota root leak after quota disable failure
(bsc#1228655).
* CVE-2024-40989: Disassociate vcpus from redistributor region on teardown
(bsc#1227823).
* CVE-2024-41064: Avoid possible crash when edev->pdev changes
(bsc#1228599).
* CVE-2024-41036: Fix deadlock with the SPI chip variant (bsc#1228496).
* CVE-2024-41040: Fix UAF when resolving a clash (bsc#1228518).
* CVE-2024-35949: Make sure that WRITTEN is set on all metadata blocks
(bsc#1224700).
* CVE-2024-41081: Block BH in ila_output() (bsc#1228617).
* CVE-2024-41076: Fix memory leak in nfs4_set_security_label (bsc#1228649).
* CVE-2024-42079: Fix NULL pointer dereference in gfs2_log_flush
(bsc#1228672).
* CVE-2024-41057: Fix slab-use-after-free in cachefiles_withdraw_cookie()
(bsc#1228462).
* CVE-2024-41058: Fix slab-use-after-free in fscache_withdraw_volume()
(bsc#1228459).
* CVE-2024-41015: Add bounds checking to ocfs2_check_dir_entry()
(bsc#1228409).
* CVE-2024-40956: Fix possible Use-After-Free in irq_process_work_list
(bsc#1227810).
* CVE-2024-27437: Disable auto-enable of exclusive INTx IRQ (bsc#1222625).
* CVE-2024-41032: Check if a hash-index is in cpu_possible_mask
(bsc#1228460).
* CVE-2024-40957: Fix parameter passing when calling NF_HOOK() in End.DX4 and
End.DX6 behaviors (bsc#1227811).
* CVE-2024-41041: Set SOCK_RCU_FREE earlier in udp_lib_get_port()
(bsc#1228520).
* CVE-2024-40954: Do not leave a dangling sk pointer, when socket creation
fails (bsc#1227808)
* CVE-2024-42070: Fully validate NFT_DATA_VALUE on store to data registers
(bsc#1228470).
* CVE-2024-41070: Prevent UAF in kvm_spapr_tce_attach_iommu_group()
(bsc#1228581).
* CVE-2024-40959: Check ip6_dst_idev() return value in xfrm6_get_saddr()
(bsc#1227884).
* CVE-2024-41009: Fix overrunning reservations in ringbuf (bsc#1228020).
* CVE-2024-40909: Fix a potential use-after-free in bpf_link_free()
(bsc#1227798).
* CVE-2024-27024: Fix WARNING in rds_conn_connect_if_down (bsc#1223777).

The following non-security bugs were fixed:

* ACPI: battery: create alarm sysfs attribute atomically (stable-fixes).
* ACPI: processor_idle: use raw_safe_halt() in acpi_idle_play_dead() (git-
fixes).
* ACPI: SBS: manage alarm sysfs attribute through psy core (stable-fixes).
* ACPI/NUMA: Apply SRAT proximity domain to entire CFMWS window (git-fixes).
* afs: fix __afs_break_callback() / afs_drop_open_mmap() race (git-fixes).
* ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-
fixes).
* ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-
fixes).
* ALSA: hda: Conditionally use snooping for AMD HDMI (git-fixes).
* ALSA: hda: conexant: Fix headset auto detect fail in the polling mode (git-
fixes).
* ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).
* ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).
* ALSA: hda/realtek - Fixed ALC256 headphone no sound (stable-fixes).
* ALSA: hda/realtek - FIxed ALC285 headphone no sound (stable-fixes).
* ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks
(stable-fixes).
* ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks
(stable-fixes).
* ALSA: hda/realtek: Add quirk for Acer Aspire E5-574G (stable-fixes).
* ALSA: hda/realtek: Add support for new HP G12 laptops (stable-fixes).
* ALSA: hda/realtek: Enable mute/micmute LEDs on HP Laptop 14-ey0xxx (stable-
fixes).
* ALSA: hda/realtek: Fix noise from speakers on Lenovo IdeaPad 3 15IAU7 (git-
fixes).
* ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book3 Ultra
(stable-fixes).
* ALSA: hda/realtek: Implement sound init sequence for Samsung Galaxy Book3
Pro 360 (stable-fixes).
* ALSA: hda/realtek: support HP Pavilion Aero 13-bg0xxx Mute LED (stable-
fixes).
* ALSA: hda/tas2781: fix wrong calibrated data order (git-fixes).
* ALSA: hda/tas2781: Use correct endian conversion (git-fixes).
* ALSA: line6: Fix racy access to midibuf (stable-fixes).
* ALSA: line6: Fix racy access to midibuf (stable-fixes).
* ALSA: seq: Skip event type filtering for UMP events (git-fixes).
* ALSA: seq: ump: Explicitly reset RPN with Null RPN (stable-fixes).
* ALSA: seq: ump: Optimize conversions from SysEx to UMP (git-fixes).
* ALSA: seq: ump: Transmit RPN/NRPN message at each MSB/LSB data reception
(stable-fixes).
* ALSA: seq: ump: Use the common RPN/bank conversion context (stable-fixes).
* ALSA: timer: Relax start tick time check for slave timer elements (git-
fixes).
* ALSA: ump: Explicitly reset RPN with Null RPN (stable-fixes).
* ALSA: ump: Transmit RPN/NRPN message at each MSB/LSB data reception
(stable-
fixes).
* ALSA: usb-audio: Add delay quirk for VIVO USB-C-XE710 HEADSET (stable-
fixes).
* ALSA: usb-audio: Correct surround channels in UAC1 channel map (git-fixes).
* ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).
* ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).
* ALSA: usb-audio: Support Yamaha P-125 quirk entry (stable-fixes).
* ALSA: usb: Fix UBSAN warning in parse_audio_unit() (stable-fixes).
* apparmor: unpack transition table if dfa is not present (bsc#1226031).
* arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git-
fixes)
* arm64: Add Neoverse-V2 part (git-fixes)
* arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git-
fixes)
* arm64: barrier: Restore spec_bar() macro (git-fixes)
* arm64: cputype: Add Cortex-A720 definitions (git-fixes)
* arm64: cputype: Add Cortex-A725 definitions (git-fixes)
* arm64: cputype: Add Cortex-X1C definitions (git-fixes)
* arm64: cputype: Add Cortex-X3 definitions (git-fixes)
* arm64: cputype: Add Cortex-X4 definitions (git-fixes)
* arm64: cputype: Add Cortex-X925 definitions (git-fixes)
* arm64: cputype: Add Neoverse-V3 definitions (git-fixes)
* arm64: dts: imx8mp: add HDMI power-domains (git-fixes)
* arm64: dts: imx8mp: Add NPU Node (git-fixes)
* arm64: dts: imx8mp: Fix pgc vpu locations (git-fixes)
* arm64: dts: imx8mp: Fix pgc_mlmix location (git-fixes)
* arm64: errata: Expand speculative SSBS workaround (again) (git-fixes)
* arm64: errata: Expand speculative SSBS workaround (git-fixes)
* arm64: errata: Unify speculative SSBS errata logic (git-fixes). Update
config files.
* arm64: Fix KASAN random tag seed initialization (git-fixes)
* arm64: jump_label: Ensure patched jump_labels are visible to all CPUs (git-
fixes)
* ASoC: allow module autoloading for table board_ids (stable-fixes).
* ASoC: allow module autoloading for table db1200_pids (stable-fixes).
* ASoC: amd: acp: fix module autoloading (git-fixes).
* ASoC: amd: yc: Add quirk entry for OMEN by HP Gaming Laptop 16-n0xxx
(bsc#1227182).
* ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes).
* ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes).
* ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes).
* ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes).
* ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes).
* ASoC: cs35l45: Checks index of cs35l45_irqs[] (stable-fixes).
* ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes).
* ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes).
* ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable-
fixes).
* ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable-
fixes).
* ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes).
* ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes).
* ASoC: mediatek: mt8188: Mark AFE_DAC_CON0 register as volatile (stable-
fixes).
* ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT
(git-fixes).
* ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT
(git-fixes).
* ASoC: nau8822: Lower debug print priority (stable-fixes).
* ASoC: nau8822: Lower debug print priority (stable-fixes).
* ASoC: SOF: amd: Fix for acp init sequence (git-fixes).
* ASoC: SOF: Intel: hda-dsp: Make sure that no irq handler is pending before
suspend (stable-fixes).
* ASoC: SOF: ipc4: check return value of snd_sof_ipc_msg_data (stable-fixes).
* ASoC: SOF: mediatek: Add missing board compatible (stable-fixes).
* ASoC: SOF: Remove libraries from topology lookups (git-fixes).
* ASoC: SOF: Remove libraries from topology lookups (git-fixes).
* ata: libata-scsi: Do not overwrite valid sense data when CK_COND=1 (stable-
fixes).
* ata: libata-scsi: Honor the D_SENSE bit for CK_COND=1 and no error (stable-
fixes).
* Bluetooth: Add device 13d3:3572 IMC Networks Bluetooth Radio
(stable-fixes).
* Bluetooth: bnep: Fix out-of-bound access (stable-fixes).
* Bluetooth: btintel: Fail setup on error (git-fixes).
* Bluetooth: btnxpuart: Shutdown timer and prevent rearming when driver
unloading (stable-fixes).
* Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x13d3:0x3591 (stable-
fixes).
* Bluetooth: btusb: Add RTL8852BE device 0489:e125 to device tables (stable-
fixes).
* Bluetooth: Fix usage of __hci_cmd_sync_status (git-fixes).
* Bluetooth: hci_conn: Check non NULL function before calling for HFP offload
(stable-fixes).
* Bluetooth: hci_core: Fix LE quote calculation (git-fixes).
* Bluetooth: hci_core: Fix not handling hibernation actions (git-fixes).
* Bluetooth: hci_sync: avoid dup filtering when passive scanning with adv
monitor (git-fixes).
* Bluetooth: hci_sync: Fix suspending with wrong filter policy (git-fixes).
* Bluetooth: l2cap: always unlock channel in l2cap_conless_channel() (git-
fixes).
* Bluetooth: L2CAP: Fix deadlock (git-fixes).
* Bluetooth: MGMT: Add error handling to pair_device() (git-fixes).
* Bluetooth: SMP: Fix assumption of Central always being Initiator (git-
fixes).
* bnxt_re: Fix imm_data endianness (git-fixes)
* bpf, arm64: Fix trampoline for BPF_TRAMP_F_CALL_ORIG (git-fixes)
* bpf, lpm: Fix check prefixlen before walking trie (git-fixes).
* bpf: Add crosstask check to __bpf_get_stack (git-fixes).
* bpf: Detect IP == ksym.end as part of BPF program (git-fixes).
* bpf: do not infer PTR_TO_CTX for programs with unnamed context type (git-
fixes).
* bpf: enforce precision of R0 on callback return (git-fixes).
* bpf: Ensure proper register state printing for cond jumps (git-fixes).
* bpf: extract bpf_ctx_convert_map logic and make it more reusable (git-
fixes).
* bpf: Fix a few selftest failures due to llvm18 change (git-fixes).
* bpf: Fix a kernel verifier crash in stacksafe() (bsc#1225903).
* bpf: Fix check_stack_write_fixed_off() to correctly spill imm (git-fixes).
* bpf: fix control-flow graph checking in privileged mode (git-fixes).
* bpf: Fix kfunc callback register type handling (git-fixes).
* bpf: Fix prog_array_map_poke_run map poke update (git-fixes).
* bpf: Fix unnecessary -EBUSY from htab_lock_bucket (git-fixes).
* bpf: handle bpf_user_pt_regs_t typedef explicitly for PTR_TO_CTX global arg
(git-fixes).
* bpf: hardcode BPF_PROG_PACK_SIZE to 2MB * num_possible_nodes() (git-fixes).
* bpf: kprobe: remove unused declaring of bpf_kprobe_override (git-fixes).
* bpf: Mark bpf_spin_{lock,unlock}() helpers with notrace correctly (git-
fixes).
* bpf: Remove unnecessary wait from bpf_map_copy_value() (git-fixes).
* bpf: Set uattr->batch.count as zero before batched update or deletion
(git-
fixes).
* bpf: simplify btf_get_prog_ctx_type() into btf_is_prog_ctx_type() (git-
fixes).
* bpf/tests: Remove duplicate JSGT tests (git-fixes).
* bpftool: Align output skeleton ELF code (git-fixes).
* bpftool: Fix -Wcast-qual warning (git-fixes).
* bpftool: mark orphaned programs during prog show (git-fixes).
* bpftool: Silence build warning about calloc() (git-fixes).
* btrfs: add a btrfs_finish_ordered_extent helper (git-fixes).
* btrfs: add a is_data_bbio helper (git-fixes).
* btrfs: add an ordered_extent pointer to struct btrfs_bio (git-fixes).
* btrfs: copy dir permission and time when creating a stub subvolume
(bsc#1228321).
* btrfs: ensure fast fsync waits for ordered extents after a write failure
(git-fixes).
* btrfs: factor out a btrfs_queue_ordered_fn helper (git-fixes).
* btrfs: factor out a can_finish_ordered_extent helper (git-fixes).
* btrfs: fix corruption after buffer fault in during direct IO append write
(git-fixes).
* btrfs: fix double inode unlock for direct IO sync writes (git-fixes).
* btrfs: fix extent map use-after-free when adding pages to compressed bio
(git-fixes).
* btrfs: fix leak of qgroup extent records after transaction abort (git-
fixes).
* btrfs: fix ordered extent split error handling in btrfs_dio_submit_io (git-
fixes).
* btrfs: limit write bios to a single ordered extent (git-fixes).
* btrfs: make btrfs_finish_ordered_extent() return void (git-fixes).
* btrfs: merge the two calls to btrfs_add_ordered_extent in
run_delalloc_nocow
(git-fixes).
* btrfs: open code btrfs_bio_end_io in btrfs_dio_submit_io (git-fixes).
* btrfs: open code end_extent_writepage in end_bio_extent_writepage (git-
fixes).
* btrfs: pass a btrfs_inode to btrfs_fdatawrite_range() (git-fixes).
* btrfs: pass a btrfs_inode to btrfs_wait_ordered_range() (git-fixes).
* btrfs: pass an ordered_extent to btrfs_reloc_clone_csums (git-fixes).
* btrfs: pass an ordered_extent to btrfs_submit_compressed_write (git-fixes).
* btrfs: remove btrfs_add_ordered_extent (git-fixes).
* btrfs: rename err to ret in btrfs_direct_write() (git-fixes).
* btrfs: uninline some static inline helpers from tree-log.h (git-fixes).
* btrfs: use a btrfs_inode in the log context (struct btrfs_log_ctx) (git-
fixes).
* btrfs: use a btrfs_inode local variable at btrfs_sync_file() (git-fixes).
* btrfs: use bbio->ordered in btrfs_csum_one_bio (git-fixes).
* btrfs: use btrfs_finish_ordered_extent to complete buffered writes (git-
fixes).
* btrfs: use btrfs_finish_ordered_extent to complete compressed writes (git-
fixes).
* btrfs: use btrfs_finish_ordered_extent to complete direct writes (git-
fixes).
* btrfs: use irq safe locking when running and adding delayed iputs (git-
fixes).
* cachefiles, erofs: Fix NULL deref in when cachefiles is not doing ondemand-
mode (bsc#1229245).
* cachefiles: add missing lock protection when polling (bsc#1229256).
* cachefiles: add restore command to recover inflight ondemand read requests
(bsc#1229244).
* cachefiles: add spin_lock for cachefiles_ondemand_info (bsc#1229249).
* cachefiles: cancel all requests for the object that is being dropped
(bsc#1229255).
* cachefiles: defer exposing anon_fd until after copy_to_user() succeeds
(bsc#1229251).
* cachefiles: extract ondemand info field from cachefiles_object
(bsc#1229240).
* cachefiles: fix slab-use-after-free in cachefiles_ondemand_daemon_read()
(bsc#1229247).
* cachefiles: fix slab-use-after-free in cachefiles_ondemand_get_fd()
(bsc#1229246).
* cachefiles: introduce object ondemand state (bsc#1229239).
* cachefiles: make on-demand read killable (bsc#1229252).
* cachefiles: narrow the scope of triggering EPOLLIN events in ondemand mode
(bsc#1229243).
* cachefiles: never get a new anonymous fd if ondemand_id is valid
(bsc#1229250).
* cachefiles: propagate errors from vfs_getxattr() to avoid infinite loop
(bsc#1229253).
* cachefiles: remove err_put_fd label in cachefiles_ondemand_daemon_read()
(bsc#1229248).
* cachefiles: resend an open request if the read request's object is
closed
(bsc#1229241).
* cachefiles: stop sending new request when dropping object (bsc#1229254).
* can: mcp251xfd: tef: prepare to workaround broken TEF FIFO tail index
erratum (stable-fixes).
* can: mcp251xfd: tef: update workaround for erratum DS80000789E 6 of
mcp2518fd (stable-fixes).
* ceph: periodically flush the cap releases (bsc#1230056).
* certs: Move RSA self-test data to separate file (bsc#1222777).
* cgroup: Add annotation for holding namespace_sem in
current_cgns_cgroup_from_root() (bsc#1222254).
* cgroup: Eliminate the need for cgroup_mutex in proc_cgroup_show()
(bsc#1222254).
* cgroup: Make operations on the cgroup root_list RCU safe (bsc#1222254).
* cgroup: preserve KABI of cgroup_root (bsc#1222254).
* cgroup: Remove unnecessary list_empty() (bsc#1222254).
* cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801).
* char: xillybus: Check USB endpoints when probing device (git-fixes).
* char: xillybus: Do not destroy workqueue from work item running on it
(stable-fixes).
* char: xillybus: Refine workqueue handling (git-fixes).
* clk: en7523: fix rate divider for slic and spi clocks (git-fixes).
* clk: qcom: camcc-sc7280: Add parent dependency to all camera GDSCs (git-
fixes).
* clk: qcom: gcc-sa8775p: Update the GDSC wait_val fields and flags (git-
fixes).
* clk: qcom: gcc-sc7280: Update force mem core bit for UFS ICE clock (git-
fixes).
* clk: qcom: gpucc-sa8775p: Park RCG's clk source at XO during disable
(git-
fixes).
* clk: qcom: gpucc-sa8775p: Remove the CLK_IS_CRITICAL and ALWAYS_ON flags
(git-fixes).
* clk: qcom: gpucc-sa8775p: Update wait_val fields for GPU GDSC's
(git-fixes).
* clk: qcom: gpucc-sm8350: Park RCG's clk source at XO during disable
(git-
fixes).
* clk: qcom: kpss-xcc: Return of_clk_add_hw_provider to transfer the error
(git-fixes).
* clk: qcom: Park shared RCGs upon registration (git-fixes).
* clk: visconti: Add bounds-checking coverage for struct
visconti_pll_provider
(stable-fixes).
* clocksource/drivers/sh_cmt: Address race condition for clock events
(stable-
fixes).
* cpu/SMT: Enable SMT only if a core is online (bsc#1214285 bsc#1205462
ltc#200161 ltc#200588 git-fixes).
* cxl/region: Move cxl_dpa_to_region() work to the region driver
(bsc#1228472)
* dev/parport: fix the array out-of-bounds risk (stable-fixes).
* device property: Add cleanup.h based fwnode_handle_put() scope based
cleanup
(stable-fixes).
* dmaengine: dw: Add memory bus width verification (git-fixes).
* dmaengine: dw: Add peripheral bus width verification (git-fixes).
* docs: KVM: Fix register ID of SPSR_FIQ (git-fixes).
* driver core: Fix uevent_show() vs driver detach race (git-fixes).
* drm/admgpu: fix dereferencing null pointer context (stable-fixes).
* drm/amd/display: Add delay to improve LTTPR UHBR interop (stable-fixes).
* drm/amd/display: Add NULL check for 'afb' before dereferencing in
amdgpu_dm_plane_handle_cursor_update (stable-fixes).
* drm/amd/display: Add null checker before passing variables (stable-fixes).
* drm/amd/display: Adjust cursor position (git-fixes).
* drm/amd/display: avoid using null object of framebuffer (git-fixes).
* drm/amd/display: Check for NULL pointer (stable-fixes).
* drm/amd/display: fix cursor offset on rotation 180 (git-fixes).
* drm/amd/display: fix s2idle entry for DCN3.5+ (stable-fixes).
* drm/amd/display: Skip Recompute DSC Params if no Stream on Link (stable-
fixes).
* drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr (stable-
fixes).
* drm/amdgpu: Actually check flags for all context ops (stable-fixes).
* drm/amdgpu: Add lock around VF RLCG interface (stable-fixes).
* drm/amdgpu: fix dereference null return value for the function
amdgpu_vm_pt_parent (stable-fixes).
* drm/amdgpu: fix potential resource leak warning (stable-fixes).
* drm/amdgpu: Fix the null pointer dereference to ras_manager (stable-fixes).
* drm/amdgpu: Forward soft recovery errors to userspace (stable-fixes).
* drm/amdgpu: reset vm state machine after gpu reset(vram lost) (stable-
fixes).
* drm/amdgpu: Validate TA binary size (stable-fixes).
* drm/amdgpu/jpeg2: properly set atomics vmid field (stable-fixes).
* drm/amdgpu/jpeg4: properly set atomics vmid field (stable-fixes).
* drm/amdgpu/pm: Fix the null pointer dereference for smu7 (stable-fixes).
* drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules
(stable-fixes).
* drm/amdgpu/pm: Fix the param type of set_power_profile_mode (stable-fixes).
* drm/amdgpu/sdma5.2: limit wptr workaround to sdma 5.2.1 (git-fixes).
* drm/amdgpu/sdma5.2: Update wptr registers as well as doorbell (stable-
fixes).
* drm/bridge: analogix_dp: properly handle zero sized AUX transactions
(stable-fixes).
* drm/client: fix null pointer dereference in drm_client_modeset_probe (git-
fixes).
* drm/dp_mst: Skip CSN if topology probing is not done yet (stable-fixes).
* drm/etnaviv: do not block scheduler when GPU is still active
(stable-fixes).
* drm/i915: Fix possible int overflow in skl_ddi_calculate_wrpll() (git-
fixes).
* drm/i915/dsi: Make Lenovo Yoga Tab 3 X90F DMI match less strict
(git-fixes).
* drm/i915/gem: Adjust vma offset for framebuffer mmap offset (stable-fixes).
* drm/i915/gem: Fix Virtual Memory mapping boundaries calculation
(git-fixes).
* drm/i915/hdcp: Fix HDCP2_STREAM_STATUS macro (git-fixes).
* drm/lima: set gp bus_stop bit before hard reset (stable-fixes).
* drm/mediatek/dp: Fix spurious kfree() (git-fixes).
* drm/msm: Reduce fallout of fence signaling vs reclaim hangs (stable-fixes).
* drm/msm/dp: fix the max supported bpp logic (git-fixes).
* drm/msm/dp: reset the link phy params before link training (git-fixes).
* drm/msm/dpu: capture snapshot on the first commit_done timeout (stable-
fixes).
* drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails (git-fixes).
* drm/msm/dpu: do not play tricks with debug macros (git-fixes).
* drm/msm/dpu: drop MSM_ENC_VBLANK support (stable-fixes).
* drm/msm/dpu: move dpu_encoder's connector assignment to atomic_enable()
(git-fixes).
* drm/msm/dpu: split dpu_encoder_wait_for_event into two functions (stable-
fixes).
* drm/msm/dpu: take plane rotation into account for wide planes (git-fixes).
* drm/msm/dpu: try multirect based on mdp clock limits (stable-fixes).
* drm/msm/dpu: use drmm-managed allocation for dpu_encoder_phys (stable-
fixes).
* drm/msm/mdss: Rename path references to mdp_path (stable-fixes).
* drm/msm/mdss: switch mdss to use devm_of_icc_get() (stable-fixes).
* drm/nouveau: prime: fix refcount underflow (git-fixes).
* drm/panel: nt36523: Set 120Hz fps for xiaomi,elish panels (stable-fixes).
* drm/radeon: Remove __counted_by from StateArray.states[] (git-fixes).
* drm/radeon/evergreen_cs: Clean up errors in evergreen_cs.c (bsc#1229024).
* drm/rockchip: vop2: clear afbc en and transform bit for cluster window at
linear mode (stable-fixes).
* drm/virtio: Fix type of dma-fence context variable (git-fixes).
* drm/vmwgfx: Fix a deadlock in dma buf fence polling (git-fixes).
* drm/vmwgfx: Fix overlay when using Screen Targets (git-fixes).
* drm/vmwgfx: Fix prime with external buffers (git-fixes).
* efi/libstub: Zero initialize heap allocated struct screen_info (git-fixes).
* evm: do not copy up 'security.evm' xattr (git-fixes).
* firmware: cirrus: cs_dsp: Initialize debugfs_root to invalid
(stable-fixes).
* fs/netfs/fscache_cookie: add missing "n_accesses" check
(bsc#1229455).
* fuse: Initialize beyond-EOF page contents before setting uptodate
(bsc#1229456).
* genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline (git-
fixes).
* genirq/generic_chip: Make irq_remove_generic_chip() irqdomain aware (git-
fixes).
* genirq/matrix: Exclude managed interrupts in irq_matrix_allocated() (git-
fixes).
* gfs2: setattr_chown: Add missing initialization (git-fixes).
* gpio: mlxbf3: Support shutdown() function (git-fixes).
* gpio: prevent potential speculation leaks in gpio_device_get_desc()
(stable-
fixes).
* gpio: sysfs: extend the critical section for unregistering sysfs devices
(stable-fixes).
* gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey (git-
fixes).
* hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode()
(git-fixes).
* HID: wacom: Defer calculation of resolution until resolution_code is known
(git-fixes).
* hwmon: (ltc2992) Avoid division by zero (stable-fixes).
* hwmon: (ltc2992) Fix memory leak in ltc2992_parse_dt() (git-fixes).
* hwmon: (pc87360) Bounds check data->innr usage (stable-fixes).
* i2c: Fix conditional for substituting empty ACPI functions (stable-fixes).
* i2c: qcom-geni: Add missing clk_disable_unprepare in
geni_i2c_runtime_resume
(git-fixes).
* i2c: qcom-geni: Add missing geni_icc_disable in geni_i2c_runtime_resume
(git-fixes).
* i2c: qcom-geni: Add missing geni_icc_disable in geni_i2c_runtime_resume
(git-fixes).
* i2c: riic: avoid potential division by zero (stable-fixes).
* i2c: smbus: Improve handling of stuck alerts (git-fixes).
* i2c: smbus: Send alert notifications to all devices if source not found
(git-fixes).
* i2c: stm32f7: Add atomic_xfer method to driver (stable-fixes).
* i2c: Use IS_REACHABLE() for substituting empty ACPI functions (git-fixes).
* i3c: mipi-i3c-hci: Do not unmap region not mapped for transfer (stable-
fixes).
* i3c: mipi-i3c-hci: Remove BUG() when Ring Abort request times out (stable-
fixes).
* i915/perf: Remove code to update PWR_CLK_STATE for gen12 (git-fixes).
* ice: Fix NULL pointer access, if PF does not support SRIOV_LAG
(bsc#1228737).
* Input: i8042 - add forcenorestore quirk to leave controller untouched even
on s3 (stable-fixes).
* Input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table
(bsc#1229056).
* Input: i8042 - use new forcenorestore quirk to replace old buggy quirk
combination (stable-fixes).
* Input: MT - limit max slots (stable-fixes).
* io_uring: Drop per-ctx dummy_ubuf (git-fixes).
* io_uring: fix io_match_task must_hold (git-fixes).
* io_uring: Fix probe of disabled operations (git-fixes).
* io_uring: tighten task exit cancellations (git-fixes).
* io_uring/advise: support 64-bit lengths (git-fixes).
* iommu/amd: Convert comma to semicolon (git-fixes).
* iommu/vt-d: Fix identity map bounds in si_domain_init() (git-fixes).
* iommufd/device: Fix hwpt at err_unresv in iommufd_device_do_replace() (git-
fixes).
* ip6_tunnel: Fix broken GRO (bsc#1229444).
* ipv6: sr: fix incorrect unregister order (git-fixes).
* irqdomain: Fixed unbalanced fwnode get and put (git-fixes).
* jfs: define xtree root and page independently (git-fixes).
* jfs: fix null ptr deref in dtInsertEntry (git-fixes).
* jfs: Fix shift-out-of-bounds in dbDiscardAG (git-fixes).
* jump_label: Clarify condition in static_key_fast_inc_not_disabled() (git-
fixes).
* jump_label: Fix concurrency issues in static_key_slow_dec() (git-fixes).
* jump_label: Fix the fix, brown paper bags galore (git-fixes).
* jump_label: Simplify and clarify static_key_fast_inc_cpus_locked() (git-
fixes).
* kabi fix for KVM: s390: fix LPSWEY handling (bsc#1227634 git-fixes).
* kabi fix for SUNRPC: add a missing rpc_stat for TCP TLS (git-fixes).
* kABI fix of: virtio-crypto: handle config changed by work queue
(git-fixes).
* kABI workaround for sound core UMP conversion (stable-fixes).
* kabi/severities: ignore kABI for FireWire sound local symbols (bsc#1208783)
* kabi/severity: add nvme common code The nvme common code is also allowed to
change the data structures, there are only internal users.
* kcov: properly check for softirq context (git-fixes).
* kernfs: Convert kernfs_path_from_node_locked() from strlcpy() to strscpy()
(bsc#1229134).
* kernfs: fix false-positive WARN(nr_mmapped) in kernfs_drain_open_files
(git-
fixes).
* kprobes: Fix to check symbol prefixes correctly (git-fixes).
* kprobes: Prohibit probing on CFI preamble symbol (git-fixes).
* KVM: Always flush async #PF workqueue when vCPU is being destroyed (git-
fixes).
* KVM: arm64: AArch32: Fix spurious trapping of conditional instructions
(git-
fixes).
* KVM: arm64: Add missing memory barriers when switching to pKVM's hyp
pgd
(git-fixes).
* KVM: arm64: Allow AArch32 PSTATE.M to be restored as System mode (git-
fixes).
* KVM: arm64: Fix __pkvm_init_switch_pgd call ABI (git-fixes).
* KVM: arm64: Fix AArch32 register narrowing on userspace write (git-fixes).
* KVM: arm64: Fix clobbered ELR in sync abort/SError (git-fixes)
* KVM: arm64: GICv4: Do not perform a map to a mapped vLPI (git-fixes).
* KVM: arm64: timers: Correctly handle TGE flip with CNTPOFF_EL2 (git-fixes).
* KVM: arm64: timers: Fix resource leaks in kvm_timer_hyp_init() (git-fixes).
* KVM: arm64: vgic-its: Test for valid IRQ in its_sync_lpi_pending_table()
(git-fixes).
* KVM: arm64: vgic-its: Test for valid IRQ in MOVALL handler (git-fixes).
* KVM: arm64: vgic-v2: Use cpuid from userspace as vcpu_id (git-fixes).
* KVM: arm64: vgic-v4: Restore pending state on host userspace write (git-
fixes).
* KVM: arm64: vgic: Add a non-locking primitive for kvm_vgic_vcpu_destroy()
(git-fixes).
* KVM: arm64: vgic: Force vcpu vgic teardown on vcpu destroy (git-fixes).
* KVM: arm64: vgic: Simplify kvm_vgic_destroy() (git-fixes).
* KVM: fix kvm_mmu_memory_cache allocation warning (git-fixes).
* KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY
(git-
fixes).
* KVM: nVMX: Add a helper to get highest pending from Posted Interrupt vector
(git-fixes).
* KVM: nVMX: Check for pending posted interrupts when looking for nested
events (git-fixes).
* KVM: nVMX: Request immediate exit iff pending nested event needs injection
(git-fixes).
* KVM: PPC: Book3S HV: Fix the set_one_reg for MMCR3 (bsc#1194869).
* KVM: PPC: Book3S HV: Handle pending exceptions on guest entry with MSR_EE
(bsc#1215199).
* KVM: Protect vcpu->pid dereference via debugfs with RCU (git-fixes).
* KVM: Reject overly excessive IDs in KVM_CREATE_VCPU (git-fixes).
* KVM: s390: fix LPSWEY handling (bsc#1227634 git-fixes).
* KVM: s390: fix validity interception issue when gisa is switched off (git-
fixes bsc#1229167).
* kvm: s390: Reject memory region operations for ucontrol VMs (git-fixes
bsc#1229168).
* KVM: Stop processing _all_ memslots when "null" mmu_notifier
handler is
found (git-fixes).
* KVM: VMX: Move posted interrupt descriptor out of VMX code (git-fixes).
* KVM: VMX: Split out the non-virtualization part of vmx_interrupt_blocked()
(git-fixes).
* KVM: VMX: Switch __vmx_exit() and kvm_x86_vendor_exit() in vmx_exit() (git-
fixes).
* KVM: x86: Limit check IDs for KVM_SET_BOOT_CPU_ID (git-fixes).
* KVM: x86/mmu: Bug the VM if KVM tries to split a !hugepage SPTE
(git-fixes).
* libbpf: Add missing LIBBPF_API annotation to libbpf_set_memlock_rlim API
(git-fixes).
* libbpf: Apply map_set_def_max_entries() for inner_maps on creation (git-
fixes).
* libbpf: Fix faccessat() usage on Android (git-fixes).
* libbpf: Use OPTS_SET() macro in bpf_xdp_query() (git-fixes).
* md-cluster: fix hanging issue while a new disk adding (bsc#1223395).
* md-cluster: fix hanging issue while a new disk adding (bsc#1223395).
* md-cluster: fix no recovery job when adding/re-adding a disk (bsc#1223395).
* md-cluster: fix no recovery job when adding/re-adding a disk (bsc#1223395).
* md-cluster: keeping kabi compatibility for upstream commit 35a0a409fa26
(bsc#1223395).
* md: add a mddev_add_trace_msg helper (git-fixes).
* md: add check for sleepers in md_wakeup_thread() (git-fixes).
* md: change the return value type of md_write_start to void (git-fixes).
* md: do not account sync_io if iostats of the disk is disabled (git-fixes).
* md: do not delete safemode_timer in mddev_suspend (git-fixes).
* md: Do not wait for MD_RECOVERY_NEEDED for HOT_REMOVE_DISK ioctl (git-
fixes).
* md: factor out a helper exceed_read_errors() to check read_errors (git-
fixes).
* md: fix a suspicious RCU usage warning (git-fixes).
* md/md-bitmap: fix writing non bitmap pages (git-fixes).
* md/raid1: set max_sectors during early return from choose_slow_rdev() (git-
fixes).
* md/raid1: support read error check (git-fixes).
* md/raid5: fix deadlock that raid5d() wait for itself to clear
MD_SB_CHANGE_PENDING (git-fixes).
* md/raid5: fix spares errors about rcu usage (git-fixes).
* md/raid5: recheck if reshape has finished with device_lock held
(git-fixes).
* media: amphion: Remove lock in s_ctrl callback (stable-fixes).
* media: drivers/media/dvb-core: copy user arrays safely (stable-fixes).
* media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes).
* media: Revert "media: dvb-usb: Fix unexpected infinite loop in
dvb_usb_read_remote_control()" (git-fixes).
* media: uvcvideo: Add quirk for invalid dev_sof in Logitech C920
(git-fixes).
* media: uvcvideo: Disable autosuspend for Insta360 Link (stable-fixes).
* media: uvcvideo: Fix the bandwdith quirk on USB 3.x (stable-fixes).
* media: uvcvideo: Ignore empty TS packets (stable-fixes).
* media: uvcvideo: Quirk for invalid dev_sof in Logitech C922 (stable-fixes).
* media: xc2028: avoid use-after-free in load_firmware_cb() (stable-fixes).
* memcg: protect concurrent access to mem_cgroup_idr (git-fixes).
* memory: stm32-fmc2-ebi: check regmap_read return value (stable-fixes).
* memory: tegra: Skip SID programming if SID registers are not set (stable-
fixes).
* minmax: add a few more MIN_T/MAX_T users (bsc#1229024).
* minmax: avoid overly complicated constant expressions in VM code
(bsc#1229024).
* minmax: do not use max() in situations that want a C constant expression
(bsc#1229024).
* minmax: fix up min3() and max3() too (bsc#1229024).
* minmax: improve macro expansion and type checking (bsc#1229024).
* minmax: make generic MIN() and MAX() macros available everywhere
(bsc#1229024).
* minmax: simplify and clarify min_t()/max_t() implementation (bsc#1229024).
* minmax: simplify min()/max()/clamp() implementation (bsc#1229024).
* mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes).
* mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes).
* mmc: dw_mmc: allow biu and ciu clocks to defer (git-fixes).
* mmc: mmc_test: Fix NULL dereference on allocation failure (git-fixes).
* mmc: mtk-sd: receive cmd8 data when hs400 tuning fail (git-fixes).
* net: drop bad gso csum_start and offset in virtio_net_hdr (git-fixes).
* net: ethernet: mtk_wed: fix use-after-free panic in
mtk_wed_setup_tc_block_cb() (git-fixes).
* net: fix sk_memory_allocated_{add|sub} vs softirqs (bsc#1228757).
* net: mana: Add support for page sizes other than 4KB on ARM64 (jsc#PED-8491
bsc#1226530).
* net: mana: Fix doorbell out of order violation and avoid unnecessary
doorbell rings (bsc#1229154).
* net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git-
fixes).
* net: mana: Fix RX buf alloc_size alignment and atomic op panic
(bsc#1229086).
* net: missing check virtio (git-fixes).
* net: phy: micrel: Fix the KSZ9131 MDI-X status issue (git-fixes).
* net: phy: realtek: add support for RTL8366S Gigabit PHY (git-fixes).
* net: usb: qmi_wwan: fix memory leak for not ip packets (git-fixes).
* net: usb: sr9700: fix uninitialized variable use in sr_mdio_read (git-
fixes).
* net/iucv: fix the allocation size of iucv_path_table array (git-fixes
bsc#1229451).
* net/iucv: fix use after free in iucv_sock_close() (bsc#1228973).
* net/rds: fix possible cp null dereference (git-fixes).
* net/sched: initialize noop_qdisc owner (git-fixes).
* netfs, fscache: export fscache_put_volume() and add
fscache_try_get_volume()
(bsc#1228459 bsc#1228462).
* nfc: pn533: Add poll mod list filling check (git-fixes).
* nfs: do not invalidate dentries on transient errors (git-fixes).
* nfs: expose /proc/net/sunrpc/nfs in net namespaces (git-fixes).
* nfs: make the rpc_stat per net namespace (git-fixes).
* nfs: pass explicit offset/count to trace events (git-fixes).
* nfs: propagate readlink errors in nfs_symlink_filler (git-fixes).
* NFSD: Support write delegations in LAYOUTGET (git-fixes).
* NFSv4.1 another fix for EXCHGID4_FLAG_USE_PNFS_DS for DS server
(git-fixes).
* nouveau/firmware: use dma non-coherent allocator (git-fixes).
* nvme_core: scan namespaces asynchronously (bsc#1224105).
* nvme-multipath: find NUMA path only for online numa-node (git-fixes).
* nvme-multipath: implement "queue-depth" iopolicy (bsc#1227706).
* nvme-multipath: prepare for "queue-depth" iopolicy (bsc#1227706).
* nvme-pci: add missing condition check for existence of mapped data (git-
fixes).
* nvme-pci: do not directly handle subsys reset fallout (bsc#1220066).
* nvme-pci: Fix the instructions for disabling power management (git-fixes).
* nvme-sysfs: add 'tls_configured_key' sysfs attribute (bsc#1221857).
* nvme-sysfs: add 'tls_keyring' attribute (bsc#1221857).
* nvme-tcp: check for invalidated or revoked key (bsc#1221857).
* nvme-tcp: sanitize TLS key handling (bsc#1221857).
* nvme: add a newline to the 'tls_key' sysfs attribute (bsc#1221857).
* nvme: adjust multiples of NVME_CTRL_PAGE_SIZE in offset (git-fixes).
* nvme: avoid double free special payload (git-fixes).
* nvme: fix NVME_NS_DEAC may incorrectly identifying the disk as EXT_LBA
(git-
fixes).
* nvme: fixup comment for nvme RDMA Provider Type (git-fixes).
* nvme: split off TLS sysfs attributes into a separate group (bsc#1221857).
* nvme: tcp: remove unnecessary goto statement (bsc#1221857).
* nvmet-auth: fix nvmet_auth hash error handling (git-fixes).
* nvmet: always initialize cqe.result (git-fixes).
* nvmet: do not return 'reserved' for empty TSAS values (git-fixes).
* nvmet: fix a possible leak when destroy a ctrl during qp establishment
(git-
fixes).
* nvmet: make 'tsas' attribute idempotent for RDMA (git-fixes).
* ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()
(bsc#1228410).
* padata: Fix possible divide-by-0 panic in padata_mt_helper() (git-fixes).
* PCI: Add Edimax Vendor ID to pci_ids.h (stable-fixes).
* PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git-
fixes).
* PCI: loongson: Enable MSI in LS7A Root Complex (stable-fixes).
* perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09 (git-
fixes).
* pinctrl: mediatek: common-v2: Fix broken bias-disable for
PULL_PU_PD_RSEL_TYPE (git-fixes).
* pinctrl: rockchip: correct RK3328 iomux width flag for GPIO2-B pins (git-
fixes).
* pinctrl: single: fix potential NULL dereference in pcs_get_function() (git-
fixes).
* pinctrl: starfive: jh7110: Correct the level trigger configuration of iev
register (git-fixes).
* platform/chrome: cros_ec_proto: Lock device when updating MKBP version
(git-
fixes).
* platform/chrome: cros_ec_proto: Lock device when updating MKBP version
(git-
fixes).
* platform/surface: aggregator: Fix warning when controller is destroyed in
probe (git-fixes).
* platform/x86: lg-laptop: fix %s null argument warning (stable-fixes).
* platform/x86/amd/hsmp: Add support for ACPI based probing (jsc#PED-8779).
* platform/x86/amd/hsmp: Cache pci_dev in struct hsmp_socket (jsc#PED-8779).
* platform/x86/amd/hsmp: Change devm_kzalloc() to devm_kcalloc()
(jsc#PED-8779).
* platform/x86/amd/hsmp: Check HSMP support on AMD family of processors
(jsc#PED-8779).
* platform/x86/amd/hsmp: Check num_sockets against MAX_AMD_SOCKETS
(jsc#PED-8779).
* platform/x86/amd/hsmp: Create static func to handle platdev (jsc#PED-8779).
* platform/x86/amd/hsmp: Define a struct to hold mailbox regs (jsc#PED-8779).
* platform/x86/amd/hsmp: Move dev from platdev to hsmp_socket (jsc#PED-8779).
* platform/x86/amd/hsmp: Move hsmp_test to probe (jsc#PED-8779).
* platform/x86/amd/hsmp: Non-ACPI support for AMD F1A_M00~0Fh (jsc#PED-8779).
* platform/x86/amd/hsmp: Remove extra parenthesis and add a space
(jsc#PED-8779).
* platform/x86/amd/hsmp: Restructure sysfs group creation (jsc#PED-8779).
* platform/x86/amd/hsmp: switch to use device_add_groups() (jsc#PED-8779).
* platform/x86/intel/ifs: Initialize union ifs_status to zero (git-fixes).
* power: supply: axp288_charger: Fix constant_charge_voltage writes (git-
fixes).
* power: supply: axp288_charger: Round constant_charge_voltage writes down
(git-fixes).
* power: supply: qcom_battmgr: return EAGAIN when firmware service is not up
(git-fixes).
* powerpc: fix a file leak in kvm_vcpu_ioctl_enable_cap() (bsc#1194869).
* powerpc: xor_vmx: Add '-mhard-float' to CFLAGS (bsc#1194869).
* powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for CONFIG_PCI=n
(bsc#1194869).
* powerpc/io: Avoid clang null pointer arithmetic warnings (bsc#1194869).
* powerpc/kexec_file: fix cpus node update to FDT (bsc#1194869).
* powerpc/kexec: make the update_cpus_node() function public (bsc#1194869).
* powerpc/kexec: split CONFIG_KEXEC_FILE and CONFIG_CRASH_DUMP (bsc#1194869).
* powerpc/pseries: Add failure related checks for h_get_mpp and h_get_ppp
(bsc#1194869).
* powerpc/pseries: Whitelist dtl slub object for copying to userspace
(bsc#1194869).
* powerpc/radix: Move some functions into #ifdef
CONFIG_KVM_BOOK3S_HV_POSSIBLE
(bsc#1194869).
* powerpc/topology: Check if a core is online (bsc#1214285 bsc#1205462
ltc#200161 ltc#200588 git-fixes).
* powerpc/xmon: Check cpu id in commands "c#", "dp#" and
"dx#" (bsc#1194869).
* printk/panic: Allow cpu backtraces to be written into ringbuffer during
panic (bsc#1225607).
* RDMA: Fix netdev tracker in ib_device_set_netdev (git-fixes)
* RDMA/cache: Release GID table even if leak is detected (git-fixes)
* RDMA/device: Return error earlier if port in not valid (git-fixes)
* RDMA/hns: Check atomic wr length (git-fixes)
* RDMA/hns: Fix insufficient extend DB for VFs. (git-fixes)
* RDMA/hns: Fix mbx timing out before CMD execution is completed (git-fixes)
* RDMA/hns: Fix missing pagesize and alignment check in FRMR (git-fixes)
* RDMA/hns: Fix shift-out-bounds when max_inline_data is 0 (git-fixes)
* RDMA/hns: Fix soft lockup under heavy CEQE load (git-fixes)
* RDMA/hns: Fix undifined behavior caused by invalid max_sge (git-fixes)
* RDMA/hns: Fix unmatch exception handling when init eq table fails (git-
fixes)
* RDMA/iwcm: Fix a use-after-free related to destroying CM IDs (git-fixes)
* RDMA/mana_ib: Use virtual address in dma regions for MRs (git-fixes).
* RDMA/mlx4: Fix truncated output warning in alias_GUID.c (git-fixes)
* RDMA/mlx4: Fix truncated output warning in mad.c (git-fixes)
* RDMA/mlx5: Set mkeys for dmabuf at PAGE_SIZE (git-fixes)
* RDMA/rxe: Do not set BTH_ACK_MASK for UC or UD QPs (git-fixes)
* reiserfs: fix uninit-value in comp_keys (git-fixes).
* rtc: nct3018y: fix possible NULL dereference (stable-fixes).
* s390/cpum_cf: Fix endless loop in CF_DIAG event stop (git-fixes
bsc#1229171).
* s390/dasd: fix error checks in dasd_copy_pair_store() (git-fixes
bsc#1229173).
* s390/dasd: fix error recovery leading to data corruption on ESE devices
(git-fixes bsc#1229452).
* s390/pci: Add missing virt_to_phys() for directed DIBV (git-fixes
bsc#1229174).
* s390/pci: Allow allocation of more than 1 MSI interrupt (git-fixes
bsc#1229172).
* s390/pci: Refactor arch_setup_msi_irqs() (git-fixes bsc#1229172).
* s390/pkey: harmonize pkey s390 debug feature calls (bsc#1228720).
* s390/pkey: introduce dynamic debugging for pkey (bsc#1228720).
* s390/sclp: Prevent release of buffer in I/O (git-fixes bsc#1229169).
* s390/uv: Panic for set and remove shared access UVC errors (git-fixes
bsc#1229170).
* samples/bpf: syscall_tp_user: Fix array out-of-bound access (git-fixes).
* samples/bpf: syscall_tp_user: Rename num_progs into nr_tests (git-fixes).
* sbitmap: use READ_ONCE to access map->word (stable-fixes).
* scsi: lpfc: Allow DEVICE_RECOVERY mode after RSCN receipt if in PRLI_ISSUE
state (bsc#1228857).
* scsi: lpfc: Cancel ELS WQE instead of issuing abort when SLI port is
inactive (bsc#1228857).
* scsi: lpfc: Fix handling of fully recovered fabric node in dev_loss callbk
(bsc#1228857).
* scsi: lpfc: Fix incorrect request len mbox field when setting trunking via
sysfs (bsc#1228857).
* scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info (bsc#1228857).
* scsi: lpfc: Relax PRLI issue conditions after GID_FT response
(bsc#1228857).
* scsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian macro
usages (bsc#1228857).
* scsi: lpfc: Update lpfc version to 14.4.0.3 (bsc#1228857).
* scsi: qla2xxx: Avoid possible run-time warning with long model_num
(bsc#1228850).
* scsi: qla2xxx: Complete command early within lock (bsc#1228850).
* scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).
* scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).
* scsi: qla2xxx: During vport delete send async logout explicitly
(bsc#1228850).
* scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850).
* scsi: qla2xxx: Fix flash read failure (bsc#1228850).
* scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850).
* scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850).
* scsi: qla2xxx: Indent help text (bsc#1228850).
* scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850).
* scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850).
* scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds
(bsc#1228850).
* scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850).
* scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850).
* scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850).
* scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850).
* selftest/bpf: Add map_in_maps with BPF_MAP_TYPE_PERF_EVENT_ARRAY values
(git-fixes).
* selftests/bpf: Add a test to verify previous stacksafe() fix (bsc#1225903).
* selftests/bpf: Add assert for user stacks in test_task_stack (git-fixes).
* selftests/bpf: Add netkit to tc_redirect selftest (git-fixes).
* selftests/bpf: De-veth-ize the tc_redirect test case (git-fixes).
* selftests/bpf: Disable IPv6 for lwt_redirect test (git-fixes).
* selftests/bpf: fix bpf_loop_bench for new callback verification scheme
(git-
fixes).
* selftests/bpf: fix compiler warnings in RELEASE=1 mode (git-fixes).
* selftests/bpf: Fix erroneous bitmask operation (git-fixes).
* selftests/bpf: Fix issues in setup_classid_environment() (git-fixes).
* selftests/bpf: Fix potential premature unload in bpf_testmod (git-fixes).
* selftests/bpf: Fix pyperf180 compilation failure with clang18 (git-fixes).
* selftests/bpf: fix RELEASE=1 build for tc_opts (git-fixes).
* selftests/bpf: Fix the flaky tc_redirect_dtime test (git-fixes).
* selftests/bpf: Fix up xdp bonding test wrt feature flags (git-fixes).
* selftests/bpf: Make linked_list failure test more robust (git-fixes).
* selftests/bpf: Relax time_tai test for equal timestamps in tai_forward
(git-
fixes).
* selftests/bpf: satisfy compiler by having explicit return in btf test (git-
fixes).
* selftests/bpf: Skip module_fentry_shadow test when bpf_testmod is not
available (git-fixes).
* selftests/bpf: Wait for the netstamp_needed_key static key to be turned on
(git-fixes).
* serial: core: check uartclk for zero to avoid divide by zero
(stable-fixes).
* soc: qcom: cmd-db: Map shared memory as WC, not WB (git-fixes).
* soc: qcom: pmic_glink: Actually communicate when remote goes down (git-
fixes).
* soundwire: stream: fix programming slave ports for non-continous port maps
(git-fixes).
* spi: Add empty versions of ACPI functions (stable-fixes).
* spi: microchip-core: fix init function not setting the master and motorola
modes (git-fixes).
* spi: microchip-core: switch to use modern name (stable-fixes).
* spi: spi-fsl-lpspi: Fix scldiv calculation (git-fixes).
* spi: spidev: Add missing spi_device_id for bh2228fv (git-fixes).
* Squashfs: fix variable overflow triggered by sysbot (git-fixes).
* squashfs: squashfs_read_data need to check if the length is 0 (git-fixes).
* ssb: Fix division by zero issue in ssb_calc_clock_rate (stable-fixes).
* staging: iio: resolver: ad2s1210: fix use before initialization (stable-
fixes).
* staging: ks7010: disable bh on tx_dev_lock (stable-fixes).
* string.h: Introduce memtostr() and memtostr_pad() (bsc#1228849).
* SUNRPC: add a missing rpc_stat for TCP TLS (git-fixes).
* sunrpc: add a struct rpc_stats arg to rpc_create_args (git-fixes).
* SUNRPC: Fix a race to wake a sync task (git-fixes).
* swiotlb: do not set total_used to 0 in swiotlb_create_debugfs_files() (git-
fixes).
* swiotlb: fix swiotlb_bounce() to do partial sync's correctly
(git-fixes).
* syscalls: fix compat_sys_io_pgetevents_time64 usage (git-fixes).
* thermal: bcm2835: Convert to platform remove callback returning void
(stable-fixes).
* thermal/drivers/broadcom: Fix race between removal and clock disable (git-
fixes).
* thunderbolt: Mark XDomain as unplugged when router is removed (stable-
fixes).
* tools/perf: Fix perf bench epoll to enable the run when some CPU's are
offline (bsc#1227747).
* tools/perf: Fix perf bench futex to enable the run when some CPU's are
offline (bsc#1227747).
* tools/perf: Fix timing issue with parallel threads in perf bench wake-up-
parallel (bsc#1227747).
* tools/resolve_btfids: fix build with musl libc (git-fixes).
* tools/resolve_btfids: Fix comparison of distinct pointer types warning in
resolve_btfids (git-fixes).
* tools/resolve_btfids: Fix cross-compilation to non-host endianness (git-
fixes).
* tools/resolve_btfids: Refactor set sorting with types from btf_ids.h (git-
fixes).
* trace/pid_list: Change gfp flags in pid_list_fill_irq() (git-fixes).
* tracing: Return from tracing_buffers_read() if the file has been closed
(bsc#1229136 git-fixes).
* tty: atmel_serial: use the correct RTS flag (git-fixes).
* tty: serial: fsl_lpuart: mark last busy before uart_add_one_port (git-
fixes).
* usb: cdnsp: fix for Link TRB with TC (git-fixes).
* usb: cdnsp: fix incorrect index in cdnsp_get_hw_deq function (git-fixes).
* usb: core: sysfs: Unmerge @usb3_hardware_lpm_attr_group in
remove_power_attributes() (git-fixes).
* usb: dwc3: core: Skip setting event buffers for host only controllers
(stable-fixes).
* usb: dwc3: omap: add missing depopulate in probe error path (git-fixes).
* usb: dwc3: st: add missing depopulate in probe error path (git-fixes).
* usb: dwc3: st: fix probed platform device ref count on probe error path
(git-fixes).
* usb: gadget: core: Check for unset descriptor (git-fixes).
* usb: gadget: fsl: Increase size of name buffer for endpoints
(stable-fixes).
* usb: gadget: u_audio: Check return codes from usb_ep_enable and
config_ep_by_speed (git-fixes).
* usb: gadget: u_serial: Set start_delayed during suspend (git-fixes).
* usb: gadget: uvc: cleanup request when not in correct state (stable-fixes).
* USB: serial: debug: do not echo input by default (stable-fixes).
* usb: typec: fsa4480: add support for Audio Accessory Mode (git-fixes).
* usb: typec: fsa4480: Add support to swap SBU orientation (git-fixes).
* usb: typec: fsa4480: Check if the chip is really there (git-fixes).
* usb: typec: fsa4480: Relax CHIP_ID check (git-fixes).
* usb: typec: fsa4480: rework mux & switch setup to handle more states
(git-
fixes).
* usb: vhci-hcd: Do not drop references before new references are gained
(stable-fixes).
* vfio/pci: fix potential memory leak in vfio_intx_enable() (git-fixes).
* vhost-scsi: Handle vhost_vq_work_queue failures for events (git-fixes).
* vhost-vdpa: switch to use vmf_insert_pfn() in the fault handler
(git-fixes).
* vhost: Release worker mutex during flushes (git-fixes).
* vhost: Use virtqueue mutex for swapping worker (git-fixes).
* vhost/vsock: always initialize seqpacket_allow (git-fixes).
* virt: guest_memfd: fix reference leak on hwpoisoned page (git-fixes).
* virtio_net: use u64_stats_t infra to avoid data-races (git-fixes).
* virtio-crypto: handle config changed by work queue (git-fixes).
* virtio: reenable config if freezing device failed (git-fixes).
* virtiofs: forbid newlines in tags (bsc#1229940).
* wifi: ath12k: fix memory leak in ath12k_dp_rx_peer_frag_setup() (stable-
fixes).
* wifi: ath12k: fix soft lockup on suspend (git-fixes).
* wifi: brcmfmac: cfg80211: Handle SSID based pmksa deletion (git-fixes).
* wifi: cfg80211: fix reporting failed MLO links status with
cfg80211_connect_done (git-fixes).
* wifi: iwlwifi: fw: fix wgds rev 3 exact size (git-fixes).
* wifi: mac80211: use monitor sdata with driver only if desired (git-fixes).
* wifi: mwifiex: duplicate static structs used in driver instances (git-
fixes).
* wifi: nl80211: disallow setting special AP channel widths (stable-fixes).
* wifi: nl80211: do not give key data to userspace (stable-fixes).
* wifi: rtw88: usb: Fix disconnection after beacon loss (stable-fixes).
* wifi: wfx: repair open network AP mode (git-fixes).
* workqueue: Improve scalability of workqueue watchdog touch (bsc#1193454).
* workqueue: wq_watchdog_touch is always called with valid CPU (bsc#1193454).
* x86/asm: Use %c/%n instead of %P operand modifier in asm templates (git-
fixes).
* x86/entry/64: Remove obsolete comment on tracing vs. SYSRET (git-fixes).
* x86/mm: Fix pti_clone_entry_text() for i386 (git-fixes).
* x86/mm: Fix pti_clone_pgtable() alignment assumption (git-fixes).
* x86/mtrr: Check if fixed MTRRs exist before saving them (git-fixes).
* x86/numa: Fix SRAT lookup of CFMWS ranges with numa_fill_memblks() (git-
fixes).
* x86/numa: Fix the address overlap check in numa_fill_memblks() (git-fixes).
* x86/numa: Fix the sort compare func used in numa_fill_memblks()
(git-fixes).
* x86/numa: Introduce numa_fill_memblks() (git-fixes).
* x86/pci: Skip early E820 check for ECAM region (git-fixes).
* x86/xen: Convert comma to semicolon (git-fixes).
* xfs: allow cross-linking special files without project quota (git-fixes).
* xfs: allow symlinks with short remote targets (bsc#1229160).
* xfs: allow unlinked symlinks and dirs with zero size (git-fixes).
* xfs: attr forks require attr, not attr2 (git-fixes).
* xfs: convert comma to semicolon (git-fixes).
* xfs: do not use current->journal_info (git-fixes).
* xfs: Fix missing interval for missing_owner in xfs fsmap (git-fixes).
* xfs: Fix the owner setting issue for rmap query in xfs fsmap (git-fixes).
* xfs: fix unlink vs cluster buffer instantiation race (git-fixes).
* xfs: honor init_xattrs in xfs_init_new_inode for !ATTR fs (git-fixes).
* xfs: journal geometry is not properly bounds checked (git-fixes).
* xfs: match lock mode in xfs_buffered_write_iomap_begin() (git-fixes).
* xfs: require XFS_SB_FEAT_INCOMPAT_LOG_XATTRS for attr log intent item
recovery (git-fixes).
* xfs: upgrade the extent counters in xfs_reflink_end_cow_extent later (git-
fixes).
* xfs: use consistent uid/gid when grabbing dquots for inodes (git-fixes).
* xfs: use XFS_BUF_DADDR_NULL for daddrs in getfsmap code (git-fixes).
* xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration
(git-fixes).
* xprtrdma: Fix rpcrdma_reqs_reset() (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3195=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-3195=1

* SUSE Real Time Module 15-SP6
zypper in -t patch SUSE-SLE-Module-RT-15-SP6-2024-3195=1

## Package List:

* openSUSE Leap 15.6 (x86_64)
* kernel-rt_debug-vdso-6.4.0-150600.10.8.3
* kernel-rt-livepatch-devel-6.4.0-150600.10.8.3
* kernel-rt-devel-6.4.0-150600.10.8.3
* kselftests-kmp-rt-6.4.0-150600.10.8.3
* ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.8.3
* kernel-rt_debug-livepatch-devel-6.4.0-150600.10.8.3
* kernel-rt-extra-6.4.0-150600.10.8.3
* gfs2-kmp-rt-6.4.0-150600.10.8.3
* kernel-rt_debug-debugsource-6.4.0-150600.10.8.3
* kernel-rt-vdso-debuginfo-6.4.0-150600.10.8.3
* kernel-rt-debuginfo-6.4.0-150600.10.8.3
* dlm-kmp-rt-6.4.0-150600.10.8.3
* kernel-rt-debugsource-6.4.0-150600.10.8.3
* dlm-kmp-rt-debuginfo-6.4.0-150600.10.8.3
* ocfs2-kmp-rt-6.4.0-150600.10.8.3
* cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.8.3
* kernel-rt-optional-6.4.0-150600.10.8.3
* kernel-rt_debug-vdso-debuginfo-6.4.0-150600.10.8.3
* kernel-syms-rt-6.4.0-150600.10.8.1
* kernel-rt-vdso-6.4.0-150600.10.8.3
* kernel-rt_debug-debuginfo-6.4.0-150600.10.8.3
* cluster-md-kmp-rt-6.4.0-150600.10.8.3
* kernel-rt-optional-debuginfo-6.4.0-150600.10.8.3
* gfs2-kmp-rt-debuginfo-6.4.0-150600.10.8.3
* kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.8.3
* reiserfs-kmp-rt-debuginfo-6.4.0-150600.10.8.3
* kernel-rt-devel-debuginfo-6.4.0-150600.10.8.3
* kernel-rt_debug-devel-6.4.0-150600.10.8.3
* reiserfs-kmp-rt-6.4.0-150600.10.8.3
* kernel-rt-extra-debuginfo-6.4.0-150600.10.8.3
* kselftests-kmp-rt-debuginfo-6.4.0-150600.10.8.3
* openSUSE Leap 15.6 (noarch)
* kernel-devel-rt-6.4.0-150600.10.8.3
* kernel-source-rt-6.4.0-150600.10.8.3
* openSUSE Leap 15.6 (nosrc x86_64)
* kernel-rt-6.4.0-150600.10.8.3
* kernel-rt_debug-6.4.0-150600.10.8.3
* SUSE Linux Enterprise Live Patching 15-SP6 (x86_64)
* kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource-1-150600.1.3.2
* kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo-1-150600.1.3.2
* kernel-livepatch-6_4_0-150600_10_8-rt-1-150600.1.3.2
* SUSE Real Time Module 15-SP6 (x86_64)
* cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.8.3
* gfs2-kmp-rt-debuginfo-6.4.0-150600.10.8.3
* kernel-rt-debuginfo-6.4.0-150600.10.8.3
* kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.8.3
* kernel-syms-rt-6.4.0-150600.10.8.1
* kernel-rt-devel-debuginfo-6.4.0-150600.10.8.3
* gfs2-kmp-rt-6.4.0-150600.10.8.3
* kernel-rt-devel-6.4.0-150600.10.8.3
* kernel-rt_debug-debuginfo-6.4.0-150600.10.8.3
* kernel-rt_debug-devel-6.4.0-150600.10.8.3
* cluster-md-kmp-rt-6.4.0-150600.10.8.3
* kernel-rt_debug-debugsource-6.4.0-150600.10.8.3
* ocfs2-kmp-rt-6.4.0-150600.10.8.3
* dlm-kmp-rt-6.4.0-150600.10.8.3
* kernel-rt-debugsource-6.4.0-150600.10.8.3
* dlm-kmp-rt-debuginfo-6.4.0-150600.10.8.3
* ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.8.3
* SUSE Real Time Module 15-SP6 (noarch)
* kernel-devel-rt-6.4.0-150600.10.8.3
* kernel-source-rt-6.4.0-150600.10.8.3
* SUSE Real Time Module 15-SP6 (nosrc x86_64)
* kernel-rt-6.4.0-150600.10.8.3
* kernel-rt_debug-6.4.0-150600.10.8.3

## References:

* https://www.suse.com/security/cve/CVE-2023-52489.html
* https://www.suse.com/security/cve/CVE-2023-52581.html
* https://www.suse.com/security/cve/CVE-2023-52668.html
* https://www.suse.com/security/cve/CVE-2023-52688.html
* https://www.suse.com/security/cve/CVE-2023-52756.html
* https://www.suse.com/security/cve/CVE-2023-52766.html
* https://www.suse.com/security/cve/CVE-2023-52800.html
* https://www.suse.com/security/cve/CVE-2023-52802.html
* https://www.suse.com/security/cve/CVE-2023-52859.html
* https://www.suse.com/security/cve/CVE-2023-52885.html
* https://www.suse.com/security/cve/CVE-2023-52886.html
* https://www.suse.com/security/cve/CVE-2023-52887.html
* https://www.suse.com/security/cve/CVE-2023-52889.html
* https://www.suse.com/security/cve/CVE-2024-26590.html
* https://www.suse.com/security/cve/CVE-2024-26631.html
* https://www.suse.com/security/cve/CVE-2024-26637.html
* https://www.suse.com/security/cve/CVE-2024-26668.html
* https://www.suse.com/security/cve/CVE-2024-26669.html
* https://www.suse.com/security/cve/CVE-2024-26677.html
* https://www.suse.com/security/cve/CVE-2024-26682.html
* https://www.suse.com/security/cve/CVE-2024-26683.html
* https://www.suse.com/security/cve/CVE-2024-26735.html
* https://www.suse.com/security/cve/CVE-2024-26758.html
* https://www.suse.com/security/cve/CVE-2024-26767.html
* https://www.suse.com/security/cve/CVE-2024-26808.html
* https://www.suse.com/security/cve/CVE-2024-26809.html
* https://www.suse.com/security/cve/CVE-2024-26812.html
* https://www.suse.com/security/cve/CVE-2024-26835.html
* https://www.suse.com/security/cve/CVE-2024-26837.html
* https://www.suse.com/security/cve/CVE-2024-26849.html
* https://www.suse.com/security/cve/CVE-2024-26851.html
* https://www.suse.com/security/cve/CVE-2024-26889.html
* https://www.suse.com/security/cve/CVE-2024-26920.html
* https://www.suse.com/security/cve/CVE-2024-26976.html
* https://www.suse.com/security/cve/CVE-2024-27010.html
* https://www.suse.com/security/cve/CVE-2024-27011.html
* https://www.suse.com/security/cve/CVE-2024-27024.html
* https://www.suse.com/security/cve/CVE-2024-27049.html
* https://www.suse.com/security/cve/CVE-2024-27050.html
* https://www.suse.com/security/cve/CVE-2024-27079.html
* https://www.suse.com/security/cve/CVE-2024-27403.html
* https://www.suse.com/security/cve/CVE-2024-27433.html
* https://www.suse.com/security/cve/CVE-2024-27437.html
* https://www.suse.com/security/cve/CVE-2024-31076.html
* https://www.suse.com/security/cve/CVE-2024-35855.html
* https://www.suse.com/security/cve/CVE-2024-35897.html
* https://www.suse.com/security/cve/CVE-2024-35902.html
* https://www.suse.com/security/cve/CVE-2024-35913.html
* https://www.suse.com/security/cve/CVE-2024-35939.html
* https://www.suse.com/security/cve/CVE-2024-35949.html
* https://www.suse.com/security/cve/CVE-2024-36270.html
* https://www.suse.com/security/cve/CVE-2024-36286.html
* https://www.suse.com/security/cve/CVE-2024-36288.html
* https://www.suse.com/security/cve/CVE-2024-36489.html
* https://www.suse.com/security/cve/CVE-2024-36881.html
* https://www.suse.com/security/cve/CVE-2024-36907.html
* https://www.suse.com/security/cve/CVE-2024-36929.html
* https://www.suse.com/security/cve/CVE-2024-36933.html
* https://www.suse.com/security/cve/CVE-2024-36939.html
* https://www.suse.com/security/cve/CVE-2024-36970.html
* https://www.suse.com/security/cve/CVE-2024-36979.html
* https://www.suse.com/security/cve/CVE-2024-38548.html
* https://www.suse.com/security/cve/CVE-2024-38563.html
* https://www.suse.com/security/cve/CVE-2024-38609.html
* https://www.suse.com/security/cve/CVE-2024-38662.html
* https://www.suse.com/security/cve/CVE-2024-39476.html
* https://www.suse.com/security/cve/CVE-2024-39483.html
* https://www.suse.com/security/cve/CVE-2024-39484.html
* https://www.suse.com/security/cve/CVE-2024-39486.html
* https://www.suse.com/security/cve/CVE-2024-39488.html
* https://www.suse.com/security/cve/CVE-2024-39489.html
* https://www.suse.com/security/cve/CVE-2024-39491.html
* https://www.suse.com/security/cve/CVE-2024-39493.html
* https://www.suse.com/security/cve/CVE-2024-39497.html
* https://www.suse.com/security/cve/CVE-2024-39499.html
* https://www.suse.com/security/cve/CVE-2024-39500.html
* https://www.suse.com/security/cve/CVE-2024-39501.html
* https://www.suse.com/security/cve/CVE-2024-39505.html
* https://www.suse.com/security/cve/CVE-2024-39506.html
* https://www.suse.com/security/cve/CVE-2024-39508.html
* https://www.suse.com/security/cve/CVE-2024-39509.html
* https://www.suse.com/security/cve/CVE-2024-39510.html
* https://www.suse.com/security/cve/CVE-2024-40899.html
* https://www.suse.com/security/cve/CVE-2024-40900.html
* https://www.suse.com/security/cve/CVE-2024-40902.html
* https://www.suse.com/security/cve/CVE-2024-40903.html
* https://www.suse.com/security/cve/CVE-2024-40904.html
* https://www.suse.com/security/cve/CVE-2024-40905.html
* https://www.suse.com/security/cve/CVE-2024-40909.html
* https://www.suse.com/security/cve/CVE-2024-40910.html
* https://www.suse.com/security/cve/CVE-2024-40911.html
* https://www.suse.com/security/cve/CVE-2024-40912.html
* https://www.suse.com/security/cve/CVE-2024-40913.html
* https://www.suse.com/security/cve/CVE-2024-40916.html
* https://www.suse.com/security/cve/CVE-2024-40920.html
* https://www.suse.com/security/cve/CVE-2024-40921.html
* https://www.suse.com/security/cve/CVE-2024-40922.html
* https://www.suse.com/security/cve/CVE-2024-40924.html
* https://www.suse.com/security/cve/CVE-2024-40926.html
* https://www.suse.com/security/cve/CVE-2024-40927.html
* https://www.suse.com/security/cve/CVE-2024-40929.html
* https://www.suse.com/security/cve/CVE-2024-40930.html
* https://www.suse.com/security/cve/CVE-2024-40932.html
* https://www.suse.com/security/cve/CVE-2024-40934.html
* https://www.suse.com/security/cve/CVE-2024-40936.html
* https://www.suse.com/security/cve/CVE-2024-40938.html
* https://www.suse.com/security/cve/CVE-2024-40939.html
* https://www.suse.com/security/cve/CVE-2024-40941.html
* https://www.suse.com/security/cve/CVE-2024-40942.html
* https://www.suse.com/security/cve/CVE-2024-40943.html
* https://www.suse.com/security/cve/CVE-2024-40944.html
* https://www.suse.com/security/cve/CVE-2024-40945.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-40956.html
* https://www.suse.com/security/cve/CVE-2024-40957.html
* https://www.suse.com/security/cve/CVE-2024-40958.html
* https://www.suse.com/security/cve/CVE-2024-40959.html
* https://www.suse.com/security/cve/CVE-2024-40962.html
* https://www.suse.com/security/cve/CVE-2024-40964.html
* https://www.suse.com/security/cve/CVE-2024-40967.html
* https://www.suse.com/security/cve/CVE-2024-40976.html
* https://www.suse.com/security/cve/CVE-2024-40977.html
* https://www.suse.com/security/cve/CVE-2024-40978.html
* https://www.suse.com/security/cve/CVE-2024-40981.html
* https://www.suse.com/security/cve/CVE-2024-40982.html
* https://www.suse.com/security/cve/CVE-2024-40984.html
* https://www.suse.com/security/cve/CVE-2024-40987.html
* https://www.suse.com/security/cve/CVE-2024-40988.html
* https://www.suse.com/security/cve/CVE-2024-40989.html
* https://www.suse.com/security/cve/CVE-2024-40990.html
* https://www.suse.com/security/cve/CVE-2024-40992.html
* https://www.suse.com/security/cve/CVE-2024-40994.html
* https://www.suse.com/security/cve/CVE-2024-40995.html
* https://www.suse.com/security/cve/CVE-2024-40997.html
* https://www.suse.com/security/cve/CVE-2024-41000.html
* https://www.suse.com/security/cve/CVE-2024-41001.html
* https://www.suse.com/security/cve/CVE-2024-41002.html
* https://www.suse.com/security/cve/CVE-2024-41004.html
* https://www.suse.com/security/cve/CVE-2024-41007.html
* https://www.suse.com/security/cve/CVE-2024-41009.html
* https://www.suse.com/security/cve/CVE-2024-41010.html
* https://www.suse.com/security/cve/CVE-2024-41011.html
* https://www.suse.com/security/cve/CVE-2024-41012.html
* https://www.suse.com/security/cve/CVE-2024-41015.html
* https://www.suse.com/security/cve/CVE-2024-41016.html
* https://www.suse.com/security/cve/CVE-2024-41020.html
* https://www.suse.com/security/cve/CVE-2024-41022.html
* https://www.suse.com/security/cve/CVE-2024-41024.html
* https://www.suse.com/security/cve/CVE-2024-41025.html
* https://www.suse.com/security/cve/CVE-2024-41028.html
* https://www.suse.com/security/cve/CVE-2024-41032.html
* https://www.suse.com/security/cve/CVE-2024-41035.html
* https://www.suse.com/security/cve/CVE-2024-41036.html
* https://www.suse.com/security/cve/CVE-2024-41037.html
* https://www.suse.com/security/cve/CVE-2024-41038.html
* https://www.suse.com/security/cve/CVE-2024-41039.html
* https://www.suse.com/security/cve/CVE-2024-41040.html
* https://www.suse.com/security/cve/CVE-2024-41041.html
* https://www.suse.com/security/cve/CVE-2024-41044.html
* https://www.suse.com/security/cve/CVE-2024-41045.html
* https://www.suse.com/security/cve/CVE-2024-41048.html
* https://www.suse.com/security/cve/CVE-2024-41049.html
* https://www.suse.com/security/cve/CVE-2024-41050.html
* https://www.suse.com/security/cve/CVE-2024-41051.html
* https://www.suse.com/security/cve/CVE-2024-41056.html
* https://www.suse.com/security/cve/CVE-2024-41057.html
* https://www.suse.com/security/cve/CVE-2024-41058.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-41060.html
* https://www.suse.com/security/cve/CVE-2024-41061.html
* https://www.suse.com/security/cve/CVE-2024-41062.html
* https://www.suse.com/security/cve/CVE-2024-41063.html
* https://www.suse.com/security/cve/CVE-2024-41064.html
* https://www.suse.com/security/cve/CVE-2024-41065.html
* https://www.suse.com/security/cve/CVE-2024-41066.html
* https://www.suse.com/security/cve/CVE-2024-41068.html
* https://www.suse.com/security/cve/CVE-2024-41069.html
* https://www.suse.com/security/cve/CVE-2024-41070.html
* https://www.suse.com/security/cve/CVE-2024-41071.html
* https://www.suse.com/security/cve/CVE-2024-41072.html
* https://www.suse.com/security/cve/CVE-2024-41073.html
* https://www.suse.com/security/cve/CVE-2024-41074.html
* https://www.suse.com/security/cve/CVE-2024-41075.html
* https://www.suse.com/security/cve/CVE-2024-41076.html
* https://www.suse.com/security/cve/CVE-2024-41078.html
* https://www.suse.com/security/cve/CVE-2024-41079.html
* https://www.suse.com/security/cve/CVE-2024-41080.html
* https://www.suse.com/security/cve/CVE-2024-41081.html
* https://www.suse.com/security/cve/CVE-2024-41084.html
* https://www.suse.com/security/cve/CVE-2024-41087.html
* https://www.suse.com/security/cve/CVE-2024-41088.html
* https://www.suse.com/security/cve/CVE-2024-41089.html
* https://www.suse.com/security/cve/CVE-2024-41092.html
* https://www.suse.com/security/cve/CVE-2024-41093.html
* https://www.suse.com/security/cve/CVE-2024-41094.html
* https://www.suse.com/security/cve/CVE-2024-41095.html
* https://www.suse.com/security/cve/CVE-2024-41096.html
* https://www.suse.com/security/cve/CVE-2024-41097.html
* https://www.suse.com/security/cve/CVE-2024-41098.html
* https://www.suse.com/security/cve/CVE-2024-42064.html
* https://www.suse.com/security/cve/CVE-2024-42069.html
* https://www.suse.com/security/cve/CVE-2024-42070.html
* https://www.suse.com/security/cve/CVE-2024-42073.html
* https://www.suse.com/security/cve/CVE-2024-42074.html
* https://www.suse.com/security/cve/CVE-2024-42076.html
* https://www.suse.com/security/cve/CVE-2024-42077.html
* https://www.suse.com/security/cve/CVE-2024-42079.html
* https://www.suse.com/security/cve/CVE-2024-42080.html
* https://www.suse.com/security/cve/CVE-2024-42082.html
* https://www.suse.com/security/cve/CVE-2024-42085.html
* https://www.suse.com/security/cve/CVE-2024-42086.html
* https://www.suse.com/security/cve/CVE-2024-42087.html
* https://www.suse.com/security/cve/CVE-2024-42089.html
* https://www.suse.com/security/cve/CVE-2024-42090.html
* https://www.suse.com/security/cve/CVE-2024-42092.html
* https://www.suse.com/security/cve/CVE-2024-42093.html
* https://www.suse.com/security/cve/CVE-2024-42095.html
* https://www.suse.com/security/cve/CVE-2024-42096.html
* https://www.suse.com/security/cve/CVE-2024-42097.html
* https://www.suse.com/security/cve/CVE-2024-42098.html
* https://www.suse.com/security/cve/CVE-2024-42101.html
* https://www.suse.com/security/cve/CVE-2024-42104.html
* https://www.suse.com/security/cve/CVE-2024-42105.html
* https://www.suse.com/security/cve/CVE-2024-42106.html
* https://www.suse.com/security/cve/CVE-2024-42107.html
* https://www.suse.com/security/cve/CVE-2024-42109.html
* https://www.suse.com/security/cve/CVE-2024-42110.html
* https://www.suse.com/security/cve/CVE-2024-42113.html
* https://www.suse.com/security/cve/CVE-2024-42114.html
* https://www.suse.com/security/cve/CVE-2024-42115.html
* https://www.suse.com/security/cve/CVE-2024-42117.html
* https://www.suse.com/security/cve/CVE-2024-42119.html
* https://www.suse.com/security/cve/CVE-2024-42120.html
* https://www.suse.com/security/cve/CVE-2024-42121.html
* https://www.suse.com/security/cve/CVE-2024-42122.html
* https://www.suse.com/security/cve/CVE-2024-42124.html
* https://www.suse.com/security/cve/CVE-2024-42125.html
* https://www.suse.com/security/cve/CVE-2024-42126.html
* https://www.suse.com/security/cve/CVE-2024-42127.html
* https://www.suse.com/security/cve/CVE-2024-42130.html
* https://www.suse.com/security/cve/CVE-2024-42131.html
* https://www.suse.com/security/cve/CVE-2024-42132.html
* https://www.suse.com/security/cve/CVE-2024-42133.html
* https://www.suse.com/security/cve/CVE-2024-42136.html
* https://www.suse.com/security/cve/CVE-2024-42137.html
* https://www.suse.com/security/cve/CVE-2024-42138.html
* https://www.suse.com/security/cve/CVE-2024-42139.html
* https://www.suse.com/security/cve/CVE-2024-42141.html
* https://www.suse.com/security/cve/CVE-2024-42142.html
* https://www.suse.com/security/cve/CVE-2024-42143.html
* https://www.suse.com/security/cve/CVE-2024-42144.html
* https://www.suse.com/security/cve/CVE-2024-42145.html
* https://www.suse.com/security/cve/CVE-2024-42147.html
* https://www.suse.com/security/cve/CVE-2024-42148.html
* https://www.suse.com/security/cve/CVE-2024-42152.html
* https://www.suse.com/security/cve/CVE-2024-42153.html
* https://www.suse.com/security/cve/CVE-2024-42155.html
* https://www.suse.com/security/cve/CVE-2024-42156.html
* https://www.suse.com/security/cve/CVE-2024-42157.html
* https://www.suse.com/security/cve/CVE-2024-42158.html
* https://www.suse.com/security/cve/CVE-2024-42159.html
* https://www.suse.com/security/cve/CVE-2024-42161.html
* https://www.suse.com/security/cve/CVE-2024-42162.html
* https://www.suse.com/security/cve/CVE-2024-42223.html
* https://www.suse.com/security/cve/CVE-2024-42224.html
* https://www.suse.com/security/cve/CVE-2024-42225.html
* https://www.suse.com/security/cve/CVE-2024-42226.html
* https://www.suse.com/security/cve/CVE-2024-42227.html
* https://www.suse.com/security/cve/CVE-2024-42228.html
* https://www.suse.com/security/cve/CVE-2024-42229.html
* https://www.suse.com/security/cve/CVE-2024-42230.html
* https://www.suse.com/security/cve/CVE-2024-42232.html
* https://www.suse.com/security/cve/CVE-2024-42236.html
* https://www.suse.com/security/cve/CVE-2024-42237.html
* https://www.suse.com/security/cve/CVE-2024-42238.html
* https://www.suse.com/security/cve/CVE-2024-42239.html
* https://www.suse.com/security/cve/CVE-2024-42240.html
* https://www.suse.com/security/cve/CVE-2024-42241.html
* https://www.suse.com/security/cve/CVE-2024-42244.html
* https://www.suse.com/security/cve/CVE-2024-42245.html
* https://www.suse.com/security/cve/CVE-2024-42246.html
* https://www.suse.com/security/cve/CVE-2024-42247.html
* https://www.suse.com/security/cve/CVE-2024-42250.html
* https://www.suse.com/security/cve/CVE-2024-42253.html
* https://www.suse.com/security/cve/CVE-2024-42259.html
* https://www.suse.com/security/cve/CVE-2024-42268.html
* https://www.suse.com/security/cve/CVE-2024-42269.html
* https://www.suse.com/security/cve/CVE-2024-42270.html
* https://www.suse.com/security/cve/CVE-2024-42271.html
* https://www.suse.com/security/cve/CVE-2024-42274.html
* https://www.suse.com/security/cve/CVE-2024-42276.html
* https://www.suse.com/security/cve/CVE-2024-42277.html
* https://www.suse.com/security/cve/CVE-2024-42278.html
* https://www.suse.com/security/cve/CVE-2024-42279.html
* https://www.suse.com/security/cve/CVE-2024-42280.html
* https://www.suse.com/security/cve/CVE-2024-42281.html
* https://www.suse.com/security/cve/CVE-2024-42283.html
* https://www.suse.com/security/cve/CVE-2024-42284.html
* https://www.suse.com/security/cve/CVE-2024-42285.html
* https://www.suse.com/security/cve/CVE-2024-42286.html
* https://www.suse.com/security/cve/CVE-2024-42287.html
* https://www.suse.com/security/cve/CVE-2024-42288.html
* https://www.suse.com/security/cve/CVE-2024-42289.html
* https://www.suse.com/security/cve/CVE-2024-42290.html
* https://www.suse.com/security/cve/CVE-2024-42291.html
* https://www.suse.com/security/cve/CVE-2024-42292.html
* https://www.suse.com/security/cve/CVE-2024-42295.html
* https://www.suse.com/security/cve/CVE-2024-42298.html
* https://www.suse.com/security/cve/CVE-2024-42301.html
* https://www.suse.com/security/cve/CVE-2024-42302.html
* https://www.suse.com/security/cve/CVE-2024-42303.html
* https://www.suse.com/security/cve/CVE-2024-42308.html
* https://www.suse.com/security/cve/CVE-2024-42309.html
* https://www.suse.com/security/cve/CVE-2024-42310.html
* https://www.suse.com/security/cve/CVE-2024-42311.html
* https://www.suse.com/security/cve/CVE-2024-42312.html
* https://www.suse.com/security/cve/CVE-2024-42313.html
* https://www.suse.com/security/cve/CVE-2024-42314.html
* https://www.suse.com/security/cve/CVE-2024-42315.html
* https://www.suse.com/security/cve/CVE-2024-42316.html
* https://www.suse.com/security/cve/CVE-2024-42318.html
* https://www.suse.com/security/cve/CVE-2024-42319.html
* https://www.suse.com/security/cve/CVE-2024-42320.html
* https://www.suse.com/security/cve/CVE-2024-42322.html
* https://www.suse.com/security/cve/CVE-2024-43816.html
* https://www.suse.com/security/cve/CVE-2024-43817.html
* https://www.suse.com/security/cve/CVE-2024-43818.html
* https://www.suse.com/security/cve/CVE-2024-43819.html
* https://www.suse.com/security/cve/CVE-2024-43821.html
* https://www.suse.com/security/cve/CVE-2024-43823.html
* https://www.suse.com/security/cve/CVE-2024-43824.html
* https://www.suse.com/security/cve/CVE-2024-43825.html
* https://www.suse.com/security/cve/CVE-2024-43826.html
* https://www.suse.com/security/cve/CVE-2024-43829.html
* https://www.suse.com/security/cve/CVE-2024-43830.html
* https://www.suse.com/security/cve/CVE-2024-43831.html
* https://www.suse.com/security/cve/CVE-2024-43833.html
* https://www.suse.com/security/cve/CVE-2024-43834.html
* https://www.suse.com/security/cve/CVE-2024-43837.html
* https://www.suse.com/security/cve/CVE-2024-43839.html
* https://www.suse.com/security/cve/CVE-2024-43840.html
* https://www.suse.com/security/cve/CVE-2024-43841.html
* https://www.suse.com/security/cve/CVE-2024-43842.html
* https://www.suse.com/security/cve/CVE-2024-43846.html
* https://www.suse.com/security/cve/CVE-2024-43847.html
* https://www.suse.com/security/cve/CVE-2024-43849.html
* https://www.suse.com/security/cve/CVE-2024-43850.html
* https://www.suse.com/security/cve/CVE-2024-43851.html
* https://www.suse.com/security/cve/CVE-2024-43853.html
* https://www.suse.com/security/cve/CVE-2024-43854.html
* https://www.suse.com/security/cve/CVE-2024-43855.html
* https://www.suse.com/security/cve/CVE-2024-43856.html
* https://www.suse.com/security/cve/CVE-2024-43858.html
* https://www.suse.com/security/cve/CVE-2024-43860.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://www.suse.com/security/cve/CVE-2024-43863.html
* https://www.suse.com/security/cve/CVE-2024-43864.html
* https://www.suse.com/security/cve/CVE-2024-43866.html
* https://www.suse.com/security/cve/CVE-2024-43867.html
* https://www.suse.com/security/cve/CVE-2024-43871.html
* https://www.suse.com/security/cve/CVE-2024-43872.html
* https://www.suse.com/security/cve/CVE-2024-43873.html
* https://www.suse.com/security/cve/CVE-2024-43874.html
* https://www.suse.com/security/cve/CVE-2024-43875.html
* https://www.suse.com/security/cve/CVE-2024-43876.html
* https://www.suse.com/security/cve/CVE-2024-43877.html
* https://www.suse.com/security/cve/CVE-2024-43879.html
* https://www.suse.com/security/cve/CVE-2024-43880.html
* https://www.suse.com/security/cve/CVE-2024-43881.html
* https://www.suse.com/security/cve/CVE-2024-43882.html
* https://www.suse.com/security/cve/CVE-2024-43883.html
* https://www.suse.com/security/cve/CVE-2024-43884.html
* https://www.suse.com/security/cve/CVE-2024-43885.html
* https://www.suse.com/security/cve/CVE-2024-43889.html
* https://www.suse.com/security/cve/CVE-2024-43892.html
* https://www.suse.com/security/cve/CVE-2024-43893.html
* https://www.suse.com/security/cve/CVE-2024-43894.html
* https://www.suse.com/security/cve/CVE-2024-43895.html
* https://www.suse.com/security/cve/CVE-2024-43897.html
* https://www.suse.com/security/cve/CVE-2024-43899.html
* https://www.suse.com/security/cve/CVE-2024-43900.html
* https://www.suse.com/security/cve/CVE-2024-43902.html
* https://www.suse.com/security/cve/CVE-2024-43903.html
* https://www.suse.com/security/cve/CVE-2024-43905.html
* https://www.suse.com/security/cve/CVE-2024-43906.html
* https://www.suse.com/security/cve/CVE-2024-43907.html
* https://www.suse.com/security/cve/CVE-2024-43908.html
* https://www.suse.com/security/cve/CVE-2024-43909.html
* https://www.suse.com/security/cve/CVE-2024-43911.html
* https://www.suse.com/security/cve/CVE-2024-43912.html
* https://www.suse.com/security/cve/CVE-2024-44931.html
* https://www.suse.com/security/cve/CVE-2024-44938.html
* https://www.suse.com/security/cve/CVE-2024-44939.html
* https://bugzilla.suse.com/show_bug.cgi?id=1012628
* https://bugzilla.suse.com/show_bug.cgi?id=1193454
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1205462
* https://bugzilla.suse.com/show_bug.cgi?id=1208783
* https://bugzilla.suse.com/show_bug.cgi?id=1213123
* https://bugzilla.suse.com/show_bug.cgi?id=1214285
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1219596
* https://bugzilla.suse.com/show_bug.cgi?id=1220066
* https://bugzilla.suse.com/show_bug.cgi?id=1220252
* https://bugzilla.suse.com/show_bug.cgi?id=1220877
* https://bugzilla.suse.com/show_bug.cgi?id=1221326
* https://bugzilla.suse.com/show_bug.cgi?id=1221630
* https://bugzilla.suse.com/show_bug.cgi?id=1221645
* https://bugzilla.suse.com/show_bug.cgi?id=1221652
* https://bugzilla.suse.com/show_bug.cgi?id=1221857
* https://bugzilla.suse.com/show_bug.cgi?id=1222254
* https://bugzilla.suse.com/show_bug.cgi?id=1222335
* https://bugzilla.suse.com/show_bug.cgi?id=1222350
* https://bugzilla.suse.com/show_bug.cgi?id=1222364
* https://bugzilla.suse.com/show_bug.cgi?id=1222372
* https://bugzilla.suse.com/show_bug.cgi?id=1222387
* https://bugzilla.suse.com/show_bug.cgi?id=1222433
* https://bugzilla.suse.com/show_bug.cgi?id=1222434
* https://bugzilla.suse.com/show_bug.cgi?id=1222625
* https://bugzilla.suse.com/show_bug.cgi?id=1222633
* https://bugzilla.suse.com/show_bug.cgi?id=1222634
* https://bugzilla.suse.com/show_bug.cgi?id=1222777
* https://bugzilla.suse.com/show_bug.cgi?id=1222808
* https://bugzilla.suse.com/show_bug.cgi?id=1222967
* https://bugzilla.suse.com/show_bug.cgi?id=1222973
* https://bugzilla.suse.com/show_bug.cgi?id=1223053
* https://bugzilla.suse.com/show_bug.cgi?id=1223074
* https://bugzilla.suse.com/show_bug.cgi?id=1223191
* https://bugzilla.suse.com/show_bug.cgi?id=1223395
* https://bugzilla.suse.com/show_bug.cgi?id=1223635
* https://bugzilla.suse.com/show_bug.cgi?id=1223720
* https://bugzilla.suse.com/show_bug.cgi?id=1223731
* https://bugzilla.suse.com/show_bug.cgi?id=1223742
* https://bugzilla.suse.com/show_bug.cgi?id=1223763
* https://bugzilla.suse.com/show_bug.cgi?id=1223767
* https://bugzilla.suse.com/show_bug.cgi?id=1223777
* https://bugzilla.suse.com/show_bug.cgi?id=1223803
* https://bugzilla.suse.com/show_bug.cgi?id=1224105
* https://bugzilla.suse.com/show_bug.cgi?id=1224415
* https://bugzilla.suse.com/show_bug.cgi?id=1224485
* https://bugzilla.suse.com/show_bug.cgi?id=1224496
* https://bugzilla.suse.com/show_bug.cgi?id=1224510
* https://bugzilla.suse.com/show_bug.cgi?id=1224535
* https://bugzilla.suse.com/show_bug.cgi?id=1224631
* https://bugzilla.suse.com/show_bug.cgi?id=1224636
* https://bugzilla.suse.com/show_bug.cgi?id=1224690
* https://bugzilla.suse.com/show_bug.cgi?id=1224694
* https://bugzilla.suse.com/show_bug.cgi?id=1224700
* https://bugzilla.suse.com/show_bug.cgi?id=1224711
* https://bugzilla.suse.com/show_bug.cgi?id=1225461
* https://bugzilla.suse.com/show_bug.cgi?id=1225474
* https://bugzilla.suse.com/show_bug.cgi?id=1225475
* https://bugzilla.suse.com/show_bug.cgi?id=1225582
* https://bugzilla.suse.com/show_bug.cgi?id=1225607
* https://bugzilla.suse.com/show_bug.cgi?id=1225718
* https://bugzilla.suse.com/show_bug.cgi?id=1225751
* https://bugzilla.suse.com/show_bug.cgi?id=1225814
* https://bugzilla.suse.com/show_bug.cgi?id=1225832
* https://bugzilla.suse.com/show_bug.cgi?id=1225838
* https://bugzilla.suse.com/show_bug.cgi?id=1225903
* https://bugzilla.suse.com/show_bug.cgi?id=1226031
* https://bugzilla.suse.com/show_bug.cgi?id=1226127
* https://bugzilla.suse.com/show_bug.cgi?id=1226502
* https://bugzilla.suse.com/show_bug.cgi?id=1226530
* https://bugzilla.suse.com/show_bug.cgi?id=1226588
* https://bugzilla.suse.com/show_bug.cgi?id=1226604
* https://bugzilla.suse.com/show_bug.cgi?id=1226743
* https://bugzilla.suse.com/show_bug.cgi?id=1226751
* https://bugzilla.suse.com/show_bug.cgi?id=1226765
* https://bugzilla.suse.com/show_bug.cgi?id=1226798
* https://bugzilla.suse.com/show_bug.cgi?id=1226801
* https://bugzilla.suse.com/show_bug.cgi?id=1226834
* https://bugzilla.suse.com/show_bug.cgi?id=1226874
* https://bugzilla.suse.com/show_bug.cgi?id=1226885
* https://bugzilla.suse.com/show_bug.cgi?id=1226920
* https://bugzilla.suse.com/show_bug.cgi?id=1227149
* https://bugzilla.suse.com/show_bug.cgi?id=1227182
* https://bugzilla.suse.com/show_bug.cgi?id=1227383
* https://bugzilla.suse.com/show_bug.cgi?id=1227437
* https://bugzilla.suse.com/show_bug.cgi?id=1227492
* https://bugzilla.suse.com/show_bug.cgi?id=1227493
* https://bugzilla.suse.com/show_bug.cgi?id=1227494
* https://bugzilla.suse.com/show_bug.cgi?id=1227618
* https://bugzilla.suse.com/show_bug.cgi?id=1227620
* https://bugzilla.suse.com/show_bug.cgi?id=1227623
* https://bugzilla.suse.com/show_bug.cgi?id=1227627
* https://bugzilla.suse.com/show_bug.cgi?id=1227634
* https://bugzilla.suse.com/show_bug.cgi?id=1227706
* https://bugzilla.suse.com/show_bug.cgi?id=1227722
* https://bugzilla.suse.com/show_bug.cgi?id=1227724
* https://bugzilla.suse.com/show_bug.cgi?id=1227725
* https://bugzilla.suse.com/show_bug.cgi?id=1227728
* https://bugzilla.suse.com/show_bug.cgi?id=1227729
* https://bugzilla.suse.com/show_bug.cgi?id=1227732
* https://bugzilla.suse.com/show_bug.cgi?id=1227733
* https://bugzilla.suse.com/show_bug.cgi?id=1227734
* https://bugzilla.suse.com/show_bug.cgi?id=1227747
* https://bugzilla.suse.com/show_bug.cgi?id=1227750
* https://bugzilla.suse.com/show_bug.cgi?id=1227754
* https://bugzilla.suse.com/show_bug.cgi?id=1227758
* https://bugzilla.suse.com/show_bug.cgi?id=1227760
* https://bugzilla.suse.com/show_bug.cgi?id=1227761
* https://bugzilla.suse.com/show_bug.cgi?id=1227764
* https://bugzilla.suse.com/show_bug.cgi?id=1227766
* https://bugzilla.suse.com/show_bug.cgi?id=1227770
* https://bugzilla.suse.com/show_bug.cgi?id=1227771
* https://bugzilla.suse.com/show_bug.cgi?id=1227772
* https://bugzilla.suse.com/show_bug.cgi?id=1227774
* https://bugzilla.suse.com/show_bug.cgi?id=1227781
* https://bugzilla.suse.com/show_bug.cgi?id=1227784
* https://bugzilla.suse.com/show_bug.cgi?id=1227785
* https://bugzilla.suse.com/show_bug.cgi?id=1227787
* https://bugzilla.suse.com/show_bug.cgi?id=1227790
* https://bugzilla.suse.com/show_bug.cgi?id=1227791
* https://bugzilla.suse.com/show_bug.cgi?id=1227792
* https://bugzilla.suse.com/show_bug.cgi?id=1227796
* https://bugzilla.suse.com/show_bug.cgi?id=1227798
* https://bugzilla.suse.com/show_bug.cgi?id=1227799
* https://bugzilla.suse.com/show_bug.cgi?id=1227802
* https://bugzilla.suse.com/show_bug.cgi?id=1227808
* https://bugzilla.suse.com/show_bug.cgi?id=1227810
* https://bugzilla.suse.com/show_bug.cgi?id=1227811
* https://bugzilla.suse.com/show_bug.cgi?id=1227812
* https://bugzilla.suse.com/show_bug.cgi?id=1227815
* https://bugzilla.suse.com/show_bug.cgi?id=1227816
* https://bugzilla.suse.com/show_bug.cgi?id=1227818
* https://bugzilla.suse.com/show_bug.cgi?id=1227820
* https://bugzilla.suse.com/show_bug.cgi?id=1227823
* https://bugzilla.suse.com/show_bug.cgi?id=1227824
* https://bugzilla.suse.com/show_bug.cgi?id=1227826
* https://bugzilla.suse.com/show_bug.cgi?id=1227828
* https://bugzilla.suse.com/show_bug.cgi?id=1227829
* https://bugzilla.suse.com/show_bug.cgi?id=1227830
* https://bugzilla.suse.com/show_bug.cgi?id=1227832
* https://bugzilla.suse.com/show_bug.cgi?id=1227833
* https://bugzilla.suse.com/show_bug.cgi?id=1227834
* https://bugzilla.suse.com/show_bug.cgi?id=1227839
* https://bugzilla.suse.com/show_bug.cgi?id=1227840
* https://bugzilla.suse.com/show_bug.cgi?id=1227846
* https://bugzilla.suse.com/show_bug.cgi?id=1227849
* https://bugzilla.suse.com/show_bug.cgi?id=1227851
* https://bugzilla.suse.com/show_bug.cgi?id=1227853
* https://bugzilla.suse.com/show_bug.cgi?id=1227863
* https://bugzilla.suse.com/show_bug.cgi?id=1227864
* https://bugzilla.suse.com/show_bug.cgi?id=1227865
* https://bugzilla.suse.com/show_bug.cgi?id=1227867
* https://bugzilla.suse.com/show_bug.cgi?id=1227869
* https://bugzilla.suse.com/show_bug.cgi?id=1227870
* https://bugzilla.suse.com/show_bug.cgi?id=1227883
* https://bugzilla.suse.com/show_bug.cgi?id=1227884
* https://bugzilla.suse.com/show_bug.cgi?id=1227891
* https://bugzilla.suse.com/show_bug.cgi?id=1227893
* https://bugzilla.suse.com/show_bug.cgi?id=1227929
* https://bugzilla.suse.com/show_bug.cgi?id=1227950
* https://bugzilla.suse.com/show_bug.cgi?id=1227957
* https://bugzilla.suse.com/show_bug.cgi?id=1227981
* https://bugzilla.suse.com/show_bug.cgi?id=1228020
* https://bugzilla.suse.com/show_bug.cgi?id=1228021
* https://bugzilla.suse.com/show_bug.cgi?id=1228114
* https://bugzilla.suse.com/show_bug.cgi?id=1228192
* https://bugzilla.suse.com/show_bug.cgi?id=1228195
* https://bugzilla.suse.com/show_bug.cgi?id=1228202
* https://bugzilla.suse.com/show_bug.cgi?id=1228235
* https://bugzilla.suse.com/show_bug.cgi?id=1228236
* https://bugzilla.suse.com/show_bug.cgi?id=1228237
* https://bugzilla.suse.com/show_bug.cgi?id=1228247
* https://bugzilla.suse.com/show_bug.cgi?id=1228321
* https://bugzilla.suse.com/show_bug.cgi?id=1228409
* https://bugzilla.suse.com/show_bug.cgi?id=1228410
* https://bugzilla.suse.com/show_bug.cgi?id=1228426
* https://bugzilla.suse.com/show_bug.cgi?id=1228427
* https://bugzilla.suse.com/show_bug.cgi?id=1228429
* https://bugzilla.suse.com/show_bug.cgi?id=1228446
* https://bugzilla.suse.com/show_bug.cgi?id=1228447
* https://bugzilla.suse.com/show_bug.cgi?id=1228449
* https://bugzilla.suse.com/show_bug.cgi?id=1228450
* https://bugzilla.suse.com/show_bug.cgi?id=1228452
* https://bugzilla.suse.com/show_bug.cgi?id=1228456
* https://bugzilla.suse.com/show_bug.cgi?id=1228457
* https://bugzilla.suse.com/show_bug.cgi?id=1228458
* https://bugzilla.suse.com/show_bug.cgi?id=1228459
* https://bugzilla.suse.com/show_bug.cgi?id=1228460
* https://bugzilla.suse.com/show_bug.cgi?id=1228462
* https://bugzilla.suse.com/show_bug.cgi?id=1228463
* https://bugzilla.suse.com/show_bug.cgi?id=1228466
* https://bugzilla.suse.com/show_bug.cgi?id=1228467
* https://bugzilla.suse.com/show_bug.cgi?id=1228468
* https://bugzilla.suse.com/show_bug.cgi?id=1228469
* https://bugzilla.suse.com/show_bug.cgi?id=1228470
* https://bugzilla.suse.com/show_bug.cgi?id=1228472
* https://bugzilla.suse.com/show_bug.cgi?id=1228479
* https://bugzilla.suse.com/show_bug.cgi?id=1228480
* https://bugzilla.suse.com/show_bug.cgi?id=1228481
* https://bugzilla.suse.com/show_bug.cgi?id=1228482
* https://bugzilla.suse.com/show_bug.cgi?id=1228483
* https://bugzilla.suse.com/show_bug.cgi?id=1228484
* https://bugzilla.suse.com/show_bug.cgi?id=1228485
* https://bugzilla.suse.com/show_bug.cgi?id=1228486
* https://bugzilla.suse.com/show_bug.cgi?id=1228487
* https://bugzilla.suse.com/show_bug.cgi?id=1228489
* https://bugzilla.suse.com/show_bug.cgi?id=1228491
* https://bugzilla.suse.com/show_bug.cgi?id=1228492
* https://bugzilla.suse.com/show_bug.cgi?id=1228493
* https://bugzilla.suse.com/show_bug.cgi?id=1228494
* https://bugzilla.suse.com/show_bug.cgi?id=1228495
* https://bugzilla.suse.com/show_bug.cgi?id=1228496
* https://bugzilla.suse.com/show_bug.cgi?id=1228499
* https://bugzilla.suse.com/show_bug.cgi?id=1228500
* https://bugzilla.suse.com/show_bug.cgi?id=1228501
* https://bugzilla.suse.com/show_bug.cgi?id=1228502
* https://bugzilla.suse.com/show_bug.cgi?id=1228503
* https://bugzilla.suse.com/show_bug.cgi?id=1228505
* https://bugzilla.suse.com/show_bug.cgi?id=1228508
* https://bugzilla.suse.com/show_bug.cgi?id=1228509
* https://bugzilla.suse.com/show_bug.cgi?id=1228510
* https://bugzilla.suse.com/show_bug.cgi?id=1228511
* https://bugzilla.suse.com/show_bug.cgi?id=1228513
* https://bugzilla.suse.com/show_bug.cgi?id=1228515
* https://bugzilla.suse.com/show_bug.cgi?id=1228516
* https://bugzilla.suse.com/show_bug.cgi?id=1228518
* https://bugzilla.suse.com/show_bug.cgi?id=1228520
* https://bugzilla.suse.com/show_bug.cgi?id=1228525
* https://bugzilla.suse.com/show_bug.cgi?id=1228527
* https://bugzilla.suse.com/show_bug.cgi?id=1228530
* https://bugzilla.suse.com/show_bug.cgi?id=1228531
* https://bugzilla.suse.com/show_bug.cgi?id=1228539
* https://bugzilla.suse.com/show_bug.cgi?id=1228561
* https://bugzilla.suse.com/show_bug.cgi?id=1228563
* https://bugzilla.suse.com/show_bug.cgi?id=1228564
* https://bugzilla.suse.com/show_bug.cgi?id=1228565
* https://bugzilla.suse.com/show_bug.cgi?id=1228567
* https://bugzilla.suse.com/show_bug.cgi?id=1228568
* https://bugzilla.suse.com/show_bug.cgi?id=1228572
* https://bugzilla.suse.com/show_bug.cgi?id=1228576
* https://bugzilla.suse.com/show_bug.cgi?id=1228579
* https://bugzilla.suse.com/show_bug.cgi?id=1228580
* https://bugzilla.suse.com/show_bug.cgi?id=1228581
* https://bugzilla.suse.com/show_bug.cgi?id=1228582
* https://bugzilla.suse.com/show_bug.cgi?id=1228584
* https://bugzilla.suse.com/show_bug.cgi?id=1228586
* https://bugzilla.suse.com/show_bug.cgi?id=1228588
* https://bugzilla.suse.com/show_bug.cgi?id=1228590
* https://bugzilla.suse.com/show_bug.cgi?id=1228591
* https://bugzilla.suse.com/show_bug.cgi?id=1228599
* https://bugzilla.suse.com/show_bug.cgi?id=1228615
* https://bugzilla.suse.com/show_bug.cgi?id=1228616
* https://bugzilla.suse.com/show_bug.cgi?id=1228617
* https://bugzilla.suse.com/show_bug.cgi?id=1228625
* https://bugzilla.suse.com/show_bug.cgi?id=1228626
* https://bugzilla.suse.com/show_bug.cgi?id=1228633
* https://bugzilla.suse.com/show_bug.cgi?id=1228635
* https://bugzilla.suse.com/show_bug.cgi?id=1228636
* https://bugzilla.suse.com/show_bug.cgi?id=1228640
* https://bugzilla.suse.com/show_bug.cgi?id=1228643
* https://bugzilla.suse.com/show_bug.cgi?id=1228644
* https://bugzilla.suse.com/show_bug.cgi?id=1228646
* https://bugzilla.suse.com/show_bug.cgi?id=1228649
* https://bugzilla.suse.com/show_bug.cgi?id=1228650
* https://bugzilla.suse.com/show_bug.cgi?id=1228654
* https://bugzilla.suse.com/show_bug.cgi?id=1228655
* https://bugzilla.suse.com/show_bug.cgi?id=1228656
* https://bugzilla.suse.com/show_bug.cgi?id=1228658
* https://bugzilla.suse.com/show_bug.cgi?id=1228660
* https://bugzilla.suse.com/show_bug.cgi?id=1228662
* https://bugzilla.suse.com/show_bug.cgi?id=1228665
* https://bugzilla.suse.com/show_bug.cgi?id=1228666
* https://bugzilla.suse.com/show_bug.cgi?id=1228667
* https://bugzilla.suse.com/show_bug.cgi?id=1228672
* https://bugzilla.suse.com/show_bug.cgi?id=1228673
* https://bugzilla.suse.com/show_bug.cgi?id=1228674
* https://bugzilla.suse.com/show_bug.cgi?id=1228677
* https://bugzilla.suse.com/show_bug.cgi?id=1228680
* https://bugzilla.suse.com/show_bug.cgi?id=1228687
* https://bugzilla.suse.com/show_bug.cgi?id=1228705
* https://bugzilla.suse.com/show_bug.cgi?id=1228706
* https://bugzilla.suse.com/show_bug.cgi?id=1228707
* https://bugzilla.suse.com/show_bug.cgi?id=1228708
* https://bugzilla.suse.com/show_bug.cgi?id=1228709
* https://bugzilla.suse.com/show_bug.cgi?id=1228710
* https://bugzilla.suse.com/show_bug.cgi?id=1228718
* https://bugzilla.suse.com/show_bug.cgi?id=1228720
* https://bugzilla.suse.com/show_bug.cgi?id=1228721
* https://bugzilla.suse.com/show_bug.cgi?id=1228722
* https://bugzilla.suse.com/show_bug.cgi?id=1228723
* https://bugzilla.suse.com/show_bug.cgi?id=1228724
* https://bugzilla.suse.com/show_bug.cgi?id=1228726
* https://bugzilla.suse.com/show_bug.cgi?id=1228727
* https://bugzilla.suse.com/show_bug.cgi?id=1228733
* https://bugzilla.suse.com/show_bug.cgi?id=1228737
* https://bugzilla.suse.com/show_bug.cgi?id=1228743
* https://bugzilla.suse.com/show_bug.cgi?id=1228748
* https://bugzilla.suse.com/show_bug.cgi?id=1228754
* https://bugzilla.suse.com/show_bug.cgi?id=1228756
* https://bugzilla.suse.com/show_bug.cgi?id=1228757
* https://bugzilla.suse.com/show_bug.cgi?id=1228758
* https://bugzilla.suse.com/show_bug.cgi?id=1228764
* https://bugzilla.suse.com/show_bug.cgi?id=1228766
* https://bugzilla.suse.com/show_bug.cgi?id=1228779
* https://bugzilla.suse.com/show_bug.cgi?id=1228801
* https://bugzilla.suse.com/show_bug.cgi?id=1228849
* https://bugzilla.suse.com/show_bug.cgi?id=1228850
* https://bugzilla.suse.com/show_bug.cgi?id=1228857
* https://bugzilla.suse.com/show_bug.cgi?id=1228959
* https://bugzilla.suse.com/show_bug.cgi?id=1228964
* https://bugzilla.suse.com/show_bug.cgi?id=1228966
* https://bugzilla.suse.com/show_bug.cgi?id=1228967
* https://bugzilla.suse.com/show_bug.cgi?id=1228973
* https://bugzilla.suse.com/show_bug.cgi?id=1228977
* https://bugzilla.suse.com/show_bug.cgi?id=1228978
* https://bugzilla.suse.com/show_bug.cgi?id=1228979
* https://bugzilla.suse.com/show_bug.cgi?id=1228986
* https://bugzilla.suse.com/show_bug.cgi?id=1228988
* https://bugzilla.suse.com/show_bug.cgi?id=1228989
* https://bugzilla.suse.com/show_bug.cgi?id=1228991
* https://bugzilla.suse.com/show_bug.cgi?id=1228992
* https://bugzilla.suse.com/show_bug.cgi?id=1229005
* https://bugzilla.suse.com/show_bug.cgi?id=1229024
* https://bugzilla.suse.com/show_bug.cgi?id=1229042
* https://bugzilla.suse.com/show_bug.cgi?id=1229045
* https://bugzilla.suse.com/show_bug.cgi?id=1229046
* https://bugzilla.suse.com/show_bug.cgi?id=1229054
* https://bugzilla.suse.com/show_bug.cgi?id=1229056
* https://bugzilla.suse.com/show_bug.cgi?id=1229086
* https://bugzilla.suse.com/show_bug.cgi?id=1229134
* https://bugzilla.suse.com/show_bug.cgi?id=1229136
* https://bugzilla.suse.com/show_bug.cgi?id=1229154
* https://bugzilla.suse.com/show_bug.cgi?id=1229156
* https://bugzilla.suse.com/show_bug.cgi?id=1229160
* https://bugzilla.suse.com/show_bug.cgi?id=1229167
* https://bugzilla.suse.com/show_bug.cgi?id=1229168
* https://bugzilla.suse.com/show_bug.cgi?id=1229169
* https://bugzilla.suse.com/show_bug.cgi?id=1229170
* https://bugzilla.suse.com/show_bug.cgi?id=1229171
* https://bugzilla.suse.com/show_bug.cgi?id=1229172
* https://bugzilla.suse.com/show_bug.cgi?id=1229173
* https://bugzilla.suse.com/show_bug.cgi?id=1229174
* https://bugzilla.suse.com/show_bug.cgi?id=1229239
* https://bugzilla.suse.com/show_bug.cgi?id=1229240
* https://bugzilla.suse.com/show_bug.cgi?id=1229241
* https://bugzilla.suse.com/show_bug.cgi?id=1229243
* https://bugzilla.suse.com/show_bug.cgi?id=1229244
* https://bugzilla.suse.com/show_bug.cgi?id=1229245
* https://bugzilla.suse.com/show_bug.cgi?id=1229246
* https://bugzilla.suse.com/show_bug.cgi?id=1229247
* https://bugzilla.suse.com/show_bug.cgi?id=1229248
* https://bugzilla.suse.com/show_bug.cgi?id=1229249
* https://bugzilla.suse.com/show_bug.cgi?id=1229250
* https://bugzilla.suse.com/show_bug.cgi?id=1229251
* https://bugzilla.suse.com/show_bug.cgi?id=1229252
* https://bugzilla.suse.com/show_bug.cgi?id=1229253
* https://bugzilla.suse.com/show_bug.cgi?id=1229254
* https://bugzilla.suse.com/show_bug.cgi?id=1229255
* https://bugzilla.suse.com/show_bug.cgi?id=1229256
* https://bugzilla.suse.com/show_bug.cgi?id=1229287
* https://bugzilla.suse.com/show_bug.cgi?id=1229290
* https://bugzilla.suse.com/show_bug.cgi?id=1229291
* https://bugzilla.suse.com/show_bug.cgi?id=1229292
* https://bugzilla.suse.com/show_bug.cgi?id=1229294
* https://bugzilla.suse.com/show_bug.cgi?id=1229296
* https://bugzilla.suse.com/show_bug.cgi?id=1229297
* https://bugzilla.suse.com/show_bug.cgi?id=1229298
* https://bugzilla.suse.com/show_bug.cgi?id=1229299
* https://bugzilla.suse.com/show_bug.cgi?id=1229301
* https://bugzilla.suse.com/show_bug.cgi?id=1229303
* https://bugzilla.suse.com/show_bug.cgi?id=1229304
* https://bugzilla.suse.com/show_bug.cgi?id=1229305
* https://bugzilla.suse.com/show_bug.cgi?id=1229307
* https://bugzilla.suse.com/show_bug.cgi?id=1229309
* https://bugzilla.suse.com/show_bug.cgi?id=1229312
* https://bugzilla.suse.com/show_bug.cgi?id=1229313
* https://bugzilla.suse.com/show_bug.cgi?id=1229314
* https://bugzilla.suse.com/show_bug.cgi?id=1229315
* https://bugzilla.suse.com/show_bug.cgi?id=1229316
* https://bugzilla.suse.com/show_bug.cgi?id=1229317
* https://bugzilla.suse.com/show_bug.cgi?id=1229318
* https://bugzilla.suse.com/show_bug.cgi?id=1229319
* https://bugzilla.suse.com/show_bug.cgi?id=1229320
* https://bugzilla.suse.com/show_bug.cgi?id=1229327
* https://bugzilla.suse.com/show_bug.cgi?id=1229341
* https://bugzilla.suse.com/show_bug.cgi?id=1229342
* https://bugzilla.suse.com/show_bug.cgi?id=1229344
* https://bugzilla.suse.com/show_bug.cgi?id=1229345
* https://bugzilla.suse.com/show_bug.cgi?id=1229346
* https://bugzilla.suse.com/show_bug.cgi?id=1229347
* https://bugzilla.suse.com/show_bug.cgi?id=1229349
* https://bugzilla.suse.com/show_bug.cgi?id=1229350
* https://bugzilla.suse.com/show_bug.cgi?id=1229351
* https://bugzilla.suse.com/show_bug.cgi?id=1229353
* https://bugzilla.suse.com/show_bug.cgi?id=1229354
* https://bugzilla.suse.com/show_bug.cgi?id=1229355
* https://bugzilla.suse.com/show_bug.cgi?id=1229356
* https://bugzilla.suse.com/show_bug.cgi?id=1229357
* https://bugzilla.suse.com/show_bug.cgi?id=1229358
* https://bugzilla.suse.com/show_bug.cgi?id=1229359
* https://bugzilla.suse.com/show_bug.cgi?id=1229360
* https://bugzilla.suse.com/show_bug.cgi?id=1229365
* https://bugzilla.suse.com/show_bug.cgi?id=1229366
* https://bugzilla.suse.com/show_bug.cgi?id=1229369
* https://bugzilla.suse.com/show_bug.cgi?id=1229370
* https://bugzilla.suse.com/show_bug.cgi?id=1229373
* https://bugzilla.suse.com/show_bug.cgi?id=1229374
* https://bugzilla.suse.com/show_bug.cgi?id=1229379
* https://bugzilla.suse.com/show_bug.cgi?id=1229381
* https://bugzilla.suse.com/show_bug.cgi?id=1229382
* https://bugzilla.suse.com/show_bug.cgi?id=1229383
* https://bugzilla.suse.com/show_bug.cgi?id=1229386
* https://bugzilla.suse.com/show_bug.cgi?id=1229388
* https://bugzilla.suse.com/show_bug.cgi?id=1229390
* https://bugzilla.suse.com/show_bug.cgi?id=1229391
* https://bugzilla.suse.com/show_bug.cgi?id=1229392
* https://bugzilla.suse.com/show_bug.cgi?id=1229395
* https://bugzilla.suse.com/show_bug.cgi?id=1229398
* https://bugzilla.suse.com/show_bug.cgi?id=1229399
* https://bugzilla.suse.com/show_bug.cgi?id=1229400
* https://bugzilla.suse.com/show_bug.cgi?id=1229402
* https://bugzilla.suse.com/show_bug.cgi?id=1229403
* https://bugzilla.suse.com/show_bug.cgi?id=1229404
* https://bugzilla.suse.com/show_bug.cgi?id=1229407
* https://bugzilla.suse.com/show_bug.cgi?id=1229409
* https://bugzilla.suse.com/show_bug.cgi?id=1229410
* https://bugzilla.suse.com/show_bug.cgi?id=1229411
* https://bugzilla.suse.com/show_bug.cgi?id=1229413
* https://bugzilla.suse.com/show_bug.cgi?id=1229414
* https://bugzilla.suse.com/show_bug.cgi?id=1229417
* https://bugzilla.suse.com/show_bug.cgi?id=1229444
* https://bugzilla.suse.com/show_bug.cgi?id=1229451
* https://bugzilla.suse.com/show_bug.cgi?id=1229452
* https://bugzilla.suse.com/show_bug.cgi?id=1229455
* https://bugzilla.suse.com/show_bug.cgi?id=1229456
* https://bugzilla.suse.com/show_bug.cgi?id=1229480
* https://bugzilla.suse.com/show_bug.cgi?id=1229481
* https://bugzilla.suse.com/show_bug.cgi?id=1229482
* https://bugzilla.suse.com/show_bug.cgi?id=1229484
* https://bugzilla.suse.com/show_bug.cgi?id=1229485
* https://bugzilla.suse.com/show_bug.cgi?id=1229486
* https://bugzilla.suse.com/show_bug.cgi?id=1229487
* https://bugzilla.suse.com/show_bug.cgi?id=1229488
* https://bugzilla.suse.com/show_bug.cgi?id=1229489
* https://bugzilla.suse.com/show_bug.cgi?id=1229490
* https://bugzilla.suse.com/show_bug.cgi?id=1229493
* https://bugzilla.suse.com/show_bug.cgi?id=1229495
* https://bugzilla.suse.com/show_bug.cgi?id=1229496
* https://bugzilla.suse.com/show_bug.cgi?id=1229497
* https://bugzilla.suse.com/show_bug.cgi?id=1229500
* https://bugzilla.suse.com/show_bug.cgi?id=1229503
* https://bugzilla.suse.com/show_bug.cgi?id=1229707
* https://bugzilla.suse.com/show_bug.cgi?id=1229739
* https://bugzilla.suse.com/show_bug.cgi?id=1229743
* https://bugzilla.suse.com/show_bug.cgi?id=1229746
* https://bugzilla.suse.com/show_bug.cgi?id=1229747
* https://bugzilla.suse.com/show_bug.cgi?id=1229752
* https://bugzilla.suse.com/show_bug.cgi?id=1229754
* https://bugzilla.suse.com/show_bug.cgi?id=1229755
* https://bugzilla.suse.com/show_bug.cgi?id=1229756
* https://bugzilla.suse.com/show_bug.cgi?id=1229759
* https://bugzilla.suse.com/show_bug.cgi?id=1229761
* https://bugzilla.suse.com/show_bug.cgi?id=1229767
* https://bugzilla.suse.com/show_bug.cgi?id=1229781
* https://bugzilla.suse.com/show_bug.cgi?id=1229784
* https://bugzilla.suse.com/show_bug.cgi?id=1229785
* https://bugzilla.suse.com/show_bug.cgi?id=1229787
* https://bugzilla.suse.com/show_bug.cgi?id=1229788
* https://bugzilla.suse.com/show_bug.cgi?id=1229789
* https://bugzilla.suse.com/show_bug.cgi?id=1229792
* https://bugzilla.suse.com/show_bug.cgi?id=1229820
* https://bugzilla.suse.com/show_bug.cgi?id=1229827
* https://bugzilla.suse.com/show_bug.cgi?id=1229830
* https://bugzilla.suse.com/show_bug.cgi?id=1229837
* https://bugzilla.suse.com/show_bug.cgi?id=1229940
* https://bugzilla.suse.com/show_bug.cgi?id=1230056
* https://jira.suse.com/browse/PED-10029
* https://jira.suse.com/browse/PED-10045
* https://jira.suse.com/browse/PED-10055
* https://jira.suse.com/browse/PED-10105
* https://jira.suse.com/browse/PED-10108
* https://jira.suse.com/browse/PED-8779


--===============6623829598228459008==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for the Linux Kernel</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:3195-1</td>
</tr>

<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1012628">bsc#1012628</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1193454">bsc#1193454</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">bsc#1194869</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1205462">bsc#1205462</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1208783">bsc#1208783</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213123">bsc#1213123</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214285">bsc#1214285</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215199">bsc#1215199</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219596">bsc#1219596</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220066">bsc#1220066</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220252">bsc#1220252</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220877">bsc#1220877</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221326">bsc#1221326</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221630">bsc#1221630</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221645">bsc#1221645</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221652">bsc#1221652</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221857">bsc#1221857</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222254">bsc#1222254</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222335">bsc#1222335</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222350">bsc#1222350</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222364">bsc#1222364</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222372">bsc#1222372</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222387">bsc#1222387</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222433">bsc#1222433</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222434">bsc#1222434</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222625">bsc#1222625</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222633">bsc#1222633</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222634">bsc#1222634</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222777">bsc#1222777</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222808">bsc#1222808</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222967">bsc#1222967</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222973">bsc#1222973</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223053">bsc#1223053</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223074">bsc#1223074</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223191">bsc#1223191</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223395">bsc#1223395</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223635">bsc#1223635</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223720">bsc#1223720</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223731">bsc#1223731</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223742">bsc#1223742</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223763">bsc#1223763</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223767">bsc#1223767</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223777">bsc#1223777</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223803">bsc#1223803</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224105">bsc#1224105</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224415">bsc#1224415</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224485">bsc#1224485</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224496">bsc#1224496</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224510">bsc#1224510</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224535">bsc#1224535</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224631">bsc#1224631</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224636">bsc#1224636</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224690">bsc#1224690</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224694">bsc#1224694</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224700">bsc#1224700</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224711">bsc#1224711</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225461">bsc#1225461</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225474">bsc#1225474</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225475">bsc#1225475</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225582">bsc#1225582</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225607">bsc#1225607</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225718">bsc#1225718</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225751">bsc#1225751</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225814">bsc#1225814</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225832">bsc#1225832</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225838">bsc#1225838</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225903">bsc#1225903</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226031">bsc#1226031</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226127">bsc#1226127</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226502">bsc#1226502</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226530">bsc#1226530</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226588">bsc#1226588</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226604">bsc#1226604</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226743">bsc#1226743</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226751">bsc#1226751</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226765">bsc#1226765</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226798">bsc#1226798</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226801">bsc#1226801</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226834">bsc#1226834</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226874">bsc#1226874</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226885">bsc#1226885</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226920">bsc#1226920</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227149">bsc#1227149</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227182">bsc#1227182</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227383">bsc#1227383</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227437">bsc#1227437</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227492">bsc#1227492</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227493">bsc#1227493</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227494">bsc#1227494</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227618">bsc#1227618</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227620">bsc#1227620</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227623">bsc#1227623</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227627">bsc#1227627</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227634">bsc#1227634</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227706">bsc#1227706</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227722">bsc#1227722</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227724">bsc#1227724</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227725">bsc#1227725</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227728">bsc#1227728</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227729">bsc#1227729</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227732">bsc#1227732</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227733">bsc#1227733</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227734">bsc#1227734</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227747">bsc#1227747</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227750">bsc#1227750</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227754">bsc#1227754</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227758">bsc#1227758</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227760">bsc#1227760</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227761">bsc#1227761</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227764">bsc#1227764</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227766">bsc#1227766</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227770">bsc#1227770</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227771">bsc#1227771</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227772">bsc#1227772</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227774">bsc#1227774</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227781">bsc#1227781</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227784">bsc#1227784</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227785">bsc#1227785</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227787">bsc#1227787</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227790">bsc#1227790</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227791">bsc#1227791</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227792">bsc#1227792</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227796">bsc#1227796</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227798">bsc#1227798</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227799">bsc#1227799</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227802">bsc#1227802</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227808">bsc#1227808</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227810">bsc#1227810</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227811">bsc#1227811</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227812">bsc#1227812</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227815">bsc#1227815</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227816">bsc#1227816</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227818">bsc#1227818</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227820">bsc#1227820</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227823">bsc#1227823</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227824">bsc#1227824</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227826">bsc#1227826</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227828">bsc#1227828</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227829">bsc#1227829</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227830">bsc#1227830</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227832">bsc#1227832</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227833">bsc#1227833</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227834">bsc#1227834</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227839">bsc#1227839</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227840">bsc#1227840</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227846">bsc#1227846</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227849">bsc#1227849</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227851">bsc#1227851</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227853">bsc#1227853</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227863">bsc#1227863</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227864">bsc#1227864</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227865">bsc#1227865</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227867">bsc#1227867</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227869">bsc#1227869</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227870">bsc#1227870</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227883">bsc#1227883</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227884">bsc#1227884</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227891">bsc#1227891</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227893">bsc#1227893</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227929">bsc#1227929</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227950">bsc#1227950</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227957">bsc#1227957</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227981">bsc#1227981</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228020">bsc#1228020</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228021">bsc#1228021</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228114">bsc#1228114</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228192">bsc#1228192</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228195">bsc#1228195</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228202">bsc#1228202</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228235">bsc#1228235</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228236">bsc#1228236</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228237">bsc#1228237</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228247">bsc#1228247</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228321">bsc#1228321</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228409">bsc#1228409</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228410">bsc#1228410</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228426">bsc#1228426</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228427">bsc#1228427</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228429">bsc#1228429</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228446">bsc#1228446</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228447">bsc#1228447</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228449">bsc#1228449</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228450">bsc#1228450</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228452">bsc#1228452</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228456">bsc#1228456</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228457">bsc#1228457</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228458">bsc#1228458</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228459">bsc#1228459</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228460">bsc#1228460</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228462">bsc#1228462</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228463">bsc#1228463</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228466">bsc#1228466</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228467">bsc#1228467</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228468">bsc#1228468</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228469">bsc#1228469</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228470">bsc#1228470</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228472">bsc#1228472</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228479">bsc#1228479</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228480">bsc#1228480</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228481">bsc#1228481</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228482">bsc#1228482</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228483">bsc#1228483</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228484">bsc#1228484</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228485">bsc#1228485</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228486">bsc#1228486</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228487">bsc#1228487</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228489">bsc#1228489</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228491">bsc#1228491</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228492">bsc#1228492</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228493">bsc#1228493</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228494">bsc#1228494</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228495">bsc#1228495</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228496">bsc#1228496</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228499">bsc#1228499</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228500">bsc#1228500</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228501">bsc#1228501</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228502">bsc#1228502</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228503">bsc#1228503</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228505">bsc#1228505</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228508">bsc#1228508</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228509">bsc#1228509</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228510">bsc#1228510</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228511">bsc#1228511</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228513">bsc#1228513</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228515">bsc#1228515</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228516">bsc#1228516</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228518">bsc#1228518</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228520">bsc#1228520</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228525">bsc#1228525</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228527">bsc#1228527</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228530">bsc#1228530</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228531">bsc#1228531</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228539">bsc#1228539</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228561">bsc#1228561</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228563">bsc#1228563</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228564">bsc#1228564</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228565">bsc#1228565</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228567">bsc#1228567</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228568">bsc#1228568</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228572">bsc#1228572</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228576">bsc#1228576</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228579">bsc#1228579</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228580">bsc#1228580</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228581">bsc#1228581</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228582">bsc#1228582</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228584">bsc#1228584</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228586">bsc#1228586</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228588">bsc#1228588</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228590">bsc#1228590</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228591">bsc#1228591</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228599">bsc#1228599</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228615">bsc#1228615</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228616">bsc#1228616</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228617">bsc#1228617</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228625">bsc#1228625</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228626">bsc#1228626</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228633">bsc#1228633</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228635">bsc#1228635</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228636">bsc#1228636</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228640">bsc#1228640</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228643">bsc#1228643</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228644">bsc#1228644</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228646">bsc#1228646</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228649">bsc#1228649</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228650">bsc#1228650</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228654">bsc#1228654</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228655">bsc#1228655</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228656">bsc#1228656</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228658">bsc#1228658</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228660">bsc#1228660</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228662">bsc#1228662</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228665">bsc#1228665</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228666">bsc#1228666</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228667">bsc#1228667</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228672">bsc#1228672</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228673">bsc#1228673</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228674">bsc#1228674</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228677">bsc#1228677</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228680">bsc#1228680</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228687">bsc#1228687</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228705">bsc#1228705</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228706">bsc#1228706</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228707">bsc#1228707</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228708">bsc#1228708</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228709">bsc#1228709</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228710">bsc#1228710</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228718">bsc#1228718</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228720">bsc#1228720</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228721">bsc#1228721</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228722">bsc#1228722</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228723">bsc#1228723</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228724">bsc#1228724</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228726">bsc#1228726</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228727">bsc#1228727</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228733">bsc#1228733</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228737">bsc#1228737</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228743">bsc#1228743</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228748">bsc#1228748</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228754">bsc#1228754</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228756">bsc#1228756</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228757">bsc#1228757</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228758">bsc#1228758</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228764">bsc#1228764</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228766">bsc#1228766</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228779">bsc#1228779</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228801">bsc#1228801</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228849">bsc#1228849</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228850">bsc#1228850</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228857">bsc#1228857</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228959">bsc#1228959</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228964">bsc#1228964</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228966">bsc#1228966</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228967">bsc#1228967</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228973">bsc#1228973</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228977">bsc#1228977</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228978">bsc#1228978</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228979">bsc#1228979</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228986">bsc#1228986</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228988">bsc#1228988</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228989">bsc#1228989</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228991">bsc#1228991</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228992">bsc#1228992</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229005">bsc#1229005</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229024">bsc#1229024</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229042">bsc#1229042</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229045">bsc#1229045</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229046">bsc#1229046</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229054">bsc#1229054</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229056">bsc#1229056</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229086">bsc#1229086</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229134">bsc#1229134</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229136">bsc#1229136</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229154">bsc#1229154</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229156">bsc#1229156</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229160">bsc#1229160</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229167">bsc#1229167</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229168">bsc#1229168</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229169">bsc#1229169</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229170">bsc#1229170</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229171">bsc#1229171</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229172">bsc#1229172</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229173">bsc#1229173</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229174">bsc#1229174</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229239">bsc#1229239</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229240">bsc#1229240</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229241">bsc#1229241</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229243">bsc#1229243</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229244">bsc#1229244</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229245">bsc#1229245</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229246">bsc#1229246</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229247">bsc#1229247</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229248">bsc#1229248</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229249">bsc#1229249</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229250">bsc#1229250</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229251">bsc#1229251</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229252">bsc#1229252</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229253">bsc#1229253</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229254">bsc#1229254</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229255">bsc#1229255</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229256">bsc#1229256</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229287">bsc#1229287</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229290">bsc#1229290</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229291">bsc#1229291</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229292">bsc#1229292</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229294">bsc#1229294</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229296">bsc#1229296</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229297">bsc#1229297</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229298">bsc#1229298</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229299">bsc#1229299</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229301">bsc#1229301</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229303">bsc#1229303</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229304">bsc#1229304</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229305">bsc#1229305</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229307">bsc#1229307</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229309">bsc#1229309</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229312">bsc#1229312</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229313">bsc#1229313</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229314">bsc#1229314</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229315">bsc#1229315</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229316">bsc#1229316</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229317">bsc#1229317</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229318">bsc#1229318</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229319">bsc#1229319</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229320">bsc#1229320</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229327">bsc#1229327</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229341">bsc#1229341</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229342">bsc#1229342</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229344">bsc#1229344</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229345">bsc#1229345</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229346">bsc#1229346</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229347">bsc#1229347</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229349">bsc#1229349</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229350">bsc#1229350</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229351">bsc#1229351</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229353">bsc#1229353</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229354">bsc#1229354</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229355">bsc#1229355</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229356">bsc#1229356</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229357">bsc#1229357</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229358">bsc#1229358</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229359">bsc#1229359</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229360">bsc#1229360</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229365">bsc#1229365</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229366">bsc#1229366</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229369">bsc#1229369</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229370">bsc#1229370</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229373">bsc#1229373</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229374">bsc#1229374</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229379">bsc#1229379</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229381">bsc#1229381</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229382">bsc#1229382</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229383">bsc#1229383</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229386">bsc#1229386</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229388">bsc#1229388</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229390">bsc#1229390</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229391">bsc#1229391</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229392">bsc#1229392</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229395">bsc#1229395</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229398">bsc#1229398</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229399">bsc#1229399</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229400">bsc#1229400</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229402">bsc#1229402</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229403">bsc#1229403</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229404">bsc#1229404</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229407">bsc#1229407</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229409">bsc#1229409</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229410">bsc#1229410</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229411">bsc#1229411</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229413">bsc#1229413</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229414">bsc#1229414</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229417">bsc#1229417</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229444">bsc#1229444</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229451">bsc#1229451</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229452">bsc#1229452</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229455">bsc#1229455</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229456">bsc#1229456</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229480">bsc#1229480</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229481">bsc#1229481</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229482">bsc#1229482</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229484">bsc#1229484</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229485">bsc#1229485</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229486">bsc#1229486</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229487">bsc#1229487</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229488">bsc#1229488</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229489">bsc#1229489</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229490">bsc#1229490</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229493">bsc#1229493</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229495">bsc#1229495</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229496">bsc#1229496</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229497">bsc#1229497</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229500">bsc#1229500</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229503">bsc#1229503</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229707">bsc#1229707</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229739">bsc#1229739</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229743">bsc#1229743</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229746">bsc#1229746</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229747">bsc#1229747</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229752">bsc#1229752</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229754">bsc#1229754</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229755">bsc#1229755</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229756">bsc#1229756</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229759">bsc#1229759</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229761">bsc#1229761</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229767">bsc#1229767</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229781">bsc#1229781</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229784">bsc#1229784</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229785">bsc#1229785</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229787">bsc#1229787</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229788">bsc#1229788</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229789">bsc#1229789</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229792">bsc#1229792</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229820">bsc#1229820</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229827">bsc#1229827</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229830">bsc#1229830</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229837">bsc#1229837</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229940">bsc#1229940</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230056">bsc#1230056</a>
</li>


<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-10029">jsc#PED-10029</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-10045">jsc#PED-10045</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-10055">jsc#PED-10055</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-10105">jsc#PED-10105</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-10108">jsc#PED-10108</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-8779">jsc#PED-8779</a>
</li>

</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52489.html">CVE-2023-52489</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52581.html">CVE-2023-52581</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52668.html">CVE-2023-52668</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52688.html">CVE-2023-52688</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52756.html">CVE-2023-52756</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52766.html">CVE-2023-52766</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52800.html">CVE-2023-52800</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52802.html">CVE-2023-52802</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52859.html">CVE-2023-52859</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52885.html">CVE-2023-52885</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52886.html">CVE-2023-52886</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52887.html">CVE-2023-52887</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52889.html">CVE-2023-52889</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26590.html">CVE-2024-26590</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26631.html">CVE-2024-26631</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26637.html">CVE-2024-26637</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26668.html">CVE-2024-26668</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26669.html">CVE-2024-26669</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26677.html">CVE-2024-26677</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26682.html">CVE-2024-26682</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26683.html">CVE-2024-26683</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26735.html">CVE-2024-26735</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26758.html">CVE-2024-26758</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26767.html">CVE-2024-26767</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26808.html">CVE-2024-26808</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26809.html">CVE-2024-26809</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26812.html">CVE-2024-26812</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26835.html">CVE-2024-26835</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26837.html">CVE-2024-26837</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26849.html">CVE-2024-26849</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26851.html">CVE-2024-26851</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26889.html">CVE-2024-26889</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26920.html">CVE-2024-26920</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26976.html">CVE-2024-26976</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27010.html">CVE-2024-27010</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27011.html">CVE-2024-27011</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27024.html">CVE-2024-27024</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27049.html">CVE-2024-27049</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27050.html">CVE-2024-27050</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27079.html">CVE-2024-27079</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27403.html">CVE-2024-27403</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27433.html">CVE-2024-27433</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27437.html">CVE-2024-27437</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-31076.html">CVE-2024-31076</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35855.html">CVE-2024-35855</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35897.html">CVE-2024-35897</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35902.html">CVE-2024-35902</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35913.html">CVE-2024-35913</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35939.html">CVE-2024-35939</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35949.html">CVE-2024-35949</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36270.html">CVE-2024-36270</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36286.html">CVE-2024-36286</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36288.html">CVE-2024-36288</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36489.html">CVE-2024-36489</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36881.html">CVE-2024-36881</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36907.html">CVE-2024-36907</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36929.html">CVE-2024-36929</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36933.html">CVE-2024-36933</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36939.html">CVE-2024-36939</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36970.html">CVE-2024-36970</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36979.html">CVE-2024-36979</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38548.html">CVE-2024-38548</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38563.html">CVE-2024-38563</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38609.html">CVE-2024-38609</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38662.html">CVE-2024-38662</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39476.html">CVE-2024-39476</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39483.html">CVE-2024-39483</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39484.html">CVE-2024-39484</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39486.html">CVE-2024-39486</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39488.html">CVE-2024-39488</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39489.html">CVE-2024-39489</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39491.html">CVE-2024-39491</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39493.html">CVE-2024-39493</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39497.html">CVE-2024-39497</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39499.html">CVE-2024-39499</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39500.html">CVE-2024-39500</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39501.html">CVE-2024-39501</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39505.html">CVE-2024-39505</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39506.html">CVE-2024-39506</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39508.html">CVE-2024-39508</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39509.html">CVE-2024-39509</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39510.html">CVE-2024-39510</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40899.html">CVE-2024-40899</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40900.html">CVE-2024-40900</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40902.html">CVE-2024-40902</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40903.html">CVE-2024-40903</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40904.html">CVE-2024-40904</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40905.html">CVE-2024-40905</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40909.html">CVE-2024-40909</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40910.html">CVE-2024-40910</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40911.html">CVE-2024-40911</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40912.html">CVE-2024-40912</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40913.html">CVE-2024-40913</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40916.html">CVE-2024-40916</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40920.html">CVE-2024-40920</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40921.html">CVE-2024-40921</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40922.html">CVE-2024-40922</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40924.html">CVE-2024-40924</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40926.html">CVE-2024-40926</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40927.html">CVE-2024-40927</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40929.html">CVE-2024-40929</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40930.html">CVE-2024-40930</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40932.html">CVE-2024-40932</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40934.html">CVE-2024-40934</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40936.html">CVE-2024-40936</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40938.html">CVE-2024-40938</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40939.html">CVE-2024-40939</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40941.html">CVE-2024-40941</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40942.html">CVE-2024-40942</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40943.html">CVE-2024-40943</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40944.html">CVE-2024-40944</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40945.html">CVE-2024-40945</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40954.html">CVE-2024-40954</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40956.html">CVE-2024-40956</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40957.html">CVE-2024-40957</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40958.html">CVE-2024-40958</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40959.html">CVE-2024-40959</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40962.html">CVE-2024-40962</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40964.html">CVE-2024-40964</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40967.html">CVE-2024-40967</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40976.html">CVE-2024-40976</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40977.html">CVE-2024-40977</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40978.html">CVE-2024-40978</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40981.html">CVE-2024-40981</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40982.html">CVE-2024-40982</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40984.html">CVE-2024-40984</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40987.html">CVE-2024-40987</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40988.html">CVE-2024-40988</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40989.html">CVE-2024-40989</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40990.html">CVE-2024-40990</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40992.html">CVE-2024-40992</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40994.html">CVE-2024-40994</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40995.html">CVE-2024-40995</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40997.html">CVE-2024-40997</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41000.html">CVE-2024-41000</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41001.html">CVE-2024-41001</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41002.html">CVE-2024-41002</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41004.html">CVE-2024-41004</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41007.html">CVE-2024-41007</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41009.html">CVE-2024-41009</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41010.html">CVE-2024-41010</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41011.html">CVE-2024-41011</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41012.html">CVE-2024-41012</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41015.html">CVE-2024-41015</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41016.html">CVE-2024-41016</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41020.html">CVE-2024-41020</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41022.html">CVE-2024-41022</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41024.html">CVE-2024-41024</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41025.html">CVE-2024-41025</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41028.html">CVE-2024-41028</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41032.html">CVE-2024-41032</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41035.html">CVE-2024-41035</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41036.html">CVE-2024-41036</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41037.html">CVE-2024-41037</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41038.html">CVE-2024-41038</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41039.html">CVE-2024-41039</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41040.html">CVE-2024-41040</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41041.html">CVE-2024-41041</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41044.html">CVE-2024-41044</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41045.html">CVE-2024-41045</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41048.html">CVE-2024-41048</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41049.html">CVE-2024-41049</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41050.html">CVE-2024-41050</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41051.html">CVE-2024-41051</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41056.html">CVE-2024-41056</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41057.html">CVE-2024-41057</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41058.html">CVE-2024-41058</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41059.html">CVE-2024-41059</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41060.html">CVE-2024-41060</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41061.html">CVE-2024-41061</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41062.html">CVE-2024-41062</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41063.html">CVE-2024-41063</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41064.html">CVE-2024-41064</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41065.html">CVE-2024-41065</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41066.html">CVE-2024-41066</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41068.html">CVE-2024-41068</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41069.html">CVE-2024-41069</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41070.html">CVE-2024-41070</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41071.html">CVE-2024-41071</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41072.html">CVE-2024-41072</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41073.html">CVE-2024-41073</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41074.html">CVE-2024-41074</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41075.html">CVE-2024-41075</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41076.html">CVE-2024-41076</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41078.html">CVE-2024-41078</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41079.html">CVE-2024-41079</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41080.html">CVE-2024-41080</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41081.html">CVE-2024-41081</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41084.html">CVE-2024-41084</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41087.html">CVE-2024-41087</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41088.html">CVE-2024-41088</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41089.html">CVE-2024-41089</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41092.html">CVE-2024-41092</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41093.html">CVE-2024-41093</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41094.html">CVE-2024-41094</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41095.html">CVE-2024-41095</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41096.html">CVE-2024-41096</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41097.html">CVE-2024-41097</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41098.html">CVE-2024-41098</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42064.html">CVE-2024-42064</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42069.html">CVE-2024-42069</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42070.html">CVE-2024-42070</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42073.html">CVE-2024-42073</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42074.html">CVE-2024-42074</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42076.html">CVE-2024-42076</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42077.html">CVE-2024-42077</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42079.html">CVE-2024-42079</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42080.html">CVE-2024-42080</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42082.html">CVE-2024-42082</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42085.html">CVE-2024-42085</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42086.html">CVE-2024-42086</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42087.html">CVE-2024-42087</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42089.html">CVE-2024-42089</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42090.html">CVE-2024-42090</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42092.html">CVE-2024-42092</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42093.html">CVE-2024-42093</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42095.html">CVE-2024-42095</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42096.html">CVE-2024-42096</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42097.html">CVE-2024-42097</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42098.html">CVE-2024-42098</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42101.html">CVE-2024-42101</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42104.html">CVE-2024-42104</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42105.html">CVE-2024-42105</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42106.html">CVE-2024-42106</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42107.html">CVE-2024-42107</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42109.html">CVE-2024-42109</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42110.html">CVE-2024-42110</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42113.html">CVE-2024-42113</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42114.html">CVE-2024-42114</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42115.html">CVE-2024-42115</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42117.html">CVE-2024-42117</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42119.html">CVE-2024-42119</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42120.html">CVE-2024-42120</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42121.html">CVE-2024-42121</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42122.html">CVE-2024-42122</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42124.html">CVE-2024-42124</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42125.html">CVE-2024-42125</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42126.html">CVE-2024-42126</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42127.html">CVE-2024-42127</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42130.html">CVE-2024-42130</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42131.html">CVE-2024-42131</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42132.html">CVE-2024-42132</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42133.html">CVE-2024-42133</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42136.html">CVE-2024-42136</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42137.html">CVE-2024-42137</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42138.html">CVE-2024-42138</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42139.html">CVE-2024-42139</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42141.html">CVE-2024-42141</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42142.html">CVE-2024-42142</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42143.html">CVE-2024-42143</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42144.html">CVE-2024-42144</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42145.html">CVE-2024-42145</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42147.html">CVE-2024-42147</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42148.html">CVE-2024-42148</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42152.html">CVE-2024-42152</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42153.html">CVE-2024-42153</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42155.html">CVE-2024-42155</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42156.html">CVE-2024-42156</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42157.html">CVE-2024-42157</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42158.html">CVE-2024-42158</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42159.html">CVE-2024-42159</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42161.html">CVE-2024-42161</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42162.html">CVE-2024-42162</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42223.html">CVE-2024-42223</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42224.html">CVE-2024-42224</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42225.html">CVE-2024-42225</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42226.html">CVE-2024-42226</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42227.html">CVE-2024-42227</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42228.html">CVE-2024-42228</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42229.html">CVE-2024-42229</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42230.html">CVE-2024-42230</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42232.html">CVE-2024-42232</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42236.html">CVE-2024-42236</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42237.html">CVE-2024-42237</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42238.html">CVE-2024-42238</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42239.html">CVE-2024-42239</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42240.html">CVE-2024-42240</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42241.html">CVE-2024-42241</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42244.html">CVE-2024-42244</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42245.html">CVE-2024-42245</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42246.html">CVE-2024-42246</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42247.html">CVE-2024-42247</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42250.html">CVE-2024-42250</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42253.html">CVE-2024-42253</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42259.html">CVE-2024-42259</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42268.html">CVE-2024-42268</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42269.html">CVE-2024-42269</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42270.html">CVE-2024-42270</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42271.html">CVE-2024-42271</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42274.html">CVE-2024-42274</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42276.html">CVE-2024-42276</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42277.html">CVE-2024-42277</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42278.html">CVE-2024-42278</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42279.html">CVE-2024-42279</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42280.html">CVE-2024-42280</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42281.html">CVE-2024-42281</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42283.html">CVE-2024-42283</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42284.html">CVE-2024-42284</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42285.html">CVE-2024-42285</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42286.html">CVE-2024-42286</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42287.html">CVE-2024-42287</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42288.html">CVE-2024-42288</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42289.html">CVE-2024-42289</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42290.html">CVE-2024-42290</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42291.html">CVE-2024-42291</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42292.html">CVE-2024-42292</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42295.html">CVE-2024-42295</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42298.html">CVE-2024-42298</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42301.html">CVE-2024-42301</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42302.html">CVE-2024-42302</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42303.html">CVE-2024-42303</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42308.html">CVE-2024-42308</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42309.html">CVE-2024-42309</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42310.html">CVE-2024-42310</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42311.html">CVE-2024-42311</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42312.html">CVE-2024-42312</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42313.html">CVE-2024-42313</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42314.html">CVE-2024-42314</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42315.html">CVE-2024-42315</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42316.html">CVE-2024-42316</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42318.html">CVE-2024-42318</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42319.html">CVE-2024-42319</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42320.html">CVE-2024-42320</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42322.html">CVE-2024-42322</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43816.html">CVE-2024-43816</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43817.html">CVE-2024-43817</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43818.html">CVE-2024-43818</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43819.html">CVE-2024-43819</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43821.html">CVE-2024-43821</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43823.html">CVE-2024-43823</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43824.html">CVE-2024-43824</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43825.html">CVE-2024-43825</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43826.html">CVE-2024-43826</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43829.html">CVE-2024-43829</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43830.html">CVE-2024-43830</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43831.html">CVE-2024-43831</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43833.html">CVE-2024-43833</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43834.html">CVE-2024-43834</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43837.html">CVE-2024-43837</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43839.html">CVE-2024-43839</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43840.html">CVE-2024-43840</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43841.html">CVE-2024-43841</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43842.html">CVE-2024-43842</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43846.html">CVE-2024-43846</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43847.html">CVE-2024-43847</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43849.html">CVE-2024-43849</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43850.html">CVE-2024-43850</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43851.html">CVE-2024-43851</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43853.html">CVE-2024-43853</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43854.html">CVE-2024-43854</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43855.html">CVE-2024-43855</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43856.html">CVE-2024-43856</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43858.html">CVE-2024-43858</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43860.html">CVE-2024-43860</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43861.html">CVE-2024-43861</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43863.html">CVE-2024-43863</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43864.html">CVE-2024-43864</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43866.html">CVE-2024-43866</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43867.html">CVE-2024-43867</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43871.html">CVE-2024-43871</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43872.html">CVE-2024-43872</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43873.html">CVE-2024-43873</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43874.html">CVE-2024-43874</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43875.html">CVE-2024-43875</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43876.html">CVE-2024-43876</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43877.html">CVE-2024-43877</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43879.html">CVE-2024-43879</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43880.html">CVE-2024-43880</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43881.html">CVE-2024-43881</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43882.html">CVE-2024-43882</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43883.html">CVE-2024-43883</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43884.html">CVE-2024-43884</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43885.html">CVE-2024-43885</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43889.html">CVE-2024-43889</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43892.html">CVE-2024-43892</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43893.html">CVE-2024-43893</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43894.html">CVE-2024-43894</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43895.html">CVE-2024-43895</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43897.html">CVE-2024-43897</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43899.html">CVE-2024-43899</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43900.html">CVE-2024-43900</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43902.html">CVE-2024-43902</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43903.html">CVE-2024-43903</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43905.html">CVE-2024-43905</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43906.html">CVE-2024-43906</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43907.html">CVE-2024-43907</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43908.html">CVE-2024-43908</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43909.html">CVE-2024-43909</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43911.html">CVE-2024-43911</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43912.html">CVE-2024-43912</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44931.html">CVE-2024-44931</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44938.html">CVE-2024-44938</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44939.html">CVE-2024-44939</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52489</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52581</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52668</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52688</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52756</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52766</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52800</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52802</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52802</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52859</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52885</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52885</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52886</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52886</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52887</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52887</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52889</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52889</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26590</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26590</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26631</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26637</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26668</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26669</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26677</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26682</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26683</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26735</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26758</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26767</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26808</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26809</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26812</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26835</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26837</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26849</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26851</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26889</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26920</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26976</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27010</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27011</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27024</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27049</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27050</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27079</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27403</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27433</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27437</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-31076</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35855</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35897</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35939</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35949</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36270</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36270</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36286</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36288</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36288</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36489</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36489</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36881</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36907</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36929</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36933</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36939</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36970</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36979</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36979</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38548</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38563</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38563</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38609</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38662</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38662</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39476</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39476</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39483</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39483</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39484</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39484</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39486</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39486</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39488</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39489</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39489</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39491</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.2</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39493</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39493</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39497</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39499</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39500</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39501</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39505</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39506</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39506</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39508</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39509</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39510</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39510</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40899</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40899</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40900</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40902</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40902</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40903</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40903</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40904</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40905</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40909</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40909</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40910</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40910</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40911</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40911</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40912</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40912</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40913</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40916</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40920</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40921</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40922</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40924</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40926</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40927</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40929</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40930</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40932</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40932</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40934</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40934</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40936</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40938</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40939</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40941</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40942</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40943</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40944</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40945</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40954</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40954</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40956</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40956</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40957</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40957</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40958</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40958</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40959</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40959</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40962</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40964</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40964</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40967</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40967</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40976</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40977</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40977</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40978</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40981</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40981</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40982</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40982</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40984</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40987</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40988</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40989</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40990</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40992</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40994</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40994</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40995</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40995</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40997</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40997</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41000</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41000</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41001</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41001</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41002</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41002</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41004</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41007</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41007</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41009</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41009</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41010</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41010</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41011</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41011</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41012</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41015</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41016</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41020</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41020</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41022</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41022</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41024</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41024</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41025</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41028</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41032</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41035</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41036</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41037</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41037</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41038</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41038</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41039</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41040</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41041</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41044</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41045</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41048</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41049</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41049</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41050</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41056</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41057</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41057</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41057</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41058</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41058</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41058</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41059</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41059</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41060</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41060</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41061</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41061</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41062</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41062</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41063</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41063</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41064</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41064</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41064</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41065</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41065</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41066</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41066</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41068</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41069</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41069</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41070</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41070</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41071</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41071</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41072</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41073</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41073</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41074</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41075</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41075</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41076</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41076</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41078</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41079</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41080</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41080</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41081</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41084</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41084</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41087</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41087</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41088</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41088</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41089</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41089</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41092</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41092</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41093</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41093</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41094</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41094</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41094</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41095</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41095</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41096</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41096</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41097</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41097</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41098</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41098</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42064</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42064</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42064</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42069</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42069</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42070</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42070</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42073</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42073</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42074</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42074</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42076</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42076</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42077</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42077</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42079</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42079</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42080</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42080</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42082</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42082</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42085</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42085</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42086</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42086</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42087</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42089</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42090</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42090</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42092</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42093</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42093</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42095</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42096</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42096</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42097</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.4</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42097</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42098</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42101</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42101</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42104</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42104</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42104</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42105</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42105</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42106</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42107</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42109</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42109</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42110</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42113</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42114</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42114</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42115</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42115</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42117</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42119</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42120</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42121</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42122</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42124</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42125</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42125</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42126</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42127</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42130</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42130</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42131</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42132</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42132</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42133</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42133</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42136</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42136</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42137</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42138</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42139</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42141</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42141</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42142</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42143</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42143</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42144</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42144</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42145</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42145</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42147</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42147</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42148</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42148</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42152</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42152</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42153</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42153</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42155</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.6</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42155</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42155</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">1.9</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42156</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42156</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42157</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42157</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42158</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42158</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42159</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42159</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42159</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42161</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42161</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42161</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42162</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42162</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42223</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42223</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42224</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42224</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42225</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42225</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42226</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42226</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42227</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42227</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42228</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42228</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42229</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42229</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42230</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42230</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42230</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42232</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42232</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42232</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42236</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42236</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42236</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42237</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42237</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42238</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42238</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42239</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42239</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42240</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42240</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42240</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42241</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42241</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42244</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42244</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42244</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42245</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42245</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42246</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42246</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42247</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42247</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42250</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42250</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42253</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42253</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42253</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42259</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42259</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42268</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42268</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42269</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42269</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42270</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42270</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42271</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42271</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42271</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42274</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42274</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42276</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42276</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42277</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42277</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42278</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42278</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42279</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42280</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42281</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42283</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42283</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42284</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42284</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42285</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42285</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42286</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42287</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42288</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42288</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42289</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42289</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42290</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42291</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42292</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42295</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42298</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42301</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42301</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42302</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42302</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42303</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42308</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42308</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42309</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42309</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42310</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42310</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42311</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42311</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42312</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42313</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42313</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42314</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42314</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42315</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42315</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42316</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42316</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42318</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42319</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42320</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42322</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43816</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43817</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43817</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43818</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43818</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43819</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43819</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43821</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43821</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43823</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43823</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43824</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43824</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43825</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43826</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43829</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43830</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43831</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43833</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43833</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43834</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43837</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43837</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43839</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43840</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43841</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43842</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43846</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43847</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43849</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43850</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43851</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43853</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43853</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43854</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43854</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43855</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43855</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43856</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43856</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43858</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43858</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43860</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43860</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43861</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43861</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43863</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43863</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43864</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43866</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43867</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43871</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43871</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43872</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43872</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43873</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43873</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43874</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43874</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43875</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43876</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43877</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43879</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43880</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43881</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43881</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43882</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43882</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43883</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.4</span>
<span
class="cvss-vector">CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43883</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43884</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43884</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43884</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43885</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43885</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43889</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43889</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43889</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43892</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43892</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43892</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43893</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43893</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43894</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43894</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43895</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43895</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43897</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43897</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43899</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43899</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43900</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43900</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43902</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43902</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43902</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43903</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43903</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43903</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43905</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43905</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43905</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43906</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43906</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43906</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43907</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43907</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43907</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43908</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43908</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43908</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43909</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43909</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43909</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43911</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43911</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43911</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43912</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43912</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43912</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44931</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44931</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44931</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44938</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44938</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44939</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44939</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">openSUSE Leap
15.6</li>

<li class="list-group-item">SUSE Linux
Enterprise Live Patching 15-SP6</li>

<li class="list-group-item">SUSE Linux
Enterprise Real Time 15 SP6</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP6</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP6</li>

<li class="list-group-item">SUSE Real
Time Module 15-SP6</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves 393 vulnerabilities, contains six features
and has 84 security fixes can now be installed.</p>





<h2>Description:</h2>

<p>The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive
various security bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2024-41062: Sync sock recv cb and release
(bsc#1228576).</li>
<li>CVE-2023-52489: Fix race in accessing memory_section-&gt;usage
(bsc#1221326).</li>
<li>CVE-2024-43821: Fix a possible null pointer dereference
(bsc#1229315).</li>
<li>CVE-2024-43911: Fix NULL dereference at band check in starting tx ba
session (bsc#1229827).</li>
<li>CVE-2024-42277: Avoid NULL deref in sprd_iommu_hw_en
(bsc#1229409).</li>
<li>CVE-2024-43880: Put back removed metod in struct objagg_ops
(bsc#1229481).</li>
<li>CVE-2024-43899: Fix null pointer deref in dcn20_resource.c
(bsc#1229754).</li>
<li>CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid
usage. (bsc#1229503)</li>
<li>CVE-2024-43866: Always drain health in shutdown callback
(bsc#1229495).</li>
<li>CVE-2024-26812: Struct virqfd kABI workaround
(bsc#1222808).</li>
<li>CVE-2024-27010: Fix mirred deadlock on device recursion
(bsc#1223720).</li>
<li>CVE-2024-36881: Fix reset ptes when close() for wr-protected
(bsc#1225718).</li>
<li>CVE-2024-42316: Fix div-by-zero in vmpressure_calc_level()
(bsc#1229353).</li>
<li>CVE-2024-43855: Fix deadlock between mddev_suspend and flush bio
(bsc#1229342).</li>
<li>CVE-2024-43864: Fix CT entry update leaks of modify header context
(bsc#1229496).</li>
<li>CVE-2024-26631: Fix data-race in ipv6_mc_down / mld_ifc_work
(bsc#1221630).</li>
<li>CVE-2024-42109: Unconditionally flush pending work before notifier
(bsc#1228505).</li>
<li>CVE-2024-41084: Avoid null pointer dereference in region lookup
(bsc#1228472).</li>
<li>CVE-2024-40905: Fix possible race in __fib6_drop_pcpu_from()
(bsc#1227761)</li>
<li>CVE-2024-39489: Fix memleak in seg6_hmac_init_algo
(bsc#1227623)</li>
<li>CVE-2024-36489: Fix missing memory barrier in tls_init
(bsc#1226874)</li>
<li>CVE-2024-27079: Fix NULL domain on device release
(bsc#1223742).</li>
<li>CVE-2024-41020: Fix fcntl/close race recovery compat path
(bsc#1228427).</li>
<li>CVE-2024-35897: Discard table flag update with pending basechain
deletion (bsc#1224510).</li>
<li>CVE-2024-27403: Restore const specifier in flow_offload_route_init()
(bsc#1224415).</li>
<li>CVE-2024-27011: Fix memleak in map from abort path
(bsc#1223803).</li>
<li>CVE-2024-26668: Reject configurations that cause integer overflow
(bsc#1222335).</li>
<li>CVE-2024-26835: Set dormant flag on hook register failure
(bsc#1222967).</li>
<li>CVE-2024-26808: Handle NETDEV_UNREGISTER for inet/ingress basechain
(bsc#1222634).</li>
<li>CVE-2024-26809: Release elements in clone only from destroy path
(bsc#1222633).</li>
<li>CVE-2023-52581: Fix memleak when more than 255 elements expired
(bsc#1220877).</li>
<li>CVE-2024-43837: Fix updating attached freplace prog in prog_array map
(bsc#1229297).</li>
<li>CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure
(bsc#1224535).</li>
<li>CVE-2024-42291: Add a per-VF limit on number of FDIR filters
(bsc#1229374).</li>
<li>CVE-2024-42268: Fix missing lock on sync reset reload
(bsc#1229391).</li>
<li>CVE-2024-43834: Fix invalid wait context of page_pool_destroy()
(bsc#1229314)</li>
<li>CVE-2024-27433: Fix an error handling path in
clk_mt8135_apmixed_probe() (bsc#1224711).</li>
<li>CVE-2024-36286: Acquire rcu_read_lock() in instance_destroy_rcu()
(bsc#1226801)</li>
<li>CVE-2024-26851: Add protection for bmp length out of range
(bsc#1223074)</li>
<li>CVE-2024-40920: Fix suspicious rcu usage in br_mst_set_state
(bsc#1227781).</li>
<li>CVE-2024-40921: Pass vlan group directly to br_mst_vlan_set_state
(bsc#1227784).</li>
<li>CVE-2024-36979: Fix vlan use-after-free (bsc#1226604).</li>
<li>CVE-2024-26590: Fix inconsistent per-file compression format
(bsc#1220252).</li>
<li>CVE-2023-52859: Fix use-after-free when register pmu fails
(bsc#1225582).</li>
<li>CVE-2024-42270: Fix null-ptr-deref in iptable_nat_table_init()
(bsc#1229404).</li>
<li>CVE-2024-42269: Fix potential null-ptr-deref in
ip6table_nat_table_init() (bsc#1229402).</li>
<li>CVE-2024-42284: Return non-zero value from tipc_udp_addr2str() on
error (bsc#1229382)</li>
<li>CVE-2024-42283: Initialize all fields in dumped nexthops
(bsc#1229383)</li>
<li>CVE-2024-42312: Always initialize i_uid/i_gid
(bsc#1229357)</li>
<li>CVE-2024-43854: Initialize integrity buffer to zero before writing it
to media (bsc#1229345)</li>
<li>CVE-2024-42322: Properly dereference pe in ip_vs_add_service
(bsc#1229347)</li>
<li>CVE-2024-42290: Handle runtime power management correctly
(bsc#1229379).</li>
<li>CVE-2024-42318: Do not lose track of restrictions on cred_transfer
(bsc#1229351).</li>
<li>CVE-2023-52889: Fix null pointer deref when receiving skb during sock
creation (bsc#1229287).</li>
<li>CVE-2024-42295: Handle inconsistent state in
nilfs_btnode_create_block() (bsc#1229370).</li>
<li>CVE-2024-43850: Fix refcount imbalance seen during bwmon_remove
(bsc#1229316).</li>
<li>CVE-2024-43831: Handle invalid decoder vsi (bsc#1229309).</li>
<li>CVE-2024-43839: Adjust &#x27;name&#x27; buf size of bna_tcb
and bna_ccb structures (bsc#1229301).</li>
<li>CVE-2024-41007: Use signed arithmetic in tcp_rtx_probe0_timed_out()
(bsc#1227863).</li>
<li>CVE-2024-42281: Fix a segment issue when downgrading gso_size
(bsc#1229386).</li>
<li>CVE-2024-26669: Fix chain template offload (bsc#1222350).</li>
<li>CVE-2024-26677: Blacklist e7870cf13d20 (&quot; Fix delayed ACKs
to not set the reference serial number&quot;) (bsc#1222387)</li>
<li>CVE-2024-41050: Cyclic allocation of msg_id to avoid reuse
(bsc#1228499).</li>
<li>CVE-2024-41051: Wait for ondemand_object_worker to finish when
dropping object (bsc#1228468).</li>
<li>CVE-2024-41074: Set object to close if ondemand_id &lt; 0 in
copen (bsc#1228643).</li>
<li>CVE-2024-41075: Add consistency check for copen/cread
(bsc#1228646).</li>
<li>CVE-2024-41012: Remove locks reliably when fcntl/close race is
detected (bsc#1228247).</li>
<li>CVE-2024-41080: Fix possible deadlock in
io_register_iowq_max_workers() (bsc#1228616).</li>
<li>CVE-2024-42246: Remap EPERM in case of connection failure in
xs_tcp_setup_socket (bsc#1228989).</li>
<li>CVE-2024-42159: Fix sanitise num_phys (bsc#1228754).</li>
<li>CVE-2024-42241: Disable PMD-sized page cache if needed
(bsc#1228986).</li>
<li>CVE-2024-42245: Revert &quot;sched/fair: Make sure to try to
detach at least one movable task&quot; (bsc#1228978).</li>
<li>CVE-2024-26735: Fix possible use-after-free and null-ptr-deref
(bsc#1222372).</li>
<li>CVE-2024-26837: Race between creation of new group memberships and
generation of the list of MDB events to replay (bsc#1222973).</li>
<li>CVE-2024-42155: Wipe copies of protected- and secure-keys
(bsc#1228733).</li>
<li>CVE-2024-42156: Wipe copies of clear-key structures on failure
(bsc#1228722).</li>
<li>CVE-2024-42157: Wipe sensitive data on failure
(bsc#1228727).</li>
<li>CVE-2024-42158: Use kfree_sensitive() to fix Coccinelle warnings
(bsc#1228720).</li>
<li>CVE-2024-38662: Cover verifier checks for mutating sockmap/sockhash
(bsc#1226885).</li>
<li>CVE-2024-40938: Fix d_parent walk (bsc#1227840).</li>
<li>CVE-2024-42247: Avoid unaligned 64-bit memory accesses
(bsc#1228988).</li>
<li>CVE-2024-41010: Fix too early release of tcx_entry
(bsc#1228021).</li>
<li>CVE-2024-42106: Initialize pad field in struct inet_diag_req_v2
(bsc#1228493).</li>
<li>CVE-2024-42095: Fix Errata i2310 with RX FIFO level check
(bsc#1228446).</li>
<li>CVE-2024-41068: Fix sclp_init() cleanup on failure
(bsc#1228579).</li>
<li>CVE-2024-42138: Fix double memory deallocation in case of invalid INI
file (bsc#1228500).</li>
<li>CVE-2024-42107: Do not process extts if PTP is disabled
(bsc#1228494).</li>
<li>CVE-2024-42139: Fix improper extts handling (bsc#1228503).</li>
<li>CVE-2024-42110: Move ntb_netdev_rx_handler() to call netif_rx() from
__netif_rx() (bsc#1228501).</li>
<li>CVE-2024-42113: Initialize num_q_vectors for MSI/INTx interrupts
(bsc#1228568).</li>
<li>CVE-2024-42148: Fix multiple UBSAN array-index-out-of-bounds
(bsc#1228487).</li>
<li>CVE-2024-42142: E-switch, Create ingress ACL when needed
(bsc#1228491).</li>
<li>CVE-2024-42073: Fix memory corruptions on Spectrum-4 systems
(bsc#1228457).</li>
<li>CVE-2024-42162: Account for stopped queues when reading NIC stats
(bsc#1228706).</li>
<li>CVE-2024-42082: Remove WARN() from __xdp_reg_mem_model()
(bsc#1228482).</li>
<li>CVE-2024-40978: Fix crash while reading debugfs attribute
(bsc#1227929).</li>
<li>CVE-2024-41000: Prefer different overflow check
(bsc#1227867).</li>
<li>CVE-2024-40995: Fix possible infinite loop in tcf_idr_check_alloc()
(bsc#1227830).</li>
<li>CVE-2024-42161: Avoid uninitialized value in BPF_CORE_READ_BITFIELD
(bsc#1228756).</li>
<li>CVE-2024-41069: Fix route memory corruption (bsc#1228644).</li>
<li>CVE-2024-39506: Adjust a NULL pointer handling path in
lio_vf_rep_copy_packet (bsc#1227729).</li>
<li>CVE-2024-42145: Implement a limit on UMAD receive List
(bsc#1228743).</li>
<li>CVE-2024-40994: Fix integer overflow in max_vclocks_store
(bsc#1227829).</li>
<li>CVE-2024-42124: Make qedf_execute_tmf() non-preemptible
(bsc#1228705).</li>
<li>CVE-2024-42096: Stop playing stack games in profile_pc()
(bsc#1228633).</li>
<li>CVE-2024-42224: Correct check for empty list
(bsc#1228723).</li>
<li>CVE-2024-41048: Skip zero length skb in sk_msg_recvmsg
(bsc#1228565).</li>
<li>CVE-2024-40958: Make get_net_ns() handle zero refcount net
(bsc#1227812).</li>
<li>CVE-2024-40939: Fix tainted pointer delete is case of region creation
fail (bsc#1227799).</li>
<li>CVE-2024-36933: Use correct mac_offset to unwind gso skb in
nsh_gso_segment() (bsc#1225832).</li>
<li>CVE-2024-36929: Reject skb_copy(_expand) for fraglist GSO skbs
(bsc#1225814).</li>
<li>CVE-2024-41044: Reject claimed-as-LCP but actually malformed packets
(bsc#1228530).</li>
<li>CVE-2024-41066: Add tx check to prevent skb leak
(bsc#1228640).</li>
<li>CVE-2024-42093: Avoid explicit cpumask var allocation on stack
(bsc#1228680).</li>
<li>CVE-2024-42122: Add NULL pointer check for kzalloc
(bsc#1228591).</li>
<li>CVE-2024-41078: Fix quota root leak after quota disable failure
(bsc#1228655).</li>
<li>CVE-2024-40989: Disassociate vcpus from redistributor region on
teardown (bsc#1227823).</li>
<li>CVE-2024-41064: Avoid possible crash when edev-&gt;pdev changes
(bsc#1228599).</li>
<li>CVE-2024-41036: Fix deadlock with the SPI chip variant
(bsc#1228496).</li>
<li>CVE-2024-41040: Fix UAF when resolving a clash
(bsc#1228518).</li>
<li>CVE-2024-35949: Make sure that WRITTEN is set on all metadata blocks
(bsc#1224700).</li>
<li>CVE-2024-41081: Block BH in ila_output() (bsc#1228617).</li>
<li>CVE-2024-41076: Fix memory leak in nfs4_set_security_label
(bsc#1228649).</li>
<li>CVE-2024-42079: Fix NULL pointer dereference in gfs2_log_flush
(bsc#1228672).</li>
<li>CVE-2024-41057: Fix slab-use-after-free in
cachefiles_withdraw_cookie() (bsc#1228462).</li>
<li>CVE-2024-41058: Fix slab-use-after-free in fscache_withdraw_volume()
(bsc#1228459).</li>
<li>CVE-2024-41015: Add bounds checking to ocfs2_check_dir_entry()
(bsc#1228409).</li>
<li>CVE-2024-40956: Fix possible Use-After-Free in irq_process_work_list
(bsc#1227810).</li>
<li>CVE-2024-27437: Disable auto-enable of exclusive INTx IRQ
(bsc#1222625).</li>
<li>CVE-2024-41032: Check if a hash-index is in cpu_possible_mask
(bsc#1228460).</li>
<li>CVE-2024-40957: Fix parameter passing when calling NF_HOOK() in
End.DX4 and End.DX6 behaviors (bsc#1227811).</li>
<li>CVE-2024-41041: Set SOCK_RCU_FREE earlier in udp_lib_get_port()
(bsc#1228520).</li>
<li>CVE-2024-40954: Do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)</li>
<li>CVE-2024-42070: Fully validate NFT_DATA_VALUE on store to data
registers (bsc#1228470).</li>
<li>CVE-2024-41070: Prevent UAF in kvm_spapr_tce_attach_iommu_group()
(bsc#1228581).</li>
<li>CVE-2024-40959: Check ip6_dst_idev() return value in
xfrm6_get_saddr() (bsc#1227884).</li>
<li>CVE-2024-41009: Fix overrunning reservations in ringbuf
(bsc#1228020).</li>
<li>CVE-2024-40909: Fix a potential use-after-free in bpf_link_free()
(bsc#1227798).</li>
<li>CVE-2024-27024: Fix WARNING in rds_conn_connect_if_down
(bsc#1223777).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>ACPI: battery: create alarm sysfs attribute atomically
(stable-fixes).</li>
<li>ACPI: processor_idle: use raw_safe_halt() in acpi_idle_play_dead()
(git-fixes).</li>
<li>ACPI: SBS: manage alarm sysfs attribute through psy core
(stable-fixes).</li>
<li>ACPI/NUMA: Apply SRAT proximity domain to entire CFMWS window
(git-fixes).</li>
<li>afs: fix __afs_break_callback() / afs_drop_open_mmap() race
(git-fixes).</li>
<li>ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list
(stable-fixes).</li>
<li>ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list
(stable-fixes).</li>
<li>ALSA: hda: Conditionally use snooping for AMD HDMI
(git-fixes).</li>
<li>ALSA: hda: conexant: Fix headset auto detect fail in the polling mode
(git-fixes).</li>
<li>ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4
(stable-fixes).</li>
<li>ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4
(stable-fixes).</li>
<li>ALSA: hda/realtek - Fixed ALC256 headphone no sound
(stable-fixes).</li>
<li>ALSA: hda/realtek - FIxed ALC285 headphone no sound
(stable-fixes).</li>
<li>ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to
quirks (stable-fixes).</li>
<li>ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to
quirks (stable-fixes).</li>
<li>ALSA: hda/realtek: Add quirk for Acer Aspire E5-574G
(stable-fixes).</li>
<li>ALSA: hda/realtek: Add support for new HP G12 laptops
(stable-fixes).</li>
<li>ALSA: hda/realtek: Enable mute/micmute LEDs on HP Laptop 14-ey0xxx
(stable-fixes).</li>
<li>ALSA: hda/realtek: Fix noise from speakers on Lenovo IdeaPad 3 15IAU7
(git-fixes).</li>
<li>ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book3
Ultra (stable-fixes).</li>
<li>ALSA: hda/realtek: Implement sound init sequence for Samsung Galaxy
Book3 Pro 360 (stable-fixes).</li>
<li>ALSA: hda/realtek: support HP Pavilion Aero 13-bg0xxx Mute LED
(stable-fixes).</li>
<li>ALSA: hda/tas2781: fix wrong calibrated data order
(git-fixes).</li>
<li>ALSA: hda/tas2781: Use correct endian conversion
(git-fixes).</li>
<li>ALSA: line6: Fix racy access to midibuf (stable-fixes).</li>
<li>ALSA: line6: Fix racy access to midibuf (stable-fixes).</li>
<li>ALSA: seq: Skip event type filtering for UMP events
(git-fixes).</li>
<li>ALSA: seq: ump: Explicitly reset RPN with Null RPN
(stable-fixes).</li>
<li>ALSA: seq: ump: Optimize conversions from SysEx to UMP
(git-fixes).</li>
<li>ALSA: seq: ump: Transmit RPN/NRPN message at each MSB/LSB data
reception (stable-fixes).</li>
<li>ALSA: seq: ump: Use the common RPN/bank conversion context
(stable-fixes).</li>
<li>ALSA: timer: Relax start tick time check for slave timer elements
(git-fixes).</li>
<li>ALSA: ump: Explicitly reset RPN with Null RPN
(stable-fixes).</li>
<li>ALSA: ump: Transmit RPN/NRPN message at each MSB/LSB data reception
(stable-fixes).</li>
<li>ALSA: usb-audio: Add delay quirk for VIVO USB-C-XE710 HEADSET
(stable-fixes).</li>
<li>ALSA: usb-audio: Correct surround channels in UAC1 channel map
(git-fixes).</li>
<li>ALSA: usb-audio: Re-add ScratchAmp quirk entries
(git-fixes).</li>
<li>ALSA: usb-audio: Re-add ScratchAmp quirk entries
(git-fixes).</li>
<li>ALSA: usb-audio: Support Yamaha P-125 quirk entry
(stable-fixes).</li>
<li>ALSA: usb: Fix UBSAN warning in parse_audio_unit()
(stable-fixes).</li>
<li>apparmor: unpack transition table if dfa is not present
(bsc#1226031).</li>
<li>arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to
(git-fixes)</li>
<li>arm64: Add Neoverse-V2 part (git-fixes)</li>
<li>arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process
(git-fixes)</li>
<li>arm64: barrier: Restore spec_bar() macro (git-fixes)</li>
<li>arm64: cputype: Add Cortex-A720 definitions (git-fixes)</li>
<li>arm64: cputype: Add Cortex-A725 definitions (git-fixes)</li>
<li>arm64: cputype: Add Cortex-X1C definitions (git-fixes)</li>
<li>arm64: cputype: Add Cortex-X3 definitions (git-fixes)</li>
<li>arm64: cputype: Add Cortex-X4 definitions (git-fixes)</li>
<li>arm64: cputype: Add Cortex-X925 definitions (git-fixes)</li>
<li>arm64: cputype: Add Neoverse-V3 definitions (git-fixes)</li>
<li>arm64: dts: imx8mp: add HDMI power-domains (git-fixes)</li>
<li>arm64: dts: imx8mp: Add NPU Node (git-fixes)</li>
<li>arm64: dts: imx8mp: Fix pgc vpu locations (git-fixes)</li>
<li>arm64: dts: imx8mp: Fix pgc_mlmix location (git-fixes)</li>
<li>arm64: errata: Expand speculative SSBS workaround (again)
(git-fixes)</li>
<li>arm64: errata: Expand speculative SSBS workaround
(git-fixes)</li>
<li>arm64: errata: Unify speculative SSBS errata logic (git-fixes).
Update config files.</li>
<li>arm64: Fix KASAN random tag seed initialization
(git-fixes)</li>
<li>arm64: jump_label: Ensure patched jump_labels are visible to all CPUs
(git-fixes)</li>
<li>ASoC: allow module autoloading for table board_ids
(stable-fixes).</li>
<li>ASoC: allow module autoloading for table db1200_pids
(stable-fixes).</li>
<li>ASoC: amd: acp: fix module autoloading (git-fixes).</li>
<li>ASoC: amd: yc: Add quirk entry for OMEN by HP Gaming Laptop 16-n0xxx
(bsc#1227182).</li>
<li>ASoC: amd: yc: Support mic on HP 14-em0002la
(stable-fixes).</li>
<li>ASoC: amd: yc: Support mic on HP 14-em0002la
(stable-fixes).</li>
<li>ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6
(stable-fixes).</li>
<li>ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6
(stable-fixes).</li>
<li>ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask
(git-fixes).</li>
<li>ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask
(git-fixes).</li>
<li>ASoC: codecs: wsa881x: Correct Soundwire ports mask
(git-fixes).</li>
<li>ASoC: codecs: wsa881x: Correct Soundwire ports mask
(git-fixes).</li>
<li>ASoC: codecs: wsa883x: Correct Soundwire ports mask
(git-fixes).</li>
<li>ASoC: codecs: wsa883x: Correct Soundwire ports mask
(git-fixes).</li>
<li>ASoC: codecs: wsa884x: Correct Soundwire ports mask
(git-fixes).</li>
<li>ASoC: codecs: wsa884x: Correct Soundwire ports mask
(git-fixes).</li>
<li>ASoC: cs35l45: Checks index of cs35l45_irqs[]
(stable-fixes).</li>
<li>ASoC: cs35l56: Handle OTP read latency over SoundWire
(stable-fixes).</li>
<li>ASoC: cs35l56: Handle OTP read latency over SoundWire
(stable-fixes).</li>
<li>ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value
(stable-fixes).</li>
<li>ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value
(stable-fixes).</li>
<li>ASoC: fsl_micfil: Expand the range of FIFO watermark mask
(stable-fixes).</li>
<li>ASoC: fsl_micfil: Expand the range of FIFO watermark mask
(stable-fixes).</li>
<li>ASoC: mediatek: mt8188: Mark AFE_DAC_CON0 register as volatile
(stable-fixes).</li>
<li>ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT
(git-fixes).</li>
<li>ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT
(git-fixes).</li>
<li>ASoC: nau8822: Lower debug print priority (stable-fixes).</li>
<li>ASoC: nau8822: Lower debug print priority (stable-fixes).</li>
<li>ASoC: SOF: amd: Fix for acp init sequence (git-fixes).</li>
<li>ASoC: SOF: Intel: hda-dsp: Make sure that no irq handler is pending
before suspend (stable-fixes).</li>
<li>ASoC: SOF: ipc4: check return value of snd_sof_ipc_msg_data
(stable-fixes).</li>
<li>ASoC: SOF: mediatek: Add missing board compatible
(stable-fixes).</li>
<li>ASoC: SOF: Remove libraries from topology lookups
(git-fixes).</li>
<li>ASoC: SOF: Remove libraries from topology lookups
(git-fixes).</li>
<li>ata: libata-scsi: Do not overwrite valid sense data when CK_COND=1
(stable-fixes).</li>
<li>ata: libata-scsi: Honor the D_SENSE bit for CK_COND=1 and no error
(stable-fixes).</li>
<li>Bluetooth: Add device 13d3:3572 IMC Networks Bluetooth Radio
(stable-fixes).</li>
<li>Bluetooth: bnep: Fix out-of-bound access (stable-fixes).</li>
<li>Bluetooth: btintel: Fail setup on error (git-fixes).</li>
<li>Bluetooth: btnxpuart: Shutdown timer and prevent rearming when driver
unloading (stable-fixes).</li>
<li>Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x13d3:0x3591
(stable-fixes).</li>
<li>Bluetooth: btusb: Add RTL8852BE device 0489:e125 to device tables
(stable-fixes).</li>
<li>Bluetooth: Fix usage of __hci_cmd_sync_status (git-fixes).</li>
<li>Bluetooth: hci_conn: Check non NULL function before calling for HFP
offload (stable-fixes).</li>
<li>Bluetooth: hci_core: Fix LE quote calculation (git-fixes).</li>
<li>Bluetooth: hci_core: Fix not handling hibernation actions
(git-fixes).</li>
<li>Bluetooth: hci_sync: avoid dup filtering when passive scanning with
adv monitor (git-fixes).</li>
<li>Bluetooth: hci_sync: Fix suspending with wrong filter policy
(git-fixes).</li>
<li>Bluetooth: l2cap: always unlock channel in l2cap_conless_channel()
(git-fixes).</li>
<li>Bluetooth: L2CAP: Fix deadlock (git-fixes).</li>
<li>Bluetooth: MGMT: Add error handling to pair_device()
(git-fixes).</li>
<li>Bluetooth: SMP: Fix assumption of Central always being Initiator
(git-fixes).</li>
<li>bnxt_re: Fix imm_data endianness (git-fixes)</li>
<li>bpf, arm64: Fix trampoline for BPF_TRAMP_F_CALL_ORIG
(git-fixes)</li>
<li>bpf, lpm: Fix check prefixlen before walking trie
(git-fixes).</li>
<li>bpf: Add crosstask check to __bpf_get_stack (git-fixes).</li>
<li>bpf: Detect IP == ksym.end as part of BPF program
(git-fixes).</li>
<li>bpf: do not infer PTR_TO_CTX for programs with unnamed context type
(git-fixes).</li>
<li>bpf: enforce precision of R0 on callback return
(git-fixes).</li>
<li>bpf: Ensure proper register state printing for cond jumps
(git-fixes).</li>
<li>bpf: extract bpf_ctx_convert_map logic and make it more reusable
(git-fixes).</li>
<li>bpf: Fix a few selftest failures due to llvm18 change
(git-fixes).</li>
<li>bpf: Fix a kernel verifier crash in stacksafe()
(bsc#1225903).</li>
<li>bpf: Fix check_stack_write_fixed_off() to correctly spill imm
(git-fixes).</li>
<li>bpf: fix control-flow graph checking in privileged mode
(git-fixes).</li>
<li>bpf: Fix kfunc callback register type handling
(git-fixes).</li>
<li>bpf: Fix prog_array_map_poke_run map poke update
(git-fixes).</li>
<li>bpf: Fix unnecessary -EBUSY from htab_lock_bucket
(git-fixes).</li>
<li>bpf: handle bpf_user_pt_regs_t typedef explicitly for PTR_TO_CTX
global arg (git-fixes).</li>
<li>bpf: hardcode BPF_PROG_PACK_SIZE to 2MB * num_possible_nodes()
(git-fixes).</li>
<li>bpf: kprobe: remove unused declaring of bpf_kprobe_override
(git-fixes).</li>
<li>bpf: Mark bpf_spin_{lock,unlock}() helpers with notrace correctly
(git-fixes).</li>
<li>bpf: Remove unnecessary wait from bpf_map_copy_value()
(git-fixes).</li>
<li>bpf: Set uattr-&gt;batch.count as zero before batched update or
deletion (git-fixes).</li>
<li>bpf: simplify btf_get_prog_ctx_type() into btf_is_prog_ctx_type()
(git-fixes).</li>
<li>bpf/tests: Remove duplicate JSGT tests (git-fixes).</li>
<li>bpftool: Align output skeleton ELF code (git-fixes).</li>
<li>bpftool: Fix -Wcast-qual warning (git-fixes).</li>
<li>bpftool: mark orphaned programs during prog show
(git-fixes).</li>
<li>bpftool: Silence build warning about calloc() (git-fixes).</li>
<li>btrfs: add a btrfs_finish_ordered_extent helper
(git-fixes).</li>
<li>btrfs: add a is_data_bbio helper (git-fixes).</li>
<li>btrfs: add an ordered_extent pointer to struct btrfs_bio
(git-fixes).</li>
<li>btrfs: copy dir permission and time when creating a stub subvolume
(bsc#1228321).</li>
<li>btrfs: ensure fast fsync waits for ordered extents after a write
failure (git-fixes).</li>
<li>btrfs: factor out a btrfs_queue_ordered_fn helper
(git-fixes).</li>
<li>btrfs: factor out a can_finish_ordered_extent helper
(git-fixes).</li>
<li>btrfs: fix corruption after buffer fault in during direct IO append
write (git-fixes).</li>
<li>btrfs: fix double inode unlock for direct IO sync writes
(git-fixes).</li>
<li>btrfs: fix extent map use-after-free when adding pages to compressed
bio (git-fixes).</li>
<li>btrfs: fix leak of qgroup extent records after transaction abort
(git-fixes).</li>
<li>btrfs: fix ordered extent split error handling in btrfs_dio_submit_io
(git-fixes).</li>
<li>btrfs: limit write bios to a single ordered extent
(git-fixes).</li>
<li>btrfs: make btrfs_finish_ordered_extent() return void
(git-fixes).</li>
<li>btrfs: merge the two calls to btrfs_add_ordered_extent in
run_delalloc_nocow (git-fixes).</li>
<li>btrfs: open code btrfs_bio_end_io in btrfs_dio_submit_io
(git-fixes).</li>
<li>btrfs: open code end_extent_writepage in end_bio_extent_writepage
(git-fixes).</li>
<li>btrfs: pass a btrfs_inode to btrfs_fdatawrite_range()
(git-fixes).</li>
<li>btrfs: pass a btrfs_inode to btrfs_wait_ordered_range()
(git-fixes).</li>
<li>btrfs: pass an ordered_extent to btrfs_reloc_clone_csums
(git-fixes).</li>
<li>btrfs: pass an ordered_extent to btrfs_submit_compressed_write
(git-fixes).</li>
<li>btrfs: remove btrfs_add_ordered_extent (git-fixes).</li>
<li>btrfs: rename err to ret in btrfs_direct_write()
(git-fixes).</li>
<li>btrfs: uninline some static inline helpers from tree-log.h
(git-fixes).</li>
<li>btrfs: use a btrfs_inode in the log context (struct btrfs_log_ctx)
(git-fixes).</li>
<li>btrfs: use a btrfs_inode local variable at btrfs_sync_file()
(git-fixes).</li>
<li>btrfs: use bbio-&gt;ordered in btrfs_csum_one_bio
(git-fixes).</li>
<li>btrfs: use btrfs_finish_ordered_extent to complete buffered writes
(git-fixes).</li>
<li>btrfs: use btrfs_finish_ordered_extent to complete compressed writes
(git-fixes).</li>
<li>btrfs: use btrfs_finish_ordered_extent to complete direct writes
(git-fixes).</li>
<li>btrfs: use irq safe locking when running and adding delayed iputs
(git-fixes).</li>
<li>cachefiles, erofs: Fix NULL deref in when cachefiles is not doing
ondemand-mode (bsc#1229245).</li>
<li>cachefiles: add missing lock protection when polling
(bsc#1229256).</li>
<li>cachefiles: add restore command to recover inflight ondemand read
requests (bsc#1229244).</li>
<li>cachefiles: add spin_lock for cachefiles_ondemand_info
(bsc#1229249).</li>
<li>cachefiles: cancel all requests for the object that is being dropped
(bsc#1229255).</li>
<li>cachefiles: defer exposing anon_fd until after copy_to_user()
succeeds (bsc#1229251).</li>
<li>cachefiles: extract ondemand info field from cachefiles_object
(bsc#1229240).</li>
<li>cachefiles: fix slab-use-after-free in
cachefiles_ondemand_daemon_read() (bsc#1229247).</li>
<li>cachefiles: fix slab-use-after-free in cachefiles_ondemand_get_fd()
(bsc#1229246).</li>
<li>cachefiles: introduce object ondemand state (bsc#1229239).</li>
<li>cachefiles: make on-demand read killable (bsc#1229252).</li>
<li>cachefiles: narrow the scope of triggering EPOLLIN events in ondemand
mode (bsc#1229243).</li>
<li>cachefiles: never get a new anonymous fd if ondemand_id is valid
(bsc#1229250).</li>
<li>cachefiles: propagate errors from vfs_getxattr() to avoid infinite
loop (bsc#1229253).</li>
<li>cachefiles: remove err_put_fd label in
cachefiles_ondemand_daemon_read() (bsc#1229248).</li>
<li>cachefiles: resend an open request if the read request&#x27;s
object is closed (bsc#1229241).</li>
<li>cachefiles: stop sending new request when dropping object
(bsc#1229254).</li>
<li>can: mcp251xfd: tef: prepare to workaround broken TEF FIFO tail index
erratum (stable-fixes).</li>
<li>can: mcp251xfd: tef: update workaround for erratum DS80000789E 6 of
mcp2518fd (stable-fixes).</li>
<li>ceph: periodically flush the cap releases (bsc#1230056).</li>
<li>certs: Move RSA self-test data to separate file
(bsc#1222777).</li>
<li>cgroup: Add annotation for holding namespace_sem in
current_cgns_cgroup_from_root() (bsc#1222254).</li>
<li>cgroup: Eliminate the need for cgroup_mutex in proc_cgroup_show()
(bsc#1222254).</li>
<li>cgroup: Make operations on the cgroup root_list RCU safe
(bsc#1222254).</li>
<li>cgroup: preserve KABI of cgroup_root (bsc#1222254).</li>
<li>cgroup: Remove unnecessary list_empty() (bsc#1222254).</li>
<li>cgroup/cpuset: Prevent UAF in proc_cpuset_show()
(bsc#1228801).</li>
<li>char: xillybus: Check USB endpoints when probing device
(git-fixes).</li>
<li>char: xillybus: Do not destroy workqueue from work item running on it
(stable-fixes).</li>
<li>char: xillybus: Refine workqueue handling (git-fixes).</li>
<li>clk: en7523: fix rate divider for slic and spi clocks
(git-fixes).</li>
<li>clk: qcom: camcc-sc7280: Add parent dependency to all camera GDSCs
(git-fixes).</li>
<li>clk: qcom: gcc-sa8775p: Update the GDSC wait_val fields and flags
(git-fixes).</li>
<li>clk: qcom: gcc-sc7280: Update force mem core bit for UFS ICE clock
(git-fixes).</li>
<li>clk: qcom: gpucc-sa8775p: Park RCG&#x27;s clk source at XO during
disable (git-fixes).</li>
<li>clk: qcom: gpucc-sa8775p: Remove the CLK_IS_CRITICAL and ALWAYS_ON
flags (git-fixes).</li>
<li>clk: qcom: gpucc-sa8775p: Update wait_val fields for GPU
GDSC&#x27;s (git-fixes).</li>
<li>clk: qcom: gpucc-sm8350: Park RCG&#x27;s clk source at XO during
disable (git-fixes).</li>
<li>clk: qcom: kpss-xcc: Return of_clk_add_hw_provider to transfer the
error (git-fixes).</li>
<li>clk: qcom: Park shared RCGs upon registration (git-fixes).</li>
<li>clk: visconti: Add bounds-checking coverage for struct
visconti_pll_provider (stable-fixes).</li>
<li>clocksource/drivers/sh_cmt: Address race condition for clock events
(stable-fixes).</li>
<li>cpu/SMT: Enable SMT only if a core is online (bsc#1214285 bsc#1205462
ltc#200161 ltc#200588 git-fixes).</li>
<li>cxl/region: Move cxl_dpa_to_region() work to the region driver
(bsc#1228472)</li>
<li>dev/parport: fix the array out-of-bounds risk
(stable-fixes).</li>
<li>device property: Add cleanup.h based fwnode_handle_put() scope based
cleanup (stable-fixes).</li>
<li>dmaengine: dw: Add memory bus width verification
(git-fixes).</li>
<li>dmaengine: dw: Add peripheral bus width verification
(git-fixes).</li>
<li>docs: KVM: Fix register ID of SPSR_FIQ (git-fixes).</li>
<li>driver core: Fix uevent_show() vs driver detach race
(git-fixes).</li>
<li>drm/admgpu: fix dereferencing null pointer context
(stable-fixes).</li>
<li>drm/amd/display: Add delay to improve LTTPR UHBR interop
(stable-fixes).</li>
<li>drm/amd/display: Add NULL check for &#x27;afb&#x27; before
dereferencing in amdgpu_dm_plane_handle_cursor_update (stable-fixes).</li>
<li>drm/amd/display: Add null checker before passing variables
(stable-fixes).</li>
<li>drm/amd/display: Adjust cursor position (git-fixes).</li>
<li>drm/amd/display: avoid using null object of framebuffer
(git-fixes).</li>
<li>drm/amd/display: Check for NULL pointer (stable-fixes).</li>
<li>drm/amd/display: fix cursor offset on rotation 180
(git-fixes).</li>
<li>drm/amd/display: fix s2idle entry for DCN3.5+
(stable-fixes).</li>
<li>drm/amd/display: Skip Recompute DSC Params if no Stream on Link
(stable-fixes).</li>
<li>drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr
(stable-fixes).</li>
<li>drm/amdgpu: Actually check flags for all context ops
(stable-fixes).</li>
<li>drm/amdgpu: Add lock around VF RLCG interface
(stable-fixes).</li>
<li>drm/amdgpu: fix dereference null return value for the function
amdgpu_vm_pt_parent (stable-fixes).</li>
<li>drm/amdgpu: fix potential resource leak warning
(stable-fixes).</li>
<li>drm/amdgpu: Fix the null pointer dereference to ras_manager
(stable-fixes).</li>
<li>drm/amdgpu: Forward soft recovery errors to userspace
(stable-fixes).</li>
<li>drm/amdgpu: reset vm state machine after gpu reset(vram lost)
(stable-fixes).</li>
<li>drm/amdgpu: Validate TA binary size (stable-fixes).</li>
<li>drm/amdgpu/jpeg2: properly set atomics vmid field
(stable-fixes).</li>
<li>drm/amdgpu/jpeg4: properly set atomics vmid field
(stable-fixes).</li>
<li>drm/amdgpu/pm: Fix the null pointer dereference for smu7
(stable-fixes).</li>
<li>drm/amdgpu/pm: Fix the null pointer dereference in
apply_state_adjust_rules (stable-fixes).</li>
<li>drm/amdgpu/pm: Fix the param type of set_power_profile_mode
(stable-fixes).</li>
<li>drm/amdgpu/sdma5.2: limit wptr workaround to sdma 5.2.1
(git-fixes).</li>
<li>drm/amdgpu/sdma5.2: Update wptr registers as well as doorbell
(stable-fixes).</li>
<li>drm/bridge: analogix_dp: properly handle zero sized AUX transactions
(stable-fixes).</li>
<li>drm/client: fix null pointer dereference in drm_client_modeset_probe
(git-fixes).</li>
<li>drm/dp_mst: Skip CSN if topology probing is not done yet
(stable-fixes).</li>
<li>drm/etnaviv: do not block scheduler when GPU is still active
(stable-fixes).</li>
<li>drm/i915: Fix possible int overflow in skl_ddi_calculate_wrpll()
(git-fixes).</li>
<li>drm/i915/dsi: Make Lenovo Yoga Tab 3 X90F DMI match less strict
(git-fixes).</li>
<li>drm/i915/gem: Adjust vma offset for framebuffer mmap offset
(stable-fixes).</li>
<li>drm/i915/gem: Fix Virtual Memory mapping boundaries calculation
(git-fixes).</li>
<li>drm/i915/hdcp: Fix HDCP2_STREAM_STATUS macro (git-fixes).</li>
<li>drm/lima: set gp bus_stop bit before hard reset
(stable-fixes).</li>
<li>drm/mediatek/dp: Fix spurious kfree() (git-fixes).</li>
<li>drm/msm: Reduce fallout of fence signaling vs reclaim hangs
(stable-fixes).</li>
<li>drm/msm/dp: fix the max supported bpp logic (git-fixes).</li>
<li>drm/msm/dp: reset the link phy params before link training
(git-fixes).</li>
<li>drm/msm/dpu: capture snapshot on the first commit_done timeout
(stable-fixes).</li>
<li>drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails
(git-fixes).</li>
<li>drm/msm/dpu: do not play tricks with debug macros
(git-fixes).</li>
<li>drm/msm/dpu: drop MSM_ENC_VBLANK support (stable-fixes).</li>
<li>drm/msm/dpu: move dpu_encoder&#x27;s connector assignment to
atomic_enable() (git-fixes).</li>
<li>drm/msm/dpu: split dpu_encoder_wait_for_event into two functions
(stable-fixes).</li>
<li>drm/msm/dpu: take plane rotation into account for wide planes
(git-fixes).</li>
<li>drm/msm/dpu: try multirect based on mdp clock limits
(stable-fixes).</li>
<li>drm/msm/dpu: use drmm-managed allocation for dpu_encoder_phys
(stable-fixes).</li>
<li>drm/msm/mdss: Rename path references to mdp_path
(stable-fixes).</li>
<li>drm/msm/mdss: switch mdss to use devm_of_icc_get()
(stable-fixes).</li>
<li>drm/nouveau: prime: fix refcount underflow (git-fixes).</li>
<li>drm/panel: nt36523: Set 120Hz fps for xiaomi,elish panels
(stable-fixes).</li>
<li>drm/radeon: Remove __counted_by from StateArray.states[]
(git-fixes).</li>
<li>drm/radeon/evergreen_cs: Clean up errors in evergreen_cs.c
(bsc#1229024).</li>
<li>drm/rockchip: vop2: clear afbc en and transform bit for cluster
window at linear mode (stable-fixes).</li>
<li>drm/virtio: Fix type of dma-fence context variable
(git-fixes).</li>
<li>drm/vmwgfx: Fix a deadlock in dma buf fence polling
(git-fixes).</li>
<li>drm/vmwgfx: Fix overlay when using Screen Targets
(git-fixes).</li>
<li>drm/vmwgfx: Fix prime with external buffers (git-fixes).</li>
<li>efi/libstub: Zero initialize heap allocated struct screen_info
(git-fixes).</li>
<li>evm: do not copy up &#x27;security.evm&#x27; xattr
(git-fixes).</li>
<li>firmware: cirrus: cs_dsp: Initialize debugfs_root to invalid
(stable-fixes).</li>
<li>fs/netfs/fscache_cookie: add missing &quot;n_accesses&quot;
check (bsc#1229455).</li>
<li>fuse: Initialize beyond-EOF page contents before setting uptodate
(bsc#1229456).</li>
<li>genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline
(git-fixes).</li>
<li>genirq/generic_chip: Make irq_remove_generic_chip() irqdomain aware
(git-fixes).</li>
<li>genirq/matrix: Exclude managed interrupts in irq_matrix_allocated()
(git-fixes).</li>
<li>gfs2: setattr_chown: Add missing initialization
(git-fixes).</li>
<li>gpio: mlxbf3: Support shutdown() function (git-fixes).</li>
<li>gpio: prevent potential speculation leaks in gpio_device_get_desc()
(stable-fixes).</li>
<li>gpio: sysfs: extend the critical section for unregistering sysfs
devices (stable-fixes).</li>
<li>gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey
(git-fixes).</li>
<li>hfs: fix to initialize fields of hfs_inode_info after
hfs_alloc_inode() (git-fixes).</li>
<li>HID: wacom: Defer calculation of resolution until resolution_code is
known (git-fixes).</li>
<li>hwmon: (ltc2992) Avoid division by zero (stable-fixes).</li>
<li>hwmon: (ltc2992) Fix memory leak in ltc2992_parse_dt()
(git-fixes).</li>
<li>hwmon: (pc87360) Bounds check data-&gt;innr usage
(stable-fixes).</li>
<li>i2c: Fix conditional for substituting empty ACPI functions
(stable-fixes).</li>
<li>i2c: qcom-geni: Add missing clk_disable_unprepare in
geni_i2c_runtime_resume (git-fixes).</li>
<li>i2c: qcom-geni: Add missing geni_icc_disable in
geni_i2c_runtime_resume (git-fixes).</li>
<li>i2c: qcom-geni: Add missing geni_icc_disable in
geni_i2c_runtime_resume (git-fixes).</li>
<li>i2c: riic: avoid potential division by zero
(stable-fixes).</li>
<li>i2c: smbus: Improve handling of stuck alerts (git-fixes).</li>
<li>i2c: smbus: Send alert notifications to all devices if source not
found (git-fixes).</li>
<li>i2c: stm32f7: Add atomic_xfer method to driver
(stable-fixes).</li>
<li>i2c: Use IS_REACHABLE() for substituting empty ACPI functions
(git-fixes).</li>
<li>i3c: mipi-i3c-hci: Do not unmap region not mapped for transfer
(stable-fixes).</li>
<li>i3c: mipi-i3c-hci: Remove BUG() when Ring Abort request times out
(stable-fixes).</li>
<li>i915/perf: Remove code to update PWR_CLK_STATE for gen12
(git-fixes).</li>
<li>ice: Fix NULL pointer access, if PF does not support SRIOV_LAG
(bsc#1228737).</li>
<li>Input: i8042 - add forcenorestore quirk to leave controller untouched
even on s3 (stable-fixes).</li>
<li>Input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table
(bsc#1229056).</li>
<li>Input: i8042 - use new forcenorestore quirk to replace old buggy
quirk combination (stable-fixes).</li>
<li>Input: MT - limit max slots (stable-fixes).</li>
<li>io_uring: Drop per-ctx dummy_ubuf (git-fixes).</li>
<li>io_uring: fix io_match_task must_hold (git-fixes).</li>
<li>io_uring: Fix probe of disabled operations (git-fixes).</li>
<li>io_uring: tighten task exit cancellations (git-fixes).</li>
<li>io_uring/advise: support 64-bit lengths (git-fixes).</li>
<li>iommu/amd: Convert comma to semicolon (git-fixes).</li>
<li>iommu/vt-d: Fix identity map bounds in si_domain_init()
(git-fixes).</li>
<li>iommufd/device: Fix hwpt at err_unresv in iommufd_device_do_replace()
(git-fixes).</li>
<li>ip6_tunnel: Fix broken GRO (bsc#1229444).</li>
<li>ipv6: sr: fix incorrect unregister order (git-fixes).</li>
<li>irqdomain: Fixed unbalanced fwnode get and put
(git-fixes).</li>
<li>jfs: define xtree root and page independently (git-fixes).</li>
<li>jfs: fix null ptr deref in dtInsertEntry (git-fixes).</li>
<li>jfs: Fix shift-out-of-bounds in dbDiscardAG (git-fixes).</li>
<li>jump_label: Clarify condition in static_key_fast_inc_not_disabled()
(git-fixes).</li>
<li>jump_label: Fix concurrency issues in static_key_slow_dec()
(git-fixes).</li>
<li>jump_label: Fix the fix, brown paper bags galore
(git-fixes).</li>
<li>jump_label: Simplify and clarify static_key_fast_inc_cpus_locked()
(git-fixes).</li>
<li>kabi fix for KVM: s390: fix LPSWEY handling (bsc#1227634
git-fixes).</li>
<li>kabi fix for SUNRPC: add a missing rpc_stat for TCP TLS
(git-fixes).</li>
<li>kABI fix of: virtio-crypto: handle config changed by work queue
(git-fixes).</li>
<li>kABI workaround for sound core UMP conversion
(stable-fixes).</li>
<li>kabi/severities: ignore kABI for FireWire sound local symbols
(bsc#1208783)</li>
<li>kabi/severity: add nvme common code The nvme common code is also
allowed to change the data structures, there are only internal users.</li>
<li>kcov: properly check for softirq context (git-fixes).</li>
<li>kernfs: Convert kernfs_path_from_node_locked() from strlcpy() to
strscpy() (bsc#1229134).</li>
<li>kernfs: fix false-positive WARN(nr_mmapped) in
kernfs_drain_open_files (git-fixes).</li>
<li>kprobes: Fix to check symbol prefixes correctly
(git-fixes).</li>
<li>kprobes: Prohibit probing on CFI preamble symbol
(git-fixes).</li>
<li>KVM: Always flush async #PF workqueue when vCPU is being destroyed
(git-fixes).</li>
<li>KVM: arm64: AArch32: Fix spurious trapping of conditional
instructions (git-fixes).</li>
<li>KVM: arm64: Add missing memory barriers when switching to
pKVM&#x27;s hyp pgd (git-fixes).</li>
<li>KVM: arm64: Allow AArch32 PSTATE.M to be restored as System mode
(git-fixes).</li>
<li>KVM: arm64: Fix __pkvm_init_switch_pgd call ABI
(git-fixes).</li>
<li>KVM: arm64: Fix AArch32 register narrowing on userspace write
(git-fixes).</li>
<li>KVM: arm64: Fix clobbered ELR in sync abort/SError
(git-fixes)</li>
<li>KVM: arm64: GICv4: Do not perform a map to a mapped vLPI
(git-fixes).</li>
<li>KVM: arm64: timers: Correctly handle TGE flip with CNTPOFF_EL2
(git-fixes).</li>
<li>KVM: arm64: timers: Fix resource leaks in kvm_timer_hyp_init()
(git-fixes).</li>
<li>KVM: arm64: vgic-its: Test for valid IRQ in
its_sync_lpi_pending_table() (git-fixes).</li>
<li>KVM: arm64: vgic-its: Test for valid IRQ in MOVALL handler
(git-fixes).</li>
<li>KVM: arm64: vgic-v2: Use cpuid from userspace as vcpu_id
(git-fixes).</li>
<li>KVM: arm64: vgic-v4: Restore pending state on host userspace write
(git-fixes).</li>
<li>KVM: arm64: vgic: Add a non-locking primitive for
kvm_vgic_vcpu_destroy() (git-fixes).</li>
<li>KVM: arm64: vgic: Force vcpu vgic teardown on vcpu destroy
(git-fixes).</li>
<li>KVM: arm64: vgic: Simplify kvm_vgic_destroy() (git-fixes).</li>
<li>KVM: fix kvm_mmu_memory_cache allocation warning
(git-fixes).</li>
<li>KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with
KVM_MEM_READONLY (git-fixes).</li>
<li>KVM: nVMX: Add a helper to get highest pending from Posted Interrupt
vector (git-fixes).</li>
<li>KVM: nVMX: Check for pending posted interrupts when looking for
nested events (git-fixes).</li>
<li>KVM: nVMX: Request immediate exit iff pending nested event needs
injection (git-fixes).</li>
<li>KVM: PPC: Book3S HV: Fix the set_one_reg for MMCR3
(bsc#1194869).</li>
<li>KVM: PPC: Book3S HV: Handle pending exceptions on guest entry with
MSR_EE (bsc#1215199).</li>
<li>KVM: Protect vcpu-&gt;pid dereference via debugfs with RCU
(git-fixes).</li>
<li>KVM: Reject overly excessive IDs in KVM_CREATE_VCPU
(git-fixes).</li>
<li>KVM: s390: fix LPSWEY handling (bsc#1227634 git-fixes).</li>
<li>KVM: s390: fix validity interception issue when gisa is switched off
(git-fixes bsc#1229167).</li>
<li>kvm: s390: Reject memory region operations for ucontrol VMs
(git-fixes bsc#1229168).</li>
<li>KVM: Stop processing <em>all</em> memslots when
&quot;null&quot; mmu_notifier handler is found (git-fixes).</li>
<li>KVM: VMX: Move posted interrupt descriptor out of VMX code
(git-fixes).</li>
<li>KVM: VMX: Split out the non-virtualization part of
vmx_interrupt_blocked() (git-fixes).</li>
<li>KVM: VMX: Switch __vmx_exit() and kvm_x86_vendor_exit() in vmx_exit()
(git-fixes).</li>
<li>KVM: x86: Limit check IDs for KVM_SET_BOOT_CPU_ID
(git-fixes).</li>
<li>KVM: x86/mmu: Bug the VM if KVM tries to split a !hugepage SPTE
(git-fixes).</li>
<li>libbpf: Add missing LIBBPF_API annotation to libbpf_set_memlock_rlim
API (git-fixes).</li>
<li>libbpf: Apply map_set_def_max_entries() for inner_maps on creation
(git-fixes).</li>
<li>libbpf: Fix faccessat() usage on Android (git-fixes).</li>
<li>libbpf: Use OPTS_SET() macro in bpf_xdp_query()
(git-fixes).</li>
<li>md-cluster: fix hanging issue while a new disk adding
(bsc#1223395).</li>
<li>md-cluster: fix hanging issue while a new disk adding
(bsc#1223395).</li>
<li>md-cluster: fix no recovery job when adding/re-adding a disk
(bsc#1223395).</li>
<li>md-cluster: fix no recovery job when adding/re-adding a disk
(bsc#1223395).</li>
<li>md-cluster: keeping kabi compatibility for upstream commit
35a0a409fa26 (bsc#1223395).</li>
<li>md: add a mddev_add_trace_msg helper (git-fixes).</li>
<li>md: add check for sleepers in md_wakeup_thread()
(git-fixes).</li>
<li>md: change the return value type of md_write_start to void
(git-fixes).</li>
<li>md: do not account sync_io if iostats of the disk is disabled
(git-fixes).</li>
<li>md: do not delete safemode_timer in mddev_suspend
(git-fixes).</li>
<li>md: Do not wait for MD_RECOVERY_NEEDED for HOT_REMOVE_DISK ioctl
(git-fixes).</li>
<li>md: factor out a helper exceed_read_errors() to check read_errors
(git-fixes).</li>
<li>md: fix a suspicious RCU usage warning (git-fixes).</li>
<li>md/md-bitmap: fix writing non bitmap pages (git-fixes).</li>
<li>md/raid1: set max_sectors during early return from choose_slow_rdev()
(git-fixes).</li>
<li>md/raid1: support read error check (git-fixes).</li>
<li>md/raid5: fix deadlock that raid5d() wait for itself to clear
MD_SB_CHANGE_PENDING (git-fixes).</li>
<li>md/raid5: fix spares errors about rcu usage (git-fixes).</li>
<li>md/raid5: recheck if reshape has finished with device_lock held
(git-fixes).</li>
<li>media: amphion: Remove lock in s_ctrl callback
(stable-fixes).</li>
<li>media: drivers/media/dvb-core: copy user arrays safely
(stable-fixes).</li>
<li>media: pci: cx23885: check cx23885_vdev_init() return
(stable-fixes).</li>
<li>media: Revert &quot;media: dvb-usb: Fix unexpected infinite loop
in dvb_usb_read_remote_control()&quot; (git-fixes).</li>
<li>media: uvcvideo: Add quirk for invalid dev_sof in Logitech C920
(git-fixes).</li>
<li>media: uvcvideo: Disable autosuspend for Insta360 Link
(stable-fixes).</li>
<li>media: uvcvideo: Fix the bandwdith quirk on USB 3.x
(stable-fixes).</li>
<li>media: uvcvideo: Ignore empty TS packets (stable-fixes).</li>
<li>media: uvcvideo: Quirk for invalid dev_sof in Logitech C922
(stable-fixes).</li>
<li>media: xc2028: avoid use-after-free in load_firmware_cb()
(stable-fixes).</li>
<li>memcg: protect concurrent access to mem_cgroup_idr
(git-fixes).</li>
<li>memory: stm32-fmc2-ebi: check regmap_read return value
(stable-fixes).</li>
<li>memory: tegra: Skip SID programming if SID registers are not set
(stable-fixes).</li>
<li>minmax: add a few more MIN_T/MAX_T users (bsc#1229024).</li>
<li>minmax: avoid overly complicated constant expressions in VM code
(bsc#1229024).</li>
<li>minmax: do not use max() in situations that want a C constant
expression (bsc#1229024).</li>
<li>minmax: fix up min3() and max3() too (bsc#1229024).</li>
<li>minmax: improve macro expansion and type checking
(bsc#1229024).</li>
<li>minmax: make generic MIN() and MAX() macros available everywhere
(bsc#1229024).</li>
<li>minmax: simplify and clarify min_t()/max_t() implementation
(bsc#1229024).</li>
<li>minmax: simplify min()/max()/clamp() implementation
(bsc#1229024).</li>
<li>mm, kmsan: fix infinite recursion due to RCU critical section
(git-fixes).</li>
<li>mm: prevent derefencing NULL ptr in pfn_section_valid()
(git-fixes).</li>
<li>mmc: dw_mmc: allow biu and ciu clocks to defer
(git-fixes).</li>
<li>mmc: mmc_test: Fix NULL dereference on allocation failure
(git-fixes).</li>
<li>mmc: mtk-sd: receive cmd8 data when hs400 tuning fail
(git-fixes).</li>
<li>net: drop bad gso csum_start and offset in virtio_net_hdr
(git-fixes).</li>
<li>net: ethernet: mtk_wed: fix use-after-free panic in
mtk_wed_setup_tc_block_cb() (git-fixes).</li>
<li>net: fix sk_memory_allocated_{add|sub} vs softirqs
(bsc#1228757).</li>
<li>net: mana: Add support for page sizes other than 4KB on ARM64
(jsc#PED-8491 bsc#1226530).</li>
<li>net: mana: Fix doorbell out of order violation and avoid unnecessary
doorbell rings (bsc#1229154).</li>
<li>net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response
(git-fixes).</li>
<li>net: mana: Fix RX buf alloc_size alignment and atomic op panic
(bsc#1229086).</li>
<li>net: missing check virtio (git-fixes).</li>
<li>net: phy: micrel: Fix the KSZ9131 MDI-X status issue
(git-fixes).</li>
<li>net: phy: realtek: add support for RTL8366S Gigabit PHY
(git-fixes).</li>
<li>net: usb: qmi_wwan: fix memory leak for not ip packets
(git-fixes).</li>
<li>net: usb: sr9700: fix uninitialized variable use in sr_mdio_read
(git-fixes).</li>
<li>net/iucv: fix the allocation size of iucv_path_table array (git-fixes
bsc#1229451).</li>
<li>net/iucv: fix use after free in iucv_sock_close()
(bsc#1228973).</li>
<li>net/rds: fix possible cp null dereference (git-fixes).</li>
<li>net/sched: initialize noop_qdisc owner (git-fixes).</li>
<li>netfs, fscache: export fscache_put_volume() and add
fscache_try_get_volume() (bsc#1228459 bsc#1228462).</li>
<li>nfc: pn533: Add poll mod list filling check (git-fixes).</li>
<li>nfs: do not invalidate dentries on transient errors
(git-fixes).</li>
<li>nfs: expose /proc/net/sunrpc/nfs in net namespaces
(git-fixes).</li>
<li>nfs: make the rpc_stat per net namespace (git-fixes).</li>
<li>nfs: pass explicit offset/count to trace events
(git-fixes).</li>
<li>nfs: propagate readlink errors in nfs_symlink_filler
(git-fixes).</li>
<li>NFSD: Support write delegations in LAYOUTGET (git-fixes).</li>
<li>NFSv4.1 another fix for EXCHGID4_FLAG_USE_PNFS_DS for DS server
(git-fixes).</li>
<li>nouveau/firmware: use dma non-coherent allocator
(git-fixes).</li>
<li>nvme_core: scan namespaces asynchronously (bsc#1224105).</li>
<li>nvme-multipath: find NUMA path only for online numa-node
(git-fixes).</li>
<li>nvme-multipath: implement &quot;queue-depth&quot; iopolicy
(bsc#1227706).</li>
<li>nvme-multipath: prepare for &quot;queue-depth&quot; iopolicy
(bsc#1227706).</li>
<li>nvme-pci: add missing condition check for existence of mapped data
(git-fixes).</li>
<li>nvme-pci: do not directly handle subsys reset fallout
(bsc#1220066).</li>
<li>nvme-pci: Fix the instructions for disabling power management
(git-fixes).</li>
<li>nvme-sysfs: add &#x27;tls_configured_key&#x27; sysfs
attribute (bsc#1221857).</li>
<li>nvme-sysfs: add &#x27;tls_keyring&#x27; attribute
(bsc#1221857).</li>
<li>nvme-tcp: check for invalidated or revoked key
(bsc#1221857).</li>
<li>nvme-tcp: sanitize TLS key handling (bsc#1221857).</li>
<li>nvme: add a newline to the &#x27;tls_key&#x27; sysfs
attribute (bsc#1221857).</li>
<li>nvme: adjust multiples of NVME_CTRL_PAGE_SIZE in offset
(git-fixes).</li>
<li>nvme: avoid double free special payload (git-fixes).</li>
<li>nvme: fix NVME_NS_DEAC may incorrectly identifying the disk as
EXT_LBA (git-fixes).</li>
<li>nvme: fixup comment for nvme RDMA Provider Type
(git-fixes).</li>
<li>nvme: split off TLS sysfs attributes into a separate group
(bsc#1221857).</li>
<li>nvme: tcp: remove unnecessary goto statement
(bsc#1221857).</li>
<li>nvmet-auth: fix nvmet_auth hash error handling
(git-fixes).</li>
<li>nvmet: always initialize cqe.result (git-fixes).</li>
<li>nvmet: do not return &#x27;reserved&#x27; for empty TSAS
values (git-fixes).</li>
<li>nvmet: fix a possible leak when destroy a ctrl during qp
establishment (git-fixes).</li>
<li>nvmet: make &#x27;tsas&#x27; attribute idempotent for RDMA
(git-fixes).</li>
<li>ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()
(bsc#1228410).</li>
<li>padata: Fix possible divide-by-0 panic in padata_mt_helper()
(git-fixes).</li>
<li>PCI: Add Edimax Vendor ID to pci_ids.h (stable-fixes).</li>
<li>PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN
(git-fixes).</li>
<li>PCI: loongson: Enable MSI in LS7A Root Complex
(stable-fixes).</li>
<li>perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09
(git-fixes).</li>
<li>pinctrl: mediatek: common-v2: Fix broken bias-disable for
PULL_PU_PD_RSEL_TYPE (git-fixes).</li>
<li>pinctrl: rockchip: correct RK3328 iomux width flag for GPIO2-B pins
(git-fixes).</li>
<li>pinctrl: single: fix potential NULL dereference in pcs_get_function()
(git-fixes).</li>
<li>pinctrl: starfive: jh7110: Correct the level trigger configuration of
iev register (git-fixes).</li>
<li>platform/chrome: cros_ec_proto: Lock device when updating MKBP
version (git-fixes).</li>
<li>platform/chrome: cros_ec_proto: Lock device when updating MKBP
version (git-fixes).</li>
<li>platform/surface: aggregator: Fix warning when controller is
destroyed in probe (git-fixes).</li>
<li>platform/x86: lg-laptop: fix %s null argument warning
(stable-fixes).</li>
<li>platform/x86/amd/hsmp: Add support for ACPI based probing
(jsc#PED-8779).</li>
<li>platform/x86/amd/hsmp: Cache pci_dev in struct hsmp_socket
(jsc#PED-8779).</li>
<li>platform/x86/amd/hsmp: Change devm_kzalloc() to devm_kcalloc()
(jsc#PED-8779).</li>
<li>platform/x86/amd/hsmp: Check HSMP support on AMD family of processors
(jsc#PED-8779).</li>
<li>platform/x86/amd/hsmp: Check num_sockets against MAX_AMD_SOCKETS
(jsc#PED-8779).</li>
<li>platform/x86/amd/hsmp: Create static func to handle platdev
(jsc#PED-8779).</li>
<li>platform/x86/amd/hsmp: Define a struct to hold mailbox regs
(jsc#PED-8779).</li>
<li>platform/x86/amd/hsmp: Move dev from platdev to hsmp_socket
(jsc#PED-8779).</li>
<li>platform/x86/amd/hsmp: Move hsmp_test to probe
(jsc#PED-8779).</li>
<li>platform/x86/amd/hsmp: Non-ACPI support for AMD F1A_M00~0Fh
(jsc#PED-8779).</li>
<li>platform/x86/amd/hsmp: Remove extra parenthesis and add a space
(jsc#PED-8779).</li>
<li>platform/x86/amd/hsmp: Restructure sysfs group creation
(jsc#PED-8779).</li>
<li>platform/x86/amd/hsmp: switch to use device_add_groups()
(jsc#PED-8779).</li>
<li>platform/x86/intel/ifs: Initialize union ifs_status to zero
(git-fixes).</li>
<li>power: supply: axp288_charger: Fix constant_charge_voltage writes
(git-fixes).</li>
<li>power: supply: axp288_charger: Round constant_charge_voltage writes
down (git-fixes).</li>
<li>power: supply: qcom_battmgr: return EAGAIN when firmware service is
not up (git-fixes).</li>
<li>powerpc: fix a file leak in kvm_vcpu_ioctl_enable_cap()
(bsc#1194869).</li>
<li>powerpc: xor_vmx: Add &#x27;-mhard-float&#x27; to CFLAGS
(bsc#1194869).</li>
<li>powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for
CONFIG_PCI=n (bsc#1194869).</li>
<li>powerpc/io: Avoid clang null pointer arithmetic warnings
(bsc#1194869).</li>
<li>powerpc/kexec_file: fix cpus node update to FDT
(bsc#1194869).</li>
<li>powerpc/kexec: make the update_cpus_node() function public
(bsc#1194869).</li>
<li>powerpc/kexec: split CONFIG_KEXEC_FILE and CONFIG_CRASH_DUMP
(bsc#1194869).</li>
<li>powerpc/pseries: Add failure related checks for h_get_mpp and
h_get_ppp (bsc#1194869).</li>
<li>powerpc/pseries: Whitelist dtl slub object for copying to userspace
(bsc#1194869).</li>
<li>powerpc/radix: Move some functions into #ifdef
CONFIG_KVM_BOOK3S_HV_POSSIBLE (bsc#1194869).</li>
<li>powerpc/topology: Check if a core is online (bsc#1214285 bsc#1205462
ltc#200161 ltc#200588 git-fixes).</li>
<li>powerpc/xmon: Check cpu id in commands &quot;c#&quot;,
&quot;dp#&quot; and &quot;dx#&quot; (bsc#1194869).</li>
<li>printk/panic: Allow cpu backtraces to be written into ringbuffer
during panic (bsc#1225607).</li>
<li>RDMA: Fix netdev tracker in ib_device_set_netdev
(git-fixes)</li>
<li>RDMA/cache: Release GID table even if leak is detected
(git-fixes)</li>
<li>RDMA/device: Return error earlier if port in not valid
(git-fixes)</li>
<li>RDMA/hns: Check atomic wr length (git-fixes)</li>
<li>RDMA/hns: Fix insufficient extend DB for VFs. (git-fixes)</li>
<li>RDMA/hns: Fix mbx timing out before CMD execution is completed
(git-fixes)</li>
<li>RDMA/hns: Fix missing pagesize and alignment check in FRMR
(git-fixes)</li>
<li>RDMA/hns: Fix shift-out-bounds when max_inline_data is 0
(git-fixes)</li>
<li>RDMA/hns: Fix soft lockup under heavy CEQE load
(git-fixes)</li>
<li>RDMA/hns: Fix undifined behavior caused by invalid max_sge
(git-fixes)</li>
<li>RDMA/hns: Fix unmatch exception handling when init eq table fails
(git-fixes)</li>
<li>RDMA/iwcm: Fix a use-after-free related to destroying CM IDs
(git-fixes)</li>
<li>RDMA/mana_ib: Use virtual address in dma regions for MRs
(git-fixes).</li>
<li>RDMA/mlx4: Fix truncated output warning in alias_GUID.c
(git-fixes)</li>
<li>RDMA/mlx4: Fix truncated output warning in mad.c
(git-fixes)</li>
<li>RDMA/mlx5: Set mkeys for dmabuf at PAGE_SIZE (git-fixes)</li>
<li>RDMA/rxe: Do not set BTH_ACK_MASK for UC or UD QPs
(git-fixes)</li>
<li>reiserfs: fix uninit-value in comp_keys (git-fixes).</li>
<li>rtc: nct3018y: fix possible NULL dereference
(stable-fixes).</li>
<li>s390/cpum_cf: Fix endless loop in CF_DIAG event stop (git-fixes
bsc#1229171).</li>
<li>s390/dasd: fix error checks in dasd_copy_pair_store() (git-fixes
bsc#1229173).</li>
<li>s390/dasd: fix error recovery leading to data corruption on ESE
devices (git-fixes bsc#1229452).</li>
<li>s390/pci: Add missing virt_to_phys() for directed DIBV (git-fixes
bsc#1229174).</li>
<li>s390/pci: Allow allocation of more than 1 MSI interrupt (git-fixes
bsc#1229172).</li>
<li>s390/pci: Refactor arch_setup_msi_irqs() (git-fixes
bsc#1229172).</li>
<li>s390/pkey: harmonize pkey s390 debug feature calls
(bsc#1228720).</li>
<li>s390/pkey: introduce dynamic debugging for pkey
(bsc#1228720).</li>
<li>s390/sclp: Prevent release of buffer in I/O (git-fixes
bsc#1229169).</li>
<li>s390/uv: Panic for set and remove shared access UVC errors (git-fixes
bsc#1229170).</li>
<li>samples/bpf: syscall_tp_user: Fix array out-of-bound access
(git-fixes).</li>
<li>samples/bpf: syscall_tp_user: Rename num_progs into nr_tests
(git-fixes).</li>
<li>sbitmap: use READ_ONCE to access map-&gt;word
(stable-fixes).</li>
<li>scsi: lpfc: Allow DEVICE_RECOVERY mode after RSCN receipt if in
PRLI_ISSUE state (bsc#1228857).</li>
<li>scsi: lpfc: Cancel ELS WQE instead of issuing abort when SLI port is
inactive (bsc#1228857).</li>
<li>scsi: lpfc: Fix handling of fully recovered fabric node in dev_loss
callbk (bsc#1228857).</li>
<li>scsi: lpfc: Fix incorrect request len mbox field when setting
trunking via sysfs (bsc#1228857).</li>
<li>scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info
(bsc#1228857).</li>
<li>scsi: lpfc: Relax PRLI issue conditions after GID_FT response
(bsc#1228857).</li>
<li>scsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian
macro usages (bsc#1228857).</li>
<li>scsi: lpfc: Update lpfc version to 14.4.0.3 (bsc#1228857).</li>
<li>scsi: qla2xxx: Avoid possible run-time warning with long model_num
(bsc#1228850).</li>
<li>scsi: qla2xxx: Complete command early within lock
(bsc#1228850).</li>
<li>scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).</li>
<li>scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).</li>
<li>scsi: qla2xxx: During vport delete send async logout explicitly
(bsc#1228850).</li>
<li>scsi: qla2xxx: Fix debugfs output for fw_resource_count
(bsc#1228850).</li>
<li>scsi: qla2xxx: Fix flash read failure (bsc#1228850).</li>
<li>scsi: qla2xxx: Fix for possible memory corruption
(bsc#1228850).</li>
<li>scsi: qla2xxx: Fix optrom version displayed in FDMI
(bsc#1228850).</li>
<li>scsi: qla2xxx: Indent help text (bsc#1228850).</li>
<li>scsi: qla2xxx: Reduce fabric scan duplicate code
(bsc#1228850).</li>
<li>scsi: qla2xxx: Remove unused struct
&#x27;scsi_dif_tuple&#x27; (bsc#1228850).</li>
<li>scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds
(bsc#1228850).</li>
<li>scsi: qla2xxx: Unable to act on RSCN for port online
(bsc#1228850).</li>
<li>scsi: qla2xxx: Update version to 10.02.09.300-k
(bsc#1228850).</li>
<li>scsi: qla2xxx: Use QP lock to search for bsg
(bsc#1228850).</li>
<li>scsi: qla2xxx: validate nvme_local_port correctly
(bsc#1228850).</li>
<li>selftest/bpf: Add map_in_maps with BPF_MAP_TYPE_PERF_EVENT_ARRAY
values (git-fixes).</li>
<li>selftests/bpf: Add a test to verify previous stacksafe() fix
(bsc#1225903).</li>
<li>selftests/bpf: Add assert for user stacks in test_task_stack
(git-fixes).</li>
<li>selftests/bpf: Add netkit to tc_redirect selftest
(git-fixes).</li>
<li>selftests/bpf: De-veth-ize the tc_redirect test case
(git-fixes).</li>
<li>selftests/bpf: Disable IPv6 for lwt_redirect test
(git-fixes).</li>
<li>selftests/bpf: fix bpf_loop_bench for new callback verification
scheme (git-fixes).</li>
<li>selftests/bpf: fix compiler warnings in RELEASE=1 mode
(git-fixes).</li>
<li>selftests/bpf: Fix erroneous bitmask operation
(git-fixes).</li>
<li>selftests/bpf: Fix issues in setup_classid_environment()
(git-fixes).</li>
<li>selftests/bpf: Fix potential premature unload in bpf_testmod
(git-fixes).</li>
<li>selftests/bpf: Fix pyperf180 compilation failure with clang18
(git-fixes).</li>
<li>selftests/bpf: fix RELEASE=1 build for tc_opts
(git-fixes).</li>
<li>selftests/bpf: Fix the flaky tc_redirect_dtime test
(git-fixes).</li>
<li>selftests/bpf: Fix up xdp bonding test wrt feature flags
(git-fixes).</li>
<li>selftests/bpf: Make linked_list failure test more robust
(git-fixes).</li>
<li>selftests/bpf: Relax time_tai test for equal timestamps in
tai_forward (git-fixes).</li>
<li>selftests/bpf: satisfy compiler by having explicit return in btf test
(git-fixes).</li>
<li>selftests/bpf: Skip module_fentry_shadow test when bpf_testmod is not
available (git-fixes).</li>
<li>selftests/bpf: Wait for the netstamp_needed_key static key to be
turned on (git-fixes).</li>
<li>serial: core: check uartclk for zero to avoid divide by zero
(stable-fixes).</li>
<li>soc: qcom: cmd-db: Map shared memory as WC, not WB
(git-fixes).</li>
<li>soc: qcom: pmic_glink: Actually communicate when remote goes down
(git-fixes).</li>
<li>soundwire: stream: fix programming slave ports for non-continous port
maps (git-fixes).</li>
<li>spi: Add empty versions of ACPI functions (stable-fixes).</li>
<li>spi: microchip-core: fix init function not setting the master and
motorola modes (git-fixes).</li>
<li>spi: microchip-core: switch to use modern name
(stable-fixes).</li>
<li>spi: spi-fsl-lpspi: Fix scldiv calculation (git-fixes).</li>
<li>spi: spidev: Add missing spi_device_id for bh2228fv
(git-fixes).</li>
<li>Squashfs: fix variable overflow triggered by sysbot
(git-fixes).</li>
<li>squashfs: squashfs_read_data need to check if the length is 0
(git-fixes).</li>
<li>ssb: Fix division by zero issue in ssb_calc_clock_rate
(stable-fixes).</li>
<li>staging: iio: resolver: ad2s1210: fix use before initialization
(stable-fixes).</li>
<li>staging: ks7010: disable bh on tx_dev_lock (stable-fixes).</li>
<li>string.h: Introduce memtostr() and memtostr_pad()
(bsc#1228849).</li>
<li>SUNRPC: add a missing rpc_stat for TCP TLS (git-fixes).</li>
<li>sunrpc: add a struct rpc_stats arg to rpc_create_args
(git-fixes).</li>
<li>SUNRPC: Fix a race to wake a sync task (git-fixes).</li>
<li>swiotlb: do not set total_used to 0 in swiotlb_create_debugfs_files()
(git-fixes).</li>
<li>swiotlb: fix swiotlb_bounce() to do partial sync&#x27;s correctly
(git-fixes).</li>
<li>syscalls: fix compat_sys_io_pgetevents_time64 usage
(git-fixes).</li>
<li>thermal: bcm2835: Convert to platform remove callback returning void
(stable-fixes).</li>
<li>thermal/drivers/broadcom: Fix race between removal and clock disable
(git-fixes).</li>
<li>thunderbolt: Mark XDomain as unplugged when router is removed
(stable-fixes).</li>
<li>tools/perf: Fix perf bench epoll to enable the run when some
CPU&#x27;s are offline (bsc#1227747).</li>
<li>tools/perf: Fix perf bench futex to enable the run when some
CPU&#x27;s are offline (bsc#1227747).</li>
<li>tools/perf: Fix timing issue with parallel threads in perf bench
wake-up-parallel (bsc#1227747).</li>
<li>tools/resolve_btfids: fix build with musl libc
(git-fixes).</li>
<li>tools/resolve_btfids: Fix comparison of distinct pointer types
warning in resolve_btfids (git-fixes).</li>
<li>tools/resolve_btfids: Fix cross-compilation to non-host endianness
(git-fixes).</li>
<li>tools/resolve_btfids: Refactor set sorting with types from btf_ids.h
(git-fixes).</li>
<li>trace/pid_list: Change gfp flags in pid_list_fill_irq()
(git-fixes).</li>
<li>tracing: Return from tracing_buffers_read() if the file has been
closed (bsc#1229136 git-fixes).</li>
<li>tty: atmel_serial: use the correct RTS flag (git-fixes).</li>
<li>tty: serial: fsl_lpuart: mark last busy before uart_add_one_port
(git-fixes).</li>
<li>usb: cdnsp: fix for Link TRB with TC (git-fixes).</li>
<li>usb: cdnsp: fix incorrect index in cdnsp_get_hw_deq function
(git-fixes).</li>
<li>usb: core: sysfs: Unmerge @usb3_hardware_lpm_attr_group in
remove_power_attributes() (git-fixes).</li>
<li>usb: dwc3: core: Skip setting event buffers for host only controllers
(stable-fixes).</li>
<li>usb: dwc3: omap: add missing depopulate in probe error path
(git-fixes).</li>
<li>usb: dwc3: st: add missing depopulate in probe error path
(git-fixes).</li>
<li>usb: dwc3: st: fix probed platform device ref count on probe error
path (git-fixes).</li>
<li>usb: gadget: core: Check for unset descriptor (git-fixes).</li>
<li>usb: gadget: fsl: Increase size of name buffer for endpoints
(stable-fixes).</li>
<li>usb: gadget: u_audio: Check return codes from usb_ep_enable and
config_ep_by_speed (git-fixes).</li>
<li>usb: gadget: u_serial: Set start_delayed during suspend
(git-fixes).</li>
<li>usb: gadget: uvc: cleanup request when not in correct state
(stable-fixes).</li>
<li>USB: serial: debug: do not echo input by default
(stable-fixes).</li>
<li>usb: typec: fsa4480: add support for Audio Accessory Mode
(git-fixes).</li>
<li>usb: typec: fsa4480: Add support to swap SBU orientation
(git-fixes).</li>
<li>usb: typec: fsa4480: Check if the chip is really there
(git-fixes).</li>
<li>usb: typec: fsa4480: Relax CHIP_ID check (git-fixes).</li>
<li>usb: typec: fsa4480: rework mux &amp; switch setup to handle more
states (git-fixes).</li>
<li>usb: vhci-hcd: Do not drop references before new references are
gained (stable-fixes).</li>
<li>vfio/pci: fix potential memory leak in vfio_intx_enable()
(git-fixes).</li>
<li>vhost-scsi: Handle vhost_vq_work_queue failures for events
(git-fixes).</li>
<li>vhost-vdpa: switch to use vmf_insert_pfn() in the fault handler
(git-fixes).</li>
<li>vhost: Release worker mutex during flushes (git-fixes).</li>
<li>vhost: Use virtqueue mutex for swapping worker
(git-fixes).</li>
<li>vhost/vsock: always initialize seqpacket_allow
(git-fixes).</li>
<li>virt: guest_memfd: fix reference leak on hwpoisoned page
(git-fixes).</li>
<li>virtio_net: use u64_stats_t infra to avoid data-races
(git-fixes).</li>
<li>virtio-crypto: handle config changed by work queue
(git-fixes).</li>
<li>virtio: reenable config if freezing device failed
(git-fixes).</li>
<li>virtiofs: forbid newlines in tags (bsc#1229940).</li>
<li>wifi: ath12k: fix memory leak in ath12k_dp_rx_peer_frag_setup()
(stable-fixes).</li>
<li>wifi: ath12k: fix soft lockup on suspend (git-fixes).</li>
<li>wifi: brcmfmac: cfg80211: Handle SSID based pmksa deletion
(git-fixes).</li>
<li>wifi: cfg80211: fix reporting failed MLO links status with
cfg80211_connect_done (git-fixes).</li>
<li>wifi: iwlwifi: fw: fix wgds rev 3 exact size (git-fixes).</li>
<li>wifi: mac80211: use monitor sdata with driver only if desired
(git-fixes).</li>
<li>wifi: mwifiex: duplicate static structs used in driver instances
(git-fixes).</li>
<li>wifi: nl80211: disallow setting special AP channel widths
(stable-fixes).</li>
<li>wifi: nl80211: do not give key data to userspace
(stable-fixes).</li>
<li>wifi: rtw88: usb: Fix disconnection after beacon loss
(stable-fixes).</li>
<li>wifi: wfx: repair open network AP mode (git-fixes).</li>
<li>workqueue: Improve scalability of workqueue watchdog touch
(bsc#1193454).</li>
<li>workqueue: wq_watchdog_touch is always called with valid CPU
(bsc#1193454).</li>
<li>x86/asm: Use %c/%n instead of %P operand modifier in asm templates
(git-fixes).</li>
<li>x86/entry/64: Remove obsolete comment on tracing vs. SYSRET
(git-fixes).</li>
<li>x86/mm: Fix pti_clone_entry_text() for i386 (git-fixes).</li>
<li>x86/mm: Fix pti_clone_pgtable() alignment assumption
(git-fixes).</li>
<li>x86/mtrr: Check if fixed MTRRs exist before saving them
(git-fixes).</li>
<li>x86/numa: Fix SRAT lookup of CFMWS ranges with numa_fill_memblks()
(git-fixes).</li>
<li>x86/numa: Fix the address overlap check in numa_fill_memblks()
(git-fixes).</li>
<li>x86/numa: Fix the sort compare func used in numa_fill_memblks()
(git-fixes).</li>
<li>x86/numa: Introduce numa_fill_memblks() (git-fixes).</li>
<li>x86/pci: Skip early E820 check for ECAM region
(git-fixes).</li>
<li>x86/xen: Convert comma to semicolon (git-fixes).</li>
<li>xfs: allow cross-linking special files without project quota
(git-fixes).</li>
<li>xfs: allow symlinks with short remote targets
(bsc#1229160).</li>
<li>xfs: allow unlinked symlinks and dirs with zero size
(git-fixes).</li>
<li>xfs: attr forks require attr, not attr2 (git-fixes).</li>
<li>xfs: convert comma to semicolon (git-fixes).</li>
<li>xfs: do not use current-&gt;journal_info (git-fixes).</li>
<li>xfs: Fix missing interval for missing_owner in xfs fsmap
(git-fixes).</li>
<li>xfs: Fix the owner setting issue for rmap query in xfs fsmap
(git-fixes).</li>
<li>xfs: fix unlink vs cluster buffer instantiation race
(git-fixes).</li>
<li>xfs: honor init_xattrs in xfs_init_new_inode for !ATTR fs
(git-fixes).</li>
<li>xfs: journal geometry is not properly bounds checked
(git-fixes).</li>
<li>xfs: match lock mode in xfs_buffered_write_iomap_begin()
(git-fixes).</li>
<li>xfs: require XFS_SB_FEAT_INCOMPAT_LOG_XATTRS for attr log intent item
recovery (git-fixes).</li>
<li>xfs: upgrade the extent counters in xfs_reflink_end_cow_extent later
(git-fixes).</li>
<li>xfs: use consistent uid/gid when grabbing dquots for inodes
(git-fixes).</li>
<li>xfs: use XFS_BUF_DADDR_NULL for daddrs in getfsmap code
(git-fixes).</li>
<li>xhci: Fix Panther point NULL pointer deref at full-speed
re-enumeration (git-fixes).</li>
<li>xprtrdma: Fix rpcrdma_reqs_reset() (git-fixes).</li>
</ul>




<h2>Special Instructions and Notes:</h2>
<ul>


<li>Please reboot the system after installing this
update.</li>


</ul>


<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
openSUSE Leap 15.6


<br/>
<code>zypper in -t patch
openSUSE-SLE-15.6-2024-3195=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Live Patching 15-SP6


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Live-Patching-15-SP6-2024-3195=1</code>



</li>

<li class="list-group-item">
SUSE Real Time Module 15-SP6


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-RT-15-SP6-2024-3195=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
openSUSE Leap 15.6 (x86_64)
<ul>


<li>kernel-rt_debug-vdso-6.4.0-150600.10.8.3</li>


<li>kernel-rt-livepatch-devel-6.4.0-150600.10.8.3</li>


<li>kernel-rt-devel-6.4.0-150600.10.8.3</li>


<li>kselftests-kmp-rt-6.4.0-150600.10.8.3</li>


<li>ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.8.3</li>


<li>kernel-rt_debug-livepatch-devel-6.4.0-150600.10.8.3</li>


<li>kernel-rt-extra-6.4.0-150600.10.8.3</li>


<li>gfs2-kmp-rt-6.4.0-150600.10.8.3</li>


<li>kernel-rt_debug-debugsource-6.4.0-150600.10.8.3</li>


<li>kernel-rt-vdso-debuginfo-6.4.0-150600.10.8.3</li>


<li>kernel-rt-debuginfo-6.4.0-150600.10.8.3</li>

<li>dlm-kmp-rt-6.4.0-150600.10.8.3</li>


<li>kernel-rt-debugsource-6.4.0-150600.10.8.3</li>


<li>dlm-kmp-rt-debuginfo-6.4.0-150600.10.8.3</li>


<li>ocfs2-kmp-rt-6.4.0-150600.10.8.3</li>


<li>cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.8.3</li>


<li>kernel-rt-optional-6.4.0-150600.10.8.3</li>


<li>kernel-rt_debug-vdso-debuginfo-6.4.0-150600.10.8.3</li>


<li>kernel-syms-rt-6.4.0-150600.10.8.1</li>


<li>kernel-rt-vdso-6.4.0-150600.10.8.3</li>


<li>kernel-rt_debug-debuginfo-6.4.0-150600.10.8.3</li>


<li>cluster-md-kmp-rt-6.4.0-150600.10.8.3</li>


<li>kernel-rt-optional-debuginfo-6.4.0-150600.10.8.3</li>


<li>gfs2-kmp-rt-debuginfo-6.4.0-150600.10.8.3</li>


<li>kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.8.3</li>


<li>reiserfs-kmp-rt-debuginfo-6.4.0-150600.10.8.3</li>


<li>kernel-rt-devel-debuginfo-6.4.0-150600.10.8.3</li>


<li>kernel-rt_debug-devel-6.4.0-150600.10.8.3</li>


<li>reiserfs-kmp-rt-6.4.0-150600.10.8.3</li>


<li>kernel-rt-extra-debuginfo-6.4.0-150600.10.8.3</li>


<li>kselftests-kmp-rt-debuginfo-6.4.0-150600.10.8.3</li>

</ul>
</li>

<li>
openSUSE Leap 15.6 (noarch)
<ul>


<li>kernel-devel-rt-6.4.0-150600.10.8.3</li>


<li>kernel-source-rt-6.4.0-150600.10.8.3</li>

</ul>
</li>

<li>
openSUSE Leap 15.6 (nosrc x86_64)
<ul>

<li>kernel-rt-6.4.0-150600.10.8.3</li>


<li>kernel-rt_debug-6.4.0-150600.10.8.3</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Live Patching 15-SP6 (x86_64)
<ul>


<li>kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource-1-150600.1.3.2</li>


<li>kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo-1-150600.1.3.2</li>


<li>kernel-livepatch-6_4_0-150600_10_8-rt-1-150600.1.3.2</li>

</ul>
</li>



<li>
SUSE Real Time Module 15-SP6 (x86_64)
<ul>


<li>cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.8.3</li>


<li>gfs2-kmp-rt-debuginfo-6.4.0-150600.10.8.3</li>


<li>kernel-rt-debuginfo-6.4.0-150600.10.8.3</li>


<li>kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.8.3</li>


<li>kernel-syms-rt-6.4.0-150600.10.8.1</li>


<li>kernel-rt-devel-debuginfo-6.4.0-150600.10.8.3</li>


<li>gfs2-kmp-rt-6.4.0-150600.10.8.3</li>


<li>kernel-rt-devel-6.4.0-150600.10.8.3</li>


<li>kernel-rt_debug-debuginfo-6.4.0-150600.10.8.3</li>


<li>kernel-rt_debug-devel-6.4.0-150600.10.8.3</li>


<li>cluster-md-kmp-rt-6.4.0-150600.10.8.3</li>


<li>kernel-rt_debug-debugsource-6.4.0-150600.10.8.3</li>


<li>ocfs2-kmp-rt-6.4.0-150600.10.8.3</li>

<li>dlm-kmp-rt-6.4.0-150600.10.8.3</li>


<li>kernel-rt-debugsource-6.4.0-150600.10.8.3</li>


<li>dlm-kmp-rt-debuginfo-6.4.0-150600.10.8.3</li>


<li>ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.8.3</li>

</ul>
</li>

<li>
SUSE Real Time Module 15-SP6 (noarch)
<ul>


<li>kernel-devel-rt-6.4.0-150600.10.8.3</li>


<li>kernel-source-rt-6.4.0-150600.10.8.3</li>

</ul>
</li>

<li>
SUSE Real Time Module 15-SP6 (nosrc x86_64)
<ul>

<li>kernel-rt-6.4.0-150600.10.8.3</li>


<li>kernel-rt_debug-6.4.0-150600.10.8.3</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52489.html">https://www.suse.com/security/cve/CVE-2023-52489.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52581.html">https://www.suse.com/security/cve/CVE-2023-52581.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52668.html">https://www.suse.com/security/cve/CVE-2023-52668.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52688.html">https://www.suse.com/security/cve/CVE-2023-52688.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52756.html">https://www.suse.com/security/cve/CVE-2023-52756.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52766.html">https://www.suse.com/security/cve/CVE-2023-52766.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52800.html">https://www.suse.com/security/cve/CVE-2023-52800.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52802.html">https://www.suse.com/security/cve/CVE-2023-52802.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52859.html">https://www.suse.com/security/cve/CVE-2023-52859.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52885.html">https://www.suse.com/security/cve/CVE-2023-52885.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52886.html">https://www.suse.com/security/cve/CVE-2023-52886.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52887.html">https://www.suse.com/security/cve/CVE-2023-52887.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52889.html">https://www.suse.com/security/cve/CVE-2023-52889.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26590.html">https://www.suse.com/security/cve/CVE-2024-26590.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26631.html">https://www.suse.com/security/cve/CVE-2024-26631.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26637.html">https://www.suse.com/security/cve/CVE-2024-26637.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26668.html">https://www.suse.com/security/cve/CVE-2024-26668.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26669.html">https://www.suse.com/security/cve/CVE-2024-26669.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26677.html">https://www.suse.com/security/cve/CVE-2024-26677.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26682.html">https://www.suse.com/security/cve/CVE-2024-26682.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26683.html">https://www.suse.com/security/cve/CVE-2024-26683.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26735.html">https://www.suse.com/security/cve/CVE-2024-26735.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26758.html">https://www.suse.com/security/cve/CVE-2024-26758.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26767.html">https://www.suse.com/security/cve/CVE-2024-26767.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26808.html">https://www.suse.com/security/cve/CVE-2024-26808.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26809.html">https://www.suse.com/security/cve/CVE-2024-26809.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26812.html">https://www.suse.com/security/cve/CVE-2024-26812.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26835.html">https://www.suse.com/security/cve/CVE-2024-26835.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26837.html">https://www.suse.com/security/cve/CVE-2024-26837.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26849.html">https://www.suse.com/security/cve/CVE-2024-26849.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26851.html">https://www.suse.com/security/cve/CVE-2024-26851.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26889.html">https://www.suse.com/security/cve/CVE-2024-26889.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26920.html">https://www.suse.com/security/cve/CVE-2024-26920.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26976.html">https://www.suse.com/security/cve/CVE-2024-26976.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27010.html">https://www.suse.com/security/cve/CVE-2024-27010.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27011.html">https://www.suse.com/security/cve/CVE-2024-27011.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27024.html">https://www.suse.com/security/cve/CVE-2024-27024.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27049.html">https://www.suse.com/security/cve/CVE-2024-27049.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27050.html">https://www.suse.com/security/cve/CVE-2024-27050.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27079.html">https://www.suse.com/security/cve/CVE-2024-27079.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27403.html">https://www.suse.com/security/cve/CVE-2024-27403.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27433.html">https://www.suse.com/security/cve/CVE-2024-27433.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27437.html">https://www.suse.com/security/cve/CVE-2024-27437.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-31076.html">https://www.suse.com/security/cve/CVE-2024-31076.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35855.html">https://www.suse.com/security/cve/CVE-2024-35855.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35897.html">https://www.suse.com/security/cve/CVE-2024-35897.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35902.html">https://www.suse.com/security/cve/CVE-2024-35902.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35913.html">https://www.suse.com/security/cve/CVE-2024-35913.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35939.html">https://www.suse.com/security/cve/CVE-2024-35939.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35949.html">https://www.suse.com/security/cve/CVE-2024-35949.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36270.html">https://www.suse.com/security/cve/CVE-2024-36270.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36286.html">https://www.suse.com/security/cve/CVE-2024-36286.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36288.html">https://www.suse.com/security/cve/CVE-2024-36288.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36489.html">https://www.suse.com/security/cve/CVE-2024-36489.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36881.html">https://www.suse.com/security/cve/CVE-2024-36881.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36907.html">https://www.suse.com/security/cve/CVE-2024-36907.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36929.html">https://www.suse.com/security/cve/CVE-2024-36929.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36933.html">https://www.suse.com/security/cve/CVE-2024-36933.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36939.html">https://www.suse.com/security/cve/CVE-2024-36939.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36970.html">https://www.suse.com/security/cve/CVE-2024-36970.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36979.html">https://www.suse.com/security/cve/CVE-2024-36979.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38548.html">https://www.suse.com/security/cve/CVE-2024-38548.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38563.html">https://www.suse.com/security/cve/CVE-2024-38563.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38609.html">https://www.suse.com/security/cve/CVE-2024-38609.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38662.html">https://www.suse.com/security/cve/CVE-2024-38662.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39476.html">https://www.suse.com/security/cve/CVE-2024-39476.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39483.html">https://www.suse.com/security/cve/CVE-2024-39483.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39484.html">https://www.suse.com/security/cve/CVE-2024-39484.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39486.html">https://www.suse.com/security/cve/CVE-2024-39486.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39488.html">https://www.suse.com/security/cve/CVE-2024-39488.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39489.html">https://www.suse.com/security/cve/CVE-2024-39489.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39491.html">https://www.suse.com/security/cve/CVE-2024-39491.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39493.html">https://www.suse.com/security/cve/CVE-2024-39493.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39497.html">https://www.suse.com/security/cve/CVE-2024-39497.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39499.html">https://www.suse.com/security/cve/CVE-2024-39499.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39500.html">https://www.suse.com/security/cve/CVE-2024-39500.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39501.html">https://www.suse.com/security/cve/CVE-2024-39501.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39505.html">https://www.suse.com/security/cve/CVE-2024-39505.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39506.html">https://www.suse.com/security/cve/CVE-2024-39506.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39508.html">https://www.suse.com/security/cve/CVE-2024-39508.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39509.html">https://www.suse.com/security/cve/CVE-2024-39509.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39510.html">https://www.suse.com/security/cve/CVE-2024-39510.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40899.html">https://www.suse.com/security/cve/CVE-2024-40899.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40900.html">https://www.suse.com/security/cve/CVE-2024-40900.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40902.html">https://www.suse.com/security/cve/CVE-2024-40902.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40903.html">https://www.suse.com/security/cve/CVE-2024-40903.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40904.html">https://www.suse.com/security/cve/CVE-2024-40904.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40905.html">https://www.suse.com/security/cve/CVE-2024-40905.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40909.html">https://www.suse.com/security/cve/CVE-2024-40909.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40910.html">https://www.suse.com/security/cve/CVE-2024-40910.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40911.html">https://www.suse.com/security/cve/CVE-2024-40911.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40912.html">https://www.suse.com/security/cve/CVE-2024-40912.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40913.html">https://www.suse.com/security/cve/CVE-2024-40913.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40916.html">https://www.suse.com/security/cve/CVE-2024-40916.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40920.html">https://www.suse.com/security/cve/CVE-2024-40920.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40921.html">https://www.suse.com/security/cve/CVE-2024-40921.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40922.html">https://www.suse.com/security/cve/CVE-2024-40922.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40924.html">https://www.suse.com/security/cve/CVE-2024-40924.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40926.html">https://www.suse.com/security/cve/CVE-2024-40926.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40927.html">https://www.suse.com/security/cve/CVE-2024-40927.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40929.html">https://www.suse.com/security/cve/CVE-2024-40929.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40930.html">https://www.suse.com/security/cve/CVE-2024-40930.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40932.html">https://www.suse.com/security/cve/CVE-2024-40932.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40934.html">https://www.suse.com/security/cve/CVE-2024-40934.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40936.html">https://www.suse.com/security/cve/CVE-2024-40936.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40938.html">https://www.suse.com/security/cve/CVE-2024-40938.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40939.html">https://www.suse.com/security/cve/CVE-2024-40939.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40941.html">https://www.suse.com/security/cve/CVE-2024-40941.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40942.html">https://www.suse.com/security/cve/CVE-2024-40942.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40943.html">https://www.suse.com/security/cve/CVE-2024-40943.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40944.html">https://www.suse.com/security/cve/CVE-2024-40944.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40945.html">https://www.suse.com/security/cve/CVE-2024-40945.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40954.html">https://www.suse.com/security/cve/CVE-2024-40954.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40956.html">https://www.suse.com/security/cve/CVE-2024-40956.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40957.html">https://www.suse.com/security/cve/CVE-2024-40957.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40958.html">https://www.suse.com/security/cve/CVE-2024-40958.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40959.html">https://www.suse.com/security/cve/CVE-2024-40959.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40962.html">https://www.suse.com/security/cve/CVE-2024-40962.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40964.html">https://www.suse.com/security/cve/CVE-2024-40964.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40967.html">https://www.suse.com/security/cve/CVE-2024-40967.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40976.html">https://www.suse.com/security/cve/CVE-2024-40976.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40977.html">https://www.suse.com/security/cve/CVE-2024-40977.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40978.html">https://www.suse.com/security/cve/CVE-2024-40978.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40981.html">https://www.suse.com/security/cve/CVE-2024-40981.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40982.html">https://www.suse.com/security/cve/CVE-2024-40982.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40984.html">https://www.suse.com/security/cve/CVE-2024-40984.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40987.html">https://www.suse.com/security/cve/CVE-2024-40987.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40988.html">https://www.suse.com/security/cve/CVE-2024-40988.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40989.html">https://www.suse.com/security/cve/CVE-2024-40989.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40990.html">https://www.suse.com/security/cve/CVE-2024-40990.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40992.html">https://www.suse.com/security/cve/CVE-2024-40992.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40994.html">https://www.suse.com/security/cve/CVE-2024-40994.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40995.html">https://www.suse.com/security/cve/CVE-2024-40995.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40997.html">https://www.suse.com/security/cve/CVE-2024-40997.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41000.html">https://www.suse.com/security/cve/CVE-2024-41000.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41001.html">https://www.suse.com/security/cve/CVE-2024-41001.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41002.html">https://www.suse.com/security/cve/CVE-2024-41002.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41004.html">https://www.suse.com/security/cve/CVE-2024-41004.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41007.html">https://www.suse.com/security/cve/CVE-2024-41007.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41009.html">https://www.suse.com/security/cve/CVE-2024-41009.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41010.html">https://www.suse.com/security/cve/CVE-2024-41010.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41011.html">https://www.suse.com/security/cve/CVE-2024-41011.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41012.html">https://www.suse.com/security/cve/CVE-2024-41012.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41015.html">https://www.suse.com/security/cve/CVE-2024-41015.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41016.html">https://www.suse.com/security/cve/CVE-2024-41016.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41020.html">https://www.suse.com/security/cve/CVE-2024-41020.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41022.html">https://www.suse.com/security/cve/CVE-2024-41022.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41024.html">https://www.suse.com/security/cve/CVE-2024-41024.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41025.html">https://www.suse.com/security/cve/CVE-2024-41025.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41028.html">https://www.suse.com/security/cve/CVE-2024-41028.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41032.html">https://www.suse.com/security/cve/CVE-2024-41032.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41035.html">https://www.suse.com/security/cve/CVE-2024-41035.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41036.html">https://www.suse.com/security/cve/CVE-2024-41036.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41037.html">https://www.suse.com/security/cve/CVE-2024-41037.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41038.html">https://www.suse.com/security/cve/CVE-2024-41038.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41039.html">https://www.suse.com/security/cve/CVE-2024-41039.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41040.html">https://www.suse.com/security/cve/CVE-2024-41040.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41041.html">https://www.suse.com/security/cve/CVE-2024-41041.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41044.html">https://www.suse.com/security/cve/CVE-2024-41044.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41045.html">https://www.suse.com/security/cve/CVE-2024-41045.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41048.html">https://www.suse.com/security/cve/CVE-2024-41048.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41049.html">https://www.suse.com/security/cve/CVE-2024-41049.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41050.html">https://www.suse.com/security/cve/CVE-2024-41050.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41051.html">https://www.suse.com/security/cve/CVE-2024-41051.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41056.html">https://www.suse.com/security/cve/CVE-2024-41056.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41057.html">https://www.suse.com/security/cve/CVE-2024-41057.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41058.html">https://www.suse.com/security/cve/CVE-2024-41058.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41059.html">https://www.suse.com/security/cve/CVE-2024-41059.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41060.html">https://www.suse.com/security/cve/CVE-2024-41060.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41061.html">https://www.suse.com/security/cve/CVE-2024-41061.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41062.html">https://www.suse.com/security/cve/CVE-2024-41062.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41063.html">https://www.suse.com/security/cve/CVE-2024-41063.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41064.html">https://www.suse.com/security/cve/CVE-2024-41064.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41065.html">https://www.suse.com/security/cve/CVE-2024-41065.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41066.html">https://www.suse.com/security/cve/CVE-2024-41066.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41068.html">https://www.suse.com/security/cve/CVE-2024-41068.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41069.html">https://www.suse.com/security/cve/CVE-2024-41069.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41070.html">https://www.suse.com/security/cve/CVE-2024-41070.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41071.html">https://www.suse.com/security/cve/CVE-2024-41071.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41072.html">https://www.suse.com/security/cve/CVE-2024-41072.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41073.html">https://www.suse.com/security/cve/CVE-2024-41073.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41074.html">https://www.suse.com/security/cve/CVE-2024-41074.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41075.html">https://www.suse.com/security/cve/CVE-2024-41075.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41076.html">https://www.suse.com/security/cve/CVE-2024-41076.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41078.html">https://www.suse.com/security/cve/CVE-2024-41078.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41079.html">https://www.suse.com/security/cve/CVE-2024-41079.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41080.html">https://www.suse.com/security/cve/CVE-2024-41080.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41081.html">https://www.suse.com/security/cve/CVE-2024-41081.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41084.html">https://www.suse.com/security/cve/CVE-2024-41084.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41087.html">https://www.suse.com/security/cve/CVE-2024-41087.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41088.html">https://www.suse.com/security/cve/CVE-2024-41088.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41089.html">https://www.suse.com/security/cve/CVE-2024-41089.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41092.html">https://www.suse.com/security/cve/CVE-2024-41092.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41093.html">https://www.suse.com/security/cve/CVE-2024-41093.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41094.html">https://www.suse.com/security/cve/CVE-2024-41094.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41095.html">https://www.suse.com/security/cve/CVE-2024-41095.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41096.html">https://www.suse.com/security/cve/CVE-2024-41096.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41097.html">https://www.suse.com/security/cve/CVE-2024-41097.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41098.html">https://www.suse.com/security/cve/CVE-2024-41098.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42064.html">https://www.suse.com/security/cve/CVE-2024-42064.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42069.html">https://www.suse.com/security/cve/CVE-2024-42069.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42070.html">https://www.suse.com/security/cve/CVE-2024-42070.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42073.html">https://www.suse.com/security/cve/CVE-2024-42073.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42074.html">https://www.suse.com/security/cve/CVE-2024-42074.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42076.html">https://www.suse.com/security/cve/CVE-2024-42076.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42077.html">https://www.suse.com/security/cve/CVE-2024-42077.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42079.html">https://www.suse.com/security/cve/CVE-2024-42079.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42080.html">https://www.suse.com/security/cve/CVE-2024-42080.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42082.html">https://www.suse.com/security/cve/CVE-2024-42082.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42085.html">https://www.suse.com/security/cve/CVE-2024-42085.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42086.html">https://www.suse.com/security/cve/CVE-2024-42086.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42087.html">https://www.suse.com/security/cve/CVE-2024-42087.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42089.html">https://www.suse.com/security/cve/CVE-2024-42089.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42090.html">https://www.suse.com/security/cve/CVE-2024-42090.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42092.html">https://www.suse.com/security/cve/CVE-2024-42092.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42093.html">https://www.suse.com/security/cve/CVE-2024-42093.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42095.html">https://www.suse.com/security/cve/CVE-2024-42095.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42096.html">https://www.suse.com/security/cve/CVE-2024-42096.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42097.html">https://www.suse.com/security/cve/CVE-2024-42097.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42098.html">https://www.suse.com/security/cve/CVE-2024-42098.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42101.html">https://www.suse.com/security/cve/CVE-2024-42101.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42104.html">https://www.suse.com/security/cve/CVE-2024-42104.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42105.html">https://www.suse.com/security/cve/CVE-2024-42105.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42106.html">https://www.suse.com/security/cve/CVE-2024-42106.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42107.html">https://www.suse.com/security/cve/CVE-2024-42107.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42109.html">https://www.suse.com/security/cve/CVE-2024-42109.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42110.html">https://www.suse.com/security/cve/CVE-2024-42110.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42113.html">https://www.suse.com/security/cve/CVE-2024-42113.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42114.html">https://www.suse.com/security/cve/CVE-2024-42114.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42115.html">https://www.suse.com/security/cve/CVE-2024-42115.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42117.html">https://www.suse.com/security/cve/CVE-2024-42117.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42119.html">https://www.suse.com/security/cve/CVE-2024-42119.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42120.html">https://www.suse.com/security/cve/CVE-2024-42120.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42121.html">https://www.suse.com/security/cve/CVE-2024-42121.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42122.html">https://www.suse.com/security/cve/CVE-2024-42122.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42124.html">https://www.suse.com/security/cve/CVE-2024-42124.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42125.html">https://www.suse.com/security/cve/CVE-2024-42125.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42126.html">https://www.suse.com/security/cve/CVE-2024-42126.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42127.html">https://www.suse.com/security/cve/CVE-2024-42127.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42130.html">https://www.suse.com/security/cve/CVE-2024-42130.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42131.html">https://www.suse.com/security/cve/CVE-2024-42131.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42132.html">https://www.suse.com/security/cve/CVE-2024-42132.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42133.html">https://www.suse.com/security/cve/CVE-2024-42133.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42136.html">https://www.suse.com/security/cve/CVE-2024-42136.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42137.html">https://www.suse.com/security/cve/CVE-2024-42137.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42138.html">https://www.suse.com/security/cve/CVE-2024-42138.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42139.html">https://www.suse.com/security/cve/CVE-2024-42139.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42141.html">https://www.suse.com/security/cve/CVE-2024-42141.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42142.html">https://www.suse.com/security/cve/CVE-2024-42142.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42143.html">https://www.suse.com/security/cve/CVE-2024-42143.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42144.html">https://www.suse.com/security/cve/CVE-2024-42144.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42145.html">https://www.suse.com/security/cve/CVE-2024-42145.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42147.html">https://www.suse.com/security/cve/CVE-2024-42147.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42148.html">https://www.suse.com/security/cve/CVE-2024-42148.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42152.html">https://www.suse.com/security/cve/CVE-2024-42152.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42153.html">https://www.suse.com/security/cve/CVE-2024-42153.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42155.html">https://www.suse.com/security/cve/CVE-2024-42155.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42156.html">https://www.suse.com/security/cve/CVE-2024-42156.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42157.html">https://www.suse.com/security/cve/CVE-2024-42157.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42158.html">https://www.suse.com/security/cve/CVE-2024-42158.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42159.html">https://www.suse.com/security/cve/CVE-2024-42159.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42161.html">https://www.suse.com/security/cve/CVE-2024-42161.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42162.html">https://www.suse.com/security/cve/CVE-2024-42162.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42223.html">https://www.suse.com/security/cve/CVE-2024-42223.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42224.html">https://www.suse.com/security/cve/CVE-2024-42224.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42225.html">https://www.suse.com/security/cve/CVE-2024-42225.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42226.html">https://www.suse.com/security/cve/CVE-2024-42226.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42227.html">https://www.suse.com/security/cve/CVE-2024-42227.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42228.html">https://www.suse.com/security/cve/CVE-2024-42228.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42229.html">https://www.suse.com/security/cve/CVE-2024-42229.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42230.html">https://www.suse.com/security/cve/CVE-2024-42230.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42232.html">https://www.suse.com/security/cve/CVE-2024-42232.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42236.html">https://www.suse.com/security/cve/CVE-2024-42236.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42237.html">https://www.suse.com/security/cve/CVE-2024-42237.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42238.html">https://www.suse.com/security/cve/CVE-2024-42238.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42239.html">https://www.suse.com/security/cve/CVE-2024-42239.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42240.html">https://www.suse.com/security/cve/CVE-2024-42240.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42241.html">https://www.suse.com/security/cve/CVE-2024-42241.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42244.html">https://www.suse.com/security/cve/CVE-2024-42244.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42245.html">https://www.suse.com/security/cve/CVE-2024-42245.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42246.html">https://www.suse.com/security/cve/CVE-2024-42246.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42247.html">https://www.suse.com/security/cve/CVE-2024-42247.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42250.html">https://www.suse.com/security/cve/CVE-2024-42250.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42253.html">https://www.suse.com/security/cve/CVE-2024-42253.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42259.html">https://www.suse.com/security/cve/CVE-2024-42259.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42268.html">https://www.suse.com/security/cve/CVE-2024-42268.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42269.html">https://www.suse.com/security/cve/CVE-2024-42269.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42270.html">https://www.suse.com/security/cve/CVE-2024-42270.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42271.html">https://www.suse.com/security/cve/CVE-2024-42271.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42274.html">https://www.suse.com/security/cve/CVE-2024-42274.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42276.html">https://www.suse.com/security/cve/CVE-2024-42276.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42277.html">https://www.suse.com/security/cve/CVE-2024-42277.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42278.html">https://www.suse.com/security/cve/CVE-2024-42278.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42279.html">https://www.suse.com/security/cve/CVE-2024-42279.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42280.html">https://www.suse.com/security/cve/CVE-2024-42280.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42281.html">https://www.suse.com/security/cve/CVE-2024-42281.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42283.html">https://www.suse.com/security/cve/CVE-2024-42283.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42284.html">https://www.suse.com/security/cve/CVE-2024-42284.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42285.html">https://www.suse.com/security/cve/CVE-2024-42285.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42286.html">https://www.suse.com/security/cve/CVE-2024-42286.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42287.html">https://www.suse.com/security/cve/CVE-2024-42287.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42288.html">https://www.suse.com/security/cve/CVE-2024-42288.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42289.html">https://www.suse.com/security/cve/CVE-2024-42289.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42290.html">https://www.suse.com/security/cve/CVE-2024-42290.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42291.html">https://www.suse.com/security/cve/CVE-2024-42291.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42292.html">https://www.suse.com/security/cve/CVE-2024-42292.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42295.html">https://www.suse.com/security/cve/CVE-2024-42295.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42298.html">https://www.suse.com/security/cve/CVE-2024-42298.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42301.html">https://www.suse.com/security/cve/CVE-2024-42301.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42302.html">https://www.suse.com/security/cve/CVE-2024-42302.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42303.html">https://www.suse.com/security/cve/CVE-2024-42303.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42308.html">https://www.suse.com/security/cve/CVE-2024-42308.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42309.html">https://www.suse.com/security/cve/CVE-2024-42309.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42310.html">https://www.suse.com/security/cve/CVE-2024-42310.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42311.html">https://www.suse.com/security/cve/CVE-2024-42311.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42312.html">https://www.suse.com/security/cve/CVE-2024-42312.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42313.html">https://www.suse.com/security/cve/CVE-2024-42313.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42314.html">https://www.suse.com/security/cve/CVE-2024-42314.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42315.html">https://www.suse.com/security/cve/CVE-2024-42315.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42316.html">https://www.suse.com/security/cve/CVE-2024-42316.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42318.html">https://www.suse.com/security/cve/CVE-2024-42318.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42319.html">https://www.suse.com/security/cve/CVE-2024-42319.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42320.html">https://www.suse.com/security/cve/CVE-2024-42320.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42322.html">https://www.suse.com/security/cve/CVE-2024-42322.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43816.html">https://www.suse.com/security/cve/CVE-2024-43816.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43817.html">https://www.suse.com/security/cve/CVE-2024-43817.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43818.html">https://www.suse.com/security/cve/CVE-2024-43818.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43819.html">https://www.suse.com/security/cve/CVE-2024-43819.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43821.html">https://www.suse.com/security/cve/CVE-2024-43821.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43823.html">https://www.suse.com/security/cve/CVE-2024-43823.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43824.html">https://www.suse.com/security/cve/CVE-2024-43824.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43825.html">https://www.suse.com/security/cve/CVE-2024-43825.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43826.html">https://www.suse.com/security/cve/CVE-2024-43826.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43829.html">https://www.suse.com/security/cve/CVE-2024-43829.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43830.html">https://www.suse.com/security/cve/CVE-2024-43830.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43831.html">https://www.suse.com/security/cve/CVE-2024-43831.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43833.html">https://www.suse.com/security/cve/CVE-2024-43833.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43834.html">https://www.suse.com/security/cve/CVE-2024-43834.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43837.html">https://www.suse.com/security/cve/CVE-2024-43837.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43839.html">https://www.suse.com/security/cve/CVE-2024-43839.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43840.html">https://www.suse.com/security/cve/CVE-2024-43840.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43841.html">https://www.suse.com/security/cve/CVE-2024-43841.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43842.html">https://www.suse.com/security/cve/CVE-2024-43842.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43846.html">https://www.suse.com/security/cve/CVE-2024-43846.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43847.html">https://www.suse.com/security/cve/CVE-2024-43847.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43849.html">https://www.suse.com/security/cve/CVE-2024-43849.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43850.html">https://www.suse.com/security/cve/CVE-2024-43850.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43851.html">https://www.suse.com/security/cve/CVE-2024-43851.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43853.html">https://www.suse.com/security/cve/CVE-2024-43853.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43854.html">https://www.suse.com/security/cve/CVE-2024-43854.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43855.html">https://www.suse.com/security/cve/CVE-2024-43855.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43856.html">https://www.suse.com/security/cve/CVE-2024-43856.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43858.html">https://www.suse.com/security/cve/CVE-2024-43858.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43860.html">https://www.suse.com/security/cve/CVE-2024-43860.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43861.html">https://www.suse.com/security/cve/CVE-2024-43861.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43863.html">https://www.suse.com/security/cve/CVE-2024-43863.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43864.html">https://www.suse.com/security/cve/CVE-2024-43864.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43866.html">https://www.suse.com/security/cve/CVE-2024-43866.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43867.html">https://www.suse.com/security/cve/CVE-2024-43867.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43871.html">https://www.suse.com/security/cve/CVE-2024-43871.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43872.html">https://www.suse.com/security/cve/CVE-2024-43872.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43873.html">https://www.suse.com/security/cve/CVE-2024-43873.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43874.html">https://www.suse.com/security/cve/CVE-2024-43874.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43875.html">https://www.suse.com/security/cve/CVE-2024-43875.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43876.html">https://www.suse.com/security/cve/CVE-2024-43876.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43877.html">https://www.suse.com/security/cve/CVE-2024-43877.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43879.html">https://www.suse.com/security/cve/CVE-2024-43879.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43880.html">https://www.suse.com/security/cve/CVE-2024-43880.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43881.html">https://www.suse.com/security/cve/CVE-2024-43881.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43882.html">https://www.suse.com/security/cve/CVE-2024-43882.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43883.html">https://www.suse.com/security/cve/CVE-2024-43883.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43884.html">https://www.suse.com/security/cve/CVE-2024-43884.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43885.html">https://www.suse.com/security/cve/CVE-2024-43885.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43889.html">https://www.suse.com/security/cve/CVE-2024-43889.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43892.html">https://www.suse.com/security/cve/CVE-2024-43892.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43893.html">https://www.suse.com/security/cve/CVE-2024-43893.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43894.html">https://www.suse.com/security/cve/CVE-2024-43894.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43895.html">https://www.suse.com/security/cve/CVE-2024-43895.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43897.html">https://www.suse.com/security/cve/CVE-2024-43897.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43899.html">https://www.suse.com/security/cve/CVE-2024-43899.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43900.html">https://www.suse.com/security/cve/CVE-2024-43900.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43902.html">https://www.suse.com/security/cve/CVE-2024-43902.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43903.html">https://www.suse.com/security/cve/CVE-2024-43903.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43905.html">https://www.suse.com/security/cve/CVE-2024-43905.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43906.html">https://www.suse.com/security/cve/CVE-2024-43906.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43907.html">https://www.suse.com/security/cve/CVE-2024-43907.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43908.html">https://www.suse.com/security/cve/CVE-2024-43908.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43909.html">https://www.suse.com/security/cve/CVE-2024-43909.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43911.html">https://www.suse.com/security/cve/CVE-2024-43911.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43912.html">https://www.suse.com/security/cve/CVE-2024-43912.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44931.html">https://www.suse.com/security/cve/CVE-2024-44931.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44938.html">https://www.suse.com/security/cve/CVE-2024-44938.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44939.html">https://www.suse.com/security/cve/CVE-2024-44939.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1012628">https://bugzilla.suse.com/show_bug.cgi?id=1012628</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1193454">https://bugzilla.suse.com/show_bug.cgi?id=1193454</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">https://bugzilla.suse.com/show_bug.cgi?id=1194869</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1205462">https://bugzilla.suse.com/show_bug.cgi?id=1205462</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1208783">https://bugzilla.suse.com/show_bug.cgi?id=1208783</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213123">https://bugzilla.suse.com/show_bug.cgi?id=1213123</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214285">https://bugzilla.suse.com/show_bug.cgi?id=1214285</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215199">https://bugzilla.suse.com/show_bug.cgi?id=1215199</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219596">https://bugzilla.suse.com/show_bug.cgi?id=1219596</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220066">https://bugzilla.suse.com/show_bug.cgi?id=1220066</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220252">https://bugzilla.suse.com/show_bug.cgi?id=1220252</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220877">https://bugzilla.suse.com/show_bug.cgi?id=1220877</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221326">https://bugzilla.suse.com/show_bug.cgi?id=1221326</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221630">https://bugzilla.suse.com/show_bug.cgi?id=1221630</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221645">https://bugzilla.suse.com/show_bug.cgi?id=1221645</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221652">https://bugzilla.suse.com/show_bug.cgi?id=1221652</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221857">https://bugzilla.suse.com/show_bug.cgi?id=1221857</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222254">https://bugzilla.suse.com/show_bug.cgi?id=1222254</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222335">https://bugzilla.suse.com/show_bug.cgi?id=1222335</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222350">https://bugzilla.suse.com/show_bug.cgi?id=1222350</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222364">https://bugzilla.suse.com/show_bug.cgi?id=1222364</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222372">https://bugzilla.suse.com/show_bug.cgi?id=1222372</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222387">https://bugzilla.suse.com/show_bug.cgi?id=1222387</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222433">https://bugzilla.suse.com/show_bug.cgi?id=1222433</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222434">https://bugzilla.suse.com/show_bug.cgi?id=1222434</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222625">https://bugzilla.suse.com/show_bug.cgi?id=1222625</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222633">https://bugzilla.suse.com/show_bug.cgi?id=1222633</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222634">https://bugzilla.suse.com/show_bug.cgi?id=1222634</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222777">https://bugzilla.suse.com/show_bug.cgi?id=1222777</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222808">https://bugzilla.suse.com/show_bug.cgi?id=1222808</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222967">https://bugzilla.suse.com/show_bug.cgi?id=1222967</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222973">https://bugzilla.suse.com/show_bug.cgi?id=1222973</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223053">https://bugzilla.suse.com/show_bug.cgi?id=1223053</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223074">https://bugzilla.suse.com/show_bug.cgi?id=1223074</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223191">https://bugzilla.suse.com/show_bug.cgi?id=1223191</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223395">https://bugzilla.suse.com/show_bug.cgi?id=1223395</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223635">https://bugzilla.suse.com/show_bug.cgi?id=1223635</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223720">https://bugzilla.suse.com/show_bug.cgi?id=1223720</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223731">https://bugzilla.suse.com/show_bug.cgi?id=1223731</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223742">https://bugzilla.suse.com/show_bug.cgi?id=1223742</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223763">https://bugzilla.suse.com/show_bug.cgi?id=1223763</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223767">https://bugzilla.suse.com/show_bug.cgi?id=1223767</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223777">https://bugzilla.suse.com/show_bug.cgi?id=1223777</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223803">https://bugzilla.suse.com/show_bug.cgi?id=1223803</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224105">https://bugzilla.suse.com/show_bug.cgi?id=1224105</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224415">https://bugzilla.suse.com/show_bug.cgi?id=1224415</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224485">https://bugzilla.suse.com/show_bug.cgi?id=1224485</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224496">https://bugzilla.suse.com/show_bug.cgi?id=1224496</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224510">https://bugzilla.suse.com/show_bug.cgi?id=1224510</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224535">https://bugzilla.suse.com/show_bug.cgi?id=1224535</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224631">https://bugzilla.suse.com/show_bug.cgi?id=1224631</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224636">https://bugzilla.suse.com/show_bug.cgi?id=1224636</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224690">https://bugzilla.suse.com/show_bug.cgi?id=1224690</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224694">https://bugzilla.suse.com/show_bug.cgi?id=1224694</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224700">https://bugzilla.suse.com/show_bug.cgi?id=1224700</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224711">https://bugzilla.suse.com/show_bug.cgi?id=1224711</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225461">https://bugzilla.suse.com/show_bug.cgi?id=1225461</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225474">https://bugzilla.suse.com/show_bug.cgi?id=1225474</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225475">https://bugzilla.suse.com/show_bug.cgi?id=1225475</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225582">https://bugzilla.suse.com/show_bug.cgi?id=1225582</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225607">https://bugzilla.suse.com/show_bug.cgi?id=1225607</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225718">https://bugzilla.suse.com/show_bug.cgi?id=1225718</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225751">https://bugzilla.suse.com/show_bug.cgi?id=1225751</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225814">https://bugzilla.suse.com/show_bug.cgi?id=1225814</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225832">https://bugzilla.suse.com/show_bug.cgi?id=1225832</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225838">https://bugzilla.suse.com/show_bug.cgi?id=1225838</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225903">https://bugzilla.suse.com/show_bug.cgi?id=1225903</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226031">https://bugzilla.suse.com/show_bug.cgi?id=1226031</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226127">https://bugzilla.suse.com/show_bug.cgi?id=1226127</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226502">https://bugzilla.suse.com/show_bug.cgi?id=1226502</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226530">https://bugzilla.suse.com/show_bug.cgi?id=1226530</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226588">https://bugzilla.suse.com/show_bug.cgi?id=1226588</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226604">https://bugzilla.suse.com/show_bug.cgi?id=1226604</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226743">https://bugzilla.suse.com/show_bug.cgi?id=1226743</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226751">https://bugzilla.suse.com/show_bug.cgi?id=1226751</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226765">https://bugzilla.suse.com/show_bug.cgi?id=1226765</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226798">https://bugzilla.suse.com/show_bug.cgi?id=1226798</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226801">https://bugzilla.suse.com/show_bug.cgi?id=1226801</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226834">https://bugzilla.suse.com/show_bug.cgi?id=1226834</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226874">https://bugzilla.suse.com/show_bug.cgi?id=1226874</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226885">https://bugzilla.suse.com/show_bug.cgi?id=1226885</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226920">https://bugzilla.suse.com/show_bug.cgi?id=1226920</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227149">https://bugzilla.suse.com/show_bug.cgi?id=1227149</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227182">https://bugzilla.suse.com/show_bug.cgi?id=1227182</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227383">https://bugzilla.suse.com/show_bug.cgi?id=1227383</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227437">https://bugzilla.suse.com/show_bug.cgi?id=1227437</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227492">https://bugzilla.suse.com/show_bug.cgi?id=1227492</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227493">https://bugzilla.suse.com/show_bug.cgi?id=1227493</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227494">https://bugzilla.suse.com/show_bug.cgi?id=1227494</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227618">https://bugzilla.suse.com/show_bug.cgi?id=1227618</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227620">https://bugzilla.suse.com/show_bug.cgi?id=1227620</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227623">https://bugzilla.suse.com/show_bug.cgi?id=1227623</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227627">https://bugzilla.suse.com/show_bug.cgi?id=1227627</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227634">https://bugzilla.suse.com/show_bug.cgi?id=1227634</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227706">https://bugzilla.suse.com/show_bug.cgi?id=1227706</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227722">https://bugzilla.suse.com/show_bug.cgi?id=1227722</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227724">https://bugzilla.suse.com/show_bug.cgi?id=1227724</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227725">https://bugzilla.suse.com/show_bug.cgi?id=1227725</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227728">https://bugzilla.suse.com/show_bug.cgi?id=1227728</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227729">https://bugzilla.suse.com/show_bug.cgi?id=1227729</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227732">https://bugzilla.suse.com/show_bug.cgi?id=1227732</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227733">https://bugzilla.suse.com/show_bug.cgi?id=1227733</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227734">https://bugzilla.suse.com/show_bug.cgi?id=1227734</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227747">https://bugzilla.suse.com/show_bug.cgi?id=1227747</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227750">https://bugzilla.suse.com/show_bug.cgi?id=1227750</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227754">https://bugzilla.suse.com/show_bug.cgi?id=1227754</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227758">https://bugzilla.suse.com/show_bug.cgi?id=1227758</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227760">https://bugzilla.suse.com/show_bug.cgi?id=1227760</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227761">https://bugzilla.suse.com/show_bug.cgi?id=1227761</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227764">https://bugzilla.suse.com/show_bug.cgi?id=1227764</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227766">https://bugzilla.suse.com/show_bug.cgi?id=1227766</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227770">https://bugzilla.suse.com/show_bug.cgi?id=1227770</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227771">https://bugzilla.suse.com/show_bug.cgi?id=1227771</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227772">https://bugzilla.suse.com/show_bug.cgi?id=1227772</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227774">https://bugzilla.suse.com/show_bug.cgi?id=1227774</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227781">https://bugzilla.suse.com/show_bug.cgi?id=1227781</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227784">https://bugzilla.suse.com/show_bug.cgi?id=1227784</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227785">https://bugzilla.suse.com/show_bug.cgi?id=1227785</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227787">https://bugzilla.suse.com/show_bug.cgi?id=1227787</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227790">https://bugzilla.suse.com/show_bug.cgi?id=1227790</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227791">https://bugzilla.suse.com/show_bug.cgi?id=1227791</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227792">https://bugzilla.suse.com/show_bug.cgi?id=1227792</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227796">https://bugzilla.suse.com/show_bug.cgi?id=1227796</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227798">https://bugzilla.suse.com/show_bug.cgi?id=1227798</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227799">https://bugzilla.suse.com/show_bug.cgi?id=1227799</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227802">https://bugzilla.suse.com/show_bug.cgi?id=1227802</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227808">https://bugzilla.suse.com/show_bug.cgi?id=1227808</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227810">https://bugzilla.suse.com/show_bug.cgi?id=1227810</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227811">https://bugzilla.suse.com/show_bug.cgi?id=1227811</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227812">https://bugzilla.suse.com/show_bug.cgi?id=1227812</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227815">https://bugzilla.suse.com/show_bug.cgi?id=1227815</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227816">https://bugzilla.suse.com/show_bug.cgi?id=1227816</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227818">https://bugzilla.suse.com/show_bug.cgi?id=1227818</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227820">https://bugzilla.suse.com/show_bug.cgi?id=1227820</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227823">https://bugzilla.suse.com/show_bug.cgi?id=1227823</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227824">https://bugzilla.suse.com/show_bug.cgi?id=1227824</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227826">https://bugzilla.suse.com/show_bug.cgi?id=1227826</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227828">https://bugzilla.suse.com/show_bug.cgi?id=1227828</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227829">https://bugzilla.suse.com/show_bug.cgi?id=1227829</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227830">https://bugzilla.suse.com/show_bug.cgi?id=1227830</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227832">https://bugzilla.suse.com/show_bug.cgi?id=1227832</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227833">https://bugzilla.suse.com/show_bug.cgi?id=1227833</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227834">https://bugzilla.suse.com/show_bug.cgi?id=1227834</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227839">https://bugzilla.suse.com/show_bug.cgi?id=1227839</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227840">https://bugzilla.suse.com/show_bug.cgi?id=1227840</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227846">https://bugzilla.suse.com/show_bug.cgi?id=1227846</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227849">https://bugzilla.suse.com/show_bug.cgi?id=1227849</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227851">https://bugzilla.suse.com/show_bug.cgi?id=1227851</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227853">https://bugzilla.suse.com/show_bug.cgi?id=1227853</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227863">https://bugzilla.suse.com/show_bug.cgi?id=1227863</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227864">https://bugzilla.suse.com/show_bug.cgi?id=1227864</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227865">https://bugzilla.suse.com/show_bug.cgi?id=1227865</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227867">https://bugzilla.suse.com/show_bug.cgi?id=1227867</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227869">https://bugzilla.suse.com/show_bug.cgi?id=1227869</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227870">https://bugzilla.suse.com/show_bug.cgi?id=1227870</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227883">https://bugzilla.suse.com/show_bug.cgi?id=1227883</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227884">https://bugzilla.suse.com/show_bug.cgi?id=1227884</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227891">https://bugzilla.suse.com/show_bug.cgi?id=1227891</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227893">https://bugzilla.suse.com/show_bug.cgi?id=1227893</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227929">https://bugzilla.suse.com/show_bug.cgi?id=1227929</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227950">https://bugzilla.suse.com/show_bug.cgi?id=1227950</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227957">https://bugzilla.suse.com/show_bug.cgi?id=1227957</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227981">https://bugzilla.suse.com/show_bug.cgi?id=1227981</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228020">https://bugzilla.suse.com/show_bug.cgi?id=1228020</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228021">https://bugzilla.suse.com/show_bug.cgi?id=1228021</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228114">https://bugzilla.suse.com/show_bug.cgi?id=1228114</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228192">https://bugzilla.suse.com/show_bug.cgi?id=1228192</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228195">https://bugzilla.suse.com/show_bug.cgi?id=1228195</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228202">https://bugzilla.suse.com/show_bug.cgi?id=1228202</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228235">https://bugzilla.suse.com/show_bug.cgi?id=1228235</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228236">https://bugzilla.suse.com/show_bug.cgi?id=1228236</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228237">https://bugzilla.suse.com/show_bug.cgi?id=1228237</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228247">https://bugzilla.suse.com/show_bug.cgi?id=1228247</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228321">https://bugzilla.suse.com/show_bug.cgi?id=1228321</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228409">https://bugzilla.suse.com/show_bug.cgi?id=1228409</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228410">https://bugzilla.suse.com/show_bug.cgi?id=1228410</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228426">https://bugzilla.suse.com/show_bug.cgi?id=1228426</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228427">https://bugzilla.suse.com/show_bug.cgi?id=1228427</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228429">https://bugzilla.suse.com/show_bug.cgi?id=1228429</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228446">https://bugzilla.suse.com/show_bug.cgi?id=1228446</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228447">https://bugzilla.suse.com/show_bug.cgi?id=1228447</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228449">https://bugzilla.suse.com/show_bug.cgi?id=1228449</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228450">https://bugzilla.suse.com/show_bug.cgi?id=1228450</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228452">https://bugzilla.suse.com/show_bug.cgi?id=1228452</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228456">https://bugzilla.suse.com/show_bug.cgi?id=1228456</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228457">https://bugzilla.suse.com/show_bug.cgi?id=1228457</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228458">https://bugzilla.suse.com/show_bug.cgi?id=1228458</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228459">https://bugzilla.suse.com/show_bug.cgi?id=1228459</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228460">https://bugzilla.suse.com/show_bug.cgi?id=1228460</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228462">https://bugzilla.suse.com/show_bug.cgi?id=1228462</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228463">https://bugzilla.suse.com/show_bug.cgi?id=1228463</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228466">https://bugzilla.suse.com/show_bug.cgi?id=1228466</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228467">https://bugzilla.suse.com/show_bug.cgi?id=1228467</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228468">https://bugzilla.suse.com/show_bug.cgi?id=1228468</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228469">https://bugzilla.suse.com/show_bug.cgi?id=1228469</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228470">https://bugzilla.suse.com/show_bug.cgi?id=1228470</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228472">https://bugzilla.suse.com/show_bug.cgi?id=1228472</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228479">https://bugzilla.suse.com/show_bug.cgi?id=1228479</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228480">https://bugzilla.suse.com/show_bug.cgi?id=1228480</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228481">https://bugzilla.suse.com/show_bug.cgi?id=1228481</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228482">https://bugzilla.suse.com/show_bug.cgi?id=1228482</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228483">https://bugzilla.suse.com/show_bug.cgi?id=1228483</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228484">https://bugzilla.suse.com/show_bug.cgi?id=1228484</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228485">https://bugzilla.suse.com/show_bug.cgi?id=1228485</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228486">https://bugzilla.suse.com/show_bug.cgi?id=1228486</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228487">https://bugzilla.suse.com/show_bug.cgi?id=1228487</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228489">https://bugzilla.suse.com/show_bug.cgi?id=1228489</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228491">https://bugzilla.suse.com/show_bug.cgi?id=1228491</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228492">https://bugzilla.suse.com/show_bug.cgi?id=1228492</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228493">https://bugzilla.suse.com/show_bug.cgi?id=1228493</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228494">https://bugzilla.suse.com/show_bug.cgi?id=1228494</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228495">https://bugzilla.suse.com/show_bug.cgi?id=1228495</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228496">https://bugzilla.suse.com/show_bug.cgi?id=1228496</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228499">https://bugzilla.suse.com/show_bug.cgi?id=1228499</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228500">https://bugzilla.suse.com/show_bug.cgi?id=1228500</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228501">https://bugzilla.suse.com/show_bug.cgi?id=1228501</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228502">https://bugzilla.suse.com/show_bug.cgi?id=1228502</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228503">https://bugzilla.suse.com/show_bug.cgi?id=1228503</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228505">https://bugzilla.suse.com/show_bug.cgi?id=1228505</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228508">https://bugzilla.suse.com/show_bug.cgi?id=1228508</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228509">https://bugzilla.suse.com/show_bug.cgi?id=1228509</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228510">https://bugzilla.suse.com/show_bug.cgi?id=1228510</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228511">https://bugzilla.suse.com/show_bug.cgi?id=1228511</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228513">https://bugzilla.suse.com/show_bug.cgi?id=1228513</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228515">https://bugzilla.suse.com/show_bug.cgi?id=1228515</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228516">https://bugzilla.suse.com/show_bug.cgi?id=1228516</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228518">https://bugzilla.suse.com/show_bug.cgi?id=1228518</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228520">https://bugzilla.suse.com/show_bug.cgi?id=1228520</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228525">https://bugzilla.suse.com/show_bug.cgi?id=1228525</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228527">https://bugzilla.suse.com/show_bug.cgi?id=1228527</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228530">https://bugzilla.suse.com/show_bug.cgi?id=1228530</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228531">https://bugzilla.suse.com/show_bug.cgi?id=1228531</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228539">https://bugzilla.suse.com/show_bug.cgi?id=1228539</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228561">https://bugzilla.suse.com/show_bug.cgi?id=1228561</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228563">https://bugzilla.suse.com/show_bug.cgi?id=1228563</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228564">https://bugzilla.suse.com/show_bug.cgi?id=1228564</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228565">https://bugzilla.suse.com/show_bug.cgi?id=1228565</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228567">https://bugzilla.suse.com/show_bug.cgi?id=1228567</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228568">https://bugzilla.suse.com/show_bug.cgi?id=1228568</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228572">https://bugzilla.suse.com/show_bug.cgi?id=1228572</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228576">https://bugzilla.suse.com/show_bug.cgi?id=1228576</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228579">https://bugzilla.suse.com/show_bug.cgi?id=1228579</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228580">https://bugzilla.suse.com/show_bug.cgi?id=1228580</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228581">https://bugzilla.suse.com/show_bug.cgi?id=1228581</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228582">https://bugzilla.suse.com/show_bug.cgi?id=1228582</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228584">https://bugzilla.suse.com/show_bug.cgi?id=1228584</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228586">https://bugzilla.suse.com/show_bug.cgi?id=1228586</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228588">https://bugzilla.suse.com/show_bug.cgi?id=1228588</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228590">https://bugzilla.suse.com/show_bug.cgi?id=1228590</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228591">https://bugzilla.suse.com/show_bug.cgi?id=1228591</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228599">https://bugzilla.suse.com/show_bug.cgi?id=1228599</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228615">https://bugzilla.suse.com/show_bug.cgi?id=1228615</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228616">https://bugzilla.suse.com/show_bug.cgi?id=1228616</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228617">https://bugzilla.suse.com/show_bug.cgi?id=1228617</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228625">https://bugzilla.suse.com/show_bug.cgi?id=1228625</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228626">https://bugzilla.suse.com/show_bug.cgi?id=1228626</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228633">https://bugzilla.suse.com/show_bug.cgi?id=1228633</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228635">https://bugzilla.suse.com/show_bug.cgi?id=1228635</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228636">https://bugzilla.suse.com/show_bug.cgi?id=1228636</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228640">https://bugzilla.suse.com/show_bug.cgi?id=1228640</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228643">https://bugzilla.suse.com/show_bug.cgi?id=1228643</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228644">https://bugzilla.suse.com/show_bug.cgi?id=1228644</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228646">https://bugzilla.suse.com/show_bug.cgi?id=1228646</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228649">https://bugzilla.suse.com/show_bug.cgi?id=1228649</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228650">https://bugzilla.suse.com/show_bug.cgi?id=1228650</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228654">https://bugzilla.suse.com/show_bug.cgi?id=1228654</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228655">https://bugzilla.suse.com/show_bug.cgi?id=1228655</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228656">https://bugzilla.suse.com/show_bug.cgi?id=1228656</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228658">https://bugzilla.suse.com/show_bug.cgi?id=1228658</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228660">https://bugzilla.suse.com/show_bug.cgi?id=1228660</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228662">https://bugzilla.suse.com/show_bug.cgi?id=1228662</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228665">https://bugzilla.suse.com/show_bug.cgi?id=1228665</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228666">https://bugzilla.suse.com/show_bug.cgi?id=1228666</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228667">https://bugzilla.suse.com/show_bug.cgi?id=1228667</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228672">https://bugzilla.suse.com/show_bug.cgi?id=1228672</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228673">https://bugzilla.suse.com/show_bug.cgi?id=1228673</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228674">https://bugzilla.suse.com/show_bug.cgi?id=1228674</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228677">https://bugzilla.suse.com/show_bug.cgi?id=1228677</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228680">https://bugzilla.suse.com/show_bug.cgi?id=1228680</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228687">https://bugzilla.suse.com/show_bug.cgi?id=1228687</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228705">https://bugzilla.suse.com/show_bug.cgi?id=1228705</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228706">https://bugzilla.suse.com/show_bug.cgi?id=1228706</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228707">https://bugzilla.suse.com/show_bug.cgi?id=1228707</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228708">https://bugzilla.suse.com/show_bug.cgi?id=1228708</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228709">https://bugzilla.suse.com/show_bug.cgi?id=1228709</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228710">https://bugzilla.suse.com/show_bug.cgi?id=1228710</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228718">https://bugzilla.suse.com/show_bug.cgi?id=1228718</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228720">https://bugzilla.suse.com/show_bug.cgi?id=1228720</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228721">https://bugzilla.suse.com/show_bug.cgi?id=1228721</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228722">https://bugzilla.suse.com/show_bug.cgi?id=1228722</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228723">https://bugzilla.suse.com/show_bug.cgi?id=1228723</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228724">https://bugzilla.suse.com/show_bug.cgi?id=1228724</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228726">https://bugzilla.suse.com/show_bug.cgi?id=1228726</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228727">https://bugzilla.suse.com/show_bug.cgi?id=1228727</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228733">https://bugzilla.suse.com/show_bug.cgi?id=1228733</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228737">https://bugzilla.suse.com/show_bug.cgi?id=1228737</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228743">https://bugzilla.suse.com/show_bug.cgi?id=1228743</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228748">https://bugzilla.suse.com/show_bug.cgi?id=1228748</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228754">https://bugzilla.suse.com/show_bug.cgi?id=1228754</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228756">https://bugzilla.suse.com/show_bug.cgi?id=1228756</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228757">https://bugzilla.suse.com/show_bug.cgi?id=1228757</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228758">https://bugzilla.suse.com/show_bug.cgi?id=1228758</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228764">https://bugzilla.suse.com/show_bug.cgi?id=1228764</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228766">https://bugzilla.suse.com/show_bug.cgi?id=1228766</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228779">https://bugzilla.suse.com/show_bug.cgi?id=1228779</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228801">https://bugzilla.suse.com/show_bug.cgi?id=1228801</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228849">https://bugzilla.suse.com/show_bug.cgi?id=1228849</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228850">https://bugzilla.suse.com/show_bug.cgi?id=1228850</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228857">https://bugzilla.suse.com/show_bug.cgi?id=1228857</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228959">https://bugzilla.suse.com/show_bug.cgi?id=1228959</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228964">https://bugzilla.suse.com/show_bug.cgi?id=1228964</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228966">https://bugzilla.suse.com/show_bug.cgi?id=1228966</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228967">https://bugzilla.suse.com/show_bug.cgi?id=1228967</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228973">https://bugzilla.suse.com/show_bug.cgi?id=1228973</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228977">https://bugzilla.suse.com/show_bug.cgi?id=1228977</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228978">https://bugzilla.suse.com/show_bug.cgi?id=1228978</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228979">https://bugzilla.suse.com/show_bug.cgi?id=1228979</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228986">https://bugzilla.suse.com/show_bug.cgi?id=1228986</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228988">https://bugzilla.suse.com/show_bug.cgi?id=1228988</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228989">https://bugzilla.suse.com/show_bug.cgi?id=1228989</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228991">https://bugzilla.suse.com/show_bug.cgi?id=1228991</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228992">https://bugzilla.suse.com/show_bug.cgi?id=1228992</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229005">https://bugzilla.suse.com/show_bug.cgi?id=1229005</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229024">https://bugzilla.suse.com/show_bug.cgi?id=1229024</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229042">https://bugzilla.suse.com/show_bug.cgi?id=1229042</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229045">https://bugzilla.suse.com/show_bug.cgi?id=1229045</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229046">https://bugzilla.suse.com/show_bug.cgi?id=1229046</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229054">https://bugzilla.suse.com/show_bug.cgi?id=1229054</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229056">https://bugzilla.suse.com/show_bug.cgi?id=1229056</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229086">https://bugzilla.suse.com/show_bug.cgi?id=1229086</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229134">https://bugzilla.suse.com/show_bug.cgi?id=1229134</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229136">https://bugzilla.suse.com/show_bug.cgi?id=1229136</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229154">https://bugzilla.suse.com/show_bug.cgi?id=1229154</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229156">https://bugzilla.suse.com/show_bug.cgi?id=1229156</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229160">https://bugzilla.suse.com/show_bug.cgi?id=1229160</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229167">https://bugzilla.suse.com/show_bug.cgi?id=1229167</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229168">https://bugzilla.suse.com/show_bug.cgi?id=1229168</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229169">https://bugzilla.suse.com/show_bug.cgi?id=1229169</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229170">https://bugzilla.suse.com/show_bug.cgi?id=1229170</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229171">https://bugzilla.suse.com/show_bug.cgi?id=1229171</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229172">https://bugzilla.suse.com/show_bug.cgi?id=1229172</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229173">https://bugzilla.suse.com/show_bug.cgi?id=1229173</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229174">https://bugzilla.suse.com/show_bug.cgi?id=1229174</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229239">https://bugzilla.suse.com/show_bug.cgi?id=1229239</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229240">https://bugzilla.suse.com/show_bug.cgi?id=1229240</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229241">https://bugzilla.suse.com/show_bug.cgi?id=1229241</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229243">https://bugzilla.suse.com/show_bug.cgi?id=1229243</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229244">https://bugzilla.suse.com/show_bug.cgi?id=1229244</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229245">https://bugzilla.suse.com/show_bug.cgi?id=1229245</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229246">https://bugzilla.suse.com/show_bug.cgi?id=1229246</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229247">https://bugzilla.suse.com/show_bug.cgi?id=1229247</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229248">https://bugzilla.suse.com/show_bug.cgi?id=1229248</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229249">https://bugzilla.suse.com/show_bug.cgi?id=1229249</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229250">https://bugzilla.suse.com/show_bug.cgi?id=1229250</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229251">https://bugzilla.suse.com/show_bug.cgi?id=1229251</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229252">https://bugzilla.suse.com/show_bug.cgi?id=1229252</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229253">https://bugzilla.suse.com/show_bug.cgi?id=1229253</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229254">https://bugzilla.suse.com/show_bug.cgi?id=1229254</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229255">https://bugzilla.suse.com/show_bug.cgi?id=1229255</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229256">https://bugzilla.suse.com/show_bug.cgi?id=1229256</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229287">https://bugzilla.suse.com/show_bug.cgi?id=1229287</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229290">https://bugzilla.suse.com/show_bug.cgi?id=1229290</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229291">https://bugzilla.suse.com/show_bug.cgi?id=1229291</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229292">https://bugzilla.suse.com/show_bug.cgi?id=1229292</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229294">https://bugzilla.suse.com/show_bug.cgi?id=1229294</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229296">https://bugzilla.suse.com/show_bug.cgi?id=1229296</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229297">https://bugzilla.suse.com/show_bug.cgi?id=1229297</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229298">https://bugzilla.suse.com/show_bug.cgi?id=1229298</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229299">https://bugzilla.suse.com/show_bug.cgi?id=1229299</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229301">https://bugzilla.suse.com/show_bug.cgi?id=1229301</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229303">https://bugzilla.suse.com/show_bug.cgi?id=1229303</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229304">https://bugzilla.suse.com/show_bug.cgi?id=1229304</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229305">https://bugzilla.suse.com/show_bug.cgi?id=1229305</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229307">https://bugzilla.suse.com/show_bug.cgi?id=1229307</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229309">https://bugzilla.suse.com/show_bug.cgi?id=1229309</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229312">https://bugzilla.suse.com/show_bug.cgi?id=1229312</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229313">https://bugzilla.suse.com/show_bug.cgi?id=1229313</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229314">https://bugzilla.suse.com/show_bug.cgi?id=1229314</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229315">https://bugzilla.suse.com/show_bug.cgi?id=1229315</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229316">https://bugzilla.suse.com/show_bug.cgi?id=1229316</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229317">https://bugzilla.suse.com/show_bug.cgi?id=1229317</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229318">https://bugzilla.suse.com/show_bug.cgi?id=1229318</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229319">https://bugzilla.suse.com/show_bug.cgi?id=1229319</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229320">https://bugzilla.suse.com/show_bug.cgi?id=1229320</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229327">https://bugzilla.suse.com/show_bug.cgi?id=1229327</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229341">https://bugzilla.suse.com/show_bug.cgi?id=1229341</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229342">https://bugzilla.suse.com/show_bug.cgi?id=1229342</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229344">https://bugzilla.suse.com/show_bug.cgi?id=1229344</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229345">https://bugzilla.suse.com/show_bug.cgi?id=1229345</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229346">https://bugzilla.suse.com/show_bug.cgi?id=1229346</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229347">https://bugzilla.suse.com/show_bug.cgi?id=1229347</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229349">https://bugzilla.suse.com/show_bug.cgi?id=1229349</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229350">https://bugzilla.suse.com/show_bug.cgi?id=1229350</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229351">https://bugzilla.suse.com/show_bug.cgi?id=1229351</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229353">https://bugzilla.suse.com/show_bug.cgi?id=1229353</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229354">https://bugzilla.suse.com/show_bug.cgi?id=1229354</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229355">https://bugzilla.suse.com/show_bug.cgi?id=1229355</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229356">https://bugzilla.suse.com/show_bug.cgi?id=1229356</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229357">https://bugzilla.suse.com/show_bug.cgi?id=1229357</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229358">https://bugzilla.suse.com/show_bug.cgi?id=1229358</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229359">https://bugzilla.suse.com/show_bug.cgi?id=1229359</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229360">https://bugzilla.suse.com/show_bug.cgi?id=1229360</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229365">https://bugzilla.suse.com/show_bug.cgi?id=1229365</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229366">https://bugzilla.suse.com/show_bug.cgi?id=1229366</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229369">https://bugzilla.suse.com/show_bug.cgi?id=1229369</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229370">https://bugzilla.suse.com/show_bug.cgi?id=1229370</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229373">https://bugzilla.suse.com/show_bug.cgi?id=1229373</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229374">https://bugzilla.suse.com/show_bug.cgi?id=1229374</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229379">https://bugzilla.suse.com/show_bug.cgi?id=1229379</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229381">https://bugzilla.suse.com/show_bug.cgi?id=1229381</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229382">https://bugzilla.suse.com/show_bug.cgi?id=1229382</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229383">https://bugzilla.suse.com/show_bug.cgi?id=1229383</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229386">https://bugzilla.suse.com/show_bug.cgi?id=1229386</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229388">https://bugzilla.suse.com/show_bug.cgi?id=1229388</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229390">https://bugzilla.suse.com/show_bug.cgi?id=1229390</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229391">https://bugzilla.suse.com/show_bug.cgi?id=1229391</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229392">https://bugzilla.suse.com/show_bug.cgi?id=1229392</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229395">https://bugzilla.suse.com/show_bug.cgi?id=1229395</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229398">https://bugzilla.suse.com/show_bug.cgi?id=1229398</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229399">https://bugzilla.suse.com/show_bug.cgi?id=1229399</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229400">https://bugzilla.suse.com/show_bug.cgi?id=1229400</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229402">https://bugzilla.suse.com/show_bug.cgi?id=1229402</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229403">https://bugzilla.suse.com/show_bug.cgi?id=1229403</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229404">https://bugzilla.suse.com/show_bug.cgi?id=1229404</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229407">https://bugzilla.suse.com/show_bug.cgi?id=1229407</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229409">https://bugzilla.suse.com/show_bug.cgi?id=1229409</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229410">https://bugzilla.suse.com/show_bug.cgi?id=1229410</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229411">https://bugzilla.suse.com/show_bug.cgi?id=1229411</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229413">https://bugzilla.suse.com/show_bug.cgi?id=1229413</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229414">https://bugzilla.suse.com/show_bug.cgi?id=1229414</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229417">https://bugzilla.suse.com/show_bug.cgi?id=1229417</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229444">https://bugzilla.suse.com/show_bug.cgi?id=1229444</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229451">https://bugzilla.suse.com/show_bug.cgi?id=1229451</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229452">https://bugzilla.suse.com/show_bug.cgi?id=1229452</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229455">https://bugzilla.suse.com/show_bug.cgi?id=1229455</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229456">https://bugzilla.suse.com/show_bug.cgi?id=1229456</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229480">https://bugzilla.suse.com/show_bug.cgi?id=1229480</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229481">https://bugzilla.suse.com/show_bug.cgi?id=1229481</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229482">https://bugzilla.suse.com/show_bug.cgi?id=1229482</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229484">https://bugzilla.suse.com/show_bug.cgi?id=1229484</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229485">https://bugzilla.suse.com/show_bug.cgi?id=1229485</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229486">https://bugzilla.suse.com/show_bug.cgi?id=1229486</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229487">https://bugzilla.suse.com/show_bug.cgi?id=1229487</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229488">https://bugzilla.suse.com/show_bug.cgi?id=1229488</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229489">https://bugzilla.suse.com/show_bug.cgi?id=1229489</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229490">https://bugzilla.suse.com/show_bug.cgi?id=1229490</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229493">https://bugzilla.suse.com/show_bug.cgi?id=1229493</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229495">https://bugzilla.suse.com/show_bug.cgi?id=1229495</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229496">https://bugzilla.suse.com/show_bug.cgi?id=1229496</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229497">https://bugzilla.suse.com/show_bug.cgi?id=1229497</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229500">https://bugzilla.suse.com/show_bug.cgi?id=1229500</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229503">https://bugzilla.suse.com/show_bug.cgi?id=1229503</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229707">https://bugzilla.suse.com/show_bug.cgi?id=1229707</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229739">https://bugzilla.suse.com/show_bug.cgi?id=1229739</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229743">https://bugzilla.suse.com/show_bug.cgi?id=1229743</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229746">https://bugzilla.suse.com/show_bug.cgi?id=1229746</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229747">https://bugzilla.suse.com/show_bug.cgi?id=1229747</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229752">https://bugzilla.suse.com/show_bug.cgi?id=1229752</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229754">https://bugzilla.suse.com/show_bug.cgi?id=1229754</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229755">https://bugzilla.suse.com/show_bug.cgi?id=1229755</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229756">https://bugzilla.suse.com/show_bug.cgi?id=1229756</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229759">https://bugzilla.suse.com/show_bug.cgi?id=1229759</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229761">https://bugzilla.suse.com/show_bug.cgi?id=1229761</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229767">https://bugzilla.suse.com/show_bug.cgi?id=1229767</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229781">https://bugzilla.suse.com/show_bug.cgi?id=1229781</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229784">https://bugzilla.suse.com/show_bug.cgi?id=1229784</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229785">https://bugzilla.suse.com/show_bug.cgi?id=1229785</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229787">https://bugzilla.suse.com/show_bug.cgi?id=1229787</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229788">https://bugzilla.suse.com/show_bug.cgi?id=1229788</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229789">https://bugzilla.suse.com/show_bug.cgi?id=1229789</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229792">https://bugzilla.suse.com/show_bug.cgi?id=1229792</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229820">https://bugzilla.suse.com/show_bug.cgi?id=1229820</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229827">https://bugzilla.suse.com/show_bug.cgi?id=1229827</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229830">https://bugzilla.suse.com/show_bug.cgi?id=1229830</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229837">https://bugzilla.suse.com/show_bug.cgi?id=1229837</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229940">https://bugzilla.suse.com/show_bug.cgi?id=1229940</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230056">https://bugzilla.suse.com/show_bug.cgi?id=1230056</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-10029">https://jira.suse.com/browse/PED-10029</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-10045">https://jira.suse.com/browse/PED-10045</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-10055">https://jira.suse.com/browse/PED-10055</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-10105">https://jira.suse.com/browse/PED-10105</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-10108">https://jira.suse.com/browse/PED-10108</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-8779">https://jira.suse.com/browse/PED-8779</a>
</li>


</ul>

</div>

--===============6623829598228459008==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung